Quarterly Journal of Information and Communication Technology ​
Volume & Issue: Volume 5, Issue 1 - Serial Number 14, Spring 2024 
Number of Articles: 6
A Review of Hardware Testing Problem for Fault-Tolerant Multimedia Compression Based on Linear Transforms

A Review of Hardware Testing Problem for Fault-Tolerant Multimedia Compression Based on Linear Transforms

Pages 1-11

Sepideh Gohari

Abstract Considering the increasing importance of hardware testing in the field of multimedia compression, this article examines different methods and approaches for this problem. These tests are performed in order to ensure the accuracy and efficiency of multimedia compression, as well as increase resistance to errors. Also, in this article, the importance of using linear transformations in multimedia compression has been investigated, and hardware testing methods for evaluating the quality and performance of multimedia compression have been investigated. These tests include random error tests, special error tests, and sampling tests, which aim to ensure that multimedia information is robust to errors. In another part of this research, a fault-tolerant scheme at the system level is proposed for systems where a linear transformation is combined with quantization. Using the concept of acceptable degradation, our scheme categorizes hardware defects into acceptable and unacceptable defects. Analytical techniques are also proposed that allow us to estimate the effect of defects on compression performance and to propose methods for creating acceptable degradation thresholds and corresponding test algorithms for DCT-based systems. In general, the results show that using linear transformations and performing appropriate hardware tests can help improve the quality and efficiency of multimedia compression and increase resistance to errors, and the main achievement includes increasing the compression speed, reducing the size of files, The quality of image and sound has been improved, as well as the resistance against errors has been increased, and it is also possible to effectively recover information in the event of an error.

Securing the Internet of Things Network by Detecting and Countering Distributed Denial of Service Attacks

Securing the Internet of Things Network by Detecting and Countering Distributed Denial of Service Attacks

Pages 12-23

Mohammad Birjandi

Abstract Nowadays, the Internet of Things (IoT) has emerged as an effective and innovative technology for developing the infrastructure of many hardware and related software applications. Moreover, blockchain technology has emerged as the backbone for the development of IoT-based applications. The use of blockchain in the Internet of Things as a reliable and safe system can help improve the security and quality of the Internet of Things network and in the long run lead to energy savings and improve the efficiency of these systems. However, security challenges, including distributed service breach attacks, have revealed a fundamental fault line within the blockchain-based IoT network. Therefore, according to the necessity of the problem, in this article, we intend to first examine the types of security challenges and denial of service attacks in Internet of Things networks based on block chains and then examine and propose solutions for identifying, managing and dealing with these attacks. Certainly, the correct use of such security approaches can be effective toward securing Internet of Things environments and create more quality and reliable services and increase users' acceptance of these services. 

A Methodological Perspective on Effective Access Control for Distributed Databases

A Methodological Perspective on Effective Access Control for Distributed Databases

Pages 24-33

Maryam Asadi, Zahra Khodadadi

Abstract Distributed databases have evolved dramatically since their inception in the early 1970s. These databases are developed in different geographical locations and are organized by a decentralized database management system, which increases the flexibility and speed of data access. These databases generally provide vital information to their users. Therefore, their security and protection is very important. The security of these databases mainly focuses on information protection and especially user access control. Therefore, this article deals with the principles of security and important policies in the field of access control. Previous access control approaches are mainly limited and centralized and are usually not efficient for distributed applications in new technology platforms. Therefore, according to the necessity of the research, in this article, we investigate a methodological and comprehensive perspective that, by integrating existing access control methods, will provide the ability to make distributed and flexible use effective in distributed spaces.

Effective Conflict Management of Business Negotiations in the Digital Economy

Effective Conflict Management of Business Negotiations in the Digital Economy

Pages 34-42

Soheil Rajabi

Abstract Today, with the advent of digital revolution, commercial businesses have changed and their efficiency and profitability increased. Recently, new technologies create innovations that facilitate business processes. Information has become a digital asset and related tools and processes optimize economic functions. The development of the digital economy by using information and communication technologies increases the productivity, innovation, economic growth and reduce unemployment is one of the goals of the international strategies of electronic governments. Under this approach, saving time and cost of doing work leads to improved productivity and has a significant impact on economic growth. On the other side, negotiation is a comprehensive and complex aspect of dynamic interactions and an essential skill that is used in various fields, from business transactions to diplomatic relations and is of critical importance in the field of digital economy. Business negotiations are inherently contradictory. Basically, contradictions in negotiation appear in different forms and create obstacles that, if not paid attention to, can lead to deadlocks or unfavorable agreements. The ability to recognize, understand and skillfully manage these conflicts is critical for negotiators, which seeking favorable and sustainable outcomes. This article deals with the problem of effective management of conflicts in business negotiations in the field of digital economy, strategies for correct identification of conflicts and tools to guide these conflicts. This article also considers the interplay of economic and cultural factors in conflict management. Conducting this research provides the basis for understanding the complexities of conflicting interests and the art required to turn conflicts into opportunities for multilateral trade agreements in the digital economy.

Towards E-Commerce Systems Based on Intelligent Recommender Systems

Towards E-Commerce Systems Based on Intelligent Recommender Systems

Pages 43-52

Ali Sattari, Hosein Mohammadzadeh

Abstract Recently, recommender systems have expanded more and more as a new and fundamental technology to support users in choosing the right resources. These systems provide a personalized environment for selecting the desired resources by examining the past interactions of users and identifying interests. Of course, user behavior modeling and the recommendation mechanism are fundamental and decisive issues in the efficiency of recommender systems. In the field of e-commerce, the use of recommender systems plays an essential role in improving the user experience, attracting potential customers, increasing sales, and optimizing the efficiency of related service systems. Therefore, considering the importance of these systems in today's electronic businesses, knowing the functional dimensions of recommender systems is of particular importance. In this article, we are going to review the basic dimensions of recommender systems in the field of e-commerce and introduce some practical tools in this field. Certainly, by moving towards e-commerce systems based on intelligent recommender systems, we will witness huge and revolutionary changes in the infrastructure of the digital economy and related services.

Integrating the Internet of Things in Electronic Business Inventory Management Systems

Integrating the Internet of Things in Electronic Business Inventory Management Systems

Pages 53-61

Hanieh Rahimi

Abstract Internet of things is considered as the most important high-level technology in the recent decades. Smart devices that are added to the Internet of Things ecosystem create a significant capacity for the development of electronic businesses. Currently, we are witnessing the impact of the Internet on all sectors of society. With the growth of communication networks and the Internet of Things, tremendous changes are taking place in e-commerce. In this area, the effective integration of Internet of Things technology in electronic business inventory management systems has the potential to create a huge transformation in the industrial and commercial parts. This article examines the effective integration of Internet of Things in the inventory management sector in the field of electronic businesses and highlights its impact on system productivity, operational accuracy and customer satisfaction. By reviewing related research, this study presents how the Internet of Things can improve real-time inventory tracking, reduce operating costs and increase user satisfaction. However, challenges such as high initial costs, data security concerns and the need for technical expertise still exist, and future researches should focus on solving existing challenges and discovering new applications of the Internet of Things in the field of inventory management, in order to obtain its full and optimal potential.