دانلود و نمایش مقالات مرتبط با نقشه برداری سیستماتیک::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - نقشه برداری سیستماتیک

تعداد مقالات یافته شده: 7
ردیف عنوان نوع
1 Big Data Architecture for Water Resources Management: A Systematic Mapping Study
معماری داده های بزرگ برای مدیریت منابع آب: یک مطالعه نقشه برداری سیستماتیک-2018
The combination of growth in demand for water, climate and hydrological gap, pushed the decision makers and water resource managers to search strategies for effective management of water resources. In this sense, the new generation of Business Intelligence technologies, known as Big Data, allows mass processing of complex data on a large scale. In recent years, several solutions have been proposed for management issues of water resources in general using Big Data. In this paper we provide an overview of proposed architectures features, serving as a starting point for further research
Keywords: Big Data; architecture; water; resources ;systematic mapping
مقاله انگلیسی
2 Big Data Architectures and the Internet of Things: A Systematic Mapping Study
معماری های داده های بزرگ و اینترنت اشیا: یک مطالعه نقشه ای سیستماتیک-2018
Big Data and IoT have made huge strides in detection technologies, resulting in "smart" devices consisting of sensors, and massive data processing. So far, there is no common strategy for designing Big Data architectures containing IoT, since they depend on the context of the problem to be solved. But in recent years, various architectures have been proposed that serve as examples for future research in this area. The aim of this article is to provide an overview of the architectures published so far, serving as a starting point for future research. The methodology used is that of systematic mapping
Keywords : Big Data; architecture; Internet of Things; IoT; systematic mapping
مقاله انگلیسی
3 Exploring software security approaches in software development lifecycle_ A systematic mapping study
بررسی رویکردهای امنیتی نرم افزار در طول عمر مفید نرم افزار _ یک مطالعه نقشه برداری سیستماتیک-2017
There is an increase use of security driven approaches to support software development activities, such as requirements, design and implementation. The objective of this paper is to identify the existing software security approaches used in the software development lifecycle (SDLC). In order to meet our goal, we conducted a systematic mapping study to identify the primary studies on the use of software security techniques in SDLC. In total, we selected and categorized 118 primary studies. After analyzing the selected studies, we identified 52 security approaches and we categorized them in to five main categories, namely, ‘secure requirements modeling’, ‘vulnerability identification, adaption and mitigation’, ‘software security focused process’, ‘extended UML-based secure modeling profiles’, ‘non UML-based secure modeling notations’. The results show that the most frequently used approaches are static analysis and dynamic analysis that provide security checks in the coding phase. In addition, our results show that many studies in this review considered security checks around the coding stage of software development. This work will assist software development organizations in better understanding the existing software security approaches used in the software development lifecycle. It can also provide researchers with a firm basis on which to develop new software security approaches.
Keywords:Systematic mapping study | Empirical study | Software development life cycle | Software security
مقاله انگلیسی
4 Research on Big Data - A systematic mapping study
تحقیق بر روی داده های بزرگ - یک مطالعه نقشه برداری سیستماتیک-2017
Big Data has emerged as a significant area of study for both practitioners and researchers. Big Data is a term for massive data sets with large structure. In 2012, Big Data passed the top of the Gartner Hype Cycle, attesting the maturity level of this technology and its applications. The aim of this paper is to examine how do researchers grasp the big data concept? We will answer the following questions: How many research papers are produced? What is the annual trend of publications? What are the hot topics in big data research? What are the most investigated big data topics? Why the research is performed? What are the most frequently obtained research artefacts? What does big data research produces? Who are the active authors? Which journals include papers on Big Data? What are the active disciplines? For this purpose, we provide a framework identifying existing and emerging research areas of Big Data. This framework is based on eight dimensions, including the SMACIT (Social Mobile Analytics Cloud Internet of Things) perspective. Current and past research in Big Data are analyzed using a systematic mapping study of publications based on more than a decade of related academic publications. The results have shown that significant contributions have been made by the research community, attested by a continuous increase in the number of scientific publications that address Big Data. We found that researchers are increasingly involved in research combining Big Data and Analytics, Cloud, Internet of things, mobility or social media. As for quality objectives, besides an interest in performance, other topics as scalability is emerging. Moreover, security and quality aspects become important. Researchers on Big Data provide more algorithms, frameworks, and architectures than other artifacts. Finally, application domains such as earth, energy, medicine, ecology, marketing, and health attract more attention from researchers on big data. A complementary content analysis on a subset of papers sheds some light on the evolving field of big data research.
Keywords: Big Data| systematic mapping study| framework| artefact| usage| analytics.
مقاله انگلیسی
5 Model-based security engineering for cyber-physical systems: A systematic mapping study
مهندسی امنیتی مبتنی بر مدل برای سیستم های فیزیکی سایبر: یک مطالعه نقشه برداری سیستماتیک-2017
Article history:Received 22 June 2016Revised 19 October 2016Accepted 8 November 2016Available online 12 November 2016Keywords:Cyber-physical systems SecurityModel-based engineering Security engineering Systematic mapping SnowballingSurveyContext: Cyber-physical systems (CPSs) have emerged to be the next generation of engineered systems driving the so-called fourth industrial revolution. CPSs are becoming more complex, open and more prone to security threats, which urges security to be engineered systematically into CPSs. Model-Based Security Engineering (MBSE) could be a key means to tackle this challenge via security by design, abstraction, and automation.Objective: We aim at providing an initial assessment of the state of the art in MBSE for CPSs (MBSE4CPS). Specifically, this work focuses on finding out 1) the publication statistics of MBSE4CPS studies; 2) the characteristics of MBSE4CPS studies; and 3) the open issues of MBSE4CPS research.Method: We conducted a systematic mapping study (SMS) following a rigorous protocol that was devel- oped based on the state-of-the-art SMS and systematic review guidelines. From thousands of relevant publications, we systematically identified 48 primary MBSE4CPS studies for data extraction and synthesis to answer predefined research questions.Results: SMS results show that for three recent years (2014–2016) the number of primary MBSE4CPS studies has increased significantly. Within the primary studies, the popularity of using Domain-Specific Languages (DSLs) is comparable with the use of the standardised UML modelling notation. Most primary studies do not explicitly address specific security concerns (e.g., confidentiality, integrity) but rather focus on security analyses in general on threats, attacks or vulnerabilities. Few primary studies propose to engineer security solutions for CPSs. Many focus on the early stages of development lifecycle such as security requirement engineering or analysis.Conclusion: The SMS does not only provide the state of the art in MBSE4CPS, but also points out several open issues that would deserve more investigation, e.g., the lack of engineering security solutions for CPSs, limited tool support, too few industrial case studies, and the challenge of bridging DSLs in engi- neering secure CPSs.© 2016 Elsevier B.V. All rights reserved.
Keywords: Cyber-physical systems | Security | Model-based engineering | Security engineering | Systematic mapping | Snowballing | Survey
مقاله انگلیسی
6 The diffusion stages of business intelligence & analytics (BI&A): A systematic mapping study
مراحل انتشار هوش تجاری و تجزیه و تحلیل (BI & A): مطالعه نقشه برداری سیستماتیک-2014
Business intelligence & analytics (BI&A) has evolved to become a foundational cornerstone of enterprise decision support. Since the way BI&A is implemented and assimilated is quite different among organizations is important to approach BI&A literature by four selected diffusion stages (adoption, implementation, use and impacts of use). The diffusion stages assume a crucial importance to track the BI&A evolution in organizations and justify the investment made. The main focus of this paper is to evidence BI&A research on its several diffusion stages. It provides an updated bibliography of BI&A articles published in the IS journal and conferences during the period of 2000 and 2013. A total of 30 articles from 11 journals and 8 conferences are reviewed. This study contributes to the BI&A research in three ways. This is the first systematic mapping study focused on BI&A diffusion stages. It contributes to see how BI&A stages have been analyzed (theories used, data collection methods, analysis methods and publication source). Finally, it observes that little attention has been given to BI&A post-adoption stages and proposes future research line on this area. Keywords:BI&A; business intelligence & analytics; implementation; adoption; use; impacts; benefits; systematic mapping study
مقاله انگلیسی
7 مراحل انتشار اطلاعات هوش تجاری و تحلیلی (BI &A) : مطالعه نقشه برداری سیستماتیک
سال انتشار: 2014 - تعداد صفحات فایل pdf انگلیسی: 8 - تعداد صفحات فایل doc فارسی: 16
اطلاعات هوش تجاری و هوش تحلیلی (BI&A) برای تبدیل به سنگ بنای بنیادین پشتیبان تصمیم سرمایه¬گذاری شکل گرفته است. از انجاییکه مسیر اجرا و تلفیق BI&A در میان سازمان ها تقریبا متفاوت است، بسیار مهم است که رویکرد منابع علمی BI&A در چهار مرحله برگزیده از انتشار (اتخاذ، اجرا، استفاده و تاثیر استفاده) تعیین شود. مرحله انتشار اهمیت قابل توجهی به بررسی تکامل BI&A در سازمان ها و توجیه روش سرمایه گذاری، در نظر می گیرد. هدف اصلی این مقاله اثبات تحقیق و بررسی BI&A در چندین مرحله از انتشار ان است؛ که فهرست جدیدی از مقالات چاپ شده BI&A در ژورنال ها و همایش های طی دوره 2000 و 2013، ارائه می دهد. تعداد 30 مقاله از 11 مجله و 8 کنفرانس مرور و بازبینی گردید. این مطالعه به سه روش در بررسی BI&A مشارکت می کند. این مقاله اولین مطالعه نقشه یابی سیستماتیک با هدف مراحل انتشار BI&A است. مقاله حاضر به بررسی این موضوع می پردازد که چگونه مراحل BI&A مورد تجزیه و تحلیل قرار می گیرند (تئوری های مورد استفاده، روش های جمع اوری داده ها، روش های انالیز و منابع انتشار). در نهایت، نتایج حاصل نشان می دهد که توجه ناچیزی در مراحل پس از تصویب BI&A بعمل امده است، که پیشنهاد می شود تحقیقات بعدی بیشتری در این حوزه صورت گیرد. کلمات کلیدی: BI&A، هوش تجاری& تجزیه و تحلیل، اجرا، سازگاری، استفاده، اثرات، منافع، مطالعه نقشه-برداری سیستماتیک
مقاله ترجمه شده
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 517 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 517 :::::::: افراد آنلاین: 68