• List of Articles تشخیص

      • Open Access Article

        1 - An intelligent computing architecture in the Internet of Medical Things to reduce the delay of the continuous monitoring system of patients with low mobility and special patients
        reza Ariana Mohammad Reza majma Somayyeh Jafarali Jassbi
        Internet of Things (IoT) technology offers a structured approach to address aspects of health care delivery in terms of health and remote monitoring for patients with specific conditions and life-threatening diseases. The Internet of Things will generate an unprecedente More
        Internet of Things (IoT) technology offers a structured approach to address aspects of health care delivery in terms of health and remote monitoring for patients with specific conditions and life-threatening diseases. The Internet of Things will generate an unprecedented amount of data that can be processed using cloud computing, which will result in huge delays due to resource limitations. But for real-time remote health monitoring applications, the delay caused by transferring data to the cloud and back to the application is unacceptable. we proposed remote monitoring of patient health in smart homes using the concept of fog computing in smart gateway. The FOG detection system implemented under fog computing consisted of a linear map and a Mobius map in combination with fuzzy logic to create a multi-level output (MLFM-map) that exploits different spatial resolutions in motion data analysis. The model architecture and parameters are designed to provide optimal performance while reducing computational complexity and testing time. The proposed approach showed good to excellent classification performance, with an accuracy of more than 90% of FOG episodes detected on average with very low latency in the original dataset Manuscript profile
      • Open Access Article

        2 - The Role of Think Tank to Recognition Problem on Refah Bank Policies
        Karamollah Daneshfard Fatemeh Sadat Aboalmaali
        Context: This study is done with investigate purpose the role of Think Tank on Refah Bank Policy of problem detection . In fact, the nature of public policy and organizational process as one of the most important tools of public administration, provides a framework for More
        Context: This study is done with investigate purpose the role of Think Tank on Refah Bank Policy of problem detection . In fact, the nature of public policy and organizational process as one of the most important tools of public administration, provides a framework for decisionmaking and problem detection. Purpose: Independent variables Think Tank and the dependent variable were analyzed Problem detection with the component (understanding the organization and the environment, creating and proposals possible, evaluate options and the final selection, implementation and follow-up) from the logical processes of problem-solving doctor Danesh Fard. Method: This research result is applied and the target is descriptive - survey. The study population was composed of 400 members of the think tank. But based on simple random sampling only 60 members were chosen. Data gathered by a questionnaire which its validity was confirmed by professors and experts. Its reliability was calculated using Cronbach's alpha coefficient 0.819. Data were analyzed using SPSS software. Kolmogorov-Smirnov test for normality of the data and for the relationship between the variables of one-sample t-test and Friedman test was used to rank the components. Finding: According to Friedman's test solutions is expanding in terms of Experts and the second priority is the implementation of the evaluation. The analysis results showed that the detection of the policy think tank and its dimensions in Tehran, Refah bank has Significant Impact. Conclusion: Based on the results of Friedman test solution of the problem in the first place from the perspective of experts and a second assessment of the problem is enforcement. Manuscript profile
      • Open Access Article

        3 - Methods of Identifying Fake News: A Systematic Review Study
        Karim Shabani ali geranmayeh Shahnaz Hashemi
        Introduction: Fake news is spreading day by day due to individuals’ accessibility to social networks and those platforms with a lack of direct monitoring capability. Thus, understanding how to distinguish fake news can be a significant step in reducing such influe More
        Introduction: Fake news is spreading day by day due to individuals’ accessibility to social networks and those platforms with a lack of direct monitoring capability. Thus, understanding how to distinguish fake news can be a significant step in reducing such influences. Method: In this systematic review, original articles were obtained from those research conducted on the subject of identifying fake news in the world in the period 2015 to 2020, which was published in prestigious domestic and international scientific journals and collected in local and international databases. Finally, after considering the inclusion and exclusion criteria, 43 articles were reviewed. Results: By careful review of included studies, those articles were classified into two general categories: 1. Human identification method. 2. Automatic or machine identification method. The indicators presented on the subject and the progress made in this area also indicate many weaknesses in recognizing fake news. On the one hand, machine models that use databases, it is not possible to provide a model that works properly in the real world, and on the other hand, using human methods is very time-consuming. Conclusion: It seems that there is still a weakness in diagnosis, and in many cases, the real world has not been treated well; however, in recent years, the social network Twitter has performed much better than other systems. Manuscript profile
      • Open Access Article

        4 - A new model as a damage index in an eigen value problem with application in health monitoring of offshore jacket platform
        Mehdi Alavinejhad Madjid Ghodsi Hassanabad Mohammadjavad Ketabdari Masoud Nekooei
        A set of second-order differential equations (the initial value problem) is used to analyze the vibrations of structures. This method is based on changing the second-order differential equations to the eigenvalue problem, which is usually used for modal analysis of stru More
        A set of second-order differential equations (the initial value problem) is used to analyze the vibrations of structures. This method is based on changing the second-order differential equations to the eigenvalue problem, which is usually used for modal analysis of structures. This problem involves a matrix equation with mass and stiffness as coefficient matrices. Changes in some stiffness matrix arrays change eigenvalues ​​and eigenvectors, and changes in stiffness matrices indicate damage to one or more structural members. Therefore, identifying modified arrays is very useful for monitoring the health of structures. Modified stiffness array arrays can be obtained by comparing new eigenvalues ​​and eigenvectors with old ones. The Stubbs Index (Modal Strain Energy) Stubbs (MSE) uses only special vectors to identify injuries. In the improved modal strain energy method (IMSE) proposed by Lee et al., In addition to special vectors, special values ​​are also entered in relation to the damage index. In this research, a new injury index is presented with the development of the above two indicators, which show more accurate results than them. In this study, the health monitoring of a template platform structure of Forouzan Persian Gulf oil field is compared to compare the accuracy of these three indicators. The results show that the new method is more accurate than the Stubbs and IMSE indices, especially in the presence of multiple injuries. Manuscript profile
      • Open Access Article

        5 - Modified Goal Programming Approach for Improving the Discrimination Power and Weights Dispersion
        Sahand Daneshvar Nazila Shahi Fariba Najafzadeh
        Data envelopment analysis (DEA) is a technique based on linear programming (LP) to measure the relative efficiency of homogeneous units by considering inputs and outputs. The lack of discrimination among efficient decision making units (DMUs) and unrealistic input-outpu More
        Data envelopment analysis (DEA) is a technique based on linear programming (LP) to measure the relative efficiency of homogeneous units by considering inputs and outputs. The lack of discrimination among efficient decision making units (DMUs) and unrealistic input-outputs weights have been known as the drawback of DEA. In this paper the new scheme based on a goal programming data envelopment analysis (GPDEA) are developed to moderate the homogeneity and reasonability of weights distribution by using of facet analysis On GPDEA (GPDEA-CCR and GPDEA-BCC) models. These modifications are done by considering the lower bounds for each individual inputs and outputs weights in standard CCR model and an upper bound just for free variable of standard BCC model. In the both of the cases the mentioned modification preserved the inputs and outputs weights from zero value. The modified GPDEA models also improve the discrimination power of DEA. The advantages of each modified GPDEA-CCR and GPDEA-BCC models are shown by some examples. Manuscript profile
      • Open Access Article

        6 - Predicting Financial Contagion from Generating shock in Investment Institutions Activated in Capital Market due to Overlapping Portfolios Risk
        Alireza Rayati Shavazi Abbas Rezaei Pandari
        The risk of maintaining shared assets or overlapping portfolios risk is one of channels that cause financial contagion. Since a shock in an investor institution can spread to other investment institutions and cause great damage to them and the entire stock market and ev More
        The risk of maintaining shared assets or overlapping portfolios risk is one of channels that cause financial contagion. Since a shock in an investor institution can spread to other investment institutions and cause great damage to them and the entire stock market and even cause a crisis in the economy, therefore; The main goal of this research is to provide a model for predicting financial contagion caused by a shock in investor institutions in Tehran Stock Exchange based on overlapping portfolios risk. This research is an analytical survey that was conducted using the statistical method of discriminant analysis. In order to investigate the goal, based on the data related to the stock portfolio of the investing institutions in the Tehran Stock Exchange, a multi-variable discriminant model for predicting financial contagion based on shocks in financial institutions has been presented. The results indicate that "risky assets value of the investment institution", "Debt value of the investment institution" and "Degree of the investing institution portfolio" have been validated as independent variables. Supervision departments can use the models presented in this study to identify industrial groups that have a high risk of overlapping portfolios and maintain the stability of the financial system by taking appropriate decisions. Manuscript profile
      • Open Access Article

        7 - تحلیل بنیادی سهام با رویکرد کارایی در مرزهای واقعی و تعیین اهمیت  شاخصها برای رسیدن به شرایط مطلوب
        سیده عاطفه حسینی اسماعیل شاه طهماسبی منیره ابویی مهریزی رامین وران
      • Open Access Article

        8 - Cumulative accuracy profile in banks' credit risk assessment: accounting based models and market based models
        samaneh shafiee mohammadhamed khanmohammadi alireza zarei soodani Mahmmod Agha hoseinali shirazi Zahra Moradi
        This study examine the Merton structural model based on market data and the discriminant analysis model based on accounting data in banks during 1386 to 1398. Due to the different structure of banks' balance sheets, for the first time, using the transformed data maximum More
        This study examine the Merton structural model based on market data and the discriminant analysis model based on accounting data in banks during 1386 to 1398. Due to the different structure of banks' balance sheets, for the first time, using the transformed data maximum likelihood estimation method and other liablilty with an adjustment and calculate the market value of assets and their volatility Using the stock price, we calculated the distance to default and the probability of default with the modified Merton model. Then, with the discriminant analysis model and Wilkes lambda index, we introduced a model based on accounting data to measure credit risk in banks. Among variables, inactive credits to total credits, total credits to main deposits and reserves to inactive credits have the most impact on determining the credit risk of banks, respectively, which is determined by z coefficients. The lower  z score, the greater credit risk and vice versa. Finally, using the cumulative accuracy profile and accuracy ratio, which is a new method in determining an efficient model for credit risk, Merton's structural model is compared with z-score model, and finally Merton's structural model with an accuracy ratio of 70.97 as an efficient model for measuring credit risk in banks Manuscript profile
      • Open Access Article

        9 - Relationship between Management Control System and Performance Management of Tehran Social Security Selected Hospital
        leila goudarzi leila riahi leila nazarymanesh
        Introduction: Performance management is an inevitable need of any social organization and Efficient Performance management requires effective management control system. Methods: The present study was descriptive-correlational and applied in terms of its purpose. The dat More
        Introduction: Performance management is an inevitable need of any social organization and Efficient Performance management requires effective management control system. Methods: The present study was descriptive-correlational and applied in terms of its purpose. The data gathering tool was a researcher-made questionnaire. In this study, the validity of the questionnaire with formal and reliability approach was confirmed by Cronbach's alpha (0.889). The statistical population of this study was 280 department administrators and department of treatment managers. According to Cochran's formula, 163 individuals were selected for statistical society. They were selected by stratified random sampling method in two categories of administrative managers (28 people) and managers (135 people). Data were analyzed using descriptive and inferential statistics. Results: According to research findings in 95% confidence level, management control system with diagnostic management dimensions (p = 0.00) and interactive management control system (p = 0.00) with organizational performance management with dimensions of recognition of dimensions and performance criteria, assessment and evaluation Performance, performance improvement has a positive relationship. Conclusion: Considering the conclusion, the positive relationship between management control system and organizational performance management is recommended to managers of hospitals by introducing and strengthening management control system with significant results in terms of performance management for a long-term hospital under their management. Manuscript profile
      • Open Access Article

        10 - Applying the Discriminant Function (analysis) for Going- Concern Forecasting of Corporations by Some Variables of Basic Financial Statements (Balance Sheet, Income Statement and Statement of Cash Flow)
        یحیی حساس یگانه محمد صیادی
        Discriminant analysis (function) is one of the best instruments to recognizevariables affecting to the going concern. This paper seeks to discriminate failed andnon-failed corporations using discriminant analysis (function) by some variable ofbasic financial statements. More
        Discriminant analysis (function) is one of the best instruments to recognizevariables affecting to the going concern. This paper seeks to discriminate failed andnon-failed corporations using discriminant analysis (function) by some variable ofbasic financial statements. Sample includes 51 failed and 51 non-failed corporations.In discriminant analysis, wilks' lambda determines affecting variables todiscriminate of groups. Then, the discriminant function is getting out. This function isused to discriminate groups to failed and non-failed corporations. The test resultsproved to be extremely accurate in predicting going concern correctly in 77 percent ofall firms in the failed and non-failed groups assigned to their actual classification.Conclusively, The results shows that retained earnings (x1) (from balance sheet)and operational income (x2) (from income statement) are the two most influentialvariables in going concern prediction. Manuscript profile
      • Open Access Article

        11 - The investigation of relationship between labor value added and accrual and cash performance measures of companies in drug industry
        Zohreh Hajiha
        In recent years, value added and labor value added variables in presentation andmeasurement of companies performance have been vastly used. From another aspect,predicting financial situation of companies has become a concern of professionalistsand academicians. To conne More
        In recent years, value added and labor value added variables in presentation andmeasurement of companies performance have been vastly used. From another aspect,predicting financial situation of companies has become a concern of professionalistsand academicians. To connect between these two phenomena can cover some gaps inboth fields. Therefore, in this research labor value added variables were calculated inthree groups of Economic Structure Ratios, Productivity Ratios and ManagerialEfficiency Ratios. Each of these ratios also were calculated for three groups of directlabor, indirect labor and non manufacturing labor. Research period was 7 years from2001 to 2007 and companies active in drug industry accepted in Tehran StockExchange were analyzed. There are a variety of ratios, so an average of ratios for sixyears was calculated for each ratio. Bankruptcy prediction model that was used todifferentiate between bankrupt and non bankrupt companies for the research, is SprinGate (1978) model. Based on the model that was applied in 2007( last year of theresearch), sample companies were categorized into two groups of bankrupt and nonbankrupt and by value added ratios of these companies.Discriminant function is including ten ratios from two groups of EconomicStructure Ratios, Productivity Ratios and Managerial Efficiency Ratios. From tenratios that are discriminant ratios, six are related to indirect and non manufacturinglabor value added and only 4 variables are related to manufacturing direct labor valueadded. In the mean time, they are not the strongest discriminant ratios. This result isinteresting since it presents the importance indirect labor and non manufacturinglabor to create value added. Manuscript profile
      • Open Access Article

        12 - Sociological Discriminant Analysis of Hemphill's Index in Marriage Survival (Case of Study: Tabriz City)
        Mohammad Sadegh Mahdavi Roghayeh Tamiz
      • Open Access Article

        13 - Identification of Entreprenual Oppurtunities of the High Buildings Industriy in Tehran City
        آیت اله ممیز حسن کمالو سیده عاطفه قاسمی
        Introduction and Objective: Rapid and uncontrolled growth of population in major cities, and consequently the needs to large-scale housing, on the one hand and preventing the spread of the cities horizontal landscape, on the other hand, made the high-rise building const More
        Introduction and Objective: Rapid and uncontrolled growth of population in major cities, and consequently the needs to large-scale housing, on the one hand and preventing the spread of the cities horizontal landscape, on the other hand, made the high-rise building construction as an essential solution to the land problem. Hence understanding the available opportunities in the construction industry, particularly in high-rise building construction could cause identifying favorable opportunities to develop entrepreneurial in upstream and downstream industries of high-rise building construction. This study seeks to answer the question of what entrepreneurial opportunities are in high-rise building construction industry, in the city of Tehran. Methods: This study used research methods of combination techniques and Morrison recitatif analysis.In the qualitative part, 20 experts were interviewed and focus group meetings were held. In the quantitative part, inorder to identify entrepreneurial opportunities in the the high-rise building construction industry in the city of Tehran, a questionnaire based on Ulwick model with two measures of "satisfaction" and "significance" was designed. After approval of relevant experts in the field, the questionnaires were distributed among industry participants and then collected. Findings: After approval of relevant experts in the field, the questionnaires were distributed among industry participants and then collected. the end, the results shows that entrepreneurial opportunities lies in "providing technical trainings for technicians and workers" , "providing professional trainings for senior-level project management and construction" , " Identifying and recommending the intelligent building management systems to industry participants" , "providing professional training for the operation and management of buildings", and " Development of business-oriented research and development (R&Ds) and introducing new specific technologies and equipments to high-rise building construction industry. Conclusions: The results show an increase in demand in the construction industry in today's society and the tendency of consumers to use the service, one of the sources of entrepreneurial opportunities are identified and Service. Each of these opportunities can lead to the development of many businesses. This employment staffing specialists, technicians, workers have contributed and ultimately will lead to economic growth. Manuscript profile
      • Open Access Article

        14 - Discriminant Analyses of Efficient Indexes on Apiaries Production in East Azerbaijan County
        Vahid Sotood Javad Mahmoodi Karamjavan
        In order to Discriminant analyses of efficient indexes on production of apiaries in East Azerbaijan to define the special relationship between some of the important factors affecting the production and the amount of future production of hive, analytical test done by pro More
        In order to Discriminant analyses of efficient indexes on production of apiaries in East Azerbaijan to define the special relationship between some of the important factors affecting the production and the amount of future production of hive, analytical test done by providing and completing a questionnaire form in apiaries in both breeding and harvesting stages. As the two apiaries producing group i.e. high production group (higher than the average production) and low production group (under average production) using specific parameters were divided and tested. By examining the results and using the statistical analysis methods, the role and the impact of some of the factors affecting production were defined as a linear relationship. This formula makes it possible to predict the amount of apiary production before harvest, as by comparison of the resulting value for an apiary based on intended parameters with the obtained indicator, we can predicted its production and in the case of low performance, beekeeper urged to fix existing bugs. Manuscript profile
      • Open Access Article

        15 - Explaining the Distinctive Professional Competencies Performance of Greenhouse Managers Production units in Southern Khorasan Province
        Mohammad Motamedi Koroush roosta Asadullah Zamanipour Malihe Falaki
        Present study conducted with the aim of explaining the distinctive Professional competencies performance of managers in greenhouse production units in Southern Khorasan. The research method was applied in terms of purpose, and descriptive-correlational in terms of colle More
        Present study conducted with the aim of explaining the distinctive Professional competencies performance of managers in greenhouse production units in Southern Khorasan. The research method was applied in terms of purpose, and descriptive-correlational in terms of collecting data. The study was conducted through the survey method. The statistical population of the study was 141 greenhouse owners from greenhouse cucumber production Units who were selected through the census method due to the limited statistical population. The instrument used for collecting data in this study was a questionnaire. At the time of research, 117 active greenhouses and information were collected and the statistical analysis was using of the discriminant analysis. The results of the analysis showed that out of the 23 independent variables examined, only 8 variables including observing the technical principles of growing operation, observing ethical beliefs, observing managerial competencies, observing the basic/generic competencies, the method of preparing the planting bed, the number of extension-training courses, the method of preparing the terrace and the planting operation, and the experience in greenhouse cultivation could maximally differ between successful and unsuccessful managers of greenhouse cucumber production Units in order of priority based on focal correlation coefficient.Explaining the Distinctive Professional Competencies Performance of Greenhouse Managers Production units in Southern Khorasan Province Manuscript profile
      • Open Access Article

        16 - FACTORS AFFECTING THE ADOPTION OF INNOVATIONS: THE CASE OF SAFFLOWER IN BANDAMIR DISTRICT
        Mahboubeh Asimeh Mehdi Nooripoor
        The entry of any innovation into a social system usually faces various barriers and limitations and it cannot be expected to be necessarily accompanied by acceptance and use. Thus, the aim of this study was to investigate factors affecting the adoption of safflower cult More
        The entry of any innovation into a social system usually faces various barriers and limitations and it cannot be expected to be necessarily accompanied by acceptance and use. Thus, the aim of this study was to investigate factors affecting the adoption of safflower cultivation in Bandamir district of Zarghan area of ​​Fars Province. The study was conducted using a stratified random sampling method, data were collected from 64 adopters of safflower cultivars and 36 non-adopters. The data collection tool was a questionnaire whose face validity was confirmed by experts. Cronbach's alpha coefficient for different parts of the questionnaire was higher than 0.71. Data were analyzed using SPSSv22 software. The results showed that the most important difference between the adopters and non-adopters of safflower cultivation is related to age, agricultural experience, and the amount of the loan received. The results also indicated that the high accuracy and utility of discriminant analysis can classify adopter farmers of safflower cultivating from non-adopter ones. From the total variables entered the model, some variables including awareness rate, the received loan rate, communicational factors, the total amount of land under cultivation and literacy level, were the most important distinguishing variables of two adopter and non-adopter groups of safflower cultivation. In addition, the results of studying the characteristics of safflower products showed that according to farmers' view, this product is generally in desirable condition so that respondents' understanding of its relative advantage was higher than average score, in terms of compatibility it was in good conditions, in terms of the complexity it was nearly low, in terms of trial- ability, it gained a medium-to-high score and, about visibility, also it was moderate. Manuscript profile
      • Open Access Article

        17 - مقایسه عملکرد دو کیت تشخیصی (Elitech و پارس آزمون)برای اندازه گیری گلوکز،کراتینین، توتال پروتئین و کلسترول
        سیده نسیبه حسینی شهاب الدین صافی محمدرضا خوانساری مجید صادقپور عباس اسدی
      • Open Access Article

        18 - Diagnosis and detection of Mycoplasma Synoviae from commercial poultry flocks using polymeras chain reaction (PCR) based on amplification of VlhA gene
        معصومه مقامی سیدعلی پوربخش علیرضا همایونی مهر حمیدرضا مهاجرانی عباس اشتری محمدعلی بیات زاده
        Mycoplasma Synoviae is a major avian pathogen and cases many economic losses on poultryindustry in Iran, Mycoplasma Synoviae synthesizes Variable lipoprotein heamagglutinin(VlhA),is believed to play a major in pathogenesis of the disease. The objective of the present st More
        Mycoplasma Synoviae is a major avian pathogen and cases many economic losses on poultryindustry in Iran, Mycoplasma Synoviae synthesizes Variable lipoprotein heamagglutinin(VlhA),is believed to play a major in pathogenesis of the disease. The objective of the present study wasto diagnosis and detection of Mycoplasma Synoviae isolates based on the vlhA gene.This studywas designed to detect MS through culture isolation and polymerase chain reaction (PCR) assayto demonstrated the involvement of MS infection in trachea and the lung/air sac samples takenfrom commercial poultry flocks of provinces: Tehran, Qazvin and Markazi with clinical signsof the disease. Moreover the specific primers to the Mycoplasma genuse from the primescomplementary to the single-copy conserved 5´ end of vlhA gene were used for detection of MSby vlhA-PCR. PCR results, in addition to identification of Mycoplasma specie, revealedvariable sizes of 350-400bp for each isolates. Of the 43 swabs 28(65%) yielded one of thepotentially pathogenic Mycoplasmas evaluated for using PPLO agar culture diagnostic method,and 33(76%) yielded one of the potentially pathogenic Mycoplasmas evaluated for Mycoplasmagenuse PCR as diagnostic metod and 24(55%) swabs yielded Mycoplasma Synoviae for usingvlhA PCR as diagnostic metod. The results of this study demonstrated that PCR based onamplification of conserved 5́ end of vlhA gene is an efficient tool for detection of MycoplasmaSynoviae isolates, as well as due to contain of RI, RII and RIII regions its can with top sensitiveand operative, be used for to diagnosis and detection of Mycoplasma Synoviae isolates. Manuscript profile
      • Open Access Article

        19 - Molecular detection of Theileria annulata and Theileria orientalis in cattle of Shahreza city, the south region of Isfahan province, Iran
        , MR. Soltani , V. Noaman , Y. Pirali , HR Azizi,
        Theileria are important hemoprotozoan parasites of cattle, transmitted by ixodid ticks leading to diseases which range from mild in apparent reactions to highly fatal diseases. This study aimed to determine the variety of Theileria species among cattle of Shahreza city, More
        Theileria are important hemoprotozoan parasites of cattle, transmitted by ixodid ticks leading to diseases which range from mild in apparent reactions to highly fatal diseases. This study aimed to determine the variety of Theileria species among cattle of Shahreza city, the south part of Isfahan Province. A total of 253 blood samples were randomly collected via the ear vein and jugular vein from healthy cattle for microscopy and molecular examination, respectively. The extracted DNA from blood cells was amplified by Theileria-all primers, which amplify an approximately 400bp DNA fragment from the region of the 18S rRNA gene from various members of the genus Theileria. All cattle positive samples were further analysed for the presence of Theileria annulata and Theileria orientalis by specific semi-nested PCR. T. annulata and T. orientalis were identified by specific semi-nested PCR in 54.9% and 47% of cattle blood samples, respectively. Chi-square (x2) tests were used to compare molecular prevalence values relative to Season, Farm, Type, Hygiene, Vectors, Age, and Milk Yield. T. orientalis prevalence was significantly higher in cattle in summer as compared to those in other seasons (p < 0.05). The prevalence rates of T. orientalis in different seasons, hygiene levels, and vectors were significantly different (p < 0.05). T. orientalis prevalence was higher in spring, farms with tick vectors and normal level of Hygiene. The examination of 50 microscopic fields showed 14.39% sensitivity and 99.12% specificity compared to molecular examination. The Kappa coefficient between molecular and microscopy (50 fields) techniques indicated a poor level of agreement (Kappa= 0.124). This study is the first molecular detection of Theileria species from cattle in the south of Isfahan province, Iran. Manuscript profile
      • Open Access Article

        20 - The comparison of polymerase chain reaction (PCR) and loop-mediated isothermal amplification (LAMP) methods for detecting Fasciola hepatica in faecal samples of sheeps in Lorestan province
        , S. Amiri bahar shemshadi , S Fallahi , S. Shirali
        Fascioliasis is a zoonotic disease with long history in Iran. Different methods are used for detection of the disease and one of methods is LAMP. The present study was conducted to compare the LAMP and PCR methods for detection of Fasciola hepatica in fecal samples of s More
        Fascioliasis is a zoonotic disease with long history in Iran. Different methods are used for detection of the disease and one of methods is LAMP. The present study was conducted to compare the LAMP and PCR methods for detection of Fasciola hepatica in fecal samples of sheeps in Lorestan province. During 3 months, 195 samples were collected by classical randomized method. The samples were stored in -20ºC for future investigations by LAMP and PCR. The samples were investigated by LAMP and PCR. The data were analyzed by SPSS software and Chi-square and Kappa coefficient was used. The results showed that LAMP technique showed significant difference with LAMP and detected infected samples (11 samples in LAMP and 7 samples in PCR). The results for kappa showed a strong agreement between the both methods with coefficient of 0.65 and P=0.001). The LAMP method showed higher sensitivity. In sum, LAMP method showed higher sensitivity compared to other methods and can be used for detection of F. hepatica. Manuscript profile
      • Open Access Article

        21 - Determination of Effective Indicators for Soil Quality Assessment in Different Land Use Types of Chughakhor Basin
        parvane mohaghegh mehdi Naderi جهانگرد محمدی
        For assessing of soil quality, the sensitive indicators can be used in land use managements. Monitoring all soil characteristics is costly and laborious therefore, limited soil characteristics for this mean are recommended. The purposes of this study were comparing seve More
        For assessing of soil quality, the sensitive indicators can be used in land use managements. Monitoring all soil characteristics is costly and laborious therefore, limited soil characteristics for this mean are recommended. The purposes of this study were comparing several soil attributes of different land use types and determination of minimum effective soil characteristics on soil quality in Chughakhor Basin, Chaharmahal va Bakhtiari Province, Iran. To fulfill the objectives slope, land use and soil maps and Latin Hypercube strategy were used and locations of 125 composite and surficial soil samples were determined. After pretreatment of soil samples, 29 soil physical and chemical characteristics were measured using appropriate methods. The mean comparison of different land uses showed that mean weighted aggregate diameter, available water content, air content, Dexter index, organic carbon, particle organic carbon in macro aggregate, the proportion of particle organic carbon in macro to in micro aggregates, P, Fe and Cu contents values of land use types were in the order Orchards>cultivated areas>Good rangelands>Dry land areas>Weak rangelands. For determination of effective indicators in soil quality assessing, the principle component analysis and stepwise discriminant analysis are used. The soil characters like water stable aggregates, soil texture elements, proportion of particle organic carbon in macro to in micro aggregates and soil Cu and Zn concentrations as minimum data set for soil quality assessment. Manuscript profile
      • Open Access Article

        22 - 1
        کرامت الله ایماندل لیدا مرادخانی شراره شهیدی
      • Open Access Article

        23 - Reasons for the Gap between Declared and Assessed Taxable Incomes of Non Manufacturing Companies Listed on Tehran Stock Exchange
        Hossien Yarahmadi masoud Taherinia ebrahim givaki Ghodratallah Talebnia
        The taxable income of legal persons is a critical issue in Iran as this sector plays a dynamic role in economic, social, and cultural activities in the society. The major problem of this study is the gap between the amounts of taxable income calculated by taxpayers and More
        The taxable income of legal persons is a critical issue in Iran as this sector plays a dynamic role in economic, social, and cultural activities in the society. The major problem of this study is the gap between the amounts of taxable income calculated by taxpayers and the Tax Administration. Field and bibliography methods besides Pearson Correlation Test were used, and all four hypotheses of research were confirmed. Accordingly, the reasons for the difference or gap between declared taxable income and assessed taxable income include breach of direct tax law by taxpayers, violation of accounting standards by taxpayers, lack of sufficient evidence and documents (including expenses, tax exemptions, and tax incentives) in the hand of taxpayers, ignorance of tax directives, instructions, and regulations by taxpayers. Manuscript profile
      • Open Access Article

        24 - A model for continuing the activity and diagnosing the health of manufacturing companies in Iran
        mostafa rezaee masoud Taherinia Majid zanjirdar
        Health means the ability to profitability and continuity of economic activity. This research is based on the needs of the day around manufacturing companies that lead to the creation of goods and products and have an effective role in the index of productivity and GDP o More
        Health means the ability to profitability and continuity of economic activity. This research is based on the needs of the day around manufacturing companies that lead to the creation of goods and products and have an effective role in the index of productivity and GDP of the country. This research is of experimental type and the methods of data foundation theory (grand theory-emerging and estimative and degree paradigm) have been used. The statistical sample of the present study was selected using the snowball method (selective) and based on five specialized groups in the accounting and judicial profession and the necessary information was collected through interviews and findings including six selected codes] Basic financial reports and auditor transparency - Bankruptcy Diagnosis Laboratory - Criteria for evaluating financial ratios - The most practical financial ratios Special conditions and aggregation of ratios - Specific coefficient of each financial ratio group [and including three stages of theoretical codes] The best and worst manufacturing companies - Classification of triple financial ratios (balance sheet - profit and loss - consolidated) - Emergence of mathematical model (layout The present model has the necessary efficiency for internal and external stakeholders such as banks, creditors, independent auditors, courts, etc., And is a suitable tool for determining the continuity of activities and stations for research. Provides health diagnosis for manufacturing companies. Manuscript profile
      • Open Access Article

        25 - The role of tax based on financial transactions in increasing government revenue
        ahmadreza babaee khosro Faghani Makrani Mohammad Reza Shahab
        Due to the economic problems and the government's special view on tax revenues in recent years, the discussion of changing the method of tax collection and creating an optimal method that both realizes tax revenues and solves the problems of the current tax collection m More
        Due to the economic problems and the government's special view on tax revenues in recent years, the discussion of changing the method of tax collection and creating an optimal method that both realizes tax revenues and solves the problems of the current tax collection method is of particular importance. This article examines the role of tax based on bank transactions in increasing government revenue. The required information is obtained from the budget deduction reports and financial statements of stock companies based on the 1872-year company- information. The trends related to Expressed tax, diagnostic tax, definitive tax are drawn and finally the difference between fixed taxes and taxes from FTT is calculated based on statistical tests and the results show that for all years the difference between fixed revenues and revenues from FTT is at significant levels and the differences are confirmed. Thus, FTT will improve tax collection and largely correct the current erosive process. Manuscript profile
      • Open Access Article

        26 - Analysis of bankruptcy of companies listed in Stock Exchange by using of two methods of Discriminant Analysis and DEA–Additive analysis
        Asghar Moshabbaki Hossein Mombeyni Alireza Bakhshizadeh
        Bankruptcy is a challenge that, many companies are faced with. Therefore the analysis of bankruptcy is too important, especially for investors. Accordingly, the present study aims to use of two techniques of DEA–Additive analysis and Discriminant analysis in order More
        Bankruptcy is a challenge that, many companies are faced with. Therefore the analysis of bankruptcy is too important, especially for investors. Accordingly, the present study aims to use of two techniques of DEA–Additive analysis and Discriminant analysis in order to analysis and assessment of bankruptcy of the companies which are listed on Tehran Stock Exchange. The study is descriptive- application and to assess the models of bankruptcy analysis, 110 companies listed on the stock exchange have been considered as statistical population and the DEA-Additive model and Discriminant Analysis model are used to bankruptcy analysis. The study showed that the Discriminant Analysis model was 50% accurate in predicting the bankrupt companies and 72% accurate in predicting the successful companies while the DEA-Additive model was 64% accurate in predicting the bankrupt companies and 87% accurate in predicting the successful companies, so in total the DEA-Additive model is more accurate than the Discriminant Analysis model in the bankruptcy analysis, and therefore it is preferred. Manuscript profile
      • Open Access Article

        27 - Traffic signs Detection and Recognition based on deep learning using embedded systems
        peyman Babaei Faezeh Allameh
        Detection and recognition of traffic signs requires the use of classification algorithms, and they basically use visual information such as the shape and color of traffic signs. However, these algorithms face problems in real-time tests, and it is very difficult to achi More
        Detection and recognition of traffic signs requires the use of classification algorithms, and they basically use visual information such as the shape and color of traffic signs. However, these algorithms face problems in real-time tests, and it is very difficult to achieve the detection of multiple targets, and it is necessary to accelerate the performance of the corresponding algorithms. Traffic sign recognition systems based on deep neural networks may have limitations in practical applications due to computational requirements and resource consumption. Most embedded systems interact directly with processes or the environment and make decisions based on their inputs. This makes the system reactive and responds in real-time to processing inputs to ensure proper operation. This paper presents a lightweight neural network for traffic sign recognition that achieves high accuracy and precision with fewer trainable parameters. To evaluate the efficiency and reliability of the proposed model based on convolutional neural network for traffic sign recognition, extensive experiments have been conducted on the GTSRB dataset. Also, the obtained results have been compared with several advanced architectures such as VGG16, MobileNetv2 and ResNet50. The results show that the proposed model has achieved good performance and emphasizes its potential for deploying real-time traffic sign recognition models and driving assistance systems. The computational efficiency and small size of the proposed model make it more practical and suitable for real-time traffic sign recognition. Manuscript profile
      • Open Access Article

        28 - Semantic deviations by taking a new look at the diagnostic industry in the poems of Muhammad Maghout
        ali pirani shal hosein abavisani soghra falahati zeinab Asadi Jafari
        The field of meaning is one of the most flexible levels in language, and this is why it transforms more than its other levels. The poems of the Syrian social poet, Muhammad al-Maghout, are collected in three poetry books: “Sadness in the moonlight”, “A More
        The field of meaning is one of the most flexible levels in language, and this is why it transforms more than its other levels. The poems of the Syrian social poet, Muhammad al-Maghout, are collected in three poetry books: “Sadness in the moonlight”, “A room with millions of walls” and “Joy is not my profession.” And you see all kinds of moral violations. One of these violations is indicative, which includes: simile, personification, personification, metaphor, and ... the art or making of the diagnosis was studied as a model for the types of semantic violations appropriate in the works of this contemporary poet and also “we tried to examine the use of a precise definition and Diagnosis in a literary text.There are two general sections, one of the two in terms of the semantics of any words and expressions in which the personification or embodiment is placed and that it falls into any group and the second section is the grammatical position of these words that is, that they use a compound "or as a sentence or a phrase." Each chapter is given an example from his poetry book. Manuscript profile
      • Open Access Article

        29 - بررسی آلودگی کبدهای گوسفند و گاو کشتار شده در کشتارگاه های استان البرز به کلستریدیوم نوای به روش های کشت بیوشیمیایی و PCR
        لیدا عبدالمحمدی خیاو علی رضایی کلوانی علی حق روستا
      • Open Access Article

        30 - استفاده از آزمون لکه گذاری نقطه ای با پیکره بورخولدریا مالئی برای تشخیص بیماری مشمشه در ایران
        سعید محمد حسینی نادر مصوری لیدا عبدالمحمدی خیاو
      • Open Access Article

        31 - بررسی فیلوژنیک ویروس طاعون نشخوار کنندگان کوچک شناسایی شده در دام های مبتلا در خراسان رضوی بر اساس دو ژن F و N
        جواد انصاری افشین رئوفی امید مددگار حمید رضا ورشویی سعید بکایی
      • Open Access Article

        32 - مقایسه روش های تشخیص سرولوژیکی تک یاخته نئوسپورا کانینوم در گاومیش
        مهدی پور مهدی بروجنی حسین حمیدی نجات مسعود قربانپور هدیه آصفی
      • Open Access Article

        33 - تشخیص ویروس بیماری نیوکاسل با استفاده از روش RT-PCR
        سید علی پوربخش عباس اشتری رضا ممیز فاطمه عشرت آبادی
      • Open Access Article

        34 - تشخیص بروسلا آبورتوس و بروسلا ملی تنسیس در شیر گاوها و گوسفندان استان کردستان با استفاده از واکنش زنجیره‌ای پلیمراز
        بهزاد شفیعی ملاحت احمدی حبیب دستمالچی ساعی
      • Open Access Article

        35 - سازه‌های مؤثر بر کارآفرینی در مناطق گردشگری شهرستان همدان (مطالعه موردی مناطق گردشگری بخش مرکزی)
        بیژن رحمانی پگاه مرید سادات سید حسین شاهد
      • Open Access Article

        36 - Review on Laboratory tests for Diagnosis of Hepatitis C Virus Infection
        Abbas Morovvati somayeh dehghani sanij Ashkan Dirbaziyan homa Azadegan shima Aghaei hasan vahidi emami
        Abstract Hepatitis C virus (HCV) infection is associated with chronic hepatitis, cirrhosis, and hepatocellular carcinoma. This review summarizes the pathogenesis and significance of serological and molecular-based assays and new methods in the diagnosis and management o More
        Abstract Hepatitis C virus (HCV) infection is associated with chronic hepatitis, cirrhosis, and hepatocellular carcinoma. This review summarizes the pathogenesis and significance of serological and molecular-based assays and new methods in the diagnosis and management of HCV infection after reading this article, readers should be able to describe laboratory tests used in the diagnosis and management of HCV infection. They should also be able to describe the general principles for selecting the most appropriate laboratory test for diagnosis, therapeutic decision making, and assessment of virologic response to therapy. New methods for diagnosis of HCV virus infection could help for HCV detection and virus Genotypes in patient. Molecular methods are very sensitive and specific for RNA diagnosis and uses of this test for HCV genotypes Because HCV genotypes different response to druges.HCV genotypes detection could help for follow up treatment by interferon of patient. Keywords: hepatitis C virus, hepatitis, hepatocellular carcinoma, molecular diagnostics Manuscript profile
      • Open Access Article

        37 - Nima’s Humanistic Approach to Nature
        محبوبه Basmal S.A. Mirabedini
        cffr
      • Open Access Article

        38 - اثربخشی درمان فراتشخیصی یکپارچه بر تمایزیافتگی زوجین متقاضی طلاق
        نوشین حاتمی حسن حیدری حسین داودی
      • Open Access Article

        39 - اثربخشی درمان فراتشخیصی یکپارچه‌نگر بر نگرش‌های ناکارآمد و فرسودگی زناشویی زنان دارای تعارضات زناشویی
        اکرم کلهر حسین داودی داود تقوایی حسن حیدری
      • Open Access Article

        40 - اثربخشی درمان فراتشخیصی یکپارچه بر اجتناب تجربه‌ای و تعارض کار-خانواده کارمندان دارای فرسودگی شغلی
        شهلا شیرانی زهره رئیسی حسینعلی مهرابی اکرم دهقانی
      • Open Access Article

        41 - analyse and comparison of heart and soul concept in Shams 's sonnets by relying on the personification array.
        Mahdi Mahouzi Mahboobeh Amirkhanloo Amirhosein Mahouzi mahmod tavoosi
        Among all abstract concepts that come in Shams 's sonnets, heart and soul with the most important and most frequently are the main. On the other hand, Mulana repeatedly personifies to these abstract elements that these images are intended to reflect the concepts and fea More
        Among all abstract concepts that come in Shams 's sonnets, heart and soul with the most important and most frequently are the main. On the other hand, Mulana repeatedly personifies to these abstract elements that these images are intended to reflect the concepts and features of these spirirual elements which have in his thought and path. This article seeks to analyse and classify of the heart and soul personafications,also recognizing the meaning of each one and consequently reaching a comparison of them. According to the images which have been personified , it seems that two abstract cobcepts of the meaning and scope of application together have a significant distance.Heart is an element which more tangible and closer to the Mulana and closely with him but soul is more distance and the poet is out of reach and followed by it, we look different behavior of the attribution of human's acts, features and qualities. Manuscript profile
      • Open Access Article

        42 - an approach to detect DDoS attacks in the cloud computing environment using entropy and particle swarm optimization
        mehdi asayeshjoo Mehdi sadeghzadeh maziyar ganjoo
        Cloud computing is an emerging technology that is widely used to provide computing, data storage services and other remote resources over the Internet. Availability of cloud services is one of the most important concerns of cloud service providers. While cloud services More
        Cloud computing is an emerging technology that is widely used to provide computing, data storage services and other remote resources over the Internet. Availability of cloud services is one of the most important concerns of cloud service providers. While cloud services are mainly transmitted over the Internet, they are prone to various attacks that may lead to the leakage of sensitive information. Distributed DDoS attack is known as one of the most important security threats to the cloud computing environment. This attack is an explicit attempt by an attacker to block or deny access to shared services or resources in a cloud environment. This paper discusses a hybrid approach to dealing with DDoS attack in the cloud computing environment. This method highlights the importance of effective feature-based selection methods and classification models. Here, an entropy-based approach and particle swarm optimization to counter these attacks in a cloud computing environment is presented. Classification on high-dimensional data typically requires feature selection as a pre-processing step to reduce the dimensionality. However, effective features selecting is a challenging task, which in this paper uses particle swarm optimization. Here, the proposed classification model is developed based on the use of a balanced binary search tree and dictionary data structure. The simulation is based on the NSL-KDD and CICDDoS2019 datasets, which prove the superiority of the proposed method with an average detection accuracy of 99.84% over the AGA and E-SVM algorithms. Manuscript profile
      • Open Access Article

        43 - Feature Extraction Framework for CBIR Systems based on Cyclic Transform Analysis & Spatial Information
        Shahin Shafei Hamid Vahdati Tohid Sedghi Asghar Charmin
        A novel framework of feature generation for Content based image retrieval (CBIR) is proposed. This system is realized on Cyclic transform Analysis (CTA). It introduces statistical descriptors in the signals frequency domain. Then the CT of data is computed by Semi super More
        A novel framework of feature generation for Content based image retrieval (CBIR) is proposed. This system is realized on Cyclic transform Analysis (CTA). It introduces statistical descriptors in the signals frequency domain. Then the CT of data is computed by Semi supervised algorithm (SSA) which is a simple & efficient algorithm. Presented Features are Norm-1 & energy CTA extracted from different sections of bi-frequency plane. This layout illustrate good characteristic in database. In addition, this manuscript illustrates a novel framework for generating textural and spatial information, and higher retrieval percentages. The textural features extracted with proposed CTA utilizing first & second moments among the image tiles is so effective in data processing. Spatial information is extracted utilizing decent field matrix (DFM). After that, moments are computed from DFM to get spatial features. The composition of the textural features and conjunction with the spatial information leads to a fantastic features matrix for retrieval. The experimental results on database guaranty the method efficiency on all classes of database with more than 10000 image. For measuring the distance of features a simple matching system based on Minkowski & Canberra distances is introduced. The results are compared with previous scholars and retrieval percentage is increased more than 10% in comparison with previous systems. Manuscript profile
      • Open Access Article

        44 - Diagnosis of Bearing Defects based on the Analysis of Vibration Images Using the RKEM SIFT Descriptor Method
        Zohreh Hashempour Hamed Agahi Azar Mahmoodzadeh
        Diagnosing bearing defects is one of the basic tasks in machine health monitoring, because bearings are critical components of rotating machines. This paper proposes a new method for detecting defects in bearings based on a combination of feature extraction algorithms i More
        Diagnosing bearing defects is one of the basic tasks in machine health monitoring, because bearings are critical components of rotating machines. This paper proposes a new method for detecting defects in bearings based on a combination of feature extraction algorithms in which a two-dimensional signal is used. Different from other classical one-dimensional signal processing methods, the proposed method of this paper converts one-dimensional vibration signals into two-dimensional signal (image), then image processing methods are used to analyze the image signal in order to classify the defects that have occurred. arrive at the bearing. Converted images from vibration signals often have specific texture characteristics, and the texture of each defective category is different. In addition, each descriptor extracts spatial features. Some features are weak and others are strong. In this article, the method of removing additional key points of SIFT (RKEM SIFT) is used. In addition, for each descriptor, the best features are selected using the non-linear principal component analysis method. Finally, the selected features are combined and four classification methods are applied to achieve the best classification performance and after comparison, the best classification method is selected. The performance of the proposed algorithm is evaluated on the standard bearing data set of Case Western Reserve University. The simulation results show that the proposed method performs better than other methods of fault finding of rolling bearings. Manuscript profile
      • Open Access Article

        45 - Design of Anomaly Based Intrusion Detection System Using Support Vector Machine and Grasshopper Optimization Algorithm in IoT
        Sepehr Sharifi Soulmaz Gheisari
        Computer networks play an important and practical role in communication and data exchange, and they also share resources with complete ease. Today, various types of computer networks have emerged, one of which is the Internet of Things. In the Internet of Things, networ More
        Computer networks play an important and practical role in communication and data exchange, and they also share resources with complete ease. Today, various types of computer networks have emerged, one of which is the Internet of Things. In the Internet of Things, network nodes can be smart objects, and in this sense, this network has many nodes and there is a lot of traffic in this network. Like any computer network, it faces its own challenges and problems, one of which is the issue of network intrusion and disruption. This dissertation focuses on detecting anomaly-based intrusion into the Internet of Things using data mining. In this study, after collecting and preparing data, the improved support vector machine with grasshopper optimization algorithm is used as a proposed method to detect anomaly-based intrusion in the Internet of Things. The bagging and k-nearest neighbor classifiers and Basic SVM are compared based on error types and standard performance criteria. The simulation results show 97.2% accuracy in the proposed method and better performance compared to other methods. Manuscript profile
      • Open Access Article

        46 - Distributed Denial of Service Attacks Detection in Internet of Things Using the Majority Voting Approach
        Habibollah Mazarei Marziye Dadvar MohammadHadi Atabakzadeh
        With the ever-increasing number of Internet of Things devices, their security is becoming a very worrying issue. Weak security measures enable attackers to attack IoT devices. One of these attacks is the distributed denial of service(DDOS) attack. Therefore, the existen More
        With the ever-increasing number of Internet of Things devices, their security is becoming a very worrying issue. Weak security measures enable attackers to attack IoT devices. One of these attacks is the distributed denial of service(DDOS) attack. Therefore, the existence of intrusion detection systems in the Internet of Things is of special importance. In this research, the majority voting group approach, which is a subset of machine learning, has been used to detect and predict attacks. The motivation for using this method is to achieve better detection accuracy and a very low false positive rate by combining several machine learning classification algorithms in heterogeneous Internet of Things networks. In this research, the new and improved CICDDOS2019 dataset has been used to evaluate the proposed method. The simulation results show that by applying the majority voting Ensemble method on five attacks from this data set, this method respectively has achieved accuracy of detection 99.9668%, 99.9670%, 100%, 99.9686% and 99.9674% in identifying DNS, NETBIOS, LDAP, UDP and SNMP attacks which better and more stable performance in detecting and predicting attacks have achieved than the basic models . Manuscript profile
      • Open Access Article

        47 - Brain image segmentation (MR) using fuzzy classification algorithm Along with the Silhouette method
        Alireza Malahzadeh Amin Javadinasab Amin Aliabadi
        Image segmentation is an essential step in image analysis. This article deals with the segmentation of brain images based on the intensity of brain magnetism. Each medical image of a human contains distinct areas. These areas can be represented by the wavelet coefficien More
        Image segmentation is an essential step in image analysis. This article deals with the segmentation of brain images based on the intensity of brain magnetism. Each medical image of a human contains distinct areas. These areas can be represented by the wavelet coefficient. Classification of these properties can be performed using the fuzzy classification method. Edge recognition techniques have been used to identify the edge in the input image. The Silhouette method has been used to determine the power of the categories. Eventually, the different areas of the image become color-coded and encoded. Manuscript profile
      • Open Access Article

        48 - improving intrusion detection systems by feature reducing based on genetics algorithm and data mining techniques
        Mehdi Keshavarzi hossein Momenzadeh
        The network-based computer systems play critical role in our modern society; so there is highly chance these systems might be target of intrusion and attacks. In order to implement full-scale security in a computer network, firewalls and other intrusion prevention mecha More
        The network-based computer systems play critical role in our modern society; so there is highly chance these systems might be target of intrusion and attacks. In order to implement full-scale security in a computer network, firewalls and other intrusion prevention mechanisms aren’t always enough and needs other systems called intrusion detection systems. An Intrusion detection system can be set of tools, algorithms and evidence that help to identify, locate and report illegal or not approved activities by the network. Intrusion detection systems can be established by software or hardware systems and each have their own advantages and disadvantages. Because of various characteristics of intrusion detection data, in this research we select effective characteristics using improved genetic algorithm. Then by means of standard data mining techniques, we present a model for data classification.For performance evaluation of this suggested method, we used NSL-KDD database that has more realistic records than other intrusion detection data.                                                                           Manuscript profile
      • Open Access Article

        49 - Multimodal biometric system combining fingerprint and iris at decision level
        Fatemeh Keshavarzi Kaveh Pashaei Hossein Momenzadeh Haghighi
        Mono-modal biometric systems, by using only a biometric feature to determine the identity of individuals, we will face some problems such as noisy data, low distinction biometric feature, unacceptable error rates and spoofs attacks. But by using multi-modal biometric sy More
        Mono-modal biometric systems, by using only a biometric feature to determine the identity of individuals, we will face some problems such as noisy data, low distinction biometric feature, unacceptable error rates and spoofs attacks. But by using multi-modal biometric systems, we will largely overcome these problems and increase the performance and reliability of biometric identification even more, because these systems in comparison with mono-modal biometric systems have more accuracy and greater security. In this regard, this study combines two common and widely used biometric trait fingerprint and iris at the level of decision-making by using the fuzzy logic method. Therefore we have used CASIA database for iris and FVC2004 database for the fingerprint. Results of tests and studies indicate that the proposed combination of biometric systems has more precision and reliability than mono-modal biometric systems. In the fusion system, the error Type I (FAR) and Type II (FRR), respectively are 0.3% and 1.2%. Manuscript profile
      • Open Access Article

        50 - The simulating of optical sensor based on selective resonance coupling
        sahel Javahernia
        Refractive index sensors are one of the most widely used sensors in the bioelectronics and optoelectronics industries. The use of materials and structures that can detect the refractive index of unknown materials has important applications in biochemistry and medical en More
        Refractive index sensors are one of the most widely used sensors in the bioelectronics and optoelectronics industries. The use of materials and structures that can detect the refractive index of unknown materials has important applications in biochemistry and medical engineering. In this paper, a polymer-based dual-core photon crystal fiber is introduced to measure the refractive index of a fluid. The size of the holes of the analyte cores and the light-transmitting solid core are engineered to be able to pass the main single mode. Due to its cheapness, high mechanical ability and ease of fabrication, the photon crystal fiber substrate is made of PMMA polymer. After simulating the structure and using the existing mathematical relations and examining the diffusion modes, for the complete transfer of light from the solid core to the core of the analyte channel, a fiber length of 0.13 cm has been obtained. The simulation results show that for a refractive index of 1.44, a sensitivity value of 1000  and a detection limit can be achieved by this sensor. All simulation steps in the field of FDTD are obtained in Lumerical software. Manuscript profile
      • Open Access Article

        51 - The effect of Friedman and Rosenman personality typology model on tax recognition and collection
        Soleiman ، Shahriarpoor Bahareh Banitalebi Dehkordi
        Personality typology is one of the most controversial topics in psychology, according to which the role that a person plays in the workplace can be identified and evaluated, and people can be employed according to their moods and personality traits. In this article, wit More
        Personality typology is one of the most controversial topics in psychology, according to which the role that a person plays in the workplace can be identified and evaluated, and people can be employed according to their moods and personality traits. In this article, with the help of Friedman and Rosenman typology model, an attempt was made to investigate the effect of 4 types of personality types A, B, C and D of tax officials on tax identification and collection. For this purpose, the required data have been collected and analyzed through 5 categories of questionnaires completed by all tax officials of the General Department of Tax Affairs of Chaharmahal and Bakhtiari Province. The results showed that there is a significant relationship between the type of personality type of tax officials and tax recognition and collection. According to the research findings, considering that the decision to choose a job and profession is one of the most important and crucial issues in the life of each person and since each person has a unique personality type, so to get acquainted with different dimensions of human existence. And creating motivation, better communication, maintaining and providing mental health in individuals and ultimately the optimal realization of organizational goals, considering the personality type of staff is a necessary thing that should be paid special attention by managers. Manuscript profile
      • Open Access Article

        52 - Hydrogen Peroxide Detector Based on Ag/TiO2 Nanostructure
        M. Simyari F. Safari
      • Open Access Article

        53 - A comparison of schemas in sex offenders and non-offenders
        اعظم نوفرستی سعید اکبری
          The purpose of this study was to compare early maladaptive schemas in sex offenders and non-offenders.The present study is a descriptive-post hoc study. From male sex offenders over 18 years old in Rajayee Shahr and Qezelhesar prisons in 2009 (1388s.c.), 45 sex o More
          The purpose of this study was to compare early maladaptive schemas in sex offenders and non-offenders.The present study is a descriptive-post hoc study. From male sex offenders over 18 years old in Rajayee Shahr and Qezelhesar prisons in 2009 (1388s.c.), 45 sex offenders as were selected. 45 non - offenders as control group were also matched with them in terms of their age, marriage status, education and job Early Maladaptive Schema questionnaire - short form SQ-SF (Young, Smith et al.,1995) was applied to collect the data. Stepwise discriminant analysis showed that the four schemas of abandonment, mistrust, dependence and vulnerability, respectly from the most to the least, could predict sex offenses. Abandonment, instability, mistrust, dependence Incompetence and vulnerability play a principle role in identifying the difference between sex offenders and no offenders (P<0.001). So, cognitive-behavioral therapies on sex offenders should emphasize on both automatic thoughts and early maladaptive schemas Manuscript profile
      • Open Access Article

        54 - The Validity of MCMI-III (Millon, ) Scales
        علی‌اکبر شریفی حسین مولوی کوروش نامداری
          The purpose of this study was to investigate the diagnostic validity of MCMI-III (Millon, ) Scales in an Iranian population. The diagnostic validity of MCMI-III Scales was examined among psychiatric patients. Using operating characteristics (prevalence, sensitivity an More
          The purpose of this study was to investigate the diagnostic validity of MCMI-III (Millon, ) Scales in an Iranian population. The diagnostic validity of MCMI-III Scales was examined among psychiatric patients. Using operating characteristics (prevalence, sensitivity and specificity) of MCMI-III Scales, the predictive powers (positive, negative and overall) of the Scales was calculated. The results showed very good diagnostic validity for all MCM-III scales. Findings suggest MCMI-III Scales were found having high PPPs, NPPs and OPPs. The PPPs ranged from. to , and The NPPs ranged from to also OPPs ranged from to for all scales. Thus MCMI-III is a valid inventory and it can be used for Diagnosis personality disorders and clinical syndromes. Manuscript profile
      • Open Access Article

        55 - Construction and Standardization of Organizational Psycho-Pathologic Diagnostic Test
        منوچهر کامکار منوچهر کامکار علی دلاور حسن احدی حسین آزاد
        The main purpose of this research was to construct and standardize an organizational psycho-pathologic diagnostic test among industrial-productive and administrative-serving Organizations in Isfahan city. For this purpose the first organizational psycho-pathologic diagn More
        The main purpose of this research was to construct and standardize an organizational psycho-pathologic diagnostic test among industrial-productive and administrative-serving Organizations in Isfahan city. For this purpose the first organizational psycho-pathologic diagnostic questionnaire was prepared with questions on the basis of preliminary administration on workers ( from industrial-productive and from administrative-serving Organizations) and theoretical constructions. Then, operant workers were randomly selected ( from industrial-productive and from administrative-serving Organizations) and the questionnaire was administered to them. Finally, items were selected for organizational psycho-pathologic diagnostic test on the basis of two criteria including positive correlation with a total score of test and positive factorial load on only one factor. The construct validity of the test was investigated with an exploratory factor analysis and Varimax method of rotation. Six factors were found: dramatic (with questions), depressed (with questions), psychotic (with questions), paranoid (with questions), anxious (with questions), obsessive-compulsive (with questions), organizations. These six factors accounted for percent of the total scales variance. Eigen value of this factors were and . Internal consistency and test-retest reliability showed that the alpha for six sub-scales was. and respectively. The split-half coefficients also were. and respectively. The result of test-retest showed that timing reliability coefficients of the scale and sub-scales were. and and the total was significant (P < ) the total test-retest coefficients also were in addition to evidences related to the validity and reliability questionnaire, statistical standards, such as mean, standard deviation, percentile ranks (from to percentile ranks) and standard scores (such as Z,T and Stanine scores) was also prepared and presented. Manuscript profile
      • Open Access Article

        56 - Comparison of the effectiveness acceptance and commitment therapy and transdiagnostic therapy on sexual function and components of personality type D. in people with cardiovascular disease
        Majid Amiri hasan khoshakhlagh Parinaz Sadat Sajadian Hasan Rezaei_Jamaloei
        The aim of the study was to compare the effectiveness of acceptance and commitment therapy and transdiagnostic therapy on sexual function and personality type D components in cardiovascular patients.The research method was semi-experimental with a pre-test-post-test des More
        The aim of the study was to compare the effectiveness of acceptance and commitment therapy and transdiagnostic therapy on sexual function and personality type D components in cardiovascular patients.The research method was semi-experimental with a pre-test-post-test design and a 2-month follow-up with the experimental and control groups. 51 cardiovascular patients in Isfahan city in 1401 were selected using the purposeful sampling method and randomly assigned to two experimental groups and one control group(Three groups of 16 people). The research tools were the Rosen (2002)Male Sexual Performance Questionnaire and the Denolt(2005) Personality Type D Questionnaire. The experimental groups received the treatment in 9 sessions of 90 minutes and once a week, and the control group was waiting for the treatment. The data were analyzed using the statistical method of analysis of variance with repeated measurements. The effectiveness of acceptance and commitment therapy and transdiagnostic therapy was on sexual function and personality type D components in cardiovascular patients (P&lt;0.001) and there was no significant difference between the effectiveness of both methods. Manuscript profile
      • Open Access Article

        57 - Change detection of Oak forests using object-based classification of multitemporal Landsat imageries (Case study: forests of the northern province of Ilam)
        Hashem Rostam Zadeh Sadrolah Darabi Hejar Shahabi
        Oak is the dominant forest species in the Zagros mountains, it is seen as a semi dense forest in western provinces. Multiple droughts, development of cities and villages, land use change from forest to farmland, are&nbsp; the main causes of forest destruction in Ilam. T More
        Oak is the dominant forest species in the Zagros mountains, it is seen as a semi dense forest in western provinces. Multiple droughts, development of cities and villages, land use change from forest to farmland, are&nbsp; the main causes of forest destruction in Ilam. The purpose of this research is to determine the change detection of forest land to other land uses, using multi temporal TM sensor images (April 1986) and OLI (April 2015). In object-based classification, the data segmentation&nbsp; as initial phenomena, with appropriate scale and compression parameters for each image, was performed. Two classifying phenomena,&nbsp; nearest neighbor method and fuzzy functions were used. Land use classes were prepared by specifying training points and using the normalized difference vegetation index (NDVI). The Overall accuracy of the TM image was 88% and OLI image 94%, and the kappa coefficient for the TM and OLI image was calculated 84% and 91%, respectively. By post classification comparison method, the change matrix&nbsp; for each districts and changes forest to other uses was formed. The results showed that all districts faced with the phenomenon of deforestation and forest wide change (-42%) have been made. Manuscript profile
      • Open Access Article

        58 - Automated ridgeline recognition, using Kernel neighborhood pattern analysis
        Kourosh Shirani Sina Solhi Fatemeh Nematolahi
        Background and Objective Landform refers to any physical feature of the surface with a recognizable structure and shape. Landform elements and structural forms of the terrain surface could, directly and indirectly, drive many other environmental variables. Numerical rep More
        Background and Objective Landform refers to any physical feature of the surface with a recognizable structure and shape. Landform elements and structural forms of the terrain surface could, directly and indirectly, drive many other environmental variables. Numerical representation of the surface and uneven pattern of the earth is a common topic in geographical, geomorphological, geological, and geophysical hazard mapping as well as sea-bed exploration. The combination of the earth and computer science with mathematics and geomorphometric engineering interacts with discrete and continuous landforms. Geomorphometry dates back to about 150 years ago and the work of Alexander von Humboldt and geomorphologists, and today with the revolution in computer science and especially digital computer models is developing rapidly. Detection and classification of landforms are of interest to GIS developers, geoscientists, and geomorphometry researchers. In this way, the desired work units are extracted with higher speed and accuracy and used in the form of vector and raster maps. Existing approaches are mainly based on height, terrain derivative, gradient, curvature, flow direction, slope position, morphometric indices, and the like. Also, less attention has been paid to the challenge of matching the diagnostic scale with the Landform scale, and most models have this shortcoming. On the other hand, less attention has been paid to the possibility of vectorization output results and also to the analysis of sensitivity and temporal response algorithms to machine processing. In this research, we attempted to recover and resolve the mentioned shortcoming and problems in the previous works. In this research, using basic algorithms of raster analysis and coding, new methods and algorithms for the automatic detection of landforms have been developed. Focal raster analysis is also emphasized and the moving window technique is used to implement the algorithms. Facing the scale challenge, sensitivity analysis, and the response algorithms to input changes as well as accuracy assessment are other aspects that have been addressed in this research.Materials and Methods In this study, the Digital Surface Model (DSM) published by the Japan Space Agency in May and October 2015 with a horizontal resolution of about 30 meters was used to work on the topography of the region. These data are obtained from ALOS satellite images. This database is based on DSM data (5m network version) 3D topography, one of the most accurate elevation data on a global scale. The digital elevation model was transformed into a matrix structure using a Python coding environment. Then, raster analysis was implemented using the moving window technique. The moving window algorithm was coded in a way that the dimensions of the moving window could be freely determined and changed. In proportion to the size of the moving window, some adaptive algorithms are implemented to automatically correct and organize the edge effect in proportion to the size of the moving window. In this study, automatic landform detection was performed using spatial analysis of kernel patterns in the raster grid of digital elevation models and the results were presented in the form of three algorithms applied in the detection of topographic peaks and ridges. These algorithms include Multilevel Mean Summit Recognition Algorithm (MLMSR), Complex Multilevel Summit Recognition Algorithm (CMLSR), and Single Point Summit Recognition (SPSR). Each of these three algorithms was first conceptually designed and then coded and executed using the Python programming language. In the next step, the sources of error and specific scenarios of the algorithms were examined. The sensitivity of each algorithm related to the dimensions of the moving window, the resolution, and the size of the raster file, was evaluated, and finally, the accuracy and validation of the three models, using reference layers that were manually prepared and plotted, were assessed. All the procedures were designed in a way that could easily be implemented in an official software and were completely compatible with the structure of machinery processing. Also, being automatic and working on different platforms where one of our priorities.Results and Discussion In the automatic detection of peaks and ridges using a digital terrain model, kernel spatial pattern analysis was used. In this regard, three proposed algorithms in this field were designed, coded, and executed. The output results of each of the algorithms were presented in the form of a raster and vector data model. Accuracy and sensitivity assessments were performed by considering changes in moving window size, resolution, and raster grid size (row x column) for each of the algorithms. The MLMSR algorithm tends to be in a more binary result in the lower dimensions of the moving window, while the CMLSR and SPSR algorithms do not. In all algorithms, increasing the size of the moving window causes a more generalization ratio. CMLSR and SPSR algorithms are more suitable for cartographic and visual purposes due to the higher degree of grading in the results. Regarding the temporal performance (Runtime) or sensitivity to input changes, the SPSR algorithm performs better. This is especially important when the input file size (number of rows and columns) is large. According to the results of validation and accuracy evaluation, MLMSR and SPSR had better performance than, the CMLSR algorithm. Python programming language has been widely used in the design and implementation of all algorithms, as well as in the field of sensitivity evaluation and validation. Totally more than 500 lines of codes were done for this purpose. All algorithms are automated and are able to execute and store results in raster and vector format using machine processing.Conclusion The results show that the MLMSR algorithm in smaller dimensions of the moving window is tending to more binary results, which is problematic in some graphical and cartographic applications, but the CMLSR and SPSR algorithms showed more gradual trends in their outputs and so, they performed better in this respect. Researchers who intend to study and develop in this field are advised to focus on adaptive algorithms and optimize the dimensions of the moving window in relation to the volume of input information and so, in this way, they increase the flexibility of algorithms in relation to input changes. Manuscript profile
      • Open Access Article

        59 - Presenting A Hybrid Method of Deep Neural Networks to Prevent Intrusion in Computer Networks
        Mohsen Roknaldini Erfaneh Noroozi
        Introduction: Nowadays, computer networks have significant impacts on our daily lives, leading to cybersecurity becoming a crucial area of research. Cybersecurity techniques mainly encompass antivirus software, firewalls, and intrusion detection systems. Intrusion dete More
        Introduction: Nowadays, computer networks have significant impacts on our daily lives, leading to cybersecurity becoming a crucial area of research. Cybersecurity techniques mainly encompass antivirus software, firewalls, and intrusion detection systems. Intrusion detection system is one of the fundamental security tools in the field of computer networks and systems. The primary goal of an intrusion detection system is to identify and alert about any unauthorized activities, threats, or attacks on a system or network. By analyzing the flow of data and network/system events, the intrusion detection system attempts to identify patterns and indicators related to various attacks and intrusions. Intrusion detection systems can operate based on rules or learning. In the rule-based approach, algorithms and rules created by security experts and analysts are used to detect patterns and identify attacks. However, in the machine learning approach, machine learning algorithms and deep neural networks are employed to extract patterns and features related to attacks from real data. Method: This study focuses on the examination and presentation of a combined approach using deep neural networks to prevent intrusions in computer networks. The primary objective of this research is to enhance the efficiency of intrusion detection systems. To achieve this goal, a combined approach of deep learning and artificial neural networks is proposed. This approach utilizes deep neural networks to detect more complex features and improves the model&#039;s performance. Results: Simulation results demonstrate that deep neural network methods such as MLP, CNN, LSTM, and GRU yield favorable outcomes compared to other single-layer machine learning techniques. In this study, two combined methods, CNN-GRU and CNN-LSTM, were introduced and tested on the KDD CUP&#039;99 dataset for comprehensive analysis and evaluation. Both combined approaches exhibit high accuracy and lower classification errors compared to other introduced methods. Therefore, it can be concluded that the CNN-LSTM combined approach performs well on the KDD CUP&#039;99 dataset. Discussion: Based on the achieved results, the combined CNN-LSTM and CNN-GRU methods offer very good performance with accuracies of 99.95% and 99.92%, respectively, on the KDD CUP&#039;99 dataset. Among these methods, minor differences in the performance of some parameters for classes may exist, yet both approaches remain acceptable. Hence, it can be concluded that the combined CNN-LSTM approach performs well on the KDD CUP&#039;99 dataset. Manuscript profile
      • Open Access Article

        60 - Intrusions detection system in the cloud computing using heterogeneity detection technique
        Ali Ghaffari Rozbeh Hossinnezhad
        Introduction: The distributed structure of cloud computing makes it an attractive target for potential cyberattacks by intruders. In this paper, using the anomaly detection approach, a method for embedding an intrusion detection system for cloud computing is presented. More
        Introduction: The distributed structure of cloud computing makes it an attractive target for potential cyberattacks by intruders. In this paper, using the anomaly detection approach, a method for embedding an intrusion detection system for cloud computing is presented. Therefore, by studying how to check the parameters and the combined role of the parameters in the detection of penetration in the cloud, a method for detecting suspicious behavior in the cloud is provided. The most logical way to detect an intrusion is to use supervised methods to learn the parameters of normal customer behavior. Therefore, the detection of biased behavior in the form of suspicious behavior was implemented and discussed, investigated, and compared with an initial simulation in the form of identifying abnormal behavior in different behavioral areas by the neural network.Method: In this article, the basis of abnormality detection in different aspects is to examine the behavior of users and use the capabilities of reproducing inputs in RNN neural networks. In these networks, during the training of the network, the weights are adjusted in such a way that they can minimize the average square of the error so that the network can produce common repeating patterns well. Therefore, after training, these networks cannot reproduce well the input patterns that are actually significantly different from the training samples. Hence, these networks are able to identify anomalies in the tested sets. Accordingly, RNN networks are used here to model normal behavior.Findings: The simulation results show that the proposed method, which is based on the recurrent neural network, can improve the false positive, false negative, and detection accuracy compared to the classification method.Discussion: In this article, the detection of biased behavior in the form of suspicious behavior was implemented and discussed, investigated, and compared with an initial simulation in the form of identifying abnormal behavior in different behavioral fields. The simulation results show that the proposed method, which is based on the iterative neural network, can improve the false positive, false negative, and detection accuracy compared to the classification method. Manuscript profile
      • Open Access Article

        61 - Providing a Solution Based on Fuzzy Logic to Reduce False Positive Alarms in The Intrusion Detection System
        Mohammad Akhlaghpour
        Introduction: The intrusion detection system is responsible for identifying and detecting unauthorized external use of the system that is misused or damaged by internal users. Therefore, the intrusion detection system is created in the form of software and hardware, eac More
        Introduction: The intrusion detection system is responsible for identifying and detecting unauthorized external use of the system that is misused or damaged by internal users. Therefore, the intrusion detection system is created in the form of software and hardware, each of which has its own advantages and disadvantages. The speed and accuracy of the hardware system and the failure of their security by intruders are other features of such systems. If the software related to intrusion detection, acceptability, and the difference between different operating systems are used, they give more generality to the software systems. More suitable software systems are chosen.Method: The behavior of the intrusion detection system is discussed in opposition to various intrusion methods, and in order to deal with intrusion into the system and computer networks, several methods have been created under the name of intrusion detection, which monitors the events that have occurred in a system and into computer networks.Results: the performance of the intrusion detection system is presented in order to influence the behavior of the abuse detection system as well as anomaly detection using fuzzy logic based on an alpha device. The obtained results showed the accuracy rate up to 91.26% and the detection of false alarms up to 90.96%.Discussion: An Intrusion detection system is essential as the first line of defense for the network. Many algorithms depend on the quality of the data set provided for intrusion detection. Of course, in recent developments in knowledge data collection access systems, there has been an increase in interest in data-driven approaches to curb the increase in control system cyber-attacks related to false alarms. Most machine learning-based intrusion detection systems rely on web applications/operating systems or network layers to detect targeted attacks by host or network. Nevertheless, there is still a lack of sufficient research in the evaluation and collection of intrusion detection system datasets for false alarm behaviors, which requires further studies in this field. Manuscript profile
      • Open Access Article

        62 - Using the Modified Colonial Competition Algorithm to Increase the Speed and Accuracy of the Intelligent Intrusion Detection System
        Mohammad Nazarpour Navid Nezafati Sajjad Shokouhyar
        Introduction: In recent decades, rapid development in the world of technology and networks has achieved, also there is a spread of Internet of thing services in all fields over the world. Piracy numbers have increased, also a lot of modern systems were penetrated. Thus More
        Introduction: In recent decades, rapid development in the world of technology and networks has achieved, also there is a spread of Internet of thing services in all fields over the world. Piracy numbers have increased, also a lot of modern systems were penetrated. Thus the developing information security technologies to detect the new attack become an important requirement.Method: One of the most important information security technologies is an Intrusion Detection System (IDS) that uses machine learning and deep learning techniques to detect anomalies in the network. In all of the information processing systems, detecting cyber-attacks is one of the main challenges and its effects can be blocked or limited by timely detection of attacks. The IoT system is no exception to this phenomenon, and with the high development of this technology and the expansion of its infrastructure, the need for an intelligent intrusion detection system with high accuracy and speed is essential. Neural networks are modern systems and computational methods for machine learning, knowledge representation, and the application of acquired knowledge to maximize the output accuracy of complex systems. Neural networks have already been used to solve many problems related to pattern recognition, data mining, data compression and research is still underway with regards to intrusion detection systems. One of the disadvantages of using training with classical methods in neural networks is getting stuck in local optimal points. In this paper, we use the meta-heuristic algorithm of Imperial competition algorithm (ICA) to train neural networks and show that in the field of intrusion detection in the IoT system, it can show much better accuracy and speed to classical training methods.Results: Results show that our proposed method has 90% accuracy. This method has a better performance in comparison to classical neural network that has 75% accuracy.Discussion: In this article, we will show that the use of imperial competition evolutionary optimization algorithms instead of traditional methods can increase the accuracy of the IDS system. In addition, evolutionary optimization algorithms are zero order and less complicated than gradient methods. Therefore, using this method, in addition to reducing the cost of system implementation, can increase the speed and accuracy of intrusion detection. In addition, from reliability point of view, we will show that the ICA-based systems are more stable in different implementations. Manuscript profile
      • Open Access Article

        63 - Face Recognition in Images Using Viola_Jones Method and Image Texture Analysis
        Mahdi Hariri Narmineh Heydarzadeh
        Introduction: Face recognition is one of the most important biometric technologies for people identification, also used in access control. Face recognition is one of the important steps before identity recognition. Usually, one method is used to detect the presence of f More
        Introduction: Face recognition is one of the most important biometric technologies for people identification, also used in access control. Face recognition is one of the important steps before identity recognition. Usually, one method is used to detect the presence of faces in images. Still, in this research, to increase the accuracy of detection, the combination of two methods is used to improve the detection performance: Viola-Jones algorithm and the matching of image components and texture with face and skin components. In the first step, we use the Viola-Jones algorithm to detect the facial features. In the next step, the features of the eye and nose tissues are analyzed with regression neural networks, and facial features are recognized better according to the facial features. In this research, the texture features of the right and left eyes and the nose of the face are used to increase the matching accuracy. We have used the faces of the FDD-Fold dataset to evaluate the proposed method. Comparing the performance of this method with the RCNN deep network method with a much smaller number of training data, we reached an accuracy of 96.36%, more than the deep learning network. This method gives good results in systems with limited computing ability and average amount of data.The face recognition system is one of the biometric identification systems and one of the most important technologies for people identification, which is also used in access control. Face identification is one of the few biometric methods that, with the advantages of high accuracy and low level of human intervention, is used in cases such as information security, law enforcement and monitoring, traffic control, and registration in attendance systems. This method creates more convenience and development with fewer requirements. then, this method has received more attention during the last twenty years.Face detection is a local binary classification problem that shows the presence of faces in the given image using boxes surrounding them. Although the Viola-Jones method is less accurate than modern methods such as convolutional neural networks; Its much lower efficiency and training parameters compared to the millions of parameters of a typical CNN result in faster training, better accuracy with limited data, and its use in devices with limited computing power such as cameras and mobile phones. The innovation of this method is matching the geometric pattern of the edges to identify the presence of the face in the image, along with matching the skin texture. This method seems to be faster and more accurate than the previous ones.Method: In this research, in the first step, we use Viola-Jones, one of the optimal face recognition algorithms in the image, to detect facial components. In the next step, we use the adaptation of the general shape of facial parts such as eyes, and match the textures in the image with the predicted texture for human skin, to improve the recognition performance and increase the recognition accuracy, in such a way that the regression neural networks examine the eye and nose tissue characteristics and according to the characteristics of the facial tissue, the facial components are recognized by the regression neural network. The investigated features in the texture include minimum and maximum color intensity, mean and median, and variance of the image. The data is given to the regression neural network for training. Here Remarkable thing is matching the overall shape of the human head and face, and in the next step matching the overall shape of the facial parts such as the eyes to improve the accuracy of the presented method. We also use the matching of textures in the image with the texture predicted for human skin to further improve the accuracy of the program's performance. Manuscript profile
      • Open Access Article

        64 - The Biodistribution Evaluation Of Radiolabeled Herceptin in SourisMice
        Samira Rasaneh Fariba Joharyha
        Inroduction and ObjectiveThe monoclonal antibodies are thespecific proteins that used widely in targeted therapy.Herceptin is a monoclonal antibody that is used for treatment of breast cancer. In this study, the radiolabeling of Herceptin antibody with technetium was ev More
        Inroduction and ObjectiveThe monoclonal antibodies are thespecific proteins that used widely in targeted therapy.Herceptin is a monoclonal antibody that is used for treatment of breast cancer. In this study, the radiolabeling of Herceptin antibody with technetium was evaluated as the first step in the production of a new radiopharmaceutical agent.Materials and Methods:All the quality control tests include radiochemical purity, immunoreactivity, stability in phosphate buffer and human blood serum were determined and finally the biodistribution study of this complex in souris mice was performed.Results: The radiochemical purity of the complex was 97±2%. The stabilities in phosphate buffer and in human blood serum at 24 hours post preparation were 84±1% and 75±2%, respectively. The immunoreactivity of the complex was 86±3%. No specific accumulation of activity was found in mice organs.Conclusion:The findings showed that the new radiopharmaceutical can be a promising candidate for diagnostic applicationsin wide spectrum of human cancers.  Manuscript profile
      • Open Access Article

        65 - Design and Implementation of a Surveillance Security System Based on YOLO Algorithm and IoT Technology on Mobile Data Network
        Mohamadreza Masaeli Sayed Mohammadali Zanjani
        The design and implementation of a surveillance security system based on the YOLO algorithm and Internet of Things (IoT) technology has significant advantages in terms of security, efficiency, scalability, rapid response, and reliability, compared to traditional methods More
        The design and implementation of a surveillance security system based on the YOLO algorithm and Internet of Things (IoT) technology has significant advantages in terms of security, efficiency, scalability, rapid response, and reliability, compared to traditional methods. This paper discusses the aspects of creating a novel security system that activates an alert by detecting five categories: human, human head, gun, knife, and fall detection. The system is monitored online and can connect to the internet via a cellular data network at any location to upload images to the management panel and send a report to the user if threats are detected. The YOLOv8 algorithm is used for object training to take advantage of its user-friendly command line interface, object detection support, sample segmentation, and image classification capabilities. To increase processing speed while maintaining accuracy, the optimized model is deployed on the Raspberry Pi 4th generation board. It is clear that optimizing processing speed and using quantization techniques lead to reduced energy consumption (green energy system) and reduced operational costs of the system. To improve the speed of the model in the object detection process, the techniques of exporting, quantizing the training weights, and increasing the processor frequency (overclocking) are used. A comparison of the newly exported weights with the original training weights in terms of accuracy and speed shows that the two techniques of exporting and quantization lead to an increase in processing speed at the cost of a decrease in detection accuracy.Finally, in the training model with the proposed improvement methods, an average accuracy of mAP ≅ 0.67 with a frame rate of FPS ≅ 4.3 can be achieved. Manuscript profile
      • Open Access Article

        66 - A new Approach to Detecting Intrusion and Malicious Behaviors in Big Data
        Homa Movahednejad Mohsen Porshaban Ehsan Yazdani.Chamzini Elahe Hemati Ashani Mahdi Sharifi
        Today, maintaining information security and intrusion detection is very important to deal with malicious behaviors in massive data. In this article, a hybrid method for detecting malicious data is presented wherein three factors of time progress, history of users and sc More
        Today, maintaining information security and intrusion detection is very important to deal with malicious behaviors in massive data. In this article, a hybrid method for detecting malicious data is presented wherein three factors of time progress, history of users and scalability are taken into account. The proposed method utilizes storage and feature extraction techniques to increase the speed and reduce the amount of calculations. In addition, the support vector machine algorithm has been modified for classification, and the parallelized bacterial foraging optimization algorithm has been used for feature extraction. The results show that the proposed algorithm outperforms the existing methods in terms of detection rate by 21%, false positive rate by 62%, accuracy by 15% and execution time by 70%. The reduction in execution time indicates that less energy is needed to run the algorithm which results in saving energy and can be beneficial for use in green energy systems. Manuscript profile
      • Open Access Article

        67 - The Mystics and the Virtue of Eating Halal Food
        Maryam Haghi Zahra Salehi Sadati
        The miracles of mystics and their related anecdotes constitute a large volume of mystical stories and is one of the key topics in Persian mystical texts. In a general classification, different types of miracles are divided into three main types: Notification of the unse More
        The miracles of mystics and their related anecdotes constitute a large volume of mystical stories and is one of the key topics in Persian mystical texts. In a general classification, different types of miracles are divided into three main types: Notification of the unseen, aristocracy of insides, and possession of the universe, each of which includes several sub-types. One of the sub-types of the miracles of notification of the unseen is the recognition of the forbidden or suspicious nature of the morsel and the food through food and divine instruction. This dignity is based on the Sufi belief that if absolute blood covers the whole world, the believer will eat nothing except halal. In this dignity, the mystic without any signs and sometimes with signs such as moving a finger vein, not reaching for the forbidden, feeling full and not going down the forbidden morsel from the throat, calling to the heart, speaking of forbidden food, seeing blackness, Impurity and blood in food and ... is associated. Opponents of mystics sometimes used this method to test their legitimacy, and often, after being recognized as a mystic, they sought forgiveness and became mystics' followers. In this article, while collecting, classifying and analyzing such miracles in earlier mystical books, it has been tried to point out recent examples of this virtue. Manuscript profile
      • Open Access Article

        68 - Structure And Content of Animation and Personification in Mullavi´S Masnavi with an Emphasis on Mystical Function
        Ebad Rezapour Bahram Khoshnoodi Ahmadreza Nazari
        Animation is one of the fundamental elements of mythology . Myths give us some truth about belief ,knowledge and worldview of human ancestors. mythology has an inseparable bound with illuminism thoughts and theosophical and also poetic imagination .Mowlavi because of p More
        Animation is one of the fundamental elements of mythology . Myths give us some truth about belief ,knowledge and worldview of human ancestors. mythology has an inseparable bound with illuminism thoughts and theosophical and also poetic imagination .Mowlavi because of possessing a strong illumination and imaginative ideas in poetry,Mowlavi puts himself in space of Animation unconsciously. He presents&nbsp; lots his theosophical thoughts in Masnavi through animation which is a sub-heading&nbsp; for personification. In this article we have a look at the Animation and personification theories , and outlined their function in Masnavi.Then we have represented them in Mowlavi&acute;s thoughts and emotions through plenty of examples. The most important result of this research is the re-prove of expression and aesthetics role in induction of Mowlavi&acute;s thoughts to his readers. The present research has obtained its data through written document ,books and articles and elaborated them by analytical methods. Manuscript profile
      • Open Access Article

        69 - Diversity of morphometric characteristics of Eurygaster integriceps in Kurdistan Province
        Javad NAZEMI RAFIE Mostafa MANSOURGHAZI Sara SALEHI
        The wheat bug, Eurygaster integriceps (Hemiptera: Scutelleridae), is one of the major wheat pests causing high yield loss in terms of wheat production in the Iran. Morphometric differentiations may explain biogeographic distinctions among populations of a given species. More
        The wheat bug, Eurygaster integriceps (Hemiptera: Scutelleridae), is one of the major wheat pests causing high yield loss in terms of wheat production in the Iran. Morphometric differentiations may explain biogeographic distinctions among populations of a given species. &nbsp;The shape variations of female and male adults were evaluated by 12 morphometric indexes. Sampling was conducted in May and July of 2012 in Kurdistan Province. 30 samples of female adults and 30 samples of male adults were sampled from each of selected areas (sum 600 samples from 10 areas). Results showed that female adults divided to three clusters. Female adults were larger than male adults. Female population collected from Ghorve area had the maximum length (12.11&plusmn;0.05) and width (7.64&plusmn;0.03) of body, length (3.3&plusmn;0.02) and width (7.27&plusmn;0.02) of pronotum and width of scutellum (5.25&plusmn;0.02 mm). Results of discriminant analysis (DFA) showed that female adults can differentiate populations (36.7%) more that male adults (32.7%). cluster analysis differentiated female and male populations completely by UPGMA method. Manuscript profile
      • Open Access Article

        70 - یک روش جدید برای کشف پلاک خودروهای ایرانی با استفاده از تطبیق الگو و یک کلمه خاص در پلاک
        ساناز فیضی شاهین اکبرپور
      • Open Access Article

        71 - تشخیص بدافزار با یک رویکرد حساس به هزینه مبتنی بر ترکیب طبقه‏‌بندها با روش پلکانی
        اعظم سادات مقدم قدیری جلالی Hassan Shakeri یاسر علمی سولا
      • Open Access Article

        72 - جبران داده‌های مفقود پزشکی با ترکیب شبکه بیزین و ماشین یادگیری مفرط
        الهه صباحی سید محمد حسین معطر رضا شیبانی
      • Open Access Article

        73 - مروری بر سیستم‌های تشخیص نفوذ از دیدگاه ساختار و روش‌های بهبود کارایی در آنها
        شهرزاد رحیمی مسعود نیازی سیدعابد حسینی
      • Open Access Article

        74 - تشخیص ایمیل‌‌های هرزنامه با استفاده از ترکیب الگوریتم‌‌های کلونی مورچه و آدابوست
        مهدی قربانی‌وند فرهاد سلیمانیان قره چپق
      • Open Access Article

        75 - تشخیص و تحلیل سرطان پستان با استفاده از پردازش تصاویر MRI دارای کنتراست دینامیکی
        شبنم زارع نهندی جعفر رزم آرا مسعود پور عیسی
      • Open Access Article

        76 - استفاده از منطق فازی برای تشخیص ارقام فارسی
        عباسعلی رضائی فرزانه کیمیائی
      • Open Access Article

        77 - Seasonal abundance and identification key of Orius spp. (Hemiptera: Anthocoridae) in Fars Province
        H. Ostovan F. Homayoon Sh. Hesami M. Fallahzadeh
        Family Anthocoridae, are as biological control agents in many agroecosystems. The seasonal abundance and distribution of Orius species were determined from different crops, trees, flowers and weeds in Fars province during 2016-2018. In this study Orius&nbsp; albidipenni More
        Family Anthocoridae, are as biological control agents in many agroecosystems. The seasonal abundance and distribution of Orius species were determined from different crops, trees, flowers and weeds in Fars province during 2016-2018. In this study Orius&nbsp; albidipennis (Reuter), Orius laticollis discolor (Reuter), Orius laticollis laticollis (Reuter), Orius&nbsp; horvathi (Reuter), Orius&nbsp; minutus (Linnaeus), Orius vicinus (Ribaut), Orius&nbsp; retamae Noualhier, Orius laevigatus inaequalis*Wagner, Orius laevigatus laevigatus (Fieber), Orius laevigatus maderensis* (Reuter), Orius niger aegyptiacus Wagner, Orius niger niger (Wolff), Orius&nbsp; piceicollis* (Lindberg) were collected on different 63 host plants from 50 regions in Fars province. Among them the species and subspecies marked with * were new records for Iran. The Simpson diversity indices of Spring, Summer, Fall and Winter seasons were 3.954, 4.082, 3,793 and 1 respectively. Seasonal diversity of Orius spp. In Summer were significantly higher than other seasons. O. niger niger was found to be active throughout the year. The other species of Orius were collected in spring, summer and autumn, O. piceicollis, O. retamae and O. laevigatus inaequalis were only active in summer. O. niger niger and O. albidipennis were the most collected Anthocorid species. From results it is concluded that O. niger niger and O. albidipennis are well adapted to the geographical conditions and plant biodiversity in Fars province. Therefore, they could be considered as biological control agents in fields. &nbsp; Manuscript profile
      • Open Access Article

        78 - Study and comparison of morphological characteristics of dwarf honey bees, Apis florea F. (Hymenoptera, Apidae) in Iran
        Sh. Parichehreh M. B. Farshineh Adl M. Fallahzadeh
        The dwarf honey bee, Apis florea F. is one of the two species of honey bees in Iran which is found in southern, southeastern and western provinces. In present study, some morphological characters of dwarf honey bee and effects of geographic and climatic conditions on mo More
        The dwarf honey bee, Apis florea F. is one of the two species of honey bees in Iran which is found in southern, southeastern and western provinces. In present study, some morphological characters of dwarf honey bee and effects of geographic and climatic conditions on morphological changes were studied. For this purpose, 600 worker bees were collected from 30 colonies in Sistan-Baluchestan, Hormozgan, Kerman, Fars, Bushehr, Khuzestan and Kohkiluyeh-Boyer Ahmad during year 2010. Then, 17 morphological characteristics were measured and 10200 data were obtained. To determine geographical and climatic variables, average values collected by meteorological stations were used. Analysis of variance of morphometric characters showed that characteristic of hind metatarsus width had the lowest diversity. However, length of half loop over the third and fourth dorsal abdominal segments, length of hind leg and tongue had the highest diversity as the most distinctive morphological characteristics throughout the Iranian dwarf honey bee. The number of right wing hooks were more than left wing hooks. So, it is suggested to count just the number of right hooks. The bees from Kohkiluyeh and Boyer Ahmad were significantly larger than the other bees in length of the third and fourth dorsal abdominal segments as well as length and width of the front wings and hind leg, while, bees from Hormozgan and Bushehr were the smallest throughout the studied regions. There was a significant positive correlation between the width of the third and fourth dorsal abdominal segments, length and width of the front wing and length of hind leg. There was also a significant negative correlation between the length of tongue and length of fore wing and cubital index. Besides, there was a significant positive correlation within specification of the third and fourth dorsal abdominal segments, length and width of the front wings, and length of legs in dwarf bees with latitude, elevation and annual rainfall. Results indicated that bees from highlands are larger and also confirmed that wing of honey bees in elevated and high rainfall areas has less hook numbers. Manuscript profile
      • Open Access Article

        79 - The Relationship between Generalized Anxiety Disorder's Symptoms And Trans-diagnostic Factors With Sexual Function Disorder In Women
        Mohammad Ali Hossein Savarzade Ahmad Mansouri
        The aim of this study was to investigate the relationship between symptoms of generalized anxiety disorder and trans-diagnostic factors with sexual function disorder in women. For this purpose, in a descriptive-correlational study, 231 women referred to health centers i More
        The aim of this study was to investigate the relationship between symptoms of generalized anxiety disorder and trans-diagnostic factors with sexual function disorder in women. For this purpose, in a descriptive-correlational study, 231 women referred to health centers in Mashhad in 2016 were selected by available convenience sampling method. The participants completed Generalized Anxiety Disorder 7-item Scale (GAD-7) (2006), Cognitive Avoidance Questionnaire (2008), Intolerance Of Uncertainty Scale (1994), Metacognition Questionnaire (2004), Acceptance And Action Questionnaire-II (2011), Cognitive Emotion Regulation Questionnaire (2006) and Female Sexual Function Index (2000). Data were analyzed by Pearson correlation coefficient and regression analysis. The results showed that there was a significant relationship between symptoms of generalized anxiety disorder and sexual dysfunction in women. Also, there was a significant relationship between trans-diagnostic factors and sexual dysfunction in women. Finally, the results indicated that symptoms of generalized anxiety disorder and related factors of trans-diagnostic (intolerance of uncertainty and maladaptive adaptive cognitive emotion regulation strategies) predicted the symptoms of sexual dysfunction in women. Manuscript profile
      • Open Access Article

        80 - The effectiveness of integrated transdiagnostic therapy on marital intimacy, mental vitality and emotional expression in women with marital burnout.
        Parvaneh Zanganeh mohsen rasouli Maryam Akbari
        Introduction : marriage is a turning point in human life and one of the most important decisions of any person throughout life, factors such as arguments and arguments may threaten the health of living together. Methods of reducing health-related problems include integr More
        Introduction : marriage is a turning point in human life and one of the most important decisions of any person throughout life, factors such as arguments and arguments may threaten the health of living together. Methods of reducing health-related problems include integrated meta-diagnostic therapy. The aim of this study was to investigate the effectiveness of integrated meta-diagnostic therapy on marital intimacy, mental vitality and emotional expression in women with marital burnout. Method: semi-experimental research design with pre-test design-post-test with control group. Statistical research community includes women with marital burnout visiting counseling and psychological centers of the secret family, hope tomorrow, life of the city in the second six months of 1402, of which 150 were. To select the sample size, 24 women with high marital burnout were selected based on targeted sampling methods and based on entry and exit criteria, and were randomized in two groups as an integrated meta-diagnostic test group (12 people) and a witness Group (12 Participant). The experimental group received ten 45-minute sessions of integrated meta-diagnostic therapy Barlow et al. (2011) once a week. Findings: the data were analyzed using the covariance analysis test in SPSS version 26 software. The P rate was considered less than 0.05 meaningful. Findings: results of covariance analysis showed that integrated meta-diagnostic therapy has a significant effect on marital intimacy, mental vitality and emotional expression in women with marital burnout(001/0&gt;P). The effect on the marital intimacy variable was 832/0% on the Etta coefficient, 567/0% on the mental life variable, and 731/0% on the emotional instrumentation variable. Conclusion: therefore, the results of the present study show that integrated meta-diagnostic therapy can lead to improved marital intimacy, emotional expression and mental vitality in women with marital burnout. So this finding can be of interest to family counseling centers, psychologists, and couples.Extended AbstractIntroductionMarriage is a turning point in human life and one of the most important decisions of every person during his life. In fact, marriage has been described as one of the most important and necessary human relationships, because it provides the basic structure for establishing a family relationship and raising the next generation. Among the main reasons for marriage are mainly the experience of love and affection, having a partner and companion in life, satisfying emotional and psychological needs, increasing happiness and satisfaction, and experiencing growth and perfection (Bazargan, Ramezani, Atashpoor, &amp; Amiri, 2021) and the family is also one It is one of the main pillars of society and the smallest part of society, and it is considered as one of the most effective environments in a person's sexual and mental health (Soltani Zadeh, &amp; Bajlani, 2020).&nbsp;&nbsp;&nbsp;&nbsp; One of the most common social phenomena that threatens the institution of the family, and its effect not only on the family but also on the whole society, is marital burnout. According to Hu, Jiang and Wang (2019), the basic elements of a healthy marriage include intimacy, commitment and marital satisfaction. Therefore, women's satisfaction with their life and overall health depends more on their marital happiness than men. Marital compatibility is satisfaction from marriage and prevention of any coldness and exhaustion, which leads to tension and conflict as an inseparable and permanent part of marriage and marital relations, and if the couple cannot resolve it well, it will have destructive effects on the family along with states that one of them is the phenomenon of marital exhaustion (Shah Rajabian, &amp; Emadi Chamesi, 2019).&nbsp;&nbsp;&nbsp;&nbsp; One of the variables that can play an irreplaceable role in the stability of married life and reducing burnout is intimacy (Gohari, Zahra Kar, &amp; Nazari, 2014). From the point of view of Bagarozi (2014), the intimacy of emotional and romantic experience with another person is defined. Similarly, the concept of intimacy is often defined as relationships combined with love, which include warm feelings, closeness, connection and affection (Chan, Tu and Wong, 2015). Intimacy is a dynamic concept in human relationships, especially in couple relationships, which means openness and non-inhibition in relationships and the closeness of two people in various emotional, logical and functional dimensions (Azari, Kazemian Moghadam, &amp; Mehrabi Zadeh, 2020).&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Another variable that can play a reducing role in couples' marital exhaustion is the concept of mental vitality. Mental vitality shows inner experiences full of energy, and in fact having mental and physical energy is necessary to experience a sense of enthusiasm and vitality, and it has a complex structure that is related to functioning and experiencing optimal functioning (Charles, Carver, Michael , &amp; Schemer, 2014). Another important factor that affects the strength and durability of the family and the reduction of marital exhaustion is emotional expression (Korani, 2022). According to King and Emmons (1990), expressiveness in itself is not a factor for health, but rather a person's underlying feeling about self-expressiveness that can determine its benefit or loss (Vahdani, Khazri, Mahmoudporou Farah Bakhsh, 2020). Due to different factors such as anxieties and pressures that enter a couple's life and become more intense and sometimes unbearable; In addition to them, one of the interventions that has not been paid much attention to its effects and effectiveness on marital burnout can be mentioned the integrated metadiagnostic therapy (Allen, McHugh, &amp; Barlow, 2008). Therefore, according to the history and the importance of societal interventions in the field of marriage and its consequences, and taking into account the lack of research in the field of interventions on intimacy, vitality and marital exhaustion, the main issue in this research is whether Does integrated transdiagnostic therapy have an effect on intimacy, mental vitality and emotional expressiveness in women with marital burnout?MethodologyThe current research is practical in terms of purpose and semi-experimental in terms of method with a pre-test-post-test design with a control group. The statistical population of the study included women with marital burnout who referred to the counseling and psychological centers of the Razi family, Omid Farda, Hayat Shahr Karaj in the second 6 months of 1402, who gave their informed consent to participate in this research. In order to select a sample size of 24 women with high marital burnout based on the purposeful sampling method and based on the inclusion criteria including willingness to participate in treatment, having marital burnout and a high score in the questionnaire (147), no legal action for divorce, having At least one child, age range between 25 and 45 years, having at least a diploma, no acute medical-physical problems, no severe mental disorder using (BSI_53), no simultaneous treatment intervention, no abuse of alcohol and psychoactive substances. Based on the client's self-declaration, not separating from his wife and exit criteria including not participating in more than three consecutive sessions and four non-consecutive sessions, divorce and separation from his wife during counseling sessions were selected. In this way, firstly, 150 women referring to counseling and psychotherapy centers were administered the Marital Exhaustion Questionnaire, and then 24 women who obtained the highest score in this questionnaire were selected in two groups. They were randomly assigned as a single hyperdiagnostic test group (12 people) and a control group (12 people). People in the control group, as well as people who were diagnosed with high marital burnout but could not participate in the treatment sessions due to the limitation in the number of samples, were put on the waiting list to receive treatment.ResultsThe average age of women in the test group was 37 years and in the control group was 16/39 years. Data analysis was conducted to determine the effectiveness of integrated meta-diagnostic therapy on marital intimacy, mental vitality, and emotional expression in women with marital burnout. According to Table 2, the average score of marital intimacy, mental vitality and emotional expression in the post-test phase increased in the test group compared to the control group, but in the pre-test phase there were few changes.&nbsp; Covariance analysis test was used to determine the significance of this difference given that it is necessary to inhibit the pre-test effect. Before using the covariance analysis test, its assumptions were examined. The shapirovilk test was used to check the normality of the distribution of pre-test and post-test scores. Accordingly, the meaningful level for all variables was greater than 0.05 and the assumption of normality of the distribution of scores was accepted. Another hypothesis of the implementation of the multivariate covariance analysis test was the homogeneity of the variance of dependent variables among groups, which was used to examine the establishment of the Levin test. Levin's test results were not meaningful in any of the variables. Therefore, the assumption that variables are homogeneous was confirmed. The box test was used to check the homogeneity of the covariances Matrix, and its meaningful level was obtained equal to 0.519. Since this value was larger than the meaningful level (001/0) required to reject the null assumption, the hesmani matrix of covariances was approved. The results of the covariance analysis are presented in Table 3.Table 1: Intertestable effects of multivariate covariance analysis after testing the variables of marital intimacy, mental vitality and emotional expression The results of the multivariate covariance analysis show that the intervention of integrated meta-diagnostic therapy (by controlling the pre-test effect as a conjugating factor on the post-test) has had a significant impact on increasing marital intimacy, mental vitality, and excitement.DiscussionThe results showed that integrated transdiagnostic therapy has a significant effect on marital intimacy, mental vitality and emotional expression in women with marital burnout. This finding is consistent with the studies of Soleimani, Amir Fakhrai, Karamati (2020) Samavi because they showed that transdiagnostic psychotherapy has an effect on intimacy and reducing depression. Therefore, according to the study, integrated transdiagnostic treatment has a very important effect on reducing depression, because this treatment is designed for emotional disorders. This intervention approach helps women with depression by providing emotional awareness based on the present, cognitive flexibility, emotional avoidance and behaviors arising from emotion, awareness of emotions and their tolerance, endogenous (mental) and situation-based emotional exposure. slow to face stressful cases of negative emotions and solve them. The studies of Zimzani and Imani (2015) have also shown that extradiagnostic treatment has been very effective in reducing the symptoms of depression.ConclusionOne of the biggest challenges that couples who are stuck in a negative exchange is not finding a compatible way out of this crisis (Khojaste Mehr, Mohammadi, Sudani, &amp; Abbaspour, 2018). Negative interactions increase the probability of divorce and decrease the positive aspects of marriage such as satisfaction, commitment, friendship and trust in the relationship. Couples who can manage burnout in a relationship by using positive methods and using less negative interactions create an environment where there is more opportunity for mental vitality and agreement about family problems, and this is one of the important ways to reduce Exhaustion is in the relationship (Johansson, 2019).LimitationsThe study was conducted on a specific population that may limit the generalizability of results. Future studies should consider a larger and more diverse sample to increase the application of findings to different populations. The timeframe of this study may limit understanding of the long-term effects of treatment. A longitudinal approach can provide further insight into the sustainable effects of interventions. In addition, comparing the effectiveness of the treatment used in this study with other therapeutic interventions can provide a more comprehensive understanding of their relative strengths and weaknesses. Future research should be aimed at understanding the underlying mechanisms through which therapies apply their effects, helping to correct and effectiveness of therapeutic interventions. The findings of this study should be integrated with caution in clinical practice according to the specific areas and needs of individuals. Counselors and psychologists may use the insights from this study to better adapt their approaches when dealing with marital burnout and emotional experiences, and ensure that interventions are culturally and contextually appropriate.Conflict of interestThis research was taken from the doctoral thesis and was carried out under the supervision of the ethics committee of the Islamic Azad University, Sanandaj branch, with the code of ethics IR.IAU.SDJ.REC.1401.095. Also, the cooperation of the participants was voluntary and their consent was declared. In addition, they were informed about the confidentiality and opt-out aspects of the research at each stage.FundsThe current research is derived from a specialized doctoral thesis and was carried out without financial support.AcknowledgementsI would like to express my gratitude to the supervisor and the couples who participated in this research.&nbsp; Manuscript profile
      • Open Access Article

        81 - Jurisprudence of the Guardian Council over the expediency of the system in the shadow of the Constitution
        Hasan Khosravi Mohammad javad Hosseini
        The simultaneity of the chairmanship of the Expediency Council and the twin membership of the same person as a jurist of the Guardian Council, according to the constitution, creates new issues in the relationship between legal and political institutions of Iran. Althoug More
        The simultaneity of the chairmanship of the Expediency Council and the twin membership of the same person as a jurist of the Guardian Council, according to the constitution, creates new issues in the relationship between legal and political institutions of Iran. Although there is no contradiction in the silence of the Constitution, the internal regulations of the Parliament, the Guardian Council, and the Assembly, this appointment raises questions and assumptions in the implementation stage of the Constitution, which is inconsistent with some general legal principles, such as the principle of neutrality of the dispute resolution authority. It can be observed by looking at the constitution that many principles do not have the capacity of this appointment and are silent in the face of it. The results of this research show the weight of the scales in favor of the jurists of the Guardian Council in the Assembly, the questioning of impartiality when examining cases of disagreement and plurality and the difficulty of performing the duties of these two positions for one person.The lack of attention of the legal circles to this appointment and its challenges has caused the authors to scrutinize more, and the innovation of the research lies in the explanation of the new and ambiguous relationships between these three institutions. Manuscript profile
      • Open Access Article

        82 - Prediction of Creativity on the basis of Alexithymia’s Components
        Mansour Bayrami Morteza Andalib Kourayem Rasoul Mofasseri Naser Torabzade
        &nbsp; Background: One of the basis of humanity achievement is creativity. There are several factors that can increase and decrease the amount of creativity; according to the literature one of these factors is Alexithymia. Purpose: The type of relation and effects of Al More
        &nbsp; Background: One of the basis of humanity achievement is creativity. There are several factors that can increase and decrease the amount of creativity; according to the literature one of these factors is Alexithymia. Purpose: The type of relation and effects of Alexithymia on&nbsp; creativity&nbsp; in Iran is not investigated yet. Thus, the aim of the study was &nbsp;prediction of creativity on the basis of Alexithymia&rsquo;s components in Tabriz university students. Method: A number of 211 students were chosen by the &nbsp;ratio sampling method. For data collection Abedi Creativity Scale and Toronto Alexithymia Scale (TAS-20) were used. The data were analyzed in SPSS 18.0 using Pearson correlation coefficient and multivariate regression method. Results: according to the results, creativity negatively correlated with alexithymia&rsquo;s component and also the results showed that alexithymia&rsquo;s components (difficulty identifying feeling, difficulty describing feeling, externally oriented thinking) significantly predict creativities changing&rsquo;s. Hence, only beta coefficient of difficulty identifying feelings significantly can explain creativity. Conclusion: The study pointed that high creativity levels is associated with low Alexithymia dimensions, therefore for increasing creativity, researchers can plan programs that reduce Alexithymia. &nbsp; &nbsp; &nbsp; &nbsp; Manuscript profile
      • Open Access Article

        83 - Investigate the Effect of Support on Damage Detection in Plates, Using Two-Dimensioal Discrete Wavelet transform
        مجتبی حسینی امیرمحمد امیری پیمان بیرانوند محمد حسین ناصری فرد
        To ensure the safety of structures and their serviceability for the sightly purposes, all structures, especially important structures, needs continuous and regular evaluation and monitoring. For this reason, methods for monitoring and damages detection in structures, ha More
        To ensure the safety of structures and their serviceability for the sightly purposes, all structures, especially important structures, needs continuous and regular evaluation and monitoring. For this reason, methods for monitoring and damages detection in structures, has emerged. In this article, using wavelet transform method, damages detection in plates with different supporting conditions, is discussed. For this reason, a squre plate with one meter side is considered and supposes its support conditions as four fixed sides, four bearing sides, three fixed sides and cantilever. Damages modeled by rectangular cracks with thickness reduction method. For each supporting state, cracks with different depth checked. Finally, obtained responses from plate finite element analysis, using two-dimensional discrete wavelet transform, analyze and detectable most shallow crack, at any supporting state, is obtained. It can be seen that, this method shows the crack locations by peak points and abrupt changes in wavelet coefficient graph, and that in four fixed sides state, cracks down to one percent relative depth, in three fixed sides state, cracks down to three percent relative depth, in four bearing sides state, cracks down to six percent relative depth and in cantilever state, cracks down to 30 percent relative depth, are detectable. It can be seen that, by increasing the plate fixity, ability of the proposed method to detect tiny cracks will further. The obtained results are useful for design and evaluation of plate form structures and prevent the formation and progression of tiny cracks. Manuscript profile
      • Open Access Article

        84 - Spam Detection by Game theory
        Samaneh Ghods
        There are number of datamining applications that are fighting with Adversaries, Spam filtering to intrusion detection is as an example. For reducing the classifier accuracy, Adversary intentionally manipulate data. Consequently, in all these applications initially succe More
        There are number of datamining applications that are fighting with Adversaries, Spam filtering to intrusion detection is as an example. For reducing the classifier accuracy, Adversary intentionally manipulate data. Consequently, in all these applications initially successful classifiers will decline easily. In this paper, we model the interaction between the classifier and the adversary as a two players sequential game then we model the interaction as an optimization problem and solve it using evolutionary strategy. Finally, simulation results show the good performance of the proposed algorithm, and improves accuracy spam detection on several real world data sets. Manuscript profile
      • Open Access Article

        85 - Defects Detection of Rotating Machine Using ‎Vibration Analysis and Neural Network ‎
        Seyed Majid Ataei Ardestani
        The base of diagnosing the possible defects of a machine is comparing the frequency &lrm;spectra of the vibrations at different points with the existing reference spectra. Due to the &lrm;needless stoping of machine for investigation of its various parts, use of this &l More
        The base of diagnosing the possible defects of a machine is comparing the frequency &lrm;spectra of the vibrations at different points with the existing reference spectra. Due to the &lrm;needless stoping of machine for investigation of its various parts, use of this &lrm;troubleshooting method is affordable; Also, regarding to progress of possible &lrm;defectes, the machine can be rapaired in any required times. In this study , using &lrm;Neural Network (MLP and FNN), firstly common defects in rotating machines were created &lrm;separately, then the produced vibrational frequency were measured by ADASH 4400 &lrm;analyzer. Introducing four vibrational characteristics including angular misalignment, &lrm;clearance, failure and unbalance of bearing as input data of artificial neural network ,the &lrm;results were compared to the reference frequency signals. The results show that neural &lrm;networks MLP and FNN increase the defects detection ability by 73% and 78%, &lrm;respectively. So, FNN method is proposed for useful life prediction and detection of rotating &lrm;parts.&lrm; Manuscript profile
      • Open Access Article

        86 - Target Vehicle Identification in Curved Roads in Adaptive Cruise Control Systems
        Reza Hasiri Behrooz Mashhadi
        Today, adaptive cruise control systems play an important role in automotive technology. The performance of adaptive cruise control systems has a significant impact on the level of satisfaction of a self-driving car. Vehicles equipped with adaptive cruise control maintai More
        Today, adaptive cruise control systems play an important role in automotive technology. The performance of adaptive cruise control systems has a significant impact on the level of satisfaction of a self-driving car. Vehicles equipped with adaptive cruise control maintain distance with the vehicle in front, control speed, and prevent accidents using their technology and with the help of radar antennas, cameras, or laser rangefinders. However, adaptive cruise controls are incapable in some cases such as detecting vehicles on curved roads. In this project, A real-time solution has been proposed to solve this problem. This method will be validated with the help of data obtained from open-source maps and satellite images of roads, and, finally, the results will be analyzed. The performance of the method is evaluated as appropriate so that the risk of accident is reduced to zero because of the correct identification of target vehicles within a normal ACC range. It also has the capability of correct identification of non-target vehicles. Manuscript profile
      • Open Access Article

        87 - Improving Energy Conversion Efficiency in Pest-Detector WSN Environments Using Genetic Programming-Based Data Aggregation
        Mohammad Ahmadinia Fahimeh Azampour
        Wireless Sensor Networks (WSNs) have numerous applications in agriculture, including pest detection to ensure high crop yields. However, energy optimization is a major challenge for WSNs, particularly with regard to the energy consumption of sensor nodes. To address thi More
        Wireless Sensor Networks (WSNs) have numerous applications in agriculture, including pest detection to ensure high crop yields. However, energy optimization is a major challenge for WSNs, particularly with regard to the energy consumption of sensor nodes. To address this challenge, in this paper, is proposed a novel approach for improving energy conversion efficiency in WSNs for pest detection in agriculture environments, using genetic programming-based data aggregation. The proposed approach is implemented in MATLAB software, and the results are compared with previous works to validate its effectiveness in improving energy conversion efficiency. By optimizing energy conversion, the proposed approach can enhance the accuracy and effectiveness of pest detection while minimizing energy consumption, prolonging the lifespan of sensor nodes, and supporting sustainable and eco-friendly agriculture practices. Manuscript profile
      • Open Access Article

        88 - اثربخشی درمان فراتشخیصی یکپارچه بر هیجان خواهی و ترس از ارزیابی منفی دختران آسیب دیده از فضای اینستاگرام
        غزال زند کریمی زهره سادات علوی
      • Open Access Article

        89 - Altered expression of long noncoding RNAs and p53 as a possible genetic signature in luminal A invasive breast ductal carcinoma
        Nahal Eshghifar Fatemeh Rouhollah Nooshin Barikrow Farkhondeh Pouresmaeili Mohammad Taheri
        Introduction: Breast cancer is the second most common cause of cancer-related death among females. The long non-coding RNAs (lncRNAs) are a significant population of non-coding RNAs with well-defined functions in both adjacent normal cells and tumorigenesis. Miss expres More
        Introduction: Breast cancer is the second most common cause of cancer-related death among females. The long non-coding RNAs (lncRNAs) are a significant population of non-coding RNAs with well-defined functions in both adjacent normal cells and tumorigenesis. Miss expression of them has been associated with the development of different kinds of cancers.Purpose: The aim of this study was to investigate the alterations in 3 lncRNAs and p53 in tissue samples of a group of women with luminal type A breast adenocarcinoma.Material and method: In this case-control study, the expression levels of p53 and three lncRNAs were evaluated in association with luminal A breast cancer in 80 ductal carcinoma tumors and adjacent normal breast tissues.Quantitative real-time PCR was used to measure the expression of the mentioned genes. The data were analyzed using t-tests.Result: The expression levels of IGFBP7-AS1, and RHPN1-AS1, showed a significant increase (P&gt;0.05) while P53 and LINC00861 had a significant decrease in expression level in tumor tissues compared to adjacent normal tissues (P&gt; 0.05). Receiver Operating Characteristic (ROC) curve indicated the diagnostic power of LINC00861 in differentiating tumor tissues from adjacent normal tissue with 90% sensitivity and 96% specificity, which can also interact with P53.Based on the area under the curve (AUC) value, expression of Linc00861, p53, RHPN1-AS1, and IGFBP-AS1 genes can help to differentiate patients from healthy individuals with diagnostic power of 0/855, 0/824, 0/778, and 0/659, respectively.Conclusion: The key roles of the latest genes in the control of cancer-related pathways and the dysregulation of their expression in studied malignancies imply that they can be exploited as biomarkers for cancer diagnosis, prognosis, and possible therapeutic targets. Here, the roles of lncRNAs in invasive breast ductal carcinoma type luminal A and their importance in prognosis and patient treatment are discussed. Manuscript profile
      • Open Access Article

        90 - Developing a Native Model for Recognizing and Exploiting Entrepreneurial Opportunities in the field of e-commerce
        Mohsen Varzeshkar Morteza Mousakhani Ali Davari Kambiz Heydarzadeh
        The concept of opportunities and factors influencing the identification and exploitation of entrepreneurial opportunities is one of the central aspects of the subject matter of entrepreneurship as an interdisciplinary scientific domain. Awareness of effective factors an More
        The concept of opportunities and factors influencing the identification and exploitation of entrepreneurial opportunities is one of the central aspects of the subject matter of entrepreneurship as an interdisciplinary scientific domain. Awareness of effective factors and methods of identifying entrepreneurial opportunities as a first step in the entrepreneurial process has a decisive role in choosing profitable opportunities and avoiding failures in the entrepreneurial process. Despite studies on this subject, however, due to its impact on environmental variables and indigenous conditions, ambiguities can be identified in this regard. Considering the need of many potential entrepreneurs to identify effective factors as well as understanding how to identify and exploit opportunities, this study aims to provide a native model that meets the ecosystem conditions of Iran to identify and exploit opportunities. In order to achieve the main and the secondary goals of the research, as well as the response to the research, the mixed method research has been used. So that at the first step, the qualitative method and deep interviews tools used for the generation of the model, and in the second step, the quantitative method and questionnaire tool is used to collect information from companies active in the field of e-commerce in order to validate the model. In This research, online retail is selected as the subject of study and its achievements in these types of businesses and in the context of Iran can be analyzed. Manuscript profile
      • Open Access Article

        91 - The Impact of new Venture Strategies on Diagnose Entrepreneurial Opportunities in Entrepreneur Firms
        Seyed Mahdi Alvin Davood Hosseinpour Hamed Ganjizadeh MoradLo
        This study with aim of the effect of new venture strategy on diagnosis entrepreneurial opportunities in parand entrepreneurial companies writen. This study is, functional and quantitative approach and the method of data collection, correlation. The study population will More
        This study with aim of the effect of new venture strategy on diagnosis entrepreneurial opportunities in parand entrepreneurial companies writen. This study is, functional and quantitative approach and the method of data collection, correlation. The study population will all managers in the industrial township of Tehran Province (197 ceo) are the estimated number (125-CEO) to randomly selected and studied. The Data through software Smartpls and Spss analyzed. The results showed a positive and significant impact of new venture strategy is to diagnosis entrepreneurial opportunities in entrepreneurial companies and mean variables in the study population have been evaluated at an acceptable level. The effect of three components of the independent variable (product innovation, market breadth and marketing alliance strategy) on the dependent variable (diagnosis of entrepreneurial opportunities) factors of differentiation of marketing approval but was rejected. The dimensions are impressive, the market breadth has been more effective than others. Manuscript profile
      • Open Access Article

        92 - Strategic Capacity of Managers Based on Job Recognition, Job Variability, Organizational Support and Job Adjustment
        Alireza Mooghali Maryam Farami Rahman MoshiriZadeh
        The purpose of this study was to determine the predictive model of managers' strategic ability based on professional recognition, organizational support, job diversification and job adjustment in the General Directorate of Imam Khomeini Relief Committee of Fars province More
        The purpose of this study was to determine the predictive model of managers' strategic ability based on professional recognition, organizational support, job diversification and job adjustment in the General Directorate of Imam Khomeini Relief Committee of Fars province in 1397. In this study, This descriptive-correlational study was conducted. The statistical population included all employees of the General Directorate of the Imam Khomeini Relief Committee of Fars province. Morgan table was used to determine the sample size. The estimated sample was 140 people using this table. A stratified sampling method was used to select statistical sample.The direct and positive direct effect of job diversification on managers 'strategy ability was 0.75; the direct and positive effect of job support on managers' strategy ability was 0.63 The direct and positive impact of professional recognition on the ability of managers' strategy is equal to 0.79; the direct and positive effect of job adjustment on the ability of managers is equal to 0.61; the indirect and positive effects of professional recognition and the ability of managers to adjust through job adjustment The indirect and positive effects of job diversification and managers' strategy ability through job adjustment is 0.37. The direct and indirect affection of job support and the ability of managers to adjust through job matching is 311%. Professional recognition, organizational support, job diversification and job adjustment in the General Directorate of Imam Khomeini Relief Committee of Fars province are able to predict the strategic capability of managers. Manuscript profile
      • Open Access Article

        93 - Survey of relationship between familiarity and applying of educational assessment methods by faculties of Islamic Azad University, Ardabil Branch teachers and faculties
        Azam Rastgoo Yousef Namvar Sadraddin Sattari
        &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Educational assessment is one of teacher profession skills and effective factor in effective teaching. The purpose&nbsp;of study&nbsp;was survey of familiarity and applying of edu More
        &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Educational assessment is one of teacher profession skills and effective factor in effective teaching. The purpose&nbsp;of study&nbsp;was survey of familiarity and applying of educational assessment methods (pre-assessment, formative and summative) by Islamic Azad University, Ardabil Branch teachers and faculties. Research was applied research and the method was descriptive. Research population were 650 faculties and teachers and research sample were 311 people that selected by stratified random sampling method. Researcher-made questionnaire were used to collect data. Content validity were surveyed and accepted by experts and the questionnaire reliability was accounted by alpha cronbach and it was .85. Data were analyzed by Spss software. The results showed that there are significant relationship between familiarity and applying of educational assessment methods by faculties and teachers. Manuscript profile
      • Open Access Article

        94 - Evaluation of Drought Tolerance of someWinter Wheat Genotypes
        Rana Naderi Zarnaghi Reza Fotovat
        Drought stress is one of the main limiting factors crop production in arid and semiarid regions. In this study, drought tolerance of 19 wheat genotypes were evaluated by using UPGMA cluster analysis. To this end, the effect of drought stress on a number of related agron More
        Drought stress is one of the main limiting factors crop production in arid and semiarid regions. In this study, drought tolerance of 19 wheat genotypes were evaluated by using UPGMA cluster analysis. To this end, the effect of drought stress on a number of related agronomic and physiological traits of wheat genotypes, belonging to three groups of sensitive, intermediate and drought tolerant, under three conditions of normal, moderate and severe drought stress were studied. A factorial experiment based on completely randomized design with three replications was performed. Traits like plant height, shoot fresh weight, spike length, awn length, shoot dry weight, seed yield and relative water content of genotypes were measured. Analysis of variance showed that the effects of drought on all traits except awn length were significant. Most of the traits were negatively affected by drought stress. Highest reduction was observed in grain yield. Cluster analysis grouped genotypes exposed to drought stresses in to three categories. Genotypes numbering 15, 13, 12, 16 and 17 expirienced low means in all of traits under study. The results also showed that the second and third groups, resulting from cluster analysis, were in agreement with the results of previous researches reported. The first cluster, however, was found to be inconsistent with their initial introduction grouping under severe drought stress conditions. Therefore, the initial grouping was consistent especially in most of sensitive and tolerant genotypes under severe drought stress conditions. Manuscript profile
      • Open Access Article

        95 - -
        honarmand honarmand Abolghasem Naghibi
      • Open Access Article

        96 - Identification of Mycobacterium avium subspecies paratuberculosis in raw and pasteurized milk samples using culture, IS900 PCR and IS900 nested PCR methods
        M. Soltani
        Mycobacterium avium&nbsp;subspecies&nbsp;paratuberculosis&nbsp;(MAP), the causative agent of Johne&rsquo;s disease, is a very slow-growing bacterium that imposes heavy costs on livestock-related industries. Due to the similar clinical and pathological symptoms in Johne& More
        Mycobacterium avium&nbsp;subspecies&nbsp;paratuberculosis&nbsp;(MAP), the causative agent of Johne&rsquo;s disease, is a very slow-growing bacterium that imposes heavy costs on livestock-related industries. Due to the similar clinical and pathological symptoms in Johne&rsquo;s and Crohn&rsquo;s diseases,&nbsp;MAP&nbsp;is likely to play a role in the development and progression of Crohn&rsquo;s disease. Hence, the possibility of transferring&nbsp;MAP&nbsp;through milk has created many concerns. To investigate the status of&nbsp;MAP&nbsp;contamination in raw and pasteurized milk samples in Kerman province, three diagnostic methods, including culture, IS900 PCR, and IS900 nested PCR was used. The results showed that the level of contamination with&nbsp;MAP&nbsp;in raw milk was relatively high in the studied herds. Based on culture, PCR, and nested PCR assays, 4.38%, 9.16%, and 13.55% were found positive, respectively. In pasteurized milk samples, 1.12%, 3.93%, and 6.18% were found positive for&nbsp;MAP&nbsp;by culture, PCR, and nested PCR, respectively. Comparing the methods used in this study demonstrated the best capability of nested PCR to detect MAP contamination. High levels of&nbsp;MAP&nbsp;contamination in raw milk on the one hand and relatively high resistance to thermal treatments, along with its intracellular characteristics, cause more survival of this bacterium, especially in the milk pasteurization process. Therefore, food hygiene researchers should pay more attention to the public health hazard caused by this bacterium. Manuscript profile
      • Open Access Article

        97 - Detection of Theileria orientalis infection in indigenous buffaloes of West Azarbaijan province using molecular and microscopic tests
        Babak Narimani Nasser Hoghooghirad Parviz Shayan Sadegh Rahbari Kasra Esmaeil-Nia
        The causative agent of bovine theileriosis is obligatory intracellular protozoa called T. annulata which results in severe anemia, severe pulmonary edema and rapid death in non-native animals. The present study was aimed to detect the current state of Theileria infectio More
        The causative agent of bovine theileriosis is obligatory intracellular protozoa called T. annulata which results in severe anemia, severe pulmonary edema and rapid death in non-native animals. The present study was aimed to detect the current state of Theileria infection in indigenous buffaloes and its association with environmental factors in four cities of West Azarbaijan province using microscopic tests (blood smear evaluation) and molecular assays. Blood samples were randomly collected from 291 buffaloes in the region, during March to July 2014. Direct and semi-nested PCR techniques were used to detect DNA of Theileria spp. using specific pair primer 18SrRNA. In the microscopic assay method, presence of this parasite in four (1.37%) buffaloes was approved. The molecular assays revealed that 4 out of 291 animals (1.37%) were infected by T. annulata. Also the present study showed that two female adult buffaloes (0.68%) were simultaneously infected by T. annulata and T. orientalis. Apparent and real prevalence of infection of buffaloes to T. annulata in the molecular method were 1.37 and 1 percent respectively. The chance of infection by T. annulata and T. orientalis were equal. Molecular prevalence of T. annulata in Urmia and Salmas were 2.2 and 2.3 percent respectively (p &lt; /em&gt;&lt;0.05). Molecular prevalence of T. orientalisin Urmia was 2.2%. This is the first study to indicate the presence of infection with T. orientalis in indigenous buffaloes of Urmia city in Iran. Manuscript profile
      • Open Access Article

        98 - Evaluation of rapid detection and investigation of the presence of spv operon virulence genes in Salmonella isolates using simplex PCR and multiplex PCR molecular methods
        Somayeh Yazdi-Amirkhiz Younes Anzabi Sanaz Mahmazi
        The traditional methods of diagnosing Salmonella which are time-consuming and sometimes problematic, are still used to identify Salmonella serotypes in clinical and food samples, but with the invention of rapid molecular detection methods, these problems have been large More
        The traditional methods of diagnosing Salmonella which are time-consuming and sometimes problematic, are still used to identify Salmonella serotypes in clinical and food samples, but with the invention of rapid molecular detection methods, these problems have been largely eliminated. The present study aimed to rapidly detect different Salmonella isolates based on invA chromosomal gene search and also to identify acute isolates containing spv operon virulence genes. To this end, 20 human isolates of Salmonella were obtained from hospitals in Tabriz and 20 isolates of this bacterium were isolated from traditional cheese available on Tabriz consumer market. The molecular confirmation of isolates was first evaluated using specific primers of invA gene by simplex PCR method. Then, in order to evaluate the acute strains of the bacterium based on the presence of operon spv, the presence of spvA, B, C and R genes was examined by multiplex PCR using the relevant specific primers. The results showed that firstly, all isolates had molecular confirmation. Secondly, all 40 tested isolates had 3 spvA, C and R genes, but none of them had spvB gene. It seems that due to the limitations and problems in the traditional laboratory examination of Salmonella, PCR can be used as a rapid method to detect Salmonella infection. Also, the presence of 3 out of 4 virulence genes of opron spv in different Salmonella isolates in Tabriz region should be considered an undesirable finding, which emphasizes the need to further observe principles of control and prevention in animal and human communities. Manuscript profile
      • Open Access Article

        99 - Accuracy rate of pregnancy detection in dairy cow by measuring the early pregnancy factor
        صمد Mosaferi وحید Ghaffari Laleh جعفر Majidi ایرج Lotfi
        Early pregnancy factor (EPF) a protein with immunosuppressive properties can be detected in the serum of most domestic animals at early pregnancy. In this study, pregnancy detection in 41 dairy cows following artificial insemination was evaluated by detecting EPF in blo More
        Early pregnancy factor (EPF) a protein with immunosuppressive properties can be detected in the serum of most domestic animals at early pregnancy. In this study, pregnancy detection in 41 dairy cows following artificial insemination was evaluated by detecting EPF in blood serum using the rosette inhibition test (RIT). The amount of EPF activity 1-3 and 4-7 days after artificial insemination of cows was measured by RIT. Pregnancies were confirmed 45-60 days after insemination by rectal palpation. The results indicated that sensitivity, specificity, positive predictive value, negative predictive value and accuracy of this technique in detecting pregnancy 1-3 days following insemination was 88.88,&nbsp; 66.66,&nbsp; 72.72,&nbsp; 85.71&nbsp; and&nbsp; 77.77 percent&nbsp; respectively and RIT titers of above 8 and below 4 were seen in pregnant and non-pregnant animals at this period. The value of the above parameters were 91,&nbsp; 83.83,&nbsp; 83.33,&nbsp; 91&nbsp; and&nbsp; 87 percent&nbsp; respectively&nbsp; 4-7&nbsp; days&nbsp; after insemination and also RIT titers of above 8 and below 4 were achieved in pregnant and non pregnant cows during this period. The results of this study indicated that there are significant differences in RIT titers between pregnant and non-pregnant cows 1-3 and 4-7 days following artificial insemination (P&lt;0.05).&nbsp; Manuscript profile
      • Open Access Article

        100 - Identifying the malstructure of experimental science knowledge of fifth grade elementary students based on the cognitive-diagnostic approach
        akbar alilou javad mesrabadi Golamreza Golmohammadnejhad Abolfazl Farid
        The purpose of the current research is to investigate the phenomenon of knowledge misstructure. Malstructuring of knowledge is a phenomenon in which the structure of knowledge in the field of education is not formed in the learners for various reasons. In this research, More
        The purpose of the current research is to investigate the phenomenon of knowledge misstructure. Malstructuring of knowledge is a phenomenon in which the structure of knowledge in the field of education is not formed in the learners for various reasons. In this research, using the cognitive-diagnostic approach, the phenomenon of malstructuring of knowledge among the fifth grade students in the experimental science course was investigated. 5 classrooms were selected using cluster sampling. In the current research, the knowledge malstructure test was prepared in the three subjects of physical change, chemical change and rainbow from the experimental science book of the fifth elementary school, based on the knowledge structure of the desired concepts. For data analysis, neural network analysis was using SPSS software. The Hierarchy Fit Index (HCI) for all three subjects was 0.71, 0.77 and 0.73, respectively, which showed that the cognitive model has a good fit. In order to check the accuracy of decision-making about the subject&rsquo;s mastery levels in abilities, based on the diagnostic scores, index &alpha;AHM was calculated for the attributes in the knowledge structure, and its value was obtained above 0/6 for different abilities, which is at the optimal level and has the ability to support the final report. Besides students cognitive scores were evaluated based on their correct answers to a hierarchy to check the malstructure. the results of the analysis of the students&#039; cognitive scores showed that some of the students have problems in various cognitive concepts, which indicates the malstructure of the students&#039; knowledge in the subject. Manuscript profile
      • Open Access Article

        101 - Introduction and analytical comparison of classic test theory (CTT) and item response theory (IRT) in psychometrics
        Gholamreza Goolmohammadnejhad
        The study has dealt with a brief introduction and analytical comparison of two major psychometrics theory i.e. classic test theory and item-response theory along with their privileges and limitations. Although the classic test theory was founded in early part of the tw More
        The study has dealt with a brief introduction and analytical comparison of two major psychometrics theory i.e. classic test theory and item-response theory along with their privileges and limitations. Although the classic test theory was founded in early part of the twentieth century. Its numerous limitations made the specialists think of means to remove these limitations. In the process of seeking solutions for removal of weaknesses in classic theory, they came up with a new theory in the 1950s which became known as time-response theory. Inspite of its gradual completion and apparent removal of limitations in the course of time, IRT has never been free from limitation and it has always been subject to some objections. For the time being each of these theories has more or less advocates among the educational ,psychological specialists and those who are related to psycho-educational measurements .These theories are not duly known in Iran ,so the present study tries to introduce these theories along with their weaknesses and strengths ,common and different points.&nbsp; Manuscript profile
      • Open Access Article

        102 - Ambiguity in Maftun Amini’s Poetry
        Alireza Tayogh Najibeh Honarvar Farhad Falahatkhah
        Art needs beauty and to believe that poetry is one of the types of art, it needs beauty. There are many elements and factors of the beauty of poetry, and every poet in every era tries to decorate his poems with these elements. The main topic of this research is the stud More
        Art needs beauty and to believe that poetry is one of the types of art, it needs beauty. There are many elements and factors of the beauty of poetry, and every poet in every era tries to decorate his poems with these elements. The main topic of this research is the study of the science of expression in the poetry of Maftun Amini, which was carried out using a descriptive-analytical method based on library sources. In this article, the beautiful images of Maftun's poetry have been explained by addressing the components of ambiguity, irony, recognition, metaphor, paradox, and simile. By using all the tricks of imaginative elements and with a new attitude, he freed his poetry from the repetitive images of traditional poetry and succeeded in creating original and creative images by using innovative crafts. In the "Anarestan" and "Hidden Season" collections, the poet's language moves towards poetic ambiguity, vagueness, and brevity. Maftun uses poetic images and stereotypes to personalize the language of his poetry to wrap his poems in an aura of ambiguity and make the audience's mind struggle to understand it. In this way, by making the reader participate in the work, a special place is given to him to find a different meaning in the poetry. Manuscript profile
      • Open Access Article

        103 - The study of some ecological factors affecting distribution of Festuca ovina in Rangelands, Lorestan Province- County Delfan
        amir mirzaei mossivand Farshad Keivan Behjou Parvin Ramak Ehsan Zandi Esfahan
        The aim of present study was assessing relationship between Festuca ovina dispersion. 5 habitats in County Delfan was chosen. In each habitat, three sites were selected at each site was established three transects the length of 100 meters. Along each transect in 10-squa More
        The aim of present study was assessing relationship between Festuca ovina dispersion. 5 habitats in County Delfan was chosen. In each habitat, three sites were selected at each site was established three transects the length of 100 meters. Along each transect in 10-square-meter plots with a total canopy cover and density of the studied species was determined. Then at initial, mid and end of transects soil samples were extracted in 0-30cm depth (A total of 135 soil samples). Height, slope, aspect and some soil characteristics including texture, electrical conductivity, acidity, organic matter, phosphorus, potassium and nitrate was determined. Cluster analysis to classify the sites sampled, Compare groups resulting from cluster analysis of independent t test and discriminate analysis was used to determine the important parameters. The results of cluster analysis indicated that the sites were separated to two main groups (At 5%). Also the results showed that studied species have the most presence in height of 2641m, slope more than 40 percent, NorthWest and western aspect, temperature more than 10 degree, precipitation 481mm, soils with 1.97 percent organic matter and less clay also more silt. The results of discriminant analysis indicated that at first level height, precipitation, temperature and some soil parameters like sand, silt and organic matter and at second level aspect and other soil characteristics like pH and potassium are effective in the studies species dispersion. According to the results of this study can be recommended as suitable to be used for rangeland restoration Manuscript profile
      • Open Access Article

        104 - The most important environmental effective factors on Dorema aucheri Boiss. dispersion in rangelands Lorestan province
        amir mirzaei mousivand بهنام بهرامی
        Abstract The aim of present the study was assessing the relationship betweenDorema aucheri dispersion. At first, 60 sites were selected in Delfan County. In each site 3 transects with 100 m length and 10 4-square meter along transects was established and canopy cover More
        Abstract The aim of present the study was assessing the relationship betweenDorema aucheri dispersion. At first, 60 sites were selected in Delfan County. In each site 3 transects with 100 m length and 10 4-square meter along transects was established and canopy cover and species density then studied. Then at the first, mid and end of transect, soil samples were collected in 0-30 cm depth. Height, slope, aspect and some soil properties, including texture, electrical conductivity, acidity, organic matter, phosphorus, potassium and nitrate were determined. Cluster analysis, independent t test, discriminant function and principle component analysis were used for analyzing the data. The results of cluster analysis indicated that the sites were separated into two main groups. Also the results showed that studied species have the most presence in height of 2345 m, at the slope more than 80 percent, southwestern and western aspect, temperature more than 10 degrees, precipitation 498 mm, soils with 1.63 percent organic matter, and less sand, and more silt and clay. The results of discriminant function and principle component analysis indicated that at the first level height, precipitation, temperature and some soil parameters like sand, silt and organic matter and at the second level aspect and other soil characteristics like pH and potassium are effective in the studies species dispersion. According the results of the present study, this fact is documentable that the studied species is suitable for restoration in rangeland.&nbsp; Manuscript profile
      • Open Access Article

        105 - A Review on Fault Detection and Diagnosis Methods in Distribution Power Networks
        Milad Samady Shadlu
        Fault detection and diagnosis algorithms are the methods whose function is determining the fault point in a system according to pre-faulting and post-faulting conditions, and fault detector is a part of system which performs this function. Accordingly, the aspects like More
        Fault detection and diagnosis algorithms are the methods whose function is determining the fault point in a system according to pre-faulting and post-faulting conditions, and fault detector is a part of system which performs this function. Accordingly, the aspects like fault detection and diagnosis and faulted point isolation have been introduced. Until now many researches have focused on fault detection methods in different parts of power system such as transformers, converters, overhead lines, underground cables, feeders, breakers, protection relays, generators, turbines, etc. , which every one of them has proposed a new and effective method in supplementing of previous works. In this paper, a comprehensive study is done on fault detection and diagnosis in distribution power systems. Also, categorizing and also methodology of previous works in literature is addressed. Fault detection and diagnosis algorithms are divided based on two viewpoints and characteristics and features of each one are described completely. Manuscript profile
      • Open Access Article

        106 - Emotion Recognition of Speech Signals Based on Filter Methods
        Narjes Yazdanian Hamid Mahmoodian
        Abstract: Speech is the basic mean of communication among human beings.With the increase of transaction between human and machine, necessity of automatic dialogue and removing human factor has been considered. The aim of this study was to determine a set of affective fe More
        Abstract: Speech is the basic mean of communication among human beings.With the increase of transaction between human and machine, necessity of automatic dialogue and removing human factor has been considered. The aim of this study was to determine a set of affective features the speech signal is based on emotions. In this study system was designs that include three mains sections, features extraction, features selection and classification. After extraction of useful features such as, mel frequency cepstral coefficient (MFCC), linear prediction cepstral coefficients (LPC), perceptive linear prediction coefficients (PLP), ferment frequency, zero crossing rate, cepstral coefficients and pitch frequency, Mean, Jitter, Shimmer, Energy, Minimum, Maximum, Amplitude, Standard Deviation, at a later stage with filter methods such as Pearson Correlation Coefficient, t-test, relief and information gain, we came up with a method to rank and select effective features in emotion recognition. Then Result, are given to the classification system as a subset of input. In this classification stage, multi support vector machine are used to classify seven type of emotion. According to the results, that method of relief, together with multi support vector machine, has the most classification accuracy with emotion recognition rate of 93.94%. Manuscript profile
      • Open Access Article

        107 - Improved Intrusion Detection System Based On Distributed Self-Adaptive Genetic Algorithm to Solve Support Vector Machine in Form of Multi Kernel Learning with Auto Encoder
        Elaheh Faghihnia Seyed Reza Kamel Tabakh Farizni Maryam Kheirabadi
        Intrusion into systems through network infrastructure and the Internet is one of the security challenges facing the world of information and communication technology and can lead to the destruction of systems and access to data and information. In this paper, a support More
        Intrusion into systems through network infrastructure and the Internet is one of the security challenges facing the world of information and communication technology and can lead to the destruction of systems and access to data and information. In this paper, a support vector machine model with weighted and parameters of SVM kernels are presented to detect the intrusion. Due to the high complexity of this problem, conventional optimization methods are not able to solve it. Therefore, we propose a Distributed Self Adaptive Genetic Algorithm (DSAGA). On the other hand, due to the high volume of data in such issues, Auto encoder has been used to reduce data. The proposed approach is a hybrid method based on Auto encoder, improved Support Vector Machine and Distributed Self Adaptive Genetic Algorithm (DSAGA) that it is evaluated by its execution on DARPA data set. Manuscript profile
      • Open Access Article

        108 - Combined Intrusion Detection System to deal with Cyber- Attacks in Industrial Control Systems with a Dedicated Network
        Mohammad Safari Elham Parvinnia Alireza Keshavarz Haddad
        Most control systems use a dedicated communication network with specific protocols. Intrusion detection systems developed based on network traffic with standard protocols, or existing datasets can not detect significant threats on these control systems. New sophisticate More
        Most control systems use a dedicated communication network with specific protocols. Intrusion detection systems developed based on network traffic with standard protocols, or existing datasets can not detect significant threats on these control systems. New sophisticated malicious codes usually attacked these systems by sending known and understandable commands to the control systems and ultimately sabotaging the physical process. These attacks do not alter network traffic, so they are not detectable with standard network-based intrusion detection systems. In this paper, we proposed an innovative combined method for identifying different types of attacks on control systems with a dedicated network. We have provided a combination of methods for detecting semantic or stealth attacks and identifying attacks that affect the traffic of the control system network. For the first time in practice, the effect of common types of attacks on a control system with a specific network has been investigated, and the rules for detecting these attacks have been obtained. Experimental results in this study show that the extracted rules identify 100% of the already known attacks. The proposed new approach, based on identifying the control system commands from the extracted network records, also thoroughly detects semantic attacks. The process data behavioral method used in this study can detect about 99% of semantic attacks using classification algorithms base on Data set which is created in this study. Manuscript profile
      • Open Access Article

        109 - Evaluation of Deep Neural Networks in Emotion Recognition Using Electroencephalography Signal Patterns
        Azin Kermanshahian Mahdi Khezri
        In this study, the design of a reliable detection system that is able to identify different emotions with the desired accuracy has been considered. To reach this goal, two different structures for the emotion recognition system include 1) using linear and non-linear fea More
        In this study, the design of a reliable detection system that is able to identify different emotions with the desired accuracy has been considered. To reach this goal, two different structures for the emotion recognition system include 1) using linear and non-linear features of the electroencephalography (EEG) signal along with common classifiers and 2) using EEG signal in a deep learning structure is considered to identify emotional states. To design the system, the EEG signals of the DEAP database which were recorded by displaying emotional videos from 32 subjects were used. After the preparation and noise removal, linear and non-linear features such as: Skewness, Kurtosis, Hjorth parameters, Lyapunov exponent, Shannon entropy, correlation and fractal dimension and time reversibility were extracted from the alpha, beta and gamma subbands of the EEG signals. Then according to structure 1, the features were applied as input to common classifiers such as decision tree (DT), k nearest neighbor (kNN) and support vector machine (SVM). Also in structure 2, the EEG signal was considered as the input of the convoloutional neural network (CNN). The goal is to evaluate the results of deep learning networks and other methods for emotion recognition. According to the obtained results, the SVM achieved the best performance for identifying four emotional states with 94.1 % accuracy. Also, the proposed CNN identified the desired emotional states with the accuracy of 86%. Deep learning methods are superior to simple classifiers because they do not require the features of the signals and are resistant to different noises. Using a short period of time for the signals and performing near optimal preprocessing and conditioning, can further improve the results of deep neural networks. Manuscript profile
      • Open Access Article

        110 - Publishing Health Information without Distortion While Balancing Desired Privacy-Preserving and Utility
        Abbas Karimi Rizi Mohammad Naderi Dehkordi Naser Nematbakhsh
        In the age of health information analysis, the disease diagnostic code is considered as the patient's privacy. Achieving this code is the most important need for the analysts while anonymizing the code is necessary for people when publishing health information. Disease More
        In the age of health information analysis, the disease diagnostic code is considered as the patient's privacy. Achieving this code is the most important need for the analysts while anonymizing the code is necessary for people when publishing health information. Disease diagnostic codes, usually presented based on international classifications, are displayed in the form of a taxonomy. In real life, patients only allow the category of the disease diagnostic code to be disclosed, not the original disease diagnostic code. Conventional privacy-preserving models often distort the category of the disease diagnostic code. Preserving privacy accompanying the data utility has always been a critical issue in the dissemination of health information. In this study, a new anonymization method is presented in a way that all attributes of health information can be published without distortion to maintain the utility of the data. So, the published information protects the privacy of patients, so that the experts' expectations and the utility of analysts are desired as expected. The innovative method disseminates health information in a way that the maximum probability of disclosing the disease diagnostic code is always less than or equal to the threat threshold defined by the expert, and on the other hand, the membership analysis error is reduced. The new method is scalable under certain conditions. The results of the practical evaluation of patient data obtained from one of the hospitals in Isfahan are evidence of the effectiveness of the proposed method. Manuscript profile
      • Open Access Article

        111 - An Improved Tracking-Learning-Detection Algorithm for Low Frame Rate
        Hooman Moridvaisi Farbod Razzazi Mohammad Ali Pourmina Massoud Dousti
        The conventional Tracking-Learning-Detection (TLD) algorithm is sensitive to illumination change and clutter and low frame rate and results in drift even missing. To overcome these shortcomings and increase robustness, by&nbsp;improving the TLD&nbsp;structure via integr More
        The conventional Tracking-Learning-Detection (TLD) algorithm is sensitive to illumination change and clutter and low frame rate and results in drift even missing. To overcome these shortcomings and increase robustness, by&nbsp;improving the TLD&nbsp;structure via integrating mean-shift and co-training learning can be achieved better results undergo low frame rate (LFR) condition and the robustness and accuracy tracking of the TLD structure increases. Because of, the Mean-Shift tracking algorithm is robust to rotation, partial occlusion and scale changing and it is simple to implement and takes less computational time. On the other, the co-training learning algorithm with two independent classifiers can learn changes of the target features in during the online tracking process. Therefore, the extended structure can solve the problem of lost object tracking in LFR videos and other challenges simultaneously. Finally, comparative evaluations of the proposed method to other top state-of-the-art tracking algorithms under the various scenarios from the TB-100 known dataset, demonstrate the superior performance of the proposed algorithm compared to other tracking algorithms in terms of tracking robustness and stability performance. Finally, the proposed structure based on the TLD architecture, in scenarios with the various challenges mentioned, will improve on average about 33% of the results, compared to the traditional TLD algorithm. Manuscript profile
      • Open Access Article

        112 - Brain Stroke Classification Based on Deep Learning Approach in Microwave Brain Imaging System
        Majid Roohi Jalil Mazloum Mohammad Ali Pourmina Behbod Ghalamkari
        One of the main reasons of death in the world, mostly affecting seniors, is brain stroke. Almost 85% of all brain strokes are ischemic due to internal bleeding in a part of the brain. Due the high mortality rate, quick diagnosic and treatment of ischemic and hemorrhagic More
        One of the main reasons of death in the world, mostly affecting seniors, is brain stroke. Almost 85% of all brain strokes are ischemic due to internal bleeding in a part of the brain. Due the high mortality rate, quick diagnosic and treatment of ischemic and hemorrhagic strokes are of utmost importance. In this paper, to realize microwave brain imaging system, a circular array-based of modified bowtie antennas located around the multilayer head phantom with a spherical target with radius of 1 cm as intracranial hemorrhage target aresimulated in CST simulator. To obtain satisfied radiation characteristics in the desired band (from 0.5-5 GHz) an appropriate matching medium is designed. First, in the processing section, a confocal image-reconstructing method based using delay and sum (DAS) and delay, multiply and sum (DMAS) beam-forming algorithms is used. The reconstructed images generated shows the usefulness of the proposed confocal method in detecting the spherical target in the range of 1 cm. The main purpose of this paper is stroke classification using deep learning approaches. For this, an image classification algorithm is developed to estimate the stroke type from reconstructed images. By using the proposed deep learning method, the reconstructed images are classified into different categories of cerebrovascular diseases using a multiclass linear support vector machine (SVM) trained with convol&shy;uti&shy;onal neural networks (CNN) features extracted from the images. The simulated results show the suitability of the proposed image reconstruction method for precisely localizing bleeding targets, with 89% accuracy in 9 seconds. In addition, the proposed deep-learning approach shows good performance in terms of classification, since the system does not confuse between different classes. Manuscript profile
      • Open Access Article

        113 - Background Subtraction Techniques Evaluation based on ∑-∆ Algorithm for Motion Detection
        Mohammadreza Mahvidi Vahid Ghods
        Processing a video stream to segment moving objects (foreground) from the static scene (background) is a critical first step in many computer vision applications. One of the common methods is using background subtraction approach, which detects moving objects by compari More
        Processing a video stream to segment moving objects (foreground) from the static scene (background) is a critical first step in many computer vision applications. One of the common methods is using background subtraction approach, which detects moving objects by comparing each frame with the obtained background frame. In this paper, we examine background subtraction algorithm based on sigma-delta filter. This algorithm provides a simple and very fast approximation of the median and has the advantage of having low memory requirements. The interest of this method lies in the robustness provided by the non-linearity compared to the linear recursive average, and in the very low computational cost. However in the basic sigma-delta algorithm, the background model quickly degrades in complex urban scenes because it is easily &ldquo;contaminated&rdquo; by slow-moving or temporarily stopped objects. And in this algorithm ghost effect and aperture effect is clearly visible. This paper is a review to this algorithm and various approaches and improvements proposed for it. In this paper, first basic sigma-delta and then its important approaches is described. The purpose of this approaches and improvements is to eliminate or reduce the defects and disadvantages of the main algorithm. In the end, a quantitative comparison between these algorithms is carried out and improvements and advantage and disadvantages of each algorithm are evaluated. Manuscript profile
      • Open Access Article

        114 - Presenting a New Approach for Detecting Attacks on Voice over Internet Protocol Based on Ensemble Clustering
        Farid Bavifard Mohammad Kheyrandish Mohammad Mosleh
        Due to lower cost and greater flexibility, voice over internet protocol (VoIP) is widely used in telecommunications. A variety of VoIP terminals causes them to be vulnerable. A common way to secure VoIP includes intrusion detection based on machine learning. Due to the More
        Due to lower cost and greater flexibility, voice over internet protocol (VoIP) is widely used in telecommunications. A variety of VoIP terminals causes them to be vulnerable. A common way to secure VoIP includes intrusion detection based on machine learning. Due to the diversity of traffics and lack of class labels for training Intrusion detection systems (IDSs) in many situations, clustering approaches (unsupervised learning) have been focused on. But individual cluster systems can't cover the diversities of feature values well, and some traffic samples may be identified as outliers. As an ensemble approach, the proposed model for solving these problems focuses on using TwoStep clustering algorithm, and by improving it, tries to improve the clustering-based intrusion detection. Moreover, regarding the importance of the feature selection process, a combination of Simulated Annealing algorithm (SA) and Multi-Layer Perceptron (MLP) has been exploited for identifying superior features used for clustering VoIP packets, as Normal or involving DoS, R2L, U2R either Probe attacks. Based on evaluation results obtained on the dataset &ldquo;Network Security Lab-Knwledge Discovery in Databases&rdquo; (NSL-KDD) by MATLAB, the proposed feature selection reduced the training and testing times, averagely by 77% and 80%, respectively, by reducing the features to 10 and 8. Also, compared to previous works, the proposed IDS shows average improvements in Accuracy, Detection rate, and F-Measure at 3.34 %, 14.17 %, and 32.87 %, respectively. Manuscript profile
      • Open Access Article

        115 - Optimal Feature Space Selection in Detecting Epileptic Seizure based on Recurrent Quantification Analysis and Genetic Algorithm
        Saleh LAshkari Mehdi Azarnoosh
        Selecting optimal features based on nature of the phenomenon and high discriminant ability is very important in the data classification problems. Since it doesn't require any assumption about stationary condition and size of the signal and the noise in Recurrent Quantif More
        Selecting optimal features based on nature of the phenomenon and high discriminant ability is very important in the data classification problems. Since it doesn't require any assumption about stationary condition and size of the signal and the noise in Recurrent Quantification Analysis (RQA), it may be useful for epileptic seizure Detection. In this study, RQA was used to discriminate ictal EEG from the normal EEG where optimal features selected by combination of algorithm genetic and Bayesian Classifier. Recurrence plots of hundred samples in each two categories were obtained with five distance norms in this study: Euclidean, Maximum, Minimum, Normalized and Fixed Norm. In order to choose optimal threshold for each norm, ten threshold of &epsilon; was generated and then the best feature space was selected by genetic algorithm in combination with a bayesian classifier. The results shown that proposed method is capable of discriminating the ictal EEG from the normal EEG where for Minimum norm and 0.1˂&epsilon;˂1, accuracy was 100%. In addition, the sensitivity of proposed framework to the &epsilon; and the distance norm parameters was low. The optimal feature presented in this study is Trans which it was selected in most feature spaces with high accuracy. Manuscript profile
      • Open Access Article

        116 - Automatic Persian License Plate Recognition by Edge Detection Using Hopfield Neural Network
        Homayoun Mahdavi-Nasab Mohammad Sadegh Memarzadeh Peyman Moallem
        License plate is the most suitable information for automobile identification. Auto license plate recognition system is an automatic process which extracts the plate number using photographs of the auto. The method presented in this paper consists of two stages. First, t More
        License plate is the most suitable information for automobile identification. Auto license plate recognition system is an automatic process which extracts the plate number using photographs of the auto. The method presented in this paper consists of two stages. First, the plate is located by edge detection and morphological techniques. Second, the characters are identified using Hopfield neural network. The proposed method has been tested on 700 photos with different backgrounds, distances and angles. The correct plate location and identification are evaluated 97.8% and 93% respectively. Manuscript profile
      • Open Access Article

        117 - A Novel Approach for Eccentricity Fault Detection in Squirrel Cage Induction Motors
        Mehdi Ahmadi Javad Poshtan Seyed Mehdi MirImani
        In this paper, static eccentricity fault detection in induction motors is studied. Two dimensional finite element method (2D-FEM) is used for faultless and eccentric condition modeling in induction motors. Also current and speed signals are compared in two experimental More
        In this paper, static eccentricity fault detection in induction motors is studied. Two dimensional finite element method (2D-FEM) is used for faultless and eccentric condition modeling in induction motors. Also current and speed signals are compared in two experimental and simulation cases for model validating. For fault detection, fast Fourier transform is used at first. In this method, high order harmonics with small amplitude can alarms the fault occurrence. For this reason, the fault detection process is difficult.To overcome these drawbacks, it is suggested that two test coils contrive around the air-gap. So, any changes in air-gap can be detected easily. Moreover this test coils are used in open circuit case. So, these test coils do not effect on motor dynamics. Also, the results show that modulated voltage can be alarm the fault occurrence, type and percent well. Manuscript profile
      • Open Access Article

        118 - Detection of Stator Winding Fault in Induction Motor Using Fuzzy Logic with Optimal Rules
        Hamid Fekri Azgomi Javad Poshtan
        Induction motors are critical components in many industrial processes. Therefore, swift, precise and reliable monitoring and fault detection systems are required to prevent any further damages. The online monitoring of induction motors has been becoming increasingly imp More
        Induction motors are critical components in many industrial processes. Therefore, swift, precise and reliable monitoring and fault detection systems are required to prevent any further damages. The online monitoring of induction motors has been becoming increasingly important. The main difficulty in this task is the lack of an accurate analytical model to describe a faulty motor. A fuzzy logic approach may help to diagnose traction motor faults. This paper presents a simple method for the detection of stator winding faults (which make up 38% of induction motor failures) based on monitoring the line/terminal current amplitudes. In this method, fuzzy logic is used to make decisions about the stator motor condition. In fact, fuzzy logic is reminiscent of human thinking processes and natural language enabling decisions to be made based on vague information. The motor condition is described using linguistic variables. Fuzzy subsets and the corresponding membership functions describe stator current amplitudes. A knowledge base, comprising rule and data bases, is built to support the fuzzy inference. Simulation results are presented to verify the accuracy of motor&rsquo;s fault detection and knowledge extraction feasibility. The preliminary results show that the proposed fuzzy approach can be used for accurate stator fault diagnosis. Manuscript profile
      • Open Access Article

        119 - Road Extraction and Car Detection from Aerial Image Using Intensity and Color
        Vahid Ghods Alireza Behrad
        In this paper a new automatic approach to road extraction from aerial images is proposed. The initialization strategies are based on the intensity, color, and Hough transform. After road elements extraction, chain codes are calculated. In the last step, using shadow, ca More
        In this paper a new automatic approach to road extraction from aerial images is proposed. The initialization strategies are based on the intensity, color, and Hough transform. After road elements extraction, chain codes are calculated. In the last step, using shadow, cars on the roads are detected. We implemented our method on the 25 images from "Google Earth" database. The experiments show an increase in both the completeness and the quality indexes for the extracted road. Manuscript profile
      • Open Access Article

        120 - A Novel Framework for Logo Detection and Recognition from Document Images
        Hossein Pourghasem Amir Salar Jafarpisheh
        Logo detection and recognition module is a vital requirement in official automation systems for document image archiving and retrieval applications. In this paper, we present a novel framework for logo detection and recognition based on sequential segmentation and class More
        Logo detection and recognition module is a vital requirement in official automation systems for document image archiving and retrieval applications. In this paper, we present a novel framework for logo detection and recognition based on sequential segmentation and classification strategy of document image. In this framework, using a two-stage segmentation algorithm (consisting of wavelet-based and threshold-based segmentation algorithms) and hierarchical classification by two multilayer Perceptron (MLP) classifiers and a k-nearest neighbor (KNN) classifier, a document image divides to text, pure picture and logo candidate regions. Ultimsately, in final decision, class of logo candidate region is determined based on pre-defined classes. In the hierarchical classification and logo recognition stages, the best feature space is selected by forward selection algorithm from a perfect set of texture and shape features. The proposed structure is evaluated on a variety and vast database consisting of the document and non-document images with Persian and international logos. The obtained results show efficiency of the proposed framework in the real and operational conditions. Manuscript profile
      • Open Access Article

        121 - Wavelet Packet Entropy in Speaker-Independent Emotional State Detection from Speech Signal
        Mina Kadkhodaei Elyaderani Hamid Mahmoodian Ghazaal Sheikhi
        In this paper, wavelet packet entropy is proposed for speaker-independent emotion detection from speech. After pre-processing, wavelet packet decomposition using wavelet type db3 at level 4 is calculated and Shannon entropy in its nodes is calculated to be used as featu More
        In this paper, wavelet packet entropy is proposed for speaker-independent emotion detection from speech. After pre-processing, wavelet packet decomposition using wavelet type db3 at level 4 is calculated and Shannon entropy in its nodes is calculated to be used as feature. In addition, prosodic features such as first four formants, jitter or pitch deviation amplitude, and shimmer or energy variation amplitude besides MFCC features are applied to complete the feature vector. Then, Support Vector Machine (SVM) is used to classify the vectors in multi-class (all emotions) or two-class (each emotion versus normal state) format. 46 different utterances of a single sentence from Berlin Emotional Speech Dataset are selected. These are uttered by 10 speakers in sadness, happiness, fear, boredom, anger, and normal emotional state. Experimental results show that proposed features can improve emotional state detection accuracy in multi-class situation. Furthermore, adding to other features wavelet entropy coefficients increase the accuracy of two-class detection for anger, fear, and happiness. Manuscript profile
      • Open Access Article

        122 - Crack Detection in Structures Using Modal Strain Energy and Frequency
        SIyamak ghadimi seyyed sina kourehli
        In this paper a new method for crack detection in structures based on first three mode frequencies and modal strain energies using least square support vector machine has been proposed. Since the mode shape vectors are equivalent to nodal displacements of a vibrating st More
        In this paper a new method for crack detection in structures based on first three mode frequencies and modal strain energies using least square support vector machine has been proposed. Since the mode shape vectors are equivalent to nodal displacements of a vibrating structure, therefore in each element of the structure strain energy is stored. The strain energy of a structure due to mode shape vector are usually referred to as modal strain energy (MSE) and can be considered as a valuable parameter for crack identification. Also, change of natural frequencies is effective, inexpensive, and fast tool for non-destructive testing. So, the proposed method uses the first three natural frequencies and modal strain energies as the input parameters and crack states as output to train the least squares support vector machine model. Manuscript profile
      • Open Access Article

        123 - Development of a two-stage method based on optimization algorithms and smart calculation methods in structural damage detection
        Behrouz Safa Asghar Rasouli Yahya Nasira
        Among the countless methods that have been proposed in the field of structural damage detection, the finite element model updating method has been very popular. However, the accuracy and efficiency of this method decrease drastically when the number of variables in the More
        Among the countless methods that have been proposed in the field of structural damage detection, the finite element model updating method has been very popular. However, the accuracy and efficiency of this method decrease drastically when the number of variables in the problem increases, and this is a problem when dealing with large structures with a large number of elements. In this research, a two-step method is proposed, which is capable of reducing the size of the damage detection problem introduced to the updated model by identifying damaged structural members through a damage index based on static strain energy in the first step. Therefore, only a few variables are introduced to the second step, which include a process of updating the finite element model. This second step actually consists of an iterative process of updating the model, which uses a new and damage-sensitive objective function to detect the severity of damage in the elements identified in the previous step. Also, a meta-exploratory optimizer named equilibrium optimizer is utilized to determine the value of the unknown variables of the problem, which are the damage values ​​of the elements introduced by the first step. The proposed method has also been tested on a number of numerical samples to check the effectiveness of the method in the presence of external disturbing factors such as measurement noise. A comparative study has been done to compare the results. According to the results, the proposed method is able to detect the location and severity of damage in different structures, and measurement noises and modal information only from the first few vibration modes do not have much impact on the accuracy of the results. A laboratory study has also been conducted to find out the efficiency and accuracy of the proposed method in real structures, and according to the results, the proposed method is well able to detect damage. Manuscript profile
      • Open Access Article

        124 - Development of a two-stage method based on optimization algorithms and smart calculation methods in structural damage detection
        Behrouz Safa Asghar Rasouli Yahya Nasira
        Among the countless methods that have been proposed in the field of structural damage detection, the finite element model updating method has been very popular. However, the accuracy and efficiency of this method decrease drastically when the number of variables in the More
        Among the countless methods that have been proposed in the field of structural damage detection, the finite element model updating method has been very popular. However, the accuracy and efficiency of this method decrease drastically when the number of variables in the problem increases, and this is a problem when dealing with large structures with a large number of elements. In this research, a two-step method is proposed, which is capable of reducing the size of the damage detection problem introduced to the updated model by identifying damaged structural members through a damage index based on static strain energy in the first step. Therefore, only a few variables are introduced to the second step, which include a process of updating the finite element model. This second step actually consists of an iterative process of updating the model, which uses a new and damage-sensitive objective function to detect the severity of damage in the elements identified in the previous step. Also, a meta-exploratory optimizer named equilibrium optimizer is utilized to determine the value of the unknown variables of the problem, which are the damage values ​​of the elements introduced by the first step. The proposed method has also been tested on a number of numerical samples to check the effectiveness of the method in the presence of external disturbing factors such as measurement noise. A comparative study has been done to compare the results. According to the results, the proposed method is able to detect the location and severity of damage in different structures, and measurement noises and modal information only from the first few vibration modes do not have much impact on the accuracy of the results. A laboratory study has also been conducted to find out the efficiency and accuracy of the proposed method in real structures, and according to the results, the proposed method is well able to detect damage. Manuscript profile
      • Open Access Article

        125 - Prevalence of Pseudomnas aeruginosa in various species of shrimps of Isfahan and Chabahar in summer and autumn and the effect of season and place of supply on it
        Seyedmajid Hashemi Ebrahim Rahimi Seyed Amirali Anvar Hamed Ahari Maryam Ataee
        Pseudomonas aeruginosa a potential risk factor for food poisoning especially in aquatic foods like shrimp. In order to determine and compare the rate of infection in different species of shrimp in two seasons of summer and autumn in Isfahan and Chabahar cities, the abdo More
        Pseudomonas aeruginosa a potential risk factor for food poisoning especially in aquatic foods like shrimp. In order to determine and compare the rate of infection in different species of shrimp in two seasons of summer and autumn in Isfahan and Chabahar cities, the abdominal muscle of 35 shrimps in each season of each city were sampled. Samples were homogenized in peptone water medium, then incubated and cultured in PCA medium. Suspected colonies were isolated and then confirmatory tests of Pseudomonas aeruginosa and confirmation of the presence of nanI, the specific gene of Pseudomonas aeruginosa by PCR.In summer, in Isfahan and Chabahar, 48.5% and 25.7% were infected respectively. In autumn, the prevalence was 22.9% for Isfahan and 20% for Chabahar, respectively. In Isfahan, the highest rate of infection was related to Metapenaueus affinis and the lowest to Penaeus semisulcatus in summer. In autumn, the highest number of infected samples was related to Penaeus merguiensis and the lowest to Penaeus semisulcatus. In Chabahar city, in both seasons, the most infected samples were related to Metapenaeus affinis, and the lowest to Panaeus semisulcatus and in autumn was related to both Penaeus semisulcatus and Litopenaeus vannamei.There was a high prevalence of this bacterium in samples of different shrimp species in both seasons and both cities, which indicates a high risk of food poisoning of Pseudomonas aeruginosa due to improper consumption of shrimp. Cold chain observance during storage, transportation and sell of shrimp will be very effective in controlling this problem. Manuscript profile
      • Open Access Article

        126 - سازه‌های مؤثر بر کارآفرینی در مناطق گردشگری شهرستان همدان (مطالعه موردی مناطق گردشگری بخش مرکزی)
        بیژن رحمانی پگاه مرید سادات سید حسین شاهد
      • Open Access Article

        127 - توصیف چندمتغیره گاوهای اوولمس-زائر و تیدیلی با استفاده از صفات ظاهری
        آی. بوجنان
        14 صفت مختلف ظاهری در 169 گاو اوولمس-زائر و 131 گاو تیدیلی رکورد برداری شده و با روش آنالیز چندمتغیره مورد تجزیه و تحلیل قرار گرفتند. صفات اندازه&shy;گیری شده شامل دور سینه، ارتفاع جدوگاه، ارتفاع کفل، طول کفل، عرض کفل، عمق قفسه سینه، طول بدن، طول گردن، دور استخوان کانن، More
        14 صفت مختلف ظاهری در 169 گاو اوولمس-زائر و 131 گاو تیدیلی رکورد برداری شده و با روش آنالیز چندمتغیره مورد تجزیه و تحلیل قرار گرفتند. صفات اندازه&shy;گیری شده شامل دور سینه، ارتفاع جدوگاه، ارتفاع کفل، طول کفل، عرض کفل، عمق قفسه سینه، طول بدن، طول گردن، دور استخوان کانن، طول گوش، عرض گوش، طول سر، طول شاخ و طول دُم بودند. نژاد تأثیر معنی &shy;داری بر روی همه صفات مطالعه شده داشت. ضرایب همبستگی بین اندازه&shy;های بدنی در گاوهای اوولمس-زائر بین 12/0 تا 85/0 و در گاوهای تیدیلی بین 14/0- تا 81/0 متغیر بوده است. در تحلیل مختصات اصلی چرخش&shy;یافته واریمکس، سه فاکتور استخراج گردیدند که حدود 1/65 درصد از تنوع در گاوهای اوولمس-زائر و 4/55 درصد از تنوع در گاوهای تیدیلی را توصیف می&shy;کنند. اشتراک در گاوهای اوولمس-زائر از 28/0 (طول شاخ) تا 82/0 (دور سینه) و در گاوهای تیدیلی از 25/0 (طول شاخ) تا 79/0 (ارتفاع کفل) متغیر بوده است. آنالیز تشخیص پلکانی نشان داد که 9 صفت از 1 صفت مورد بررسی قدرت تشخیصی دارند. آنالیز تشخیصی استاندارد نشان داد که فاصله ماهالانوبیس بین میانگین&shy;های نژادی معنی &shy;دار است. این موضوع حاکی از آن بود که تفاوت&shy;های معنی&shy; داری بین نژادهای گاو اوولمس-زائر و تیدیلی وجود دارد. ضرایب استاندارد خام برای نخستین متغیر استاندارد بیشترین تفاوت بین میانگین&shy;های نژادی (498/1 در برابر 933/1-) را نشان داد. دومین متغیر استاندارد تفاوتی بین میانگین&shy;ها نشان نمی&shy;داد. آنالیز تشخیص نشان داد که نژادهای اوولمس-زائر و تیدیلی به&shy;ترتیب 2/98 درصد و 100 درصد به &shy;طور صحیح طبقه&shy;بندی شده&shy;اند. از داده&shy;های حاصل چنین نتیجه&shy;گیری شده است که تفاوت&shy;های ظاهری واضحی بین نژادهای اوولمس-زائر و تیدیلی وجود داشته و این موضوع حاکی از آن است که این دو نژاد، جمعیت&shy;های جداگانه و متمایزی هستند. Manuscript profile
      • Open Access Article

        128 - Study of the prevalence and incidence of different lice species in domestic fowls of Shahrekord, Chaharmahal-va-Bakhtiari province in 1396 to 1397
        masood khakzadihe Shahab bahadoran Reyhaneh gasemi Azita Bahari Babadi Morvarid Karimi
        Evaluation of outbreak and incidence of lice in domestic chickens as a food source of villagers and less developed areas is one of the most important health concerns to reduce the feed conversion rate and improving the production efficiency of this type of birds. The ai More
        Evaluation of outbreak and incidence of lice in domestic chickens as a food source of villagers and less developed areas is one of the most important health concerns to reduce the feed conversion rate and improving the production efficiency of this type of birds. The aim of this study is microscopic examination of the prevalence and outbreak of different species of lice in native birds of Shahrekord and suburban areas of this city in 1396 to 1397. Data collection started from November 2017 to May 2018 from 200 native birds of Shahrekord city and suburban areas in Chaharmahal and Bakhtiari province that carried out at the flocks and also samples referred to the clinic of the Faculty of Veterinary Medicine of Shahrekord University. The identification method was performed using optical microscope and diagnostic keys. The results of this study indicate that 60 percent (120 infected specimens) are contaminated with lice and 40 percent are non-contaminated among native birds. The amount of infection to any lice was based on the number of isolated, including 42 cases of Menacanthus stramineus, 55 cases of Menopon gallinae, 30 cases of Goniodes dissimilis and 10 cases of Magnina cubitalis. Manuscript profile
      • Open Access Article

        129 - Investigating and describing the method of diagnosis of spore of Nosma disease in several apiaries in Ilam province
        Ebrahim Babaahmady
        The disease of Nosma is from a mature bee, caused by the Nosema spp. An opportunistic agent that forms spores inside the cell and expands rapidly as it leaves the cell, and is recognized as an important insect pathogen. Nozma is one of the most serious fungal diseases o More
        The disease of Nosma is from a mature bee, caused by the Nosema spp. An opportunistic agent that forms spores inside the cell and expands rapidly as it leaves the cell, and is recognized as an important insect pathogen. Nozma is one of the most serious fungal diseases of mature honey bees, which is present all over the world, and is created by two species of nosma apis and nozma serana, and it spreads to all three bees in the hive. The purpose of this study was to describe how to determine the type of spore of the disease of Nozma caused by the development of this disease, which was carried out in several apiaries in the province of Ilam. In this research, a sample of adult bees from a number of apiaries was taken up by 70% alcohol by a glass of alcohol content and sent to the Microbiology Laboratory of the Faculty , University of Ilam. Consequently, Nosma spores were observed with the help of a microscope, in form of large, elliptical, white and bright and uniform. The number of spores in the honey bee was counted and determined using a special formula. A common drug in the past has been fomaglin. Therefore, fomagelin is used in Iran and prevents the development of Nozma. Manuscript profile
      • Open Access Article

        130 - Application of statistical methods of time series analysis for a very fast and accurate determination of equilibrium thermodynamic conditions of gas-liquid water-hydrate systems in isochoric operation
        اکبر ایراندوخت
        In this research work, a very fast and accurate new method for determining equilibrium thermodynamic conditions in gas-liquid water-hydrate systems is presented. In this method, only temperature and pressure data in the cooling trace are needed to determine the equilibr More
        In this research work, a very fast and accurate new method for determining equilibrium thermodynamic conditions in gas-liquid water-hydrate systems is presented. In this method, only temperature and pressure data in the cooling trace are needed to determine the equilibrium points of hydrate formation. The required time to obtain equilibrium thermodynamic conditions for gas hydrate formation are greatly reduced and more accurate results are obtained, using statistical concepts of time series analysis as well as cumulative sum technique in change point detection. With this method, four experiments were performed to determine the equilibrium thermodynamic conditions for ethane gas hydrate. The average percentage of absolute deviations obtained with Deaton-Frost experimental data, Kamath's correction relationship, and AQUAlibrium and CSMHYD softwares were 5.67, 2.49, 9.54, and 1.89, respectively. In addition, the experimental data obtained by Curtin University researchers in Australia about the effect of 1000 ppm of pTSA surfactant in methane hydrate were investigated with this method. The absolute deviation percentage compared to the experimental data and their statistical thermodynamic modeling estimate were 0.23 and 1.89, respectively. Manuscript profile
      • Open Access Article

        131 - Application of nanoporous metal-organic frameworks as chemical sensors
        Bahar Jeyhoon Yeganeh Davoudabadi Farahani Vahid Safarifard
        With the growth of the human population, the increasing activities of factories, and subsequently increasing the emission of environmental pollutants in the air, the rapid measurement of these pollutants in different environments is essential more than ever. Sensors bas More
        With the growth of the human population, the increasing activities of factories, and subsequently increasing the emission of environmental pollutants in the air, the rapid measurement of these pollutants in different environments is essential more than ever. Sensors based on metal-organic frameworks have surpassed other chemical sensors in terms of construction cost, simplicity of the method, short response time, and good reversibility, and have been able to obtain a special place in the detection of toxic and hazardous pollutants. These nanoporous compounds, which are formed by the connection of metal centers and organic ligands through coordination bonding, have gathered the attention of many researchers due to their high chemical and thermal stability. The utilization of different aspects of the new synthetic and structural of this systems has led to a diverse success in the field of chemical and physical properties, many of which are unprecedented. Metal-organic frameworks have shown promising horizon in sensing applications due to having unique properties such as large sizes of cavities, high surface area, selected adsorption of small molecules and optical responses in the presence of guest molecules. In this article, we investigated the principles of the design of organic metal-framework sensors and the sensing mechanisms of these compounds. Manuscript profile
      • Open Access Article

        132 - Investigating the Impact of Innovation Strategy Management on Performance: Mediating Role of Entrepreneurial Opportunity Recognition
        Hojat shamsi Hamid Kakaee mehdi fotouhi mohammad khezri
        The present study aims to investigate the impact of innovation strategy management on performance with the mediating role of entrepreneurial opportunity recognition. In terms of the purpose of applied research, it is a descriptive survey in terms of the nature of the re More
        The present study aims to investigate the impact of innovation strategy management on performance with the mediating role of entrepreneurial opportunity recognition. In terms of the purpose of applied research, it is a descriptive survey in terms of the nature of the research and quantitative in terms of the type of data. The statistical population of the study includes the 220 managers of knowledge-based companies located in the Science and Technology Park of the University of Tehran, that using stratified random sampling method and Cochran's formula, 140 people were selected as a statistical sample. Data were collected using standard questionnaires. Data analysis was performed using SPSS and PLS software. The results showed that the management of innovation strategy has a positive and significant effect on the performance and recognition of entrepreneurial opportunities of knowledge-based companies. Entrepreneurial opportunity recognition also affects the performance of companies. Another result suggests that entrepreneurial opportunity recognition can mediate the relationship between innovation strategy management and the performance of knowledge-based companies. Manuscript profile
      • Open Access Article

        133 - سنجش تشخیصی توانش تعاملی در ازمون های صحبت کردن دو به دو: بررسی دفت ارزیابی زبان اموزان ایرانی
        Masoome Azmoode Sis Abad Gholamreza Kiany Gholam-Reza Abbasian
        سنجش توانش تعاملی، به عنوان یک ساختار چند جانبه چالش های زیادی را برای معلمان و مدیران ایجاد می کند. این تحقیق مختلط بر اساس سنجش تشخیصی از طریق مشارک ذینفعان سنجش سعی در فراهم کردن اطلاعاتی در مورد نقاط ضعف و قوت زبان آموزان درزیر مهارت های توانش تعاملی زبان آموزان دار More
        سنجش توانش تعاملی، به عنوان یک ساختار چند جانبه چالش های زیادی را برای معلمان و مدیران ایجاد می کند. این تحقیق مختلط بر اساس سنجش تشخیصی از طریق مشارک ذینفعان سنجش سعی در فراهم کردن اطلاعاتی در مورد نقاط ضعف و قوت زبان آموزان درزیر مهارت های توانش تعاملی زبان آموزان دارد.این تحقیق ابتدا به بررسی تاثیرسنجش تشخیصی به دو روش خود ارزیابی و همتا ارزیابی بر روی توانش تعاملی زبان آموزان پرداخته است، سپس میزان دقت سنجش شخیصی زیر مهارت های توانش تعاملی افراد در ازمون های صحبت کردن دو به دو بررسی شده است. دیدگاه زبان آموزان در مورد به کارگیری سنجش تشخیصی نیز به صورت کیفی مورد بررسی قرار گرفته است. به این منظور60 دانشجوی رشته مترجمی زبان انگلیسی در این تحقیق شرکت داشته اند. طی دوره 12 هفته ای میزان دقت ارزیابی سنجش تشخیصی زبان آموزان در دو گروه خود ارزیابی و همتا ارزیابی با سنجش معلم به عنوان معیار مقایسه و بررسی شده است. تحلیل داده ها به دوروش T-Test وMANOVAنشان داد در حالی که دو گروه خود ارزیابی و همتا ارزیابی پیشرفت چشمگیری در توانش تعاملی داشته اند، تفاوت معناداری بین دستاورد دو گروه در تقویت توانش تعاملی در ازمون های صحبت کردن دو به دووجود نداشته، به علاوه تفاوت معناداری بین میزان دقت سنجش تشخیصی دو گروه در مقایسه با سنجش معلم طی ترم ایجاد نشده بود. همچنین نتایج نشان داد که زبان آموزان دیدگاه مساعدی نسبت به بکارگیری سنجش تشخیصی داشته اند. Manuscript profile
      • Open Access Article

        134 - باغ بی برگی نقد و بررسی شعر "باغ من" از اخوان ثالث
        حسین خسروی
      • Open Access Article

        135 - The diagnosis of generalized anxiety disorder(GAD)using the rorschach test
        Fateh Rahmani Mahdi Salehi
        This study explored the descriptive indices of the Rorschach and Exner's Comprehensive System (ECS; Exner, 2003) in diagnosing generalized anxiety disorder among Iranian population. Clinical interviews based on DSM-IV were used to screen 30 patients with generalized anx More
        This study explored the descriptive indices of the Rorschach and Exner's Comprehensive System (ECS; Exner, 2003) in diagnosing generalized anxiety disorder among Iranian population. Clinical interviews based on DSM-IV were used to screen 30 patients with generalized anxiety disorder and 30 non-anxious subjects. The Rorschach test was administered and scored using ECS. Profile analyses and MANOVA provided access to an index, based on Rorschach variables, which distinguished the patients with GAD, named Anxiety Index (ANXI). &nbsp; &nbsp; Manuscript profile
      • Open Access Article

        136 - The Efficacy of Mindfulness based Intervention on Subclinical Attention Deficit/Hyperactivity Symptoms and Externalizing Problems in Adolescents
        Ashkan Naseh Leila Heydarinasab Mohammad Reza Shairi
        the present study examined the efficacy of mindfulness based intervention in reducing subclinical attention deficit/hyperactivity symptoms and externalizing problems in adolescents. The Child Behavior Checklist (CBCL) and the Youth Self&ndash;report (YSR) of Achenbach S More
        the present study examined the efficacy of mindfulness based intervention in reducing subclinical attention deficit/hyperactivity symptoms and externalizing problems in adolescents. The Child Behavior Checklist (CBCL) and the Youth Self&ndash;report (YSR) of Achenbach System of Empirically Based Assessment (ASEBA) were administered to a sample of 253 adolescents and their mothers. Twenty four of adolescents who scored borderline in attention problem subscale, scored high in externalizing problems scale of CBCL, and their scores had been confirmed by the Youth Self-report were selected and randomly assigned into either experimental (n=12) or control (n=12) groups. The experimental group received 8 mindfulness based intervention sessions for 8 weeks. The data were analyzed using multivariate analysis of variance (MANOVA). The results indicated that attention deficit/ hyperactivity symptoms and externalizing problems reduced significantly in experimental group compared to control group. The findings of this study may be of practical importance for prevention and treatment of adolescents' attention deficit/ hyperactivity symptoms and externalizing problems in clinical settings and schools. Manuscript profile
      • Open Access Article

        137 - Improvement of Face Recognition Approach through Fuzzy-Based SVM
        Amir Hooshang Mazinan لیلا یار محمدی
      • Open Access Article

        138 - High resolution melting (HRM) curve analysis for rapidly and accurate determination of Salmonella spp. with invA gene
        hasan Nili seyed ali ghorashi Habibollah Dadras mohammad Sadegh Saeiabadi
        Background &amp; Objectives: Salmonellosis is an infectious and common disease between humans and animals that is caused by different strains of Salmonella. Progress in molecular diagnostic methods, has led to accurate and easy detection and characterization of food mic More
        Background &amp; Objectives: Salmonellosis is an infectious and common disease between humans and animals that is caused by different strains of Salmonella. Progress in molecular diagnostic methods, has led to accurate and easy detection and characterization of food microbial agent. The purpose of this research was to use HRM technique to access more accurate and rapid diagnosis of Salmonella bacteria by means of invA gene. Material &amp; Methods: In this study, diagnosis of Salmonella was done by polymerase chain reaction and high resolution melting curve ( PCR-HRM) using the sequence on invasion A gene (invA) as a marker.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;In total 9 Salmonella reference strains using a specific primer pair of genes invA were used to detect Salmonella. &nbsp; Results: The expected size of PCR amplified fragments of invA gene was determined as 284bp. All tested strains were able to show a Salmonella specific melting curve with high resolution at thermal interval of 87.8-87.9&deg;C. Conclusion: The results showed that HRM using specific primers of invA gene can be used as an accurate and reliable technique for diagnosis Genus of Salmonella. Manuscript profile
      • Open Access Article

        139 - Aesthetic study of Qoranic vocabularies on the subject of personification in Arabic and Persian Literature.
        Hosein Ghadami
        In rhetorical studies by focusing on rhetorical knowledge which is a miraculous aspect, in divine verses is an organizer element and is very impressive to convey the meanings to the audiences. The beauty of these vocabularies come from personified and humanized words wi More
        In rhetorical studies by focusing on rhetorical knowledge which is a miraculous aspect, in divine verses is an organizer element and is very impressive to convey the meanings to the audiences. The beauty of these vocabularies come from personified and humanized words with pleasure of hearing melodies, enjoyment of intelligence and ear, emotional joy and suitability of verses in psychological verses. In such expression divine vocabularies arrange themselves by personifying and making creatures wise. And in addition to their aesthetic rhetorical expressions, they appear in weaving art, too. This unknown late-named literary term rely on achievements and works of great rhetoricians and by working on contemporary rhetorical culture gets new name, personification. Its background goes before revelation of Qoran. And it shows itself more in divine verses and become a subject for Persian and Arabic Literature. This topic is the continuation of rhetoricians&rsquo; discussions about metaphor and it is completely different from animism. Because recognizing the participations of word in personification, by making the meanings clear is achievable. It has rational satisfaction and has effect on emotion and sentiment. This article with humility and respect tries to present the aesthetic inspired words in art and personification respectfully to friends. Manuscript profile
      • Open Access Article

        140 - Presenting a model to improve tax compliance based on foundation data
        mahdi khadri Habib Piri Reza sotudeh
        In terms of the basic practical purpose, in terms of nature, survey research and in terms of paradigm, combined-exploratory research, sampling in the qualitative part of the research was done in a purposeful way and in the quantitative part in a stratified random manner More
        In terms of the basic practical purpose, in terms of nature, survey research and in terms of paradigm, combined-exploratory research, sampling in the qualitative part of the research was done in a purposeful way and in the quantitative part in a stratified random manner. . In the qualitative phase, the interviews with 15 people, academic and tax experts who have at least a master&#039;s degree or have been working in the tax field for 15 years, continued until theoretical saturation was reached, and the samples of the quantitative part were based on Cochran&#039;s formula was chosen. The research tool in the qualitative part was a semi-structured exploratory interview, and in the quantitative part, a researcher-made questionnaire was used to evaluate the improvement of tax compliance, which was designed based on the codes obtained in the qualitative stage. In the qualitative part, the interviews were analyzed using the foundation&#039;s data analysis method. The validity and reliability of the components were examined and the Cronbach&#039;s alpha of all the above components was 0.7 and during that; The most important components of improving tax compliance were measured. In the quantitative part, the accuracy of the research model was confirmed through the method of structural equations using Amos software, and it was found that the selection of concepts, dimensions and indicators was of high accuracy and could provide a suitable framework for the preparation of the document. provide the prospect of improving tax compliance. Manuscript profile
      • Open Access Article

        141 - Integrated meta-diagnostic protocol and its effect on sensation seeking and fear of negative evaluation of girls affected by Instagram
        Zahra Sadat Alavi qazaal Zand Karimi
        The present study was conducted with the aim of investigating the effectiveness of integrated meta-diagnostic treatment on sensation seeking and fear of negative evaluation of girls affected by Instagram. The research design was quasi-experimental and within the framewo More
        The present study was conducted with the aim of investigating the effectiveness of integrated meta-diagnostic treatment on sensation seeking and fear of negative evaluation of girls affected by Instagram. The research design was quasi-experimental and within the framework of pre-test, post-test and follow-up plans with a control group. The statistical population consisted of 20 female students aged 15 to 18 in Tehran in 1399-1400 who were addicted to Instagram and their sensation seeking and fear of negative evaluation scores were higher than the cutoff score. Voluntary sampling was done in two groups of 10 people, experimental and control. The results of data analysis showed that the integrated meta-diagnostic intervention produced significant changes on sensation seeking and fear of negative evaluation between the experimental and control groups. Also, a significant difference between the experimental and control groups was revealed in the sensation-seeking subscales (experimentalism, adventure, boredom, avoidance of inhibition). The findings showed that the integrated meta-diagnostic treatment approach has been able to reduce excitement seeking and fear of negative evaluation in teenage girls on Instagram and subsequently reduce the desire to seek likes and approval in these people. Manuscript profile
      • Open Access Article

        142 - تأثیر حسابرسی مالیاتی بررابطه بین مالیات ابرازی، تشخیصی و قطعی: مطالعه موردی استان‌های آذربایجان شرقی، غربی و شرق و جنوب تهران
        اسفندیار ملکیان سروه فرزاد
      • Open Access Article

        143 - A study on the experience of men and women with cancer in Tehran
        shamim sherafat kiana taghikhan
        Cancer is one of the most common diseases in the world. This condition can affect many aspects of a person's life. The aim of this study is to investigate the effect of this disease on the lives of cancer patients and the lived experience of these people. For this purpo More
        Cancer is one of the most common diseases in the world. This condition can affect many aspects of a person's life. The aim of this study is to investigate the effect of this disease on the lives of cancer patients and the lived experience of these people. For this purpose, 14 women and 6 male heads of households who were selected by snowball method were examined through in-depth semi-structured interviews. The data was examined by MAXQDA program. The findings show that the disease affects people in both economic and social terms. In the economic dimension, the high cost of treatment, then the loss of job and being a consumer disrupts a person's life, and in the social dimension, the experience of feeling rejected, lonely, enduring gender stereotypes, neglecting of some doctors, not allocating enough time for the patient, misdiagnose and humiliation of the charities were among the information found in this research. Manuscript profile
      • Open Access Article

        144 - بررسی توانمندی الگوهای پیش بینی کننده بحران مالی
        زهرا پورزمانی رضا کی‌پور مصطفی نورالدین
      • Open Access Article

        145 - The Effect of Ethics and Tenure on the Auditor's Ability to Recognize Accounting Practices
        hasan hemati elham bayat Majid Moradi
        Abstract The purpose of this study is to investigate Effect of Auditor Ethics and Audit Tenure on Auditor Ability to Detect Creative Accounting Practices. The general research method used in this research is descriptive-correlational survey and according to the purpose More
        Abstract The purpose of this study is to investigate Effect of Auditor Ethics and Audit Tenure on Auditor Ability to Detect Creative Accounting Practices. The general research method used in this research is descriptive-correlational survey and according to the purpose of this research is to determine the relationship between the components of auditors' ethics and the auditor's tenure on the Auditor Ability to Detect Creative. And how to conduct a survey research method using the independent and standard questionnaire of Fullerton and Dotschi (2004), for the Auditor Ability to Detect Creative, the standard questionnaire Armga Zarfar (2016) can be used for professional ethics. The results of testing the first hypothesis showed that the auditor's ethics has a positive and significant effect on the Auditor Ability to Detect Creative to identify accounting methods. The size of the auditing firm has a positive and significant effect on the Auditor Ability to Detect Creative Accounting Practices. Manuscript profile
      • Open Access Article

        146 - بررسی زیباشناختی شعر مفتون امینی
        علیرضا تایوغ نجیبه هنرور فرهاد فلاحت خواه
      • Open Access Article

        147 - تشخیص معکوس حفره دایره‌ای د‌ر جسم دو بعدی با اندازه‌گیری‌های دمایی و شبکه عصبی مصنوعی
        محمد امین احمدفرد محمد جواد کاظم زاده پارسی علیرضا تهور
        در مسائل تشخیص شکل که جزء مسائل معکوس هندسی دسته‌بندی می‌شوند فرض می‌شود که قسمت‌هایی از دامنه مسئله در دسترس نبوده و نمی‌توان شکل و ابعاد هندسی چنین قسمت‌هایی را به‌طور مستقیم اندازه‌گیری نمود. هدف این است که با انجام اندازه‌گیری دما روی سطوح قابل دسترس، شکل هندسی قسمت More
        در مسائل تشخیص شکل که جزء مسائل معکوس هندسی دسته‌بندی می‌شوند فرض می‌شود که قسمت‌هایی از دامنه مسئله در دسترس نبوده و نمی‌توان شکل و ابعاد هندسی چنین قسمت‌هایی را به‌طور مستقیم اندازه‌گیری نمود. هدف این است که با انجام اندازه‌گیری دما روی سطوح قابل دسترس، شکل هندسی قسمت‌های دور از دسترس را تخمین زد. از روش شبکه عصبی مصنوعی برای حل مسئله انتقال حرارت معکوس و تشخیص شکل و مکان حفره به‌صورت غیر‌مخرب استفاده شده است به این صورت که با آموزش شبکه عصبی با استفاده از روش اجزا ‌محدود، رفتار انتقال حرارت هدایت جسم بر اساس مکان و اندازه دو بعدی حفره مدل‌سازی شده سپس از این مدل برای تخمین مکان و اندازه حفره مخفی درون جسم در شرایط جدید استفاده شده است. با مقایسه نتایج شبکه عصبی با مقادیر واقعی نتیجه می‌شود که روش مورد مطالعه از دقت بالایی برخوردار است. Manuscript profile
      • Open Access Article

        148 - تشخیص و درمان: واقعیت تا حقیقت
        hamid reaz fatahian
      • Open Access Article

        149 - The clinical importance of acquiring a history in the diagnosis of heart disease in small animals
        Siamak Mashhady Rafie
      • Open Access Article

        150 - Differential Diagnosis of Fasciolosis and Dicrocoeliosis by using Somatic Protein Bands
        عباس Baygan نادیا Taiefi Nasrabadi
        Dicrocoelium and Fasciola are hepatic duct parasites of different animals that are reported from cattle, buffalo,camel, sheep, goats, wild rabbit and hogs in Iran and many other parts of the world. Studies show that the existenceof this parasites in the livers of final More
        Dicrocoelium and Fasciola are hepatic duct parasites of different animals that are reported from cattle, buffalo,camel, sheep, goats, wild rabbit and hogs in Iran and many other parts of the world. Studies show that the existenceof this parasites in the livers of final hosts become pathogens.The new technologies in the field of molecularbiology had caused basic changes in the classic researches and indistinguishing parasites. One of these methods isthe somatic proteins identification of the parasites resulted from SDS-PAGE.In an abattoir, adult trematodes were obtained from infested livers of cows, sheep and goats. The different partsof the parasite, such as evacuated materials, excretory and somatic parts can have antigens for diagnosing proteins.There are different method for diagnosing proteins. The best and easiest of these methods is electrophoresis withSDS PAGE. After some processing, some adult termatodes of every host for the expulsion of extra materials waswashed in PBS (pH= 7.4) 3-4 times and the resulting solution was centrifuged in 4oC for 30 min in 12000 G.The results of the present study showed that D. denderiticum protein bands are in 14.4-116 kDa range and theirnumbers is 15. F. hepatica protein bands are in 18-63 kDa and include 7 bands, while F. gigantica in the samerange is 9 bands.Using somatic proteins pattern can be considered as a new paraclinic method for the differential diagnosis ofFascioliasis and Dicrocoeliasis. Manuscript profile
      • Open Access Article

        151 - An Intrusion Detection System for Network Cyber Security Using Hybrid Feature Selection Algorithms
        Golnaz Aghaee Ghazvini zahra Oday Kamil
        One of the most important challenges of the expansion of the Internet and virtual space is cyber-attacks. These attacks are becoming new every day and it is becoming more difficult to deal with them. As a result, methods should be used to detect them, which can detect a More
        One of the most important challenges of the expansion of the Internet and virtual space is cyber-attacks. These attacks are becoming new every day and it is becoming more difficult to deal with them. As a result, methods should be used to detect them, which can detect all types of cyber-attacks in the shortest possible time and with proper accuracy. Nowadays, machine learning methods are usually used to detect cyber-attacks. But since the data related to cyber-attacks have many characteristics and are kind of bulky data, as a result, the accuracy of conventional machine learning methods to detect them is usually low. In this research, we have used a hybrid feature selection method to select optimal features from the database related to cyber-attacks, which increases the accuracy of attack detection by classification models. In the proposed feature selection method, first the features that have the least redundancy with each other and at the same time are most related to the category variables (labels) are selected by the MRMR algorithm. Then, using a wrapper feature selection method based on the gray wolf optimization (GWO) algorithm to select a subset of the features selected from the previous step, which maximizes the accuracy of the SVM classifier model, is used this subset has optimal features by which the SVM model is trained. As a result, the accuracy of detecting cyber-attacks by the SVM model increases. According to the simulation results, the average accuracy of the proposed method for detecting cyber-attacks is 99.84%, which has improved compared to the intrusion detection methods of the reference article. Manuscript profile
      • Open Access Article

        152 - An optimal approach to detect anomalies in intrusion detection systems
        افسانه بنی طالبی
        Software Defined Networking (SDN) is considered as an innovate architecture of computer networks by using the central controller. Any modification in network data and its arrangement can be effortlessly executed in software via the controller in these networks. Conseque More
        Software Defined Networking (SDN) is considered as an innovate architecture of computer networks by using the central controller. Any modification in network data and its arrangement can be effortlessly executed in software via the controller in these networks. Consequently, the identification and timely response to Distributed Denial of Service (DDoS) attacks can be achieved, which is not the case in conventional networks.This paper uses the α-Entropy statistical method considering a threshold and machine learning techniques, K-Nearest Neighbor (KNN), Random Forest (RF) and Support Vector Machine (SVM) to increase the accuracy of detecting DDoS attacks. In this method, the results are evaluated by 10-fold cross validation. The used dataset is ISOT, CTU-13 and UNB ISCX. The results of evaluation with a precision of 99.84% and FPR value of 0.10% indicate the high efficiency of the proposed model in SDN networks. Manuscript profile
      • Open Access Article

        153 - Investigating the Mechanism of Performance Measurement Systems with Emphasis on Usage Types, Sophistication Levels, and Environmental Uncertainty: A Case Study of Persian Gulf Holding
        seyedeh raja ghalebi Shokralah Khajavi ali mahmoodi
        The goal of any Performance Measuring System (PMS) as an integral control mechanism, is the focus on and convey of the effects financial and non-financial information on decision-making and management decisions. The Diagnostic and Interactive use of the PMS as a measure More
        The goal of any Performance Measuring System (PMS) as an integral control mechanism, is the focus on and convey of the effects financial and non-financial information on decision-making and management decisions. The Diagnostic and Interactive use of the PMS as a measurement and feedback system is used for design and strategy testing for organizational coordination. The current study attempts to assess the effects of diagnostic and interactive use alongside the inherent PMS-level complexities on Organizational returns. Alongside this, varying intervening effects of environmental uncertainty contingencies on complexity levels were analysed from across 46 active organizations in the petrol industry during 1401. In this study, within Simon’s Lever of Control (LOC) framework, we focus on the design and function of PMS, alongside Contingency plans with a compatibility-mediation approach to test the presented theories of the partial Least Squares Structural Equation Modelling (PLS-SEM) method. Our findings displayed that interactive functionality had a significant and positive relation with PMS, while the results of diagnostic functionality are left unsatisfactory (non-confirmed). Additionally, a significant correlation between complexity levels and environmental uncertainties with PMS outcomes, PMS outcomes in operational performance, Diagnostical and Interactive Functions in PMS complexities, and environmental uncertainties with Diagnostical and Interactive functions was confirmed. Manuscript profile
      • Open Access Article

        154 - Diagnostic validity of the testChildren (CAT.S) in students with emotional disorders
        adele gholami Kambiz Kamkary shohreh shokrzadeh
        In this Research, the &quot;diagnostic validity of the Child Recognition Test (CAT.S) in students with emotional disorders&quot; and the main question of the research is whether the Child Recognition Test (CAT.S) for students with emotional disorders Does it have diagno More
        In this Research, the &quot;diagnostic validity of the Child Recognition Test (CAT.S) in students with emotional disorders&quot; and the main question of the research is whether the Child Recognition Test (CAT.S) for students with emotional disorders Does it have diagnostic validity? The present research design was presented in the field of psychometric designs. The statistical population consists of all students with emotional disorders. Using targeted sampling method, available and referred to medical centers, 60 as a clinical sample (emotional disorder) and 60 as normative students. They were selected and then the test was performed in both groups using the children&#039;s entrance test. It should be noted that first, from the referring students, an interview with the parents and then a behavioral observation checklist with emphasis on the DSM-5 diagnostic criteria were prepared and 60 children were considered. Finally, 120 students were selected as the sample. The measurement tool in the present Research is the Child Admission Test (CAT-S) which has good validity and reliability. Finally, in the present study, in order to evaluate the diagnostic validity of the mentioned instrument, the coefficient of sensitivity and Clarification was used and the findings showed that Cards 1 to 7 have a coefficient of sensitivity and clarity and can be known. Distinguish students with emotional disorders from normative students. Manuscript profile
      • Open Access Article

        155 - Diagnostic validity of working memory scale, fifth editionWechsler intelligence scale in preschool children with attention deficit disorder
        Kambiz Kamkary fatemeh hosseini moghaddam
        In this research, the &quot;diagnostic validity of the working memory scale of the fifth version of the Wechsler IQ scale in preschool children with attention deficit disorder&quot; has been discussed. The main question of the research is whether the fifth version of th More
        In this research, the &quot;diagnostic validity of the working memory scale of the fifth version of the Wechsler IQ scale in preschool children with attention deficit disorder&quot; has been discussed. The main question of the research is whether the fifth version of the Wechsler children&#039;s intelligence scale has diagnostic validity in preschool children with attention deficit disorder. The current research method is in the field of psychometric researchs, which is a subset of the methodological research method. The research population consists of all preschool children with attention deficit disorder, which were selected as the sample size using the available targeted sampling method of 120 preschool children with attention deficit disorder. The measurement Instrument in this research is the fifth version of Wechsler&#039;s intelligence scale for children, which has good validity and reliability. The statistical model used in this research to determine the diagnostic validity is the scatterplot method (Davis method) and the confidence interval method. Finally, the findings of the research showed that using the scatterplot method in the fifth edition of the &quot;number capacity&quot;, &quot;image capacity&quot; and &quot;number-letter sequence&quot; tests have diagnostic validity. Also, by emphasizing the confidence interval method, working memory scale in diagnosing preschool children with attention deficit disorder has diagnostic validity and can distinguish preschool children with attention deficit disorder from other students. Manuscript profile
      • Open Access Article

        156 - diagnostic validity of the third versionof the WoodcockJohnson cognitive ability scale in students with learning disabilities in Hamedan city
        Kambiz Kamkary saed hasanzadeh roya kaveh
        In this research, the &quot;diagnostic validity of the third version of the Woodcock Johnson cognitive ability scale in students with learning disabilities in Hamedan city&quot; has been discussed. The main question of the research was formulated as follows: Does the th More
        In this research, the &quot;diagnostic validity of the third version of the Woodcock Johnson cognitive ability scale in students with learning disabilities in Hamedan city&quot; has been discussed. The main question of the research was formulated as follows: Does the third version of Woodcock Johnson&#039;s cognitive ability scale have diagnostic validity in students with learning disabilities in Hamedan city? The current research method is in the field of psychometric studies, which is a subset of the methodological research method. The population of this research consists of all the male and female students with learning disabilities who received special educational and therapeutic services in the fifth and sixth grades of non-governmental centers for special learning difficulties in Hamedan city in the academic year of 2013-2013. By using the purposeful sampling method and using the simple random sampling method, 60 students were selected as a sample. The measurement tool in this research is the new third version of Woodcock-Johnson&#039;s cognitive abilities, which have good validity and reliability. The statistical model used in the current research to determine the diagnostic validity is the scatter plot method (Davis method) and the confidence interval method. The results of the research showed that with the method of scatter plot points, verbal comprehension tests, spatial relations, sound composition, concept formation, visual adaptation, number inversion, incomplete words and active listening memory and with the confidence interval method of tests Verbal comprehension, visual-auditory learning, visual adaptation and incomplete words have diagnostic validity. Finally, it can be concluded considering that the tests of verbal comprehension, visual adaptation and incomplete words have been shown to have diagnostic validity by both methods, therefore, from the three mentioned tests, He used normal students to identify learning disabled students. Manuscript profile
      • Open Access Article

        157 - a
        زهرا حیدری
      • Open Access Article

        158 - Psychometric Properties of the New Version Intelligence Tehran- Stanford - Binet in Learning Disabled Students
        Kambiz Kamkari
      • Open Access Article

        159 - P Diagnostic Validity of Thehran- Stanford-Binet in Amol Learning Disability Students
        zahra hoseini shohreh shokrzadeh kambiz kamkari
        This research &nbsp; has been conducted with this goal to determine the diagnostic validity of the &nbsp; new version of Tehran- Stanford- Binet for students with learning &nbsp; disabilities. The statistical population consists all students with learning &nbsp; disabil More
        This research &nbsp; has been conducted with this goal to determine the diagnostic validity of the &nbsp; new version of Tehran- Stanford- Binet for students with learning &nbsp; disabilities. The statistical population consists all students with learning &nbsp; disabilities who have been&nbsp;&nbsp; referred &nbsp; to Amol&rsquo;s center of learning disabilities in the semester 1393- 1394. The &nbsp; sample size contained 60 students who were selected by purposive sampling. To &nbsp; collect data for this research the new version of Tehran-Stanford-Binet has &nbsp; been used. In order to analyze the data and to determine the validity of &nbsp; diagnostic instrument, diagram of the distribution and the confidence &nbsp; interval method, and Composite has been used. The results showed that this &nbsp; scale in the areas of knowledge, working memory and quantitative reasoning &nbsp; has a little bit of a good diagnostic validity. Considering this fact that &nbsp; subtests were low in students with learning disabilities, we can conclude &nbsp; that these three indicators have the required predictive power, and with an &nbsp; emphasis on the average of the constituent elements of nonverbal Domain of &nbsp; Tehran-Stanford-Binet&rsquo;s IQ test it was determined that among the factors, &nbsp; verbal working memory with (5/08), has the lowest average Manuscript profile
      • Open Access Article

        160 - r
        سلیمه دارمی sh sh
      • Open Access Article

        161 - Psychometric properties of short diagnostic questionnaire Disorders-Adverse Conjugation Disorder in Students in Isfahan Province
        Haleh Shayesteh Shohreh Shokrzadeh Kambiz Kamkari
        Psychometric properties of short diagnostic questionnaireDisorders-Adverse Conjugation Disorder in Students in Isfahan Province
        Psychometric properties of short diagnostic questionnaireDisorders-Adverse Conjugation Disorder in Students in Isfahan Province Manuscript profile
      • Open Access Article

        162 - MMPI-2RF)
        کامبیز کامکاری sh sh مژگان صادقی
        MMPI-2RF)
        MMPI-2RF) Manuscript profile
      • Open Access Article

        163 - Analysis of ontological metaphors in Mehrdad Avesta's "Epic of Arash" based on Lakoff and Johnsons’s theory
        Fereshteh Shahsanam ahmad khajeim Aboulghasem rahimi hasan delbari
        AbstractOne of the achievements of cognitive linguistics is the discovery of the fact that languages ​​use conceptual metaphors to make abstract concepts tangible. According to Lakoff and Johnson (2003), conceptual metaphor uses the domain of origin, which is a tangible More
        AbstractOne of the achievements of cognitive linguistics is the discovery of the fact that languages ​​use conceptual metaphors to make abstract concepts tangible. According to Lakoff and Johnson (2003), conceptual metaphor uses the domain of origin, which is a tangible domain, to explain the domain of destination, which is an abstract and intangible concept; In fact, the basis of conceptual metaphor is the existence of a category of origin and a category of destination and the creation of a correspondence between them. In this view, conceptual metaphors are divided into three categories: ontological, directional and structural, and ontological metaphors in turn fall into three sub-categories: container, object / matter, personality (discernment). Arash's long epic poem is one of the valuable works of Mehrdad Avesta.&nbsp; According to his epic content, he has expressed many abstract concepts with the help of conceptual metaphors. The purpose of this study is to investigate the ontological metaphors in this epic work in a descriptive-analytical manner. After answering the question of how ontological metaphors were used in Arash's epic and what concepts were tangible through this metaphor, the authors came to the conclusion that the poet sought to express sigh and regret. From the turbulent times that have arisen from the war between Iran and Turan, the conceptualized areas such as times, regrets, fears, calamities, &nbsp;and etc. were expressed with the areas of origin in terms of the vessel, objects and people. Since the essence of the epic is associated with dynamism and mobility, most conceptualization has taken place with the domain of the origin of the character bringing life to abstract concepts. Manuscript profile
      • Open Access Article

        164 - The comparison of the effectiveness of functional analytic psychotherapy with unified protocol for trans diagnostic treatment on depression, anxiety and marital satisfaction among women with marital distress
        Ahmad Etemadi Hossein Gholizadeh Hossein Salimi Kiumars Farahbakhsh
        Marital distress can disrupt the mental and physical health of the individual and the family. The aim of the current study was the comparison of the effectiveness of functional analytic psychotherapy (FAP) with unified protocol for trans diagnostic treatment (UP) on dep More
        Marital distress can disrupt the mental and physical health of the individual and the family. The aim of the current study was the comparison of the effectiveness of functional analytic psychotherapy (FAP) with unified protocol for trans diagnostic treatment (UP) on depression, anxiety symptoms and marital satisfaction among women with marital distress. To this end, 45 women with marital disturbances were selected through a semi-experimental research, and they were selected in three groups: FAP, UP and control group. Treatment was conducted on 12 weekly and one hour sessions. The control group did not receive treatment. The subjects were evaluated for depression, anxiety, marital satisfaction and dual compatibility before and after the study. Analysis of covariance showed that there are significant differences among three groups. Pairwise comparison showed both treatments have better effectiveness than the control group. There is no significant difference between two treatment groups in depression, in anxiety the UT group and in marital satisfaction the FAP group had a better performance. Manuscript profile
      • Open Access Article

        165 - The effectiveness of integrated Transdiagnostic Treatment in reducing the symptoms of major depressive disorder
        Abas Bakhshipour Babak Vojodi Majid Mahmood Alilo Reaz Abdi
        Major depressive disorder is one of the main worldwide challenges of the century due to its widespread prevalence, fairly persistent nature, and impairing impact that it has on academic and job performance, interpersonal relationships, and economic, social, and human re More
        Major depressive disorder is one of the main worldwide challenges of the century due to its widespread prevalence, fairly persistent nature, and impairing impact that it has on academic and job performance, interpersonal relationships, and economic, social, and human resources.. The present research conducted with the aim of studying the efficacy of integrated transdiagnostic treatment on reduction of major depressive disorder&rsquo;s symptoms. In order to do this, a single case study with multiple baselines was implemented. Three patients diagnosed with major depressive disorder were selected by using purposeful sampling method through diagnostic and structured clinical interviews. The subjects underwent the treatment process subsequent to obtaining treatment requirements. Patients were evaluated in three phases of intervention (baseline, treatment, and follow-up) by Beck Depression Inventory II (BDI-II), and Work and Social Adjustment Scale (WSAS). Visual delineation, recovery percentage, and the effect size revealed that integrated transdiagnostic treatment elicits significant improvement both in clinical and statistical treatment objectives (symptoms of major depressive disorder and functioning impairment level), and that the treatment effect is continuous throughout the follow-up period. It could be determined that integrated transdiagnostic Treatment has appropriate efficacy on the reduction of major depressive disorder symptoms. Manuscript profile
      • Open Access Article

        166 - Multiple Simultaneous Damage Detection in large-span bridges
        محمد وحیدی آرمین عطیمی نژاد مریم فیروزی محمد هریسچیان
        This paper presents a powerful two-step method for damage detection of large-span bridges with variable sections. Bridges are one of the basic infrastructures in the field of urban and suburban transportation, and timely detection of damage during its operation is impor More
        This paper presents a powerful two-step method for damage detection of large-span bridges with variable sections. Bridges are one of the basic infrastructures in the field of urban and suburban transportation, and timely detection of damage during its operation is important. Damage in this category of structures will cause service disruption during natural disasters. The presented method is based on the combination of spectral finite element and modal strain energy damage index, as well as the combination of genetic algorithm and support vector regression to detect and estimate the damage severity. One of the efficient methods in the field of wave propagation is the spectral finite element method, which is capable of modeling with high flexibility and detecting micro damage. Vibration-based methods are widely used to detect structural damage, while the modal strain energy damage index has a higher sensitivity in detecting damage among other vibration-based methods. The case study model is the Crowchild Bridge in Western Canada, which has special characteristics in terms of geometry and the characteristics of structural elements. In this research, the modal strain energy damage index has been modified due to the change of cross-section along the girders. Also, support vector regression has been used as a robust technique in estimation damage severity. In order to increase the accuracy and improve the damage severity estimation method, the genetic algorithm is used to optimize the effective parameters of the support vector regression. The combined method of genetic algorithm and support vector regression has been able to estimate the severity of damages in a favorable way. Manuscript profile
      • Open Access Article

        167 - Sugar beet farmers’ Knowledge, attitudes and skills with regard to sustainable practices of on-farm soil management in Khorasan-Razavi province
        Ali Asghar Shahroudi mohammad . Chizari ghlamreza Pezeshki-Raad
        The aim of this study was to evaluate the sugar beet farmers&rsquo; knowledge, attitudes and skills on optimal on-farm soil management practices and to identify and determine the most important distinguishing factors of their behavior domains on soil management. The met More
        The aim of this study was to evaluate the sugar beet farmers&rsquo; knowledge, attitudes and skills on optimal on-farm soil management practices and to identify and determine the most important distinguishing factors of their behavior domains on soil management. The methodological approach in the research was a descriptive and causal-comparative study of the survey type. The target population in the study was the sugar beet farmers of Khorasan-Razavi province (n=33000). Using a multi-stage cluster sampling technique, 380 farmers were selected as a statistical sample. Finally, 98.5% questionnaires were collected and analyzed (n=375). The content and face validity of the instrument was specified after several times of review and correction by the faculty members of agricultural extension and education, agronomy and soil science departments at Tarbiat Modarres university, several experts of Jihad e Agriculture ministry and the agricultural sector of the sugar factories in Khorasan-Razavi province. The reliability of analysis was conducted through 30 questionnaires and Cronbach&rsquo;s Alpha values for the section of behavioral domains of the instrument were estimated between 0.71-0.87 using statistical SPSS software. Considering Venn diagram in relation to the triple domains of studied sugar beet farmers&rsquo; behavior, results showed that about 11.2% (42 sugar beet growers) were identified as qualified farmers. The results of the stepwise discriminant analysis with Wilks&rsquo; Lambda procedure and partial F-test criteria revealed that educational level, extension contacts, extend of irrigated cultivation, farmers&rsquo; age and social status were the most important distinguished variables of farmers&rsquo; behavioral categories. Generally, mentioned variables could correctly classify 66.9% of all subjects based on the discriminant functions. Manuscript profile