Research Paper
Mohamammad Ali KhatamiFirouzabadi; MohammadTaghi TaghaviFard; Khalil Sajjadi; Jahanyar Bamdad Soufi
Abstract
Knowing customer behavior patterns, clustering and providing proper services to the customers is one of the most important issues for the banks.In this research, 5 criteria of each customer, including Recency, Frequency, Monetary, Loan and Deferred, were extracted from a bank database during a fiscal ...
Read More
Knowing customer behavior patterns, clustering and providing proper services to the customers is one of the most important issues for the banks.In this research, 5 criteria of each customer, including Recency, Frequency, Monetary, Loan and Deferred, were extracted from a bank database during a fiscal year, and then customers were clustered using K-Means algorithm. Then, a multi-objective model of bank service allocation was designed for each of the clusters. The purpose of the designed model was to increase customer satisfaction, reduce costs, and reduce the risk of allocating services. Given the fact that the problem does not have an optimal solution, and each client feature has a probability distribution function, simulation was used to solve the models. To determine the optimal solution, Simulated Annealing algorithm was used to create neighboring solutions and consequently a simulation model was implemented. The results showed a significant improvement in the current situation. In this research, we used Weka and R-Studio software for data mining and Arena for simulation and optimization
Research Paper
Hamidreza Yazdani; Niloofar Jalali; Bahram i Moazeni
Abstract
Most of organizations are working in an environment in which, their business is exposed to inevitable changes. So, these organizations need to adapt their business processes according to the changes constantly, to maintain their competitive advantages. The risky nature of business process management ...
Read More
Most of organizations are working in an environment in which, their business is exposed to inevitable changes. So, these organizations need to adapt their business processes according to the changes constantly, to maintain their competitive advantages. The risky nature of business process management requires a careful examination of key factors and failure causes. Therefore, the main goal of the current research is to provide a change management model for implementing business process management. To reach to the goal, the combination of Dematel and Fuzzy ANP methods are used. The method used in this research is applied-developmental in terms of purpose and descriptive in terms of analysis. Also, based on the type of data, it can be considered as a survey. In the first step, through comprehensive literature review the effective management factors affecting the implementation of business process management were identified and extracted. In the next step, Fuzzy Delphi technique was used to screen the identified variables. Subsequently, with a survey of experts in the field of change management, key factors were grouped into 7 main factors. In the next step, the internal relations between the main factors were calculated using Dematel method. Then, Dematel and Fuzzy ANP were combined to calculate the weights and rank the factors. Identifying the causal factors and prioritizing the effective change management factors in implementing business process management in organizations is one of the important results of the research
Research Paper
Venus Mohammadi; Mohsen Hosseinzadeh; Mehdi Hosseinzadeh Hosseinzadeh
Abstract
v Recommender systems utilization has proven sales enhancement in most e-commerce platforms. This system objected to provide more options, comfort and flexibility to user which could make him interested, as well as providing better chance for companies to increase sells in their products and services. ...
Read More
v Recommender systems utilization has proven sales enhancement in most e-commerce platforms. This system objected to provide more options, comfort and flexibility to user which could make him interested, as well as providing better chance for companies to increase sells in their products and services. Flourishing popularity of web site has originated intrigue for recommendation systems. By penetrating in infinite fields, recommendation systems give deceptive suggestion on services compatible with user precedence. Integrating recommender systems by data management techniques to can targeted such issues and quality of suggestions will be improved considerably. Recent research reveals an idea of utilizing social network data to refine weakness points of traditional recommender system and improve prediction accuracy and efficiency. In this paper we represent views of recommender systems based on Twitter social network data by usage of variety interfaces, content analysis Methods, computational linguistics techniques and MALLET topic modeling algorithm. By deep exploration of objects, methodologies and available data sources, this paper will helps interested people to develop travel recommendation systems and facilitates future research by achieved direction.
Research Paper
Seyyed Jalaladdin Hosseini Dehshiri; Mojtaba Aghaei; Mohammad’Taghi Taghavifard
Abstract
Recommender systems utilization has proven sales enhancement in most e-commerce platforms. This system objected to provide more options, comfort and flexibility to user which could make him interested, as well as providing better chance for companies to increase sells in their products and services. ...
Read More
Recommender systems utilization has proven sales enhancement in most e-commerce platforms. This system objected to provide more options, comfort and flexibility to user which could make him interested, as well as providing better chance for companies to increase sells in their products and services. Flourishing popularity of web site has originated intrigue for recommendation systems. By penetrating in infinite fields, recommendation systems give deceptive suggestion on services compatible with user precedence. Integrating recommender systems by data management techniques to can targeted such issues and quality of suggestions will be improved considerably. Recent research reveals an idea of utilizing social network data to refine weakness points of traditional recommender system and improve prediction accuracy and efficiency. In this paper we represent views of recommender systems based on Twitter social network data by usage of variety interfaces, content analysis Methods, computational linguistics techniques and MALLET topic modeling algorithm. By deep exploration of objects, methodologies and available data sources, this paper will helps interested people to develop travel recommendation systems and facilitates future research by achieved direction.
Research Paper
Mohammad Lagzian; parisa mousavi
Abstract
Information security is an extremely important aspect of information systems. A lot of research has been done in the field of technological security of information, but with the development of security needs, attention has been paid to the role of management in information security. Economic valuation ...
Read More
Information security is an extremely important aspect of information systems. A lot of research has been done in the field of technological security of information, but with the development of security needs, attention has been paid to the role of management in information security. Economic valuation of investment in the information security of organizations is one of the issues of management in this field. In this research, to examine the issue of evaluating investment in information security and finding suitable methods for it, a systematic review of the approaches in information security investment has been done. Other goals of this study are to study the evolution of approaches used in the years 2006 to 2017. In order to carry out this systematic review of all studies in the field of information security investment using the research keywords, extracted Springer, IEEE-Explore, Web of Science, Science Direct databases, ultimately 146 articles related to This topic have been investigated. The research findings identified eight main approaches (game theory, risk-based approach, decision support systems, Utility maximization, rate of return on investment, Net Present Value, expected utility theory, real options theory). According to the results of this research there has been more interested in using game theory in recent years.
Research Paper
Saeid Bakhtiari; Esmaeil Zareh
Abstract
P network architecture is fragile from security point of view, and Voice over IP (VoIP), which uses the standards of this network, is vulnerable to multiple attacks that reduce the quality and, in some cases, disconnect services and waste VoIP resources. In this regard, VoIP security is essential, and ...
Read More
P network architecture is fragile from security point of view, and Voice over IP (VoIP), which uses the standards of this network, is vulnerable to multiple attacks that reduce the quality and, in some cases, disconnect services and waste VoIP resources. In this regard, VoIP security is essential, and typically the implementation of security solutions in systems such as VoIP will slow down and reduce the quality of performance and increase the costs of upgrade and maintenances. Therefore, IT managers should consider high-security security solutions. To do this, by reviewing the research literature, VoIP comprehensive security matrix has been extracted from a comprehensive list of VoIP security challenges and coping strategies that make a significant contribution to the intelligence and risk management of organizations. The results obtained showed that the implementation of 3 strategies including "Separation of Voice and Data Traffic VLANs", "Signaling Authentication" and "Port Authentication" would have the most positive impact on Amin Police University VoIP security. The results are consistent with the recommendations and security countermeasures mentioned by previous research and security institutions, and only the proposed priorities are different. Therefore, in strategic IT planning, decision making, and supervision of IT managers, the three mentioned strategies should be considered as a priority for VoIP applicationIP network architecture is fragile from security point of view, and Voice over IP (VoIP), which uses the standards of this network, is vulnerable to multiple attacks that reduce the quality and, in some cases, disconnect services and waste VoIP resources. In this regard, VoIP security is essential, and typically the implementation of security solutions in systems such as VoIP will slow down and reduce the quality of performance and increase the costs of upgrade and maintenances. Therefore, IT managers should consider high-security security solutions. To do this, by reviewing the research literature, VoIP comprehensive security matrix has been extracted from a comprehensive list of VoIP security challenges and coping strategies that make a significant contribution to the intelligence and risk management of organizations. The results obtained showed that the implementation of 3 strategies including "Separation of Voice and Data Traffic VLANs", "Signaling Authentication" and "Port Authentication" would have the most positive impact on Amin Police University VoIP security. The results are consistent with the recommendations and security countermeasures mentioned by previous research and security institutions, and only the proposed priorities are different. Therefore, in strategic IT planning, decision making, and supervision of IT managers, the three mentioned strategies should be considered as a priority for VoIP application