Determinants of a Successful Migration to Cloud Computing in Iranian Telecommunication Industry |
Author : Azadeh Erfan |
Abstract | Full Text |
Abstract :The concept of this paper has provided comprehensive frameworks for a successful migration to cloud computing (SMCC) in telecommunication industry in Iran. Using an academic orientation this study attempts to reveal the constructive effects and deconstructive defects of migration to cloud computing with a close regard into prior literature and practical practices all around the world. Conceptual frameworks are deducted from the literature and Telco’s revolutionary movements toward CC. The confirmatory quantitative approach tries to verify or reject the validity of determinants of successful migration. Considering these approved factors before any migration decision would be valuable for engaged project members and finally for Telecommunication organizations. This paper can be used as reliable model for any migration beforehand taking any action. Enforcing proper determinants in accordance with the prior success stories and academia viewpoints in Telecommunication industry in Iran as a first mover research in this field provides a precious insight for policy and decision makers to change their mindset and grant a proper space for cloud computing to grow in this industry due to its advantages. Obviously, like any other big Telco in the world, Iranian Telco might start cloud projects to sustain its presence in the global market. |
|
Proposing an Effective Approach Based on Input-Output, Pre-condition and Requested Service Parameters, for Detecting Semantic Web Services |
Author : Mohammad Rostami, Iman Attarzadeh, Hossein Beigi Harchegani |
Abstract | Full Text |
Abstract :Web service is a comprehensive and autonomous application which can be defined, published, called and established in the network, especially in web. A source can be a software parameter or a machine process. The service is a basic concept in the new generation of internet, that‟s why it is called internet services in some contexts. The verity of this phenomenon is cloud computing in which, software and super structure is offered in service format. Service technology is one of the modern approaches of internet services in e - commerce that is paid attention by many researchers. After appearing service-oriented architecture, web services gained popularity. Due to existence of web services, finding a web service according to users‟ demands is a huge challenge. This needs to establish an efficient and reliable process of discovering a web service. Nowadays many researchers design techniques, in order to enhance the accuracy of Web service discovery which will be implemented best services. The results of process for discovering service, is for services to extend the satisfactory of user. Considering of semantic relations among the used words in describing the service, input and output parameters can be detected accurately. In addition to input and output parameters, other parameters services are described, which by using them, it can, enhance the accuracy of web service discovery. These parameters are known effect and post modality. The Proposed method is used for comparing the other methods such as Traditional information retrieval method and it is used for matching input and output. For configuration this approach we used Macro-Average, SWRL and OWL-S software and tools. |
|
Evaluation of Cancer Classification Using Combined Algorithms with Support Vector Machines |
Author : Mahnaz Rafie, Ali Broumandnia |
Abstract | Full Text |
Abstract :Support vector machine (SVM) is a supervised learning method, which has considerable applications. It shows excellent performance in many pattern recognition applications. Also, combining SVMs with other theories has been proposed as a new direction to improve classification performance. Thus, in this paper some important aspects to reach the best performance in combined algorithms with SVM for cancer classification are explained. Since delay and accuracy are the important parameters to improve the performance in SVMs, some of the methods with these parameters are compared to use the best algorithms in the future works. Finally some directions for researches are provided. |
|
Dynamic Group Digital Signature Based on Fractal Sets According to Text Content |
Author : HamidReza Biabani, Narges Biabani, MohammadAli Jebreil Jamali, Shahin Akbarpour, Hassan Biabani |
Abstract | Full Text |
Abstract :Group digital signature lets each member of a group sign a message on behalf of the entire group, in a way that the identity of signers is not revealed. In this paper, a new method for group digital signature based on Mandelbrot and Julia fractal sets according to Text Content is presented. In this method, the concept of documents text content is used in order to categorize the members whose identity is confirmed for each text. This scheme may be used for signing sensitive documents. Texts and documents can be categorized into classified, secret, and top-secret according to their sensitivity. The group manager selects qualified authorized people to sign documents according to text type. In this method, group members are placed on the leaves of a binary tree structure and sign texts while interacting with each other. The presented method resists coalition attacks and enjoys larger key space compared to RSA and DSA algorithms. The public key size in the presented method is independent of the number of group members. Moreover, group departure protocol is also incorporated in this method and the method is thus completely dynamic. The members’ position in the tree structure is vague in this scheme. This helps to increase security. The fractal dynamic group digital signature presented can be an appropriate substitute for current group digital signature schemes. |
|
Concept of Resistant to Electromagnetic Disturbances Prototype of Measuring Points System Located in Production Cells Based on RFID Selective Gate Technology |
Author : M. Łobaziewicz*, A. Maćkowiak , K. Sieczkarek |
Abstract | Full Text |
Abstract :The aim of paper is to present the concept of prototype called ‘Resistant to electromagnetic disturbances integrated system of measurement points located in production cells using RFID selective gate. |
|
Tiling a Rectangular Area Using a Set of Unique Squares |
Author : Jalal Khairabadi, Bahram Sadeghi Bigham, Rebvar Hosseini, Zohreh Mohammad Alizadeh |
Abstract | Full Text |
Abstract :A set of natural numbers tiles the plane if a square-tiling of the plane exists using exactly one square of side length n for every n in the set. From [2] we know that N itself tiles the plane. From that and [3] we know that the set of even numbers tiles the plane while the set of odd numbers does not. According to [1] it is possible to tile the plane using only an odd square. In this paper we will check that if it is possible to tile the plane using an even set and n odd numbers or not. |
|
Comparing and Applying the Approach of Supply Chain in Electronic Services Management |
Author : Hoda Ghavamipoor, S.Alireza Hashemi Golpayegani |
Abstract | Full Text |
Abstract :With developing the use of digital systems, presentation of a large number of public services electronically is so prevailed. For supplying and producing electronic services in virtual space, various components and entities have relation to each other and compose a chain of components. Therefore, the approach of supply chain can also be used for supplying and producing electronic services. The main purpose of this paper includes applying the concept of supply chain in providing and managing electronic services. Furthermore, we propose the framework and structure of decision-making issues in electronic service supply chains (ESSC) based on comparing with decision-making issues in industrial supply chains (non-electronic services and goods) as well as classifying the approaches and solution methods of recognized issues in the area of electronic services supply chain. |
|