@article{ author = {Fakhte, Rasoul and Ghorbaninejad, Habib}, title = {Gain and Bandwidth Enhancement of Slot Antenna Using Two Unprinted Dielectric Superstrate}, abstract ={This paper presents a high-gain and wideband antenna with a compact, simple and low-profile structure. The design strategy of high gain Fabry-Perot resonator antennas (FPRA), which have a superstrate with increasing phase in the operating band, has been applied to design the antenna. A double-layered unprinted dielectric superstrate is used as a partially reflective surface (PRS) to enhance the gain of the antenna and to produce a reflection phase curve versus frequency with a positive slope. The superstrate is composed of two dielectric slabs, and it is truncated so that its dimension to be about 1.5λ×1.5λ. By using such an unprinted double-layered dielectric, as a superstrate, the bandwidth of about 14.3% can be achieved. To further increase the size of the upper unprinted slab, the gain can be enhanced, without compromising the bandwidth. A prototype antenna has been designed and simulated at 9 GHz. The achieved peak gain is 17 dB.}, Keywords = {Cavity antenna, Fabry-Perot antenna, Superstrate, High gain }, volume = {8}, Number = {3}, pages = {1-6}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-57-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-57-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Bekrani, Mehdi and Zayyani, Hadi}, title = {A Weighted Soft-Max PNLMS Algorithm for Sparse System Identification}, abstract ={This paper presents a new Proportionate Normalized Least Mean Square (PNLMS) adaptive algorithm using a soft maximum operator for sparse system identification. To provide a high rate of convergence, soft maximum operator is employed along with a weighting factor, which is proportional to an estimation of output mean square error (MSE). Simulation results show the superiority of the proposed algorithm over its PNLMS-based counterparts.}, Keywords = {Sparse adaptive filter, System identification, Echo cancelation, Soft maximum}, volume = {8}, Number = {3}, pages = {7-14}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-58-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-58-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Tajfar, Amir Houshang and Gheysari, Mohamm}, title = {Analysis the Effects of Internet of Things Technology in Managing Supply Chain}, abstract ={Internet of Things Technology forms an information network of Smart things which are interrelated in the physical world. Using information tools such as smart equipment (Radio Frequency Identification, wireless Sensor Network), Middleware, Web platforms, and reliance on could computing, have led to practical and strategic progress in coordinating business activities and expansion of job opportunities in different fields. One of the advantages of new technology is facilitation of information exchange between things in commercial networks and business processes. In this article attempts were made to analyze the effects of cloud centric Internet of Things technologies on supply chain. For this purpose. Supply chain management and Internet of Things processes are considered as dependent and independent variable respectively. A questioner was designed and completed by selected number experts. The result shows that Cloud Computing with covering the Internet of Things have positive influence on supply change process and will facilitate prediction, planning, procurement and supporting activities. In addition, this technology will reduce the time that businesses spend on procurement and buying of good and service, and in general will change the buying habits of companies.}, Keywords = {Internet of Things, Smart Business, Cloud Computing, Smart Things, Wireless Sensor Networks }, volume = {8}, Number = {3}, pages = {15-25}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-59-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-59-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Behkamal, Behshid and Kahani, Mohsen and Bagheri, Ebrahim and Sazvar, Maji}, title = {A metric Suite for Systematic Quality Assessment of Linked Open Data}, abstract ={The vision of the Linked Open Data (LOD) initiative is to provide a distributed model for publishing and meaningfully interlinking open data. The realization of this goal depends strongly on the quality of the data that is published as a part of the LOD. This paper focuses on the systematic quality assessment of datasets prior to publication on the LOD cloud. To this end, we identify important quality deficiencies that need to be avoided and/or resolved prior to the publication of a dataset. We then propose a set of metrics to measure these quality deficiencies in a dataset. This way, we enable the assessment and identification of undesirable quality characteristics of a dataset through our proposed metrics. This will help publishers to filter out low-quality data based on the quality assessment results, which in turn enables data consumers to make better and more informed decisions when using the open datasets.}, Keywords = { Metrics, RDF Datasets, Systematic Assessment, Quality Deficiencies, Linked Open Data }, volume = {8}, Number = {3}, pages = {27-45}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-60-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-60-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Sepehri, Modammad Mehdi and Hadizadeh, Anita and Baradaran, Vahid and Assadi, Vahi}, title = {A Ranking Framework for Designing a Portal Based on Healthcare Solutions The Case of Cardiovascular Disease}, abstract ={Cyber-health is one of the most important results of IT revolution by enabling the communication between health workers & patients. So far several countries & enterprises have offered different services to their consumers. In Iran, many island activities have been carried out to conducting cyber-health too. But they are not as progressed as Iran ICT capabilities. In this study we are on the way of identifying & ranking essential criteria for cyber-health. Since it is not implementable for all medical specialties, we have chosen cardiovascular disease users, including cardiovascular medicine, patients & also their families. So in this paper after a brief literature review on cyber-health, cardiovascular criteria will be identified & collected. Then using the methods of Multiple Criteria Decision Making, collected criteria, according to Iran local conditions, will be ranked. At last due to ranked criteria, a framework on cyber-health will be presented.}, Keywords = {Cyber-medicine, Web, Portal, health, Service}, volume = {8}, Number = {3}, pages = {47-56}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-61-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-61-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Hatami, Mohammad and Behroozi, Hami}, title = {On Maximizing the Secrecy Rate in a Cooperative Wireless Network using Friendly Jammers}, abstract ={In this paper, the security of two-phase relaying system with multiple intermediate nodes in the presence of a malicious eavesdropper is investigated. To enhance the secrecy, a joint cooperative beamforming and jamming combined with relay and jammer selection is proposed. First, the source broadcasts its signal to the relays that are located close to source in a cluster, i.e., the source node uses a small amount of power to broadcast its message locally to other nodes of the cluster, while destination and the eavesdropper are located outside this cluster. In the second phase, two relays transmit re-encoded signal with optimal beamforming such that the secrecy rate is maximized. Simultaneously, two other intermediate nodes (which act as friendly jammers) transmit random jamming signals to degrade the eavesdropper’s channel. Our goal in this paper is to maximize the secrecy rate by applying different methods such as cooperative beamforming, cooperative jamming and relay and jammer selection. To avoid operational complexity, we consider the minimum number of intermediate nodes needed for relaying and jamming without losing the performance, i.e., achieving a non-zero secrecy rate. Cooperative beamforming with multiple relays demands high amount of information exchange and therefore increases the operational complexity. Thus, we aim to reduce the number of relays which take part in cooperative beamforming. Limiting the number of relays may have a bad effect on the coding gain which we compensate it with a proposed selection gain scheme. Numerical results demonstrate the advantage of our proposed scheme compared to the scheme with no cooperative jamming. The main contribution of this work is combining cooperative beamforming and jamming with relay and jammer selection to enhance the physical layer security.}, Keywords = { physical layer secrecy, secrecy rate, cooperative jamming, beamforming, relay and jammer selection }, volume = {8}, Number = {3}, pages = {63-69}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-62-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-62-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Behbahani, Olya Sadat and Pedram, Mir Mohsen and Badie, Kambiz}, title = {Hiding Fuzzy Sequential Patterns by a Multi-Objective Scheme}, abstract ={Improvements in technology have led to generating and mining huge amounts of data. Sequence mining is a research area of data mining that aims to extract useful knowledge from raw databases. Although transactions with numerical information are usually seen in real-world applications like bank records, customer baskets and network traffic records, and efforts for mining sequential patterns with quantitative values are reported in the technical literature, the issue of privacy of sensitive knowledge in the form of fuzzy sequential patterns has not received much attention. This paper addresses the problem of fuzzy sequential pattern hiding and proposes a multi-objective optimization procedure with few distortions which leads to the preserving of database fidelity. The proposed algorithm can also work with fuzzy databases and more details are handled by fuzzy sets. Distortions, fidelity and time-consumption of the proposed algorithm are three criteria used to compare the performance of it with the existing algorithms.}, Keywords = {Digital Economy, Utility Optimizatioin, Network Utility Maximization (NUM), Bandwidth Allocation, QoS, Broadband Services, PSO}, volume = {8}, Number = {3}, pages = {71-81}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-63-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-63-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} }