Quarterly Journal of Information and Communication Technology ​

                        


Journal Metrics

First Publication 2020
Number of Volumes 6
Number of Issues 20
Article View 49,268
PDF Download 20,160
View Per Article 410.57
PDF Download Per Article 168
Acceptance Rate 33%
Time to Accept (Days) 80-100 Day
Number of Indexing Databases 20
Number of Reviewers 36



Arman Process Journal (APJ), is an open access double-blind, peer-reviewed publication which is published by Islamic Azad University (IAU), Khodabandeh Branch, Zanjan, Iran. APJ concerned with all the important and novel research topics in the field of information and communication technology (ICT). This journal is published according to the publishing license number 87090 by the Ministry of Culture and Islamic Guidance. APJ is a quarterly journal, which publishes original research papers, reviews, case studies and short communications related to journal scientific scope. This journal is following of Committee on Publication Ethics (COPE) and complies with the highest ethical standards in accordance with ethical laws. Specialist professors are invited for scientific cooperation with the journal. In this regard, please send the research resumes to the journal's email address (armanprocessjournal@iauz.ac.ir) and register on the journal's website.

Based on the official letter No. 1403/1241, dated 5/6/2024, from the Islamic World Science Citation Database Institute, APJ succeeded in obtaining the necessary score for indexing in the ISC scientific database.

All submitted manuscripts are checked for similarity through Hamyab software to ensure their authenticity and originality and then rigorously peer-reviewed by expert reviewers. Accepted manuscripts are published online and are permanently open access. All authors are requested to submit their articles only through the journal online system and their personal page. In order to submit the article correctly, follow the mentioned rules in the "Guide for Authors" section. (Read More...)

 

Dealing with Ambiguity in Tech Projects: A Review of Tolerance for Ambiguity and its Development in IT Professionals

Dealing with Ambiguity in Tech Projects: A Review of Tolerance for Ambiguity and its Development in IT Professionals

Pages 1-11

https://doi.org/10.22034/apj.2026.2079338.1060

Fatemeh Bahrami, Asra Gholami, Mohammad Mahdi Shirmohammadi, Hamid Yasinian

Abstract Ambiguity in technology projects is one of the major challenges of modern management and directly affects decision-making, communication, teamwork, and innovation. Using a systematic review approach, this study examines research published between 2010 and 2024 and identifies four main types of ambiguity: requirements ambiguity, technological ambiguity, market ambiguity, and organizational ambiguity. Based on the findings, a three-stage framework for managing ambiguity is proposed, consisting of “recognition and acceptance,” “analysis and prioritization,” and “action and iteration.” In addition, the ADAPT model is introduced as a five-step approach that helps transform uncertain situations into opportunities for innovation. The results indicate that success in technology projects does not depend on eliminating ambiguity, but on the ability to adapt, engage in continuous learning, and make effective decisions under uncertain conditions. The study emphasizes that teams and organizations capable of embracing ambiguity and converting it into a driver of innovation demonstrate stronger and more resilient performance in dynamic and unpredictable technological environments.

Detect Redirect to the Malicious Web-Sites in ANDROID Devices

Detect Redirect to the Malicious Web-Sites in ANDROID Devices

Pages 12-24

https://doi.org/10.22034/apj.2026.2079995.1061

Seyed Mahmood Hashemi

Abstract Background and Objectives: Website clicks that redirect Android phone users to malicious ‎websites with fake virus warnings or phishing attacks are increasing exponentially. Although a ‎Uniform Resource Locator (URL) blacklist is considered as a suitable countermeasure for such ‎attacks, it is difficult to efficiently identify malicious websites. To the best of our knowledge, no ‎research has focused on detecting attacks that redirect Android phone users to malicious ‎websites. Therefore, we propose a redirection detection method that focuses on the URL bar ‎change interval of the Android-based Google Chrome browser.‎
Methods: The proposed method, which can be easily installed as an Android application, uses ‎the Android Accessibility Service to detect unwanted redirects to malicious websites without ‎collecting information about these websites in advance. This paper describes the details of the ‎design, implementation, and evaluation results of the proposed application on a real Android ‎device. We set threshold values for the number of times the URL bar changes and the elapsed ‎time to detect redirects to malicious websites for the proposed method.‎
Finding: Based on the results, we investigated the causes of false positive detections of ‎redirects to safe websites and proposed solutions to manage them. We also present threshold ‎values that can minimize the false positive and negative rates, as well as the detection accuracy ‎of the proposed method based on these threshold values. In addition, we present evaluation ‎results based on access reports of real users participating in the WarpDrive project experiment, ‎which show that the proposed method minimizes false positives and successfully detects most ‎redirects to malicious websites.‎

A scoping review of digital twins’ applications and challenges in medicine

A scoping review of digital twins’ applications and challenges in medicine

Pages 25-49

https://doi.org/10.22034/apj.2026.2077879.1059

Mohammad Hossein Roozbahani

Abstract The rapid growth of big data, coupled with advancements in data science and artificial intelligence, has significantly accelerated the potential for developing digital twins. A digital twin is a continuously updated virtual copy that enables the analysis, simulation, and prediction of a real-world object or process. Recently, applications of digital twins have seen substantial expansion across both academic communities and diverse governmental and military industries, and the healthcare sector is no exception. The concept of the digital twin for health promises a transformation in medical systems, encompassing service management and delivery, disease treatment and prevention, health maintenance, and ultimately, the enhancement of human life. By harnessing the ability to aggregate and analyze vast datasets from multiple sources, digital twins can facilitate personalized treatment pathways tailored to individual patient characteristics, medical history, and physiological data. This enables predictive analytics, preventative interventions, and the early identification of health risks and diseases through machine learning algorithms. Furthermore, digital twins can optimize clinical operations by analyzing treatment processes and resource allocation, leading to simplified and expedited treatment protocols. This review outlines the current applications of digital twins within the healthcare sector, delineates their core components in medicine, and examines the present landscape of open research opportunities. We demonstrate how the integration of diverse enabling technologies and tools—such as artificial intelligence, large language models, and mechanistic modeling—paves the way for overcoming limitations and fostering broader clinical adoption and implementation of digital twins. This review also aims to assist data scientists, clinicians, and policymakers in developing future medical digital twins and bridging the gap between this emerging paradigm's theoretical promise and practical realization.

Achievements of Quantum Computing in the Field of Information and Communication

Achievements of Quantum Computing in the Field of Information and Communication

Pages 50-56

https://doi.org/10.22034/apj.2026.735651

Reza Mohammadpoor

Abstract Quantom computation is a new approach based on the principles of quantum mechanics to perform computations .Quantum computation uses unique behaviors of quantum physics to solve problems that are too complex for classical calculations .Theoretically , the connected inverters can use the interference between wave quantum states such as themselves for computations that may take millions of years .The potential use of these calculations is widespread and is used in areas such as cryptography , finance and drug discovery .With the implementation of quantum computing , several industries can be transformed . Although quantum computing can create a large transformation in the encryption and security system, they can be a threat to the privacy and digital information in the world .The reason for this is that quantum computers can easily break the toughest modern code .In this article, we intend to analyze and examine the new achievements of quantum computing in the field of information and communication technology, challenges and prospects.                                              

Qualitative Approach to Improve Distribution Systems with Microservice Architecture

Qualitative Approach to Improve Distribution Systems with Microservice Architecture

Pages 57-65

https://doi.org/10.22034/apj.2026.735652

Zahra Sobhanipoor, Alireza Tahriri

Abstract Rapid development of cloud computing technologies and a significant increase in demand for scalable software systems has forced organizations to review their distributed systems architecture .traditional monolithic architecture , despite its initial efficiency , is faced with serious challenges in the field of maintenance , scalability , and independent deployment because of the strong connection between components .this paper reviews new approaches to improve distribution systems with focus on microservice architecture .in this research , a comprehensive four phase framework ( discovery and analysis , service identification , design and implementation , and implementation ) is presented that guides the migration process from integrated architecture to microservice systematically .the proposed framework combines static and dynamic analyses of support system , using graph - based learning techniques to identify the boundaries of service , and use architecture patterns , enables organizations to experience successful migration by maintaining service quality and reducing operational risks .evaluating the framework on a real financial system ( UVT ) shows that the application of the proposed approach reduces the response time by 42 % , reduces the error rate to less from 0.5 % and improves the error recovery time by 65 % .this research presents practical guidelines and evaluation of existing methodologies , a way for researchers and software engineers in the field of migration to microservice architecture.

Security Enhancement Solution in Home Networks, based on the Internet of Things

Security Enhancement Solution in Home Networks, based on the Internet of Things

Pages 66-75

https://doi.org/10.22034/apj.2026.735653

Hossein Ganjkhanloo

Abstract The explosive growth of Internet of Things (IoT) devices in home environments, coupled with the inherent limitations of these devices in terms of computing power, memory, and energy consumption, has increased the level of cyberattacks to an unprecedented level. Traditional home networks lack adequate security mechanisms to deal with emerging IoT-specific threats. This paper presents a comprehensive and multi-layered solution to enhance security in IoT-based home networks. The proposed approach, titled "SecHome-IoT", is composed of three main layers: (1) a deep learning-based anomaly detection layer (automated preprocessing and 1D convolutional neural network with long-term short-term memory), (2) a secure virtualization layer based on lightweight microservices (using hardware containers and critical path isolation), and (3) Dynamic and adaptive policy management layer (using adaptive-neural fuzzy inference system). Best hardware-software simulation on real-world datasets CICIDS2017, Bot-IoT and UNSW-NB15 along with implementation on Raspberry Pi platform and OpenWrt smart switches shows that the proposed method is superior to the previous ones (such as IoT-IDSA and Deep-STM) with an attack detection rate of 98.6% and a false positive rate of 1.4%. It has an improvement of 25% in security and performance metrics. This paper provides a roadmap for the security of IoT home networks by providing a comprehensive threat analysis, real-world and similar implementations.

Prediction of Cardiovascular Diseases Using Convolutional Neural Network Based on Internet of Things

Prediction of Cardiovascular Diseases Using Convolutional Neural Network Based on Internet of Things

Volume 6, Issue 1, Spring 2025, Pages 67-84

https://doi.org/10.22034/apj.2025.725731

Seyedeh Fatemeh Abdollahi, Seyed Ebrahim Dashti

Abstract One of the most important applications of the Internet of Things in the field of health is remote monitoring of patients. This technology allows doctors to check the health status of patients in real time, which is especially vital for people suffering from or prone to heart diseases. Prediction of cardiovascular diseases is known to be a complex challenge that faces low accuracy in existing models. In this research, a new recommender system for predicting cardiovascular diseases is proposed that uses a convolutional neural network to analyze physiological data of patients. Physiological data from patients are collected remotely through four biological sensors including ECG sensor, blood pressure sensor, heart rate sensor and blood sugar sensor. These data are then processed by an Arduino controller and the convolutional neural network model is used to predict cardiovascular disease. With outstanding capabilities in extracting local features and without the need for complex time sequence analysis, this model can effectively use fixed numerical data such as blood pressure, heart rate, and blood sugar to diagnose heart diseases. The experimental results showed that the convolutional neural network was able to effectively extract local and non-temporal features of the data and help the model achieve a prediction accuracy of 98.90%.

Business Intelligence and Industry 4.0: Opportunities & Challenges

Business Intelligence and Industry 4.0: Opportunities & Challenges

Volume 4, Issue 1, Spring 2023 Article ID:1-7

https://doi.org/10.22034/apj.2023.706756

Reza Mohammadi

Abstract Background and objectives: Due to the digitalization of life and the fiercely competitive global market, the fourth industrial revolution was inevitable. Industry 4.0 utilizes several interconnected technologies such as artificial intelligence (AI), machine learning (ML), big data (BD) and so on to provide new solutions. The aim of this article is to provide an overview of the vital role that Business Intelligence (BI) play in the realization and adoption of Industry 4.0.

Methods: The present paper addresses this shortcoming by systematically reviewing scholarly articles published in this research domain. It integrates previous insights on the topic to provide a far-reaching theoretical framework that highlights antecedents, practices, and outcomes of BI & Industry 4.0 research.

Findings: Our framework shapes a holistic approach of the BI & I4.0 domain and illuminates different relevant elements up on which future studies in this area be developed.

Conclusion: it addresses the future expected for Industry 4.0 primarily in BI and how companies should face this revolution. This article provides knowledge contribution about the current state and positive consequences of Industry 4.0, and high development in business intelligence when implemented in the organization and the harmonization between production and intelligent digital technology.

Artificial Intelligence in Smart Contracts (Case Study: N.G Supply Chain)

Artificial Intelligence in Smart Contracts (Case Study: N.G Supply Chain)

Volume 4, Issue 4, Autumn 2023, Pages 46-51

Reza Mohammadi

Abstract Today's systems, approaches, and technologies leveraged for managing oil and gas supply chain operations fall short of providing operational transparency, traceability, audit, security, and trusted data provenance features. Also, a large portion of the existing systems are centralized, manual, and highly disintegrated, which make them vulnerable to manipulation and the single point of failure problem. Emerging technologies such as the Internet of Things (IoT), fog computing, cloud computing, and block chain can play a vital role in boosting the operational efficiency of the oil and gas industry. In this paper, we explore the potential opportunities and applications of Artificial Intelligence technology in managing the exploration, production, and supply chain and logistics operations in the Natural Gas industry as it can offer traceability, immutability, transparency, and audit features in a decentralized, trusted, and secure manner. This research highlights the use cases of AI in decentralized Block chain with smart contracts, the company’s trading policies, and its advantages for effectively handling market risk assessments during socio-economic crisis. Results spotlight the use of AI in decision accuracy for the developed smart contract-based Natural Gas Industry, thereby qualitatively limiting the threshold level of costs, energy and other control functions in procurement, production and distribution.

Examining the Legitimacy of Cryptocurrencies from a Jurisprudential Perspective as a New Method of Contract Payment in Digital Relations

Examining the Legitimacy of Cryptocurrencies from a Jurisprudential Perspective as a New Method of Contract Payment in Digital Relations

Volume 3, Issue 1, Spring 2022, Pages 8-23

https://doi.org/10.22034/apj.2022.253919

Mehdi Babaeii, Mohammad Hadi Zahedi, Elham Farahani

Abstract Background and Objectives: The cryptocurrencies, including bitcoins, are the fruits of the development of information technology in the international and even domestic financial system in the last decade. Have brought with them. In the present study, From the point of view of individual jurisprudence, the cryptocurrencies are a kind of property, their transactions are not usury and arrogance, and therefore, if the transaction basis of the cryptocurrencies is correct from the religious point of view, its exchange is permissible, but if the transaction basis of the cryptocurrencies is not legitimate, Their transaction is void and forbidden.
Methods: In this study which is descriptive-analytical; we reviewed most of the governmental jurisprudence documents about cryptocurrency trading.
Findings: The result of the present study is that based on arguments such as the no-harm rule, the rule of respect and the rule of maintaining order, and the rule of action and the rule of justice, which all prevent the implementation of incorrect monetary policies and increase the problematic amount of money in the Islamic economic system.
Conclusion: It is advisable to prevent transactions in the field of currency cryptocurrency until the legal order is established by the government to control the cryptocurrency in the country's economy.

Threats and Approaches for Security in e-commerce services

Threats and Approaches for Security in e-commerce services

Volume 2, Issue 3, Summer 2021, Pages 7-13

Ali Mohammadpoor

Abstract Today, e-commerce has become a way of doing business in the modern world. Basically, e-commerce can not grow enough without security. To achieve a dynamic e-commerce, we must implement security in it within the framework of principles, so that we can use it as a sustainable sample of business. Security issues, unauthorized users, viruses and the like are terrifying for companies at any level of internet connection. Most companies focus on their hardware and software to deal with these problems. Understanding security threats and risks, especially the dangers of e-commerce, can be a great help in designing and building a secure infrastructure. This article discusses various ways to reduce security threats, especially in cases where the greatest threat is posed by unauthorized users, viruses and other forms of network intrusion; Finally, security approaches, recommendations and solutions to deal with these threats are provided.

The Convergence of Blockchain with Technology-Oriented Services and Functions

The Convergence of Blockchain with Technology-Oriented Services and Functions

Volume 3, Issue 3, Winter 2023, Pages 19-27

https://doi.org/10.22034/apj.2022.704024

Reza Tarempoor

Abstract Blockchain is a holistic system consisting of peer-to-peer connected and distributed blocks of data that eliminates the need for a centralized management entity to manage technological transactions. Blockchain's open-source, impermeable configuration paves the way for an unparalleled level of transparency. Each piece of data is distributed among millions of computers around the world and its authenticity is verified. This relatively new technology is revolutionizing various industries and providing an automated process for managing processes and interactions. The use of blockchain is a cheap and fast solution and it is very attractive that it has experienced a lot of development in recent years. In today's era, the use of blockchain technology plays a very important role in the development of businesses. This powerful technology improves the quality of business and also increases their income and profit. Maintaining business security, authenticity, speed and increasing quality are among the benefits that arise with the help of blockchain in businesses. According to the importance of the issue, in this article we intend to examine the convergence of blockchain with technology-oriented services and related functions.

The Evolution of Digital Banking with Central Bank Digital Currencies (CBDC):  Opportunities and Challenges

The Evolution of Digital Banking with Central Bank Digital Currencies (CBDC): Opportunities and Challenges

Volume 6, Issue 1, Spring 2025, Pages 15-37

https://doi.org/10.22034/apj.2025.725726

Niloufar Navaei

Abstract Central Bank Digital Currencies (CBDCs) represent a new generation of digital money, created and supported under the authority of central banks. This cutting-edge technology, with its potential to bring transformative changes to traditional payment infrastructures and to revolutionize global payment systems, has captured the attention of researchers and financial industry professionals alike.

This study examines the challenges and opportunities associated with CBDCs during the 2018–2024 period. To this end, a systematic search was conducted across eight reputable academic databases, resulting in the identification of 62 relevant articles. After applying screening criteria, 53 articles were selected for final analysis and for the development of this review paper.

An analysis of these articles reveals a significant increase in interest in CBDCs in recent years. Central banks around the globe are actively exploring or piloting their own digital currency projects. The potential benefits of CBDCs include enhanced efficiency and inclusivity in payments, strengthened financial stability, and innovation in financial services. However, challenges such as privacy concerns, cybersecurity risks, and the potential for misuse also persist. Consequently, further research and comprehensive regulatory frameworks are essential to fully understand and manage the benefits and risks of CBDCs.

Keywords Cloud