• List of Articles location

      • Open Access Article

        1 - The impact of technological innovation capabilities on innovation performance in Knowledge-Based Firms (Case Study: Science and Technology Park of Tehran University)
        Mahdi Dehghani Soltani
        The aim of this study is to evaluate The impact of technological innovation capabilities on innovation performance in Knowledge-Based Firms. The population in this study was manager and employee of  Knowledge-Based Firms in Science and Technology Park of Tehran Universi More
        The aim of this study is to evaluate The impact of technological innovation capabilities on innovation performance in Knowledge-Based Firms. The population in this study was manager and employee of  Knowledge-Based Firms in Science and Technology Park of Tehran University and the sample size was 126 patients that to obtain this sample size random sampling method is used. The data collection tool in this study was a standard questionnaire and for reliability Cronbach's alpha coefficient was used. Present study is an applied research in terms of purpose and in terms of data collecting way it is considered as a descriptive survey. Structural equations modeling was used for examining of considered model. Finding in this paper show strategy planning, R&D, resource allocation, Marketing and learning capabilities can significantly improve the innovation. R&D and resource allocation capabilities can also significantly improve new product introduction. While Manufacturing and Organizing capability is not affect significantly on innovation performance in Knowledge-Based Firms in Science and Technology Park of Tehran University. Manuscript profile
      • Open Access Article

        2 - Using a multi-objective optimization algorithm for tasks allocate in the cloud-based systems to reduce energy consumption
        sara tabaghchimilan nima jafari novimipour
        Nowadays, new technologies have increased the demand for business in the web environment.Increasing demand will increase the variety and number of services. As a result, the creation of large-scale computing data centers has high operating costs and consumes huge amount More
        Nowadays, new technologies have increased the demand for business in the web environment.Increasing demand will increase the variety and number of services. As a result, the creation of large-scale computing data centers has high operating costs and consumes huge amounts of electrical power. On the other hand, inadequate and inadequate cooling systems not only cause excessive heating of resources and shorten the life of the machines. It also produces carbon that plays an important role in the weather. Therefore, they should reduce the total energy consumption of these systems with proper methods. In this research, an efficient energy management approach is provided in virtual cloud data centers, which reduces energy consumption and operational costs, and brings about an increase in the quality of services. It aims to provide a resource allocation strategy for cloud systems with the goal of reducing energy, cost of implementation and examining its use in cloud computing. The results of the simulation show that the proposed method in comaprision to NPA, DVFS, ST and MM methods can reduce the average energy consumption up to 0.626 kWh, also the need to immigration and SLA violation declined up to 186 and 30.91% respectively. Manuscript profile
      • Open Access Article

        3 - Locating the prefacfured depot for crisis management in municipal Region one in Tehran
          Mohammad Gandomi
        In recent years, the construction of backup bases for crisis management has been placed on the agenda of the Organization of Precautionary Measures and crisis management. One of the important things lies in setting up bases, studying, and finding a proper geographical l More
        In recent years, the construction of backup bases for crisis management has been placed on the agenda of the Organization of Precautionary Measures and crisis management. One of the important things lies in setting up bases, studying, and finding a proper geographical location for setting up this his kind of application, a place which can be used as a safe place under critical conditions and under normal conditions. It may be used for normal uses too. The present study is of a practical nature which has been conducted by a descriptive-analytical method. This research seeks to find the best method location for the backup bases for crisis management municipal region one in Tehran. In order to achieve this goal, effective criteria and factors for locating aid centers are identified in time of crisis. Then in order to specify the importance and value of each each criterion and effective elements in section making, the AHP model has been used.Then a questionnaire was prepared and distributed among experts. In the second stage, by the use of hirarchicl procedural method and by using expert choice software, the weight of each criterion and element was determined. In the second phase, all layers of information in GIS were turned into a roster and by using the method of index overlay, the layers were mixed and ten best locations were chosen as the best bases for crisis management for region one. Also, results show the depots for crisis management have not been properly chosen and that they are very limited in numbers. Manuscript profile
      • Open Access Article

        4 - The impact Geomorphology in the Locating Urban
        Marzieh Mogholi
        Choose landfill is one of the most important steps in the management of municipal solid waste. With regard to environmental impact, economic and ecological landfill, the landfill must be done carefully and in a scientific process. In this study, to determine the appropr More
        Choose landfill is one of the most important steps in the management of municipal solid waste. With regard to environmental impact, economic and ecological landfill, the landfill must be done carefully and in a scientific process. In this study, to determine the appropriate location for Solid Waste Palm City Taqi using the capabilities of GIS tools have been implemented. Geographic information systems including the innovative methods used today to study the location. The selection criteria for landfill waste Mnayb places such as geology, access roads, slope, fault, maps, land use, urban and rural centers have been used.the current location is buried in the wrong zone. Manuscript profile
      • Open Access Article

        5 - The relationship of crime and geography
        nemat nhrughe Farhad allahverdi mahdi kazemi
        Today, it is one of the applied disciplines in forensic science and geography. Geography is referred to as a fundamental scientific discipline, because of the phenomena and processes that we go through we have to talk about the place where it was created and expanded an More
        Today, it is one of the applied disciplines in forensic science and geography. Geography is referred to as a fundamental scientific discipline, because of the phenomena and processes that we go through we have to talk about the place where it was created and expanded and eventually left or disappeared and its location conditions. To identify. One of these phenomena is "crime or crime". The existence and manner of crime in different places varies. So that the "conditions of place" are of great importance in the presence and absence, expansion or non-spread of mass. However, we must bear in mind that every place in different economic, cultural, political, and environmental dimensions has various components and variables that directly or indirectly influence the amount of spatial weight or location power. Therefore, the greater the power of the place, the less likely the crime will be. This fundamental article, with a descriptive-analytical approach, seeks to express the relationship between crime and geography, especially in the big cities of the present age. The importance of the research is that by explaining the relevant theories and perspectives it seeks to answer the question why crime is increasing in some places and in others it is decreasing. In fact, we seek to prove the hypothesis that there is a strong relationship between geographic space and crime that criminals screen their first thoughts in the context of the subject before considering committing the crime, taking into account the location conditions. Manuscript profile
      • Open Access Article

        6 - Spatial-physical structure management of in-city structures, by AHP method and fuzzy logic (Case study: region17 of Tehran)
        Nemat Hosseinzadeh Faraz  Estelaji Elham Amini
        Due to the central role of the city, Tehran has been associated with increasing population and density, and consequently in providing services and facilities in various fields, due to lack of and, in some cases, due to the lack of appropriate geographical distribution o More
        Due to the central role of the city, Tehran has been associated with increasing population and density, and consequently in providing services and facilities in various fields, due to lack of and, in some cases, due to the lack of appropriate geographical distribution of applications, there are shortcomings Is. The fuel filling stations network is one of the components of the municipal services network that acts as a fuel supplier to the intercity transportation sector, which is important in terms of traffic considerations, urbanization, safety and the environment. One of the most important factors surrounding fuel supply stations (petrol stations) is their proper location. Multi-criteria decision-making models (MCDMs) are now becoming an expanding tool for addressing complex spatial decision-making problems. There are several methods in making multi-criteria decisions. Studies and evidence show that multi-criteria decision-making methods, especially the combined methods between them, provide accurate results for spatial decision-making. Due to the high population density and the density of internal and external passage overnight and the passage to the adjacent areas, Tehran's region 17 shows the need for fuel efficiency and optimal location. Therefore, the purpose of this study was to determine the appropriate location of pump-gas stations in the 17th district of Tehran and to investigate the position of the existing sites in this area, using the GIS and utilizing the fuzzy AHP combined method. Not. The research method has descriptive-analytical and applied nature in this evaluation. In order to achieve these goals, suitable criteria, consistent with the studied area and different methods have been used. Finally, by using paired comparisons and experts' opinion and calculations by the fuzzy AHP method, the final weight of the criteria has been determined. The results of the integration of information layers in ARCGIS software, while identifying suitable locations for building new stations, have analyzed the location of gas station positions, which shows that each of the 2 existing locations in the 17th district of Tehran in an appropriate and optimal position they are not. Manuscript profile
      • Open Access Article

        7 - Joint Power Allocation Optimization of cooperative communication systems with Non-Orthogonal Multiple Access
        Hamid AmiriAra mohamadbagher masrur mohamadreza zahabi
        In this paper, a downlink network with two users as transmitter and relay, respectively, and a central station as a receiver is considered. The aim is to determine the optimal coefficient of non-orthogonal signal symbols and the optimal power allocation in the source-re More
        In this paper, a downlink network with two users as transmitter and relay, respectively, and a central station as a receiver is considered. The aim is to determine the optimal coefficient of non-orthogonal signal symbols and the optimal power allocation in the source-relay in order to maximize the average total rate in a cooperative communication system using the non-orthogonal multiple access technique. To achieve these goals, the average total rate of the cooperative communication system with non-orthogonal multiple access with decode and forward relay in the independent Rayleigh channel was calculated. Then, in the first step, the optimization problem of the non-orthogonal symbols coefficient is mathematically expressed for each power allocation and a closed form solution is proposed. In the second step, the power allocation optimization for the source-relay was introduced and solved. Finally, the joint optimization problem of the non-orthogonal symbols coefficient and power allocation is investigated and an algorithm proposed for the joint optimization problem. The proposed algorithm shows that the joint optimization of the non-orthogonal symbols coefficient and power allocation achieve a higher average rate than the separate optimization of each of these parameters. Also, simulations and numerical results are presented to confirm the theoretical equation, where the simulations show the 3 dB gain for the optimized system using the proposed algorithm compared to the non-optimized system. Manuscript profile
      • Open Access Article

        8 - Multiple Antenna Relay Beamforming for Wireless Peer to Peer Communications
        Mohammad Hossein Golbon Haghighi Behrad Mahboobi Mehrdad  Ardebilipour
        This paper deals with optimal beamforming in wireless multiple-input-multiple-output (MIMO) relay networks that involves multiple concurrent source-destination pairs with imperfect channel state information (CSI) at the relays. Our aim is the optimization of the MIMO re More
        This paper deals with optimal beamforming in wireless multiple-input-multiple-output (MIMO) relay networks that involves multiple concurrent source-destination pairs with imperfect channel state information (CSI) at the relays. Our aim is the optimization of the MIMO relay weights that minimize the total relay transmit power subject to signal-to-interference-plus-noise ratio (SINR) of all destinations to be kept above a certain threshold. Since power minimization is a non-convex quadratically constrained quadratic programming (QCQP), we use semi-definite programming (SDP) relaxation of above mentioned problem by using a randomization technique. Numerical Monte Carlo simulations verify the performance gain of our proposed multiple antenna relay system in terms of transmit power and symbol error probability. Manuscript profile
      • Open Access Article

        9 - A Novel Resource Allocation Algorithm for Heterogeneous Cooperative Cognitive Radio Networks
        Mehdi Ghamari Adian
        In cognitive radio networks (CRN), resources available for use are usually very limited. This is generally because of the tight constraints by which the CRN operate. Of all the constraints, the most critical one is the level of permissible interference to the primary us More
        In cognitive radio networks (CRN), resources available for use are usually very limited. This is generally because of the tight constraints by which the CRN operate. Of all the constraints, the most critical one is the level of permissible interference to the primary users (PUs). Attempts to mitigate the limiting effects of this constraint, thus achieving higher productivity is a current research focus and in this work, cooperative diversity is investigated as a promising solution for this problem. Cooperative diversity has the capability to achieve diversity gain for wireless networks. Thus, in this work, the possibility of and mechanism for achieving greater utility for the CRN when cooperative diversity is incorporated are studied carefully. To accomplish this, a resource allocation (RA) model is developed and analyzed for the heterogeneous, cooperative CRN. In the considered model, during cooperation, a best relay is selected to assist the secondary users (SUs) that have poor channel conditions. Overall, the cooperation makes it feasible for virtually all the SUs to improve their transmission rates while still causing minimal harm to the PUs. The results show a remarkable improvement in the RA performance of the CRN when cooperation is employed in contrast to when the CRN operates only by direct communication. Manuscript profile
      • Open Access Article

        10 - Clustering for Reduction of Energy Consumption in Wireless Sensor Networks by AHP Method
        Mohammad Reza  Taghva Robab  Hamlbarani Haghi Aziz Hanifi Kamran  feizi
        Due to the type of applications, wireless sensor nodes must always be energy efficient and small. Hence, some studies have been done in order to the reduction in energy consumption. Data collection in wireless sensor networks is one of the most important operations of t More
        Due to the type of applications, wireless sensor nodes must always be energy efficient and small. Hence, some studies have been done in order to the reduction in energy consumption. Data collection in wireless sensor networks is one of the most important operations of these networks. Due to the energy limitation of nodes, energy efficiency is considered as a key objective in the design of sensor networks. In this paper, we present a method in which, in the first phase, nodes obtain their position by using the position of the base station and two other two nodes informed geographic position and are out of covered environment. In the second phase, the optimal location of the base station is determined. In the third phase, we determine the cluster heads based on the criteria such as the remaining energy, the distance (the distance from the cluster head and the distance from the base station), the number of neighbors (the one-step neighbors and the two-step neighbors) and the centrality. Using the multi-as criteria to select optimally cluster heads by decision making method. We implement the proposed method in the NS2 environment and evaluate its effect and compare it with the NEECP E-LEACH protocols. Simulation results show that by reducing energy consumption, the proposed method enhances the network life time expectancy. In addition it improves average packet delivery and the average delay. Manuscript profile
      • Open Access Article

        11 - A Novel Approach for Cluster Self-Optimization Using Big Data Analytics
        Abbas Mirzaei Amir Rahimi
        One of the current challenges in providing high bitrate services in next generation mobile networks is limitation of available resources. The goal of proposing a self-optimization model is to maximize the network efficiency and increase the quality of services provided More
        One of the current challenges in providing high bitrate services in next generation mobile networks is limitation of available resources. The goal of proposing a self-optimization model is to maximize the network efficiency and increase the quality of services provided to femto-cell users, considering the limited resources in radio access networks. The basis for our proposed scheme is to introduce a self-optimization model based on neighbouring relations. Using this model, we can create the possibility of controlling resources and neighbouring parameters without the need of human manipulation and only based on the network’s intelligence. To increase the model efficiency, we applied the big data technique for analyzing data and increasing the accuracy of the decision-making process in a way that on the uplink, the sent data by users is to be analyzed in self-optimization engine. The experimental results show that despite the tremendous volume of the analyzed data – which is hundreds of times bigger than usual methods – it is possible to improve the KPIs, such as throughput, up to 30 percent by optimal resource allocation and reducing the signaling load. Also, the presence of feature extraction and parameter selection modules will reduce the response time of the self-optimization model up to 25 percent when the number of parameters is too high Moreover, numerical results indicate the superiority of using support vector machine (SVM) learning algorithm. It improves the accuracy level of decision making based on the rule-based expert system. Finally, uplink quality improvement and 15-percent increment of the coverage area under satisfied SINR conditions can be considered as outcome of the proposed scheme. Manuscript profile
      • Open Access Article

        12 - A Customized Web Spider for Why-QA Pairs Corpus Preparation
        Manvi  Breja
        Considering the growth of researches on improving the performance of non-factoid question answering system, there is a need of an open-domain non-factoid dataset. There are some datasets available for non-factoid and even how-type questions but no appropriate dataset av More
        Considering the growth of researches on improving the performance of non-factoid question answering system, there is a need of an open-domain non-factoid dataset. There are some datasets available for non-factoid and even how-type questions but no appropriate dataset available which comprises only open-domain why-type questions that can cover all range of questions format. Why-questions play a significant role and are usually asked in every domain. They are more complex and difficult to get automatically answered by the system as why-questions seek reasoning for the task involved. They are prevalent and asked in curiosity by real users and thus their answering depends on the users’ need, knowledge, context and their experience. The paper develops a customized web crawler for gathering a set of why-questions from five popular question answering websites viz. Answers.com, Yahoo! Answers, Suzan Verberne’s open-source dataset, Quora and Ask.com available on Web irrespective of any domain. Along with the questions, their category, document title and appropriate answer candidates are also maintained in the dataset. With this, distribution of why-questions according to their type and category are illustrated. To the best of our knowledge, it is the first large enough dataset of 2000 open-domain why-questions with their relevant answers that will further help in stimulating researches focusing to improve the performance of non-factoid type why-QAS. Manuscript profile
      • Open Access Article

        13 - The analysis of meaning elements of the ethic word “sacrifice" in Holey Quran
             
        The semiotics about ethic words in Quran is among the latest studies in the field of Qoranic researches aiming to discover new layers of meaning from Quran words through a systematic and accurate study. in the current text، it has been attempted to analyze the ethic wo More
        The semiotics about ethic words in Quran is among the latest studies in the field of Qoranic researches aiming to discover new layers of meaning from Quran words through a systematic and accurate study. in the current text، it has been attempted to analyze the ethic word ''sacrifice" to its essential elements of meaning components through a semiotic and detailed look; in addition to the etymology of this word، its intersexual relations including collocation، substituational، and stylistic relations should be considerate. It must be concluded that the meaning of “sacrifice" in Quran is not a single-layered concept، but، it has interwebbed borders. Saving the essential meaning of “choose"، this word entered the Quran’s semantic system in its developmental path and covered components such as no intermediating، choice or authority، various alternatives، desirability، and positive and negative value weights. In the process of its meaning development، this word involved meaning allocation to the extent that today، whatever is suggested by the meaning of "sacrifice" has an absolute special and general relation. Manuscript profile
      • Open Access Article

        14 - How to Allocate University Spin-off Companies Equity Among their Owners
        Bahman Facoor
        Iranian academic sector is approaching research commercialization, although, creation of university spin-offs is an initial experience in this sector. Legislation of “knowledge based firms support and commercialization of invention and innovations” has provided great op More
        Iranian academic sector is approaching research commercialization, although, creation of university spin-offs is an initial experience in this sector. Legislation of “knowledge based firms support and commercialization of invention and innovations” has provided great opportunity for the creation of this type of firms in universities and research institutes. But universities and research institutes are still required to complete their infrastructures including rules and regulations needed for the creation of spin-offs. One of the most important of these is "allocation of university spin-off equity among their owners" regulation. Owners of university spin-offs are universities and research institutes, inventor researchers, investors and external entrepreneurs. Allocation of spin-off equity among these parties satisfactorily, is one of the important challenges to spin-off creation in universities and research institutes. This article first tries to identify founders and other parties that are gradually added to owners of spin-off companies. Then stakeholder's equity determinant factors will be discussed. Finally implementation of a framework for the allocation of spin-off companies' equity among their owners will be raised. 10 universities in America, Britain and Canada with spin-off creation experience have been studied in this article. Manuscript profile
      • Open Access Article

        15 - SQP-based Power Allocation Strategy for Target Tracking in MIMO Radar Network with Widely Separated Antennas
        Mohammad  Akhondi Darzikolaei Mohammad Reza Karami-Mollaei Maryam Najimi
        MIMO radar with widely separated antennas enhances detection and estimation resolution by utilizing the diversity of the propagation path. Each antenna of this type of radar can steer its beam independently towards any direction as an independent transmitter. However, t More
        MIMO radar with widely separated antennas enhances detection and estimation resolution by utilizing the diversity of the propagation path. Each antenna of this type of radar can steer its beam independently towards any direction as an independent transmitter. However, the joint processing of signals for transmission and reception differs this radar from the multistatic radar. There are many resource optimization problems which improve the performance of MIMO radar. But power allocation is one of the most interesting resource optimization problems. The power allocation finds an optimum strategy to assign power to transmit antennas with the aim of minimizing the target tracking errors under specified transmit power constraints. In this study, the performance of power allocation for target tracking in MIMO radar with widely separated antennas is investigated. Therefore, a MIMO radar with distributed antennas is configured and a target motion model using the constant velocity (CV) method is modeled. Then Joint Cramer Rao bound (CRB) for target parameters (joint target position and velocity) estimation error is calculated. This is utilized as a power allocation problem objective function. Since the proposed power allocation problem is nonconvex. Therefore, a SQP-based power allocation algorithm is proposed to solve it. In simulation results, the performance of the proposed algorithm in various conditions such as a different number of antennas and antenna geometry configurations is examined. Results affirm the accuracy of the proposed algorithm. Manuscript profile
      • Open Access Article

        16 - Instagram Child Labor Concept: A Study on Iranian Children on Cyber Space
        Atefeh Aghaei Zahra Rezania
        Instagram is considered a new medium context where users involving parents and children are able to actively act. Instagram Child Labor is a new phenomenon on cyberspace where children are exploited by their parents to be of use by expressing various aspects of their bi More
        Instagram is considered a new medium context where users involving parents and children are able to actively act. Instagram Child Labor is a new phenomenon on cyberspace where children are exploited by their parents to be of use by expressing various aspects of their biological life. With this in mind, media power is capable of creating a concept of child as well as behaving to the detriment of children in favor of businesses and family wealth. This study aims at identifying the meaning of "Instagram Child Labor" and what it collocates with. To this purpose, eight influencer pages working on children scope were picked out to be analyzed qualitatively utilizing MAX QDA. The results indicate that children’s body and communications equal to "display means", "mothers’ identity and brand maker", "a means to advertise" and moreover, children’s personal information is akin to "a way to satisfy children’s curiosity" that with the prior one create the concept of Instagram Child Labor so that families become more lucrative by helping advertising firms make more followers. Manuscript profile
      • Open Access Article

        17 - A Comprehensive Approach to Urban Disaster Management Based on Vulnerability Map and Risk Zoning Case Study: Tehran Municipal District 1
        وحید  اسماعیلی کیاسج   Kamran shahanaghi
        Natural Disasters have always been a part of life on our planet. With human society development, urban areas and Metropolises have not been safe from destructive effects and consequences of disasters. In addition to intensity and extent of disasters, vulnerability of so More
        Natural Disasters have always been a part of life on our planet. With human society development, urban areas and Metropolises have not been safe from destructive effects and consequences of disasters. In addition to intensity and extent of disasters, vulnerability of societies has remarkable dependence on proper urban infrastructures, strong structures, preventive programs and appropriate preparation in emergency-related organizations. Occurrence of an onset disaster like earthquake, usually leads to secondary damages in urban areas; they happen for an obvious reason and have specific outcomes. Identification of all significant reasons and consequences results in creating a vulnerability map for urban wards which could be a useful basis for preventive programs. On the other side, one of the most effective and efficient approaches to create preparedness and response plan disaster management organizations, is designing a relief chain with proper logistic modules and devoting responsibilities to authorities, based on data achieved from damage estimation studies. Hence, in this paper, a sequential approach is used to apply geographic information system and eliciate experts' knowledge of urban areas so as to create both damage estimation and vulnerability maps; These information. In turn, help designing disaster management cycle, specifically, Preventive, preparedness and response programs for an urban area. In order to create a better perceptive of the proposed approach, Tehran municipality district (1) is used as a real case study and its vulnerability to a hypothetical earthquake is estimated to create disaster management program. Manuscript profile
      • Open Access Article

        18 - An Investigation into the impact of Inter-university resource allocation mechanisms on educational and research performance of departments in Shahid Chamran University of Ahvaz
        Farzane Ghasemi   Masoud Khodapanah Mohammad Reza Akhound
        The main purpose of this research was to investigate the effect of internal financial resource allocation mechanisms on the educational and research performance of departments. Present study could be classified as a theoretical-applied research in terms of objectiv More
        The main purpose of this research was to investigate the effect of internal financial resource allocation mechanisms on the educational and research performance of departments. Present study could be classified as a theoretical-applied research in terms of objectives and descriptive-analytic as well as correlational in terms of methodology. Shahid Chamran University was selected as the statistical population and all the required data concerning faculties and departments was collected. In order to collect the required data in the time domain of 2010-2013, documents and records held by different units of the university were scrutinized and reviewed. For data analysis, descriptive statistics tables including average growth rates, means, standard deviations and correlation coefficients were developed while to determine the relationships between variables and fit regression models of interest, inferential statistics and multilevel modelling methods were used. The results show that: (1) values do not have the same structure and homogeneity and there is a dissonance between time units and departments. The calculated statistics for research performance (ρ=0.68) and academic performance (ρ=0.52) indicates the necessity of using multilevel modeling. 2) Managerial and educational performance of the departments per faculty member during the study period has encountered some fluctuations and the general trend of these indices has been increasing 3) each department has experienced an individual trend. 4) The mechanisms of financial resource allocation significantly affect educational and research performances of the departments. Manuscript profile
      • Open Access Article

        19 - Energy-Efficient User Pairing and Power Allocation for Granted Uplink-NOMA in UAV Communication Systems
        Seyed Hadi Mostafavi-Amjad Vahid Solouk Hashem Kalbkhani
        With the rapid deployment of users and increasing demands for mobile data, communication networks with high capacity are needed more than ever. Furthermore, there are several challenges, such as providing efficient coverage and reducing power consumption. To tackle thes More
        With the rapid deployment of users and increasing demands for mobile data, communication networks with high capacity are needed more than ever. Furthermore, there are several challenges, such as providing efficient coverage and reducing power consumption. To tackle these challenges, using unmanned aerial vehicles (UAVs) would be a good choice. This paper proposes a scheme for uplink non-orthogonal multiple access (NOMA) in UAV communication systems in the presence of granted and grant-free users. At first, the service area users, including granted and grant-free users, are partitioned into some clusters. We propose that the hover location for each cluster is determined considering the weighted mean of users’ locations. We aim to allocate transmission power and form NOMA pairs to maximize the energy efficiency in each cluster subject to the constraints on spectral efficiency and total transmission power. To this end, the transmission powers of each possible pair are obtained, and then Hungarian matching is used to select the best pairs. Finally, finding the flight path of the UAV is modeled by the traveling salesman problem (TSP), and the genetic algorithm method obtains its solution. The results show that the increasing height of the UAV and density of users increases the spectral and energy efficiencies and reduces the outage probability. Also, considering the quality of service (QoS) of granted users for determining the UAV's hover location enhances the transmission's performance. Manuscript profile
      • Open Access Article

        20 - Optimization of LZ78 compression algorithm in tracing location of mobile communication users
        M.R. mirsarraf Mohammad Hakkak
        For location updating of mobile users, two compression algorithms, namely, LZ78 and proposed compression algorithm (modified LZ78) are introduced in this paper to be used in PCS networks. Some problems related to using these algorithm are the usage of memory of dictiona More
        For location updating of mobile users, two compression algorithms, namely, LZ78 and proposed compression algorithm (modified LZ78) are introduced in this paper to be used in PCS networks. Some problems related to using these algorithm are the usage of memory of dictionary in mobile users and HLR data base as well as the ambiguity about the last location of mobile users due to delay in location updating caused by the compression algorithm. The advantage of these algorithms is reduction at the number of location updatings for a mobile user. With some modifications in the LZ78 algorithm, its problems in implementation are reduced and its usage for PCS networks is enhanced. These changes result from combining this algorithm with distance based location updating algorithm and sending symbols corresponding to some limited neighborhoods identity instead of cell number by compression algorithm For comparison between LZ78 and proposed modified algorithm, we use simulation technique. The simulation program have two structures for PCS network, namely, square cells and hexagon cell networks. For mobile users, we considered two movement pattern: one is directional and the other is omnidirectional movement pattern. The outputs of the simulation program are the number of location updating, the maximum ambiguity of user location and size of dictionary for compression algorithms. Comparing the two algorithms by simulation, we observe that in the modified LZ78 algorithm the parameters of location updating number, maximum user ambiguity and size of dictionary are lower than those in the LZ78 algorithm. At the end of the article, cost of location management of mobile user versus call to mobility ratio (the average number of call toward user to the average number of its movement) is calculated. By comparing location management for LZ78 algorithm, modified LZ78 and distance based location updating algorithm, we observe that the cost of location management is reduced for modified LZ78 compression algorithm. Manuscript profile
      • Open Access Article

        21 - Cell ID Assignment in Cellular Networks for Location Management Based on Distance
        A. R. zolghadr asli F. nazarpour
        In the design of mobile cellular networks, the option of methods for location management of mobile users and updating this location is very important. In general, numerous methods of location management could be classified in two different categories named static and dy More
        In the design of mobile cellular networks, the option of methods for location management of mobile users and updating this location is very important. In general, numerous methods of location management could be classified in two different categories named static and dynamic. Analysis and studies show that the second category imposes less computational load onto network. One of the algorithms in dynamic case is based on distance which has better performance compared to other algorithms which are based on time or movement. The important point in this technique is the calculation of cellular distance by mobile unit (MS). Because MSs could receive only cell codes or cell identification (cell ID) by BTSs, in this technique the mobile unit should be able to calculate the cellular distance from these codes (ID). In this paper the authors propose a method for cell ID assignment based on real geographic location of BTS in GPS system. The achieved IDs are then used for applying the distance based method for location management. We have also tested the performance of this method by simulation of a real cellular network in city of Yasuj, province of Kohkiluyeh in Iran. Manuscript profile
      • Open Access Article

        22 - Fault Location Algorithm in Practical Radial Distribution Systems Based on Voltage and Current Recorded by Digital Fault Recorders
        S.  Jamali V. Talavat
        This paper presents a new impedance based fault location algorithm for practical radial distribution systems. The algorithm uses the fundamental components of voltages and currents recorded by a digital fault recorder usually installed at the head of main feeders. At f More
        This paper presents a new impedance based fault location algorithm for practical radial distribution systems. The algorithm uses the fundamental components of voltages and currents recorded by a digital fault recorder usually installed at the head of main feeders. At first, the algorithm estimates the average loading and power factor of distribution transformers by using the pre-fault voltage and current phasors. Then from the post-fault voltage and current phasors, the preliminary candidates for fault location are determined by searching all the feeder sections. Finally, the actual fault location is determined by checking operated fuses/sectionalizers, or fault indicators. The fault location method has been developed as a software package named DFL (Digital Fault Locator) in “Electricity Networks Protection and Automation” research laboratory of Iran University of Science and Technology (IUST). The accuracy of the proposed algorithm has been validated by several fault conditions carried out on a 205-node 20 kV practical radial distribution feeder. The results of the developed software have shown very remarkable accuracy in fault location as presented in the paper. Manuscript profile
      • Open Access Article

        23 - A New Method for Locating Unknown Number of Emitters: Combination of Multiple Hypothesis Tracking and Data Association
        S. V. Shojaedini R. Kabiri
        In this paper a new method is proposed for separation and geolocation of moving emitters using their radiated signal which has no assumption about their numbers, positions and signal types. In the first step of the proposed method, all available signals in a scene are r More
        In this paper a new method is proposed for separation and geolocation of moving emitters using their radiated signal which has no assumption about their numbers, positions and signal types. In the first step of the proposed method, all available signals in a scene are received using several sensors. In the second step a vector of time differences of arrivals between the signal received by each sensor and signal received by the reference sensor is extracted and two spaces of TDOA vectors are constructed for successive time slots. Finally a combination of multiple hypothesis tracking and data association algorithms are applied to extract and confirm meaningful strings of vectors from successive TDOA vector spaces that each string indicates an emitter. Obtained results from evaluation of the proposed method and comparing them with results obtained from existing methods, show that it can separate and track several emitters with linear, nonlinear, constant velocity and variable velocity motions. Also the proposed method shows an acceptable ability to separate and track emitters with parallel and intersecting trajectories and maneuvering emitters with greater performance than existing methods and without losing processing speed. Manuscript profile
      • Open Access Article

        24 - Risk-based Static and Dynamics Security Assessment and Its Enhancement with Particle Swarm Optimization Generation Realloca
        M.  Saeedi H. Seifi
        Security assessment is traditionally checked using a deterministic criterion. Based on that, the system may be considered as secured or unsecured. If an unsecured condition is detected, preventive actions are foreseen to make it secure. Recently, risk based security as More
        Security assessment is traditionally checked using a deterministic criterion. Based on that, the system may be considered as secured or unsecured. If an unsecured condition is detected, preventive actions are foreseen to make it secure. Recently, risk based security assessment is used in power systems. In this paper, risk-based static and dynamic security assessment is proposed and a new transient stability index is defined. In this paper, the risk index is used as an objective function in the generation reallocation algorithm. In this algorithm, the security is maintained using the generation reallocation. The algorithm is tested on IEEE 24-bus test system and its capabilities are assessed in comparison with a traditional OPF, in which the security is maintained based on a deterministic criterion. Particle Swarm Optimization (PSO) algorithm is used as the optimization tool. Manuscript profile
      • Open Access Article

        25 - Asymptotically Optimal Online Solutions for Energy Harvesting Communication Systems
        M. Mohassel Feghhi A. Abbasfar
        Energy harvesting (EH) has emerged as a promising technique for green communications and it is a novel technique to prolong the lifetime of the wireless networks with replenishable nodes. In this paper, we investigate the online resource allocation for a large class of More
        Energy harvesting (EH) has emerged as a promising technique for green communications and it is a novel technique to prolong the lifetime of the wireless networks with replenishable nodes. In this paper, we investigate the online resource allocation for a large class of objective functions in the EH communication systems, which are asymptotically optimal. It is shown that the solution is obtained by only considering the average EH pattern, irrespective of its stochastic dynamics. This optimal solution neither has the complexity of dynamic programming solutions, nor uses the non-causal knowledge about EH pattern. Also, some practical numerical examples for objective functions, which are utilized in communication systems, are considered and general results are derived for them. Moreover, simulation results validate our theoretical findings and show the accuracy of asymptotic theoretical curves for the transmission periods, which are used in practice. Manuscript profile
      • Open Access Article

        26 - Fault Location in Distribution Networks Using a Combination of Impedance Base Method and Voltage Sag
        Mohammad Daisy R. Dashti
        Load taps, laterals, and sub laterals are different branches of power distribution (PD) networks. In PD systems, reliability indices and their efficiency are improved using an accurate method in fault locating. In this paper, a new combined method for locating single, d More
        Load taps, laterals, and sub laterals are different branches of power distribution (PD) networks. In PD systems, reliability indices and their efficiency are improved using an accurate method in fault locating. In this paper, a new combined method for locating single, double and three phase faults to ground is proposed in PD networks. In this article, for finding the possible fault locations, an impedance based fault-location algorithm is used. Then, for determining the faulty section, the new method is proposed using voltage sag matching algorithm. In this method, the possible fault locations are determined, after occurrence of single and double phase faults to ground, using an algorithm which is impedance based fault-location algorithm. Separately, the same fault is simulated in possible locations. Then, at the beginning of a feeder, the voltage is saved and the amplitude and angle of the voltage differences are determined and accordingly, an online data bank is generated. Then, the obtained and recorded amplitude and angle of the voltage differences (at the beginning of the feeder) is compared with that data bank, for the actual fault. By the matching value of each possible fault location, the real location of fault is determined. Compared to the other counterparts, the proposed method is more accurate in locating faults and less sensitive to the fault resistance. Manuscript profile
      • Open Access Article

        27 - Power Control and Subchannel Allocation in OFDMA Macrocell-Femtocells Networks
        H. Davoudi M. Rasti
        Heterogeneous networks, including macrocell and femtocell, cause to increase network capacity. Also, they improve quality of offers services to users in cellular networks. Common subchannel allocation among different tier users, make cross-tier interference among users. More
        Heterogeneous networks, including macrocell and femtocell, cause to increase network capacity. Also, they improve quality of offers services to users in cellular networks. Common subchannel allocation among different tier users, make cross-tier interference among users. Since macrocell users have priority to femtocell ones, presence of femtocell users should not prevent macrocell users to access minimum quality-of-service. In this paper, a power control and subchannel allocation scheme in downlink transmission an orthogonal frequency division multiple access (OFDMA) based two tier of macrocell and femtocell is proposed, aiming the maximization of femtocell users total data rate, in which the minimum QOS for all macrocell users and femtocell delay-sensitive users is observed. In macrocell tier, two different problems are considered. The first problem aim to maximizing the total threshold of tolerable cross-tier interference for macrocell users and the second problem’s goal is minimizing the macrocell’s total transmission power. For the femtocell tier, maximizing the users total data rate is the objective. Hungrian method, an assignment optimization method, is used for solving the first problem in macrocell tier. Moreover, in order to solve the second problem a heuristic method for subchannel allocation is proposed and dual Lagrange method is used for power control. In addition, in order to solve the problem for femtocell tier, a heuristic method is used for subchannel allocation. Subsequently, a dual Lagrange method which is one of the convex optimization problem solver is used, so that we can control the power. Finally, an extend simulations are performed to validate the performance of the proposed method. Manuscript profile
      • Open Access Article

        28 - A Load Balancing Scheme by D2D-Based Relay Communications in Heterogeneous Networks Signals
        shahriar gholami mehrabadi yasser attar izi soroush akhlaghi
        Heterogeneous networks have been regarded as an integral part of fifth generation communication networks in order to respond to the unprecedented growth of required data rates. In such networks, the existence of a variety of cells with base stations of varying capacitie More
        Heterogeneous networks have been regarded as an integral part of fifth generation communication networks in order to respond to the unprecedented growth of required data rates. In such networks, the existence of a variety of cells with base stations of varying capacities and transmit powers has enabled the repeated use of available bandwidth. Moreover, the excess load on the central base station can be directed to the sub-cell base stations. In the current work, a novel approach is proposed for such a load balancing problem in which some nodes previously connected to the main base station can be served by sub-cells through the use of some D2D relays. This will increase the overall network capacity, improve the quality of service (QoS) of cell edge users, and increase covered users. In this design, the maximization of the capacity of D2D links is formulated as an optimization problem which is not convex in general. To tackle this, the main problem is divided into two sub-problems of optimal resource allocation and user-relay pairing problems with much lower complexity. Simulation results demonstrate the superiority of the proposed method over existing works addressed in the literature. Manuscript profile
      • Open Access Article

        29 - A Hybrid Method for Transmission Cost Allocation Based on Effect of Transmission Facilities in System Reliability and Merchant Value
        Hassan Esmaili علی  کریمی
        With the advent of electricity markets and the creation of a competitive environment in power systems, proper allocation of transmission cost among network users (consumers and producers) is essential to help the investment of transmission network, effectively. In this More
        With the advent of electricity markets and the creation of a competitive environment in power systems, proper allocation of transmission cost among network users (consumers and producers) is essential to help the investment of transmission network, effectively. In this paper, a hybrid method for transmission cost allocation based on the effect of transmission facilities in system reliability and their merchant value is proposed. In the proposed method, first, the users' benefit in the electricity market and in other words, the merchant benchmark in cost allocation has considered. Second, cost allocation considering the effect of facilities in system reliability which are consist of factors of system security and adequacy and the benefit of users with these factors is done. For the implementation of the proposed method, the capacity of all facilities includes lines and transformers are divided into four sections consist of merchant capacity, contingency capacity for maintaining security, future capacity for maintaining adequacy and invalid capacity. The numerical results in a 3-bus and the IEEE 30-bus test system are presented to demonstrate the effectiveness of the proposed method and compare to other methods. Manuscript profile
      • Open Access Article

        30 - Outage Power Cost Calculation and Optimal Interruption Allocation to the Customers
        Mahdi Khajeh Rezaei Gh. yousefi   Ebrahim Shayesteh
        In power systems operation, interruptions occur due to various reasons such as faults and inadequacy of generation. Load shedding allocation with respect to operation costs and security, customers’ type and their behavior is the main challenge of this paper. In this res More
        In power systems operation, interruptions occur due to various reasons such as faults and inadequacy of generation. Load shedding allocation with respect to operation costs and security, customers’ type and their behavior is the main challenge of this paper. In this research a new procedure for load shedding allocation with respect to the “load shedding history” of each customer is presented. In this research a new coefficient, called endurance coefficient, is introduced. The customers declare their dependency to electricity via sending their endurance coefficients to the power system operator (ISO).A new method is proposed in this paper in which the customers get paid according to the mentioned coefficient, if load shedding occurs. For validation of the proposed method, different scenarios on IEEE RTS 24-bus test grid is studied and numerical results show effectiveness of the proposed method. Manuscript profile
      • Open Access Article

        31 - Optimal Resource Allocation in Multi-Task Software-Defined Sensor Networks
        S. A. Mostafavi M. Agha Sarram T. Salimian
        Unlike conventional wireless sensor networks which are designed for a specific application, Software-Defined Wireless Sensor Networks (SDSN) can embed multiple sensors on each node, defining multiple tasks simultaneously. Each sensor node has a virtualization program wh More
        Unlike conventional wireless sensor networks which are designed for a specific application, Software-Defined Wireless Sensor Networks (SDSN) can embed multiple sensors on each node, defining multiple tasks simultaneously. Each sensor node has a virtualization program which serves as a common communication infrastructure for several different applications. Different sensor applications in the network can have different target functions and decision parameters. Due to the resource constraints of sensor network nodes, the multiplicity and variety of tasks in each application, requirements for different levels of quality of service, and the different target functions for different applications, the problem of allocating resources to the tasks on the sensors is complicated. In this paper, we formulate the problem of allocating resources to the sensors in the SDSN with different objective functions as a multi-objective optimization problem and provide an effective solution to solve it. Manuscript profile
      • Open Access Article

        32 - An Efficient Approach for Resource Allocation in Fog Computing Considering Request Congestion Conditions
        Samira Ansari Moghaddam سميرا نوفرستي مهري رجايي
        Cloud data centers often fail to cope with the millions of delay-sensitive storage and computational requests due to their long distance from end users. A delay-sensitive request requires a response before its predefined deadline expires, even when the network has a hig More
        Cloud data centers often fail to cope with the millions of delay-sensitive storage and computational requests due to their long distance from end users. A delay-sensitive request requires a response before its predefined deadline expires, even when the network has a high load of requests. Fog computing architecture, which provides computation, storage and communication services at the edge of the network, has been proposed to solve these problems. One of the fog computing challenges is how to allocate cloud and fog nodes resources to user requests in congestion conditions to achieve a higher acceptance rate of user requests and minimize their response time. Fog nodes have limited storage and computational power, and hence their performance is significantly reduced due to high load of user requests. This paper proposes an efficient resource allocation method in fog computing that decides where (fog or cloud) to process the requests considering the available resources of fog nodes and congestion conditions. According to the experimental results, the performance of the proposed method is better compared with existing methods in terms of average response time and percentage of failed requests. Manuscript profile
      • Open Access Article

        33 - Detector Design & Power Allocation of Frequency Diverse Phased Multi Input Multi Output Radar within Nonhomogeneous Environments
        Hamid Reza  Fotoohi Firouzabad Seyed Mehdi Hosseini Andargoli Hossein  Ghanei Yakhdan J. Abouei
        In recent years, Phased-Multiple-Input, Multiple-Output radars (PMRs) have attracted great interest. PMR can combine the advantages of both MIMO radar and phased array radar. Here, PMR transmits orthogonal signals from all subarrays to provide both waveform frequency di More
        In recent years, Phased-Multiple-Input, Multiple-Output radars (PMRs) have attracted great interest. PMR can combine the advantages of both MIMO radar and phased array radar. Here, PMR transmits orthogonal signals from all subarrays to provide both waveform frequency diversity and high coherent processing gain. In this paper dealt with detector design in the presence of heterogeneous clutter based on the unknown scattering coefficients for PMR. Then, detection probability and false-alarm probability are computed based on the derived optimum detector. At the end, the power allocation problem is investigated analytically. The numerical simulations show that obtained optimal detector is joint spatial-temporal filter, which, the clutters are effectively weakened in PMR. Furthermore, simulation results illustrate that proposed power allocation algorithm improve detection performance of PMR in comparison with PR and equal power PMR. Manuscript profile
      • Open Access Article

        34 - Sum Rate and Energy Efficiency Maximization in a Cognitive Radio Network with a Successive Relay Primary User
        elahe maddah Mohammad lari
        In this paper, we propose a cognitive radio network which consists of a number of secondary users and one primary user. The primary user utilized a successive relay performance. The successive relaying technique creates a full duplex relay performance by two half duplex More
        In this paper, we propose a cognitive radio network which consists of a number of secondary users and one primary user. The primary user utilized a successive relay performance. The successive relaying technique creates a full duplex relay performance by two half duplex relays, which improves spectral efficiency. In the presence of secondary users, we use successive relay technique in the primary user to ensure its acceptable performance. Also, the sum rate of secondary users is increased. The challenges of this network are inter-relay interference and inter user interference. The interference alignment method is utilized to eliminate the interferences in the successive relay technique and in the cognitive radio network. Besides, the minimum transmitted power of the primary user is derived to guarantee its quality of service requirement. Two power allocations algorithms are proposed to maximize the sum rate of secondary users and the energy efficiency of the network. In both power allocations algorithms, satisfying the quality of service of the primary user is considered. The closed-form solutions of these algorithms are studied. The fractional programing approach was employed to solve the energy efficiency optimization in two steps. Manuscript profile
      • Open Access Article

        35 - High Level Synthesis of Decimal Arithmetic on Coarse Grain Reconfigurable Architectures
        Samaneh Emami
        The increasing capabilities of integrated circuits and the complexity of applications have led hardware design methods and tools to higher levels of abstraction and high-level synthesis is one of the key steps in increasing the level of abstraction. In recent years, ext More
        The increasing capabilities of integrated circuits and the complexity of applications have led hardware design methods and tools to higher levels of abstraction and high-level synthesis is one of the key steps in increasing the level of abstraction. In recent years, extensive research has been conducted on the design of decimal arithmetic reconfigurable architectures. Since, on the one hand, the effective use of these architectures depends on the existence of appropriate algorithms and tools to implement the design on the hardware, and on the other hand, research on the development of these algorithms has been very limited, this paper will present methods for the automated synthesis of decimal arithmetic circuits on a coarse-grained reconfigurable architecture. The platform chosen to execute the proposed algorithms is the DARA coarse-grained reconfigurable architecture, which is optimized for decimal arithmetic. The algorithms proposed for resource allocation of synthesis include a heuristic method and an ILP algorithm. The results show that, as expected, for the limited architectural dimensions used, the ILP algorithm performs significantly (about 30%) better than the heuristic algorithm. Manuscript profile
      • Open Access Article

        36 - A comparison of construction and location of mosques of the early Islamic period and mosques of the Qajar period based on Quran verses
        هانیه  اخوت
        The mosque is a subject that the Quran has dealt with in a comprehensive manner. One of the aspects of mosque emphasis in the Quran that has received less attention is the issue of construction and location of mosques. This article has been written using the method of d More
        The mosque is a subject that the Quran has dealt with in a comprehensive manner. One of the aspects of mosque emphasis in the Quran that has received less attention is the issue of construction and location of mosques. This article has been written using the method of descriptive-analytical research and by selecting a case study of the early mosques of the Islamic period and mosques of the Qajar period in Iran. This article has been prepared with the aim of comparative study of two different periods of mosque construction in Iran and also the evolution of their construction based on Quranic verses and Islamic traditions. To analyze the subject, 8 principles of mosque construction were extracted from Quranic verses and Islamic narration, and then the extent and manner of the effect of the extracted principles on the mosques of the Islamic period and Qajar mosques were measured and finally comparatively examined. Based on the results of the research, the Quranic principles of mosque construction were classified into 8 principles, all of which were observed in the samples of early Islamic mosques. If in the mosques of the Qajar period, 4 principles have been observed, which include stability and strength (even in this case, the use of lower quality materials and the use of rapid construction techniques, the strength of mosques compared to previous periods and to Especially in the early Islamic period. Manuscript profile
      • Open Access Article

        37 - Basics and criteria for locating the network of passenger terminals in the city
        Mohammad  Ahmadi ali aram
        One of the most important categories in urban planning is the appropriate location for the establishment of urban services and uses. This means that different urban activities need their own space and it is not possible to deploy them in every urban area. This is possib More
        One of the most important categories in urban planning is the appropriate location for the establishment of urban services and uses. This means that different urban activities need their own space and it is not possible to deploy them in every urban area. This is possible by considering the characteristics of the uses and how they relate to other urban uses. Among the important urban uses are suburban and inner-city passenger terminals. In urban planning, determining the appropriate location for the establishment of urban uses is one of the important and effective issues. Among the important uses are passenger terminals. Due to the increase in population and volume of traffic in cities and as a result of their expansion, the traditional conditions governing the establishment of this function have been associated with many problems. Economic, social, climatic, traffic, etc. requirements are among the items that should be considered in determining the appropriate location of this user. The purpose of this study is to investigate the location of the network of passenger terminals for intra-city passenger transportation. The results of previous research in Iran show that in locating existing terminals and spatial desirability and compatibility of activities have not been properly considered. In conclusion, some suggestions for solving existing problems and modifying location patterns have been suggested. Manuscript profile
      • Open Access Article

        38 - A Multi-Objective Differential Evolutionary Algorithm-based Approach for Resource Allocation in Cloud Computing Environment
        Saeed Bakhtiari Mahan Khosroshahi
        In recent years, the cloud computing model has received a lot of attention due to its high scalability, reliability, information sharing and low cost compared to separate machines. In the cloud environment, scheduling and optimal allocation of tasks affects the effectiv More
        In recent years, the cloud computing model has received a lot of attention due to its high scalability, reliability, information sharing and low cost compared to separate machines. In the cloud environment, scheduling and optimal allocation of tasks affects the effective use of system resources. Currently, common methods for scheduling in the cloud computing environment are performed using traditional methods such as Min-Min and meta-heuristic methods such as ant colony optimization algorithm (ACO). The above methods focused on optimizing one goal and do not estimate multiple goals at the same time. The main purpose of this research is to consider several objectives (total execution time, service level agreement and energy consumption) in cloud data centers with scheduling and optimal allocation of tasks. In this research, multi-objective differential evolution algorithm (DEA) is used due to its simple structure features and less adjustable parameters. In the proposed method, a new approach based on DEA to solve the problem of allocation in cloud space is presented which we try to be effective in improving resource efficiency and considering goals such as time, migration and energy by defining a multi-objective function and considering mutation and crossover vectors. The proposed method has been evaluated through a CloudSim simulator by testing the workload of more than a thousand virtual machines on Planet Lab. The results of simulation show that the proposed method in comparison with IqrMc, LrMmt and FA algorithms, in energy consumption by an average of 23%, number of migrations by an average of 29%, total execution time by an average of 29% and service level agreement violation (SLAV) by an average of 1% has been improved. In this case, use of the proposed approach in cloud centers will lead to better and appropriate services to customers of these centers in various fields such as education, engineering, manufacturing, services, etc. Manuscript profile
      • Open Access Article

        39 - A New Power Allocation Optimization for One Target Tracking in Widely Separated MIMO Radar
        Mohammad Akhondi Darzikolaei Mohammad Reza Karami-Mollaei Maryam Najimi
        In this paper, a new power allocation scheme for one target tracking in MIMO radar with widely dispersed antennas is designed. This kind of radar applies multiple antennas which are deployed widely dispersed from each other. Therefore, a target is observed simultaneousl More
        In this paper, a new power allocation scheme for one target tracking in MIMO radar with widely dispersed antennas is designed. This kind of radar applies multiple antennas which are deployed widely dispersed from each other. Therefore, a target is observed simultaneously from different uncorrelated angles and it offers spatial diversity. In this radar, a target’s radar cross section (RCS) is different in each transmit-receive path. So, a random complex Gaussian RCS is supposed for one target. Power allocation is used to allocate the optimum power to each transmit antenna and avoid illuminating the extra power in the environment and hiding it from interception. This manuscript aims to minimize the target tracking error with constraints on total transmit power and the power of each transmit antenna. For calculation of target tracking error, the joint Cramer Rao bound for a target velocity and position is computed and this is assumed as an objective function of the problem. It should be noted that a target RCS is also considered as unknown parameter and it is estimated along with target parameters. This makes a problem more similar to real conditions. After the investigation of the problem convexity, the problem is solved by particle swarm optimization (PSO) and sequential quadratic programming (SQP) algorithms. Then, various scenarios are simulated to evaluate the proposed scheme. The simulation results validate the accuracy and the effectiveness of the power allocation structure for target tracking in MIMO radar with widely separated antennas. Manuscript profile
      • Open Access Article

        40 - Improving resource allocation in mobile edge computing using gray wolf and particle swarm optimization algorithms
        seyed ebrahim dashti saeid shabooei
        Mobile edge computing improves the experience of end users to achieve appropriate services and service quality. In this paper, the problem of improving resource allocation when offloading tasks based on mobile devices to edge servers in computing systems was investigate More
        Mobile edge computing improves the experience of end users to achieve appropriate services and service quality. In this paper, the problem of improving resource allocation when offloading tasks based on mobile devices to edge servers in computing systems was investigated. Some tasks are processed locally and some are offloaded to edge servers. The main issue is that the offloaded tasks for virtual machines in computing networks are properly scheduled to minimize computing time, service cost, computing network waste, and the maximum connection of a task with the network. In this paper, it was introduced using the hybrid algorithm of particle swarm and gray wolf to manage resource allocation and task scheduling to achieve an optimal result in edge computing networks. The comparison results show the improvement of waiting time and cost in the proposed approach. The results show that, on average, the proposed model has performed better by reducing the work time by 10% and increasing the use of resources by 16%. Manuscript profile
      • Open Access Article

        41 - Machine Learning-Based Security Resource Allocation for Defending against Attacks in the Internet of Things
        Nasim Navaei Vesal Hakami
        Nowadays, the Internet of Things (IoT) has become the focus of security attacks due to the limitation of processing resources, heterogeneity, energy limitation in objects, and the lack of a single standard for implementing security mechanisms. In this article, a solutio More
        Nowadays, the Internet of Things (IoT) has become the focus of security attacks due to the limitation of processing resources, heterogeneity, energy limitation in objects, and the lack of a single standard for implementing security mechanisms. In this article, a solution will be presented for the problem of security resources allocating to deal with attacks in the Internet of Things. Security Resource Allocation (SRA) problem in the IoT networks refers to the placement of the security resources in the IoT infrastructure. To solve this problem, it is mandatory to consider the dynamic nature of the communication environments and the uncertainty of the attackers' actions. In the traditional approaches for solving the SRA, the attacker works over based on his assumptions about the system conditions. Meanwhile, the defender collects the system's information with prior knowledge of the attacker's behavior and the targeted nodes. Unlike the mentioned traditional approaches, this research has adopted a realistic approach for the Dynamic Security Resources Allocation in the IoT to battle attackers with unknown behavior. In the stated problem, since there is a need to decide on deploying several security resources during the learning periods, the state space of the strategies is expressed in the combinatorial form. Also, the SRAIoT problem is defined as a combinatorial-adversarial multi-armed bandit problem. Since switching in the security resources has a high cost, in real scenarios, this cost is included in the utility function of the problem. Thus, the proposed framework considers the switching cost and the earned reward. The simulation results show a faster convergence of the weak regret criterion of the proposed algorithms than the basic combinatorial algorithm. In addition, in order to simulate the IoT network in a realistic context, the attack scenario has been simulated using the Cooja simulator. Manuscript profile
      • Open Access Article

        42 - An Intelligent Pricing System for Cloud Services aims at Increasing Implementation Simplicity and Flexibility
        Mahboubeh Zandieh Sepideh Adabi Samaneh Yazdani
        Most of the previous pricing models for cloud resources which are defined based on auction suffer from high implementation complexity in real cloud environments. Therefore, the main challenge for researchers is to design dynamic pricing models that can achieve three goa More
        Most of the previous pricing models for cloud resources which are defined based on auction suffer from high implementation complexity in real cloud environments. Therefore, the main challenge for researchers is to design dynamic pricing models that can achieve three goals: 1) low computation complexity, 2) high accuracy, and 3) high implementation simplicity in real cloud environments. CMM (Cloud Market Maker) is one of the most popular dynamic pricing models that has two advantages of computation accuracy and the possibility to implement in the real cloud environments. This model calculates the bid price based on a linear function. In designing this linear function, the parameters: buyer’s urgency, number of competitors and number of opponents are considered. Despite the advantages of this pricing function, the importance ratio of the constructor parameters of it is considered the same in various market conditions. Ignoring this issue reduces both system flexibility and computation accuracy in tangible changes in the cloud market. Therefore, the authors of this paper focus on designing a new cloud market-aware intelligent pricing system (which developed in customer side of the market) to tackle the mentioned problem. At the same time, high implementation simplicity of the proposed system should be guaranteed. For this purpose, an agent-based intelligent pricing system by combining support vector machine (SVM) and hierarchical analysis process (AHP) techniques is proposed. Simulation results show the better performance of the proposed solution which is named as DPMA in comparison to CMM. Manuscript profile
      • Open Access Article

        43 - The effect of ethnic identity and the geographical location of the house on the academic performance of students
        Saed   Abadian
        Ethnicity refers to a group that is distinguished from other social groups that have racial continuity and correlation with basic anatomical features such as religion, religion, language, customs and historical and cultural heritage. These factors cause a person to use More
        Ethnicity refers to a group that is distinguished from other social groups that have racial continuity and correlation with basic anatomical features such as religion, religion, language, customs and historical and cultural heritage. These factors cause a person to use them to establish a relationship with other ethnic groups or individuals and groups. Ethnicity has both subjective and objective components, which include: subjective interest and awareness of identity, belonging, common resources, Common interests, objective cultural commonalities in the language of the historical history of religion and the common land. Set against the backdrop of a politically motivated ethnic hatred between the northern region and the rest, this study shows the relationship between students' regions of origin and their academic performance in world higher education to help support students' appropriate support and healthy study habits. The thematic analysis of the researchers' data showed that students believe that effort is more important in academic performance regardless of the region of origin. Implications for educational policy that utilize healthy study habits to increase student achievement, retention, and self-efficacy around success are discussed. Manuscript profile
      • Open Access Article

        44 - Using Fuzzy Values in the Whale Method to Solve the Problem of Locating Terminal Locations
        Mehdi  Fazli haasan hoseinzadeh
        In this article, fuzzy values are used in the meta-heuristic method to locate the location of the terminal facility. This article is written based on a modern method inspired by nature called Whale Algorithm and it is tested on scientific optimization problems and model More
        In this article, fuzzy values are used in the meta-heuristic method to locate the location of the terminal facility. This article is written based on a modern method inspired by nature called Whale Algorithm and it is tested on scientific optimization problems and modeling problems. To evaluate the performance of the proposed method, fuzzy coefficients have been applied to solve the location allocation problem, in such a way that the hypotheses of the problem, fuzzy random variables and the capacity of each center are considered unlimited. According to the results of this research, the problem of locating the terminal locations is practically solved and the optimal location of these facilities is proposed in the real world. Also, the numerical optimization results show that the proposed method has a better performance than similar methods Manuscript profile
      • Open Access Article

        45 - Determining the Location of Lightning Strike Using Electromagnetic Time Reversal (EMTR) Method and Machine Learning
        Abbas Hamedooni Asli m.h. m.
        <p>Determining the location of lightning strikes (LLS) is one of today's challenges in various fields, especially in the fields of electricity and electronics. To determine the location of the lightning strike, classical methods were used previously; however, the use of More
        <p>Determining the location of lightning strikes (LLS) is one of today's challenges in various fields, especially in the fields of electricity and electronics. To determine the location of the lightning strike, classical methods were used previously; however, the use of electromagnetic time reversal (EMTR) method has also become popular recently. According to the calculation of the complete waveform of the field using the EMTR method, the accuracy in determining the location of the lightning strike has significantly increased compared to the traditional methods. In the electromagnetic time reversal method with the help of finite difference time domain (FDTD), the transient electromagnetic field produced by the lightning channel is calculated first. After the time reversal of the wave, it is re-emitted from the sensor or sensors to its source and again with the help of FDTD, The re-emission electromagnetic field in the desired environment is calculated. With the electromagnetic field of the environment, using criteria (such as maximum field amplitude, maximum energy and entropy, etc.), the location of the lightning strike is determined. In traditional methods, it is quite difficult to determine the uniqueness of the final response in environments with different characteristics, and the use of at least three sensors is mandatory. In this paper, to overcome these limitations, a method based on the combination of machine learning and three-dimensional EMTR (3D-FDTD) is proposed to determine the lightning strike location. First, the three-dimensional time domain finite difference method is used to calculate the electromagnetic field of the environment and using EMTR, the back-diffusion electromagnetic field (again with the help of 3D-FDTD) is calculated in the entire environment. In this way, the necessary data for the production of RGB image profiles is prepared. Then VGG19, a pre-trained convolutional neural network (CNN), is used to extract image features. Finally, a fitting layer is used to determine the location of the lightning strike. The proposed method is simulated and implemented in MATLAB and Python, and the results show the effectiveness of the proposed method to determine the location of lightning strikes in a three-dimensional environment without requiring the use of at least three sensors.</p> Manuscript profile
      • Open Access Article

        46 - Improving IoT resource management using fog calculations and ant lion optimization algorithm
        payam shams Seyedeh Leili Mirtaheri reza shahbazian ehsan arianyan
        In this paper, a model based on meta-heuristic algorithms for optimal allocation of IoT resources based on fog calculations is proposed. In the proposed model, the user request is first given to the system as a workflow; For each request, the resource requirements (proc More
        In this paper, a model based on meta-heuristic algorithms for optimal allocation of IoT resources based on fog calculations is proposed. In the proposed model, the user request is first given to the system as a workflow; For each request, the resource requirements (processing power, storage memory, and bandwidth) are first extracted. This component determines the requested traffic status of the application in terms of real-time. If the application is not real-time and is somewhat resistant to latency, the request will be referred to the cloud environment, but if the application needs to respond promptly and is sensitive to latency, it will be dealt with as a fog calculation. It will be written to one of the Cloudletes. In this step, in order to select the best solution in allocating resources to serve the users of the IoT environment, the ant milk optimization algorithm was used. The proposed method is simulated in MATLAB software environment and to evaluate its performance, five indicators of fog cells energy consumption, response time, fog cell imbalance, latency and bandwidth have been used. The results show that the proposed method reduces the energy consumption, latency rate in fog cells, bandwidth consumption rate, load balance rate and response time compared to the base design (ROUTER) 22, 18, 12, 22 and 47, respectively. Percentage has improved. Manuscript profile
      • Open Access Article

        47 - Syntagmatic and Paradigmatic of the semantic field of the word chastity in the holy Qur'an and hadiths
        azam moazeni Sayyed Hussein  Roknoddini
        In explaining semantics of the word chastity in the holy Qur'an and hadiths, chastity implies a kind of restraint and continence performing a forbidden and ugly act or begging and unnecessary request with action with certain limits. The present study is filled w More
        In explaining semantics of the word chastity in the holy Qur'an and hadiths, chastity implies a kind of restraint and continence performing a forbidden and ugly act or begging and unnecessary request with action with certain limits. The present study is filled with statistical method – quantitatively and linguistic context in appropriate verses and traditions based on the concept of chastity with other concepts relevant to this term while using descriptive - analytic method in addition to establish the position of modesty in connection with the concepts of Qur'an and traditions ,has recognized certain words and related lexemes to morality It is widely stated with different functions. Collocations in two categories of mutual context and non-synonymous words reviewed and words rape, greed, lust, begging, signs of Islam and Shiism, zeal wisdom and the best worship was, and words restraint, refusal ,patience and retention in some ways they are some of the expressions used as substituents for chastity. But the word chastity preferable to substitute words in order to express the concept comprehensively and restrictively.. Manuscript profile
      • Open Access Article

        48 - Improving Resource Allocation in Mobile Edge Computing Using Particle Swarm and Gray Wolf Optimization Algorithms
        seyed ebrahim dashti saeid shabooei
        Mobile edge computing improves the experience of end users to achieve appropriate services and service quality. In this paper, the problem of improving resource allocation, when offloading tasks, based on mobile devices to edge servers in computing systems is investigat More
        Mobile edge computing improves the experience of end users to achieve appropriate services and service quality. In this paper, the problem of improving resource allocation, when offloading tasks, based on mobile devices to edge servers in computing systems is investigated. Some tasks are uploaded and processed locally and some to edge servers. The main issue is that the offloaded tasks for virtual machines in computing networks are properly scheduled to minimize computing time, service cost, computing network waste, and the maximum connection of a task with the network. In this paper, a multi-objective hybrid algorithm of particle swarm and gray wolf was introduced to manage resource allocation and task scheduling to achieve an optimal result in edge computing networks. Local search in the particle swarm algorithm has good results in the problem, but it will cause the loss of global optima, so in this problem, in order to improve the model, the gray wolf algorithm was used as the main basis of the proposed algorithm, in the wolf algorithm Gray, due to the graphical approach to the problem, the set of global searches will reach the optimal solution, so by combining these functions, we tried to improve the operational conditions of the two algorithms for the desired goals of the problem. In order to create a network in this research, the network creation parameters in the basic article were used and the LCG data set was used in the simulation. The simulation environment in this research is the sim cloud environment. The comparison results show the improvement of waiting time and cost in the proposed approach. The results show that, on average, the proposed model has performed better by reducing the work time by 10% and increasing the use of resources by 16%. Manuscript profile