@article{ author = {Shirichian, Mehdi and Moradi, Gholamreza and SarrafShirazi, Rez}, title = {Two Ports SIW Array Antenna with Circular Polarization for 5G Base Station}, abstract ={The demand for mobile communication systems with high data rate cusses to grow the attention to the millimeter-wave frequency in order to increase the channel capacity compared to current 4G cellular networks. So, the fifth generation (5G) mobile communications is presented which is to work in mm-wave frequency band to improve data rate, capacity and latency simultaneously. One of the challenges of 5G application is the base station and mobile antennas which should be robust against fading. Therefore, in this paper, a two port substrate integrated waveguide (SIW) slot base station antenna for 5G application at 28 GHz is presented. The realized gain of the two-port antenna with a high isolation (20dB) and circular polarization is 6.35 dBi. The 5-element array of the two-port antenna with the same excitation can increase the gain 8 dB. But it has some nulls. With phase shift for excitation ports, the nulls are canceled.}, Keywords = {Fifth generation, millimeter-wave, base station, circular polarization and array antenna.}, volume = {11}, Number = {2}, pages = {1-6}, publisher = {ICT Research Institute(ITRC)}, url = {http://ijict.itrc.ac.ir/article-1-347-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-347-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2019} } @article{ author = {Tamaddondar, Mohammad Mehdi}, title = {A 3D Time-Variant Non-Stationary Hybrid Channel Model for Massive MIMO Systems}, abstract ={This paper presents a novel three-dimensional (3D) time-variant hybrid channel model for massive multiple input multiple output (M-MIMO) wireless systems. The main aim of the proposed model is to find channel characteristics in a simple and precise manner. To achieve this purpose, this channel model consists of two deterministic and stochastic modes. By using the idea of equivalent planes and ray tracing method, the channel multipath components (MPCs) are calculated in the deterministic mode. In the stochastic mode, those parts of the propagation environment that are too complex to be modeled in the deterministic mode, are modeled based on the cluster concept. Then, the MPCs characteristics are calculated by utilizing appropriate random distributions. The doppler effect is also taken into account due to the probability of existence relative velocities among channel components. This model is validated by comparing simulation results with those of the previously developed channel models. Finally, the channel model is applied to a real scenario to extract some of the important characteristics of the propagation environment.}, Keywords = {Channel modeling, doppler effect, clustering, massive MIMO, ray tracing, 5G}, volume = {11}, Number = {2}, pages = {7-17}, publisher = {ICT Research Institute(ITRC)}, url = {http://ijict.itrc.ac.ir/article-1-403-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-403-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2019} } @article{ author = {Hakimi, Azar and Mohammadi, Mohammadali and Mobini, Zahr}, title = {Wireless-powered Cooperative Spectrum Sharing Networks with Full-duplex and NOMA Transmissions}, abstract ={We consider a cooperative spectrum sharing non-orthogonal multiple access (NOMA) network, where a secondary transmitter assists transmission from a primary transmitter to a primary receiver with poor channel conditions, and at the same time transmits to a secondary receiver with strong channel conditions. The secondary transmitter is assumed to be energy-constrained and powered by an energy access point located in its vicinity. In order to cancel the self-interference at the full-duplex multi-antenna secondary transmitter, two zero-forcing (ZF)-based beamforming schemes and a maximum ratio combining/maximum ratio transmission scheme are designed and the corresponding outage probability analysis of the primary and secondary networks, are derived. Outage probability results are used to study the delay-constrained throughput of the system. Our results suggest that by using ZF-based beamforming schemes depending on the number of transmit/receive antennas at the full-duplex secondary transmitter significant performance improvement can be achieved compared to the half-duplex counterpart. Moreover, our results indicate that proposed ZF-based schemes achieves a zero-diversity order.}, Keywords = {}, volume = {11}, Number = {2}, pages = {18-28}, publisher = {ICT Research Institute(ITRC)}, url = {http://ijict.itrc.ac.ir/article-1-336-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-336-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2019} } @article{ author = {Farajian, Nim}, title = {Sparse, Robust and Discriminative Representation by Supervised Regularized Auto-encoder}, abstract ={Recent researches have determined that regularized auto-encoders can provide a good representation of data which improves the performance of data classification. These type of auto-encoders which are usually over-complete, provide a representation of data that has some degree of sparsity and is robust against variation of data to extract meaningful information and reveal the underlying structure of data by making a change in classic auto- encoders’ structure and/or adding regularizing terms to the objective function. The present study aimed to propose a novel approach to generate sparse, robust, and discriminative features through supervised regularized auto-encoders, in which unlike most existing auto-encoders, the data labels are used during feature extraction to improve discrimination of the representation and also, the sparsity ratio of the representation is completely adaptive and dynamically determined based on data distribution and complexity. Results reveal that this method has better performance in comparison to other regularized auto-encoders regarding data classification. }, Keywords = {Supervised Auto-encoder, Feature Learning, Discriminative Representation, Manifold}, volume = {11}, Number = {2}, pages = {29-37}, publisher = {ICT Research Institute(ITRC)}, url = {http://ijict.itrc.ac.ir/article-1-304-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-304-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2019} } @article{ author = {Nakhaei, Zeinab and Ahmadi, Ali and Sharifi, Arash and Badie, Kambiz}, title = {Conflict Resolution in Data Integration Using the Relationship Between Entities}, abstract ={In this paper, we propose an approach to data fusion to enhance the accuracy of data integration. The proposed approach uses the information in the relationships between entities to find more evidence for the correctness or incorrectness of the values ​​generated by different data sources. We also define some concepts and investigate the different methods for identifying relationships between entities. Then, we consider how to use these relationships to increase the accuracy of the conflict resolution process. Unlike many existing approaches, our proposed approach is at the high level of data abstraction. Using the information there exists at the high levels of data abstraction allows us to provide sufficient evidences where data is incomplete and there is no reliable source for the particular object. The evaluation results show that our proposed approach outperforms existing conflict resolution techniques.}, Keywords = {Keywords- Conflict Resolution, Data Fusion, Truth Discovery, Relation Assessment}, volume = {11}, Number = {2}, pages = {38-49}, publisher = {ICT Research Institute(ITRC)}, url = {http://ijict.itrc.ac.ir/article-1-437-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-437-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2019} } @article{ author = {zekrizadeh, neda and khademzadeh, ahmad and Hosseinzadeh, Mehdi}, title = {LABTS: a Learning Automata-Based Task Scheduling algorithm in cloud computing}, abstract ={Task scheduling is one of the main and important challenges in the cloud environment. The dynamic nature and changing conditions of the cloud generally leads to problems for the task scheduling. Hence resource management and scheduling are among the important cases to improve throughput of cloud computing. This paper presents an online, a non-preemptive scheduling solution using two learning automata for the task scheduling problem on virtual machines in the cloud environment that is called LABTS. This algorithm consists three phases: in the first one, the priority of tasks sent by a learning automaton is predicted. In the second phase, the existing virtual machines are clustered according to the predictions in the previous phase. Finally, using another learning automaton, tasks are assigned to the virtual machines in the third phase. The simulation results show that the proposed algorithm in the cloud environment reduces the value of two parameters makespan and degree of imbalance.}, Keywords = {cloud computing, learning automata, task scheduling, priorities of tasks.}, volume = {11}, Number = {2}, pages = {49-61}, publisher = {ICT Research Institute(ITRC)}, url = {http://ijict.itrc.ac.ir/article-1-372-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-372-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2019} } @article{ author = {Khosravi, Samiyeh}, title = {Proposing a New Algorithm for Predicting Short-Term and Long-Term Trust-ability in Cloud Computing}, abstract ={Abstract: Despite the huge use of cloud computing, due to its large dimensions and availability for all users, this type of network is weak and vulnerable to malicious attacks. Therefore, as a useful complement to existing security methods, trust management plays a crucial role in discovering suspicious behaviors in the cloud computing network. The critical question is, how can we find ideally and effectively users with suspicious behaviors in these complex environments. In this paper, the Markov chain model has been used to calculate the short-term reliability of users in the cloud network, and the trust management system has been proposed to mitigate the effects of complex environments to calculate the user’s status. Furthermore, a new computational model has been introduced with relevant, practical factors for calculating the long-term trust that reduces the effect of changing environmental parameters in the calculations. The simulation results show that the proposed algorithm, Markov chain trust management can more effectively detect suspicious behaviors of users in the cloud computing network, and in a meaningful way, provide a better rate of delivery of packets compared to their counterparts, and ultimately provide better security in the cloud computing network.    }, Keywords = {Cloud Computing, Network Security, Markov chain}, volume = {11}, Number = {2}, pages = {62-69}, publisher = {ICT Research Institute(ITRC)}, url = {http://ijict.itrc.ac.ir/article-1-417-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-417-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2019} }