OTHERS_CITABLE
Gain and Bandwidth Enhancement of Slot Antenna Using Two Unprinted Dielectric Superstrate
This paper presents a high-gain and wideband antenna with a compact, simple and low-profile structure. The design strategy of high gain Fabry-Perot resonator antennas (FPRA), which have a superstrate with increasing phase in the operating band, has been applied to design the antenna. A double-layered unprinted dielectric superstrate is used as a partially reflective surface (PRS) to enhance the gain of the antenna and to produce a reflection phase curve versus frequency with a positive slope. The superstrate is composed of two dielectric slabs, and it is truncated so that its dimension to be about 1.5λ×1.5λ. By using such an unprinted double-layered dielectric, as a superstrate, the bandwidth of about 14.3% can be achieved. To further increase the size of the upper unprinted slab, the gain can be enhanced, without compromising the bandwidth. A prototype antenna has been designed and simulated at 9 GHz. The achieved peak gain is 17 dB.
http://ijict.itrc.ac.ir/article-1-57-en.pdf
2018-09-24
1
6
Cavity antenna
Fabry-Perot antenna
Superstrate
High gain
Rasoul
Fakhte
1
AUTHOR
Habib
Ghorbaninejad
2
AUTHOR
OTHERS_CITABLE
A Weighted Soft-Max PNLMS Algorithm for Sparse System Identification
This paper presents a new Proportionate Normalized Least Mean Square (PNLMS) adaptive algorithm using a soft maximum operator for sparse system identification. To provide a high rate of convergence, soft maximum operator is employed along with a weighting factor, which is proportional to an estimation of output mean square error (MSE). Simulation results show the superiority of the proposed algorithm over its PNLMS-based counterparts.
http://ijict.itrc.ac.ir/article-1-58-en.pdf
2018-09-24
7
14
Sparse adaptive filter
System identification
Echo cancelation
Soft maximum
Mehdi
Bekrani
1
AUTHOR
Hadi
Zayyani
2
AUTHOR
OTHERS_CITABLE
Analysis the Effects of Internet of Things Technology in Managing Supply Chain
Internet of Things Technology forms an information network of Smart things which are interrelated in the physical world. Using information tools such as smart equipment (Radio Frequency Identification, wireless Sensor Network), Middleware, Web platforms, and reliance on could computing, have led to practical and strategic progress in coordinating business activities and expansion of job opportunities in different fields. One of the advantages of new technology is facilitation of information exchange between things in commercial networks and business processes. In this article attempts were made to analyze the effects of cloud centric Internet of Things technologies on supply chain. For this purpose. Supply chain management and Internet of Things processes are considered as dependent and independent variable respectively. A questioner was designed and completed by selected number experts. The result shows that Cloud Computing with covering the Internet of Things have positive influence on supply change process and will facilitate prediction, planning, procurement and supporting activities. In addition, this technology will reduce the time that businesses spend on procurement and buying of good and service, and in general will change the buying habits of companies.
http://ijict.itrc.ac.ir/article-1-59-en.pdf
2018-09-24
15
25
Internet of Things
Smart Business
Cloud Computing
Smart Things
Wireless Sensor Networks
Amir Houshang
Tajfar
1
AUTHOR
Mohammad
Gheysari
2
AUTHOR
OTHERS_CITABLE
A metric Suite for Systematic Quality Assessment of Linked Open Data
The vision of the Linked Open Data (LOD) initiative is to provide a distributed model for publishing and meaningfully interlinking open data. The realization of this goal depends strongly on the quality of the data that is published as a part of the LOD. This paper focuses on the systematic quality assessment of datasets prior to publication on the LOD cloud. To this end, we identify important quality deficiencies that need to be avoided and/or resolved prior to the publication of a dataset. We then propose a set of metrics to measure these quality deficiencies in a dataset. This way, we enable the assessment and identification of undesirable quality characteristics of a dataset through our proposed metrics. This will help publishers to filter out low-quality data based on the quality assessment results, which in turn enables data consumers to make better and more informed decisions when using the open datasets.
http://ijict.itrc.ac.ir/article-1-60-en.pdf
2018-09-24
27
45
Metrics
RDF Datasets
Systematic Assessment
Quality Deficiencies
Linked Open Data
Behshid
Behkamal
1
AUTHOR
Mohsen
Kahani
2
AUTHOR
Ebrahim
Bagheri
3
AUTHOR
Majid
Sazvar
4
AUTHOR
OTHERS_CITABLE
A Ranking Framework for Designing a Portal Based on Healthcare Solutions The Case of Cardiovascular Disease
Cyber-health is one of the most important results of IT revolution by enabling the communication between health workers & patients. So far several countries & enterprises have offered different services to their consumers. In Iran, many island activities have been carried out to conducting cyber-health too. But they are not as progressed as Iran ICT capabilities. In this study we are on the way of identifying & ranking essential criteria for cyber-health. Since it is not implementable for all medical specialties, we have chosen cardiovascular disease users, including cardiovascular medicine, patients & also their families. So in this paper after a brief literature review on cyber-health, cardiovascular criteria will be identified & collected. Then using the methods of Multiple Criteria Decision Making, collected criteria, according to Iran local conditions, will be ranked. At last due to ranked criteria, a framework on cyber-health will be presented.
http://ijict.itrc.ac.ir/article-1-61-en.pdf
2018-09-24
47
56
Cyber-medicine
Web
Portal
health
Service
Modammad Mehdi
Sepehri
1
AUTHOR
Anita
Hadizadeh
2
AUTHOR
Vahid
Baradaran
3
AUTHOR
Vahid
Assadi
4
AUTHOR
OTHERS_CITABLE
On Maximizing the Secrecy Rate in a Cooperative Wireless Network using Friendly Jammers
In this paper, the security of two-phase relaying system with multiple intermediate nodes in the presence of a malicious eavesdropper is investigated. To enhance the secrecy, a joint cooperative beamforming and jamming combined with relay and jammer selection is proposed. First, the source broadcasts its signal to the relays that are located close to source in a cluster, i.e., the source node uses a small amount of power to broadcast its message locally to other nodes of the cluster, while destination and the eavesdropper are located outside this cluster. In the second phase, two relays transmit re-encoded signal with optimal beamforming such that the secrecy rate is maximized. Simultaneously, two other intermediate nodes (which act as friendly jammers) transmit random jamming signals to degrade the eavesdropper’s channel. Our goal in this paper is to maximize the secrecy rate by applying different methods such as cooperative beamforming, cooperative jamming and relay and jammer selection. To avoid operational complexity, we consider the minimum number of intermediate nodes needed for relaying and jamming without losing the performance, i.e., achieving a non-zero secrecy rate. Cooperative beamforming with multiple relays demands high amount of information exchange and therefore increases the operational complexity. Thus, we aim to reduce the number of relays which take part in cooperative beamforming. Limiting the number of relays may have a bad effect on the coding gain which we compensate it with a proposed selection gain scheme. Numerical results demonstrate the advantage of our proposed scheme compared to the scheme with no cooperative jamming. The main contribution of this work is combining cooperative beamforming and jamming with relay and jammer selection to enhance the physical layer security.
http://ijict.itrc.ac.ir/article-1-62-en.pdf
2018-09-24
63
69
physical layer secrecy
secrecy rate
cooperative jamming
beamforming
relay and jammer selection
Mohammad
Hatami
1
AUTHOR
Hamid
Behroozi
2
AUTHOR
OTHERS_CITABLE
Hiding Fuzzy Sequential Patterns by a Multi-Objective Scheme
Improvements in technology have led to generating and mining huge amounts of data. Sequence mining is a research area of data mining that aims to extract useful knowledge from raw databases. Although transactions with numerical information are usually seen in real-world applications like bank records, customer baskets and network traffic records, and efforts for mining sequential patterns with quantitative values are reported in the technical literature, the issue of privacy of sensitive knowledge in the form of fuzzy sequential patterns has not received much attention. This paper addresses the problem of fuzzy sequential pattern hiding and proposes a multi-objective optimization procedure with few distortions which leads to the preserving of database fidelity. The proposed algorithm can also work with fuzzy databases and more details are handled by fuzzy sets. Distortions, fidelity and time-consumption of the proposed algorithm are three criteria used to compare the performance of it with the existing algorithms.
http://ijict.itrc.ac.ir/article-1-63-en.pdf
2018-09-24
71
81
Digital Economy
Utility Optimizatioin
Network Utility Maximization (NUM)
Bandwidth Allocation
QoS
Broadband Services
PSO
Olya Sadat
Behbahani
1
AUTHOR
Mir Mohsen
Pedram
2
AUTHOR
Kambiz
Badie
3
AUTHOR