• List of Articles Traffic

      • Open Access Article

        1 - Vehicle Navigation in Urban Environments based on Vehicular Communications
        Saleh Yousefi
          This paper deals with the problem of obtaining the optimum path for a vehicle to its destination. We propose architecture based on which vehicles are able to find the best path toward their destination using real-time traffic information thus, travel time is reduced More
          This paper deals with the problem of obtaining the optimum path for a vehicle to its destination. We propose architecture based on which vehicles are able to find the best path toward their destination using real-time traffic information thus, travel time is reduced and roads traffic capacity is increased. Pervious system, aiming at the same goal, use traffic flow prediction thus their information is not real-time and even precise. Moreover, some systems use GPS data but due to coverage limitations (in dense city environments, tunnels) permanent accessibility may not be provided. In this paper, thus, we propose architecture for such a system based on communication between vehicles and road side infrastructure. We first propose a scheme for Road Side Unit (RSU) placement so that the maximum coverage with minimum numbers of RSUs is achieved. Then an algorithm is proposed for information gathering though which real-time traffic information is circulated between all RSUs. Finally this information is used for navigation of vehicles toward their destination during city trips. Results of simulation study conducted by NTCUns shows the good performance of the proposed idea.    Manuscript profile
      • Open Access Article

        2 - Evaluation of SIP signaling implementation using QoS parameters
        mojtaba jahanbakhsh azharivs azharivs maryam homayooni Ahmad akbari
        Normal 0 false false false EN-US X-NONE AR-SA MicrosoftInternetExplorer4 More
        Normal 0 false false false EN-US X-NONE AR-SA MicrosoftInternetExplorer4 !mso]> st1:*{behavior:url(#ieooui) } /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal" mso-tstyle-rowband-size:0 mso-tstyle-colband-size:0 mso-style-noshow:yes mso-style-priority:99 mso-style-qformat:yes mso-style-parent:"" mso-padding-alt:0cm 5.4pt 0cm 5.4pt mso-para-margin:0cm mso-para-margin-bottom:.0001pt mso-pagination:widow-orphan font-size:11.0pt font-family:"Calibri","sans-serif" mso-ascii-font-family:Calibri mso-ascii-theme-font:minor-latin mso-fareast-font-family:"Times New Roman" mso-fareast-theme-font:minor-fareast mso-hansi-font-family:Calibri mso-hansi-theme-font:minor-latin mso-bidi-font-family:Arial mso-bidi-theme-font:minor-bidi} Abstract The variety of services on IP networks and the need for network technology convergence have resulted in many access networks to adopt the IP technology. The Session Initiation Protocol (SIP) is an end to end application level protocol for establishing, terminating and modifying sessions and has experienced widespread use in IP networks due to its distinguished features such as being text based, independence from the underlying network, and more importantly supporting various types of mobility. In fact these features have lead SIP to be used as the core signaling protocol in the IP Multimedia Subsystem, which is the control plane proposed for next generation networks by the 3GPP community. Nevertheless, the performance of SIP servers when used by the millions of users of the next generation networks is not well established. In this paper we evaluate the performance of SIP servers using a test bed developed at the Iran University of Science & Technology. We consider eight different configurations for SIP server and also study the effect of using TCP and UDP as the transport protocol for SIP packets. We measure several parameters including call setup delay, call failure rate and SIP server throughput. Our results suggest that using SIP in large networks require using special techniques for balancing the load of SIP servers as well as mitigating temporary overloads.  Manuscript profile
      • Open Access Article

        3 - Adaptive rotation models and traffic patterns to reduce light loss in networks on optical chip
        bahareh asadi midia reshadi Ahmad khademzade mostafa karbasi
        Large number of processing cores integrated into a single chip have high growth rates. Networks on an optical chip are one of the simplest ways to solve the addressing problem between bulk interconnected networks. That's why high-performance, high-bandwidth multi-proces More
        Large number of processing cores integrated into a single chip have high growth rates. Networks on an optical chip are one of the simplest ways to solve the addressing problem between bulk interconnected networks. That's why high-performance, high-bandwidth multi-processor chips will be needed in the future. Optical chip networks were introduced as a new generation of on-chip networks that overcome all the limitations of this type of network and have many advantages such as high communication bandwidth, low transmission delay. And power consumption is low. On the other hand, networks on optical chips have challenges, one of the most important of which is the routing of optical data in the optical layer, because how the path is selected affects the optical loss factor. In this paper, routing algorithms free from the impasse of adaptive rotational models, circuit switching and various traffic patterns to reduce light loss in the optical layer by considering a 5-port unobstructed router and two-dimensional grid or Mesh will be provided. Finally, we compare the simulation results with similar methods such as the XY-based algorithm and examine the improvements obtained. Manuscript profile
      • Open Access Article

        4 - Evaluation Level of Development Provinces of the Country in the Field of Safety and Road traffic (Period 2011-2013)
          Alireza Estelaji
        Extending the life and increasing car traffic in cities and roads in the last half century, In front of the rate of road accidents and incidents have led to today's safety issue in the field of traffic become one of the most basic topics and challenges of road transport More
        Extending the life and increasing car traffic in cities and roads in the last half century, In front of the rate of road accidents and incidents have led to today's safety issue in the field of traffic become one of the most basic topics and challenges of road transport sector. The importance of traffic safety in road transport planning issues and Iran's position among the countries with the highest mortality from accidents, was led to study a plan to achieve consistent, accurate and compiled with an emphasis on documentary sources and statistical auto route and road transport organizations during 2011, 2012 and 2013, to Measure provinces of the country's development in the field of road traffic safety. The study was designed to determine the position of each of the provinces of the country in road safety and traffic, applied research is a descriptive-analytic method and utilizing the software’s SPSS, Excel and Fuzzy TOPSIS technique and hierarchical cluster analysis, trying to make the data available for evaluation and analysis. The findings indicate that in terms of development in the field of road safety and traffic, there is a huge gap between provinces of the country,The way that suggests of the provinces country, that only of Tehran, has been found to be satisfactory in terms of highly developed and16 provinc in row deprived areas and 4 provinc Khuzestan, Kohgiluyeh and BoyerAhmad, Khorasan jonobi and Kerman have been placed in rows deprived areas. The analysis also shows that the provinces of Qom, Alborz, Mazandaran, Lorestan and Zanjan the row developed provinces and provinces of Golestan, Markazi, Semnan, Hamedan, and Qazvin Have taken place in the category of medium developed areas. It believes that the expenses spent for road safety is not only a cost but an investment in sustainable And so to achieve the desired development and elimination of enormous deprivation in the field of road safety and traffic, Should consider the specific circumstances of natural areas, the situation with regard to the revision and along the way covered by each province, Spatial planning should be to increase the quality and quantity of resources and standardization of indicators. Manuscript profile
      • Open Access Article

        5 - Referral Traffic Analysis: A Case Study of the Iranian Students' News Agency (ISNA)
        Roya Hassanian Esfahani Mohammad Javad Kargar
        Web traffic analysis is a well-known e-marketing activity. Today most of the news agencies have entered the web providing a variety of online services to their customers. The number of online news consumers is also increasing dramatically all over the world. A news webs More
        Web traffic analysis is a well-known e-marketing activity. Today most of the news agencies have entered the web providing a variety of online services to their customers. The number of online news consumers is also increasing dramatically all over the world. A news website usually benefits from different acquisition channels including organic search services, paid search services, referral links, direct hits, links from online social media, and e-mails. This article presents the results of an empirical study of analyzing referral traffic of a news website through data mining techniques. Main methods include correlation analysis, outlier detection, clustering, and model performance evaluation. The results decline any significant relationship between the amount of referral traffic coming from a referrer website and the website's popularity state. Furthermore, the referrer websites of the study fit into three clusters applying K-means Squared Euclidean Distance clustering algorithm. Performance evaluations assure the significance of the model. Also, among detected clusters, the most populated one has labeled as "Automatic News Aggregator Websites" by the experts. The findings of the study help to have a better understanding of the different referring behaviors, which form around 15% of the overall traffic of Iranian Students' News Agency (ISNA) website. They are also helpful to develop more efficient online marketing plans, business alliances, and corporate strategies. Manuscript profile
      • Open Access Article

        6 - A Conflict Resolution Approach using Prioritization Strategy
        Hojjat Emami Kamyar Narimanifar
        In current air traffic control system and especially in free flight method, the resolution of conflicts between different aircrafts is a critical problem. In recent years, conflict detection and resolution problem has been an active and hot research topic in the aviatio More
        In current air traffic control system and especially in free flight method, the resolution of conflicts between different aircrafts is a critical problem. In recent years, conflict detection and resolution problem has been an active and hot research topic in the aviation industry. In this paper, we mapped the aircrafts’ conflict resolution process to graph coloring problem, then we used a prioritization method to solve this problem. Valid and optimal solutions for corresponding graph are equivalent to free conflict flight plans for aircrafts in airspace. The proposed prioritization method is based on some score allocation metrics. After score allocation process, how much the score of an aircraft be higher its priority will be higher and vice versa how much the score of an aircraft be lower its priority will be lower. We implemented and tested our proposed method by different test cases and test results indicate high efficiency of this method. Manuscript profile
      • Open Access Article

        7 - Toward Energy-Aware Traffic Engineering in Intra-Domain IP Networks Using Heuristic and Meta-Heuristics Approaches
        Muharram Mansoorizadeh
        Because of various ecological, environmental, and economic issues, energy efficient networking has been a subject of interest in recent years. In a typical backbone network, all the routers and their ports are always active and consume energy. Average link utilization i More
        Because of various ecological, environmental, and economic issues, energy efficient networking has been a subject of interest in recent years. In a typical backbone network, all the routers and their ports are always active and consume energy. Average link utilization in internet service providers is about 30-40%. Energy-aware traffic engineering aims to change routing algorithms so that low utilized links would be deactivated and their load would be distributed over other routes. As a consequence, by turning off these links and their respective devices and ports, network energy consumption is significantly decreased. In this paper, we propose four algorithms for energy-aware traffic engineering in intra-domain networks. Sequential Link Elimination (SLE) removes links based on their role in maximum network utilization. As a heuristic method, Extended Minimum Spanning Tree (EMST) uses minimum spanning trees to eliminate redundant links and nodes. Energy-aware DAMOTE (EAD) is another heuristic method that turns off links with low utilization. The fourth approach is based on genetic algorithms that randomly search for feasible network architectures in a potentially huge solution space. Evaluation results on Abilene network with real traffic matrix indicate that about 35% saving can be obtained by turning off underutilized links and routers on off-peak hours with respect to QoS. Furthermore, experiments with GA confirm that a subset of links and core nodes with respect to QoS can be switched off when traffic is in its off-peak periods, and hence energy can be saved up to 37%. Manuscript profile
      • Open Access Article

        8 - Modeling the Inter-arrival Time of Packets in Network Traffic and Anomaly Detection Using the Zipf’s Law
        Ali Naghash Asadi Mohammad  Abdollahi Azgomi
        In this paper, a new method based on the Zipf’s law for modeling the features of the network traffic is proposed. The Zipf's law is an empirical law that provides the relationship between the frequency and rank of each category in the data set. Some data sets may follow More
        In this paper, a new method based on the Zipf’s law for modeling the features of the network traffic is proposed. The Zipf's law is an empirical law that provides the relationship between the frequency and rank of each category in the data set. Some data sets may follow from the Zipf’s law, but we show that each data set can be converted to the data set following from the Zipf’s law by changing the definition of categories. We use this law to model the inter-arrival time of packets in the normal network traffic and then we show that this model can be used to simulate the inter-arrival time of packets. The advantage of this law is that it can provide high similarity using less information. Furthermore, the Zipf’s law can model different features of the network traffic that may not follow from the mathematical distributions. The simple approach of this law can provide accuracy and lower limitations in comparison to existing methods. The Zipf's law can be also used as a criterion for anomaly detection. For this purpose, the TCP_Flood and UDP_Flood attacks are added to the inter-arrival time of packets and they are detected with high detection rate. We show that the Zipf’s law can create an accurate model of the feature to classify the feature values and obtain the rank of its categories, and this model can be used to simulate the feature values and detect anomalies. The evaluation results of the proposed method on MAWI and NUST traffic collections are presented in this paper. Manuscript profile
      • Open Access Article

        9 - Social and cultural Impact Assessment of Sports Complexes: A Case Study of Narmak Sports Complex
        Ma’soumeh  MohaqeqMontazeri
        One of the biggest problems facing cities, especially large ones is inadequate share and distribution of sports facilities due to the size of urban population and insufficient government budget. Construction of Narmak Sports Complex is one of the projects that have been More
        One of the biggest problems facing cities, especially large ones is inadequate share and distribution of sports facilities due to the size of urban population and insufficient government budget. Construction of Narmak Sports Complex is one of the projects that have been implemented with the aim of developing sports and leisure areaaligned with the Comprehensive Master-plan for Tehran City and the Detailed Plan of Region 8. It also aimed to transform a polluted site into a service area.The present study seeks to identify the social and cultural impacts of this project and to estimate the positive and negative outcomes within the project-affected area. This research took a mixed approach combining documentary and field methods, and tools such as observation, in-depth and semi-structured interviews, questionnaires, and focused group discussions were used to collect data.The findings of this study show that besides positive impacts such as increasing sports spaceper capita, eliminating environmental pollution, improving the urban landscape, reducing household costs, reducing perceived public insecurity, enriching leisure activity patterns, etc., this projectalso has negative impacts such as reducing market share of pre-existing sports complexes, causing traffic problems due to lack of parking space and increasing traffic jams in the area. Manuscript profile
      • Open Access Article

        10 - Social Impact Assessment of BRT Line Displacement in Mowlavi Street
        Zahra  Khastoo
        Deputy of Transportation and Traffic of Tehran Municipal Region 12 has presented a plan to displace the BRT line from the south side of Mowlavi Street to the middle in order to increase safety and organize public transportation. This paper aims to study the social and c More
        Deputy of Transportation and Traffic of Tehran Municipal Region 12 has presented a plan to displace the BRT line from the south side of Mowlavi Street to the middle in order to increase safety and organize public transportation. This paper aims to study the social and cultural impacts of this intervention on the social life of Mowlavi Street in accordance with the stakeholders’ needs, situations, and opinions. The main methodology of this research is based on qualitative approach and phenomenological method using in-depth interview and focus group techniques. Accordingly, relying on the theoretical framework of livability. several concepts such as sustainability, sustainable transportation, quality of life and safety have been brought forth. The findings indicate that the displacement of Mowlavi BRT line can increase street safety; however, this requires a high level of organizational cooperation of Traffic Police on this street. On the other hand, one-way to two-way street conversion which is also aligned with the local residents’ and businesses’ social and economic benefits in Harandi and Takhti neighborhoods, can increase the transportation demand for Mowlavi Street. Manuscript profile
      • Open Access Article

        11 - An analysis of the United Nations' Response to Drug Supply in Its Documents and Conventions
        Mohammad Hassan  Sheikhoeslami Ali Ghasemifard
        Throughout the world, drug trafficking was considered legal until the nineteenth century. Early in the twentieth century, the international community became aware of the destructive power of these materials in human societies, witnessing the first massive efforts to res More
        Throughout the world, drug trafficking was considered legal until the nineteenth century. Early in the twentieth century, the international community became aware of the destructive power of these materials in human societies, witnessing the first massive efforts to restrict the purchase and sale of narcotics in the world. Subsequently, and before the United Nations was formed, several other international conventions were concluded in the field of counter-narcotics. With the formation of the United Nations in 1945, the process of counter-narcotics has become more coherent, the main feature of which is the fight against the supply of narcotics. In this article, the authors by using the method of library research try to answer the question that which approaches the United Nations has adopted since its inception to fight against narcotics and what are their main components. By reviewing and analyzing the UN conventions, documents, and resolutions in the field of counter-narcotics, the authors conclude that the United Nations' approach until the 1980s was a violent, rigorous approach which was focused on the supply-side. After this decade, the United Nations' approach has slowly shifted away from this approach to adopt an approach which is focused on the demand-side. Manuscript profile
      • Open Access Article

        12 - Application identification through intelligent traffic classification
        Shaghayegh Naderi
        Traffic classification and analysis is one of the big challenges in the field of data mining and machine learning, which plays an important role in providing security, quality assurance and network management. Today, a large amount of transmission traffic in the network More
        Traffic classification and analysis is one of the big challenges in the field of data mining and machine learning, which plays an important role in providing security, quality assurance and network management. Today, a large amount of transmission traffic in the network is encrypted by secure communication protocols such as HTTPS. Encrypted traffic reduces the possibility of monitoring and detecting suspicious and malicious traffic in communication infrastructures (instead of increased security and privacy of the user) and its classification is a difficult task without decoding network communications, because the payload information is lost, and only the header information (which is encrypted too in new versions of network communication protocols such as TLS1.03) is accessible. Therefore, the old approaches of traffic analysis, such as various methods based on port and payload, have lost their efficiency, and new approaches based on artificial intelligence and machine learning are used in cryptographic traffic analysis. In this article, after reviewing the traffic analysis methods, an operational architectural framework for intelligent traffic analysis and classification has been designed. Then, an intelligent model for Traffic Classification and Application Identification is presented and evaluated using machine learning methods on Kaggle141. The obtained results show that the random forest model, in addition to high interpretability compared to deep learning methods, has been able to provide high accuracy in traffic classification compared to other machine learning methods. Finally, tips and suggestions about using machine learning methods in the operational field of traffic classification have been provided. Manuscript profile
      • Open Access Article

        13 - Application Identification Through Intelligent Traffic Classification
        Shaghayegh Naderi
        Traffic classification and analysis is one of the big challenges in the field of data mining and machine learning, which plays an important role in providing security, quality assurance and network management. Today, a large amount of transmission traffic in the network More
        Traffic classification and analysis is one of the big challenges in the field of data mining and machine learning, which plays an important role in providing security, quality assurance and network management. Today, a large amount of transmission traffic in the network is encrypted by secure communication protocols such as HTTPS. Encrypted traffic reduces the possibility of monitoring and detecting suspicious and malicious traffic in communication infrastructures (instead of increased security and privacy of the user) and its classification is a difficult task without decoding network communications, because the payload information is lost, and only the header information (which is encrypted too in new versions of network communication protocols such as TLS1.03) is accessible. Therefore, the old approaches of traffic analysis, such as various methods based on port and payload, have lost their efficiency, and new approaches based on artificial intelligence and machine learning are used in cryptographic traffic analysis. In this article, after reviewing the traffic analysis methods, an operational architectural framework for intelligent traffic analysis and classification has been designed. Then, an intelligent model for Traffic Classification and Application Identification is presented and evaluated using machine learning methods on Kaggle141. The obtained results show that the random forest model, in addition to high interpretability compared to deep learning methods, has been able to provide high accuracy in traffic classification (95% and 97%) compared to other machine learning methods. Finally, tips and suggestions about using machine learning methods in the operational field of traffic classification have been provided. Manuscript profile