en
jalali
1397
6
1
gregorian
2018
9
1
10
3
online
1
fulltext
en
Power-Efficient Resource Allocation in Massive MIMO Aided Cloud RANs
This paper considers the power-efficient resource allocation problem in a cloud radio access network (C-RAN). The C-RAN architecture consists of a set of base-band units (BBUs) which are connected to a set of radio remote heads (RRHs) equipped with massive multiple input multiple output (MIMO), via fronthaul links with limited capacity. We formulate the power-efficient optimization problem in C-RANs as a joint resource allocation problem in order to jointly allocate the RRH and transmit power to each user, and fronthaul link and BBU assign to active RRHs while satisfying the minimum required rate of each user. To solve this non-convex optimization problem we suggest iterative algorithm with two-step based on the complementary geometric programming (CGP) and the successive convex approximation (SCA). The simulation results indicate that our proposed scheme can significantly reduce the total transmission power by switching off the under-utilized RRHs.
Complementary geometric programming, C-RAN, successive convex approximation, switch off RRHs, 5G.
1
11
http://ijict.itrc.ac.ir/browse.php?a_code=A-10-4265-3&slc_lang=en&sid=1
2019/09/7
1398/6/16
2019/09/7
1398/6/16
Nahid
Amani
Department of Communication Technologies ICT Research Center Institute, Tehran, Iran
n_amani@itrc.ac.ir
0031947532846001248
0031947532846001248
Yes
Saeedeh
Parsaeefard
Department of Communication Technologies ICT Research Center Institute, Tehran, Iran
s.parsaeifard@itrc.ac.ir
0031947532846001249
0031947532846001249
No
Hassan
Taheri
Department of Electrical Engineering AmirKabir University of Technology Tehran, Iran
htaheri@aut.ac.ir
0031947532846001250
0031947532846001250
No
Hossein
Pedram
Department of Computer Engineering AmirKabir University of Technology Tehran, Iran
pedram@aut.ac.ir
0031947532846001251
0031947532846001251
No
en
PSO-Based Scheduling Algorithm for Time and Cost Optimization in Mobile Grid
Resource owners in mobile grids, with financial motivations in mind, provide their clients with the resources they possess. The clients can, on the other hand, obtain what they seek through the payments they make. Mobile grid users may also demand cost- and time-optimizing strategies as part of their service quality. As a result, the scheduling system, through making use of a proper algorithm, should allocate resources to users’ independent tasks in such a way that would minimize time and cost parameters. Hence, in this paper, two scheduling algorithms are introduced with regard to user needs based upon Particle Swarm Optimization (PSO), which, through mutation and population expanding, are able to find the best scheduling scheme for user tasks, while preventing quick algorithm convergence.
Mobile Grid, Resource Scheduling, Time Optimization, Cost Optimization, Particle Swarm Optimization, local Minimum, Mutation, Expanding Population
12
18
http://ijict.itrc.ac.ir/browse.php?a_code=A-10-280-2&slc_lang=en&sid=1
2019/09/72019/09/11
1398/6/20
2019/09/72019/09/11
1398/6/20
Mehdi
Golsorkhtabaramiri
Department of Computer Engineering, Babol Branch, Islamic Azad University, Babol, Iran.
golesorkh@baboliau.ac.ir, golesorkh@gmail.com
0031947532846001246
0031947532846001246
Yes
Fahimeh
Zakeri
Department of Computer Engineering, Babol Branch, Islamic Azad University, Babol, Iran.
fahimeh.zakeri@gmail.com
0031947532846001247
0031947532846001247
No
en
ISOT: Distributed Selfish Node Detection in Internet of Things
Internet of Things (IOT) has prepared for a range of small sensors to popular laptops. Wireless communication in IOT systems assumes the nodes as a terminal as well as a router which can transmit the data packets. However, individual nodes may refuse to cooperate with others sometimes, leading to a selfish node behavior. The existence of selfish nodes degrades the network performance. This paper proposes to detect selfish nodes in IOT (DISOT) in three phases: Setup and Clustering phase which identifies and then clusters all the nodes in the network. The global phase which indicates whether a selfish node(s) exists in the clusters or not using the main cluster head and the cluster heads in each cluster must identify the selfish node(s) within the local phase. The proposed scheme is simulated by 2500 IOT nodes in the network and the results show that DISOT reduces end-to-end delay up to 41% and when the percentage of selfish nodes in the network does not exceed 35%, DISOT increases detection accuracy up to 10% and false positive rate decreases down to 5%.
Internet of things, selfish node, False Positive Rate (FPR), Detection Accurate (DA).
19
30
http://ijict.itrc.ac.ir/browse.php?a_code=A-10-259-2&slc_lang=en&sid=1
2019/09/72019/09/112019/09/11
1398/6/20
2019/09/72019/09/112019/09/11
1398/6/20
Solmaz
Nobahary
Department Computer Engineering Science and Research Branch, Islamic Azad University Tehran, Iran
solmaz.nobahary@srbiau.ac.ir
0031947532846001282
0031947532846001282
No
Hossein
Gharaee Garakani
ICT Research Institute ITRC Tehran, Iran
gharaee@itrc.ac.ir
0031947532846001283
0031947532846001283
Yes
Ahmad
Khademzadeh
ICT Research Institute ITRC Tehran, Iran
a.khademzadeh@itrc.ac.ir
0031947532846001284
0031947532846001284
No
Amir Masoud
Rahmani
Department of Computer Engineering Science and Research Branch, Islamic Azad University Tehran, Iran
rahmani@srbiau.ac.ir
0031947532846001285
0031947532846001285
No
en
A Hybrid DOS-Tolerant PKC-Based Key Management System for WSNs
Security is a critical and vital task in wireless sensor networks (WSNs), therefore different key management systems have been proposed, many of which are based on symmetric primitives. Such systems are very energy efficient, but they lack some other desirable characteristics. On the other hand, systems based on public key cryptography (PKC) have those desirable characteristics, but they consume more energy. Recently based on authenticated messages from base station (BS) a new PKC–based key agreement protocol was proposed. We show this method is susceptible to a form of denial of service (DOS) attack where resources of network can be exhausted with bogus messages. Then, we propose two different improvements to solve this vulnerability. Simulation results show that these new protocols retain desirable characteristics of the basic method but solve its deficiencies.
wireless sensor network, Key Management, Broadcast Authentication, Public Key Cryptography
31
41
http://ijict.itrc.ac.ir/browse.php?a_code=A-10-577-1&slc_lang=en&sid=1
2019/09/72019/09/112019/09/112019/09/11
1398/6/20
2019/09/72019/09/112019/09/112019/09/11
1398/6/20
Hamzeh
Ghasemzadeh
Department of Communicative Sciences and Disorders, MSU Department of Computational mathematics science and engineering, MSU East Lansing, MI, USA
ghasemza@msu.edu
0031947532846001256
0031947532846001256
No
Ali
Payandeh
ICT Department, Malek-e-Ashtar University of Technology Tehran, Iran
payandeh@mut.ac.ir
0031947532846001257
0031947532846001257
Yes
Mohammad Reza
Aref
Information Systems and Security Lab, Department of Electrical Engineering, Sharif University of Technology Tehran, Iran
aref@sharif.edu
0031947532846001258
0031947532846001258
No
en
Energy-Efficient Human Activity Recognition on Smartphones: A Test-Cost Sensitive Approach
Human activity recognition is essential for providing services in the Internet of Things. Thanks to their ubiquity, sensing capability, and processing power, modern smartphones have become attractive devices for activity recognition. However, their limited battery capacity places a hurdle to exploit such sensing and processing power. While power is consumed in both the sensing and computation layers of the recognition process, power optimization in the latter layer has not been studied extensively enough. This paper strives towards energy-efficient activity recognition by focusing on the cost of feature extraction. To this end, the energy cost of extracting various features is examined and test-cost sensitive prediction models are employed to recognize activities from features. Experimental results reveal a considerable opportunity to conserve energy by awareness of the cost of feature extraction. With only a small sacrifice in prediction accuracy, the energy cost of computations can be reduced by a factor of three.
Internet of Things (IoT), Human Activity Recognition (HAR), Power-Aware Computing, Pervasive Computing, Test-Cost Sensitive Learning, Ambient Intelligence (AmI)
42
49
http://ijict.itrc.ac.ir/browse.php?a_code=A-10-215-1&slc_lang=en&sid=1
2019/09/72019/09/112019/09/112019/09/112019/09/11
1398/6/20
2019/09/72019/09/112019/09/112019/09/112019/09/11
1398/6/20
Hamid
Fadishei
Computer Engineering Department University of Bojnord Bojnord, Iran
fadishei@ub.ac.ir
0031947532846001259
0031947532846001259
Yes
en
Efficient Policy-Aware Deployment of Business Process in Cloud Federation
The use of cloud computing to implement business processes is becoming increasingly important because users can benefit from the economic and technical advantages of this technology. The concept of the Business Process as a Service (BPaaS) is a new solution in the use of specific business processes as a medium for aligning information technology and business. However, managing and deploying business processes on heterogeneous Cloud providers is still a challenge for organizations due to interoperability concerns. This paper suggests an algorithm for optimizing the resource allocation of the business process in Extended Federated BPaaS model in accordance with the requirements of the user’s policy. The developed model has been compared with other popular models supporting the service/business process policy and shows that the proposed model can effectively execute business processes with regards to infrastructure and data transfer costs. To evaluate the model, we implemented this algorithm on WorkflowSim tool, taking into account the challenges of data transfer in the cloud federation environment. The results of the experiments highlight the algorithm’s efficiency compared with initial deployment in a way that the proposed optimization mechanism reduces the cost of transferring data between clouds and can improve performance of workflow execution in cloud federation in terms of makespan time and cost
BPaaS, Cloud Federation, Policy, Business Process, Resource Allocation, Optimization
50
59
http://ijict.itrc.ac.ir/browse.php?a_code=A-10-4240-1&slc_lang=en&sid=1
2019/09/72019/09/112019/09/112019/09/112019/09/112019/09/11
1398/6/20
2019/09/72019/09/112019/09/112019/09/112019/09/112019/09/11
1398/6/20
Hamidreza
Nasiriasayesh
Information Technology (IT) Department ICT Research Institute (Iran Telecom Research Center (ITRC)) Tehran, Iran
hr-nasiri@itrc.ac.ir
0031947532846001343
0031947532846001343
No
Alireza
Yari
Information Technology (IT) Department ICT Research Institute (Iran Telecom Research Center (ITRC)) Tehran, Iran
a_yari@itrc.ac.ir
0031947532846001344
0031947532846001344
Yes
en
An ERP Framework Based on Service Oriented Architecture and Cloud Computing Environment
Case: IRISL Container Department
Nowadays in the business world, all levels of all organizations need a concise planning. Regarding high-speed growth in globalization and competition trend, moving the organizations to the creation of integrated software systems with using latest technologies is a necessity. One of the most significant among the above-mentioned software systems is ERP. Both SOA and cloud deals with delivering services to business with improved agility increased speed and reduced cost that can lead to greater innovation and effective returns on investment. In this paper, after study about functional and nonfunctional requirements of ERP systems, by a framework, It will be study and research about achievement in ERP systems after engaging SOA and cloud computing and their impacts on ERP. Such that these impacts will resolve so many of shortages and needs of conventional ERP as well as reduction of risks and costs of implementation of ERP in organizations. Finally, we used ATAM for evaluating the framework. The idea of the experts in both business and ICT gathered by questionnaire and the data analyzed via TOPSIS method. Similar research for using strength of SOA and cloud computing in traditional ERP in shipping industry is a novelty.
ERP, SOA, Cloud Computing, IRISL
60
68
http://ijict.itrc.ac.ir/browse.php?a_code=A-10-3744-1&slc_lang=en&sid=1
2019/09/72019/09/112019/09/112019/09/112019/09/112019/09/112019/09/11
1398/6/20
2019/09/72019/09/112019/09/112019/09/112019/09/112019/09/112019/09/11
1398/6/20
Abbas
Asosheh
ICT Department Tarbiat Modares University Tehran,Iran
a.asosheh@modares.ac.ir
0031947532846001262
0031947532846001262
No
Yaghoub
Farjami
ICT Department University of Qom Qom,Iran
farjami@gmail.com
0031947532846001263
0031947532846001263
Yes
Arash
Afshinfar
ICT Department University of Qom Qom,Iran
afshinfar@stu.qom.ac.ir
0031947532846001264
0031947532846001264
No