ICT Research Institute(ITRC)
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
10
1
2018
3
1
Spectral-Spatial Feature Transformations With Controlling Contextual Information Through Smoothing Filtering and Morphological Analysis
1
12
FA
Maryam
imani
maryam.imani@modares.ac.ir
Y
Hassan
Ghassemian
ghassemi@modares.ac.ir
N
A fusion method for spectral-spatial classification of hyperspectral images is proposed in this paper. In the proposed framework, at first, the dimension of hyperspectral image is reduced by several state-of-the-art spectral feature extraction methods, i.e., Binary Coding Based Feature Extraction (BCFE), Clustering Based Feature Extraction (CBFE), Feature Extraction Based on Ridge Regression (FERR), Feature Extraction Using Attraction Points (FEUAP), Feature Extraction using Weighted Training samples (FEWT), and Feature Space Discriminant Analysis (FSDA). Then, the spatial features are calculated from the spectral features extracted from each spectral feature extraction method individually using the proposed smoothing filters and morphological operators. Finally, majority voting decision rule is used to obtain the final classification map. The proposed framework, in addition to removing the useless spatial information such as noise and distortions, adds useful spatial information such as shape and size of objects presented in scene image. The use of complement information obtained from six spectral feature extraction methods with different ideas for class discrimination, significantly improves the classification results. The proposed framework provides in average 6.64%, 7.07%, 8.23%, 7.52% and 20.52% improvement in classification results of three real hyperspectral images compared to generalized composite kernel (GCK), multiple feature learning (MFL), weighted joint collaborative representation (WJCR), original hyperspectral bands stacked on extended morphological profile (HS+EMP) and original hyperspectral bands (HS), respectively in terms of overall accuracy.
spectral-spatial features, feature transformation, classification, majority voting, hyperspectral data
http://ijict.itrc.ac.ir/article-1-227-en.html
http://ijict.itrc.ac.ir/article-1-227-en.pdf
ICT Research Institute(ITRC)
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
10
1
2018
3
1
An Incentive Mechanism to Mitigate the Free-riding in VoD Streaming over Hybrid CDN-P2P Networks
13
25
FA
Abdollah
Ghaffari Sheshjavani
abdollah.ghaffari@modares.ac.ir
N
Behzad
Akbari
b.akbari@modares.ac.ir
Y
Hamid Reza
Ghaeini
Ghaeini@acm.org
N
Peer organization is one of the most challenging issues in peer-to-peer (P2P) video streaming systems. Free-riding reduces the overall performance of these systems. The peers placed closer to the video source will have a higher quality of service. Therefore, we can mitigate the free-riding effect and encourage peers to increase uploading participation by putting peers with more upload bandwidth closer to the video sources and setting free riders far from these video sources. In this paper, we propose a distributed incentive mechanism, which extensively enhances mesh-based P2P video-on-demand streaming systems. In our proposed mechanism, peers will organize an overlay based on their playback point and contributed upload bandwidth. This mechanism applies to both P2P, and hybrid CDN-P2P approaches. The obtained results demonstrate the efficiency of our proposal in term of the quality of service, robustness in dynamic environments and resiliency against free riding.
video-on-demand, peer-to-peer, improvement Mechanism, incentive mechanism, Video streaming
http://ijict.itrc.ac.ir/article-1-228-en.html
http://ijict.itrc.ac.ir/article-1-228-en.pdf
ICT Research Institute(ITRC)
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
10
1
2018
3
1
Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors
26
35
FA
Hossein
Gharaee
gharaee@itrc.ac.ir
Y
Maryam
Fekri
maryamfekri@cmail.carleton.ca
N
Hamid
Hosseinvand
hosseinvand@shahed.ac.ir
N
Nowadays, IDS is an essential technology for defense in depth. Researchers have interested on IDS using data mining and artificial intelligence (AI) techniques as an artful. IDSs can monitor system behavior and network traffic until detect intrusive action. One of the IDS models is anomaly based IDS which trained to distinguish between normal and abnormal traffic. This paper has proposed an anomaly based IDS using GA for optimizing feature vectors and SVM as a classifier. SVM has used as a supervised learning machine that analyses data and recognize patterns, used for classification and regression analysis. After optimization best features for SVM, IDS can detect abnormal traffic more accurate. There is an innovation in fitness function which is formed from TPR, FPR and the number of selected features. The new fitness function reduced the dimension of the data, increased true positive detection and simultaneously decreased false positive detection. In addition, the computation time for training will also have a remarkable reduction. This study proposes a method which can achieve more stable features in comparison with other techniques. The proposed model has been evaluated test with KDD CUP 99 and UNSW-NB15 datasets. Numeric Results and comparison to other models have been presented.
Intrusion Detection System, Genetic, SVM, Feature Selection
http://ijict.itrc.ac.ir/article-1-229-en.html
http://ijict.itrc.ac.ir/article-1-229-en.pdf
ICT Research Institute(ITRC)
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
10
1
2018
3
1
Decreasing the Average Delay, Connectivity, and Routing Load in Clustered Mobile Ad- Hoc Networks
36
47
FA
Reza
Assareh
N
Masoud
Sabaei
Y
Midia
Reshadi
N
Ahmad
Khademzadeh
N
Clustering is an efficient method for increasing scalability in mobile ad hoc networks. In this method, several nodes called clusterheads are responsible for serving the nodes in their cluster. Choosing the optimal number of clusterheads can improve the quality-of-service metrics such as delay in clustered networks. There have been several studies to model the delay in mobile ad hoc networks with flat structure, but assessing the delay in clustered networks is still open research topic. In this paper, first we model the average hop count in clustered mobile ad hoc networks, and then, analytically, we show that an increased number of clusterheads increases the probability of new routes with lower hop counts and consequently, reduces delay in each connection. The effect of the number of clusterheads on average delay and two other metrics; connectivity and routing load is analyzed for two types of clustering methods: with and without gateways.
Average Delay, Connectivity, Clusterheads, Routing Load, Hop Count
http://ijict.itrc.ac.ir/article-1-230-en.html
http://ijict.itrc.ac.ir/article-1-230-en.pdf
ICT Research Institute(ITRC)
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
10
1
2018
3
1
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack
48
55
FA
Vahid
Yousefipoor
yousefipoor_vahid@ee.sharif.edu
N
Mohammad Hassan
Ameri
ameri_mohammadhasan@ee.sharif.edu
N
Javad
Mohajeri
mohajer@sharif.ir
N
Taraneh
Eghlidos
teghlidos@sharif.ir
Y
http://ijict.itrc.ac.ir/article-1-231-en.html
http://ijict.itrc.ac.ir/article-1-231-en.pdf
ICT Research Institute(ITRC)
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
10
1
2018
3
1
Recommending Friends in Social Networks By Users\' Profiles And Using Classification Algorithms
56
61
FA
Paria
Dashtizadeh
P_dz65@yahoo.com
N
Ali
Harounabadi
a.harounabadi@gmail.com
Y
Nowadays, social networks are becoming more popular, so the number of their users and their information is growing accordingly. Therefore, we need a recommender system that uses all kinds of available information to create highly accurate recommendations. Regarding the general structure of these recommender systems, one criterion is first chosen to calculate the similarity between users and then people who are assumed to have great similarity are proposed to each other as friend. These similar criteria can calculate users’ similarity with regard to topological structure and some properties of graph vertices. In this paper, the properties that are required for clustering are extracted from users’ profile. Finally, by combining the similarity criteria of mean measure of divergence (MMD), cosine, and Katz, different aspects of the problem including graph topology, frequency of user interaction with each other, and normalization of the same scoring method are considered.
social network, friend recommendation, graph clustering, users’ profiles, link prediction
http://ijict.itrc.ac.ir/article-1-232-en.html
http://ijict.itrc.ac.ir/article-1-232-en.pdf
ICT Research Institute(ITRC)
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
10
1
2018
3
1
Enhanced Iterative Detection of Hierarchically Modulated Signals using VB-EM Algorithm
62
69
FA
Mahsa
Azad
ma.azad@mail.sbu.ac.ir
Y
Seyed Mohammad Sajad
Sadough
s_sadough@sbu.ac.ir
N
In Hierarchical Modulation (HM), the binary data is partitioned into a “high-priority” (HP) and a “low-priority” (LP) bit stream that are separately and independently encoded before being mapped on non-uniformly spaced constellation points. Indeed, HM is a multi-level modulation scheme, proposed for enabling unequal error protection. The HP and LP streams vary in their susceptibility to noise. The basic HP signal is more robust, in other words, heavily protected against noise and interference, whereas the LP stream has much less robustness. In this paper, we propose an improved iterative receiver based on variational Bayesian expectation-maximization (VB-EM) scheme for semi-blind joint channel estimation and data detection based on bit-interleaved coded modulation (BICM), with the aim of improving the bit error rate (BER) of the noisy LP stream. Moreover, the proposed receiver allows us to reduce the pilot symbol overhead compared to the classical HM receivers based on pilot-assisted channel estimation.
Hierarchical modulation, BICM, Iterative Receiver, Variational Bayesian Expectation-Maximization (VB-EM) algorithm.
http://ijict.itrc.ac.ir/article-1-233-en.html
http://ijict.itrc.ac.ir/article-1-233-en.pdf