ترتیب بر اساس: جدیدترینپربازدیدترین
فیلترهای جستجو: فیلتری انتخاب نشده است.
نمایش ۳۰۱ تا ۳۲۰ مورد از کل ۲٬۹۱۰ مورد.
۳۰۱.

How to Evaluate and Improve E-Commerce Implementation and Administration Success State? a New Approach for Managing Success-Relevant Activities(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Electronic commerce (EC) Fuzzy Cognitive Map (FCM) Analytical hierarchy process (AHP) Evaluation Model Improvement plan

حوزه‌های تخصصی:
تعداد بازدید : ۷۳۱ تعداد دانلود : ۲۰۳
Achieving e-commerce success is influenced by a variety of interrelated activities. Identifying, analyzing and prioritizing these activities enable decision-makers firstly to evaluate the current success state of Electronic Commerce (EC) businesses more accurately and then to develop an efficient improvement plan to allocate limited resources to achieve a higher level of success. In this research, a Fuzzy Cognitive Maps- analytical hierarchy process (FCM-AHP) approach is used to address this issue by (1) determining interrelationships between influential activities, (2) determining how much these activities influence each other and the overall success, and (3) prioritizing activities to develop a sound improvement plan. In this approach, the FCM technique is used to indicate all possible causal interrelationships between activities and consider all feedback loops between them. Then, the AHP technique is used to determine the contribution weights of activities to the overall success. The obtained management matrices that make it possible to categorize influential activities and the results of improvement scenarios help the decision-makers to develop the most efficient improvement plan and gain the maximum benefit from the allocation of limited resources. An empirical study is implemented to serve as an example to indicate how the approach works.
۳۰۲.

IOT Future Security Challenges and Recent Solutions(مقاله علمی وزارت علوم)

نویسنده:

کلیدواژه‌ها: Internet of Things Key Technologies Security Issues

حوزه‌های تخصصی:
تعداد بازدید : ۴۴۳ تعداد دانلود : ۱۶۴
Internet of Things could be current paradigm, with promising recent wireless communication. Simultaneously as its will likely deliver compelling and effective arrangement, security of the gadgets and organization could be challenge issue. Therefore security has arisen as quite difficult for the IoT during this paper is expect to create security challenges of the IoT, structural design of IoT through handling security troubles at every layer of the design, key advancements in IoT and use of IoT.
۳۰۳.

مدل بندی ساختاری عوامل مؤثر بر تسهیم دانش بین اعضای هیات علمی(مقاله علمی وزارت علوم)

کلیدواژه‌ها: جو سازمانی تسهیم دانش آموزش عالی مدیریت رفتاری

حوزه‌های تخصصی:
تعداد بازدید : ۳۰۴ تعداد دانلود : ۲۴۱
تسهیم دانش در بین اعضای هیئت علمی دانشگاه ها و مراکز آموزش عالی دارای اهمیت فراوانی است؛ زیرا آنان را در فرآیندی رقابتی به منظور خلق و تولید دانش و در نهایت اشتراک گذاری آن فعال می کند. پژوهش حاضر با هدف بررسی نقش و میزان تأثیر عوامل مختلف در تسهیم دانش بین اعضای هیئت علمی دانشگاه ها و مبتنی بر نظریه رفتار برنامه ریزی شده انجام شده است. رویکرد تحقیق کمّی و روش آن توصیفی از نوع علّی و از نظر زمانی مقطعی بوده است. جامعه آماری این تحقیق شامل تمامی اعضای هیئت علمی دانشگاه غیردولتی علم و فرهنگ به تعداد 103 نفر بوده است که حجم نمونه لازم از بین آنان بر اساس فرمول کوکران برابر 81 نفر تعیین شده است. روش نمونه گیری طبقه بندی متناسب با حجم و بر مبنای انتخاب دانشکده های دانشگاه به عنوان طبقه صورت گرفته است. به منظور گردآوری داده ها از پرسشنامه های تسهیم دانش، جو سازمانی، قصد، نگرش و هنجار ذهنی بوک و همکاران (2005)، پرسشنامه کنترل رفتار درک شده السوئیدی (2014)، پرسش نامه اعتماد کیم و جو (2008) و پرسش نامه رهبری ریج (2005) استفاده شده است. از روش مدل بندی معادلات ساختاری به شیوه کمترین مربعات جزئی به منظور تحلیل داده ها استفاده شده است. یافته های پژوهش نشان داده است از دیدگاه اعضای هیئت علمی، رابطه معنی دار بین جو سازمانی و تسهیم دانش و هم چنین رابطه معنادار بین قصد، نگرش و هنجار ذهنی با تسهیم دانش، تأیید شده است.
۳۰۴.

Introduction of Information Technologies as the Newest Concept of Optimization of Civil Proceedings(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Information technology Optimization of Civil Proceedings Code of Civil Procedure Electronic Litigation

حوزه‌های تخصصی:
تعداد بازدید : ۲۸۱ تعداد دانلود : ۱۵۷
The introduction of information technology in the structure of procedural legal relations contributes to the full implementation of the principles of procedural law and optimization of civil proceedings. The purpose of this study is to develop scientifically sound proposals and recommendations for the latest concept of optimization of civil justice by means of information technology. The study of the impact of information technology in civil proceedings was conducted on the basis of integrated use of general and special methods of scientific knowledge. The optimization of civil proceedings as a system of theoretical ideas and views on civil procedural activity from the standpoint of means, methods and techniques of its improvement is considered. The basic elements of the latest concept are the provisions of the general methodological basis for studying the problem of optimization, the concept and structural characteristics of optimization, civil jurisdiction in terms of optimization and ensuring the right to due process, optimization of procedures for preparation and trial of civil cases, cassation in the system of instance review of court decisions. It has proved that the search for a harmonious combination of protective and conciliatory functions of civil proceedings, as a characteristic concept of modern procedural systems, determines the main directions of optimizing the preparation of civil cases for trial. It has established that in the reform of the judiciary of Ukraine it is important not only to digitize existing processes. The most important thing is to change the approach to justice itself, making it simpler and more accessible to all with the help of information technology. In this sense, the introduction of affordable online court involves not only the introduction of innovative technologies, but also the revision and significant simplification of procedural rules.
۳۰۵.

شناسایی محرک های نوآوری مدل کسب و کار د عصر فناوری های نوین(مقاله علمی وزارت علوم)

کلیدواژه‌ها: نوآوری مدل کسب و کار فراترکیب تحلیل مضمون محرک های نوآوری

حوزه‌های تخصصی:
تعداد بازدید : ۵۶۵ تعداد دانلود : ۳۱۳
نوآوری مدل کسب و کار (BMI)، یک فرآیند نوآوری است که با هدف ایجاد و حفظ مزیت های رقابتی، تغییراتی اساسی (طراحی شده، بدیع و غیر پیش پا افتاده) در پیکربندی مدل کسب و کار فعلی شرکت ایجاد می کند. از موضوعات مهمی که در خصوص این مفهوم مورد توجه است، محرک هایی است که موجب شکل گیری این سطح از نوآوری در کسب و کارها می گردد. لیکن با وجود علاقمندی بسیاری از پژوهشگران به مفهوم BMI در سال های اخیر، مقالات اندکی به مطالعه مستقیم و جامع پیشران های آن پرداخته اند و بیشتر در مطالعات موردی به آن توجه شده است. به همین جهت در این مطالعه تلاش شده تا با روش فراترکیب، عوامل پیشران گزارش شده در مطالعات موردی پراکنده، ادغام شده و ضمن تلفیق آن ها با روش تحلیل مضمون، لیست تجمیع شده ای از محرک های نوآوری مدل کسب و کار ارائه گردد. بدین منظور پس از جستجوی مقالات مرتبط در پایگاه اسکوپوس و پالایش عناوین و چکیده مقالات یافت شده، 140 مطالعه موردی گزارش شده در مقالات منتخب مورد تجزیه و تحلیل قرار گرفت. استخراج مصادیق محرک ها، کدگذاری، جستجوی مضامین و نامگذاری آن ها طی مراحل بازگشتی روش تحلیل مضمون، منجر به شناسایی 10 مضمون اصلی مشتمل بر 30 مضمون فرعی شد. در این مقاله گزارش پژوهش انجام شده به همراه تعریف محقق از تمامی 10 محرک اصلی و 30 محرک زیرمجموعه ارائه شده است.
۳۰۶.

Graph-Based Extractive Text Summarization Models: A Systematic Review(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Natural Languages Processing text mining Graph approaches

حوزه‌های تخصصی:
تعداد بازدید : ۳۷۷ تعداد دانلود : ۱۸۹
The volume of digital text data is continuously increasing both online and offline storage, which makes it difficult to read across documents on a particular topic and find the desired information within a possible available time. This necessitates the use of technique such as automatic text summarization. Many approaches and algorithms have been proposed for automatic text summarization including; supervised machine learning, clustering, graph-based and lexical chain, among others. This paper presents a novel systematic review of various graph-based automatic text summarization models.
۳۰۷.

تحلیل مفهوم شناختی «رجعت» از نگاه لغت و اصطلاح

کلیدواژه‌ها: رجعت رجعت کنندگان مهدویت متکلمان شیعه

حوزه‌های تخصصی:
تعداد بازدید : ۴۴۶ تعداد دانلود : ۲۳۵
شناخت معانی واژگان و اصطلاحات اعتقادی و تبیین میدان معنایی آنها از دیرباز توجه دانشمندان شیعه را به خود جلب کرده است. در میان این واژگان، واژه «رجعت» و مشتقات آن، در مکتب اهل بیت: بسامد نسبتاً بالایی دارد. این واژه که به یکی از اعتقادات ویژه و ضروری شیعه اشاره می کند، در مقاله حاضر از نگاه لغت و اصطلاح، مفهوم شناسی می شود. بنابراین نخست معنای لغوی رجعت با بهره از کتاب های لغت و سپس معنای اصطلاحی آن از نگاه بزرگان و علمای شیعه تحلیل می گردد. برآیند پژوهش که به روش توصیفی، تحلیلی انتقادی صورت گرفته، نشان می دهد آنچه عموم بزرگان و متکلمان شیعه از رجعت بیان می کنند، با بهره از برخی سخنان معصومان: است و به نظر می رسد ایشان در مقام تعریف اصطلاحی رجعت نبوده اند تا معنایی جامع ارائه کنند. از این رو دیدگاه بیشتر آنها بر بخشی از مفهوم رجعت تمرکز دارد و کمتر تعریف فراگیری ارائه شده است. این مقاله در پایان با در نظرداشت مجموع روایات رجعت، به بیان تعریفی جامع می پردازد.
۳۰۸.

Balancing Interests in the Field of Tourism Based on Digital Marketing Tools(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Balancing interests in tourism Digital – marketing Portfolio investmen KPI Tourism

حوزه‌های تخصصی:
تعداد بازدید : ۴۳۰ تعداد دانلود : ۲۳۵
Digital technologies are actively implemented in all areas of tourism. The article identifies the main areas of balancing interests in the field of tourism on the basis of optimization of digital marketing tools. Analytical research has shown that a set of sales channels in the Internet environment and a set of tools are formed, depending on the marketing strategy of the travel company. The main tactics and tools of digital marketing in tourism are highlighted. These are: the company's website, digital marketing channels - online channels for promoting and attracting customers: SEO, online advertising, email marketing, sales funnel, content marketing, teaser advertising, SMM, etc. The study proposes the application of portfolio investment theory to optimize investment in digital marketing tools to achieve a specific goal. The article uses a method of building a mathematical model that will optimally distribute financial investments in digital marketing. Thus balancing of interests in the field of tourism on the basis of digital marketing tools is offered on the basis of KPI indicators, according to the allocated purposes.
۳۰۹.

The Effects of Social Networking Sites Use on Students’ Academic Performance at the University of Taiz(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Social networking sites Academic Performance University of Taiz

حوزه‌های تخصصی:
تعداد بازدید : ۳۸۶ تعداد دانلود : ۲۲۴
In the academic context, social networking sites (SNSs) have reshaped the way university students connect and communicate with each other, and the way they learn, thus influencing their identities and dimensions. This paper aims to investigate the impacts of SNSs use by students on their academic performance at the University of Taiz. A survey questionnaire was conducted to a total sample of 357 undergraduate students via personal administration and by an online platform to gather the initial information on their use of SNSs and the influence on their academic performance. The hypotheses of this study were studied and tested using descriptive statistics, regression model, T-test, and analysis of variance (ANOVA). The findings of H1 indicate that the impact of the use of SNSs on students’ academic performance was statistically significant Interaction with the teacher (II) Collaboration with coworkers (CC) Engagement (EN) and learning a cooperating (LC). Meanwhile, the results of H2 indicate no significant differences between the mean averages of the respondents’ answers for (purposes, the impact of the use of SNSs, and academic performance) due to gender, and age, respectively. Thus, using SNS as a learning tool has a great potential to improve students’ academic performance because it allows students to be more connected. Overall findings of this study indicate that the use of SNSs impact undergraduate students by factors are studied on academic Performance to some extent and suggested future strategies to enhance students’ awareness to manage their time, multitasking skills, and study activities to enhance their academic performance and achievements.
۳۱۰.

Designing a Mobile Application for Children: Space Science(مقاله علمی وزارت علوم)

کلیدواژه‌ها: STEM education Earth and Space Science mobile application educational game

حوزه‌های تخصصی:
تعداد بازدید : ۳۴۲ تعداد دانلود : ۱۷۹
The incorporation of STEM education into the curriculum has been an aspiring objective for many nations around the world. Most students choose not to pursue STEM-discipline studies because they are losing interest slowly. Moreover, the level of engagement required for STEM education is limited due to inadequate interactive teaching and tools that facilitate effective learning in a classroom setting. The objective of this project is to assess how educational game applications can help incline students’ interest in science, develop an educational game application, and conduct user experience testing. A mobile application on Earth and Space Science has been developed for 10 – 11-year-old school students. The project is based on the Rapid Application Development methodology considering the short development timeframe.  The application was created using the Ionic Framework, Angular 5, C#.NET and SQLExpress. The findings indicated that this experiment motivates students to be more inclined to science.
۳۱۱.

Solar Powered Automated Hydroponic Farming System with IoT Feedback(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Hydroponic Farming IoT Remote Monitoring Wi-Fi

حوزه‌های تخصصی:
تعداد بازدید : ۳۷۸ تعداد دانلود : ۱۹۳
This paper presents implementation of cost-effective solar powered hydroponic system with Internet of Things (IoT) for online and remote checking and controlling the system operation. The objective was to take advantage of the abundant solar energy while incorporating IoT platform into the system. The system is made up of power supply unit, control unit, Wi-Fi unit, input unit and output unit. The system monitored temperature, humidity and volume of the nutrient solution and at the same time sent online messages to the farmer. The test carried out showed that the system is working and the readings obtained online showed a ± 1% variation from the physical measurement done remotely with meters. This implies that the online control of the system operation was effective
۳۱۲.

Improving the State system of strategic planning of national security in the context of informatization of society(مقاله علمی وزارت علوم)

کلیدواژه‌ها: National security State system Strategic Planning National Security Strategy Threats to the public administration system Informatization of society

حوزه‌های تخصصی:
تعداد بازدید : ۵۳۷ تعداد دانلود : ۲۰۱
The inefficiency of the national security system is one of the biggest threats to Ukraine's national security. The strategic planning in the field of security and defense has designed to identify the means, including the future structure of forces, that would allow the institutions of the defense and security sector to effectively deal with potential future threats. The purpose of this study is development of theoretical and practical measures to increase the effectiveness of strategic management of national security processes on the basis of goal setting, forecasting and planning in the context of informatization of society. The relevance of this study is due to the needlegal regulation and improvement of the state system of strategic planning of national security of Ukraine. To achieve the goal of the study was used special scientific methods of legal knowledge. The results of the analysis showedwhat in the basis ensuring national security must rely on the principle of systematization, which means that the security and defense sector of Ukraine is considered as a single object of forecasting and planning. This study substantiates the main directions systemic reform of the security and defense sector, which has carried out in Ukraine to ensure the protection of the constitutional order, sovereignty, territorial integrity of the state in the face of armed aggression. The priorities should be implemented through key tasks, such as the establishment of a comprehensive strategic analysis of military threats to Ukraine's national security, coordination of intelligence activities, development of joint intelligence capabilities of the defense forces in order to obtain complete and reliable warning information for timely decision-making guaranteeing the military security of the state.
۳۱۳.

Detection of Wormhole Attack in Vehicular Ad-hoc Network over Real Map using Machine Learning Approach with Preventive Scheme(مقاله علمی وزارت علوم)

کلیدواژه‌ها: VANET AODV Broadcast Unicast k-NN Random Forest SUMO-0.32.0 NS-3.24.1 Packet leash Cryptography

حوزه‌های تخصصی:
تعداد بازدید : ۵۴۷ تعداد دانلود : ۲۱۲
VANET (Vehicular Ad-hoc Network) is a developing technology, which is a combination of cellular technology, ad-hoc network & wireless LAN to improve the safety of vehicle as well as driver. VANET communication can be of two types, first one is broadcast and second one is unicast. Either communication may be broadcast or unicast both are sensitive to different types ofassaults, for example message forgery, (DOS) denial of service, Sybil assault, Greyhole, Blackhole & Wormhole assault. In this paper machine learning method is used to detect the wormhole assault in VANET’s multi-hop communication. We have created a scenario of VANET by using AODV routing protocol on NS-3.24.1 simulator, which utilizes the overall mobility traces generated by the simulator SUMO-0.32.0 to model the wormhole assault. The simulation is performed by using NS-3.24.1 simulator, and the statistics created by flow monitor are collected. The collected data is pre-processed and the k-NN & Random Forest algorithms are applied on this data, to make the model such type so that it can memorize the wormhole attack. The novelty of this research work is that with the help of proposed detection & prevention technique, vehicular ad-hoc network can be made free from wormhole assault by using ML approach. The performance of proposed machine learning models is compared with existing work. In this way it is clear that our proposed approach by using ML is powerful tool by which the wormhole assaults can be detected in VANETs. A scheme based on packet lease and cryptographic techniques is used to prevent the wormhole attack in VANET
۳۱۴.

بررسی نقش جوّ مسموم سازمان در تسهیم دانش با میانجی گری حمایت سازمانی ادراک شده در مؤسسات آموزشی(مقاله علمی وزارت علوم)

کلیدواژه‌ها: جو مسموم سازمان تسهیم دانش حمایت سازمانی ادراک شده مؤسسات آموزشی

حوزه‌های تخصصی:
تعداد بازدید : ۴۷۳ تعداد دانلود : ۲۸۸
هدف این پژوهش شناسایی تأثیر جو مسموم سازمانی و حمایت سازمانی ادراک شده بر تسهیم دانش است. از نظر هدف، یک تحقیق کاربردی و از منظر روش گردآوری داده ها توصیفی- همبستگی است. جامعه آماری این مطالعه ۱۶۴۸ نفر از کارکنان مؤسسات آموزشی شهرستان سراب است. با توجه به جدول کرجسی و مورگان حجم نمونه ۳۱۳ نفر تعیین و با روش نمونه گیری طبقه ای انتخاب شد که بعد از حذف داده های پرت، تعداد نمونه به ۲۴۸ نفر رسید. داده ها با استفاده از پرسشنامه های استاندارد جو مسموم سازمانی روستایی، تسهیم دانش دیکسون و پرسشنامه استاندارد حمایت سازمانی ادراک شده گردآوری شد که بر مبنای مدل آلن و همکاران طراحی و اعتباریابی شده بود. تجزیه وتحلیل داده ها با بهره گرفتن از آزمون همبستگی پیرسون و مدل سازی معادلات ساختاری انجام گرفت. نتایج گویای برازش مدل مفهومی و تأیید تمامی فرضیه ها است؛ به نحوی که همه اثرات مستقیم در مدل ارائه شده و همچنین اثر غیرمستقیم جو مسموم سازمانی بر تسهیم دانش از طریق میانجی گری حمایت سازمانی ادراک شده مورد تأیید قرار گرفت. نتایج پژوهش بیان می دارد که حمایت سازمانی ادراک شده می تواند اثر منفی جو مسموم سازمانی را بر تسهیم دانش کارکنان مؤسسات آموزشی کاهش دهد؛ بنابراین لازم است جو مؤسسات آموزشی فاقد مسمویت باشد تا نیت سازمان در ارائه حمایت ها بر کارکنان آشکار شود و بدین ترتیب آن ها تسهیم دانش را مغایر با منافع خود تلقی نکنند.
۳۱۵.

Factors Effecting the Adoption of E-Learning: An Empirical Study of Libyan Universities(مقاله علمی وزارت علوم)

کلیدواژه‌ها: E-Learning UTAUT2 Trust Structural Equation Modeling Libya

حوزه‌های تخصصی:
تعداد بازدید : ۲۸۶ تعداد دانلود : ۲۲۶
The main aim of this thesis is to investigate the factors that could affect the students to adopt e-learning system in Libyan universities. This study is quantitative approach, a questionnaire was adopted from previous studies and distributed among the students to collect the data. The sample of the study consists 365 students from Libya. AMOS software was used to analysis the data. The results indicated that Performance Expectancy, Efforts Expectancy, Facilitating Conditions, Habit and Trust have significant impact on behavioural intention. Moreover, the relationship between Behavioural intention and use behaviour is also significantly positive. However, the relationship of social influence and behavioural intention was not found significant. Finally, the moderation effect was significant and supported between social influence, trust, and Habit with behavioural intention.
۳۱۶.

The Legal Mechanisms for Information Security in the context of Digitalization(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Legal mechanisms Informational security Cybersecurity Digitization Institutional system for cybersecurity

حوزه‌های تخصصی:
تعداد بازدید : ۴۰۵ تعداد دانلود : ۱۹۴
As a result of the introduction of digital technologies in all spheres of society, various latest technologically conditioned risks and threats have become various. It requires the formation and implementation of a legal mechanism for further development and operation of the system ensuring information security, taking into account the effects of digitalization and transformation of society. The purpose of this study is development of scientifically substantiated proposals and recommendations for implementation legal mechanisms for information security in the context of digitalization. The relevance of this study is due to the needlegal regulation of relations in the information sphere, formation of a system of protection and counteraction to cybercrime. To achieve the goal of the study, methodological principles and approaches of legal science were used. The results of the analysis showed that the most significant mutual influence is demonstrated by a group of indicators of the state's institutional capacity and a group of indicators of the digital capacity of the national economy and cybersecurity. This study substantiates the main directions of accelerating the optimization of the institutional system of cybersecurity in Ukraine, which provides for two key areas: legal and organizational. The legal mechanisms include further improvement and harmonization of the regulatory framework, the formation of relevant legal norms, state policy in the field of information security. The organizational measures are aimed at improving the efficiency of responsible institutional structures - the subjects of cybersecurity - by increasing their capabilities, eliminating duplication in the exercise of their powers, taking into account the best practices of international and European experience. The core of the integrated information security system is the National Cyber Security Coordination Center.
۳۱۷.

A secure and robust stereo image encryption algorithm based on DCT and Schur decomposition(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Stereo Image Encryption and Decryption Discrete Cosine Transform Generalize Logistic Map Schur Decomposition

حوزه‌های تخصصی:
تعداد بازدید : ۴۵۸ تعداد دانلود : ۱۷۰
Security solutions of stereo images are always a major concern during the transmission and communication. In this manuscript, a simple yet efficient framework for encrypting stereo images is formulated using discrete cosine transform (DCT), generalized logistic map, Schur decomposition and magic square method. The framework initiated with the integration of DCT and generalized logistic map to unify both pair of images. This unified image is then encrypted using the Schur decomposition and magic square method. The various experiments and analysis have been done to explore the validity, proficiency and performance of the purport framework.
۳۱۸.

Theoretical, Methodological, Communication and Information Technologies Approaches to Modeling and Forecasting Personnel Education in Covid-19 Conditions(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Educational programs Personnel planning training model COVID-2019

حوزه‌های تخصصی:
تعداد بازدید : ۴۹۶ تعداد دانلود : ۲۵۲
The article is devoted to solving the problems of predicting the education of Ukrainian staff in the current COVID-2019 conditions in order to improve the efficiency of their work. Theoretical approaches regarding the characteristics of modeling and prediction of education have been studied, systematic and summarized. Factors that significantly complement the theory and methodology of the scientific provisions of the economy have been identified, taking into account the peculiarities of their work in the modern economic environment, structural changes, and new changes. The pros and cons of studying modeling approaches have been identified. The main features of structural change have been studied and it has been established that the modeling and forecasting of staff education has significant features.
۳۱۹.

Interaction of the Home and the Economic Free Related(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Educational programs Personnel planning free related

حوزه‌های تخصصی:
تعداد بازدید : ۵۲۲ تعداد دانلود : ۲۲۲
The article is devoted to solving the problems of internal economic relations in Ukraine in modern conditions in order to increase the efficiency of their functioning. Studied, systematized and generalized theoretical approaches regarding the features of the interaction of internal and external economic relations, which significantly complement the theory and methodology of the scientific principles of the branch economy. In Ukraine, during the period of restoration of trade and economic relations with the CIS countries and active integration processes in the world economy, the volumes and structure of exports and imports undergo significant changes. In this regard, it is advisable to forecast the export and import in the near future. Conceptual provisions regarding the formation of a national strategy, a mechanism for managing the development of Ukraine’s integration processes on the principles of improving the current legislative and regulatory regulation in the country are proposed. In addition to the convenience for calculations, the hierarchical model also has other significant advantages. So, a high degree of independence of groups from each other makes it extremely flexible.
۳۲۰.

Energy Consumption Analysis of Iot-Manet Based Systems with Anova Assessment for Tackling Covid-19(مقاله علمی وزارت علوم)

کلیدواژه‌ها: COVID -19 AODV SAODV HWMP DDoS attacks Energy consumption ANOVA IoT-MANET e- Healthcare sector

حوزه‌های تخصصی:
تعداد بازدید : ۴۰۷ تعداد دانلود : ۲۰۰
The epidemic situation generated as a result of COVID -19 crossways the sphere observed the practices of various emerging technology like Internet of Thing (IoT) along with norm of dynamic fields. The wireless communication  based on networks such as wireless mesh networks (WMN) and Mobile Ad-hoc networks (MANETS) proven to be very successful for monitoring of patients remotely. The MANET protocols that are simulated in this study are  Ad-hoc On Demand Vector (AODV), Secure AODV (SAODV) and Hybrid Wireless Mesh Protocol (HWMP). In this investigation work, most appropriate routing protocols to knob DDoS attacks are simulated using NS-2 and assessed in terms of average energy consumption in the state of changing speed connections among devices called mesh nodes. Further ANOVA test is utilized for further accessing for the best suited routing protocol for handling the data packets, which is HWMP , considerable less susceptible for DDoS assaults dominant in healthcare field.

پالایش نتایج جستجو

تعداد نتایج در یک صفحه:

درجه علمی

مجله

سال

زبان