• Home
  • sajad shokohyar
  • OpenAccess
    • List of Articles sajad shokohyar

      • Open Access Article

        1 - Design and Validation of Business Intelligence Model Based on Ambidexterity Approach
        Massoud Sirati Sajjad Shokuhyar Ali Rezaeian
        The purpose of this research is to design and validate the Business Intelligence Model (BIM) based on the ambidexterity approach. The research method is descriptive (non-experimental) and correlation research project is a structural equation type with the least squares. More
        The purpose of this research is to design and validate the Business Intelligence Model (BIM) based on the ambidexterity approach. The research method is descriptive (non-experimental) and correlation research project is a structural equation type with the least squares. Participants in this study were employees of the Social Security Organization in Tehran. The participants in this study were the managers of the houses of municipality district of Tehran. In this research, the number of members of the statistical population is formed by 600 managers of the houses of municipality district of Tehran. Based on the Cochran formula, 234 managers of the houses of Tehran municipalities were selected as the statistical sample. In this research, a multi-stage cluster sampling method was used. To measure the variables of the research, a researcher-made questionnaire was prepared and adjusted. Research findings indicate that exploration management and organizational culture have a positive and significant effect on entrepreneurship orientation. Also, probe management and organizational culture have a positive and significant effect on flexibility. Further, the effect of entrepreneurial orientation and flexibility on exploratory intelligence is considerable as well as the impact of entrepreneurial orientation and flexibility on utilitarian intelligence.t. Having said that, however, the moderating role of technology absorption capacity in relation to entrepreneurial orientation and flexibility on exploratory intelligence and utilitarian intelligence is the subject that worth to be highlighted. Manuscript profile
      • Open Access Article

        2 - Designing a smart contract process model based on blockchain technology Using Meta-Synthesis Research Method
        Amin Pouya Ahmad Jafarnejad Chaghoushi Sajad Shokohyar Mehdi Karimizand
        Due to the growing future of blockchain applications such as smart contracts and the widespread use of smart contracts in the Internet of Things (IoT) and the lack of Persian resources in this field, it is necessary to conduct comprehensive and integrated researches for More
        Due to the growing future of blockchain applications such as smart contracts and the widespread use of smart contracts in the Internet of Things (IoT) and the lack of Persian resources in this field, it is necessary to conduct comprehensive and integrated researches for a systematic study of past studies and provide interpretive perspectives and create new knowledge. In this research, using mixed research method (first, using the Meta-Synthesis Research Method, by combining qualitative findings of previous studies and combining different perspectives, a model in the process of smart contracts on the blockchain platform is presented and then for evaluation and analysis of the modeled, structural equations quantitative method and confirmatory factor analysis with Smart PLS3 software have been used. The lack of a standard framework for analyzing and comparing smart contract-based systems identifies the need to design a smart contract model that allows smart contract developers to identify bottlenecks and improve system-based smart contracts. Manuscript profile
      • Open Access Article

        3 - Detection of Attacks and Anomalies in The Internet of Things System Using Neural Networks Based on Training with PSO and TLBO Algorithms
        Mohammad Nazarpour Navid Nezafati Sajjad Shokuhyar
        Detecting attacks and anomalies is one of the new challenges in commercializing and advancing IOT technology. One of the most effective methods for detecting attacks is the machine learning algorithms. Until now, many ML models have been suggested to detect attacks and More
        Detecting attacks and anomalies is one of the new challenges in commercializing and advancing IOT technology. One of the most effective methods for detecting attacks is the machine learning algorithms. Until now, many ML models have been suggested to detect attacks and anomalies, all of them use experimental data to model the detection process. One of the most popular and efficient ML algorithms is the artificial neural network. Neural networks also have different classical learning methods. But all of these classic learning methods are problematic for systems that have a lot of local optimized points or have a very complex target function so that they get stuck in local optimal points and are unable to find the global optimal point. The use of evolutionary optimization algorithms for neural network training can be an effective and interesting method. These algorithms have the capability to solve very complex problems with multi-purposed functions and high constraints. Among the evolutionary algorithms, the particle swarm optimization algorithm is fast and popular. Hence, in this article, we use this algorithm to train the neural network to detect attacks and anomalies of the Internet of Things system. Although the PSO algorithm has so many merits, in some cases it may reduce population diversity, resulting in premature convergence. So, in order to solve this problem, we make use of the TLBO algorithm and also, we show that in some cases, up to 90% accuracy of attack detection can be obtained. Manuscript profile