فهرست مطالب

Information and Communication Technology Research - Volume:12 Issue: 2, Spring 2020

International Journal Information and Communication Technology Research
Volume:12 Issue: 2, Spring 2020

  • تاریخ انتشار: 1400/04/15
  • تعداد عناوین: 6
|
  • Hadi Aghaee, Bahareh Akhbari* Pages 1-10

    In this paper, we aim to study a -user quantum multiple access wiretap channel with an arbitrary number of wiretappers under one-shot setting. In this regard, we first introduce the general quantum multiple access wiretap channel and the simplified proposed channel. Then, we calculate an achievable secrecy rate region for the main channel with two users. The encoding process uses the superposition and wiretap coding techniques, and the decoding technique is based on the simultaneous decoder. Also, Convex splitting is used to satisfy security requirements. At last, we extend the results to the l-user case.

    Keywords: Quantum Channel, Wiretap Channel, Hypothesis Testing Mutual Information, Secrecy Rate Region, Multiple Access Channel
  • Hamidreza Bakhshi*, Armin Farhadi Pages 11-21

    In this paper, downlink user association, codebook assignment, and power allocation for a Sparse Code Multiple Access (SCMA)-based communication in Cloud Radio Access Network (C-RAN) are interrogated. The main aim of this paper is to accomplish a three-step resource allocation algorithm to achieve the maximum total sum rate subject to SCMA, user association, minimum user power, total available power in Radio Remote Head (RRH), and fronthual constraints with low complexity. To solve the recommended problem an iterative algorithm considering Successive Convex Approximation is utilized. The main problem is separated into three subproblems of user association, codebook assignment, and power allocation. The user association and codebook assignment subproblems are Integer Linear Programming and solved with CVX toolbox. Furthermore, to solve the power allocation subproblem, Successive Convex Approximation with Low Complexity is applied. In the simulation results, the effectiveness of the recommended resource allocation method is shown and compared to OFDMA.

    Keywords: Resource Allocation, C-RAN, SCMA, 5G, Optimization
  • Mohsen Gerami*, Abdullah Sahifa Pages 22-34

    The purpose of this study is to implement intrusion detection systems to detect phishing in the country's banking industry. In the present study, the neural-fuzzy inference system for the implementation of intrusion detection systems for phishing detection in the banking industry using the approach of artificial neural networks and fuzzy system, presented under the title PHISHING.IDS + by ANIS program.

    Keywords: Intrusion Detection Systems (IDS), Phishing, The country's banking industry, Artificial Neural Networks, Distributed intrusion detection
  • Maryam Tayefeh Mahmoudi*, Sayyed Hamid Reza Ahmadi, Morteza Ebrahimi Pages 35-45

    Recent emerging technologies have demonstrated a great ability in enhancing the language learning performance in general and vocabulary learning in particular. In this respect, technologies such as Internet of Things (IoT) and Augmented Reality (AR) can make the educational systems more attractive, and thus have enormous positive effect on enhancing the learning performance for young beginners with regard to new vocabularies. In this paper, a color-sensing approach is proposed for supporting vocabulary learning in children using AR and IoT. To facilitate the users' interaction with the system, a tangible user interface capable of visualizing AR concepts is developed. Children can point the color sensor to real world colors and then are provided with the corresponding animations and multimedia content that teaches colors in Spanish language. By conducting experiments on elementary school children, the impact on pupils performance in learning Spanish language vocabularies is assessed using Paired T-Test. Moreover, the usability and accuracy of the proposed color-sensing system is also evaluated.  Experimental results show that the proposed approach is quite promising particularly for upgrading performance of vocabulary languages in children and is equally applicable to learning any kind of object sensible in reality.

    Keywords: Learning performance, usability, evaluation, AR, IoT, vocabulary learning, color sensing
  • Soroosh Akef, Mohammad Hadi Bokaei*, Hossein Sameti Pages 46-53
    This paper reports our improvement over the previous benchmark of the task of answering poetic verses' thematic similarity multiple-choice questions (MCQs). In this experiment, we have trained a Doc2Vec model on a corpus of Persian poems and proceeded to use the trained model to get the vector representations of the poetic verses. Subsequently, the poetic verse among the options with the highest cosine similarity to the stem verse was selected as the correct answer by the model. This model managed to answer 38% of the questions correctly, which was an improvement of 6% over the previous benchmark. Provided that a large-scale thematic similarity MCQ dataset is developed, the performance of a language representation model on this task could be considered as a novel benchmark to measure the capacity of a model to understand metaphorical language.
    Keywords: Doc2Vec, MCQ answering, computational linguistics, poetry, figurative speech, digital humanities
  • Hadi Safari, Nazanin Sabri, Faraz Shahsavan, Behnam Bahrak* Pages 54-62

    GitHub has long been perceived as the exclusive provider of hosting for software development in the minds of many programmers. However, it is far from the only available service out there. GitLab is one of the many platforms offering similar capabilities, which has experienced rapid growth in recent years. GitLab currently holds the second-largest collection of repositories among its competitors. Despite its rapid growth, little attention has been paid to this website by academia. This lack of information with regard to users and projects on the platform, as well as the fast increase in the number of GitLab users, motivated us to conduct the current study. In this paper, we perform social network analysis on the data we have collected from the public users and repositories of GitLab. We observe that GitLab is similar to other code-hosting services with regard to its network structure. We also find that the most influential users and projects on the website, are associated with the founding team of GitLab. We further analyze the collaboration and membership networks and, among other things, find that both graphs display high values of assortativity with regard to node degree. The relations between various attributes of projects have also been analyzed.

    Keywords: GitLab, social network analysis, hosting services for software development