Volume 13, Issue 1
مرور بر اساس
ارسال های اخیر

Modeling causal and interfering conditions in corruption from auditing perspective using Grounded theory
(Semnan University, 20220101)This study aimed to identify and model the causal and interfering conditions against corruption by auditing firms. This research is applied objectively and it is among the studies with mixed methods. In the qualitative ...

Presenting a structural model of customer behavioral intention in accepting social media marketing
(Semnan University, 20220101)This study aimed to provide a structural model of customer intentional behavior in accepting social media marketing. The present study uses an applied (purpose) and surveyanalytical research methodology (implementation ...

Concept and difficulties of advanced persistent threats (APT): Survey
(Semnan University, 20220101)Previously confined to nationstates and associated institutions, dangers have increasingly penetrated the private and business sectors. Advanced Persistent Threats (APTs) are the type of threats that every government and ...

Analysis of challenges and methods for face detection systems: A survey
(Semnan University, 20220101)Face recognition has come to the top of the list of the most frequently used image processing applications, owing in large part to the availability of practical technology in this area. Despite significant progress in this ...

A survey on various machine learning approaches for human electrocardiograms identification
(Semnan University, 20220101)Human identification is a critical function that can aid in data security protection. Developing deep learning models for human identification from electrocardiogram (ECG) data is one of the most promising strategies. It ...

Improved optimality checkpoint for decision making by using the subtriangular form
(Semnan University, 20220101)Decisionmaking in Operations Research is the main point in various studies in our reallife applications. However, these different studies focus on this topic. One drawback some of their studies are restricted and have ...

Feature extraction for RGBD cameras
(Semnan University, 20220101)A proposed feature extraction method for RGBD cameras is developed. The proposed method for feature extraction is based on a Histogram of oriented gradient HOG which is used to extract the features of RGB image alongside ...

Using steganography techniques for implicit authentication to enhance sensitive data hiding
(Semnan University, 20220101)Smartphones recently become indispensable to users due to the services provided, like Internet access and important applications (e.g., financial and health applications). which contain personal and confidential information ...

The effectiveness of a proposed teaching strategy based on the theory of successful intelligence in developing creativity skills in mathematics for students of primary stage
(Semnan University, 20220101)The aim of the paper is to measure the effectiveness of a proposed teaching strategy based on the theory of successful intelligence in developing creativity skills in mathematics among primary school students. To achieve ...

Linear operator of various types and its basic properties
(Semnan University, 20220101)We are starting to construct a new theory of linear operators of various types defined on fuzzy normed space inspired by the theory of linear operators of various types defined on ordinary normed space. The first goal in ...

Julia sets are Cantor circles and Sierpinski carpets for rational maps
(Semnan University, 20220101)In this work, we study the family of complex rational maps which is given by$$Q_{\beta }\left(z\right)=2{\beta }^{1d}z^d\frac{z^d(z^{2d}{\beta }^{d+1})}{z^{2d}{\beta }^{3d1}},$$where $d$ greater than or equal to 2 ...

Some types of Smarandache filters of a Smarandache BHalgebra
(Semnan University, 20220101)In this paper, the notions of a Smarandache pfilter, a Smarandache $n$fold $p$filter, Smarandache $q$filter, a Smarandache$n$fold $q$filter of a Smarandache BHAlgebra are introduced. Some properties of them with ...

An experimental study by employing Nano VNA in microwave devices
(Semnan University, 20220101)To achieve precise measurements, a vector network analyzer can compensate for the instrument's systematic flaws, the features of cables, adapters, and test fixtures. To check the vector reflection coefficient of microwave ...

The largest size of the arc of degree three in a projective plane of order sixteen
(Semnan University, 20220101)An $(n;3)$arc $ K $ in projective plane $ PG(2,q) $ of size n and degree three is a set of $ n $ points satisfies that every line meets it in less than or equal three points, also it is complete if it is not contained in ...

Quantum inspired genetic algorithm model based thirteen types automatic modulation classification
(Semnan University, 20220101)The popularity of automatic modulation categorization (AMC) is high in recent years owing to the many advantages. When it comes to communication, reliability in an AMC is very critical. Increasing the number of signals ...

The radius, diameter and chromatic number of some zero divisor graph
(Semnan University, 20220101)In this work, the radius, diameter and a chromatic number of zero divisor graph of the ring $Z_n$ for some n are been determined. These graphs are ${\Gamma }\left(Z_{p^2q^2}\right)$, ${\Gamma }\left(Z_{p^2}\right)$, ...

The suggested threshold to reduce data noise for a factorial experiment
(Semnan University, 20220101)In this research, a factorial experiment (4*4) was studied, applied in a completely random block design, with a size of $2^5$ observations, where the design of experiments is used to study the effect of transactions on ...

On $\mu$Lclosed, qcompact and qLindelöf spaces in generalized topological spaces
(Semnan University, 20220101)The research paper's main goal is to propose the notions of $\mu$Lclosed, $q$compact and $q$Lindelöf spaces in generalized topological spaces. A number of properties concerning those new spaces are investigated and the ...

A systematic review of ultralightweight encryption algorithms
(Semnan University, 20220101)The Internet of Things (IoT) has opened a new era of technology and knowledge, several devices with limited resources are used. Those devices are vulnerable to a significant number of new malware and other emerging risks. ...

Face mask detection methods and techniques: A review
(Semnan University, 20220101)Corona virus sickness has become a big public health issue in 2019. Because of its contacttransparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the ...