Quarterly Journal of Information and Communication Technology ​
Volume & Issue: Volume 2, Issue 2 - Serial Number 3, Spring 2021 
Number of Articles: 6
Examining memory management approaches in modern operating systems

Examining memory management approaches in modern operating systems

Pages 1-9

Amir Sadeghi, Hamid Hoseinzadeh

Abstract Memory management is one of the critical and major functions of the modern operating systems, that manages the main memory operations and shifts processes between main memory and disk during the application execution. Memory management manages them all, whether or not different memory locations are allocated to a process. This process determines the amount of memory that must be allocated to operating system processes. Memory management approches decide which process to access memory at a time and track the amount of memory allocated or free up and update the corresponding states. In this study, we have examined the major dimensions of the memory management issue from the perspective of the operating system administrators, the validation of quality requirements and also how to use the quality dimensions in the memory management of the modern operating systems, due to its great importance in this field for ensuring efficiency and performance.

The Role and Function of Statistical Methods in Technology-Based Academic Researches

The Role and Function of Statistical Methods in Technology-Based Academic Researches

Pages 1-7

Reyhaneh Najafian

Abstract Statistics is a broad science that studies ways of collecting, summarizing and producing conclusions from data. This science is used for a wide range of academic sciences from physics and social sciences to anthropology as well as business, governance and industry. The difficulty of understanding statistics is one of the most important obstacles that prevent researchers from applying research results in their work, which limits the opportunity to perform evidence-based research. As the emphasis on evidence-based practice increases, more pressure is placed on researchers to describe the research of others and to contribute to their own research. This article examines and emphasizes why technology researchers should understand simple statistical concepts both to use the research works of others and to carry out their own research works. In this article, the types of indicators and statistical methods used in applied statistical research are reviewed and described. This article reviews relevant sources and provides a list of important points that should be reviewed and confirmed before applying appropriate statistical methods to a data set and preparing for the implementation of a research.

Investigation of performance Isolation application in basic cloud services

Investigation of performance Isolation application in basic cloud services

Pages 9-17

Nafiseh Fareghzadeh

Abstract Cloud computing is the evolution of information technology and a dominant business model for providing IT resources. Using cloud computing, individuals and organizations can gain access to the requested network through a shared set of managed and scalable IT resources such as servers, storage space, and applications. Recently, academics have paid close attention to cloud computing. There are basically three basic models of cloud computing services: infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). In terms of storage and resource collection, there are clear differences between them. There are three models and what they can offer to a business, but they can also interact with each other to form a comprehensive model of cloud computing. Performance isolation is a major challenge in providing cloud services and performance management is essential to achieving quality goals in the cloud. Although many studies have examined this issue, there is a lack of analysis on the dimensions, challenges and opportunities of management. This study examines the dimensions and functions of performance isolation in basic cloud services. At the end of the research, some recommendations have been described, for more effective use of this feature in cloud computing environments.

Review and comparison of basic statistical research methods

Review and comparison of basic statistical research methods

Pages 10-21

Maryam Rezae

Abstract Based on the research and efforts of statistical scientists and even non-statistical fields, different methods have been developed to conduct statistical research, analyze findings and describe related results. Different methods of statistical tests are different approaches based on statistics that are widely used to conduct scientific research methods in different sciences. Usually, based on the theory and method of research, they are divided into two categories: "qualitative research" and "quantitative research". Usually in qualitative research, based on one or more observations, we try to describe and diagnose the cause-and-effect relationship and attribute the considered characteristic to the society. This is usually done by sampling and using statistical inference and inductive method, and the result of this research leads to a specific hypothesis or theory. Whereas in quantitative methods, we first intend to prove or disprove a theory, and by sampling from the statistical population, we reject or confirm this theory. This is done with the help of deductive inference. In order to better understand the problem and create an analytical schema, in this article, a review of basic statistical research methods and a comparison of their characteristics is presented.

Investigating the security challenges in cyberspace

Investigating the security challenges in cyberspace

Pages 22-32

Nima Mojtabazadeh

Abstract From the beginning of human life, security has been one of the main concerns of human beings. Today, with the expansion of the Internet and networked spaces in our country, the need for security to operate in these virtual spaces is felt more than ever. Fear of destroying moral and social foundations, and lack of psychological and cultural security due to the influx of contaminated and destructive information through the Internet and cyberspace is a logical response, because each society has its own information frameworks. It is natural that any kind of information that breaks these boundaries can endanger the health and security of society. Despite the positive aspects of global networks, the misuse of these computer networks by norm-breakers has endangered national security in various countries. Therefore, the use of various methods and solutions to prevent the penetration of malicious data and the selection of healthy information in these networks is increasing. Fortunately, despite the much hype that makes the World Wide Web and cyberspace uncontrollable, the technology needed to control the network and select healthy information is evolving. In this article, we first get acquainted with topics such as cyber security and cybercrime and its types, then deal with various types of information technologies in general and provide examples of it, and finally with the pathology of security space and information We will address the country and review the challenges and solutions to meet these challenges.

IoT Security Challenges and Solutions

IoT Security Challenges and Solutions

Pages 35-40

Somayeh Ganjkhanloo, Zahra Bigdeli

Abstract The Internet of Things (IoT) is one of the fastest technologies to be used in a variety of applications in the last decade and is in fact a large distributed network in which billions of intelligent devices are connected. Smart devices connect wirelessly or wirelessly to communicate, process, compute and monitor various real-time scenarios. The Internet of Things promises a world in which intelligent communication from most devices is possible via the Internet anywhere, anytime with the least possible human assistance. However, security and privacy are the main concerns of the Internet of Things that can affect its sustainable development. Inadequate device updates, lack of efficient and robust security protocols, user ignorance, and active device monitoring are some of the major security challenges that the Internet of Things faces. In this article, we have dealt with the issue of IoT security from different dimensions and examined the related challenges and solutions.