2024-03-29T11:02:32+04:30
http://ijict.itrc.ac.ir/browse.php?mag_id=7&slc_lang=en&sid=1
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
doi
2016
8
3
Gain and Bandwidth Enhancement of Slot Antenna Using Two Unprinted Dielectric Superstrate
Rasoul
Fakhte
Habib
Ghorbaninejad
This paper presents a high-gain and wideband antenna with a compact, simple and low-profile structure. The design strategy of high gain Fabry-Perot resonator antennas (FPRA), which have a superstrate with increasing phase in the operating band, has been applied to design the antenna. A double-layered unprinted dielectric superstrate is used as a partially reflective surface (PRS) to enhance the gain of the antenna and to produce a reflection phase curve versus frequency with a positive slope. The superstrate is composed of two dielectric slabs, and it is truncated so that its dimension to be about 1.5λ×1.5λ. By using such an unprinted double-layered dielectric, as a superstrate, the bandwidth of about 14.3% can be achieved. To further increase the size of the upper unprinted slab, the gain can be enhanced, without compromising the bandwidth. A prototype antenna has been designed and simulated at 9 GHz. The achieved peak gain is 17 dB.
Cavity antenna
Fabry-Perot antenna
Superstrate
High gain
2016
9
01
1
6
http://ijict.itrc.ac.ir/article-1-57-en.pdf
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
doi
2016
8
3
A Weighted Soft-Max PNLMS Algorithm for Sparse System Identification
Mehdi
Bekrani
Hadi
Zayyani
This paper presents a new Proportionate Normalized Least Mean Square (PNLMS) adaptive algorithm using a soft maximum operator for sparse system identification. To provide a high rate of convergence, soft maximum operator is employed along with a weighting factor, which is proportional to an estimation of output mean square error (MSE). Simulation results show the superiority of the proposed algorithm over its PNLMS-based counterparts.
Sparse adaptive filter
System identification
Echo cancelation
Soft maximum
2016
9
01
7
14
http://ijict.itrc.ac.ir/article-1-58-en.pdf
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
doi
2016
8
3
Analysis the Effects of Internet of Things Technology in Managing Supply Chain
Amir Houshang
Tajfar
Mohammad
Gheysari
Internet of Things Technology forms an information network of Smart things which are interrelated in the physical world. Using information tools such as smart equipment (Radio Frequency Identification, wireless Sensor Network), Middleware, Web platforms, and reliance on could computing, have led to practical and strategic progress in coordinating business activities and expansion of job opportunities in different fields. One of the advantages of new technology is facilitation of information exchange between things in commercial networks and business processes. In this article attempts were made to analyze the effects of cloud centric Internet of Things technologies on supply chain. For this purpose. Supply chain management and Internet of Things processes are considered as dependent and independent variable respectively. A questioner was designed and completed by selected number experts. The result shows that Cloud Computing with covering the Internet of Things have positive influence on supply change process and will facilitate prediction, planning, procurement and supporting activities. In addition, this technology will reduce the time that businesses spend on procurement and buying of good and service, and in general will change the buying habits of companies.
Internet of Things
Smart Business
Cloud Computing
Smart Things
Wireless Sensor Networks
2016
9
01
15
25
http://ijict.itrc.ac.ir/article-1-59-en.pdf
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
doi
2016
8
3
A metric Suite for Systematic Quality Assessment of Linked Open Data
Behshid
Behkamal
Mohsen
Kahani
Ebrahim
Bagheri
Majid
Sazvar
The vision of the Linked Open Data (LOD) initiative is to provide a distributed model for publishing and meaningfully interlinking open data. The realization of this goal depends strongly on the quality of the data that is published as a part of the LOD. This paper focuses on the systematic quality assessment of datasets prior to publication on the LOD cloud. To this end, we identify important quality deficiencies that need to be avoided and/or resolved prior to the publication of a dataset. We then propose a set of metrics to measure these quality deficiencies in a dataset. This way, we enable the assessment and identification of undesirable quality characteristics of a dataset through our proposed metrics. This will help publishers to filter out low-quality data based on the quality assessment results, which in turn enables data consumers to make better and more informed decisions when using the open datasets.
Metrics
RDF Datasets
Systematic Assessment
Quality Deficiencies
Linked Open Data
2016
9
01
27
45
http://ijict.itrc.ac.ir/article-1-60-en.pdf
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
doi
2016
8
3
A Ranking Framework for Designing a Portal Based on Healthcare Solutions The Case of Cardiovascular Disease
Modammad Mehdi
Sepehri
Anita
Hadizadeh
Vahid
Baradaran
Vahid
Assadi
Cyber-health is one of the most important results of IT revolution by enabling the communication between health workers & patients. So far several countries & enterprises have offered different services to their consumers. In Iran, many island activities have been carried out to conducting cyber-health too. But they are not as progressed as Iran ICT capabilities. In this study we are on the way of identifying & ranking essential criteria for cyber-health. Since it is not implementable for all medical specialties, we have chosen cardiovascular disease users, including cardiovascular medicine, patients & also their families. So in this paper after a brief literature review on cyber-health, cardiovascular criteria will be identified & collected. Then using the methods of Multiple Criteria Decision Making, collected criteria, according to Iran local conditions, will be ranked. At last due to ranked criteria, a framework on cyber-health will be presented.
Cyber-medicine
Web
Portal
health
Service
2016
9
01
47
56
http://ijict.itrc.ac.ir/article-1-61-en.pdf
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
doi
2016
8
3
On Maximizing the Secrecy Rate in a Cooperative Wireless Network using Friendly Jammers
Mohammad
Hatami
Hamid
Behroozi
In this paper, the security of two-phase relaying system with multiple intermediate nodes in the presence of a malicious eavesdropper is investigated. To enhance the secrecy, a joint cooperative beamforming and jamming combined with relay and jammer selection is proposed. First, the source broadcasts its signal to the relays that are located close to source in a cluster, i.e., the source node uses a small amount of power to broadcast its message locally to other nodes of the cluster, while destination and the eavesdropper are located outside this cluster. In the second phase, two relays transmit re-encoded signal with optimal beamforming such that the secrecy rate is maximized. Simultaneously, two other intermediate nodes (which act as friendly jammers) transmit random jamming signals to degrade the eavesdropper’s channel. Our goal in this paper is to maximize the secrecy rate by applying different methods such as cooperative beamforming, cooperative jamming and relay and jammer selection. To avoid operational complexity, we consider the minimum number of intermediate nodes needed for relaying and jamming without losing the performance, i.e., achieving a non-zero secrecy rate. Cooperative beamforming with multiple relays demands high amount of information exchange and therefore increases the operational complexity. Thus, we aim to reduce the number of relays which take part in cooperative beamforming. Limiting the number of relays may have a bad effect on the coding gain which we compensate it with a proposed selection gain scheme. Numerical results demonstrate the advantage of our proposed scheme compared to the scheme with no cooperative jamming. The main contribution of this work is combining cooperative beamforming and jamming with relay and jammer selection to enhance the physical layer security.
physical layer secrecy
secrecy rate
cooperative jamming
beamforming
relay and jammer selection
2016
9
01
63
69
http://ijict.itrc.ac.ir/article-1-62-en.pdf
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
doi
2016
8
3
Hiding Fuzzy Sequential Patterns by a Multi-Objective Scheme
Olya Sadat
Behbahani
Mir Mohsen
Pedram
Kambiz
Badie
Improvements in technology have led to generating and mining huge amounts of data. Sequence mining is a research area of data mining that aims to extract useful knowledge from raw databases. Although transactions with numerical information are usually seen in real-world applications like bank records, customer baskets and network traffic records, and efforts for mining sequential patterns with quantitative values are reported in the technical literature, the issue of privacy of sensitive knowledge in the form of fuzzy sequential patterns has not received much attention. This paper addresses the problem of fuzzy sequential pattern hiding and proposes a multi-objective optimization procedure with few distortions which leads to the preserving of database fidelity. The proposed algorithm can also work with fuzzy databases and more details are handled by fuzzy sets. Distortions, fidelity and time-consumption of the proposed algorithm are three criteria used to compare the performance of it with the existing algorithms.
Digital Economy
Utility Optimizatioin
Network Utility Maximization (NUM)
Bandwidth Allocation
QoS
Broadband Services
PSO
2016
9
01
71
81
http://ijict.itrc.ac.ir/article-1-63-en.pdf