Iran Telecommunication Research Center

Tehrān, Iran

Iran Telecommunication Research Center

Tehrān, Iran
SEARCH FILTERS
Time filter
Source Type

Jeyd M.E.,Islamic Azad University at Tehran | Yari A.,Iran Telecommunication Research Center
2017 3rd International Conference on Web Research, ICWR 2017 | Year: 2017

Today, Mobile Cloud Computing has been widely used and can send complex computations to the stronger server with more resources and get results from them to overcome the limitations of existing mobile devices, such as battery level, the amount of CPU and memory. Local mobile clouds, which consist of the mobile devices, are used as a suitable solution to support real-time applications, especially. Due to share bandwidth and computing resources across all mobile devices, a task scheduling is required to ensure that multiple mobile devices can effectively assign works to local mobile clouds in such way that the time limitation is considered and the amount of remaining energy is estimated for reducing energy consumption. In this paper, we suggest energy-aware and adaptive task scheduler. The task scheduler discovers resources based on controlling messages periodically. This method, with an estimation of task completion time, calculates energy consumption and the amount of remaining energy in each processing node. Then, it schedules current work with a possible adaptive method at the processing node and sets time limitation in order to improve network efficiency under unpredictable conditions. The results of tests carried out on the proposed method compared to existing methods show that the proposed method has the lowest energy consumption per successful task. Moreover, the proposed method has scalability and high flexibility and can be deployed on any network. © 2017 IEEE.


Saeidi R.,Iran Telecommunication Research Center | Gharaee Garakani H.,Iran Telecommunication Research Center
2016 8th International Symposium on Telecommunications, IST 2016 | Year: 2017

Exploring possible vulnerabilities for making hardware Trojans helps designers to improve the security and trust of integrated circuits (ICs). This paper discusses the hardware Trojan possibility in SRAM to evaluate the security of SRAM and evaluates the effectiveness of existing detection methods. The paper shows that conventional detection methods fails to detect some special Trojan designs that use certain address sequence for their trigger condition. Simulations are performed using 90nm CMOS technology process to illustrate the malicious effect of these hardware Trojans on functionality and performance of SRAM. © 2016 IEEE.


Arianyan E.,Iran Telecommunication Research Center
2016 8th International Symposium on Telecommunications, IST 2016 | Year: 2017

Cloud computing has emerged as a novel service delivery model for information and communication technology domains. Vast amount of Cloud users along with rapid demand increase for acquiring Cloud resources have resulted in emergence of huge energy hungry data centers in different geographical locations. One of the major concerns of Cloud providers is energy saving to reduce electricity bills as well as to respond to legal pressures on reducing CO2 emissions. In this direction, consolidation is proposed as a novel technique for energy saving in Cloud data centers. One of the major drawbacks of current studies on consolidation solution is that they focus only on one criterion and ignore other ones. However, this study proposes a novel multi objective consolidation solution based on a modified analytic hierarchy process (AHP) technique which considers three objectives including energy consumption, SLA violation, and number of migrations in decision process. The results of simulations using Cloudsim simulator shows up to 34.2%, 98.58%, and 71.29% reductions in energy consumption, SLA violation, and number of VM migrations, respectively, in comparison with state of the arts. © 2016 IEEE.


Razavi M.,Islamic Azad University at Tehran | Aliee F.S.,Shahid Beheshti University | Badie K.,Iran Telecommunication Research Center
Knowledge and Information Systems | Year: 2011

Enterprise Architecture (EA) as a discipline that manages large amount of models and information about different aspects of the enterprise, can support decision making on enterprise-wide issues. In order to provide such support, EA information should be amenable to analysis of various utilities and quality attributes. In this regard, we have proposed the idea of characterizing and using enterprise architecture quality attributes. And this paper provides a quantitative AHP-based method toward expert-based EA analysis. Our method proposes a step-by-step process of assessing quality attribute achievement of different scenarios using AHP. By this method, most suitable EA scenarios are selected according to prioritized enterprise utilities and this selection has an important affect on decision making in enterprises. The proposed method also introduces a data structure that contains required information about quality attribute achievement of different EA scenarios in enterprises. The stored asset can be used for further decision making and progress assessment in future. Sensitivity analysis is also part of the process to identify sensitive points in the decision process. The applicability of the proposed method is demonstrated using a practical case study. © 2010 Springer-Verlag London Limited.


Sheibani K.,Iran Telecommunication Research Center
IEEM2010 - IEEE International Conference on Industrial Engineering and Engineering Management | Year: 2010

This paper describes a hybrid meta-heuristic for combinatorial optimization problems with specific reference to the travelling salesman problem (TSP). The method is a combination of genetic algorithms (GA) and greedy randomized adaptive search procedures (GRASP). A new adaptive fuzzy greedy search operator is developed for this hybrid method. Computational experiments using a wide range of standard benchmark problems indicate that the proposed hybrid meta-heuristic is very efficient. ©2010 IEEE.


Khaleie S.,Iran Telecommunication Research Center | Fasanghari M.,Iran Telecommunication Research Center
Soft Computing | Year: 2012

Group decision making is a process in which experts rank and choose the most desirable alternatives based on some accepted criteria. The aim of this paper was to introduce a method to solve group decision making problems with Atanassov's intuitionistic fuzzy sets. First, the weight of each criterion is calculated using intuitionistic fuzzy entropy. Then, the total criteria weight vector is calculated by aggregating the calculated weights. Using the obtained weight vector, the alternatives are ranked based on the association coefficient of the performance of alternatives related to each criterion and the positive ideal intuitionistic fuzzy set value and the negative ideal intuitionistic fuzzy set value. Finally, to show the application of the proposed method, it is implemented in software vendor selection. © 2012 Springer-Verlag.


Khaleie S.,Iran Telecommunication Research Center | Fasanghari M.,Iran Telecommunication Research Center | Tavassoli E.,Payame Noor University
Applied Soft Computing Journal | Year: 2012

Supplier selection is a complicated decision-making problem involving multicriteria, alternative and decision makers (DMs). The main purpose of this paper is to demonstrate the use of a clustering-based method to solve a group decision making (GDM) problem and, also to achieve more realistic and homogeneous results. Intuitionistic fuzzy value (IFV) is used to show the decision makers' preferences and IFN clustering method is utilized to cluster around DM's preferences. Intuitionistic fuzzy weighted geometric (IFWG) is applied to aggregate the obtained clusters. Ranking process is used based on the two indices, score function and accuracy function, to rank the alternatives. Lastly, to demonstrate the efficiency of our proposed method, it is implemented to choose suppliers in a car factory. The strength of the propose approach is considering the group agreement on proposed DMs' preferences for giving different effect on their judgment. Besides, encountering the qualitative judgment of DMs using IFV concept with score function and the accuracy function for modeling the DMs' knowledge is the other contribution of this paper. © 2012 Elsevier B.V. All rights reserved.


Chimeh J.D.,Iran Telecommunication Research Center
Wireless Personal Communications | Year: 2014

Regulatory is a governmental organization that is responsible for evaluating the quality of service (QoS) of the network periodically. To verify the mobile operators' performance, Regulatory should measure network's coverage and QoS parameters like RSSI, CINR, Jitter. Thus, measuring these parameters is a main disturbance for the Regulatory. These disturbances are due to the test accuracies and both their time and cost effectiveness. Totally, drive test includes a vehicle, a laptop, a measuring software and a modem (of indoor/outdoor/USB type). Due to our review, there are many different drive test tools for measurement like Epitiro, Anite that satisfy the enough accuracy but there aren't any systematic scenarios for surveying and accomplishing the drive test. In this paper we want to survey the network quality from the Regulatory point of view. We have gathered new important equations for drive test and introduced three new field test scenarios and compared them with the existing ones. We showed our scenarios are time and cost effective in all cellular mobile networks and are applicable in GSM, UMTS, LTE and mobile WiMax networks. © 2014 Springer Science+Business Media New York.


Daeinabi A.,Sahand University of Technology | Pour Rahbar A.G.,Sahand University of Technology | Khademzadeh A.,Iran Telecommunication Research Center
Journal of Network and Computer Applications | Year: 2011

Vehicular ad hoc networks (VANETs) are appropriate networks that can be used in intelligent transportation systems. Among challenges in VANET, scalability is a critical issue for a network designer. Clustering is one solution for the scalability problem and is vital for efficient resource consumption and load balancing in large scale networks. As our first algorithm, we propose a novel clustering algorithm, vehicular clustering based on the weighted clustering algorithm (VWCA) that takes into consideration the number of neighbors based on dynamic transmission range, the direction of vehicles, the entropy, and the distrust value parameters. These parameters can increase stability and connectivity and can reduce overhead in network. On the other hand, transmission range of a vehicle is important for forwarding and receiving messages. When a fixed transmission range mechanism is used in VANET, it is likely that vehicles are not located in the range of their neighbors. This is because of the high-rate topology changes and high variability in vehicles density. Thus, we propose an adaptive allocation of transmission range (AATR) technique as our second algorithm, where hello messages and density of traffic around vehicles are used to adaptively adjust the transmission range among them. Finally, we propose a monitoring of malicious vehicle (MMV) algorithm as our third algorithm to determine a distrust value for each vehicle used in the VWCA. The effectiveness of the proposed algorithms is illustrated in a highway scenario. © 2010 Elsevier Ltd. All rights reserved.


Maleki M.,Iran Telecommunication Research Center
2nd International Conference on Software Engineering and Data Mining, SEDM 2010 | Year: 2010

One of the main preprocessing steps for having a high performance text classifier is feature weighting. Commonly used feature weighting methods such as TF and IDF-based methods only consider the distribution of a feature in the document(s) and do not consider class information for feature weighting. In this paper, we present TFCRF (Term Frequency and Category Relevancy Factor) method in which the weight of features depends on their power to discriminate the classes from each other by using class information. The results show significant improvement in the performance of SVM algorithm by using TFCRF feature weighting method in comparison to the other implemented standard feature weighting methods.

Loading Iran Telecommunication Research Center collaborators
Loading Iran Telecommunication Research Center collaborators