A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Roozbahani, Fatemeh Soleimani
- Investigating the Barriers of Application of Cloud Computing in the Smart Schools of Iran
Authors
1 Farabi Institute of Higher Education, Karaj, IR
2 Department of Management and Economics, Science and Research Branch, Islamic Azad University, Tehran, IR
Source
International Journal of Advanced Networking and Applications, Vol 7, No 6 (2016), Pagination: 2904-2914Abstract
Computing model is based on the computer networks such as internet. Internet presents a new sample for consuming and delivering the computing services. The developed societies caused the administrators have a specific glance to this area for promoting the quality of educational system. cloud computing appeared as one of the suitable strategies of minimizing the costs and resources centralized management. This research wants to identify the barriers against the implementation of cloud computing in smart schools by extensive studying of "cloud computing". The present research is a descriptive-measurable research according to its purpose, application and the method of its implementation. We have used the method of questionnaire for gathering the data. A sample consisted of 70 questions gathered from a 85 persons society according to Morgan sampling table and then we used the single sample t- test for testing the hypothesizes and also we used the Freedman trial for grading the barriers. Results show that some barriers such as security, economical, management problems, infrastructural factors, cloud service conditions , literacy and awareness of employees of cloud computing affect the application of cloud computing in the smart schools. The results can be useful in utilization of innovative educational technologies.Keywords
Cloud Computing, Smart Schools, Security, Cloud Service.- Effects of Security and Privacy Concerns on Using of Cloud Services in Energy Industry, an Oil and Gas Company: A Case Study
Authors
1 Department of Information Technology Management, Islamic Azad University, Science and Research Branch of Tehran, IR
Source
International Journal of Advanced Networking and Applications, Vol 7, No 3 (2015), Pagination: 2779-2783Abstract
The topic of ''the cloud'' has attracted significant attention throughout the past few years. It allows resource sharing that includes software, platform and infrastructure by means of virtualization. Cloud Adoption in Oil&Gas companies have approached cloud with caution, but they are increasingly deploying cloud services. Energy companies have carefully weighed whether they should opt for a public cloud versus a private one, and which applications are fit for deployment via the cloud. For the most part, the industry has opted to use cloud for generic purposes. Generic business functions like payroll process and procurement are being run through the cloud, along with customer relationship management, likely through software-as-a-service offerings that have become wellknown. Security is as much of an issue in the cloud as it is anywhere else. Different people share different point of view on cloud computing. Some believe it is unsafe to use cloud. Cloud vendors go out of their way to ensure security. This paper aims to understand the effects of security and privacy concerns on educational use of cloud services. This proposed a research model based on Ajzen's (1991) Theory of Planned Behavior (TPB). Following the TPB, the research developed a model, which posits that staff attitudes predicted by security and privacy perceptions and behavioral intentions are predicted by attitudes towards using cloud services. The Model was assess the based on the data collected by means of survey questionnaires. Results supported the proposed model, validating the predictive power of the TPB.Keywords
Cloud Services, Privacy, Security, Energy Industry, Oil and Gas.- Role of E-Payment Tools and E-Banking in Customer Satisfaction Case Study: Pasargad Bank E-Payment Company
Authors
1 Islamic Azad University, Science and Research Branch of Tehran, IR
2 Farabi University, Karaj, IR
Source
International Journal of Advanced Networking and Applications, Vol 7, No 2 (2015), Pagination: 2640-2649Abstract
Background: banks, as the main components of any countries` economic backbone, perpetually try to satisfy the needs and expectations of their customers to increase customer satisfaction, since in today`s competitive world, gaining competitive advantage is a high priority for any organization. On the other hand, the emergence of information technology in the banking industry has provided speed, security, efficiency, and quality of services through electronic banking and electronic payment tools. Therefore, banks and credit firms are constantly trying to increase their quality of services to satisfy their customers and gain competitive advantage.
Objective: since customer satisfaction is a high priority as one of the goals of banks and credit firms, this study aims to investigate the role of e-payment tools and e-banking in customer satisfaction.
Methodology: this study is an applied research regarding goal and a correlation type descriptive-survey regarding methodology. The statistical population consists of 80 gold customers of Pasargad bank e-payment company and the sample size was determined 66.35 using Cochran`s equation. Moreover, a questionnaire s used to collect the information. This questionnaire was developed in two sections by the researcher. The validity of the questionnaire is confirmed by a group of experts, including professors and specialists of the field, and its trust is computed using Cronbach`s alpha (α=90%). Furthermore, SPSS software and Pearson`s correlation test were used to analyze the data. Results of the research indicate that there is a positive and significant relationship between e-payment tools and e-banking. Therefore, the results can help to identify effective factors of customer satisfaction and in turn providing competitive advantage for this and similar organizations.
Keywords
Electronic Payment, Electronic Banking, Customer Satisfaction, Speed, Security, Accountability.- Security Solutions against Computer Networks Threats
Authors
1 Islamic Azad University, Science and Research Branch of Tehran, IR
2 Farabi Institute of Higher Education, Karaj, IR
Source
International Journal of Advanced Networking and Applications, Vol 7, No 1 (2015), Pagination: 2576-2581Abstract
The spread of information networks in communities and organizations have led to a daily huge volume of information exchange between different networks which, of course, has resulted in new threats to the national organizations. It can be said that information security has become today one of the most challenging areas. In other words, defects and disadvantages of computer network security address irreparable damage for enterprises. Therefore, identification of security threats and ways of dealing with them is essential. But the question raised in this regard is that what are the strategies and policies to deal with security threats that must be taken to ensure the security of computer networks? In this context, the present study intends to do a review of the literature by using earlier researches and library approach, to provide security solutions in the face of threats to their computer networks. The results of this research can lead to more understanding of security threats and ways to deal with them and help to implement a secure information platform.Keywords
Computer Network, Security, Threats.- Evaluation of Factors Influencing Internet Banking Acceptance by Internet Users in Iran
Authors
1 Department of Management and Economics, The Science and Research Branch, Islamic Azad University, Tehran, IR
2 Department of Management Science, University of Tehran, Tehran, IR
Source
International Journal of Advanced Networking and Applications, Vol 6, No 6 (2015), Pagination: 2503-2519Abstract
Purpose - The purpose of the study was to identify the factors underlying the decision to adopt online banking in Iran.
Design/methodology/approach - The samples used in this empirical study includes 560 persons who were among Iranian Internet users and completed the interactive questionnaires. The statistical analysis which has been used in regard to the dichotomous decision of whether to adopt Internet Banking services was Logistic Regression.
Findings - The results show that one of the dominant relationships that have been observed in our study is the link between the decision to use Internet Banking and the experience of using Internet. Certain demographic variables like gender also proved to be robust predictors of the adoption status. This inquiry documents that perceived level of security of Internet transactions in Iran Internet users don't have impact on acceptance of Internet Banking. These findings can provide a valuable tool for the expansion of Internet Banking and remove impediments of Internet Banking acceptance.
Practical implications - The results presented in this paper can be of assistance to financial institutions that either operates in Iran or Islamic countries. Useful insights are also provided with regard to security and strategies fostering the acceptance of Internet Banking.
Originality/value - The analysis is based on a random sample of Internet users at Iran that rarely discussed in previous literature.
Keywords
Internet Banking, Internet Users, Iran, Developed Technology Acceptance Model 3.- Identifying an Appropriate Model for Information Systems Integration in the Oil and Gas Industry
Authors
1 Department of Information Technology Management, Islamic Azad University, Science & Research Branch of Tehran, IR
2 B. Sc in Petroleum Engineering, IR
3 Robotics and Industrial Complex Systems(RISC) Research Group, UNINOVA, PT
Source
International Journal of Advanced Networking and Applications, Vol 10, No 1 (2018), Pagination: 3687-3691Abstract
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.Keywords
Information Systems Integration, Process Optimizing, Coordination, SCADA, SOA, MES, Oil & Gas Industry.References
- A. Poorebrahimi and F. SoleimaniRoozbahani, "Effects of Security and Privacy Concerns on using of Cloud Services in Energy Industry, an Oil and Gas Company: A Case Study," Int. J. Advanced Networking and Applications , pp. 2779-2783, 2015.
- A. Poorebarahimi, F. Razavi and F. SoleimaniRoozbahani, "Presenting VALIT Frameworks and Comparing between Them and Other Enterprise Architecture Framework," Int. J. Advanced Networking and Applications , vol. 7, no. 4, pp. 2805-2809, 2016.
- F. SoleimaniRoozbahani, S. Nikghadam Hojjati and R. Azad, "The Role of E-Payment Tools and E-Banking in Customer Satisfaction Case Study: Pasargad Bank E-Payment Company," Int. J. Advanced Networking and Applications, vol. 7, no. 2, pp. 2640-2649, 2015.
- "Microsoft BizTalk Server," Aug 2012. [Online]. Available: http://www.microsoft.com/biztalk/en/us/default.aspx . [Accessed Aug 2012].
- M. Juric, SOA approach to integration, Birmingham: Birmingham: Packt Publishing Ltd., 2007.
- S. Kalpakjian and S. Schmid, Manufacturing engineering and technology (5th ed.), Prentice Hall, 2006.
- "Computer-integrated manufacturing," 07 Aug 2012. [Online]. Available: http://en.wikipedia.org/wiki/Computerintegrated_manufacturing. [Accessed 07 Aug 2012].
- "ISO. Industrial automation systems and integration – Open systems application integration framework – Part 1: Generic reference description," Aug 2012. [Online]. Available: http://workspaces.nema.org/public/iso_tc184_sc5/Shared%20Documents/SC%205%20Working%20Docu ments/N%20777%20-%20FINAL%20VOTING%20REPORT%20ON%20DIS%2015745-4/ISO-15745-4-_E_-V5.03.pdf. [Accessed Aug 2012].
- V. Veyber, A. Kudinov and N. Markov, "Model Driven Approach for Oil & Gas Information Systems and Applications Integration," IEEE, pp. 156-162, 2010.
- M. McClellan, "INTRODUCTION TO MANUFACTURING EXECUTION SYSTEMS," in MES CONFERENCE & EXPOSITION, Baltimore, Maryland, 2001.
- K. Stouffer, J. Falco and K. Kent, Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security, Gaithersburg: National Institute of Standards and Technology, September 2006.
- H. Bidgoly, The Internet Encyclopedia., John Wiley & Sons, 2003.
- J. Romero, N. Menon, R. D. Banker and M. Anderson, ERP: Drilling for Profit in the Oil and Gas Industry, Philadelphia : Temple University, 2008.
- V. Veyber, K. Anton and N. Markov, "Model-driven Platform for Oil and Gas Enterprise Data," International Journal of Computer Applications, pp. 14-20, 2012.
- N. Markov and A. Saraykin, "Forming of the oil and gas company common information space," Oil And Gas Journal Russia vol. 3, pp. 34-41, 2008.
- "About OPC- What is OPC," 07 Aug 2012. [Online]. Available: http://www.opcfoundation.org/Default.aspx/01_abou t/01_whatis.asp. [Accessed o7 Aug 2012].
- "PRODML Standards," 08 Aug 2012. [Online]. Available: http://www.energistics.org/production/prodmlstandards. [Accessed 08 Aug 2012].
- "Business Overview of PRODML," 08 Aug 2012. [Online]. Available: http://w3.energistics.org/schema/PRODML_Business_Overview.pdf. [Accessed 08 Aug 2012].
- C. Zhang, A. Orangi, A. Bakshi and W. Da Sie, "A service-oriented data composition architecture for integrated asset management," in SPE Intelligent Energy Conference and Exhibition (IECE), April 2006.
- C. Aguilar, J. Rios-Bolivar, A. Aguilar-Martin and J. Rivas-Ech, "Generalized Data Meta-Model for Production Companies Ontology Definition," International journal of system applications, engineering & development, issue 4, vol. 2, ., 2008.
- The Effect of Using COAP Protocol on Reducing Energy Consumption in Smart Houses (Case Study:Uromieh Culture House)
Authors
1 Department of Management Post Graduate Education, Farabi Institute of Higher Education, Karaj, IR
2 Department of Information Technology Management, Islamic Azad University, Science & Research Branch of Tehran, IR
Source
International Journal of Advanced Networking and Applications, Vol 10, No 3 (2018), Pagination: 3843-3852Abstract
Over the past few years, protocols, implementations, and optimal uses and the use of internet of things have grown dramatically. Among the communication protocols, the COAP is the most distinctive one. The protocol, has the ability of better and lighter performance in restricted resource networks and devices. There are a lot of implementations about COAP each has its own features and supplies. So, selecting the factors having effects on improvement of COAP protocol and also the implementation method suitable for the features of each of these supplies is important. So, optimal communication protocol which reduces traffic load is highly important and is now, of the main challenges in the IOT industry and smart houses which, in recent years, has attracted many researchers’ attention. This study provides some features and an analytical comparison of many variables influencing the optimal performance of COAP. The present study has been conducted to answer the main question of the study: does the use of COAP have any effects on reducing energy consumption in the smart houses? The study has been conducted in the Uromieh Culture House and while studying the effective factors or important variables in improving the COAP performance, has tested the accuracy or inaccuracy of the hypotheses such as the main hypothesis of the study that there is a meaningful and positive relationship between using the COAP protocol and reducing energy consumption in organizations. Finally, a new approach will be introduced in this research causing improvement in the COAP efficiency. Then, its performance will be analyzed regarding reducing in energy consumption, delay in sending data, reducing memory and CPU consumption, the amount of information transmitted in each communication, firmness in failure and technological innovation. The present study aims at identifying the effect of using the COAP protocol on reducing energy consumption in the smart houses, Uromieh Culture House and ranking the factors influencing the implementation of performance improvement based on the smart houses. The paradigm of the present study is interpretive. In terms of purpose, the present study is of applied kind, in terms of data collection is of pluralistic one, in terms of procedure is of field and library one, in terms of data analysis method is a descriptive study and finally, in terms of time is a cross-sectional one. The statistical sample of the present study’s statistical society includes 49 people of the staff of the Uromieh Culture House who participate in the study as experts and professionals in IOT and new and emerging technologies of the smart houses fields. The results of data analysis show that the most effective factor in implementing the COAP protocol successfully on reducing energy consumption in the smart houses is to reduce energy consumption and the innovative technology factor has the least effect on successful implementation of the protocol.Keywords
Smart House, Reducing Energy Consumption, Routing Protocols in the IOT Networks, Constarined Application Protocol, COAP Implementation, Fuzzy Hierarchical Analysis.References
- Babovic, Protic & Milutinovic,, Z. (2016). "Web Performance Evaluation for Internet of Things Applications,". in IEEE Access, 4, 6974-6992.
- Chen. Kunz, Y. (2016). "Performance evaluation of IoT protocols under a constrained wireless access network,". 2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT), Cairo.
- Giang,Minkeun & Daeyoung, N. (2013). “SCoAP: An integration of CoAP protocol with web-based application.” GLOBECOM.
- Granjal, Monteiro & Silva, J. (2015). "Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues,". in IEEE Communications Surveys & Tutorials pp, 17(3), 1294-1312.
- Huq , Islam,, M. (2010). “Home area network technology assessment for demand response in smart grid environment,”. in Universities Power Engineering Conference (AUPEC), 2010 20th Australasian. IEEE.
- Konieczek, Rethfeldt & Golatowski , B. (2015). "Real-Time Communication for the Internet of Things Using jCoAP,". 2015 IEEE 18th International Symposium on Real-Time Distributed Computing, Auckland.
- Kuzlu, Pipattanasomporn & Rahman, M. (2015). “Review of Communication Technologies for Smart Homes/Building Applications,”. in IEEE Innovative Smart Grid Technologies-Asia (ISGT ASIA).
- Lewis, Igic & Zhou, R. (2009). “Assessment of Communication Methods for Smart Electricity Metering in the UK. in IEEE PES/IAS Conference on Sustainable Alternative Energy (SAE).
- Montenegro,Kushalnagar, Hui & Cull, G. (2007). “Transmissionof IPv6 Packets over IEEE 802.15.4 Networks,” Internet Requests for Comments, IETF, RFC 4944. [Online]. Retrieved from Available: http://www.rfc-editor.org/rfc/rfc4944.txt.
- Navas, Lagos, Toutain & Vijayasan, R. (2016). "Nonce-based authenticated key establishment over OAuth 2.0 IoT proof-of-possession architecture,". 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA.
- Raza, Trabalza & Voigt, S. (2013). "6LoWPAN Compressed DTLS for CoAP,". 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems, Hangzhou.
- Rescorla, Modadugu, , E. (2006). DTLS: Datagram Transport Layer Security, RFC 4347.
- Saleem, Crespi & Rehmani, Y. (2017). “Internet of Things-aided Smart Grid: Technologies, Architectures, Applications, Prototypes, and Future Research Directions” ArXiv.
- Schroder Filho, Pissolato Filho & More, H. (2016). “The Adequacy of LoRaWAN on Smart Grids: A Comparison with RF Mesh Technology,”. in IEEE International Smart Cities Conference (ISC2).
- Shelby, Hartke & Bormann,, Z. (2014). “RFC 7252: The Constrained Application Protocol (CoAP).”.
- Yang, Wu, Yin & Zhao, Y. (2017). "A Survey on Security and Privacy Issues in Internet-of-Things,". in IEEE Internet of Things Journal, 99.
- Yi, Iwayemi & Zhou, P. (2011). “Developing ZigBee Deployment Guideline under WiFi Interference for Smart Grid Applications,”. IEEE Transactions on Smart Grid, 2(1), 110–120.
- "Evaluation of Distributed Denial of Service threat in the Internet of Things,"2016 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), Cambridge, MA
- Ancillotti, Raffaele Bruno. (2017). “Comparison of CoAP and CoCoA+ Congestion Control Mechanisms for Different IoT Application Scenarios”. 22nd IEEE Symposium on Computers and Communications.
- Capossele, Cervo, De Cicco & Petriol, A. (2015). "Security as a CoAP resource: An optimized DTLS implementation for the IoT,". 2015 IEEE International Conference on Communications (ICC), London.
- Chavan, K.Nighot, A. (2016). “Secure and Cost-effective Application Layer Protocol with Authentication Interoperability for IOT”.
- I.Ali. (2016). “Internet of Things Security, Device Authentication and Access Control: A Review”. (IJCSIS) International Journal of Computer Science and Information Security.
- Iglesias, Orive & Urbieta, M. (2017). “Analysis of CoAP Implementations for Industrial Internet of Things: A Survey”. 109.
- IOT. (2016). Internet of Things (IoT) Protocols You Need to Know About,” accessed: September. Retrieved from [Online]. Available: http://www.rs-online.com/designspark/electronics/knowledge-item/ eleven-internet-of-things-iot-protocols-you-need-to-know-about.
- KuladinithI, Koojana, Bergmann & Pötsch . (2011). “Implementation of CoAP and its Application in Transport Logistics.”
- Ludovici, A. (2013). “TinyCoAP: A Novel Constrained Application Protocol (CoAP) Implementation for Embedding RESTful Web Services in Wireless Sensor Networks Based on TinyOS”, Journal of Sensor and Actuator Networks.
- Ludovici, Calveras, A. (2015). “A Proxy Design to Leverage the Interconnection of CoAP Wireless Sensor Networks with Web Applications”, sensors, ISSN. 1424-8220.
- Pawlowski, Jara & Ogorzalek, M. (2015). Compact Extensible Authentication Protocol for the Internet of Things. Enabling Scalable and Efficient Security Commissioning. Mobile Information Systems .
- Petajajarvi, Mikhaylov, Roivainen & Han, J. (2015). “On the Coverage of LPWANs: Range Evaluation and Channel Attenuation Model for LoRa Technology,”. in 14th International Con-ference on ITS Telecommunications (ITST).
- Poorebarahimi, A., Razavi, F., & SoleimaniRoozbahani, F. (2016). Presenting VALIT Frameworks and Comparing between Them and Other Enterprise Architecture Framework. Int. J. Advanced Networking and Applications , 7(4), 2805-2809.
- Poorebrahimi, A., & SoleimaniRoozbahani, F. (2015). Effects of Security and Privacy Concerns on using of Cloud Services in Energy Industry, an Oil and Gas Company: A Case Study. Int. J. Advanced Networking and Applications , 2779-2783.
- Ranjan, Somani , A. (2016). Access Control and Authentication in the Internet of Things Environment. In: Mahmood Z. (eds) Connectivity Frameworks for Smart Devices. Computer Communications and Networks. Springer, Cham.
- Samuel, S. (2016). “A Review of Connectivity Challenges in IoT-Smart Home,”. in 3rd MEC International Conference on Big Data and Smart City (ICBDSC).
- Skodzlk, J. (2015). "CoHaRT: A P2P-based deterministic transmission of large data amounts using CoAP,". 2015 IEEE International Conference on Industrial Technology (ICIT), Seville.
- Yakubu, Adjei & Babu , O. (April 2016). A Review of Prospects and Challenges of Internet of Things. International Journal of Computer Applications, 139(10), 33-39.