@article{ author = {Hashemi, Ramin and Habibi, Mehdi and Beyranvand, Hamzeh and Emami, Ali and Hashemi, Mahdi and RanjbarRafie, Davoo}, title = {Transmit Power Optimization in Optical Coherent Transmission Systems: Analytical, Simulation, and Experimental Results}, abstract ={In this paper, we propose to use discretized version of the so-called Enhanced Gaussian Noise (EGN) model to estimate the non-linearity effects of fiber on the performance of optical coherent and uncompensated transmission (CUT) systems. By computing the power of non-linear interference noises and considering optical amplifier noises, we obtain the signal-to-noise (SNR) ratio and achievable rate of CUT. To allocate power of each CUT channel, we consider two optimization problems with the objectives of maximizing minimum SNR margin and achievable rate. We show that by using the discretized EGN model, the complexity of the introduced optimization problems is reduced compared with the existing optimization problems developed based on the so-called discretized Gaussian Noise (GN) model. In addition, the optimization based on the disctretized EGN model leads to a better SNR and achievable rate. We validate our analytical results with simulations and experimental results. We simulate a five-channel coherent system on OptiSystem software, where a close agreement is observed between optimizations and simulations. Furthermore, we measured SNR of commercial 100Gbps coherent transmitter over 300 km single-mode fiber (SMF) and non-zero dispersion shifted fiber (NZDSF), by considering single-channel and three-channel coherent systems. We observe there are performance gaps between experimental and analytical results, which is mainly due to other sources of noises such as transmitter imperfection noise, thermal noise, and shot noise, in experiments. By including these sources of noises in the analytical model, the gaps between analytical and experimental results are reduced.  }, Keywords = {Optical Coherent Transmission Systems, Fiber Non-linear Interference Noise, Power Allocation, Minimum Signal-to-Noise-Ration (SNR) Margin, Maximum Achievable Capacity.}, volume = {11}, Number = {1}, pages = {1-11}, publisher = {ICT Research Institute(ITRC)}, url = {http://ijict.itrc.ac.ir/article-1-335-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-335-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2019} } @article{ author = {Daneshmandian, Farzaneh and Abdipour, Abdolali and Askarpour, Amir Nader}, title = {Numerical Full wave Analysis and Modeling of Plasmonic HEMT Performance Using Hydrodynamic Model}, abstract ={The two dimensional (2D) plasmon propagation in the channel of a high electron mobility transistor (HEMT) is numerically modeled using the full wave technique. To analyze the proposed structure, the Maxwell’s equations are solved inconjuction to the hydrodynamic transport equations, using the finite difference time domain (FDTD) method. The properties of the 2D plasmons propagation along the channel are investigated by applying different bias voltages to the drain and the gate terminals. The obtained results show that the wavelengths and the propagation constants of the 2D plasmons are considerably affected by varying the bias voltages. Moreover, the proposed full wave model is employed to investigate the tunability of a grating gate HEMT detector over terahertz (THz) frequencies.  Our studies demonstrate that it is possible to control the characteristics of the 2D plasmon propagation along the channel of HEMT devices to produce various types of reconfigurable structures used for THz applications.}, Keywords = {2DEG channel, 2D plasmon, full wave model, hydrodynamic equations, HEMT structure, resonant detector}, volume = {11}, Number = {1}, pages = {12-18}, publisher = {ICT Research Institute(ITRC)}, url = {http://ijict.itrc.ac.ir/article-1-344-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-344-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2019} } @article{ author = {Hosseinpour, Mohaddeseh and Yari, Alireza and Nasiriasayesh, Hamidrez}, title = {Continuous Double Auction Scheduling in Federated Cloud Services}, abstract ={In recent years, researchers have introduced many different mechanisms to improve resource allocation in the cloud. One of these resource allocation methods is market-based resource allocation which exploits different models used in exchanging goods and services. In this research, a two-way auction model is used for allocating cloud resources based on the market model. In the case of federated clouds, as the providers may face a shortage of resources during their operation; therefore, the continuous double auction model is suggested to create a cloud federation environment to support a suitable resource allocation among different providers. In our experiment 1, fixed pricing with Reputation-Aware Continuous Double Auction, Continuous Double Auction, and Market-Driven Continuous Double Auction models will be executed for resource allocation. It shows that both the resource efficiency and the income of the providers are improved in the federated clouds using these models. In experiment 2, with changing the type and number of the requested resources by customers and providers, the proposed federated model is also tested. The results of the experiments show that our proposed model for implementing federated clouds based on the continuous double auction model, in terms of successful allocation rates, resource efficiency and provider revenue, is better than other marketoriented models.}, Keywords = {Resource allocation,Cloud federation,Continuous double auction,Double Auction model}, volume = {11}, Number = {1}, pages = {19-26}, publisher = {ICT Research Institute(ITRC)}, url = {http://ijict.itrc.ac.ir/article-1-434-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-434-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2019} } @article{ author = {Khorasani, Mahsa and Minaei-Bidgoli, Behrouz and Saedi, Chakaveh}, title = {Automatic Synset Extraction from text documents using a Graph-Based Clustering Approach}, abstract ={Semantic relations between words like synsets are used in automatic ontology production which is a strong tool  in many NLP tasks. Synset extraction is usually dependent on other languages and resources using techniques such as mapping or translation. In our proposed method,  synsets are extracted merely from text and corpora. This frees us from the need for special resources including Word-Nets or dictionaries. The representation model for words of corpus is based on Vector Space model and the most similar words to each are extracted based on common features count (CFC) using a modified cosine similarity measure. Furthermore, a graph-based soft clustering approach is applied to create clusters of synonymous words. To examine performance of the proposed method, Extracted synsets were compared to other Persian semantic resources. Results show an accuracy of 80.25%, which indicates improvement in comparison to the 69.5% accuracy of pure clustering by committee method.}, Keywords = {Automatic Synset Extraction, Semantic Relation, Graph-based Clustering, CBC clustering, Persian}, volume = {11}, Number = {1}, pages = {27-35}, publisher = {ICT Research Institute(ITRC)}, url = {http://ijict.itrc.ac.ir/article-1-303-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-303-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2019} } @article{ author = {Shakeri, Omid and Kelarestaghi, Manoochehr and Eshghi, Farshad and Ganjtabesh, Ahm}, title = {Fuzzy Sequential Pattern Mining over Quantitative Streams}, abstract ={Sequential pattern mining is an interesting data mining problem with many real-world applications. Though new applications introduce a new form of data called data stream, no study has been reported on mining sequential patterns from the quantitative data stream. This paper presents a novel algorithm, for mining quantitative streams. The proposed algorithm can mine exact set of fuzzy sequential patterns in sliding window and gap constraints entailing the most recent transactions in a data stream. In addition, the proposed algorithm can also mine non-quantitative or transaction-based sequential patterns over a data stream. Numerical results show the running time and the memory usage of the proposed algorithm in the case of quantitative and customer-transaction-based sequence counting are proportional to the size of the sliding window and gap constraints}, Keywords = { Data Stream,Fuzzy Sequential Pattern Mining,Gap Constraint,Sliding Window}, volume = {11}, Number = {1}, pages = {36-44}, publisher = {ICT Research Institute(ITRC)}, url = {http://ijict.itrc.ac.ir/article-1-435-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-435-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2019} } @article{ author = {Abedini, Farhad and Keyvanpour, Mohammadreza and Menhaj, Mohammad Bagher}, title = {Converting and Completing RDF Based Ontology into Fuzzy Ontology Using Neural Tensor Network}, abstract ={The fuzzy ontology is an ontology in which some of its aspects are fuzzified for a special application. Based on these aspects, there are different definitions of fuzzy ontology, but here, a new definition is proposed based on the aspect of the facts. In some applications, an ontology can be converted into a fuzzy one, and it may be incomplete. In this paper, a new method is introduced for the purpose of conversion and completion of fuzzy ontology based on the facts aspect. The ontology is a knowledge base in which there are many facts about the real world. The existence of uncertainties in facts of ontologies reveals the importance of fuzzy ontologies based on facts aspect.  So far, many methods have been suggested to create a fuzzy ontology. Each of them focuses on some aspects to convert them into fuzzy.  The focus of this paper is on facts of RDF based ontology. The first suggestion of this paper is a new algorithm in which with converting these facts into fuzzy one, fuzzy version of ontology is gained. In this algorithm neural tensor network is used as state-of-the-art in the relevant field. This network was used to complete an ontology, based on the existing facts of the ontology, but in this paper, it is used for converting and completing an ontology into a fuzzy one. For this purpose, a new definition of the fuzzy ontology for the aim of this paper will be proposed. Experimental results of the proposed method show comparing this method with similar works and then its advantages will be discussed.}, Keywords = {Ontology, Fuzzy Ontology, Facts, Neural Tensor Network, RDF}, volume = {11}, Number = {1}, pages = {45-56}, publisher = {ICT Research Institute(ITRC)}, url = {http://ijict.itrc.ac.ir/article-1-306-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-306-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2019} } @article{ author = {kassaee, massoud and GholamiMerhabadi, Mohammad and arabsorkhi, abouzar}, title = {A Novel Model for MSSP Maturity Assessment}, abstract ={The growing threat and security risks in information and communication technology, beside the increasing use of information and communication technologies, are two main decision makers for executives of organizations, service providers and the general public. Internet Service Providers are known to be the main stakeholder of this space. If Internet Service Providers have known as untrusted party, it can put their business and community level services at serious risk. Moreover, Resource limitation and the lack of expert in cyber security have made lots of major challenge for ISPs in dealing with and managing security threats. In many developing countries, this problem has been solved using Managed Security Service Providers. Managed Security Services are network-based security services that are outsourced by a trusted third party. The diversity of Managed Security Service Providers affects the effectiveness and efficiency of decision making in this area, as well as the correct selection of them. Therefore, in order to outsource the security services, the assessment of these organizations is inevitable. This assessment can be done by various mechanisms. One of the acceptable strategies in the security is the maturity model. Maturity models are step-by-step solutions to grow organizational capabilities along a predicted, desirable, or logical path. In fact, maturity models provide standard way to assess process maturity along with business process improvement. Hitherto, no maturity model has been developed to assess the Managed Security Service Providers. Therefore, in this paper considering different issues to evaluate frameworks, we have proposed a novel model to assess the maturity of Managed Security Service Providers. The evaluation of the proposed maturity model is based on multiple case studies.}, Keywords = {}, volume = {11}, Number = {1}, pages = {57-70}, publisher = {ICT Research Institute(ITRC)}, url = {http://ijict.itrc.ac.ir/article-1-356-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-356-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2019} }