Quarterly Journal of Information and Communication Technology ​

                        


Journal Metrics

First Publication 2020
Number of Volumes 6
Number of Issues 20
Article View 48,086
PDF Download 19,536
View Per Article 400.72
PDF Download Per Article 162.8
Acceptance Rate 33%
Time to Accept (Days) 80-100 Day
Number of Indexing Databases 20
Number of Reviewers 36



Arman Process Journal (APJ), is an open access double-blind, peer-reviewed publication which is published by Islamic Azad University (IAU), Khodabandeh Branch, Zanjan, Iran. APJ concerned with all the important and novel research topics in the field of information and communication technology (ICT). This journal is published according to the publishing license number 87090 by the Ministry of Culture and Islamic Guidance. APJ is a quarterly journal, which publishes original research papers, reviews, case studies and short communications related to journal scientific scope. This journal is following of Committee on Publication Ethics (COPE) and complies with the highest ethical standards in accordance with ethical laws. Specialist professors are invited for scientific cooperation with the journal. In this regard, please send the research resumes to the journal's email address (armanprocessjournal@iauz.ac.ir) and register on the journal's website.

Based on the official letter No. 1403/1241, dated 5/6/2024, from the Islamic World Science Citation Database Institute, APJ succeeded in obtaining the necessary score for indexing in the ISC scientific database.

All submitted manuscripts are checked for similarity through Hamyab software to ensure their authenticity and originality and then rigorously peer-reviewed by expert reviewers. Accepted manuscripts are published online and are permanently open access. All authors are requested to submit their articles only through the journal online system and their personal page. In order to submit the article correctly, follow the mentioned rules in the "Guide for Authors" section. (Read More...)

 

Improving Data Query and Ensuring Security in Mobile Vehicular Networks Using Deep Learning and Blockchain

Improving Data Query and Ensuring Security in Mobile Vehicular Networks Using Deep Learning and Blockchain

Pages 1-17

https://doi.org/10.22034/apj.2026.2071330.1054

SeyedEbrahim Dashti, fatemeh moayyedi

Abstract Background and Objectives: With the advancement of vehicular networks and the increasing demand for accurate and timely data, challenges such as data retrieval delays and security concerns have garnered significant attention. Traditional cloud-based storage methods are unable to meet temporal and security requirements due to the considerable distance between vehicles and servers. Although edge computing offers a solution for reducing latency, it requires improvements due to limitations in storage and distributed management. Previous research has primarily focused on one aspect of optimization (reducing delay or enhancing security), with less attention paid to combining these two objectives. This paper aims to propose an innovative hybrid optimization model using deep learning and blockchain that considers both security and delay reduction. This is achieved by optimizing caching locations, storage, retrieval processes, and storing critical information on the blockchain, ensuring a scalable and flexible model adaptable to traffic changes and user demands.

Methods: The study population and sample include mobile vehicular networks (VANETs), considering edge servers and vehicular nodes. An LSTM model was used to predict traffic patterns and data popularity, while blockchain with a Proof of Authority (PoA) consensus mechanism and smart contracts was employed for secure data storage. Performance was evaluated based on delay, security, and scalability metrics, and compared with existing methods such as Tabu Search, CCS-AGP, and Random Caching in terms of delay and security.

Findings: The proposed model significantly reduced delay (by 10% to 30% compared to baseline methods). The use of blockchain introduced only an 8% additional delay while elevating security to a "very high" level. The system demonstrated stability and scalability under increasing numbers of nodes and data volume. Simulation results indicated that the combination of deep learning and blockchain achieves an optimal balance between performance and security.

Conclusion: The proposed model, integrating deep learning and blockchain, not only reduces delay but also ensures data security and integrity. This framework can serve as a foundation for developing intelligent systems in domains such as the Internet of Things (IoT), smart cities, and next-generation transportation.

Enhancing the Reliability of Wireless Sensor Networks Using Lightweight Machine Learning

Enhancing the Reliability of Wireless Sensor Networks Using Lightweight Machine Learning

Pages 18-29

https://doi.org/10.22034/apj.2026.2071722.1055

mehdi najafi jalalieh, mohammad mahdi shirmohammadi

Abstract Wireless Sensor Networks (WSNs) have emerged as one of the key technologies in recent decades due to their rapid deployability, low cost, and wide range of applications in fields such as the Internet of Things (IoT), environmental monitoring, smart agriculture, and critical systems. However, the hardware and software limitations of sensor nodes — including low processing power and limited energy resources — make these networks vulnerable to failures and disruptions, turning reliability into a fundamental challenge.



In this study, a novel framework based on Tiny Machine Learning (TinyML) is proposed to enhance reliability and optimize energy consumption in WSNs. The proposed architecture consists of four key modules — anomaly detection, failure prediction, intelligent data compression, and adaptive routing — which are deployed locally at the node level to enable fast processing, reduce communication overhead, and enable intelligent resource management.



Simulation results demonstrated that the proposed method not only increases the network lifetime and significantly reduces energy consumption but also improves data quality, communication stability, and responsiveness to abnormal events.



The findings of this research indicate that leveraging TinyML can open new horizons in the design of intelligent WSNs and provide a solid foundation for developing future large-scale applications in dynamic environments.

Iranian License Plate Recognition Model Based on YOLOv9

Iranian License Plate Recognition Model Based on YOLOv9

Pages 30-42

https://doi.org/10.22034/apj.2026.2071750.1056

zahra roozbahani

Abstract Background and Objectives: in this research, a novel method for detecting Iranian license plates and simultaneously recognizing letters and digits is introduced. Various approaches have been proposed for license plate detection, which have progressively improved over time. Traditional methods involve classical image processing techniques such as grayscale conversion, thresholding, and binary morphology. With advancements in machine learning, artificial neural network algorithms have been employed for license plate identification and recognition. Today, deep neural networks, particularly convolutional neural networks and recurrent neural networks, are recognized as leading methods in vehicle license plate detection. The objective of this study is to propose an efficient approach that includes locating the license plate using machine vision algorithms and segmenting the identifiers. Challenges such as variations in lighting conditions and vehicle speed have been examined in this research, and solutions to enhance detection accuracy and speed have been presented.



Methods: To improve the accuracy and robustness of the proposed model, a dataset consisting of 844 real Iranian license plate images captured under diverse lighting conditions and viewing angles was collected and expanded to 2024 images using data augmentation techniques. After fine-tuning, the model is capable of localizing license plate regions and extracting Persian characters using a CRNN-based architecture. The proposed system demonstrates a significant performance improvement over YOLOv8 and YOLOS models by reducing recognition errors in challenging scenarios such as strong illumination, shadows, high vehicle speed, and font variations

Findings: Ultimately, an accurate and efficient license plate recognition method based on the YOLOv9 architecture is proposed, achieving an overall accuracy of 98%. Quantitative evaluation results, including precision, recall, and F1-score, indicate that the proposed model is well suited for real-time applications in visual surveillance, traffic monitoring, and intelligent transportation systems.

Conclusion: The experimental results demonstrate that the proposed approach significantly enhances license plate detection accuracy and can effectively support intelligent transportation systems and automated traffic management applications.

Artificial Intelligence Approaches for Modeling and Analysis Fault in Power ‎Distribution Networks

Artificial Intelligence Approaches for Modeling and Analysis Fault in Power ‎Distribution Networks

Pages 43-63

https://doi.org/10.22034/apj.2026.2072799.1057

Seyed Mahmood Hashemi

Abstract Background and Objectives: Fault of power distribution networks is based on the ‎uncontorable factors. Rapid approache to identidtification and localization of power ‎network fault is ctritical to maintain system riable. While traditional approaches use ‎measurements from current and voltage transformers, this study proposes an ‎artificial intelligence-driven approach for enhanced fault detection and analysis in ‎power distribution networks. A custom-designed sensing prototype captured voltage ‎and current data under simulated fault conditions, including short-circuit and open-‎circuit faults. The presented approach includes fundamental variables, such as fault ‎type, sensor placement topology, and line distance, were rigorously controlled during ‎data acquisition.‎

Methods: This paper presentes two algorithms: an Artificial Neural Network (ANN) ‎and an Adaptive Neuro-Fuzzy Inference System (ANFIS). Both used algorithms have ‎many parmeters that rquire to be tune While the values of these parameters effect ‎on the performance, but the major target of this study is using of these algorithms. ‎Steps of algorithms are described in the paper. The redults of algorithms are showed ‎with the used data. Performance was validated under variable load conditions across ‎line distances of 200–800 meters. ‎

Finding: Simulation results demonstrate that the ANFIS classifier achieved superior ‎accuracy in fault classification (99.7%) and minimal distance estimation error (0.5%). ‎Both ANN and ANFIS delivered high precision in fault detection, localisation, and ‎classification, with ANFIS exhibiting significantly faster training convergence (1 ms). ‎Indeed ANFIS has more consistency. ‎

Cnclusion: The framework presents a robust, computationally efficient solution for ‎real-time fault management (modeling), recommending (analysis) the integration of ‎dedicated sensors by power distribution network utilities to enable targeted grid ‎interventions.‎

Examining the Functions and Adoption Models of Mobile Commerce in the Field of E-commerce

Examining the Functions and Adoption Models of Mobile Commerce in the Field of E-commerce

Pages 64-75

https://doi.org/10.22034/apj.2026.729993

Mobina Mohammadi

Abstract  Mobile commerce, as a new achievement of e-commerce services, has numerous and unique advantages such as accessibility, positioning, immediacy, capability, personalization and identification. Today, most businesses have considered the use of mobile phone social advertising as the main way to help connect with customers in order to obtain information and promote it. Business-oriented companies use Internet services and social networks as a new option to support their products or provide customer service. Placing real-time and up-to-date advertisements on social networking websites will be a competitive advantage in increasing the volume of customer visits. Mobile commerce has various dimensions, operational components, functions and adoption models, which we intend to address in this article.

Approaches to Address the Challenge of Intrusion in Cloud Computing Services

Approaches to Address the Challenge of Intrusion in Cloud Computing Services

Pages 76-88

https://doi.org/10.22034/apj.2026.729994

Hossein Mansouri

Abstract  Nowadays, cloud computing is the preferred choice of any organization based on information and communication technology due to its flexible services and outstanding pay-as-you-go features. Some cloud-based networks face various security challenges due to the lack of fixed infrastructure and centralized management. However, the security and privacy of cloud computing systems is a fundamental problem of cloud computing due to their distributed architecture and vulnerability to unwanted inputs. The role of unwanted attack detection systems in cloud security is very important because it acts as a preventive security layer and, in addition to identifying known attacks, can detect many unknown attacks. In this article, we intend to review these systems and describe approaches to deal with the challenge of intrusion into cloud computing services.

Prediction of Cardiovascular Diseases Using Convolutional Neural Network Based on Internet of Things

Prediction of Cardiovascular Diseases Using Convolutional Neural Network Based on Internet of Things

Volume 6, Issue 1, Spring 2025, Pages 67-84

https://doi.org/10.22034/apj.2025.725731

Seyedeh Fatemeh Abdollahi, Seyed Ebrahim Dashti

Abstract One of the most important applications of the Internet of Things in the field of health is remote monitoring of patients. This technology allows doctors to check the health status of patients in real time, which is especially vital for people suffering from or prone to heart diseases. Prediction of cardiovascular diseases is known to be a complex challenge that faces low accuracy in existing models. In this research, a new recommender system for predicting cardiovascular diseases is proposed that uses a convolutional neural network to analyze physiological data of patients. Physiological data from patients are collected remotely through four biological sensors including ECG sensor, blood pressure sensor, heart rate sensor and blood sugar sensor. These data are then processed by an Arduino controller and the convolutional neural network model is used to predict cardiovascular disease. With outstanding capabilities in extracting local features and without the need for complex time sequence analysis, this model can effectively use fixed numerical data such as blood pressure, heart rate, and blood sugar to diagnose heart diseases. The experimental results showed that the convolutional neural network was able to effectively extract local and non-temporal features of the data and help the model achieve a prediction accuracy of 98.90%.

Business Intelligence and Industry 4.0: Opportunities & Challenges

Business Intelligence and Industry 4.0: Opportunities & Challenges

Volume 4, Issue 1, Spring 2023 Article ID:1-7

https://doi.org/10.22034/apj.2023.706756

Reza Mohammadi

Abstract Background and objectives: Due to the digitalization of life and the fiercely competitive global market, the fourth industrial revolution was inevitable. Industry 4.0 utilizes several interconnected technologies such as artificial intelligence (AI), machine learning (ML), big data (BD) and so on to provide new solutions. The aim of this article is to provide an overview of the vital role that Business Intelligence (BI) play in the realization and adoption of Industry 4.0.

Methods: The present paper addresses this shortcoming by systematically reviewing scholarly articles published in this research domain. It integrates previous insights on the topic to provide a far-reaching theoretical framework that highlights antecedents, practices, and outcomes of BI & Industry 4.0 research.

Findings: Our framework shapes a holistic approach of the BI & I4.0 domain and illuminates different relevant elements up on which future studies in this area be developed.

Conclusion: it addresses the future expected for Industry 4.0 primarily in BI and how companies should face this revolution. This article provides knowledge contribution about the current state and positive consequences of Industry 4.0, and high development in business intelligence when implemented in the organization and the harmonization between production and intelligent digital technology.

Artificial Intelligence in Smart Contracts (Case Study: N.G Supply Chain)

Artificial Intelligence in Smart Contracts (Case Study: N.G Supply Chain)

Volume 4, Issue 4, Autumn 2023, Pages 46-51

Reza Mohammadi

Abstract Today's systems, approaches, and technologies leveraged for managing oil and gas supply chain operations fall short of providing operational transparency, traceability, audit, security, and trusted data provenance features. Also, a large portion of the existing systems are centralized, manual, and highly disintegrated, which make them vulnerable to manipulation and the single point of failure problem. Emerging technologies such as the Internet of Things (IoT), fog computing, cloud computing, and block chain can play a vital role in boosting the operational efficiency of the oil and gas industry. In this paper, we explore the potential opportunities and applications of Artificial Intelligence technology in managing the exploration, production, and supply chain and logistics operations in the Natural Gas industry as it can offer traceability, immutability, transparency, and audit features in a decentralized, trusted, and secure manner. This research highlights the use cases of AI in decentralized Block chain with smart contracts, the company’s trading policies, and its advantages for effectively handling market risk assessments during socio-economic crisis. Results spotlight the use of AI in decision accuracy for the developed smart contract-based Natural Gas Industry, thereby qualitatively limiting the threshold level of costs, energy and other control functions in procurement, production and distribution.

Examining the Legitimacy of Cryptocurrencies from a Jurisprudential Perspective as a New Method of Contract Payment in Digital Relations

Examining the Legitimacy of Cryptocurrencies from a Jurisprudential Perspective as a New Method of Contract Payment in Digital Relations

Volume 3, Issue 1, Spring 2022, Pages 8-23

https://doi.org/10.22034/apj.2022.253919

Mehdi Babaeii, Mohammad Hadi Zahedi, Elham Farahani

Abstract Background and Objectives: The cryptocurrencies, including bitcoins, are the fruits of the development of information technology in the international and even domestic financial system in the last decade. Have brought with them. In the present study, From the point of view of individual jurisprudence, the cryptocurrencies are a kind of property, their transactions are not usury and arrogance, and therefore, if the transaction basis of the cryptocurrencies is correct from the religious point of view, its exchange is permissible, but if the transaction basis of the cryptocurrencies is not legitimate, Their transaction is void and forbidden.
Methods: In this study which is descriptive-analytical; we reviewed most of the governmental jurisprudence documents about cryptocurrency trading.
Findings: The result of the present study is that based on arguments such as the no-harm rule, the rule of respect and the rule of maintaining order, and the rule of action and the rule of justice, which all prevent the implementation of incorrect monetary policies and increase the problematic amount of money in the Islamic economic system.
Conclusion: It is advisable to prevent transactions in the field of currency cryptocurrency until the legal order is established by the government to control the cryptocurrency in the country's economy.

Threats and Approaches for Security in e-commerce services

Threats and Approaches for Security in e-commerce services

Volume 2, Issue 3, Summer 2021, Pages 7-13

Ali Mohammadpoor

Abstract Today, e-commerce has become a way of doing business in the modern world. Basically, e-commerce can not grow enough without security. To achieve a dynamic e-commerce, we must implement security in it within the framework of principles, so that we can use it as a sustainable sample of business. Security issues, unauthorized users, viruses and the like are terrifying for companies at any level of internet connection. Most companies focus on their hardware and software to deal with these problems. Understanding security threats and risks, especially the dangers of e-commerce, can be a great help in designing and building a secure infrastructure. This article discusses various ways to reduce security threats, especially in cases where the greatest threat is posed by unauthorized users, viruses and other forms of network intrusion; Finally, security approaches, recommendations and solutions to deal with these threats are provided.

The Convergence of Blockchain with Technology-Oriented Services and Functions

The Convergence of Blockchain with Technology-Oriented Services and Functions

Volume 3, Issue 3, Winter 2023, Pages 19-27

https://doi.org/10.22034/apj.2022.704024

Reza Tarempoor

Abstract Blockchain is a holistic system consisting of peer-to-peer connected and distributed blocks of data that eliminates the need for a centralized management entity to manage technological transactions. Blockchain's open-source, impermeable configuration paves the way for an unparalleled level of transparency. Each piece of data is distributed among millions of computers around the world and its authenticity is verified. This relatively new technology is revolutionizing various industries and providing an automated process for managing processes and interactions. The use of blockchain is a cheap and fast solution and it is very attractive that it has experienced a lot of development in recent years. In today's era, the use of blockchain technology plays a very important role in the development of businesses. This powerful technology improves the quality of business and also increases their income and profit. Maintaining business security, authenticity, speed and increasing quality are among the benefits that arise with the help of blockchain in businesses. According to the importance of the issue, in this article we intend to examine the convergence of blockchain with technology-oriented services and related functions.

The Evolution of Digital Banking with Central Bank Digital Currencies (CBDC):  Opportunities and Challenges

The Evolution of Digital Banking with Central Bank Digital Currencies (CBDC): Opportunities and Challenges

Volume 6, Issue 1, Spring 2025, Pages 15-37

https://doi.org/10.22034/apj.2025.725726

Niloufar Navaei

Abstract Central Bank Digital Currencies (CBDCs) represent a new generation of digital money, created and supported under the authority of central banks. This cutting-edge technology, with its potential to bring transformative changes to traditional payment infrastructures and to revolutionize global payment systems, has captured the attention of researchers and financial industry professionals alike.

This study examines the challenges and opportunities associated with CBDCs during the 2018–2024 period. To this end, a systematic search was conducted across eight reputable academic databases, resulting in the identification of 62 relevant articles. After applying screening criteria, 53 articles were selected for final analysis and for the development of this review paper.

An analysis of these articles reveals a significant increase in interest in CBDCs in recent years. Central banks around the globe are actively exploring or piloting their own digital currency projects. The potential benefits of CBDCs include enhanced efficiency and inclusivity in payments, strengthened financial stability, and innovation in financial services. However, challenges such as privacy concerns, cybersecurity risks, and the potential for misuse also persist. Consequently, further research and comprehensive regulatory frameworks are essential to fully understand and manage the benefits and risks of CBDCs.

Keywords Cloud