@article{ author = {Golestani, Ali and H.Bastami, Ali and Mohamed-pour, Kamal}, title = {Spatial Interference Alignment in Relay-Assisted Multi-Cell Multi-User Networks}, abstract ={In this paper, the spatial interference alignment (IA) is investigated in the downlink (DL) of a relay-assisted multi-cell multi-user network. The transmission from the base station (BS) to the mobile station (MS) takes place in two phases with the help of the selected relay station (RS). The closed-form IA algorithms are employed in both the BS to RS and RS to MS links. The performance of this cooperative scheme is analyzed in terms of the sum rate and the sum degrees of freedom (DoF) for the amplify-and-forward (AF) and decode-and-forward (DF) relaying schemes. The simulation results of the sum rate show that the DF scheme significantly outperforms the noncooperative minleakage and max-SINR iterative algorithms over the entire range of SNR, and the AF scheme performs very close to the min-leakage algorithm. Moreover, the DF scheme outperforms the noncooperative closed-form IA algorithm in the low and medium-SNR regimes.}, Keywords = { Cellular network, degrees of freedom, interference alignment, relay, sum rate }, volume = {8}, Number = {4}, pages = {1-10}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-50-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-50-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Bazdar, Amir and Aliabadi, Amin and Mostafapour, Ehsan and Gobadi, Changiz}, title = {Non-stationary Sparse System Identification over Adaptive Sensor Networks with Diffusion and Incremental Strategies}, abstract ={In this paper we studied the performance of several distributed adaptive algorithms for non-stationary sparse system identification. Non-stationarity is a feature that is introduced to adaptive networks recently and makes the performance of them degraded. We analyzed the performance of both incremental and diffusion cooperation strategies in this newly presented case. The performance analyses are carried out with the steady-state mean square deviation (MSD) criterion of adaptive algorithms. Some sparsity aware algorithms are considered in this paper which tested in non-stationary systems for the first time. It is presented that for incremental cooperation, the performance of incremental least means square/forth (ILMS/F) algorithm surpasses all other algorithms as non-stationarity grows and for diffusion cooperation, the performance of adapt-then-combine (ATC) diffusion prevails reweighted zero attracting (RZA) ATC diffusion algorithm in non-stationary system identification. We hope that this work will inspire researchers to look for other advanced algorithms against systems that are both non-stationary and sparse.}, Keywords = {Adaptive networks, incremental least mean square, non-stationary condition, sparse system identification, diffusion }, volume = {8}, Number = {4}, pages = {11-17}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-51-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-51-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {AlizadehGhazijahani, Hamed and Abdollahzadeh, Milad and Seyedarabi, Hadi and MuseviNiya, Mir Jav}, title = {On Error and Bitrate Tradeoff in Visible Light Communication System to ensure HEVC Video Quality}, abstract ={Recently, Visible Light Communication (VLC) has got increasing attention in the field of indoor wireless communications. Color Shift Keying (CSK) is a VLC modulation scheme proposed by IEEE 802.15.7 task group. In this method diffused light wavelengths are symbol points so that their combination provides an overall white sensation. Modulation depth in CSK influences Bit Error Rate (BER) as determines transmission rate. In the case of video streaming over VLC network, video encoding rate should be compatible with the transmission rate, consequently, affects video quality. We have proposed an adaptive modulation scheme for video transmission over VLC network considering the dependency of encoded video quality and modulation BER to modulation. This algorithm jointly minimizes BER and encoded video distortion via adaptive selection of CSK modulation depth to decline frame loss besides desirable video quality protection.}, Keywords = {bit error rate, color shift keying, modulation, video streaming, visible light communication }, volume = {8}, Number = {4}, pages = {19-27}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-52-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-52-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Taki, Mehrdad and MahinZaeem, Rez}, title = {Optimum Selection of Modes Set for Adaptive Modulation and Coding based on Imperfect Channel State Information}, abstract ={Complexity issues and limited feedback rate strictly constrain the number of transmission modes in discrete link adaptation. A new algorithm is designed for selecting an optimum set of modes out of all the possible transmission modes based on the link’s characteristics and the constraints, meanwhile, imperfect channel state information (CSI) is available. The design goal is to maximize the average spectral efficiency and the selection is done using a combination of nonlinear quantization and integer programming. As numerical evaluations for adaptive LDPC or convolutional coded, QAM modulated transmission show, performance of the proposed scheme is considerably improved in comparison with the benchmark schemes.}, Keywords = {Link Adaptation, Adaptive Modulation and Coding, Integer programming }, volume = {8}, Number = {4}, pages = {29-34}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-53-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-53-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Dastranj, Nasrin and AbbasiShahkooh, Kolsoom and Mirsaeedghazi, Tahereh and Kharrat, Mahmoo}, title = {Technology Roadmapping Framework: Case study of USO services in Iran}, abstract ={Technology roadmapping is a tool for decision-makers to identify, assess and choose between different strategic options to achieve technological objectives and help companies and industries create better understanding of their market and technological choices. In this research, a technology roadmap for planning and developing e-services in rural and least developed areas is designed. Along with development of communication infrastructure and providing access all over the country, it is necessary to create a comprehensive plan to develop e-services in rural and least developed areas. This roadmap provides a platform for participation of stakeholders from all sectors and also provides access to high quality and effective services. By using technology roadmap approach, e-services have been defined in different categories including agriculture, education, health, finance and banking, tourism, public facilities, employment and entrepreneurship, registration, environment, police and judiciary; and then characteristics and requirements of services are clarified. After specific steps to extract the required content of the roadmap, the content is mapped to the structure of the roadmap in layers of drivers, services, requirements and strategies.}, Keywords = {e-services, technology roadmap, rural and least developed areas, USO }, volume = {8}, Number = {4}, pages = {35-43}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-54-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-54-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Salehi, Sajjad and Taghiyareh, Fattaneh}, title = {The Impact of Structural Position on Opinion Leadership in Social Network}, abstract ={Opinion leaders are individuals who have specific personal features that enable them to impact opinions of other agents named followers. In this paper we are going to introduce an agent based opinion formation model to investigate the impact of structural position of agents on their ability to navigate the opinion of social network. For each agent, this ability is defined based on the judgment of his neighbors about his status. The status of each agent is estimated based on status theory. In proposed model, we suppose each agent can modify the opinion of his neighbors with lower status. By applying this model on two complete and scale free graphs, we have investigated the effect of agents’ position on opinion leadership ability. Also the effect of leaders to navigate the opinion of agents is studied. The results of our work can be applicable in competitive environments that different parties try to change the social opinion.}, Keywords = {opinion formation, social network, leader, follower, agent }, volume = {8}, Number = {4}, pages = {45-54}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-55-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-55-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Mansourifar, Leila and Mozayani, Nasser}, title = {Preference Based PSO for Utility Optimization in Broadband Digital Economy}, abstract ={Efficient data transfer in broadband networks is the anchor point of digital economy in modern era. One of the most challenging issues for providing different services in broadband is the bandwidth allocation. That is a realtime multi-dimensional problem solving requiring to satisfy QoS and SLA constraints at the same time. This problem is economically defined as a utility optimization issue aiming to maximize user profits. In this paper, we present an adaptive framework for the problem of optimal utility optimization of bandwidth allocation to broadband services. We used first an online optimization for the allocation based on user preferences and Network Utility Maximization. Our second solution is a particle swarm optimization method in order to consider both parameters at the same time to find an optimal allocation pattern. Simulation results showed satisfactory bandwidth allocation patterns in different scenarios according to the network utility and user preferences in SLA.}, Keywords = {Digital Economy, Utility Optimizatioin, Network Utility Maximization (NUM), Bandwidth Allocation, QoS, Broadband Services, PSO }, volume = {8}, Number = {4}, pages = {55-64}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-56-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-56-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Fakhte, Rasoul and Ghorbaninejad, Habib}, title = {Gain and Bandwidth Enhancement of Slot Antenna Using Two Unprinted Dielectric Superstrate}, abstract ={This paper presents a high-gain and wideband antenna with a compact, simple and low-profile structure. The design strategy of high gain Fabry-Perot resonator antennas (FPRA), which have a superstrate with increasing phase in the operating band, has been applied to design the antenna. A double-layered unprinted dielectric superstrate is used as a partially reflective surface (PRS) to enhance the gain of the antenna and to produce a reflection phase curve versus frequency with a positive slope. The superstrate is composed of two dielectric slabs, and it is truncated so that its dimension to be about 1.5λ×1.5λ. By using such an unprinted double-layered dielectric, as a superstrate, the bandwidth of about 14.3% can be achieved. To further increase the size of the upper unprinted slab, the gain can be enhanced, without compromising the bandwidth. A prototype antenna has been designed and simulated at 9 GHz. The achieved peak gain is 17 dB.}, Keywords = {Cavity antenna, Fabry-Perot antenna, Superstrate, High gain }, volume = {8}, Number = {3}, pages = {1-6}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-57-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-57-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Bekrani, Mehdi and Zayyani, Hadi}, title = {A Weighted Soft-Max PNLMS Algorithm for Sparse System Identification}, abstract ={This paper presents a new Proportionate Normalized Least Mean Square (PNLMS) adaptive algorithm using a soft maximum operator for sparse system identification. To provide a high rate of convergence, soft maximum operator is employed along with a weighting factor, which is proportional to an estimation of output mean square error (MSE). Simulation results show the superiority of the proposed algorithm over its PNLMS-based counterparts.}, Keywords = {Sparse adaptive filter, System identification, Echo cancelation, Soft maximum}, volume = {8}, Number = {3}, pages = {7-14}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-58-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-58-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Tajfar, Amir Houshang and Gheysari, Mohamm}, title = {Analysis the Effects of Internet of Things Technology in Managing Supply Chain}, abstract ={Internet of Things Technology forms an information network of Smart things which are interrelated in the physical world. Using information tools such as smart equipment (Radio Frequency Identification, wireless Sensor Network), Middleware, Web platforms, and reliance on could computing, have led to practical and strategic progress in coordinating business activities and expansion of job opportunities in different fields. One of the advantages of new technology is facilitation of information exchange between things in commercial networks and business processes. In this article attempts were made to analyze the effects of cloud centric Internet of Things technologies on supply chain. For this purpose. Supply chain management and Internet of Things processes are considered as dependent and independent variable respectively. A questioner was designed and completed by selected number experts. The result shows that Cloud Computing with covering the Internet of Things have positive influence on supply change process and will facilitate prediction, planning, procurement and supporting activities. In addition, this technology will reduce the time that businesses spend on procurement and buying of good and service, and in general will change the buying habits of companies.}, Keywords = {Internet of Things, Smart Business, Cloud Computing, Smart Things, Wireless Sensor Networks }, volume = {8}, Number = {3}, pages = {15-25}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-59-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-59-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Behkamal, Behshid and Kahani, Mohsen and Bagheri, Ebrahim and Sazvar, Maji}, title = {A metric Suite for Systematic Quality Assessment of Linked Open Data}, abstract ={The vision of the Linked Open Data (LOD) initiative is to provide a distributed model for publishing and meaningfully interlinking open data. The realization of this goal depends strongly on the quality of the data that is published as a part of the LOD. This paper focuses on the systematic quality assessment of datasets prior to publication on the LOD cloud. To this end, we identify important quality deficiencies that need to be avoided and/or resolved prior to the publication of a dataset. We then propose a set of metrics to measure these quality deficiencies in a dataset. This way, we enable the assessment and identification of undesirable quality characteristics of a dataset through our proposed metrics. This will help publishers to filter out low-quality data based on the quality assessment results, which in turn enables data consumers to make better and more informed decisions when using the open datasets.}, Keywords = { Metrics, RDF Datasets, Systematic Assessment, Quality Deficiencies, Linked Open Data }, volume = {8}, Number = {3}, pages = {27-45}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-60-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-60-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Sepehri, Modammad Mehdi and Hadizadeh, Anita and Baradaran, Vahid and Assadi, Vahi}, title = {A Ranking Framework for Designing a Portal Based on Healthcare Solutions The Case of Cardiovascular Disease}, abstract ={Cyber-health is one of the most important results of IT revolution by enabling the communication between health workers & patients. So far several countries & enterprises have offered different services to their consumers. In Iran, many island activities have been carried out to conducting cyber-health too. But they are not as progressed as Iran ICT capabilities. In this study we are on the way of identifying & ranking essential criteria for cyber-health. Since it is not implementable for all medical specialties, we have chosen cardiovascular disease users, including cardiovascular medicine, patients & also their families. So in this paper after a brief literature review on cyber-health, cardiovascular criteria will be identified & collected. Then using the methods of Multiple Criteria Decision Making, collected criteria, according to Iran local conditions, will be ranked. At last due to ranked criteria, a framework on cyber-health will be presented.}, Keywords = {Cyber-medicine, Web, Portal, health, Service}, volume = {8}, Number = {3}, pages = {47-56}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-61-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-61-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Hatami, Mohammad and Behroozi, Hami}, title = {On Maximizing the Secrecy Rate in a Cooperative Wireless Network using Friendly Jammers}, abstract ={In this paper, the security of two-phase relaying system with multiple intermediate nodes in the presence of a malicious eavesdropper is investigated. To enhance the secrecy, a joint cooperative beamforming and jamming combined with relay and jammer selection is proposed. First, the source broadcasts its signal to the relays that are located close to source in a cluster, i.e., the source node uses a small amount of power to broadcast its message locally to other nodes of the cluster, while destination and the eavesdropper are located outside this cluster. In the second phase, two relays transmit re-encoded signal with optimal beamforming such that the secrecy rate is maximized. Simultaneously, two other intermediate nodes (which act as friendly jammers) transmit random jamming signals to degrade the eavesdropper’s channel. Our goal in this paper is to maximize the secrecy rate by applying different methods such as cooperative beamforming, cooperative jamming and relay and jammer selection. To avoid operational complexity, we consider the minimum number of intermediate nodes needed for relaying and jamming without losing the performance, i.e., achieving a non-zero secrecy rate. Cooperative beamforming with multiple relays demands high amount of information exchange and therefore increases the operational complexity. Thus, we aim to reduce the number of relays which take part in cooperative beamforming. Limiting the number of relays may have a bad effect on the coding gain which we compensate it with a proposed selection gain scheme. Numerical results demonstrate the advantage of our proposed scheme compared to the scheme with no cooperative jamming. The main contribution of this work is combining cooperative beamforming and jamming with relay and jammer selection to enhance the physical layer security.}, Keywords = { physical layer secrecy, secrecy rate, cooperative jamming, beamforming, relay and jammer selection }, volume = {8}, Number = {3}, pages = {63-69}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-62-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-62-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Behbahani, Olya Sadat and Pedram, Mir Mohsen and Badie, Kambiz}, title = {Hiding Fuzzy Sequential Patterns by a Multi-Objective Scheme}, abstract ={Improvements in technology have led to generating and mining huge amounts of data. Sequence mining is a research area of data mining that aims to extract useful knowledge from raw databases. Although transactions with numerical information are usually seen in real-world applications like bank records, customer baskets and network traffic records, and efforts for mining sequential patterns with quantitative values are reported in the technical literature, the issue of privacy of sensitive knowledge in the form of fuzzy sequential patterns has not received much attention. This paper addresses the problem of fuzzy sequential pattern hiding and proposes a multi-objective optimization procedure with few distortions which leads to the preserving of database fidelity. The proposed algorithm can also work with fuzzy databases and more details are handled by fuzzy sets. Distortions, fidelity and time-consumption of the proposed algorithm are three criteria used to compare the performance of it with the existing algorithms.}, Keywords = {Digital Economy, Utility Optimizatioin, Network Utility Maximization (NUM), Bandwidth Allocation, QoS, Broadband Services, PSO}, volume = {8}, Number = {3}, pages = {71-81}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-63-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-63-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Ahmadi, Parvin and Gholampour, Iman and Tabandeh, Mahmou}, title = {Learning Motion Patterns in Traffic Scenes by Improved Group Sparse Topical Coding}, abstract ={Analyzing motion patterns in traffic videos can directly lead to generate some high-level descriptions of the video content. In this paper, an unsupervised method is proposed to automatically discover motion patterns occurring in traffic video scenes. For this purpose, based on optical flow features extracted from video clips, an improved Group Sparse Topical Coding (GSTC) framework is applied for learning semantic motion patterns. Then, each video clip can be sparsely represented by a weighted sum of learned patterns which can further be employed in very large range of applications. Compared to the original GSTC, the proposed improved version of GSTC selects only a small number of relevant words for each topic and hence provides a more compact representation of topic-word relationships. Moreover, in order to deal with large-scale video analysis problems, we present an online algorithm for improved GSTC which can not only deal with large video corpora but also dynamic video streams. Experimental results show that our proposed approach finds the motion patterns accurately and gives a meaningful representation for the video.}, Keywords = {Motion patterns, Group Sparse Topical Coding, traffic scene }, volume = {8}, Number = {2}, pages = {1-7}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-65-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-65-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Zaghian, Ali and Mansouri, Mohse}, title = {A New Electronic Cash Protocol Using a Modified ElGamal and an Untraceable Signature Scheme}, abstract ={In this paper, a new transaction protocol based on electronic cash using a modified ElGamal signature and a secure blind signature scheme is proposed. With the extension of untraceable electronic cash, a fair transaction protocol is designed which can maintain anonymity and double spender detection and attaches expiration date to coins so that the banking system can manage its databases more efficiently. The security of the system is based on discrete logarithm problem and factoring problem.Also our protocol has better performance than similar protocols. So the new protocol is very efficient.}, Keywords = { digital signature, blind signature, ElGamal digital signature, RSA, electronic payment system, electronic voting system }, volume = {8}, Number = {2}, pages = {9-14}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-66-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-66-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Salahi, Ahm}, title = {DDoS Traffic Modeling, Identification and Attack Mitigation to Cloud Hosted servers by Drift plus Penalty methods}, abstract ={During DDoS attack to a cloud hosted server, to counter the attack, more resources should be assigned to it. In this paper we first develop a mathematical formula for input packet rate during DDoS attack, and propose a method to identify the botnet that created the attack. We introduce two algorithms for resource assignments to protect cloud hosted servers. The drift plus penalty algorithm minimizes the average cost of resource assignment, and stabilizes the queue size. The modified version of this algorithm is drift plus extended penalty, which minimizes the average cost and compensate penalty function by considering delay.}, Keywords = {DDoS generated traffic modeling, Cloud computing, Drift plus penalty, Drift plus extended penalty, Dynamic resource allocation }, volume = {8}, Number = {2}, pages = {15-21}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-67-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-67-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Hosseini, Monireh and Mousavi, Seyed Mohammad Reza and Zolrahmi, Forough}, title = {An Architecture for a Mobile Recommender System in Tourism}, abstract ={During the last decade, scholars have paid a lot of attention to the Mobile Recommender Systems in tourism industry. With reducing information overload and narrowing the results according to tourists' characteristics and conditions, these systems lead to the development of tourism industry. These recommendations are in the form of multimedia contents, context-aware services, comments and points of peer users, travel schedule and etc. Recent advances in mobile and computing technologies has created more opportunities for detailed and personal recommendations, through historical and contextual parameters. This paper studies Recommender System's models and techniques in order to propose a new architecture for a Recommender System in tourism. The proposed architecture uses hybrid filtering technique, contextual information of the user, and Model-View-Controller architecture. Also our proposed architecture covers many gaps in previous studies. After that, the design and implementation of a mobile phone application associated with this architecture was examined. Based on The 3-layered Model-View-Controller architecture and Client-Server architecture, its development has taken place. In addition to location and map services using Google Maps API, place suggestion services are offered to users, that here, a private host and domain is used.}, Keywords = {Recommender Systems, Mobile tourism, Hybrid filtering, Model View Controller architecture, Personalization }, volume = {8}, Number = {2}, pages = {23-31}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-68-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-68-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Sheikhan, Mansour}, title = {Hybrid of Evolutionary and Swarm Intelligence Algorithms for Prosody Modeling in Natural Speech Synthesis}, abstract ={To reduce the number of input features to a prosody generator in natural speech synthesis application, a hybrid of an evolutionary algorithm and a swarm intelligence-based algorithm is used for feature selection (FS) in this study. The input features to FS unit are word-level and syllable-level linguistic features. The word-level features include punctuation information, part-of-speech tags, semantic indicators, and length of the words. The syllable-level features include the phonemic structure and position indicator of the current syllable in a word. A modified Elman-type dynamic neural network (DNN) is used for prosody generation in this study. The output layer of this DNN provides prosody information at the syllable-level including pitch contour, log-energy level, duration information, and pause data. Simulation results show that the prosody information is predicted with an acceptable error by this hybrid soft-computing method as compared to Elman-type neural network prosody generator and binary gravitational search algorithm-based FS unit.}, Keywords = { speech synthesis, genetic algorithm, ant colony optimization, neural network, prosody }, volume = {8}, Number = {2}, pages = {33-44}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-69-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-69-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Tadayon, Mohammad Hesam and Mohammadi, Mohamm}, title = {QC-LDPC Codes Construction by Concatenating of Circulant Matrices as Block-Columns}, abstract ={In this paper a new low complexity method for constructing binary quasi-cyclic low-density parity-check (QC-LDPC) codes is introduced. In the proposed method, each block-column of the parity check matrix H is made by a circulant matrix in a way that the associated Tanner graph is free of cycle four. Each circulant matrix in H is made by a generator column. The generator columns should be selected in a way that each associated circulant matrix and every two distinct circulant matrices are free of cycle four. The generator columns are made by row distance sets. An algorithm for generating distance sets and obtaining circulant matrices with columns of weight three is presented separately. Simplicity of construction and having a good flexible family of quasi cyclic LDPC codes both in rate and length are the main properties of the proposed method. The performance of the proposed codes is compared with that of the random-like and Array LDPC codes over an AWGN channel. Simulation results show that from the performance perspective, the constructed codes are competitive with random-like and Array LDPC codes.}, Keywords = {QC-LDPC codes, girth, circulant matrices, AWGN channel, concatenation }, volume = {8}, Number = {2}, pages = {45-50}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-64-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-64-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Gohari, Faezeh Sadat and Tarokh, Mohammad Jafar}, title = {A New Hybrid Collaborative Recommender Using Semantic Web Technology and Demographic data}, abstract ={Recommender systems are gaining a great importance with the emergence of E-commerce and business on the internet. Collaborative Filtering (CF) is one of the most promising techniques in recommender systems. It uses the known preferences of a group of users to make recommendations for other users. Regardless of its success in many application domains, CF has main limitations such as sparsity, scalability and new user/item problems. As new direction, semantic-based recommenders have emerged that deal with the semantic information of items. Such systems can improve the performance of classical CF by allowing the recommender system to make inferences based on an additional source of knowledge. Moreover, the incorporation of demographic data in recommender systems can help to improve the quality of recommendations. In this paper, we present a new hybrid CF approach that exploits Semantic Web Technology as well as demographic data to alleviate all the problems mentioned above. The experimental results on the MovieLens dataset verify the effectiveness and efficiency of our approach over other benchmarks.}, Keywords = { recommender system, collaborative filtering, semantic Web, demographic data, e-commerce }, volume = {8}, Number = {2}, pages = {51-61}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-70-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-70-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {MousaviMadani, Fariborz}, title = {A Novel Adaptive Router Placement Scheme in Hybrid Wireless Optical Access Network}, abstract ={A typical wireless optical network takes advantage of passive optical network (PON) architecture in the back-end for last-mile broad-band connectivity combined with wireless mesh network at the front-end to provide high-quality cost-effective Internet access to end users. Wireless gateway routers collect upstream traffic from enduser devices within their transmission range and route them toward a nearby optical network unit (ONU) station and vice versa in the downstream direction. A major objectives of planning wireless optical networks is to place ONUs and wireless routers (WRs) in such a way to fully cover all end-users with minimum deployment cost while ensuring some quality metrics, such as delay or throughput. Computational complexity of mathematical formulations presented in previous works, restrains from scaling the network size and user population in accordance with the realistic circumstances. In this paper, we address this issue by introducing a novel adaptive segmentation scheme to offload the problem complexity without sacrificing the optimality of solution. Extensive numerical simulations verified the applicability of our approach to large-scale networks.}, Keywords = {FiWi network, WOBAN, Router placement}, volume = {8}, Number = {1}, pages = {1-8}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-71-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-71-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Shakibian, Hadi and MoghadamCharkari, Nasrollah and Jalili, Saee}, title = {Ensemble Link Predictor for Heterogeneous Complex Networks}, abstract ={Link prediction in complex networks aims to explore similarities between node pairs. Recently, link prediction has been considered in the presence of network heterogeneity which makes the majority of the homogeneous link prediction approaches infeasible. A meta-structure, known as meta-path, has been proposed to explore such networks. Generating good meta-paths and selecting the best of them introduce some new challenges to link prediction problem. In this paper, a new ensemble-based link prediction approach is proposed in heterogeneous complex networks. This approach consists of three steps: (i) a set of meta-paths are selected such that each of them represents a different semantic between the target node pairs; (ii) a feature vector is extracted for each node pair using each meta-path; (iii) an ensemble of learners would be established on different feature sets. The final link predictor is obtained after the ensemble aggregation. The results on DBLP network show that the proposed approach has more accurate predictions than a single meta-path based link predictor.}, Keywords = {Heterogeneous Complex Networks, Link Prediction, Meta-path }, volume = {8}, Number = {1}, pages = {9-14}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-72-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-72-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Khoshbakht, Marzieh and Tajiki, Mohammad Mahdi and Akbari, Behz}, title = {SDTE: Software Defined Traffic Engineering for Improving Data Center Network Utilization}, abstract ={In recent years, several topologies with multiple-path between each pairs of end hosts for data center (DC) networks have been proposed. However, the path diversity is shown to be not enough to improve the network performance. Researches on the DC network measurements have shown that congestion occurs even when the average utilization of links is low, which means that some of the links are over-utilized while others are underutilized and have a considerable available bandwidth. Therefore, traffic engineering (TE) is necessary for proper distribution of the network load as well as exploiting the path diversity that is provided by new topologies. Current Equal Cost Multi Path (ECMP) based approaches are not efficient in lots of cases because numerous big flows may collide on the same path. The centralized solutions depend on the ability to predict the traffic pattern, which is not effective for unpredictable traffic patterns of data centers. In this paper, SDTE, an online software defined TE approach is proposed for cloud data centers. The proposed system does not depend on the ability to predict traffic pattern or the size of flows. SDTE exploits the PEFT routing algorithm to assign weights to links. SDTE is implemented within the OpenFlow framework. The evaluation shows that SDTE performs close to the optimal routing (average deviation is about 7%).}, Keywords = { Software Defined Networking, Data Center Routing, Multipath Routing, Traffic Engineering, Cloud Computing, OpenFlow }, volume = {8}, Number = {1}, pages = {15-24}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-73-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-73-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Mahmoodyar, Mohammad Ali and Tarokh, Mohammad Jafar}, title = {A Novel Trust Evaluation Model Using Graph Clustering Approach}, abstract ={This is the time of rapidly development of electronic relationships between the users of a social network. Any entity in e-interactions has to make decision about trust/distrust to others with respect to the data available on the network. Also the lack of significant information about the entities becomes a challenge that any trust evaluation model has to deals with it. In this paper, a model for evaluation trust with respect to the users’ feedbacks is proposed. The model, is based on a unique generated trusted graph which is the result of applying a proposed initial trust value metric. Also, the communities consisting the network is detected using Markov Clustering Algorithm (MCL). This paper also presents a categorical -based approach for trust evaluation. The proposed model has been compared to another trust metric which is proposed by another paper and. The results, which achieved using Normalized Root Mean Squared Error (NRMSE), show the effects of proposed initial trust value and proposed final trust rate on the final trust evaluations . By more affecting the final trust rate, the model goes more closely to the basis trust metric used for comparing results.}, Keywords = { Trusted Graph, User Reputation, Graph Clustering, Markov Clustering Algorithm (MCL) }, volume = {8}, Number = {1}, pages = {25-31}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-74-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-74-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Asgharian, Hassan and Akbari, Ahmad and Raahemi, Bij}, title = {Detecting Flood-based Attacks against SIP Proxy Servers and Clients using Engineered Feature Sets}, abstract ={Session Initiation Protocol (SIP) is the main signaling protocol of the next generation networks. The security issues of SIP-based entities (i.e. proxy servers and clients) have a direct impact on the perceived quality of experience of end users in multimedia sessions. In this paper, our focus is on the S IP flooding attacks including denial of service and distributed denial of service attacks. After classifying various types of SIP attacks based on their sources, we extract four feature sets based on the specification of its attack group, as well as the normal behavior of the SIP state machine specified in RFC 3261. We then minimize the number of derived features in each set to reduce the computational complexity of our proposed approach. This facilitates employing the engineered feature sets in embedded S IP-based devices such as cell phones and smart TVs. We evaluate the performance of the proposed feature sets in detecting SIP attack sequence. For this, we design and implement a real test-bed for SIP-based services to generate normal and attack traffics. The experimental results confirm that the engineered feature sets perform well in terms of detection accuracy and false alarm rates in classifying benign and anomaly traffic in various attack scenarios.}, Keywords = { SIP Security, SIP Feature Set, SIP intrusion detection system, Application Layer DoS Attack (DDoS), SIP state machine, VoIP IDS, NGN and IMS Security }, volume = {8}, Number = {1}, pages = {33-41}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-75-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-75-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Goudarzi, Mohammad and Movahedi, Zeinab and Pujolle, Guy}, title = {A Priority-based Fast Optimal Computation Offloading Planner for Mobile Cloud Computing}, abstract ={Today's advances of mobile technologies in both hardware and software have pushed the vast utilization of mobile devices for diverse purposes. Along with this progress, today’s mobile devices are expected to perform various types of applications. However, the energy challenge of mobile devices along with their limited computation power act as a barrier. To address this deficiency, mobile cloud computing has been proposed in which cloud resources are used to extend mobile devices’ capabilities. However, due to varying conditions of wireless channel in terms of connectivity and bandwidth, an online offloading mechanism is required which may lead to high decision time and energy. To address this challenge, we propose a priority-based fast computation offloading mechanism which finds the optimal offloading solution based on a modified branch-and-bound algorithm. Results of intensive simulation and testbed experiments demonstrated that our proposal can outperform all existing optimal counterparts in terms of energy consumption and execution time.}, Keywords = {Mobile Cloud Computing, Computation Offloading, Optimal Partitioning }, volume = {8}, Number = {1}, pages = {43-49}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-76-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-76-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} } @article{ author = {Khalili, Azade and Babamir, Seyed Mortez}, title = {A Pareto-based Optimizer for Workflow Scheduling in Cloud Computing Environment}, abstract ={A scheduling algorithm in cloud computing environment is in charge of assigning tasks of a workflow to cloud’s virtual machines (VMs) so that the workflow completion time is minimized. Due to the heterogeneity and dynamicity of VMs and diversity of tasks size, workflow scheduling is confronted with a huge permutation space and is known as an NP-complete problem; therefore, heuristic algorithms are used to reach an optimal scheduling. While the single-objective optimization i.e., minimizing completion time, proposes the workflow scheduling as a NP-complete problem, multi-objective optimization for the scheduling problem is confronted with a more permutation space. In our pre vious work, we considered single-objective optimization (minimizing the workflow completion time) using Particle Swarm Optimization (PSO) algorithm. The current study aims to present a multi -objective optimizer for conflicting objectives using Gray Wolves Optimizer (GWO) where dependencies exist between workflow tasks. We applied our method to Epigenomics (balanced) and Montage (imbalanced) workflows and compared our results with those of the SPEA2 algorithm based on parameters of Attention Quotient, Max Extension, and Remoteness Dispersal.}, Keywords = { Cloud computing, Task scheduling, Grey Wolf Optimizer, Multi -objective optimization, Pareto front, Strength Pareto Evolutionary Algorithm2 (SPEA2) }, volume = {8}, Number = {1}, pages = {51-59}, publisher = {ICT Research Institute(ITRC)}, title_fa = {}, abstract_fa ={}, keywords_fa = {}, url = {http://ijict.itrc.ac.ir/article-1-77-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-77-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2016} }