@article { author = {Alfawaz, Khaled Mofawiz}, title = {IOT Future Security Challenges and Recent Solutions}, journal = {Journal of Information Technology Management}, volume = {14}, number = {2}, pages = {1-14}, year = {2022}, publisher = {Faculty of Management, University of Tehran}, issn = {2980-7972}, eissn = {2980-7972}, doi = {10.22059/jitm.2022.86923}, abstract = {Internet of Things could be current paradigm, with promising recent wireless communication. Simultaneously as its will likely deliver compelling and effective arrangement, security of the gadgets and organization could be challenge issue. Therefore security has arisen as quite difficult for the IoT during this paper is expect to create security challenges of the IoT, structural design of IoT through handling security troubles at every layer of the design, key advancements in IoT and use of IoT.}, keywords = {Internet of Things,Key Technologies,Security Issues}, url = {https://jitm.ut.ac.ir/article_86923.html}, eprint = {https://jitm.ut.ac.ir/article_86923_684ec1d28744c372a22d504194ad0064.pdf} } @article { author = {Fudhah A., AlSelami}, title = {Blockchain and Bigdata to Secure Data Using Hash and Salt Techniques}, journal = {Journal of Information Technology Management}, volume = {14}, number = {2}, pages = {15-25}, year = {2022}, publisher = {Faculty of Management, University of Tehran}, issn = {2980-7972}, eissn = {2980-7972}, doi = {10.22059/jitm.2022.86924}, abstract = {In recent times amount of data is increasing rapidly and analysis of data is a must to come up with business decisions, predictions etc. It’s not just text are numbers which has to be stored properly. Data Types these days varies from images, video, social media data, surveys to blogs etc. When this is the case its mandatory to deal with Bigdata and to safeguard those Bigdata. Technologies available in Bigdata and Bitcoin helps us in achieving this. Bigdata technologies helps in storing the unstructured data effectively and processing of such voluminous data is taken care of. Hashing algorithms are used in Blockchain to keep the data safe. Hashing algorithms like SHA 256 are used to make it more secure. Its almost not possible to break the data available in Blockchain. Let’s try to secure the data even more using encryption algorithms to make sure that proper data is used for analysis etc.}, keywords = {Blockchain,Bigdata,Salt Techniques,Data Using Hash}, url = {https://jitm.ut.ac.ir/article_86924.html}, eprint = {https://jitm.ut.ac.ir/article_86924_84bbc5e426f056ad28e067ecd4e81a73.pdf} } @article { author = {Almeraikhi, Saleh and Al-Rajab, Murad}, title = {Machine Learning Algorithms for Early Fall Detection of Elderly People}, journal = {Journal of Information Technology Management}, volume = {14}, number = {2}, pages = {26-40}, year = {2022}, publisher = {Faculty of Management, University of Tehran}, issn = {2980-7972}, eissn = {2980-7972}, doi = {10.22059/jitm.2022.86925}, abstract = {Falls are a serious concern among the elderly people, causing severe physical pain to them and placing a strain on medical infrastructure. The global elderly population is expected to grow significantly in the coming years, as advances in healthcare allow lifespans to increase globally. This will bring more chances for falls to occur. With this in mind, there is a need for new research to be conducted on finding ways to reduce this problem. One area which shows promise is the use of Machine Learning to perform fall detection. Machine Learning is a rapidly growing field, and it has many applications in various fields such as finance, technology and medicine. When it comes to fall detection, Machine Learning systems are often able to detect falls much better and efficiently than a human can, given the same input data. The goal of this paper is to conduct a survey study on the main and most common machine learning algorithms implemented in the field of early fall detection for elderly people and the characteristics. The paper will discuss the different types of fall detection systems, algorithms, tools, datasets, applications, and challenges.  By conducting this research, a better understanding of the context, progress and trends in the field will be possible so that future research will have a guide to build upon.}, keywords = {elderly people,Machine learning,Fall Detection}, url = {https://jitm.ut.ac.ir/article_86925.html}, eprint = {https://jitm.ut.ac.ir/article_86925_618db84f03cd26cb81e5d8efa3e495c8.pdf} } @article { author = {Pozdnyakova, Lubov and Abed Hussein, Rasha and Talib Zaida, Doaa and AlAzzawi, Waleed Khalid and Kotik, Vitaliy and Hulai, Olena and Rybina, Olena}, title = {Theoretical, Methodological, Communication and Information Technologies Approaches to Modeling and Forecasting Personnel Education in Covid-19 Conditions}, journal = {Journal of Information Technology Management}, volume = {14}, number = {2}, pages = {41-55}, year = {2022}, publisher = {Faculty of Management, University of Tehran}, issn = {2980-7972}, eissn = {2980-7972}, doi = {10.22059/jitm.2022.86926}, abstract = {The article is devoted to solving the problems of predicting the education of Ukrainian staff in the current COVID-2019 conditions in order to improve the efficiency of their work. Theoretical approaches regarding the characteristics of modeling and prediction of education have been studied, systematic and summarized. Factors that significantly complement the theory and methodology of the scientific provisions of the economy have been identified, taking into account the peculiarities of their work in the modern economic environment, structural changes, and new changes. The pros and cons of studying modeling approaches have been identified. The main features of structural change have been studied and it has been established that the modeling and forecasting of staff education has significant features.}, keywords = {Educational programs,Personnel,Planning,training model,COVID-2019}, url = {https://jitm.ut.ac.ir/article_86926.html}, eprint = {https://jitm.ut.ac.ir/article_86926_e44e2ebfe65d6d26081a2579d2424d77.pdf} } @article { author = {Rybina, Olena and Inas Hasan, Kadhim and Muhammad, Adnan Dawood and Alobaidi, Yusra and Viktor, Goncharov and Nataliia, Prokopenko and Lyudmila, Boginskaya}, title = {Experience of Land Use Development Planning at the Local (Municipal) Level in the European Union}, journal = {Journal of Information Technology Management}, volume = {14}, number = {2}, pages = {56-69}, year = {2022}, publisher = {Faculty of Management, University of Tehran}, issn = {2980-7972}, eissn = {2980-7972}, doi = {10.22059/jitm.2022.86927}, abstract = {The article examines the development of theoretical and methodological approaches and practical recommendations for improving the ecological and economic foundations of land management and land management at the local level in the example of the European Union.In practice, regional, spatial, strategic, landscape, and integrated types of land use development planning are most often used in the European Union. With the development of the market economy of European society, environmental problems arose, which prompted the development of landscape planning, both landscape-ecological and socio-economic aspects of territorial development. The experience of landscape planning was introduced in Germany, which later became used in almost all European countries.The study and direct comparison of existing landscape planning systems in different European countries, and their reduction to several basic features are not possible and impractical because these systems are very different. This is due to a number of reasons: history, features of political systems, cultural traditions, level of economic development, the nature of legal systems and property relations. Landscape planning in the European Union is going to be one of the tensest areas of activity in the future, and Ukraine must take an active part in this process.}, keywords = {Landscapes,Planning,Sustainable Development,Land management,international standards,authorities}, url = {https://jitm.ut.ac.ir/article_86927.html}, eprint = {https://jitm.ut.ac.ir/article_86927_63daf3e02e309c2d490feae6904c67e6.pdf} } @article { author = {Deineka, Alexander and Kotik, Valentina and Nassir Al-Qusi, Sattar Jabbar and Inas Hasan, Kadhim and Al-Obaidi, Nihad}, title = {Interaction of the Home and the Economic Free Related}, journal = {Journal of Information Technology Management}, volume = {14}, number = {2}, pages = {70-79}, year = {2022}, publisher = {Faculty of Management, University of Tehran}, issn = {2980-7972}, eissn = {2980-7972}, doi = {10.22059/jitm.2022.86928}, abstract = {The article is devoted to solving the problems of internal economic relations in Ukraine in modern conditions in order to increase the efficiency of their functioning. Studied, systematized and generalized theoretical approaches regarding the features of the interaction of internal and external economic relations, which significantly complement the theory and methodology of the scientific principles of the branch economy. In Ukraine, during the period of restoration of trade and economic relations with the CIS countries and active integration processes in the world economy, the volumes and structure of exports and imports undergo significant changes. In this regard, it is advisable to forecast the export and import in the near future. Conceptual provisions regarding the formation of a national strategy, a mechanism for managing the development of Ukraine’s integration processes on the principles of improving the current legislative and regulatory regulation in the country are proposed. In addition to the convenience for calculations, the hierarchical model also has other significant advantages. So, a high degree of independence of groups from each other makes it extremely flexible.}, keywords = {: Educational programs,Personnel,Planning,free related}, url = {https://jitm.ut.ac.ir/article_86928.html}, eprint = {https://jitm.ut.ac.ir/article_86928_a0159033926c024e61d7b09ca600b30d.pdf} } @article { author = {Mikhailovich Kovtsur, Maxim and Muthanna, Ammar and Ridha Al-Khafaji, Hamza Mohammed and Karelsky, Pavel and Kozmyan, Alexander and Voroshnin, Grigorii}, title = {IPTV Access Methods with RADIUS-Server Authorization}, journal = {Journal of Information Technology Management}, volume = {14}, number = {2}, pages = {80-89}, year = {2022}, publisher = {Faculty of Management, University of Tehran}, issn = {2980-7972}, eissn = {2980-7972}, doi = {10.22059/jitm.2022.86929}, abstract = {Security is one of the most important aspects of data transmission. To provide controlled access to the network, user authorization and authentication are often used with the help of an AAA server. RADIUS servers provide users with access to data, user authentication, and configuration information. When designing networks with such access control method implementation, it is necessary to understand how the characteristics of the communication channel affect the switching time of IP-TV channels, and therefore the overall quality of IP-TV services. The principles of the main protocols for IP-TV using a RADIUS server are described. The main parameters of the communication channel were identified. The mathematical model and the graphs demonstrate how IP-TV service access time depends on telecommunication channel parameters. The results of a practical experiment are presented to prove the formed mathematical model. The results of a practical experiment and theoretical calculation are compared.}, keywords = {Authorization,IGMP,IP-TV,Multicast,RADIUS,Mathematical model}, url = {https://jitm.ut.ac.ir/article_86929.html}, eprint = {https://jitm.ut.ac.ir/article_86929_4489e18981f10d7baaeb358439472513.pdf} } @article { author = {Ali Alawaed, Husam Muhammed and Khanjar Almagsoosi, Lara Qasim and Jawad Al-Kawaz, Salah Mahdi and Alwan, Ali Saad}, title = {The Integration of Reverse Engineering and Characteristics Based Costing Approaches and its Applying in a Manufacturing Company}, journal = {Journal of Information Technology Management}, volume = {14}, number = {2}, pages = {90-105}, year = {2022}, publisher = {Faculty of Management, University of Tehran}, issn = {2980-7972}, eissn = {2980-7972}, doi = {10.22059/jitm.2022.86930}, abstract = {This research deals with integrating RE and CBC in the product design process. RE improves the product value based on evaluate the competition products, whereas CBC aims to use a process approach to define activities and prelates those activities to products or customers using the product’s Characteristics. Integrating RE and CBC together leads to the improvement of product value, an increase of customer satisfaction, and support of competitive advantage. In this study first, a conceptual model of integration of these two approaches is provided and then the implementation procedures in product design cycle are explained, and finally, the results got from implementing it in an Electronic Industries company are discussed.}, keywords = {Characteristics Based Costing,Reverse Engineering,Integration of RE,CBC}, url = {https://jitm.ut.ac.ir/article_86930.html}, eprint = {https://jitm.ut.ac.ir/article_86930_704bad9dd78e4ae07530b315ee34de04.pdf} }