• Journal of Information and Communication Technology ( Scientific )
  • About Journal

    فصلنامه فناوری اطلاعات و ارتباطات ایران


    Latest articles published

    • Open Access Article

      1 - Assessing E-Government Readiness in Iranian Universities, Case Study: Tarbiat Modares University
      Saeed   Haydari gholamali   montazer
      Issue 43 , Volume 12 , SpringSummer 2020
      Due to the recent advances in electronic government (e-government) and given the fact that universities are recognized as the Leading of innovation and progress in society, the expectation of electronic-government maturity levels in universities is higher than other gov Full Text
      Due to the recent advances in electronic government (e-government) and given the fact that universities are recognized as the Leading of innovation and progress in society, the expectation of electronic-government maturity levels in universities is higher than other governmental agencies. Given the high human capital capacity, universities are able to adapt themselves to e-government faster than other governmental organizations. In order to meet these expectations, e-government in universities and higher education institutions must be continuously evaluated. In this paper, we developed a model for assessing e-government readiness at university level, which includes "university-affiliated" indicators and "university-independent" indicators; university affiliates indicators are: " Trust "," Executive Policy and Laws "," Human Resources "," Integrity "," Budget "," Technological Infrastructure "," Digital Culture" and "Supervision, Support and Coordination ", as well as the "National Infrastructure" indicator is an independent indicator of the university. In the field study, the model was used to evaluate e-government readiness at Tarbiat Modares University Manuscript Document

    • Open Access Article

      2 - An Improved Method for Detecting Phishing Websites Using Data Mining on Web Pages
      mahdiye   baharloo Alireza   Yari
      Issue 43 , Volume 12 , SpringSummer 2020
      Phishing plays a negative role in reducing the trust among the users in the business network based on the E-commerce framework. therefore, in this research, we tried to detect phishing websites using data mining. The detection of the outstanding features of phishing is Full Text
      Phishing plays a negative role in reducing the trust among the users in the business network based on the E-commerce framework. therefore, in this research, we tried to detect phishing websites using data mining. The detection of the outstanding features of phishing is regarded as one of the important prerequisites in designing an accurate detection system. Therefore, in order to detect phishing features, a list of 30 features suggested by phishing websites was first prepared. Then, a two-stage feature reduction method based on feature selection and extraction were proposed to enhance the efficiency of phishing detection systems, which was able to reduce the number of features significantly. Finally, the performance of decision tree J48, random forest, naïve Bayes methods were evaluated{cke_protected_1}{cke_protected_2}{cke_protected_3}{cke_protected_4} on the reduced features. The results indicated that accuracy of the model created to determine the phishing websites by using the two-stage feature reduction based Wrapper and Principal Component Analysis (PCA) algorithm in the random forest method of 96.58%, which is a desirable outcome compared to other methods. Manuscript Document

    • Open Access Article

      3 - Increasing the value of collected data and reducing energy consumption by using network coding and mobile sinks in wireless sensor networks
      ehsan   kharati
      Issue 43 , Volume 12 , SpringSummer 2020
      The wireless sensor network includes a number of fixed sensor nodes that move sink nodes to collect data between nodes. To reduce energy consumption and increase the value of collected data, it is necessary to determine the optimum route and residence location of mobile Full Text
      The wireless sensor network includes a number of fixed sensor nodes that move sink nodes to collect data between nodes. To reduce energy consumption and increase the value of collected data, it is necessary to determine the optimum route and residence location of mobile sinks, which increases the life of wireless sensor networks. Using network coding, this paper presents a Mixed Integer Linear Programming Model to determine the optimal multicast routing of source sensor nodes to mobile sinks in wireless sensor networks, which determines the time and location of sinks to collect maximum coded data and reduces the delay in sink movement and energy consumption. Solving this problem in polynomial time is not possible due to the involvement of various parameters and the constrained resources of wireless sensor networks. Therefore, several exploratory and greedy and fully distributed algorithms are proposed to determine the movement of sinks and their residence location based on maximizing the value of coded data and the type of data dead time. By simulating, the optimal method and the use of coding and proposed algorithms, reduce the runtime and energy consumption and increase the value of collected data and network lifetime than non-coding methods. Manuscript Document

    • Open Access Article

      4 - An Improved Method Based on Label Propagation and Greedy Approaches for Community Detection in Dynamic Social Networks
      محمد   ستاری kamran   zamanifar
      Issue 43 , Volume 12 , SpringSummer 2020
      Community detection in temporal social networks is one of the most important topics of research which attract many researchers around the world. There are variety of approaches in detecting communities in dynamic social network among which label propagation approach is Full Text
      Community detection in temporal social networks is one of the most important topics of research which attract many researchers around the world. There are variety of approaches in detecting communities in dynamic social network among which label propagation approach is simple and fast approach. This approach consists of many methods such as LabelRankT is one with high speed and less complexity. Similar to most methods for detecting communities in dynamic social networks, this one is not trouble free. That is, it is not considered the internal connection of communities, when it expands communities of the previous snapshots in the current snapshot. This drawback decreases the accuracy of community detection in dynamic social networks. For solving the drawback, a greedy approach based on local modularity optimization is added to LabelRankT method. Here, the newly proposed GreedyLabelRankT, LabelRankT and non-overlapping version of Dominant Label Propagation Algorithm Evolutionary (DLPAE-Non Overlapping) on real and synthetic datasets are implemented. Experimental results on both real and synthetic network show that the proposed method detect communities more accurately compared to the benchmark methods. Moreover, the finding here show that running time of the proposed method is close to LabelRankT. Therefore, the proposed method increase the accuracy of community detection in dynamic social networks with no noticeable change in the running time of that. Manuscript Document

    • Open Access Article

      5 - Using a multi-objective optimization algorithm for tasks allocate in the cloud-based systems to reduce energy consumption
      sara   tabaghchimilan nima   jafari novimipour
      Issue 43 , Volume 12 , SpringSummer 2020
      Nowadays, new technologies have increased the demand for business in the web environment.Increasing demand will increase the variety and number of services. As a result, the creation of large-scale computing data centers has high operating costs and consumes huge amount Full Text
      Nowadays, new technologies have increased the demand for business in the web environment.Increasing demand will increase the variety and number of services. As a result, the creation of large-scale computing data centers has high operating costs and consumes huge amounts of electrical power. On the other hand, inadequate and inadequate cooling systems not only cause excessive heating of resources and shorten the life of the machines. It also produces carbon that plays an important role in the weather. Therefore, they should reduce the total energy consumption of these systems with proper methods. In this research, an efficient energy management approach is provided in virtual cloud data centers, which reduces energy consumption and operational costs, and brings about an increase in the quality of services. It aims to provide a resource allocation strategy for cloud systems with the goal of reducing energy, cost of implementation and examining its use in cloud computing. The results of the simulation show that the proposed method in comaprision to NPA, DVFS, ST and MM methods can reduce the average energy consumption up to 0.626 kWh, also the need to immigration and SLA violation declined up to 186 and 30.91% respectively. Manuscript Document

    • Open Access Article

      6 - Incentive reward mechanism for Participants to the human computing system of Intrusion Detection Based on Game Theory
      yahya   lormohammad hasani esfandghe majid   ghayori
      Issue 43 , Volume 12 , SpringSummer 2020
      Despite the tremendous advances in the design of human computing systems, most of them suffer from low participation or poor quality participation and a high percentage of them fail. To a large extent, the success of these systems depends on people who really behave in Full Text
      Despite the tremendous advances in the design of human computing systems, most of them suffer from low participation or poor quality participation and a high percentage of them fail. To a large extent, the success of these systems depends on people who really behave in the system. Because human computing systems include small units of work, and each job yields little benefit to the participants, humans display a good behavior in the system if they are well-stimulated for doing so. In this paper, this issue investigated in the Intrusion Detection Human Computation system. Our purpose of creating the stimulus for increasing of employee participation is to do their jobs carefully and effortlessly with the lowest possible cost. After selecting the appropriate stimuli for this system, we designed the mechanism of rewarding incentives. The idea behind this mechanism is to use the skill of the staff in determining their rewards. After designing this mechanism, we used the theory of games to analyze and determine the game's balance. Then, we determine the minimum possible reward for each category of work using the results obtained from the mechanism analysis based on game theory. We validate of this mechanism using game theory and the results of implementation. Designing this mechanism will increase the accuracy of respondents in answering and as a result, increase the accuracy of the human intelligence detection system in identifying new attacks and reducing their erroneous alert rates. Also, by allocating the lowest financial resources required to employees based on the analysis obtained from the game theory and managing human computing system of Intrusion Detection, encourages participants to participate in the system and, as a result, prevent the failure of the human computing system of intrusion detection. Manuscript Document

    • Open Access Article

      7 - Fast and accurate concept drift detection from event logs
      mahdi   yaghoobi ali   sebti Soheila   Karbasi
      Issue 43 , Volume 12 , SpringSummer 2020
      In organizations and large companies that are using business process management systems (BPMSs), process model can change due to upstream laws, market conditions. BPMSs have flexible to these changes. Effect of these change are saved in storage devises and event logs; t Full Text
      In organizations and large companies that are using business process management systems (BPMSs), process model can change due to upstream laws, market conditions. BPMSs have flexible to these changes. Effect of these change are saved in storage devises and event logs; these changes are sometimes applied suddenly or gradually on the event logs. Changing the season or starting a new financial term can be a factor to make these changes. This change is called concept drift in business process model. On time detection and recognition of process concept drift can affect the decision making of managers and administrations of systems. An analysis of the event logs in BPMS allows the automatic detection of the concept drift. This paper presents an innovative method by introducing a modified distance function to identify the concept drift. Experimental results were performed on 72 datasets in the research history, which included 648 concept drifts in 12 different types. It shows that the proposed method detects 98.18% of the drifts, while the proposed method is much faster than other state of the art methods. Manuscript Document

    • Open Access Article

      8 - Textual analysis of central bank news in forecasting long-term trend of Tehran stock exchange index
      meisam   hashemi Mehran   Rezaei marjan   kaedi
      Issue 43 , Volume 12 , SpringSummer 2020
      Financial markets have always been under influence of media news; therefore, text analysis of news is considered as an effective method of stock exchange forecasting. Research in this context has been conducted with the help of information retrieval techniques, in which Full Text
      Financial markets have always been under influence of media news; therefore, text analysis of news is considered as an effective method of stock exchange forecasting. Research in this context has been conducted with the help of information retrieval techniques, in which high frequency words in a document that appeared sporadically in the whole corpus received higher weight than others. In contrast, the words which appeared in many news of a corpus, during a certain time, indicate the importance of an event. In our research, to address this contradiction, a new technique of assigning weight to influential words of news is presented. Financial news of Iran Central Bank (CBI) and actual data of Tehran Stock Exchange Index (TSEI) in the duration of 2005 to 2020 AD were utilized to evaluate the proposed method. The empirical results show 64% and 41% accuracy of trend prediction when TSEI moves upward and downward respectively and about 10% decreasing in Mean Absolute Error (MAE) to compare with prevalent techniques. While, the changes of the ratio between the number of positive and negative words in news does not offer predictive or analytical evidences, our results show that, there still exists a meaningful relationship between CBI news and TSEI fluctuations. Manuscript Document

    • Open Access Article

      9 - Improving performance of probe-based rate control mechanisms using classification: evaluation on an experimental testbed for High Throughput WLANs
      ghalibaf   ali Mohammad   Nassiri mohammadhassan   daei mahdi   sakhaei
      Issue 43 , Volume 12 , SpringSummer 2020
      MIMO technology offers a wide range of transmission rates for modern wireless LANs. In order to improve the performance of the rate control module, statistical information on the history of state and usage of each transmission rate is maintained at the MAC layer to help Full Text
      MIMO technology offers a wide range of transmission rates for modern wireless LANs. In order to improve the performance of the rate control module, statistical information on the history of state and usage of each transmission rate is maintained at the MAC layer to help determine the rate at which future packets are sent. However, the great diversity of transmission rates in the 802.11n and 802.11ac standards imposes an overhead for updating this information. In this article, to reduce the state space of transmission rates while keeping statistics approximately up to date for each rate, a method for clustering rates is presented so that when sending a packet over a transmission rate, statistical information relating to all the rates belonging to the same cluster is updated. As a result, statistics for a greater number of rates can be updated even when sending a fewer number of packets. We implemented our proposed mechanism in the Linux kernel environment and evaluated its performance under different conditions on an experimental testbed deployed in our research laboratory. The results show that the proposed method outperforms the de-facto Minstrel-HT rate control mechanism in terms of throughput and number of successful transmissions. Manuscript Document

    • Open Access Article

      10 - The aware genetic algorithm of the best member, applied to graph coloring and metric-dimension of the graph problems
      mahmood   amintoosi Hashem   Ezzati
      Issue 43 , Volume 12 , SpringSummer 2020
      Genetic algorithm is one of the most famous methods for solving Combinatorial Optimization Problems. It had various applications in different field of studies such as Electronics, Computer Science and Mathematics and still has. In this algorithm, the population members Full Text
      Genetic algorithm is one of the most famous methods for solving Combinatorial Optimization Problems. It had various applications in different field of studies such as Electronics, Computer Science and Mathematics and still has. In this algorithm, the population members which contribute for producing the next generation are selected according to their fitness values. The combination of the members is through Crossover Operator; And in some versions a few of the best members migrate to the next generation directly. Normally, the weak members of population may participate to the next generation. In this study, the combination operators are aware of the best member of generation; Only those child which are as good as the best member, are allowed to form the next generation. The proposed method is applied on graph coloring and finding metric-dimension of graph problems. The results are compared with the common genetic algorithm. Experimental results shows the superior performance of the proposed method in comparison to common genetic algorithm. Manuscript Document

    • Open Access Article

      11 - Converting protein sequence to image for classification with convolutional neural network
      reza   ahsan mansour   ebrahimi dianat   dianat
      Issue 43 , Volume 12 , SpringSummer 2020
      Since methods for sequencing machine learning sequences were not successful in classifying healthy and cancerous proteins, it is imperative to find a way to represent these sequences to classify healthy and ill individuals with deep learning approaches. In this study di Full Text
      Since methods for sequencing machine learning sequences were not successful in classifying healthy and cancerous proteins, it is imperative to find a way to represent these sequences to classify healthy and ill individuals with deep learning approaches. In this study different methods of protein sequence representation for classification of protein sequence of healthy individuals and leukemia have been studied. Results showed that conversion of amino acid letters to one-dimensional feature vectors in classification of 2 classes was not successful and only one disease class was detected. By changing the feature vector to colored numbers, the accuracy of the healthy class recognition was slightly improved. The binary protein sequence representation method was more efficient than the previous methods with the initiative of sequencing the sequences in both one-dimensional and two-dimensional (image by Gabor filtering). Protein sequence representation as binary image was classified by applying Gabor filter with 100% accuracy of the protein sequence of healthy individuals and 98.6% protein sequence of those with leukemia. The findings of this study showed that the representation of protein sequence as binary image by applying Gabor filter can be used as a new effective method for representation of protein sequences for classification Manuscript Document

    • Open Access Article

      12 - Modeling and simulation of the central generator of the pattern to produce curved-linear motions in the snake robot
      morteza   vasegh yaghoub   pourasad
      Issue 43 , Volume 12 , SpringSummer 2020
      With the advancement of science and technology and the importance of using robots, the need to use automated systems seems essential. Since most applications of snake robots move in unfamiliar and sometimes complex environments, there is a need to develop different cont Full Text
      With the advancement of science and technology and the importance of using robots, the need to use automated systems seems essential. Since most applications of snake robots move in unfamiliar and sometimes complex environments, there is a need to develop different control methods for them. The product of the integration of the two sciences of neuroscience and robotics, are motor neuron producers known as model central generators, which is the problem of producing motion in the robot. In this paper, we control the movement of a snake-like robot with a central pattern generator (CPG) that is able to produce coordinated patterns of output signals with different frequencies. For this purpose, it is necessary to model the snake robot first and then apply control Be. In this paper, the control of robot motion control in two modes of open loop and closed loop for CPG network is presented. At the same time, this study with simulations shows that the lower the level of stimulation and the lower its level, the lower the frequency of motion production and vice versa. Then, the effect of CPG models, which are used as neural networks, is simulated in motion control. In this paper, the remarkable point in comparison with other controllers is that in the central generating neural networks, the pattern of simple signals is sufficient to stimulate and induce the movement of robots, which is shown in the simulation Manuscript Document
    Most Viewed Articles

    • Open Access Article

      1 - Improving the directivity of the plasmonic sectoral horn nanoantenna using lens in its aperture
      Masumeh  Sharifi Najmeh  Nozhat Ehsan  Zareian-Jahromi
      Issue 33 , Volume 9 , AutumnWinter 2017
      Horn antennas can result in good impedance matching between the waveguide and free space due to the gradual increase in the aperture size. In this paper, a novel plasmonic sectoral horn nanoantenna based on using lens in the aperture is proposed. It is investigated that Full Text
      Horn antennas can result in good impedance matching between the waveguide and free space due to the gradual increase in the aperture size. In this paper, a novel plasmonic sectoral horn nanoantenna based on using lens in the aperture is proposed. It is investigated that in addition to improvement of the directivity, the reflection coefficient is also reduced using the proper lens structure. The maximum directivity improvement is about 2 dBi compared to the structure without lens. Also, it is shown that the radiation pattern can be controlled by utilizing electro-optical material as the lens Manuscript Document

    • Open Access Article

      2 - Performance Analysis of Device to Device Communications Overlaying/Underlaying Cellular Network
      Hossein  Ghavami Shahriar  Shirvani Moghaddam
      Issue 33 , Volume 9 , AutumnWinter 2017
      Minimizing the outage probability and maximizing throughput are two important aspects in device to device (D2D) communications, which are greatly related to each other. In this paper, first, the exact formulas of the outage probability for D2D communications underlaying Full Text
      Minimizing the outage probability and maximizing throughput are two important aspects in device to device (D2D) communications, which are greatly related to each other. In this paper, first, the exact formulas of the outage probability for D2D communications underlaying or overlaying cellular network are derived which jointly experience Additive White Gaussian Noise (AWGN) and Rayleigh multipath fading. Then, simulation results of the exact formulas and previously respected approximate formulas are compared in MATLAB for both underlay and overlay scenarios. It is shown that the approximate formula in underlay scenario is a good estimate for exact one while approximate formula for overlaying scenario is a good approximation when the average distance between the transmit/receive nodes of D2D pair is less than half of the maximum distance between these nodes or variance of multipath fading is greater than 1.5. In addition, the probability density functions of Signal to Interference plus Noise Ratio (SINR) for underlay and overlay scenarios are found. Moreover, a new scenario is proposed which jointly considers overlay and underlay scenarios. Furthermore, exact and approximate formulas for outage probability and throughput of D2D users in the proposed scenario are derived. Finally, these formulas are compared to underlay and overlay scenarios in three special cases, low, moderate and high traffic loads Manuscript Document

    • Open Access Article

      3 - Parametric analysis of a broadband Archimedean spiral antenna with cavity
      Hamed  noroozy Shahrokh  jam
      Issue 33 , Volume 9 , AutumnWinter 2017
      In this article an Archimedean spiral antenna is designed and analyzed that has good operation in broadband application. By analyzing this design, the effects that different parameters have on antenna operation will be studied and ways of optimization will be found.  In Full Text
      In this article an Archimedean spiral antenna is designed and analyzed that has good operation in broadband application. By analyzing this design, the effects that different parameters have on antenna operation will be studied and ways of optimization will be found.  Influences of cavity height and number of turns to obtain good matching and gain in a frequency interval of 4 to 18 GHz will be discussed. In addition, using cavity wall around the antenna, side lobes are decreased or deleted. By tapering the arms at feeding center, better matching will be attained. For making S11 bandwidth better, increasing the cavity height or reducing the number of turns can be used. Changing number of turns does not have a significant effect on the gain. To improve the antenna gain, the cavity height needs to be adjusted such that the reflected wave from cavity and radiated wave from spiral arms are constructing. Manuscript Document

    • Open Access Article

      4 - Improvement of the bulk sensitivity and FoM of the plasmonic nanodipole antenna array
      Samira  Amiri Najmeh  Nozhat
      Issue 33 , Volume 9 , AutumnWinter 2017
      In this paper, the sensitivity of a plasmonic nanodipole antenna array for different materials of the metal nanodipole and substrate is calculated by changing the refractive index of the surrounding medium. The performance of our proposed array is studied at two wavelen Full Text
      In this paper, the sensitivity of a plasmonic nanodipole antenna array for different materials of the metal nanodipole and substrate is calculated by changing the refractive index of the surrounding medium. The performance of our proposed array is studied at two wavelengths of 1310 and 1550 nm, the wavelengths of the second and third telecommunications windows. It is shown that by using the silver (Ag) nanodipole instead of the gold (Au) one, the bulk sensitivity of the nanostructure is improved. By replacing the substrate material from Si to SiO2, the sensitivity increases up to 1220 and 1150 nm/RIU at the wavelengths of 1310 and 1550 nm, respectively, that is very suitable for sensing applications. Moreover, the figure of merit (FoM) of the plasmonic sensor is calculated for both substrates and nanodipole materials. The maximum value of the FoM is obtained for the nanoantenna array with SiO2 substrate and Ag nanodipole and it is equal to 14.35. Furthermore, it is shown that by increasing the thickness of the nanodipole, the nanostructure sensitivity and FoM are enhanced Manuscript Document

    • Open Access Article

      5 - Cyber Threats Foresight Against Iran Based on Attack Vector
      mahdi omrani masoud shafiee siavash khorsandi
      Issue 33 , Volume 9 , AutumnWinter 2017
      Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Full Text
      Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber threats Foresight. This research can prepare the country for countering cyber threats based on existing and potential attack Vectors. First of all, 18 major cyber threats drivers base on attack Vectors through reviewing resources and interviewing with seven experts were identified. We use cross-impact analysis Future studies method to indicate main drivers of future cyber threats such as social engineering, Denial of service, ransomwares, spoofing and fraud and non-state actors. Mic Mac software will be used for this step. Finally, future scenarios for cyber threats were identified by using scenario-based approach. Scenario Wizard software will be used. The results of the research include two strong scenarios and 18 possible scenarios, based on the strongest scenario, ransomware, spoofing, fraud, social engineering and Denial of service are the most likely cyber threats by non-state actors through in a limited level Manuscript Document

    • Open Access Article

      6 - Investigation on Faculty Members’ Competency Model in Virtual Environment Comment by the Faculty Members and Students (Based on Ormaner’s Model)
      maghsod farasatkhah مریم  فرهنگی
      Issue 21 , Volume 6 , Spring 1394
      Virtual university, offering an appropriate model for its creation and e-Learning realization, is a significant issue that should be considered seriously by managers and higher education administrative. Higher education system, through virtual university development not Full Text
      Virtual university, offering an appropriate model for its creation and e-Learning realization, is a significant issue that should be considered seriously by managers and higher education administrative. Higher education system, through virtual university development not only could enhance the accessibility of people who interested in learning regardless of time and place constraints but also could full fill the issues such as developments of new strategies on leaning, representing the distinguished course materials, employed the outstanding faculty members, teaching and learning based on individuals ability, augmentation on effectiveness, increase the individual responsibility in learning (student base), learners society realizations and research association establishment. An attempt have been made to investigate the faculty members’ competencies in virtual environment. Considering a descriptive correlation type model and presenting a conceptual model four quarries utilized in order to assessing the model which Mehralborz university choose for field study and evaluating the practical results and their implementations. The questionnaire choose for purpose of data gathering which is checked and verified for validity and reliability and the produced results assessed in two stages. Using the check lists the most adapted competencies with model determined and by using three underlying factors they categorized in three groups. On the second stage, considering the competency discriminations the questionnaire handed out among the faculty members (all these people are working in the field of e-learning) and they gathered for analysis after questionnaires complementation. The results show that there is a significant correlation coefficient between the faculty members’ competency factors in virtual environment. Furthermore the dimensions and competency’s factor as well as students and teachers approach were examined and these two approaches were prioritized. Manuscript Document

    • Open Access Article

      7 - A design of Rectangular Waveguide TM11 to TE10 Mode Converter for S-band Applications
      Hamed  noroozy Hossein  Chabok Samane  Pakniyat
      Issue 33 , Volume 9 , AutumnWinter 2017
      A design of a compact, easy to fabricate and applicable structure rectangular waveguide TM11 to TE10 mode converter is presented in this paper. The design procedure of the proposed structure can be divided into two parts in sequence. The beginning one is dedicated to th Full Text
      A design of a compact, easy to fabricate and applicable structure rectangular waveguide TM11 to TE10 mode converter is presented in this paper. The design procedure of the proposed structure can be divided into two parts in sequence. The beginning one is dedicated to the transformation from TM11 to TEM mode using a central conductor, while the second part is the transformation from TEM to TE10 mode using a dielectric loaded waveguide carrying out 180o phase shift. The proposed structure has the advantage of high efficiency of above 90 %, which are demonstrated in simulation results Manuscript Document

    • Open Access Article

      8 - An Investigation on the Effect of Multifactor Model of Improving Critical Thinking in E-learning Environments
      mohammadreza nili jamshid heydari hossein moradi
      Issue 21 , Volume 6 , Spring 1394
      In the third millennium, people deal with multiple, diverse, and complicated problems as they cannot possess full control over the information, which is constantly produced and accumulated. Having a high skill of critical thinking for assessing the results of different Full Text
      In the third millennium, people deal with multiple, diverse, and complicated problems as they cannot possess full control over the information, which is constantly produced and accumulated. Having a high skill of critical thinking for assessing the results of different issues and decision making about them based on evidences is an unavoidable necessity. The researchers of this work proposed a model with seven factors (components) for critical thinking in e-learning environments. The statistical group of this work is the M.Sc. medical education students of  AZAD university e-learning environments, and the students of the same field from Islamic Azad University traditional education system studying during 2011-2012. Among the research community, 47 members were selected based on a simple random method and divided into two trial (with 23 members) and reference (with 42 members) groups. To train the trial group, the seven-factor critical thinking training scale was utilized in e-learning environments in 15 sessions with empirical sciences course. In the reference group, the same seven-factor critical thinking training scale was used in the classroom environment in lecturing in 15 sessions with empirical sciences course. The model factors and components are challenge, representation, creation of opportunity, creation of motivation, logical analysis, encouragement, responsibility, and commitment. Both groups were subject to two pretest and posttest steps within two trial groups, which were considered as reference to each other. Both groups responded to the Watson- Glaser™ Critical Thinking Appraisal within two pretest and posttest steps, while the covariance analysis statistical test was used for analysis of the results. The results indicate significant difference between the scores between trial and reference groups in improving the critical thinking of the students in terms of inferential, assumption detection, deduction, interpretation, and logical reasoning evaluation components (p=0.001). According to the results, in terms of improving critical thinking, the trial group trained in the e-learning environment indicates higher scores as compared to the group trained in the traditional classroom environment. Manuscript Document

    • Open Access Article

      9 - The Participation of Three Brain Tissues in Alzheimer’s disease Diagnosis from Structural MRI
      Shima Tajeddini Habibollah  Danyali Mohammad Sadegh  Helfroush Yaghoub  Fatemi
      Issue 33 , Volume 9 , AutumnWinter 2017
      Alzheimer’s disease (AD) is a progressive and irreversible disease which gradually makes patients unable to do their daily routines. Although the present treatments can not cure the disease completely, its early detection can reduce symptoms and enhance the patients’ li Full Text
      Alzheimer’s disease (AD) is a progressive and irreversible disease which gradually makes patients unable to do their daily routines. Although the present treatments can not cure the disease completely, its early detection can reduce symptoms and enhance the patients’ life quality. In the current literature, using the grey matter (GM) tissue which is known as an appropriate biomarker is highly common in AD diagnosis. However, two other brain tissues known as cerebrospinal fluid (CSF) and white matter (WM) seem to reveal beneficial information about the patients’ brain changes. The aim of the present study is to develop an automatic system for the early diagnosis of Alzheimer’s disease from structural MRI by simultaneously considering suitable features of all GM, CSF and WM tissues. A SVM-RBF classifier is trained and evaluated on the OASIS database to separate AD from healthy control (HC) subjects. The obtained results represent higher accuracy and sensitivity of the proposed algorithm in comparison with similar method. Manuscript Document

    • Open Access Article

      10 - Optimal LO Selection in E-Learning Environment Using PSO Algorithm
      gholamali montazer
      Issue 21 , Volume 6 , Spring 1394
      One of the key issues in e-learning is to identify needs, educational behavior and learning speed of the learners and design a suitable curriculum commensurate to their abilities. This goal is achieved by identifying the learners’ different dimension of personality and Full Text
      One of the key issues in e-learning is to identify needs, educational behavior and learning speed of the learners and design a suitable curriculum commensurate to their abilities. This goal is achieved by identifying the learners’ different dimension of personality and ability and assigning suitable learning material to them according these features. In this paper, an intelligent tutoring system is proposed which optimizes the LO selection in e-learning environment. In order to evaluate the proposed method, the designed system has been used in a web-based instruction system in different conditions and the results of the "Academically success", "Satisfactory learning achievement" and "Time of the learners’ attendance" have been analyzed. The obtained results show a significant efficiency compared to other applied methods. Manuscript Document
    Upcoming Articles

    • Open Access Article

      1 -
      Mohamad Javad Piran  
       

    • Open Access Article

      2 - The role of organizational factors on consumer buying behavior in social networks
      zohreh dehdashti shahrokh Mitra Daneshparvar vahid nasehifar vahid Khashei
      The clothing industry has seen great growth in social media in recent years. Many factors affect the purchase of clothing from social networks, and one of these important and influential factors is organizational factors. Therefore, the purpose of this study is to inves Full Text
      The clothing industry has seen great growth in social media in recent years. Many factors affect the purchase of clothing from social networks, and one of these important and influential factors is organizational factors. Therefore, the purpose of this study is to investigate the organizational factors affecting the consumer in shopping through social networks. In this research, a combined method has been used. In the qualitative section, by reviewing the literature and interviewing vendors active in social networks, texts were prepared and coded. In the quantitative part, based on the initial model, a questionnaire was developed and distributed to 385 clothing buyers in networks. The structural equation method was used to analyze the data and the Sobel test was used to examine the mediating role. This study examines the independent and combined effect of organizational variables affecting people's trust in buying clothes through social networks. The results showed that information quality, transaction security, company reputation and company location have a significant effect on people's trust and consumer willingness to buy clothing through social networks. Manuscript Document

    • Open Access Article

      3 - A Novel Method based on the Cocomo model to increase the accuracy of software projects effort estimates
      mahdieh salari    
      It is regarded as a crucial task in a software project to estimate the criteria, and effort estimation in the primary stages of software development is thus one of the most important challenges involved in management of software projects. Incorrect estimation can lead t Full Text
      It is regarded as a crucial task in a software project to estimate the criteria, and effort estimation in the primary stages of software development is thus one of the most important challenges involved in management of software projects. Incorrect estimation can lead the project to failure. It is therefore a major task in efficient development of software projects to estimate software costs accurately. Therefore, two methods were presented in this research for effort estimation in software projects, where attempts were made to provide a way to increase accuracy through analysis of stimuli and application of metaheuristic algorithms in combination with neural networks. The first method examined the effect of the cuckoo search algorithm in optimization of the estimation coefficients in the COCOMO model, and the second method was presented as a combination of neural networks and the cuckoo search optimization algorithm to increase the accuracy of effort estimation in software development. The results obtained on two real-world datasets demonstrated the proper efficiency of the proposed methods as compared to that of similar methods. Manuscript Document

    • Open Access Article

      4 - Improving Efficiency of Finding Frequent Subgraphs in Graph Stream Using gMatrix Summarization
      مسعود  کاظمی Seyed Hossein Khasteh  
      In many real-world frameworks, dealing with huge domains of nodes and online streaming edges are unavoidable. Transportation systems, IP networks and developed social medias are quintessential examples of such scenarios. One of the most important open problems while dea Full Text
      In many real-world frameworks, dealing with huge domains of nodes and online streaming edges are unavoidable. Transportation systems, IP networks and developed social medias are quintessential examples of such scenarios. One of the most important open problems while dealing with massive graph streams are finding frequent sub-graph. There are some approaches such as count-min for storing the frequent nodes, however performing these methods will result in inaccurate modelling of structures based on the main graph. Having said that, gMatrix is one of the recently developed approaches which can fairly save the important properties of the main graph. In this approach, different hash functions are utilized to store the basis of streams in the main graph. As a result, having the reverse of the hash functions will be extremely useful in calculation of the frequent subgraph. Though gMatrix mainly suffer from two problems. First, they are not really accurate due to high compression rate of the main graph and second, the complexity of returning a query is high. In this thesis, we have presented a new approach based on gMatrix which can reduce the amount of memory usage as well as returning the queries in less amount of time. The main contribution of the introduced approach is to reduce the dependency among the hash functions. This will result in less conflicts while creating the gMatrix later. In this study we have used Cosine Similarity in order to estimate the amount of dependency and similarity among hash functions. Our experimental results prove the higher performance in terms of algorithm and time complexity. Manuscript Document

    • Open Access Article

      5 -
      Sayed Wafa Barkhoda Hemmat Sheikhi sudabeh mohammadi
      One of the basic and important research fields in wireless sensor networks is how to place sensor nodes where by using minimum number of sensor nodes all target points are covered and all sensor nodes are connected to the sink. In this paper, a novel method based on imp Full Text
      One of the basic and important research fields in wireless sensor networks is how to place sensor nodes where by using minimum number of sensor nodes all target points are covered and all sensor nodes are connected to the sink. In this paper, a novel method based on imperialist competitive algorithm is used for solving the mentioned problem. In the proposed method, a colony can immigrate from a weak empire to more powerful empire. The idea of immigration is inspired from human society in which a human can emigrate from a country to another country. The network is supposed to be a three-dimensional grid network and the sensor nodes can be only placed at cross-points of the grids while the target points can be deployed at each point of three-dimensional space. The simulation results show that the proposed method uses fewer number of sensor nodes than other similar algorithms and has the less running time. Manuscript Document

    • Open Access Article

      6 - A Combination Method of DEA, DEMATEL and ANP for Evaluation of ERP Systems
        alireza alinezhad
      In this study Data envelopment analysis is used for the assessment of enterprise resources planning systems of 18 manufacturing companies, to determine whether the defined goals for ERP systems have been able to affect the performance after the implementation of the sys Full Text
      In this study Data envelopment analysis is used for the assessment of enterprise resources planning systems of 18 manufacturing companies, to determine whether the defined goals for ERP systems have been able to affect the performance after the implementation of the system. Considering the identification of effective factors in implementing ERP systems and using the previous researches, the performance evaluation criteria of this system were identified. Then, using experts’ views the most important input indicators were ranked by fuzzy DEMATEL and output indicators by ANP. In this ranking, time spent on implementation, the implementation infrastructure, training and user support were identified as top input indicators, and three indicators of productivity increase, proper resource management and user satisfaction were selected as top output indicators. Using selected indicators, the performance of ERP systems of selected companies was evaluated. The results of this research will be useful in identifying the strengths and weaknesses of companies compared to top ones and making their ERP system even better. Manuscript Document

    • Open Access Article

      7 - Increasing the lifetime of underwater acoustic sensor networks by optimal relay node placement
            Siamak Talebi
      Underwater acoustic sensor networks (UASNs) have gained growing importance due to their desirable features and wide spread practical applications in many communication fields. Due to the high cost of underwater sensor nodes as well as implementation complexity, increasi Full Text
      Underwater acoustic sensor networks (UASNs) have gained growing importance due to their desirable features and wide spread practical applications in many communication fields. Due to the high cost of underwater sensor nodes as well as implementation complexity, increasing the lifetime of UASNs is an important issue. Although relay nodes have an important role in reducing the transmission distance and energy consumption. But the efficient RNP (Relay Node Placement) to avoid the critical sensor nodes' elimination is the main problem, i.e., to preserve the connected network. For this aim this paper presents an innovative solution called an Efficient Relay node Setting (ERS) algorithm, which involves formulating the Relay Node Placement (RNP) as a non-convex optimization problem. Actually, due to the Difference Convex (DC) constraints the proposed RNP problem is a non-convex problem and finding an optimal solution is complicated. However, a novel transformation can be applied to DC constraints which converts the problem into its convex programming equivalent. Application of the convex programming offers the advantage of readily computing a global optimal solution. Simulation results confirm the superiority of the proposed scheme over the competing RA method in terms of network lifetime and efficiency. Manuscript Document

    • Open Access Article

      8 - Joint Power Allocation Optimization of cooperative communication systems with Non-Orthogonal Multiple Access
      Hamid AmiriAra   دانشگاه صنعتی نوشیروانی بابل  
      In this paper, a downlink network with two users as transmitter and relay, respectively, and a central station as a receiver is considered. The aim is to determine the optimal coefficient of non-orthogonal signal symbols and the optimal power allocation in the source-re Full Text
      In this paper, a downlink network with two users as transmitter and relay, respectively, and a central station as a receiver is considered. The aim is to determine the optimal coefficient of non-orthogonal signal symbols and the optimal power allocation in the source-relay in order to maximize the average total rate in a cooperative communication system using the non-orthogonal multiple access technique. To achieve these goals, the average total rate of the cooperative communication system with non-orthogonal multiple access with decode and forward relay in the independent Rayleigh channel was calculated. Then, in the first step, the optimization problem of the non-orthogonal symbols coefficient is mathematically expressed for each power allocation and a closed form solution is proposed. In the second step, the power allocation optimization for the source-relay was introduced and solved. Finally, the joint optimization problem of the non-orthogonal symbols coefficient and power allocation is investigated and an algorithm proposed for the joint optimization problem. The proposed algorithm shows that the joint optimization of the non-orthogonal symbols coefficient and power allocation achieve a higher average rate than the separate optimization of each of these parameters. Also, simulations and numerical results are presented to confirm the theoretical equation, where the simulations show the 3 dB gain for the optimized system using the proposed algorithm compared to the non-optimized system. Manuscript Document
  • Search

    Indexers of this journal

    News( Archive)

    Statistics

    Number Of Issues 11
    Count Of Numbers 21
    Printed Articles 182
    Number Of Authors 2394
    Article Views 109959
    Number Of Article Downloads 40829
    Number Of Articles Submitted 224
    Number Of Rejected Articles 7
    Number Of Accepted Articles 99
    Admission Time(Day) 1084
    Reviewer Count 639