en
jalali
1393
9
1
gregorian
2014
12
1
6
4
online
1
fulltext
fa
Compact Band-Pass and Band-Reject Microwave Filters Using Partial H-Plane Waveguide and Dielectric Layers
In this paper, microwave filters were designed using dielectric layers, which were transversely located inside a partial H-plane waveguide. The proposed structure can be used to design microwave filters with arbitrary frequency response including band-pass or band-reject filters. Its longitude was reduced by about 31% compared with conventional partial H-plane band-pass filters. Since the cross-section of partial H-plane waveguide, in a determined frequency range, is one quarter of the conventional waveguide, then the proposed filter has the cross-section of one quarter compared with the counterpart E-plane waveguide filter. Besides compactness, it is easy to fabricate, cheap, mass producible, mechanically stable, and capable of sustaining high microwave power and has very good adjustment to any arbitrary ideal filter. The proposed partial H-plane band-pass filter and its performance in terms of compactness and adjustment to any arbitrary ideal filter were verified by designing and simulating three filters.
Partial H-plane waveguide, Partial H-plane filter, Band-pass E-plane filter, Compact microwave filter, Band-pass microwave filter
1
6
http://ijict.itrc.ac.ir/browse.php?a_code=A-10-27-85&slc_lang=en&sid=1
2018/10/2
1397/7/10
2018/10/2
1397/7/10
Ali
Ghajar
003194753284600268
003194753284600268
Yes
Habib
Ghorbaninejad Foumani
003194753284600269
003194753284600269
No
fa
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards
In the past few years, the design of RFID authentication protocols in accordance with the EPC Class-1 Generation-2 (EPC C1 G2) standards, has been one of the most important challenges in the information security domain. Although RFID systems provide user-friendly services for end-users, they can make security and privacy concerns for them. In this paper we analyze the security of an RFID mutual authentication protocol which is based on EPC Class-1 Generation-2 standard and proposed in 2013. The designers of protocol claimed that their protocol is secure against different security attacks and provides user privacy. In this paper, we show that unlike their claims, their protocol is not secure against most of the security attacks such as replay attack, the tag’s ID exposure, and the spoofing attacks. As a result, their protocol cannot provide security of RFID users in different authentication applications. Finally, in order to prevent the aforementioned attacks and overcome all the existing weaknesses, we apply a modification in the updating procedure of the protocol and propose a strengthened version of it.
Security and Privacy, RFID Authentication protocols, EPC Class-1 Generation-2 standards
7
12
http://ijict.itrc.ac.ir/browse.php?a_code=A-10-27-86&slc_lang=en&sid=1
2018/10/22018/10/2
1397/7/10
2018/10/22018/10/2
1397/7/10
Behzad
Abdolmaleki
003194753284600270
003194753284600270
Yes
Hamidreza
Bakhshi
003194753284600271
003194753284600271
No
Karim
Baghery
003194753284600272
003194753284600272
No
Mohammad Reza
Aref
003194753284600273
003194753284600273
No
fa
An Overload Window Control Method Based on Fuzzy Logic to Improve SIP Performance
Having facilities such as being in text form, having end-to-end connection establishment and being independent from type of transmitted data, SIP protocol is a good choice for signaling protocol in order to set up a connection between two users of an IP network. However, utilization of SIP protocol in a wide range of applications has made various vulnerabilities in this protocol, amongst which overload could make serious problems in SIP servers. An SIP is overloaded when it does not have sufficient resources (majorly CPU processing power and memory) to process all messages. In this paper, attempts were made to improve window-based overload control in RFC 6537. In window-based overload control method, a window is used to limit the number of messages that are sent to an overloaded SIP proxy simultaneously. In this paper, first, fuzzy logic was used to regulate accurate size of window and then it was developed, implemented and evaluated on an Asterisk open-source proxy. Implementation results showed that this method could practically maintain throughput under overload conditions, dynamically change the maximum window size, and also fairly treat among various upstream servers.
SIP, Overload control, Window based, Asterisk proxy, Fuzzy logic
13
25
http://ijict.itrc.ac.ir/browse.php?a_code=A-10-27-87&slc_lang=en&sid=1
2018/10/22018/10/22018/10/2
1397/7/10
2018/10/22018/10/22018/10/2
1397/7/10
Ahmad Reza
Montazerolghaem
003194753284600274
003194753284600274
Yes
Mohammad Hossein
Yaghmaee Moghaddam
003194753284600275
003194753284600275
No
fa
A P-Robust Stochastic DEA Model for Enterprise Architecture Scenario Selection
Enterprise Architecture (EA) is the most suitable approaches intended to assist companies in achieving their long-term objective. Meanwhile, establishing EA in an organization is a costly and time-consuming task. We can analyze the EA scenarios using famous IT governance frameworks to achieve IT and business alignment. In this paper, we propose a new analytical approach for selecting and ranking EA scenarios according to the criteria of a well-established IT governance framework, namely COBIT. We propose a new group-based analytical approach based on a novel DEA model combined with p-robust technique.
Enterprise Architecture, COBIT, Data Envelopment Analysis, Group Decision Making, P-robustness
27
39
http://ijict.itrc.ac.ir/browse.php?a_code=A-10-27-88&slc_lang=en&sid=1
2018/10/22018/10/22018/10/22018/10/2
1397/7/10
2018/10/22018/10/22018/10/22018/10/2
1397/7/10
Mehdi
Fasanghari
003194753284600276
003194753284600276
Yes
Mohsen Sadegh
Amalnick
003194753284600277
003194753284600277
No
Jafar
Razmi
003194753284600278
003194753284600278
No
Reza
Taghipour Anvari
003194753284600279
003194753284600279
No
fa
Swarm intelligence grouping of e-learners using fuzzy inspired PSO method
Recent advances in technology and the integration of these advances in instructional design have led to a mass individualization where personalized instruction is offered simultaneously to large groups of learners. The first step to adapt instruction is forming different groups of learners based on their attributes. Many methods have used to form learners’ groups in e-learning environment specially data mining techniques such as clustering methods. This paper aims to propose a clustering method to group learners based on their cognitive style and using some specific learners’ observable behaviors while working by system. The objective function of proposed method is defined by considering two criteria in measuring the clustering goodness, compactness and separation, and Particle Swarm Optimization (PSO) method is used to optimize the objective function. This method used to group learners based on cognitive style. Results of the proposed method are compared with K-means, fuzzy C-means, and EFC methods using Davies-Bouldin clustering validity index and comparing the achieved groups based on the cognitive style of learners who are in the same group, shows that the grouping accuracy is in a higher level using fuzzy-inspired PSO method and this method has the better clustering performance than the others and groups similar learners in one cluster.
e-Learning System, cognitive Style, Grouping, Fuzzy clustering, Particle Swarm Optimization (PSO)
41
47
http://ijict.itrc.ac.ir/browse.php?a_code=A-10-27-89&slc_lang=en&sid=1
2018/10/22018/10/22018/10/22018/10/22018/10/2
1397/7/10
2018/10/22018/10/22018/10/22018/10/22018/10/2
1397/7/10
Fatemeh
Ghorbani
003194753284600280
003194753284600280
Yes
Gholam Ali
Montazer
003194753284600281
003194753284600281
No
fa
Quality Improvement of Interactive Tutorial-Like Systems by Use of Cellular Learning Automata
Determining the best way of learning and acquiring knowledge, especially in intelligent tutoring systems have drawn researchers' attention during past years. With regard to studies conducted on E-learning systems and strategies proposed to improve the quality of these systems, it can be said that the interactions play a vital role in the educational systems. Therefore, the learners are not only affected by the teacher in a learning environment but also significantly learn important materials through the interaction with other learners. In this article, a new modeling approach is presented for improving learning/teaching models as well as interaction among learners, from which the most benefit can be derived by learners. The proposed model uses cellular learning automata in order to model behavior of the learners as well as interactions between the learners for knowledge acquisition. This algorithm also deals with the process of teaching as well as education of the learners. The results indicate that relationship between the learners can improve their knowledge and also increase their learning speed compared to previous methods.
learning automata, cellular learning automata, interactive learning, tutorial-like system
49
56
http://ijict.itrc.ac.ir/browse.php?a_code=A-10-27-90&slc_lang=en&sid=1
2018/10/22018/10/22018/10/22018/10/22018/10/22018/10/2
1397/7/10
2018/10/22018/10/22018/10/22018/10/22018/10/22018/10/2
1397/7/10
Hajar
Hajary
003194753284600282
003194753284600282
Yes
Ali
Ahmadi
003194753284600283
003194753284600283
No
fa
Using Dependency Tree Grammar to Enhance the Reordering Model of Statistical Machine Translation Systems
We propose three novel reordering models for statistical machine translation. These reordering models use dependency tree to improve the translation quality. All reordering models are utilized as features in a log linear framework and therefore guide the decoder to make better decisions about reordering. These reordering models are tested on two English-Persian parallel corpora with different statistics and domains. The BLEU score is improved by 2.5 on the first corpus and by 1.2 on the other.
statistical machine translation, reordering model, dependency tree, discriminative reordering model, discriminative decoder, long range reordering, maximum entropy, distortion model
57
67
http://ijict.itrc.ac.ir/browse.php?a_code=A-10-27-91&slc_lang=en&sid=1
2018/10/22018/10/22018/10/22018/10/22018/10/22018/10/22018/10/2
1397/7/10
2018/10/22018/10/22018/10/22018/10/22018/10/22018/10/22018/10/2
1397/7/10
Zahra
Rahimi
003194753284600284
003194753284600284
Yes
Shahram
Khadivi
003194753284600285
003194753284600285
No
Heshaam
Faili
003194753284600286
003194753284600286
No