فیلتر های جستجو: فیلتری انتخاب نشده است.
نمایش ۱۸۱ تا ۲۰۰ مورد از کل ۲٬۷۸۱ مورد.
۱۸۱.

Balancing Interests in the Field of Tourism Based on Digital Marketing Tools(مقاله علمی وزارت علوم)

کلید واژه ها: Balancing interests in tourism Digital – marketing Portfolio investmen KPI Tourism

حوزه های تخصصی:
تعداد بازدید : ۱۷۷ تعداد دانلود : ۷۲
Digital technologies are actively implemented in all areas of tourism. The article identifies the main areas of balancing interests in the field of tourism on the basis of optimization of digital marketing tools. Analytical research has shown that a set of sales channels in the Internet environment and a set of tools are formed, depending on the marketing strategy of the travel company. The main tactics and tools of digital marketing in tourism are highlighted. These are: the company's website, digital marketing channels - online channels for promoting and attracting customers: SEO, online advertising, email marketing, sales funnel, content marketing, teaser advertising, SMM, etc. The study proposes the application of portfolio investment theory to optimize investment in digital marketing tools to achieve a specific goal. The article uses a method of building a mathematical model that will optimally distribute financial investments in digital marketing. Thus balancing of interests in the field of tourism on the basis of digital marketing tools is offered on the basis of KPI indicators, according to the allocated purposes.
۱۸۲.

Graph-Based Extractive Text Summarization Models: A Systematic Review(مقاله علمی وزارت علوم)

کلید واژه ها: Natural Languages Processing text mining Graph approaches

حوزه های تخصصی:
تعداد بازدید : ۱۶۴ تعداد دانلود : ۷۸
The volume of digital text data is continuously increasing both online and offline storage, which makes it difficult to read across documents on a particular topic and find the desired information within a possible available time. This necessitates the use of technique such as automatic text summarization. Many approaches and algorithms have been proposed for automatic text summarization including; supervised machine learning, clustering, graph-based and lexical chain, among others. This paper presents a novel systematic review of various graph-based automatic text summarization models.
۱۸۳.

Geographic Routing Scheme for Resource and Communication Efficiency in the IoT Ecosystem using Swarm-Intelligence based BFO Algorithm(مقاله علمی وزارت علوم)

کلید واژه ها: Internet of Things quality of service swarm intelligence Bacteria Foraging Optimization Algorithm

حوزه های تخصصی:
تعداد بازدید : ۲۰۵ تعداد دانلود : ۶۷
Wireless sensor networks (WSNs) are the sensor nodes that are generally interconnected and these nodes communicate wirelessly to collect the data from the environment around them. Sensor nodes are low-powered and distributed in a decentralized ADHOC manner. WSNs setup comes with some limitations such as energy constraints and the cooperative demands essential to perform multi-hop geographic routing for Internet of things (IoT) applications. Quality of Service (QoS) depends to a great extent on offering participating nodes an incentive for collaborating. The real-time applications of WSNs have potential design limitations such as energy and other QoS constraints in the context of IoT. This work formulates two different re-transmission strategies for optimized cross-layer design and also integrates the framework with a swarm intelligence technique assisted Bacteria Foraging Optimization (BFO) for efficient Cluster Head (CH) selection. The proposed work designs analytical modelling to realize the formulated concept and also simulates the computational design in a numerical computing tool. Finally, an extensive simulation is carried out using the MATLAB simulation tool. The obtained results show the effectiveness of the proposed system in terms of delay is reduced by 12%, throughput is increased to 10%, remaining energy of the network is increased to 11%, and packet delivery ratio of the proposed work in increased to 7-9% in comparison with the existing system.
۱۸۴.

روش شناسی کنش گر-شبکه در مطالعات علم و فناوری(مقاله علمی وزارت علوم)

کلید واژه ها: نظریه کنش گر - شبکه (نشک) روش شناسی پژوهش جامعه شناسی ترجمه کنش

حوزه های تخصصی:
تعداد بازدید : ۳۷۱ تعداد دانلود : ۷۲
نظریه کنش گر-شبکه، در مفهوم اجتماعی آن، رویکردی برای تجزیه و تحلیل جامعه شناختی در حوزه مطالعات علم و فناوری است که بر درک چگونگی رسیدن چیزها به موقعیت هایی که در آن قرار دارند متمرکز است؛ اما در سال های اخیر، این نظریه به عنوان رویکردی روش شناختی جهت تحلیل نحوه استفاده از محصولات فناوری در محیط کار و توصیف ابعاد مختلف سیستمهای اجتماعی-فنی، مورد توجه پژوهش گران قرار گرفته است. با وجود نمونه های متعددی از پژوهش های مبتنی بر روش شناسی کنش گر-شبکه، چارچوب مدونی برای آن معرفی نشده است و در داخل کشور نیز نمونه ای برای استفاده از این نظریه در قالب روش شناسی یافت نشد. پژوهش حاضر می کوشد تا ضمن تبیین روش شناختی از این نظریه، به روش تحلیلی-توصیفی، چارچوبی نظام مند برای گردآوری و تحلیل داده ها در بستر این نظریه معرفی نماید. امکان و اعتبار چارچوب پیشنهادی در قالب مطالعه موردی، مورد سنجش قرار گرفته است. نتایج پژوهش می تواند در کاربست نظام مند روش شناسی کنش گر-شبکه، به ویژه در داخل کشور مفید باشد.
۱۸۵.

Impact of ecological exploration processes on the development of scientific investigation approach (DIS) and personal action projects among high school students: A tool for reflection on classroom practices Case of an ecological school trip in a natural environment(مقاله علمی وزارت علوم)

کلید واژه ها: school ecological outing investigative process experiential learning and reflective practice

حوزه های تخصصی:
تعداد بازدید : ۲۵۷ تعداد دانلود : ۵۴
The teaching of SVT in general offers learners an environment that allows them to explore and explain natural phenomena, to understand different spatio-temporal scales, to understand the world around them so that they can decide and act responsibly. It is interesting to note that the scientific ecological outing (SES) is an integral part of the SVT teaching program, at both college and qualifying secondary level, and that teachers are called to organize these outings in agreement with the programs as recalled by the circulars of the MEN. However, the SES allows the real observation and the execution of experiential practices in the field, it is the opportunity to place the learner in a learning situation according to a reflective and investigative scientific approach from his confrontation with reality Cariou J (2013), (2015) Offers a didactic framework and formalizes evaluation criteria for the implementation and management of a scientific investigation process. So that he can make connections with what the learner acquires as abstract knowledge in class in order to be able to decide and act responsibly and critically on the scale of everyday situations as an Eco citizen.
۱۸۶.

Energy Consumption Analysis of Iot-Manet Based Systems with Anova Assessment for Tackling Covid-19(مقاله علمی وزارت علوم)

کلید واژه ها: COVID -19 AODV SAODV HWMP DDoS attacks Energy consumption ANOVA IoT-MANET e- Healthcare sector

حوزه های تخصصی:
تعداد بازدید : ۲۲۸ تعداد دانلود : ۸۱
The epidemic situation generated as a result of COVID -19 crossways the sphere observed the practices of various emerging technology like Internet of Thing (IoT) along with norm of dynamic fields. The wireless communication  based on networks such as wireless mesh networks (WMN) and Mobile Ad-hoc networks (MANETS) proven to be very successful for monitoring of patients remotely. The MANET protocols that are simulated in this study are  Ad-hoc On Demand Vector (AODV), Secure AODV (SAODV) and Hybrid Wireless Mesh Protocol (HWMP). In this investigation work, most appropriate routing protocols to knob DDoS attacks are simulated using NS-2 and assessed in terms of average energy consumption in the state of changing speed connections among devices called mesh nodes. Further ANOVA test is utilized for further accessing for the best suited routing protocol for handling the data packets, which is HWMP , considerable less susceptible for DDoS assaults dominant in healthcare field.
۱۸۷.

Improving the State system of strategic planning of national security in the context of informatization of society(مقاله علمی وزارت علوم)

کلید واژه ها: National security State system Strategic Planning National Security Strategy Threats to the public administration system Informatization of society

حوزه های تخصصی:
تعداد بازدید : ۲۶۰ تعداد دانلود : ۵۴
The inefficiency of the national security system is one of the biggest threats to Ukraine's national security. The strategic planning in the field of security and defense has designed to identify the means, including the future structure of forces, that would allow the institutions of the defense and security sector to effectively deal with potential future threats. The purpose of this study is development of theoretical and practical measures to increase the effectiveness of strategic management of national security processes on the basis of goal setting, forecasting and planning in the context of informatization of society. The relevance of this study is due to the needlegal regulation and improvement of the state system of strategic planning of national security of Ukraine. To achieve the goal of the study was used special scientific methods of legal knowledge. The results of the analysis showedwhat in the basis ensuring national security must rely on the principle of systematization, which means that the security and defense sector of Ukraine is considered as a single object of forecasting and planning. This study substantiates the main directions systemic reform of the security and defense sector, which has carried out in Ukraine to ensure the protection of the constitutional order, sovereignty, territorial integrity of the state in the face of armed aggression. The priorities should be implemented through key tasks, such as the establishment of a comprehensive strategic analysis of military threats to Ukraine's national security, coordination of intelligence activities, development of joint intelligence capabilities of the defense forces in order to obtain complete and reliable warning information for timely decision-making guaranteeing the military security of the state.
۱۸۸.

Sustainable Business Models and IT Innovation: The Case of the REMIT(مقاله علمی وزارت علوم)

کلید واژه ها: Energy Markets IT Innovation Sustainable Business Model REMIT

حوزه های تخصصی:
تعداد بازدید : ۱۱۷ تعداد دانلود : ۹۱
This paper aimed to explore IT innovations used in sustainable business models in the European single energy market. For this purpose, the academic literature and content analyses of organized marketplaces were performed. The results showed that end users are not always interested in changing the service and try to choose services/resources well known to them. At the same time, market operators see the need for radical change by introducing strategic innovations and digitizing energy markets. Sustainable e-government management models are typically sustained by IoT, blockchain, and smart grid management technologies.
۱۸۹.

Exploring opportunities and challenges of Blockchain-Based Electronic Medical records(مقاله علمی وزارت علوم)

کلید واژه ها: Blockchain Electronic Medical Records DEMATEL Interpretative Structural Modeling Pair Comparison

حوزه های تخصصی:
تعداد بازدید : ۳۰۹ تعداد دانلود : ۷۵
Available research suggests using Blockchain in electronic medical files to aggregate and integrate information. While reviewing authoritative articles and books, we analyzed the challenges and opportunities of using Blockchain this way. By using the specialists' opinion, completing a specialist questionnaire, using the DEMETEL technique and interpretive structural modeling (ISM) technique, this research investigated and analyzed the possibilities of using Blockchain in electronic medical files. The pair comparison technique was used to study and analyze the challenges of using Blockchain this way. The results are stated in this research. Research achievements include the design of a model using Blockchain for electronic medical files, analysis of Block chain's opportunities and challenges, measurement of the components, design and presentation of the model, and prioritizing the challenges of using Blockchain. This research suggests that the use of Blockchain in electronic medical files can reduce extra costs, create a comprehensive system for medical records to avoid additional costs, facilitate access to patient information, and reduce medical errors. The results obtained reveal that the components of immutability and the impossibility of data forgery of patient records (based on data integration in Blockchain) have the most impact on the system. Examination of the challenges reveals that blockchain technology's challenges (low speed, difficulty working with Blockchain, poor integrations between the software for various electronic health records) are of the utmost importance.
۱۹۰.

Detection of Wormhole Attack in Vehicular Ad-hoc Network over Real Map using Machine Learning Approach with Preventive Scheme(مقاله علمی وزارت علوم)

کلید واژه ها: VANET AODV Broadcast Unicast k-NN Random Forest SUMO-0.32.0 NS-3.24.1 Packet leash Cryptography

حوزه های تخصصی:
تعداد بازدید : ۲۸۹ تعداد دانلود : ۹۸
VANET (Vehicular Ad-hoc Network) is a developing technology, which is a combination of cellular technology, ad-hoc network & wireless LAN to improve the safety of vehicle as well as driver. VANET communication can be of two types, first one is broadcast and second one is unicast. Either communication may be broadcast or unicast both are sensitive to different types ofassaults, for example message forgery, (DOS) denial of service, Sybil assault, Greyhole, Blackhole & Wormhole assault. In this paper machine learning method is used to detect the wormhole assault in VANET’s multi-hop communication. We have created a scenario of VANET by using AODV routing protocol on NS-3.24.1 simulator, which utilizes the overall mobility traces generated by the simulator SUMO-0.32.0 to model the wormhole assault. The simulation is performed by using NS-3.24.1 simulator, and the statistics created by flow monitor are collected. The collected data is pre-processed and the k-NN & Random Forest algorithms are applied on this data, to make the model such type so that it can memorize the wormhole attack. The novelty of this research work is that with the help of proposed detection & prevention technique, vehicular ad-hoc network can be made free from wormhole assault by using ML approach. The performance of proposed machine learning models is compared with existing work. In this way it is clear that our proposed approach by using ML is powerful tool by which the wormhole assaults can be detected in VANETs. A scheme based on packet lease and cryptographic techniques is used to prevent the wormhole attack in VANET
۱۹۱.

تحلیل احساسات نظرات کاربران تریپ ادوایزر برای رستوران های ایران با رویکرد یادگیری عمیق(مقاله علمی وزارت علوم)

کلید واژه ها: یادگیری عمیق شبکه ی عصبی متن کاوی تحلیل احساسات تریپ ادوایزر

حوزه های تخصصی:
تعداد بازدید : ۱۱۸ تعداد دانلود : ۷۴
رشد اینترنت، شبکه های اجتماعی و وبسایت های تجارت الکترونیک بستری جهت ارائه عقاید و نظرات برای کاربران فراهم می نمایند. در سال های اخیر بسیاری از کاربران احساسات و نظرات خوب یا بد خود را در مورد غذا، خدمات، کیفیت و فضای رستوران ها در بسترهای آنلاین بیان می کنند. این نظرات برای تصمیم گیری سایرکاربران و همینطور رستوران ها جهت حفظ کیفیت، توسعه ی محصول و برندشان بسیار مهم می باشند. تحلیل احساسات رویکردی جهت پردازش زبان طبیعی است و امکان تحلیل سیستماتیک نظرات کاربران را فراهم می نماید. با توجه به اهمیت این موضوع هدف این مطالعه ارائه ی مدل تحلیل احساسات نظرات سایت تریپ ادوایزر درباره ی رستوران های ایرانی می باشد. در این تحقیق ما تحلیل احساسات مبتنی بر جنبه بر اساس الگوریتم یادگیری عمیق شبکه ی عصبی حافظه ی طولانی کوتاه مدت استاندارد را برای استخراج احساسات کاربران در مورد رستوران ها پیشنهاد نموده ایم. برای آموزش مدل، 4000 نظر طبق چهار جنبه در سه حالت عدم اشاره، مثبت و منفی برچسب زده شد و گام های مطالعه طبق متدولوژی کریسپ صورت گرفت. میزان دقت برای معیارهای غذا، سرویس، قیمت و اتمسفر به ترتیب 82%، 86%، 87% و 81% به دست آمد. این نتایج نشان از کارایی و عملکرد قابل قبول مدل برای تحلیل احساسات مبتنی بر جنبه ی رستوران ها است. همچنین جنبه ی غذا و اتمسفر به ترتیب مهم ترین جنبه ها برای مشتریان رستوران های ایرانی محسوب می شوند. رستوران داران و صاحبان کسب وکار می توانند از مدل توسعهیافته برای کسب مزیت رقابتی و یافتن نقاط قوت و ضعف خود استفاده کنند.
۱۹۲.

The Effects of Social Networking Sites Use on Students’ Academic Performance at the University of Taiz(مقاله علمی وزارت علوم)

کلید واژه ها: Social networking sites Academic Performance University of Taiz

حوزه های تخصصی:
تعداد بازدید : ۱۱۵ تعداد دانلود : ۶۶
In the academic context, social networking sites (SNSs) have reshaped the way university students connect and communicate with each other, and the way they learn, thus influencing their identities and dimensions. This paper aims to investigate the impacts of SNSs use by students on their academic performance at the University of Taiz. A survey questionnaire was conducted to a total sample of 357 undergraduate students via personal administration and by an online platform to gather the initial information on their use of SNSs and the influence on their academic performance. The hypotheses of this study were studied and tested using descriptive statistics, regression model, T-test, and analysis of variance (ANOVA). The findings of H1 indicate that the impact of the use of SNSs on students’ academic performance was statistically significant Interaction with the teacher (II) Collaboration with coworkers (CC) Engagement (EN) and learning a cooperating (LC). Meanwhile, the results of H2 indicate no significant differences between the mean averages of the respondents’ answers for (purposes, the impact of the use of SNSs, and academic performance) due to gender, and age, respectively. Thus, using SNS as a learning tool has a great potential to improve students’ academic performance because it allows students to be more connected. Overall findings of this study indicate that the use of SNSs impact undergraduate students by factors are studied on academic Performance to some extent and suggested future strategies to enhance students’ awareness to manage their time, multitasking skills, and study activities to enhance their academic performance and achievements.
۱۹۳.

Designing a Mobile Application for Children: Space Science(مقاله علمی وزارت علوم)

کلید واژه ها: STEM education Earth and Space Science mobile application educational game

حوزه های تخصصی:
تعداد بازدید : ۱۸۹ تعداد دانلود : ۶۲
The incorporation of STEM education into the curriculum has been an aspiring objective for many nations around the world. Most students choose not to pursue STEM-discipline studies because they are losing interest slowly. Moreover, the level of engagement required for STEM education is limited due to inadequate interactive teaching and tools that facilitate effective learning in a classroom setting. The objective of this project is to assess how educational game applications can help incline students’ interest in science, develop an educational game application, and conduct user experience testing. A mobile application on Earth and Space Science has been developed for 10 – 11-year-old school students. The project is based on the Rapid Application Development methodology considering the short development timeframe.  The application was created using the Ionic Framework, Angular 5, C#.NET and SQLExpress. The findings indicated that this experiment motivates students to be more inclined to science.
۱۹۴.

تحلیل نحوه گذار به فناوری های نوین مدیریت ثروت در ایران(مقاله علمی وزارت علوم)

کلید واژه ها: فناوری مالی ولث تک گذار اجتماعی فنی نوع شناسی مسیر گذار دیدگاه چند سطحی

حوزه های تخصصی:
تعداد بازدید : ۱۶۶ تعداد دانلود : ۷۵
ولث تک یا فناوری مالی مدیریت ثروت به سرمایه گذاران کمک می کند تا درباره زمان و نحوه سرمایه گذاری تصمیم بهتری بگیرند و بدنبال متمایل ساختن پس اندازها و سرمایه گذاری ها به سوی بازار سرمایه و ایجاد تعادل میان بازار پول و سرمایه است. این مطالعه گذار ولث تک ایران را بررسی می کند. گذار به فرایند ایجاد و جایگزینی یک فناوری جدید و پذیرش آن از سوی اجتماع اشاره دارد. برای تحلیل گذار با کمک چارچوب تحلیلی دیدگاه چند سطحی، تعاملات بازیگران و نهادها با فناوری در سطوح مختلف تحلیل شده است. نحوه گذار به ولث تک با روش تحقیق کیفی و مبتنی بر روایت پژوهی بررسی شده است و داده ها از طریق مطالعه آیین نامه ها و اسناد سیاستی و همچنین مصاحبه ها و گزارش های مطبوعاتی، منتشر شده در رسانه های فین تکی جمع آوری شده است. 252 گزارش بررسی شد که از میان آنها 118 مورد مربوط بودند و طی آن نظرات 36 خبره مورد بررسی و تحلیل قرار گرفت. با بررسی های انجام شده کارکردهای نظام مالی مدیریت ثروت شناسایی شد و با تحلیل رفتار بازیگرانِ اجرا کننده ی کارکردها در برابر تحولات فناورانه و تغییرات نهادی، مسیر گذار ولث تک از نوع بازپیکربندی تعیین شد. مسیر بازپیکربندی از الگوی سرریز نوآوری پیروی می کند و با تغییر معماری رژیم همراه است. در پایان پیشنهاد شد همزمان با فراهم سازی شرایط برای ارائه خدمات نوآورانه، انتشار عمومی اطلاعات و آگاهی بخشی به شهروندان نیز پیگیری شود تا با تقویت همزمان طرف عرضه و تقاضا گذار بهینه به ولث تک تسریع و تسهیل شود.
۱۹۵.

مدل مراحل تکامل اکوسیستم های کسب و کار صنعتی(مقاله علمی وزارت علوم)

کلید واژه ها: اکوسیستم کسب و کار اکوسیستم نوآوری مراحل تکامل چرخه عمر پلتفرم صنعتی

حوزه های تخصصی:
تعداد بازدید : ۳۴۹ تعداد دانلود : ۸۶
استفاده از استعاره اکوسیستم در حوزه علوم اجتماعی به طور روزافزون در حال گسترش است و برای مطالعه حوزه های مختلف مدیریتی از جمله نوآوری، کسب و کار و کارآفرینی استفاده شده است. ویژگی تکامل در اکوسیستم ها بیشتر مورد توجه واقع شده است. هدف این تحقیق شناسایی مدل مراحل تکامل اکوسیستم های کسب و کار صنعتی است. اکثر مطالعات قبلی در حوزه تکامل اکوسیستم ها بر مبنای مطالعات موردی انجام شده و لذا متاثر از شرایط موضوع مورد مطالعه بوده و از قابلیت تعمیم قابل اتکائی برای همه حوزه های صنعتی برخوردار نیست. در این تحقیق مدل جامعی برای مراحل تکامل اکوسیستم های کسب و کار صنعتی با استفاده از فراترکیب ارائه شده است. با مطالعه ادبیات موضوع، از 14 مطالعه که درباره مراحل تکامل بوده اند، 105 کد استخراج و در قالب 19 مفهوم به هم ترجمه شدند و یک مدل 4 مرحله ای استخراج شد. این مدل با برجسته کردن دو مفهوم زنجیره ارزش و پلتفرم صنعتی و زیر بخشهای آن، مدل جامعی برای مراحل اکوسیسمهای کسب و کار صنعتی است و صنعتگران و پژوهشگران می توانند با استفاده از آن، الگوی تکامل برای اکوسیستم صنعتی مورد نظرشان طرح-ریزی کنند یا اکوسیستمهای موجود را مطالعه و تکامل آن را ارزیابی کنند.
۱۹۶.

The Digital Assessment of Learning: Current Situation and Perspectives: Case of Teachers of Life and Earth Sciences(مقاله علمی وزارت علوم)

کلید واژه ها: Digitizing Practice Assessment Technology News

حوزه های تخصصی:
تعداد بازدید : ۶۴ تعداد دانلود : ۴۳
The constant evolution of technological tools and the benefit of the introduction of new technologies in the teaching and learning process in schools, suggests that the possibilities of using digital technology in the practices of the evaluation of learning inside and outside the classroom. Faced with the diversity of technical tools and methods, the teacher is called upon, before addressing his learners, to make a certain number of technical, didactic and pedagogical choices, to set his pedagogical scenario, this is all the more so. Necessary for the conduct of learning activities or to design and implement its assessment tool. In this perspective, we are entitled to ask the question relating to the attitudes and feedbacks of teachers and learners regarding the integration of ICT in assessment practices. This question is broken down into several sub-questions: "At what points, and how do teachers of Life and Earth Sciences integrate digital technology into their assessment practices?" is this integration determined by the educational pathways? What interest and what limit of the use of digital technology according to teachers and learners? "  To answer our problem, we opted for export research, the recommended methodology of which is based on a multidimensional survey, in which we first questioned the teachers around the use of new technologies in the evaluation process, and secondly, to identify the degree of motivation and commitment of learners in instrumented and innovative assessment situations. Our research context is represented by 34 schools, 22 from qualifying secondary education and 12 from college education (from the provincial delegation of Taza), with a varied population of 431 students of all levels and sectors, as well as than a number of 132 teachers of life and earth sciences. Finally, confirming that despite the satisfaction of the majority of teachers and students with respect to the functional qualities and the contribution of technological tools in evaluation practices, some disparities were noted whether at the technical, spatiotemporal level or even organizational.
۱۹۷.

Interaction of the Home and the Economic Free Related(مقاله علمی وزارت علوم)

کلید واژه ها: Educational programs Personnel planning free related

حوزه های تخصصی:
تعداد بازدید : ۳۶۹ تعداد دانلود : ۱۰۱
The article is devoted to solving the problems of internal economic relations in Ukraine in modern conditions in order to increase the efficiency of their functioning. Studied, systematized and generalized theoretical approaches regarding the features of the interaction of internal and external economic relations, which significantly complement the theory and methodology of the scientific principles of the branch economy. In Ukraine, during the period of restoration of trade and economic relations with the CIS countries and active integration processes in the world economy, the volumes and structure of exports and imports undergo significant changes. In this regard, it is advisable to forecast the export and import in the near future. Conceptual provisions regarding the formation of a national strategy, a mechanism for managing the development of Ukraine’s integration processes on the principles of improving the current legislative and regulatory regulation in the country are proposed. In addition to the convenience for calculations, the hierarchical model also has other significant advantages. So, a high degree of independence of groups from each other makes it extremely flexible.
۱۹۸.

تحلیل مفهوم شناختی «رجعت» از نگاه لغت و اصطلاح

کلید واژه ها: رجعت رجعت کنندگان مهدویت متکلمان شیعه

حوزه های تخصصی:
تعداد بازدید : ۲۵۹ تعداد دانلود : ۱۰۱
شناخت معانی واژگان و اصطلاحات اعتقادی و تبیین میدان معنایی آنها از دیرباز توجه دانشمندان شیعه را به خود جلب کرده است. در میان این واژگان، واژه «رجعت» و مشتقات آن، در مکتب اهل بیت: بسامد نسبتاً بالایی دارد. این واژه که به یکی از اعتقادات ویژه و ضروری شیعه اشاره می کند، در مقاله حاضر از نگاه لغت و اصطلاح، مفهوم شناسی می شود. بنابراین نخست معنای لغوی رجعت با بهره از کتاب های لغت و سپس معنای اصطلاحی آن از نگاه بزرگان و علمای شیعه تحلیل می گردد. برآیند پژوهش که به روش توصیفی، تحلیلی انتقادی صورت گرفته، نشان می دهد آنچه عموم بزرگان و متکلمان شیعه از رجعت بیان می کنند، با بهره از برخی سخنان معصومان: است و به نظر می رسد ایشان در مقام تعریف اصطلاحی رجعت نبوده اند تا معنایی جامع ارائه کنند. از این رو دیدگاه بیشتر آنها بر بخشی از مفهوم رجعت تمرکز دارد و کمتر تعریف فراگیری ارائه شده است. این مقاله در پایان با در نظرداشت مجموع روایات رجعت، به بیان تعریفی جامع می پردازد.
۱۹۹.

Analysis of Revocation Mechanisms for Blockchain Applications and a Proposed Model Based in Self-Sovereign Identity(مقاله علمی وزارت علوم)

کلید واژه ها: Blockchain Blockchain Revocation Blockchain applications Self-Sovereign Identity Decentralized Identifiers

حوزه های تخصصی:
تعداد بازدید : ۱۶۵ تعداد دانلود : ۴۵
The blockchain's immutability has allowed previously centralized operations to operate in a new way. The possibility of applications having a new architecture is given thanks to the innovative properties of the technology, which brought alternative control designs for distributed systems and allowed applications to work without the need for a central controlling point. The expansion of blockchain to other areas beyond cryptocurrencies has shown the need for applications to implement solutions to deal with corrective operations. Blockchain 3.0 applications bring new solutions for business needs. However,  as opposed to immutability, the revoking functionality is much more complex to be implemented in this type of architecture, but paramount to applications resilience, allowing faulty or invalid information to be revoked, ensuring thus that the blockchain can still be trusted. This work assesses and discusses revocation mechanisms to contribute to the technical feasibility of several applications, which require corrective operations. We present a model in the academic area, which can be replicated for other types of systems in other areas.
۲۰۰.

The Legal Mechanisms for Information Security in the context of Digitalization(مقاله علمی وزارت علوم)

کلید واژه ها: Legal mechanisms Informational security Cybersecurity Digitization Institutional system for cybersecurity

حوزه های تخصصی:
تعداد بازدید : ۱۲۰ تعداد دانلود : ۴۶
As a result of the introduction of digital technologies in all spheres of society, various latest technologically conditioned risks and threats have become various. It requires the formation and implementation of a legal mechanism for further development and operation of the system ensuring information security, taking into account the effects of digitalization and transformation of society. The purpose of this study is development of scientifically substantiated proposals and recommendations for implementation legal mechanisms for information security in the context of digitalization. The relevance of this study is due to the needlegal regulation of relations in the information sphere, formation of a system of protection and counteraction to cybercrime. To achieve the goal of the study, methodological principles and approaches of legal science were used. The results of the analysis showed that the most significant mutual influence is demonstrated by a group of indicators of the state's institutional capacity and a group of indicators of the digital capacity of the national economy and cybersecurity. This study substantiates the main directions of accelerating the optimization of the institutional system of cybersecurity in Ukraine, which provides for two key areas: legal and organizational. The legal mechanisms include further improvement and harmonization of the regulatory framework, the formation of relevant legal norms, state policy in the field of information security. The organizational measures are aimed at improving the efficiency of responsible institutional structures - the subjects of cybersecurity - by increasing their capabilities, eliminating duplication in the exercise of their powers, taking into account the best practices of international and European experience. The core of the integrated information security system is the National Cyber Security Coordination Center.

پالایش نتایج جستجو

تعداد نتایج در یک صفحه:

درجه علمی

مجله

سال

زبان