• List of Articles marking

      • Open Access Article

        1 - Authenticating electronic documents using steganography and watermarking methods
        Mostafa Mozafari
        All organizations must keep records of their business decisions and transactions to meet the demands of the company's customers or stakeholders. Due to the increasing number of electronic documents as well as the conversion of paper documents to electronic ones, the use More
        All organizations must keep records of their business decisions and transactions to meet the demands of the company's customers or stakeholders. Due to the increasing number of electronic documents as well as the conversion of paper documents to electronic ones, the use of information and communication technology changes the way of doing work in organizations and leads to a much greater dependence on electronic records. Electronic document management helps organizations to utilize information more effectively and to support the immediate operational needs for business information. An electronic records management system should be able to manage electronic records throughout their life cycle, from recording, integrity, authenticity, deletion and availability, and at the same time, one of the problems is authentication and preservation of intellectual works for electronic files. To solve such problems, we can use new methods in this direction, one of these methods is the use of steganography and watermarking. Steganography has been widely used in the past decade. Steganography and watermarking methods are designed to embed sequences of hidden information in electronic objects for various purposes, which are used in the fields of security and protection in order to hide the original message or preserve the spiritual works. This paper first studies a common understanding of EDMS concepts and, in the next step, shows the current research in the field of information embedding methods in electronic documents. Manuscript profile
      • Open Access Article

        2 - Development of Engineering Structures on NPD (New Product Development) Processes in Industry
        S.M. Seyad-Hosseini J. Nazemi
        New product development is a major competitive advantage of any enterprise in today’s golden market. In spite of the many researches that have been done on the subject of product development, still there is a lack of knowledge of answering to this question ‘ More
        New product development is a major competitive advantage of any enterprise in today’s golden market. In spite of the many researches that have been done on the subject of product development, still there is a lack of knowledge of answering to this question ‘why some companies are so successful while others fail.’ The main objective of this paper is to introduce the organizational structure and processes of companies in their NPD practices which causes delays, cost disadvantages and missed market opportunities on their projects. The paper then proposes a model for situational analysis and assist companies to compare themselves with others. Based on the developed model, the description of characteristics, weaknees and strengths of companies also has been investigated. Manuscript profile
      • Open Access Article

        3 - Management accounting practices in the firms listed on the Tehran stock exchanged: An empirical examination
        یحیی حساس یگانه زهرا دیانتی دیلمی ابراهیم نوروزبگی
        One of the most important aspects of accounting research in different countries isacquiring knowledge about situation of accounting systems and finding theweaknesses and gaps, and providing solutions to resolve existing deficiencies andupgrading to higher levels. Despit More
        One of the most important aspects of accounting research in different countries isacquiring knowledge about situation of accounting systems and finding theweaknesses and gaps, and providing solutions to resolve existing deficiencies andupgrading to higher levels. Despite many studies about financial topics in Iranianfirms, unfortunately, a comprehensive study for determining managementaccounting's evolution stage and it's current position is not performed. In this study, asample consisting of 105 firms listed on TSE is selected that only 72 companies'management responses to questionnaire. The results show that %73.6 of companiesare in the first evolution stage, %51.4 are in Second stage, %45.8 are in third stage,and %15.3 are in fourth stage.The result of this study is similar to results of studies in other developing countries.In addition, providing information for annual financial reports, cost allocation andcontrol are more used in our sample companies and tools such as risk management,strategic planning and decision making are fewer used. Manuscript profile
      • Open Access Article

        4 - Benchmarking Automotive and Parts Manufacturing Companies Based on Intellectual Capital Using Data Envelopment Analysis
        Mohsen Mirzaee Moein Zareian
      • Open Access Article

        5 - Data envelopment analysis model and benchmarking in a hierarchical structure with dependent parameters
        Sajjad Kheyri Seyed Esmaeil Najafi Bijan Rahmani Parchikolaei
      • Open Access Article

        6 - Efficient and Sustainable Use of Water Resources in Khuzestan through Water Footprint Benchmarking
        Samira Salari Fatemeh Karandish Parviz Haghighatjou Maite Aldaya
        Background and aim: Anthropogenic water scarcity is among global concerns which threats the sustainability of the world in future. Overexploiting limited blue water resources for supplying human’s growing food demand is the main root of such a scarcity. Being stil More
        Background and aim: Anthropogenic water scarcity is among global concerns which threats the sustainability of the world in future. Overexploiting limited blue water resources for supplying human’s growing food demand is the main root of such a scarcity. Being still in its infancy, water footprint (WF) benchmarking is a proper method to determine the inefficient fraction of water consumption. Hence, we assessed if achieving benchmark levels can limit agricultural WF to its sustainable cap in Khuzestan province, which is the agricultural backbone of Iran.Method: The research consists of three stages including WF accounting, and sustainability and efficiency assessment. First, consumptive and degradative WFs were accounted for 32 in counties of Khuzestan province over the period 1986-2016. Green and blue WFs were accounted by dividing green and blue evapotranspiration by crop’s yield, respectively. The AquaCrop model was used to simulate daily evapotranspiration, and then, seasonal values were estimated by aggregating daily values. Grey WF was estimated for the applied nitrogen fertilizer in croplands. In the next stage, the sustainability status of water consumption pattern was assessed by dividing overall blue WF by blue water availability. The latter was estimated by subtracting environmental flow requirements from natural runoff. Thereafter, WF benchmarks were extracted for 10th, 25th, and 50th level of crop production, and based on which, the inefficient fractions of blue WFs were estimated for individual crops. Finally, inefficient blue WFs were compared with unsustainable ones to know if achieving benchmark levels can limit agricultural blue water consumption to its sustainable caps in the study area. A correlation assessment was also done to determine the main roots of inefficiency in Khuzestan province.Results: Along with a 63% increase in crop production and 53 increase in unit blue WF, the overall blue WF increased by 80% over the study period. Such an increasing pattern caused groundwater overexploitation with an annual average rate of 12 million m3 y-1. The contribution of green WF in consumptive WF decreased from 60% in 1986 to 48% in 2016. Overall grey WF, however, followed a decreasing trend, with an average annual decreasing slope of 140 m3 ha-1 y-1, which mainly occurred by a considerable reduction in cash crop’s grey WF. In 2016, a total of 0.98 billion m3 of blue water was consumed unsustainably, which was roughly 85% higher than one in 1986. The number of countries with unsustainable water consumption also increased from 2 counties in 1986, to 9 counties in 2016. Stable crops had the largest contribution in unsustainable WF. Based on the results of efficiency assessment, and considering WF benchmarks developed at 25th of crop production level, inefficient blue WF varies in the range of 0.26 to 606 million m3 y-1 in different counties in 2016. Compared with 1986, the inefficiency increased by 10-3860 m3 ha-1 in 16 counties in 2016. While achieving benchmark levels can reduce blue WF to its sustainable level at provincial scale, unsustainable blue WFs in Andimeshk and Ramshir counties are still 6.8 and 340.9 million m3 higher than the inefficient blue WFs, respectively. The correlation assessment showed that inefficiency increase along with any increase in added value by agricultural production and/or export, unit blue WF, blue water scarcity level, and access to groundwater consumption; while it decreases with any increase in the number of employees per ha, crop yield, and cash crop’s harvested area.Conclusion: WF assessment showed that crop production in Khuzestan province is done at the cost of deteriorating environment, which threats the stability of agricultural system in near future. While achieving benchmark levels helps with being limited to sustainable WF caps through removing inefficient blue WF fractions, there are still the risk of unsustainability in some regions, which indicates the importance of high-resolution assessments for determining hotspots. Hence, further research is required to determine temporal hotspots as well, in order to implement a proper sustainable development plans. Manuscript profile
      • Open Access Article

        7 - A Comparative Survey on Norm Deviation in Hossein Panahi and Manouchehr Atashi's Poetry
        Elkhas Veisi Azadeh Ebadi
        Norm – deviation is one of the methods for marking and defamiliarization of the poetry which has been applied by many poets. In the contemporary poetry, Nima Youshij played vital role in founding the norm – deviation and had many followers. The present resea More
        Norm – deviation is one of the methods for marking and defamiliarization of the poetry which has been applied by many poets. In the contemporary poetry, Nima Youshij played vital role in founding the norm – deviation and had many followers. The present research studies and surveys two poets' poetries – Hossein Panahi & Manouchehr Atashi – from norm – deviation and defamiliarization point of view since they were both poets criteria and they both were from south of Iran and have applied south's culture, literature and folklore; hence both were contemporary, their poetries are studied comparatively. Manuscript profile
      • Open Access Article

        8 - A new automatic watermarking algorithm based on Fuzzy Logic and Harris Hawks optimization
        Mehdi Fallah Kazemi Arash Ahmadpour Nadia Pourmahdi
        This paper presents a new watermarking method to improve the robustness and transparency of extracted and host images. The embedding process is based on decomposing of pyramidal directional filter bank and triangular matrix, while the watermark extraction process is bas More
        This paper presents a new watermarking method to improve the robustness and transparency of extracted and host images. The embedding process is based on decomposing of pyramidal directional filter bank and triangular matrix, while the watermark extraction process is based on Mamdani fuzzy logic. In this design, in order to obtain efficient robustness and transparency, the Harris hawks optimization algorithm is used to find the best value of embedding factor. For this purpose, in the embedding algorithm, pyramid directional filter bank decomposition is utilized and accordingly the approximation sub-bands are divided into 8*8 non-overlapping blocks. Moreover, by decomposing the triangular matrix, which embeds the watermark bits in the matrix element, the use of Mamdani implication and the product inference engine have led to an efficient watermark extraction. The simulation results show that the quality of the watermarked image is equal to 60.6dB. Furethermore, applying the proposed algorithm is strong against attacks. Manuscript profile
      • Open Access Article

        9 - Quantization Watermarking in Three-Dimensional Wavelet Transform Domain
        Mohsen Ashourian
      • Open Access Article

        10 - Providing an Optimal Way to Increase the Security of Data Transfer using Watermarking in Digital Audio Signals
        Saeed Talati Pouriya Etezadifar
      • Open Access Article

        11 - Evaluating effects of various physiographic factors and distance from road on timber marking using multiple linear regression model
        Hamid Jalilvand Maryam Niknejad Mohammad Hejazian
        One of the forest management tools which has a direct impact on the qualitative and quantitative characteristics is timber marking. In order to evaluate the effects of physiographic factors of land and road forms on timber marking for the logging, the multiple linear re More
        One of the forest management tools which has a direct impact on the qualitative and quantitative characteristics is timber marking. In order to evaluate the effects of physiographic factors of land and road forms on timber marking for the logging, the multiple linear regression model was used in the Forestry Plan Series 2 in the seventh zone of forestry plans of Nekachoub Company, Mazandaran province. For this purpose, the location of marked trees was determined using GPS in a plot with an area of 215 hectares. Then, maps of marked trees, altitude, aspect and slope percent, soil and distance from the road were prepared in GIS environment using these points and digital elevation model of study area. To understand the relationship between factors and marked trees, the multiple linear model was used. So, maps of mentioned factors and marked tree's location were entered into the regression model as independent and dependent variables, respectively. The model results showed that the timber marking activity was done more in the areas with low altitude, gentle slope and deep soils on northern and eastern directions near the forest road as compared to the other areas. Timber marking is affected by some physiographic factors, and such elements as slope or adjacency to the road may make the timber marker to interfere in these areas and avoid working in the areas with higher slope or away from the road; it leads to an uneven interventions throughout the forest as well as an unbalanced reclamation of forest structure. Manuscript profile
      • Open Access Article

        12 - A blind and robust video watermarking method based on hybrid 3-D transform
        SHAHROKH FALLAH TORBEHBAR ّFarzad Zargari
        Introduction: Digital images and videos can be copied, reproduced, and distributed with the same quality as the original ones, and this violates the copyright of original producers and the distributors. As a result, embedding information about the original producer and More
        Introduction: Digital images and videos can be copied, reproduced, and distributed with the same quality as the original ones, and this violates the copyright of original producers and the distributors. As a result, embedding information about the original producer and distributor in digital images and video attracted great attention for digital right management. Watermarking provides the facility to embed the required information in images and videos. Robust watermarking is used for embedding authentication information and hence should be robust against various attacks. On the other hand, in fragile watermarking the embedded data should be destroyed by any alteration in the watermarked image or video. Reversible digital watermarking techniques are proposed for lossless restoration of the original image from the watermarked image. Watermarking is non-blind when a copy of the signature or other related information is required for extracting the signature from the watermarked image or video and is blind when the signature can be extracted from watermarked data without any other subsidiary information. Watermarking the signature in a group of successive frames of a video file by the use of 3-D transforms attracted attention because it makes the watermarked video more robust against attacks such as frame averaging and alteration, and watermarking by 3-D transform is employed as a solution to the problems caused by independent watermarking of signature in one or several frames.Methods: Contourlet transform offers a high degree of directionality and anisotropy besides the multi-scale and time-frequency localization properties in wavelet transform. As a result, Contourlet transforms the representation of curved edges in the images with smoother contour and fewer coefficients compared to the wavelet transform. In this paper, a blind robust watermarking method based on a hybrid 3-D transform is proposed. The hybrid 3-D transform is derived by employing the 2-D Contourlet transform along with the 1-D wavelet transform. The signature will be watermarked in the low-frequency sub-band derived from the third level transform. To watermark the signature, we save a modified copy of the high energy coefficients of the even part in the odd part. For signature extraction, the watermarked region is partitioned into odd and even columns. The 3-level 3-D is applied to odd and even parts to transform coefficients. The high-energy sub-bands in odd and even parts are separated to extract the signature.Results: Experimental results indicate low degradation of the quality of the watermarked video, along with high robustness of the watermarked video against common attacks in comparison with other tested blind video watermarking methods.Discussion: A comparison of the proposed method with other methods indicates the superior performance of the proposed method in most of the attacks. Manuscript profile
      • Open Access Article

        13 - Measuring Economic Efficiency of Kidney Bean Production using Non-Discretionary Data Envelopment Analysis
        Alireza Khoshroo Sanjeet Singh
      • Open Access Article

        14 - Benchmarking Marketing Productivity Using Data Envelopment Analysis: a Modified Approach
        Farhad Hosseinzadeh Zohreh Moghaddas
      • Open Access Article

        15 - A review study on digital image watermarking techniques
        Razieh Keshavarzian
      • Open Access Article

        16 - Digital Watermarking Technology in Different Domains
        Maryam Hamrahi
      • Open Access Article

        17 - Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
        Reza Abbasgolizadeh Habib Izadkhah ramin meshkabadi
      • Open Access Article

        18 - Robust Digital Image Watermarking against Cropping and Salt & Pepper Noise using two-step Sudoku
        Mohammad Shahab Goli Alireza Nsghsh
        Several methods are exploited to watermark digital images as a safety measure for storing information, but an attacker can destroy the information by cropping a segment of the watermarked image or doing salt and pepper noise. In recent years, numerous schemes were propo More
        Several methods are exploited to watermark digital images as a safety measure for storing information, but an attacker can destroy the information by cropping a segment of the watermarked image or doing salt and pepper noise. In recent years, numerous schemes were proposed that reduce the impact of such attacks. A new method has been proposed to confront cropping attack and salt and pepper noise that is carried out using two Sudoku tables. In this method, the watermark image is scattered in two Sudoku table layouts with different solutions and is watermarked in the host image with Least Significant Bit(LSB). Using this method, the watermark image is repeated 81 times in the host image, and to this effect the watermark image can be reconstructed using other segments when cropped or salt and pepper noise by the attacker. Both Sudokus used in this paper are in the classic 9x9 form and using this method, resistance to cropping attacks increases up to 98.8% and resistance to salt and pepper noise increase up to 80% Manuscript profile
      • Open Access Article

        19 - Robust Digital image watermarking method using Graph-based transform (GBT) and Genetic Algorithm
        Sayed Mohammad Raza Mousavi Alireza Naghsh
        Numerous methods have been introduced for digital images watermarking as well as rubosting them. In this method, with using Graph-based transform and extracts the best graph structure with genetic algorithm so that watermarking can be performed with maximum robustness. More
        Numerous methods have been introduced for digital images watermarking as well as rubosting them. In this method, with using Graph-based transform and extracts the best graph structure with genetic algorithm so that watermarking can be performed with maximum robustness. One of the common methods in watermarking robustness is the use of discrete cosine transform (DCT). In this study, we have shown that the proposed method is much more powerful than DCT. The proposed method is tested on five different color images such as Lena, Barbara, Boat, Baboon, Peppers. Watermark image (logo) is a random binary image with size 16 x 16 and 8 x 8 pixels. This simulation results show that the proposed method is more robust to similar methods such as discrete cosine transforms. Proposing Watermarking has been evaluated using Bit Error Rate (BER), Structural Similarity Index Measuring (SSIM) and Peak signal-to-noise ratio (PSNR) criteria and different strength Gaussian noise attacks, JPEG compression, median filter, bluring, rescaling, rotate and cropping attacks Manuscript profile
      • Open Access Article

        20 - Robust Digital Image Watermarking Against Cropping Using Sudoku Puzzle in Spatial and Transform Domain
        shadi saneie Alireza Naghsh
        With rapid development of digital technology, protecting information such as copyright, content ownership confirmation has become more important. In image watermarking, information of the image is inserted such that the visual quality of the image is not reduced and the More
        With rapid development of digital technology, protecting information such as copyright, content ownership confirmation has become more important. In image watermarking, information of the image is inserted such that the visual quality of the image is not reduced and the receiver is able to get the required information. Some attacks such as image cropping, destroy the watermark’s information. In this article, a new watermarking scheme is proposed which is robust against tough cropping. In the proposed scheme, classic Sudoku table which is a 9*9 table, has been used. One feature of Sudoku table is that Sudoku's limitations cause uniform scattering of symbols or numbers throughout the table. In the proposed scheme, Sudoku table and both watermarking approaches based on spatial domain and transform domain such as DCT and DWT are used. Lack of using of soduko solution at the stage of extraction and finding correct solution to obtain watermark, is innovation of this scheme. Robustness of watermarking against cropping attack is up to 92%, which shows good and effective performance of the proposed scheme. Manuscript profile
      • Open Access Article

        21 - Robust and Semi-Blind Digital Image Watermarking Method Based on DWT and SVD
        Mohammadreza Rezayatmand Alireza Naghsh
        . In the handling of medical images, the main priority is to secure protection for the patient’s documents against any act of tampering by unauthorized persons. Thus, the main concern of the existing electronic medical system is to develop some standard solution t More
        . In the handling of medical images, the main priority is to secure protection for the patient’s documents against any act of tampering by unauthorized persons. Thus, the main concern of the existing electronic medical system is to develop some standard solution to preserve the authenticity and integrity of the content of medical images.Accordingly, digital image watermarking has many applications, one of its most important applications in Protection of medical images, engrave names, Signatures and Patient data on pictures, Videos etc. that are not so clear.There are several ways to digital image watermarking, but one of the most widely used methods to achieve robust watermarking to all kinds of attacks using the combination dwt and svd.We used in this research 2 level of haar wavelet transform on the host image and one level of single value decomposition on its low frequency subset and combined with a watermark coefficient and another level of singular value decomposition to embed the watermark and increase the watermark robustness in a way that when extracting a watermark can be done semi-blindly. With this method, we were able to improve the average peak signal to noise ratio of 55 and 7% improvement for the invisibility of the watermark and also the average correlation coefficient of 0.97 and 34% improvement to increase the resistance of the watermark to various attacks. Manuscript profile
      • Open Access Article

        22 - A Novel Image Watermarking Robustness Improving Algorithm Based on Combination of Wavelet and Singular Value Decomposition Transforms Against Noisy and Compression Attacks
        Mohsen Ghaemizadeh Hossein Pourghasem Homayoun Mahdavi-Nasab Ahmad Keshavarz
        Watermarking is used to protect copyright proof. Robustness index is the most important parameter that evaluates watermarking algorithm against different attacks such as noise and compression. In this paper, a novel semi- blind image watermarking algorithm based on join More
        Watermarking is used to protect copyright proof. Robustness index is the most important parameter that evaluates watermarking algorithm against different attacks such as noise and compression. In this paper, a novel semi- blind image watermarking algorithm based on joint wavelet transform (WT) and singular value decomposition (SVD) transform is proposed. In this algorithm, a new strategy is used to joint WT and SVD effectively. The most important advantage of this algorithm is robustness against a number of common attacks. Experimental results show that the proposed algorithm improves evaluation parameters more than other methods presented previously in the literature. Manuscript profile
      • Open Access Article

        23 - A Typological Study of Case in two Dialects of Turkish Language in Iran (Azeri and Khalaji)
        Tara Mokhtari Seyed Mehdi Samaee Bahram Modaresi
      • Open Access Article

        24 - Critical Analysis of the Principles and Rules of Marking Mus'hafs in the Islamic World (Case Study: Short Sound Signs)
        alireza sobhani mohammad nasehi Hosein Khoshdel Mofrad
        Inventing the three signs of short movements is the most basic kind of initiative of Muslims in order to read the text of the Holy Quran correctly and to protect it from any distortion and change. With the expansion of the marking of musafirs and the emergence of new sy More
        Inventing the three signs of short movements is the most basic kind of initiative of Muslims in order to read the text of the Holy Quran correctly and to protect it from any distortion and change. With the expansion of the marking of musafirs and the emergence of new symbols, which were generally drawn as dots, it became more difficult for readers to distinguish these symbols. while expressing the process of formation of different shapes of short movement signs in different periods, has studied the method of Mushaqah and Magharbeh Mus'hafs in recording the signs mentioned in the Holy Quran; Finally, by examining four types of recording of short movement signs and also examining the shape of Tanvin signs in different periods and places, it became clear that, firstly, short movement signs have not had a fixed form throughout history; Second, these symbols were originally invented only to indicate the movement of consonants; But over time, it was also used as an auxiliary symbol to indicate modal letters. Studies have shown that the use of short gestures as an auxiliary symbol not only has no precise basis but also makes it difficult to read the text.Keywords:Marking rules, auxiliary signs  Manuscript profile
      • Open Access Article

        25 - THE APPLICATION OF DATA ENVELOPMENT ANALYSIS METHODOLOGY TO IMPROVE THE BENCHMARKING PROCESS IN THE EFQM BUSINESS MODEL (CASE STUDY: AUTOMOTIVE INDUSTRY OF IRAN)
        K. شاهرودی
      • Open Access Article

        26 - Providing an Image Watermarking Scheme Based on Chaotic Sequence and Cosine Transform, to Strengthen Interaction with a Variety of Software Attacks
        Mostafa Boroumandzadeh
      • Open Access Article

        27 - Proposing a New Image Watermarking Method Using Shearlet Transform and GWO Algorithm
        Mahdi Saadati Javad Vahidi Vahid Seydi Peyman Sheikholharam Mashhadi
      • Open Access Article

        28 - Practical benchmarking in DEA using artificial DMUs
        Hosein Didehkhani Farhad Hosseinzadeh Lotfi Soheil Sadi-Nezhad
      • Open Access Article

        29 - An integrated data envelopment analysis–artificial neural network approach for benchmarking of bank branches
        Elsa Shokrollahpour Farhad Hosseinzadeh Lotfi Mostafa Zandieh
      • Open Access Article

        30 - A sequence of targets toward a common best practice frontier in DEA
        Nasim Nasrabadi
      • Open Access Article

        31 - Comparison of the effectiveness of learning strategies of summarizing, marking, underlining and conceptual mapping on understanding the content and learning speed of female students in the second year of the experimental non-profit schools of Nobat Sobh in Tehran.
        Marziyeh Mirlohi Fariborz Dortaj
        The aim of the present study was to compare the effectiveness of summarizing, marking, marginalizing and conceptual mapping learning strategies on the understanding of the content and the learning speed of experimental second-year female students of non-profit Novat Sob More
        The aim of the present study was to compare the effectiveness of summarizing, marking, marginalizing and conceptual mapping learning strategies on the understanding of the content and the learning speed of experimental second-year female students of non-profit Novat Sobh schools in Tehran. The design of the research was semi-experimental and pre-test-post-test with a control group. The statistical population includes all experimental second-grade female students of non-profit morning schools in Tehran in the academic year 2014-2015, 60 of them were selected as available and randomly assigned to different experimental groups and control groups. To collect information from experimental texts, a researcher-made reading comprehension questionnaire and a timer were used. SPSS 16 software and multivariate analysis of variance were used to analyze the data. The findings showed that there is a significant difference between the averages of the experimental and control groups in terms of learning speed; But there is no difference between the study speed of the experimental groups (summarization, marking and footnotes and conceptual map). There is a significant difference between the summary writing group and the control group in terms of understanding the text, but there was no significant difference between the marking and marginalizing group, conceptual map and the control group. The use of learning strategies improves the speed of learning and the use of summarizing increases students' understanding of the material. Manuscript profile
      • Open Access Article

        32 - Evaluation of Bank Branches with Financial Indicators Using Data Envelopment Analysis
        somayeh Razipour-GhalehJough ّFarhad Hosseinzadeh Lotfi Mohsen Rostamy-Maslkhalifeh Hamid Sharafi
        Banks play an important role in the economic development of any country as the main part of the financial system. Calculating efficiency and finding the strengths and weaknesses of branches has a significant impact on increasing the efficiency of banks. Data envelopment More
        Banks play an important role in the economic development of any country as the main part of the financial system. Calculating efficiency and finding the strengths and weaknesses of branches has a significant impact on increasing the efficiency of banks. Data envelopment analysis is one of the performance evaluation techniques that is able to introduce benchmarks for inefficient decision-making units in addition to estimating relative efficiency. In this paper, using a data envelopment analysis, a model for evaluating efficiency, studying sensitivity analysis of 18 branches of one of the commercial banks of Iran with financial ratios is presented. For this purpose, a model is proposed for output estimating with ratio data. By changing the input values the output values can be estimated. The amount of changes required in the outputs to maintain the efficiency as well as maintaining the rank is possible by using the proposed model with ratio data. Manuscript profile
      • Open Access Article

        33 - Evaluation of financial performance of Iranian insurance companies using two-stage data envelopment analysis technique
        Reza Sanei Mohammad fallah Farhad Hosseinzadeh Lotfi Farzad Movahedi Sobhani,
        insurance companies as one of the most important financial institutions have a special place in economic growth and development , so that efficient performance of this sector will affect other economic sectors.Therefore, evaluating the performance of companies operating More
        insurance companies as one of the most important financial institutions have a special place in economic growth and development , so that efficient performance of this sector will affect other economic sectors.Therefore, evaluating the performance of companies operating in this industry and identifying their strengths and weaknesses is of great importance. One of the performance appraisal techniques that has received a lot of attention in recent years is data envelopment analysis. In this paper, using the two-stage model of SORM-SBM data envelopment analysis, the performance evaluation of 21 insurance companies operating in Iran with financial indicators has been performed, which in addition to total efficiency, calculates and shows the efficiency of each company in both marketing and profitability. The company's performance is efficient if it has been efficient in both areas. The model values for each company are also calculated and the relationship between these values and total performance is shown Manuscript profile