1 2251-6107 ICT Research Institute(ITRC) 325 Information Technology A Conceptual Framework and Architectural Considerations for Capability Enhancement in Software Defined Networks Yeganeh Hassan b Vaezpour Elaheh c b Communication Technology Department Iran Telecommunication Research Center Tehran, Iran c Communication Technology Department Iran Telecommunication Research Center Tehran, Iran 1 6 2018 10 2 1 18 03 03 2019 03 03 2019   Software defined networking (SDN) is an emerging networking paradigm which gained a lot of interests from both academia and industry. SDN decomposes the control plane from the data plane and allows for the network logic to run on a software-based controller. This decomposition of network operations offers the simplification of network management and greater ease of configuration through network programmability. In this paper, we first comprehensively discuss the state-of-the-art experiences in this field and their existing challenges.  We also categorize the challenges facing SDN and its integration with other technologies such as network function virtualization (NFV), internet of thing (IoT), 5G networks, big data, and optical networks. Then, considering the key issues, we revisit the SDN architecture and propose a comprehensive conceptual framework and some detailed architectural considerations for enhancing the capabilities of SDN networks. The proposed conceptual framework also applies IoT controllers and hypervisors to support IoT applications and virtualized networks respectively. Moreover, we present future research works according to the proposed framework. 
326 Information Technology A Framework for Optimal Fault Tolerance Protocol Selection Using Fuzzy Logic on IoT Sensor Layer Nazari Cheraghlou Mehdi d Khadem-Zadeh Ahmad e Haghparast Majid f d Department of Computer Engineering South Tehran Branch, Islamic Azad University, Tehran, Iran e Iran Telecommunication Research Center (ITRC) Tehran, Iran f Department of Computer Engineering Yadegar-e-Imam Khomeini(RAH) Shahre Rey Branch, Islamic Azad University, Tehran, Iran 1 6 2018 10 2 19 32 03 03 2019 03 03 2019 Internet of things (IoT) is the intersection of many different technologies and networks. The management of these is very complex and important. One of the dimensions that must be considered in IoT management is the fault tolerance level of the systems. Of particular importance is the fact that lack of, or a weakness of this feature would threaten the survival and existence of the system. In this paper, a framework called FISWSN is proposed to evaluate the fault tolerance feature of protocols and frameworks in the first layer of the IoT architecture (Sensing layer). Given that the Fault Tolerance is a qualitative parameter, the linguistic variables and fuzzy logic are used to implement the proposed framework. FISWSN is used to elect optimal protocols and architectures with the aim of increasing fault tolerance and higher efficiency in the final output but at a lower cost. 327 Information Technology EDBPM: An Event-Driven Business Process Monitoring Mechanism Fardbastani Mohammad Ali g Allahdadi Farshad h Sharifi Mohsen i g School of Computer Engineering Iran University of Science and Technology (IUST) Tehran, Iran h School of Computer Engineering Iran University of Science and Technology (IUST) Tehran, Iran i School of Computer Engineering, Iran University of Science and Technology (IUST), Tehran, Iran 1 6 2018 10 2 33 44 03 03 2019 03 03 2019 Many process-aware organizations need to monitor the execution of their Business Processes (BP). Changes in BP execution can be reported as events while real-time detection of event patterns from such events can help the monitoring of model-execution conformance or business activities. Complex Event Processing (CEP) techniques can detect event patterns that are specified as CEP rules. Given the high rate of events and numerous number of complex rules, existing CEP-based solutions are not scalable. We present a novel scalable Event Driven Process Monitoring Mechanism (EDBPM) using distributed CEP. Events are partitioned by process instance identifier and the events of each partition is dispatched to a compute node. As such, the processing load of BP monitoring is distributed adaptively to compute nodes in a load balanced manner. Using a prototyped implementation of EDBPM we show that EDBPM scales well horizontally, i.e. increases in throughput are nearly linear when the number of compute nodes increases. Compared to CPU and memory balancing in a general purpose distributed CEP-based solution, EDBPM keeps the CPU load doubly balanced and does balance the memory too, which is lacking in similar solutions. 328 Information Technology Impact of Empowering Communication Technology Practices on Service Performance in Information Technology Sector Nasiri Rouhollah j Mollahosseini Ali k Salajegheh Sanjar l Sheikhy Ayyub m j Department of Management, Faculty of Literature and Humanities, Kerman Branch, Islamic Azad University, Kerman, Iran k Department of Management, Faculty of Management and Economics, University of Shahid Bahonar, Kerman, Iran l Department of Management, Faculty of Literature and Humanities, Kerman Branch, Islamic Azad University, Kerman, Iran m Department of Statistics, Faculty of Mathematics and Computing of Shahid Bahonar, Kerman, Iran 1 6 2018 10 2 45 55 03 03 2019 03 03 2019 The technological advancement has tremendously evolved over the last two decades with continuing changes throughout their system and communication practices. The association between the elements of communication technology and service performance, however, has yet to be explored with special focus on employee empowerment from an organizational behavior point of view. This research’s main aim is examine the impact of communication technology practices on service performance in the Information Technology (IT) sector. Therefore the mixed method research approach has been selected for the purposes of this study. 20 interviews have been conducted with experts in the field from the Iran Telecommunication Research Centre. 254 data samples were collected from IT sector employees in Iran. Data was used to test the conceptually developed model via the structural equation modeling-partial least square (SEM-PLS) approach. Based on the qualitative data, communication technology practices can be grouped into six areas including technology application, technology of equal opportunity, individual ability in technology, individual knowledge and attitudes towards technology, technological infrastructure, and security. The results show that among other factors, those variables related to technology application, individual knowledge and attitudes towards technology, organizational infrastructure for technology, and technology security have a positive impact on employees’ empowerment; whereas technology application has a reverse effect. Moreover, the present study’s results show that employee empowerment has a significant relationship to service performance in the ITsector. 329 Information Technology Skin Classification for Adult Image Recognition Based on Combination of Gaussian and Weight-KNN Karamizadeh Sasan n Arabsorkhi Abouzar o n Iran Telecommunication Research Center (ITRC) Information and Communications Technology Research Institute, Tehran, Iran o Faculty member of Iran Telecommunication Research Center (ITRC) Information and Communications Technology Research Institute, Tehran, Iran 1 6 2018 10 2 56 62 03 03 2019 03 03 2019 Nowadays, literature has been explored adult image detection automatic which is a replacement for human action in the boring task of moderating online content. One of the mistake scenes with high skin exposure, such as people swimming and get a tan, can be have many wrong alarms. Some condition factors like illumination, occlusion, and poses are more important to image-recognize which any system has to able to recognize. Reasonable amounts of illumination variation between the gallery and probe images need to be taken into account in image recognition algorithms. In the context of image verification, two items are important; illumination variation and skin classification, and these two factors will most likely result in misclassification. There is a lack of research in combining two factors of imaging condition for illuminating and determining skin in image recognition system. The purpose of this paper is to determine and design the proposed scheme to solve illumination variation and integrate with skin classification in image recognition. The proposed method will be analyzed and evaluated based on its performance in terms of accuracy and effectiveness. In this paper, image processing is divided into two phases; preprocessing and image processing. We have used 8,650 images, which are imported from Compaq and Poesia datasets. 330 Information Technology Practical Detection of Click Spams Using Efficient Classification-Based Algorithms Fallah Mahdieh p Zarifzadeh Sajjad p Department. of Computer Engineering Yazd University Yazd, Iran Department of Computer Engineering Yazd University Yazd, Iran 1 6 2018 10 2 63 71 03 03 2019 03 03 2019 Most of today’s Internet services utilize user feedback (e.g. clicks) to improve the quality of their services. For example, search engines use click information as a key factor in document ranking. As a result, some websites cheat to get a higher rank by fraudulently absorbing clicks to their pages. This phenomenon, known as “Click Spam”, is initiated by programs called “Click Bot”. The problem of distinguishing bot-generated traffic from the user traffic is critical for the viability of Internet services, like search engines. In this paper, we propose a novel classification-based system to effectively identify fraudulent clicks in a practical manner. We first model user sessions with three different levels of features, i.e. session-based, user-based and IP-based features. Then, we classify sessions with two different methods: a one-class and a two-class classification that both work based on the well-known K-Nearest Neighbor algorithm. Finally, we analyze our methods with the real log of a Persian search engine. Experimental results show that the proposed algorithms can detect fraudulent clicks with a precision of up to 96% which outperform the previous works by more than 5%. 332 Information Technology The Effect of Information Sharing on the Assessment of Supply Chain Performance in Uncertain Conditions Mohamadi Janaki Daryosh Izadbakhsh Hamidreza Hatefi Seyed Morteza Department of Industrial Engineering Kharazmi University Tehran, Iran Department of Industrial Engineering Kharazmi University Tehran, Iran Faculty of Engineering Shahrekord University Shahrekord, Iran 1 6 2018 10 2 72 82 03 03 2019 03 03 2019 The role of information sharing in achieving competitiveness has been recently a topic of considerable interest among researchers at various levels, including company, business, and supply chain management. Information technology has a significant effect on improving supply chain performance either directly or indirectly. In this paper, the impact of information sharing on competitive strategies and supply chain proceedes of the petroleum products distribution company is investigated in some provinces (Chaharmahal and Bakhtiari, Kohgiluyeh and BoyerAhmad, Tehran, Isfahan) in the conditions of uncertainty using z-number, Dubois and Prade methods. Here, the amount of confidence in human knowledge such as logistic, business, strategic, tactical etc., is included in the calculations. Fuzzy Theory in use to consider the existing epistindc uncertainty in the expert opinion the about the information sharing and supply chain performance indicators. According to the results of this research it can be concluded that the information unity has a direct and significant communication with competitive supply chain strategies, and supply chain competitive strategies in turn, have a direct and significant relationship with supply chain performance.