﻿<?xml version="1.0" encoding="utf-8"?><records><record><language>per</language><publisher>RICEST</publisher><journalTitle>Journal of Information Systems and Telecommunication (JIST) </journalTitle><issn>2322-1437</issn><eissn>2345-2773</eissn><publicationDate>2013-06</publicationDate><volume>1</volume><issue>2</issue><startPage>1</startPage><endPage>10</endPage><documentType>article</documentType><title language="eng">Performance Analysis of SVM-Type Per Tone Equalizer Using Blind and Radius Directed Algorithms for OFDM Systems</title><authors><author><name>Babak Haji Bagher Naeeni</name><email>naeeni@iribu.ac.ir</email><affiliationId>1</affiliationId></author></authors><affiliationsList><affiliationName affiliationId="1">	IRIB</affiliationName></affiliationsList><abstract language="eng">In this paper, we present Support Vector Machine (SVM)-based blind per tone equalization for OFDM systems. Blind per tone equalization using Constant Modulus Algorithm (CMA) and Multi-Modulus Algorithm (MMA) are used as the comparison benchmark. The SVM-based cost function utilizes a CMA-like error function and the solution is obtained by means of an Iterative Re-Weighted Least Squares Algorithm (IRWLS). Moreover, like CMA, the error function allows to extend the method to multilevel modulations. In this case, a dual mode algorithm is proposed. Dual mode equalization techniques are commonly used in communication systems working with multilevel signals. Practical blind algorithms for multilevel modulation are able to open the eye of the constellation, but they usually exhibit a high residual error. In a dual mode scheme, once the eye is opened by the blind algorithm, the system switches to another algorithm, which is able to obtain a lower residual error under a suitable initial ISI level. Simulation experiments show that the performance of blind per tone equalization using support vector machine has better than blind per tone equalization using CMA and MMA, from viewpoint of average Bit-Error Rate (BER).</abstract><fullTextUrl>http://jist.ir/Article/14809</fullTextUrl><keywords><keyword>Constant Modulus Algorithm (CMA)</keyword><keyword>Multi-Modulus Algorithm (MMA)</keyword><keyword>Support Vector Machine (SVM)</keyword><keyword>Orthogonal Frequency Division Multiplexing (OFDM)</keyword><keyword></keyword><keyword></keyword><keyword></keyword><keyword></keyword></keywords></record><record><language>per</language><publisher>RICEST</publisher><journalTitle>Journal of Information Systems and Telecommunication (JIST) </journalTitle><issn>2322-1437</issn><eissn>2345-2773</eissn><publicationDate>2013-06</publicationDate><volume>1</volume><issue>2</issue><startPage>1</startPage><endPage>10</endPage><documentType>article</documentType><title language="eng">Multimodal Biometric Recognition Using Particle Swarm Optimization-Based Selected Features</title><authors><author><name>Sara Motamed</name><email>Samotamed@yahoo.com</email><affiliationId>1</affiliationId></author><author><name>Ali Broumandnia</name><email>broumandnia@azad.ac.ir</email><affiliationId>2</affiliationId></author><author><name>Azam sadat  Nourbakhsh</name><email>Nourbakhsh@liau.ac.ir</email><affiliationId>3</affiliationId></author></authors><affiliationsList><affiliationName affiliationId="1">Assistant Professor, Department of Computer, Fouman &amp; Shaft Unit, Islamic Azad University, Fuman, Iran</affiliationName><affiliationName affiliationId="2"></affiliationName><affiliationName affiliationId="3">Department of Computer Engineering, technical and Engineering College, Islamic Azad University- Lahijan Branch, Lahijan, Iran</affiliationName></affiliationsList><abstract language="eng">Feature selection is one of the best optimization problems in human recognition, which reduces the number of features, removes noise and redundant data in images, and results in high rate of recognition. This step affects on the performance of a human recognition system. This paper presents a multimodal biometric verification system based on two features of palm and ear which has emerged as one of the most extensively studied research topics that spans multiple disciplines such as pattern recognition, signal processing and computer vision. Also, we present a novel Feature selection algorithm based on Particle Swarm Optimization (PSO). PSO is a computational paradigm based on the idea of collaborative behavior inspired by the social behavior of bird flocking or fish schooling. In this method, we used from two Feature selection techniques: the Discrete Cosine Transforms (DCT) and the Discrete Wavelet Transform (DWT). The identification process can be divided into the following phases: capturing the image; pre-processing; extracting and normalizing the palm and ear images; feature extraction; matching and fusion; and finally, a decision based on PSO and GA classifiers. The system was tested on a database of 60 people (240 palm and 180 ear images). Experimental results show that the PSO-based feature selection algorithm was found to generate excellent recognition results with the minimal set of selected features.</abstract><fullTextUrl>http://jist.ir/Article/14808</fullTextUrl><keywords><keyword>Biometric</keyword><keyword> Genetic Algorithm (GA)</keyword><keyword> Particle Swarm Optimization (PSO)</keyword><keyword> Discrete Cosine Transform (DCT)</keyword><keyword> Discrete Wavelet Transform (DWT)</keyword></keywords></record><record><language>per</language><publisher>RICEST</publisher><journalTitle>Journal of Information Systems and Telecommunication (JIST) </journalTitle><issn>2322-1437</issn><eissn>2345-2773</eissn><publicationDate>2013-06</publicationDate><volume>1</volume><issue>2</issue><startPage>1</startPage><endPage>10</endPage><documentType>article</documentType><title language="eng">A Wideband Low-Noise Downconversion Mixerwith Positive-Negative Feedbacks</title><authors><author><name>Hadi Naderian</name><email>h.naderian@eng.uk.ac.ir</email><affiliationId>1</affiliationId></author><author><name>Ahmad Hakimi</name><email>hakimi@uk.ac.ir</email><affiliationId>2</affiliationId></author></authors><affiliationsList><affiliationName affiliationId="1">Shahid Bahonar</affiliationName><affiliationName affiliationId="2">Shahid Bahonar University of Kerman</affiliationName></affiliationsList><abstract language="eng">This paper presents a wideband low-noise mixer in CMOS 0.13-um technology that operates between 2–10.5 GHz. The mixer has a Gilbert cell configuration that employs broadband low-noise trans conductors designed using the negative-positive feedback technique used in low-noise amplifier designs. This method allows broadband input matching. The current-bleeding technique is also used so that a high conversion gain can be achieved. Simulation results show excellent noise and gain performance across the frequency span with an average double-sideband noise figure of 2.9 dB and a conversion gain of 15.5 dB. It has a third-order intermodulation intercept point of -8.7 dBm at 5 GHz.</abstract><fullTextUrl>http://jist.ir/Article/14818</fullTextUrl><keywords><keyword>Current-Bleeding</keyword><keyword>Feedback</keyword><keyword>Low-Noise</keyword><keyword>Noise Cancellation</keyword><keyword>Wideband</keyword></keywords></record><record><language>per</language><publisher>RICEST</publisher><journalTitle>Journal of Information Systems and Telecommunication (JIST) </journalTitle><issn>2322-1437</issn><eissn>2345-2773</eissn><publicationDate>2013-06</publicationDate><volume>1</volume><issue>2</issue><startPage>1</startPage><endPage>10</endPage><documentType>article</documentType><title language="eng">A Robust Data Envelopment Analysis Method for Business and IT Alignment of Enterprise Architecture Scenarios</title><authors><author><name>Mehdi Fasanghari</name><email>fasanghari@gmail.com</email><affiliationId>1</affiliationId></author><author><name>Mohsen	 Sadegh Amalnick</name><email>amalnick@ut.ac.ir</email><affiliationId>2</affiliationId></author><author><name>Reza Taghipour Anvari</name><email>taghipour@cra.ir</email><affiliationId>3</affiliationId></author><author><name>Jafar Razmi</name><email>jrazmi@ut.ac.ir</email><affiliationId>4</affiliationId></author></authors><affiliationsList><affiliationName affiliationId="1">	Tehran</affiliationName><affiliationName affiliationId="2">Tehran</affiliationName><affiliationName affiliationId="3">Malek Ashtar</affiliationName><affiliationName affiliationId="4">Tehran</affiliationName></affiliationsList><abstract language="eng">Information Technology is recognized as a competitive enabler in today’s dynamic business environment. Therefore, alliance of business and Information Technology process is critical, which is mostly emphasized in Information Technology governance frameworks. On the other hand, Enterprise Architectures are deployed to steer organizations for achieving their objectives while being responsive to changes. Thus, it is proposed to align the business and Information Technology through investigating the suitability of Enterprise Architecture scenarios. In view of this fact, investigating a flexible decision making method for business and information technology alignment analysis is necessary, but it is not sufficient since the subjective analysis is always perturbed by some degree of uncertainty. Therefore, we have developed a new robust Data Envelopment Analysis technique designed for Enterprise Architecture scenario analysis. Several numerical experiments and a sensitivity analysis are designed to show the performance, significance, and flexibility of the proposed method in a real case.</abstract><fullTextUrl>http://jist.ir/Article/14819</fullTextUrl><keywords><keyword>Group Data Envelopment Analysis</keyword><keyword>Enterprise Architecture</keyword><keyword>IT Governance</keyword><keyword>COBIT</keyword><keyword>Robust Optimization</keyword></keywords></record><record><language>per</language><publisher>RICEST</publisher><journalTitle>Journal of Information Systems and Telecommunication (JIST) </journalTitle><issn>2322-1437</issn><eissn>2345-2773</eissn><publicationDate>2013-06</publicationDate><volume>1</volume><issue>2</issue><startPage>1</startPage><endPage>10</endPage><documentType>article</documentType><title language="eng">Wideband Log Periodic-Microstrip Antenna with Elliptic Patches</title><authors><author><name>hamed ghanbari foshtami</name><email>h.ghanbari@gmail.com</email><affiliationId>1</affiliationId></author><author><name>Ali Hashemi Talkhouncheh</name><email>a.hashemi@iaumajlesi.ac.ir</email><affiliationId>2</affiliationId></author><author><name>Hossein Emami</name><email>h.emami@ieee.org</email><affiliationId>3</affiliationId></author></authors><affiliationsList><affiliationName affiliationId="1"></affiliationName><affiliationName affiliationId="2">Technical &amp; Vocational</affiliationName><affiliationName affiliationId="3">Islamic Azad</affiliationName></affiliationsList><abstract language="eng">A broadband microstrip antenna based on log periodic technique was conceived and demonstrated practically. The antenna exhibits a wideband characteristic comparing with other microstrip antennas. Over the operation frequency range, i.e. 2.5-6 GHz, a 50 Ω input impedance has been considered.</abstract><fullTextUrl>http://jist.ir/Article/14821</fullTextUrl><keywords><keyword>Microstrip Antenna</keyword><keyword>Log-Periodic</keyword><keyword>VSWR</keyword><keyword>Gain</keyword><keyword>Pattern</keyword></keywords></record><record><language>per</language><publisher>RICEST</publisher><journalTitle>Journal of Information Systems and Telecommunication (JIST) </journalTitle><issn>2322-1437</issn><eissn>2345-2773</eissn><publicationDate>2013-06</publicationDate><volume>1</volume><issue>2</issue><startPage>1</startPage><endPage>10</endPage><documentType>article</documentType><title language="eng">A New Finite Field Multiplication Algorithm to Improve Elliptic Curve Cryptosystem Implementations</title><authors><author><name>Abdalhossein Rezai</name><email>rezaie@acecr.ac.ir</email><affiliationId>1</affiliationId></author><author><name>Parviz Keshavarzi</name><email>pkeshavarzi@semnan.ac.ir</email><affiliationId>2</affiliationId></author></authors><affiliationsList><affiliationName affiliationId="1">University of Science and Culture</affiliationName><affiliationName affiliationId="2">Semnan</affiliationName></affiliationsList><abstract language="eng">This paper presents a new and efficient implementation approach for the elliptic curve cryptosystem (ECC) based on a novel finite field multiplication in GF(2m) and an efficient scalar multiplication algorithm. This new finite field multiplication algorithm performs zero chain multiplication and required additions in only one clock cycle instead of several clock cycles. Using modified (limited number of shifts) Barrel shifter; the partial result is also shifted in one clock cycle instead of several clock cycles. Both the canonical recoding technique and the sliding window method are applied to the multiplier to reduce the average number of required clock cycles. In the scalar multiplication algorithm of the proposed implementation approach, the point addition and point doubling operations are computed in parallel. The sliding window method and the signed-digit representation are also used to reduce the average number of point operations. Based on our analysis, the computation cost (the average number of required clock cycles) is effectively reduced in both the proposed finite field multiplication algorithm and the proposed implementation approach of ECC in comparison with other ECC finite field multiplication algorithms and implementation approaches.</abstract><fullTextUrl>http://jist.ir/Article/14822</fullTextUrl><keywords><keyword>Computational Complexity</keyword><keyword>Network Security</keyword><keyword>Cryptography</keyword><keyword>Elliptic Curve Cryptosystem (ECC)</keyword><keyword>Finite Field Multiplication</keyword><keyword>Scalar Multiplication</keyword></keywords></record><record><language>per</language><publisher>RICEST</publisher><journalTitle>Journal of Information Systems and Telecommunication (JIST) </journalTitle><issn>2322-1437</issn><eissn>2345-2773</eissn><publicationDate>2013-06</publicationDate><volume>1</volume><issue>2</issue><startPage>1</startPage><endPage>10</endPage><documentType>article</documentType><title language="eng">Cover Selection Steganography Via Run Length Matrix and Human Visual System</title><authors><author><name>Sara Nazari</name><email>s-nazari@iau-arak.ac.ir</email><affiliationId>1</affiliationId></author><author><name>Mohammad Shahram Moin</name><email>moin@csri.ac.ir</email><affiliationId>2</affiliationId></author></authors><affiliationsList><affiliationName affiliationId="1">Islamic Azad</affiliationName><affiliationName affiliationId="2">Cyberspace Research Institute</affiliationName></affiliationsList><abstract language="eng">A novel approach for steganography cover selection is proposed, based on image texture features and human visual system. Our proposed algorithm employs run length matrix to select a set of appropriate images from an image database and creates their stego version after embedding process. Then, it computes similarity between original images and their stego versions by using structural similarity as image quality metric to select, as the best cover, one image with maximum similarity with its stego. According to the results of comparing our new proposed cover selection algorithm with other steganography methods, it is confirmed that the proposed algorithm is able to increase the stego quality. We also evaluated the robustness of our algorithm over steganalysis methods such as Wavelet based and Block based steganalyses; the experimental results show that the proposed approach decreases the risk of message hiding detection.</abstract><fullTextUrl>http://jist.ir/Article/14823</fullTextUrl><keywords><keyword>Steganography</keyword><keyword>Cover Selection</keyword><keyword>Run Length Matrix</keyword><keyword>Image Texture Features</keyword><keyword>SSIM</keyword></keywords></record></records>