• OpenAccess
    • List of Articles US

      • Open Access Article

        1 - Comparative – analytical investigating of Top US and Iran entrepreneurship centers performance
        Mohammad Azizi
        Albeit recently the numbers of entrepreneurship centers at the universities dramaticly have been increased, But alittle studies about this subject have done.This paper tries to compare, investigate and analyze the performance of Top entrepreneurship centers in the Unite More
        Albeit recently the numbers of entrepreneurship centers at the universities dramaticly have been increased, But alittle studies about this subject have done.This paper tries to compare, investigate and analyze the performance of Top entrepreneurship centers in the United States and Tehran universities. This study looks at the performance of the Tehran universities entrepreneurship centers and then examines the differences between US entrepreneurship centers and Tehran ones. Top entrepreneurship centers are chosen from international benchmarking centers. Information from US entrepreneurship centers gathered via internet and E-mail contacts with directors and information from Tehran entrepreneurship centers collected via documents and interview with experts and managers. The findings indicate that US entrepreneurship centers have more outreach activities as education and teaching. US entrepreneurship centers also offer more comprehensive and intencive programs. But in contrast, entrepreneurship centers in Tehran universities just have more training and educational functions. Overall US entrepreneurship centers have more internal and external entrepreneurship activities like education, servivice and counseling for students in all levels(undergraduate, graduate, post graduate) and other external applicants. The findings of this research study will assist dicision and policy makers, students, faculty, staff, administrators, directors, researchers, and other stakeholders of entrepreneurship centers. Manuscript profile
      • Open Access Article

        2 - Design of An intrusion detection system with new architecture for malware attacks on flash disks
        Soheil Afraz
        Development and variety of flash disks, portability and increasing popularity use of their has led to all four of malware released today in cyberspace, a specific malware attacks on these devices and USB-based attacks increasingly and to become a serious problem .Hence More
        Development and variety of flash disks, portability and increasing popularity use of their has led to all four of malware released today in cyberspace, a specific malware attacks on these devices and USB-based attacks increasingly and to become a serious problem .Hence, this paper outlines the most important communication port USB based attacks discussed with practical solutions to deal with these attacks in seven ways and A host-based intrusion detection software systems were developed that Simultaneously utilizes the advantages of both methods of intrusion detection based on misuse and anomaly, its own Guidelines a accurately such attacks recognize and to deal with them. Manuscript profile
      • Open Access Article

        3 - A Study on Usability Factor on the Intention and Behavior of Technology Usage in ATAUT2 in Healthcare Environments
        zhila kazemi
        Introduction: Using information and communication technology in healthcare system helps with the improvement in services quality. Hence, using it could provide great advantages for this business. The advantages of this technology reaches its top when it is implemented a More
        Introduction: Using information and communication technology in healthcare system helps with the improvement in services quality. Hence, using it could provide great advantages for this business. The advantages of this technology reaches its top when it is implemented and used successfully. One of the main stages in realization of this goal is the success in acceptance of technology by its users. Hence, identifying the effective factors in successful acceptance of information technology is a vital necessity and acceptance is one of its main factors. Accordingly, this research studies software acceptance along with unified theory of usability and use of technology (UTAUT2) in patients’ use of medical diagnosis laboratories electronic portal in 2015. Methodology: This research is an analytic-descriptive study which was carried out in a cross-sectional form in 2014. The target statistical society included the patients who used Shiraz laboratories portals, which included 170 individuals. For sampling, stratified proportional to size was used to determine the number of samples needed from each studied center and also, purposive sampling was used to select the patients using portals and filling up questionnaires in each center. Data collection tool was a 25-item questionnaire which was adopted from Venkatesh et al. (2012) and Usability Assessment questionnaire. Ultimately, the data derived from the questionnaires was analyzed using Structural Equation Modeling (SEM), with Partial Least Squares approach and SPSS ver. 20 and Smart-PLS ver.3 software. Findings: Results from this research in Shiraz medical diagnosis laboratories, showed a significant relation between variables added value (t-value=2.88), hedonic motivation (t-value=3.88), habit (t-value=2.22) and usability structure (t-value=5.61) with the structure of intention to use and structures of usability (t-value=3.97) and intention to use (t-value=1.91) with usage behavior. Conclusion: Considering the findings in this study, the following recommendations could be proposed in order for the higher use of portals by the patients: informing patients about the advantages of using these portals, designing portals in a simple and understandable form, and increase in portals’ attractiveness could have a positive and effective impact on laboratory information system success. Manuscript profile
      • Open Access Article

        4 - Identifying Cloned Profiles on Online Social Networks by Identifying Nodes in Overlapping Communities and User Interactions
        Zahra Hamzehzadeh
        With the growing popularity of social networks, identifying Profile Cloning Attacks (PCAs) is an important challenge within the scope of privacy in the communications world. Until now, researchers have identified these attacks by using features such as profile informati More
        With the growing popularity of social networks, identifying Profile Cloning Attacks (PCAs) is an important challenge within the scope of privacy in the communications world. Until now, researchers have identified these attacks by using features such as profile information, link information, and interactions information that are based on methods like similarities and network structure. Previously suggested approaches lack specific routine and logic to track an attacker, and begin identifying PCAs with victim direct requests or according to the time of a friend request from an attacker. This research offers a new approach with a total of two major steps. Step one emphasizes that  legitimate users are attracted to interactions within their local communities; conversely, attackers are attracted to more dense areas. Step two was designed according to the analysis of the interactive behavior that is obtained from users 'earlier research. With this approach, according to a logic based on network structure, search cloned profiles can be identified.   Finally, a list of suspicious nodes to cloned nodes has been introduced with their scores that show the accuracy of selection. During the research, a logical relation between the average degrees of social network graph and the selection of the appropriate suspicious nodes with high priority was extracted. Finally, a general framework is proposed. Manuscript profile