﻿<?xml version="1.0" encoding="utf-8"?><ArticleSet><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>13</Volume><Issue>49</Issue><PubDate PubStatus="epublish"><Year>2025</Year><Month>5</Month><Day>25</Day></PubDate></Journal><ArticleTitle>Outage Performance of Cooperative Underlay Cognitive Radio Relay Based NOMA Networks with Energy Harvesting Capability </ArticleTitle><VernacularTitle>Outage Performance of Cooperative Underlay Cognitive Radio Relay Based NOMA Networks with Energy Harvesting Capability </VernacularTitle><FirstPage>1</FirstPage><LastPage>11</LastPage><ELocationID EIdType="doi">10.61186/jist.44610.13.49.1</ELocationID><Language>en</Language><AuthorList><Author><FirstName>maryam</FirstName><LastName>najimi</LastName><Affiliation>Department of Electrical and Computer Engineering, University of Science and Technology of Mazandaran, Behshahr, Iran </Affiliation><Identifier Source="ORCID">0000-0001-8835-3051</Identifier></Author></AuthorList><History PubStatus="received"><Year>2023</Year><Month>11</Month><Day>5</Day></History><Abstract>&lt;p&gt;In this work, Non-orthogonal multiple access (NOMA) technology is considered in cognitive radio (CR) networks in which the secondary users can only access the utilized spectrum of the primary user such that the primary user can tolerate the interference created by the secondary network. On the other words, the combination of CR and NOMA (CR-NOMA) is a novel concept to enhance the spectrum efficiency and the reliability of the network communication. The relaying technology with capability of energy harvesting is also considered which can improve the outage performance. In this scheme, the proper relay harvests energy from the secondary transmitter while it transmits the data of the secondary transmitter to the corresponding receiver. With this regard, the network throughput is improved in outage behavior and imperfect successive interference cancellation (SIC) condition at two users. Hence, the proposed problem is maximizing the performance of the network by proper selection of the relay for data transmission, setting the transmission power of the selected relay and optimal power allocation coefficients to each user with constraints on the outage probability and the interference in the primary user communication. For solving the problem, an iterative low complexity algorithm is proposed using the convex optimization scheme and Karush&amp;ndash;Kuhn&amp;ndash;Tucker conditions to select the best relay for transmission and users&amp;rsquo; power allocation coefficients and also set the transmission power of the selected relay.&amp;nbsp; Simulation results verify the effectiveness of the proposed algorithm&amp;nbsp; for increasing almost 30 percent of the network performance in comparison to the bench mark algorithms in different conditions.&lt;/p&gt;</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">NOMA-Cognitive Network</Param></Object><Object Type="Keyword"><Param Name="Value"> SIC Technique</Param></Object><Object Type="Keyword"><Param Name="Value"> Network Throughput</Param></Object><Object Type="Keyword"><Param Name="Value"> Convex Optimization Method</Param></Object><Object Type="Keyword"><Param Name="Value"> Probability of Outage</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/44610</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>13</Volume><Issue>49</Issue><PubDate PubStatus="epublish"><Year>2025</Year><Month>5</Month><Day>25</Day></PubDate></Journal><ArticleTitle>Numerical Study of a Switchable Polarization for Reflect-array Unit-cell for Satellite Communications</ArticleTitle><VernacularTitle>Numerical Study of a Switchable Polarization for Reflect-array Unit-cell for Satellite Communications</VernacularTitle><FirstPage>12</FirstPage><LastPage>23</LastPage><ELocationID EIdType="doi">10.61186/jist.46276.13.49.12</ELocationID><Language>en</Language><AuthorList><Author><FirstName>Mohammad</FirstName><LastName>Mansourinia</LastName><Affiliation>Faculty of Electrical Engineering, K. N. Toosi University of Technology, Tehran, Iran</Affiliation><Identifier Source="ORCID">0009-0004-7153-5085</Identifier></Author><Author><FirstName>Ramezan Ali</FirstName><LastName>Sadeghzadeh</LastName><Affiliation>Faculty of Electrical Engineering, K. N. Toosi University of Technology, Tehran, Iran</Affiliation><Identifier Source="ORCID">0000-0002-9156-1342</Identifier></Author></AuthorList><History PubStatus="received"><Year>2024</Year><Month>4</Month><Day>2</Day></History><Abstract>&lt;p&gt;The purpose of this paper is to design and simulate a unit cell that is wideband and multi-polarized for a reflect-array antenna. Bandwidth of structure is greater than 70% of X and Ku bands for satellite applications that reached from two printed dipoles and asymmetric arrow head shape in structure for multi electric and magnetic resonances and used thicker substrate for enhancement of BW by stack up of substrate with different layers. Depending on the antenna usage, the proposed structure can provide dual or triple polarization switching through the use of one or two control bits. Among the innovations of this structure compared to other activities, it can be said that the switching capability to support multiple polarizations occurs in a common wide bandwidth, or in other words, each of the switching modes is not in different single frequency or a bandwidth of frequencies. Comparing the switching modes of the proposed design with other existing control structures, the feature of maintaining the polarization of the feeding antenna or converting it to orthogonal polarization in different bits distinguishes the proposed structure. The proposed design has a new geometrical structure and considering that it can have the main polarization of the feeding antenna, its orthogonal polarization and even circular polarization in any switching mode, it has a relatively simple geometry, which reduces the complexity of the construction mechanism.&lt;/p&gt;</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value"> Reflect-Array</Param></Object><Object Type="Keyword"><Param Name="Value"> Wideband unit Cell</Param></Object><Object Type="Keyword"><Param Name="Value"> Multi-Polarized unit Cell</Param></Object><Object Type="Keyword"><Param Name="Value"> Configurable Structure</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/46276</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>13</Volume><Issue>49</Issue><PubDate PubStatus="epublish"><Year>2025</Year><Month>5</Month><Day>25</Day></PubDate></Journal><ArticleTitle>A Turkish Dataset and BERTurk-Contrastive Model for Semantic Textual Similarity</ArticleTitle><VernacularTitle>A Turkish Dataset and BERTurk-Contrastive Model for Semantic Textual Similarity</VernacularTitle><FirstPage>24</FirstPage><LastPage>32</LastPage><ELocationID EIdType="doi">10.61186/jist.48127.13.49.24</ELocationID><Language>en</Language><AuthorList><Author><FirstName>Somaiyeh</FirstName><LastName>Dehghan</LastName><Affiliation>Department of Computer Engineering, Yildiz Technical University, Istanbul, Turkey</Affiliation><Identifier Source="ORCID">0000-0002-5011-5821</Identifier></Author><Author><FirstName>Mehmet Fatih</FirstName><LastName>Amasyali</LastName><Affiliation>Department of Computer Engineering, Yildiz Technical University, Istanbul, Turkey</Affiliation><Identifier Source="ORCID">0000-0002-0404-5973</Identifier></Author></AuthorList><History PubStatus="received"><Year>2024</Year><Month>9</Month><Day>27</Day></History><Abstract>&lt;p&gt;Semantic Textual Similarity (STS) is an important NLP task that measures the degree of semantic equivalence between two texts, even if the sentence pairs contain different words. While extensively studied in English, STS has received limited attention in Turkish. This study introduces BERTurk-contrastive, a novel BERT-based model leveraging contrastive learning to enhance the STS task in Turkish. Our model aims to learn representations by bringing similar sentences closer together in the embedding space while pushing dissimilar ones farther apart. To support this task, we release SICK-tr, a new STS dataset in Turkish, created by translating the English SICK dataset. We evaluate our model on STSb-tr and SICK-tr, achieving a significant improvement of 5.92 points over previous models. These results establish BERTurk-contrastive as a robust solution for STS in Turkish and provide a new benchmark for future research.&lt;/p&gt;</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">Semantic Textual Similarity</Param></Object><Object Type="Keyword"><Param Name="Value"> Contrastive Learning</Param></Object><Object Type="Keyword"><Param Name="Value"> Deep Learning</Param></Object><Object Type="Keyword"><Param Name="Value"> BERT; BERTurk</Param></Object><Object Type="Keyword"><Param Name="Value"> Turkish Language</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/48127</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>13</Volume><Issue>49</Issue><PubDate PubStatus="epublish"><Year>2025</Year><Month>5</Month><Day>25</Day></PubDate></Journal><ArticleTitle>Review on architecture and challenges on smart cities</ArticleTitle><VernacularTitle>Review on architecture and challenges on smart cities</VernacularTitle><FirstPage>33</FirstPage><LastPage>49</LastPage><ELocationID EIdType="doi">10.61186/jist.48360.13.49.33</ELocationID><Language>en</Language><AuthorList><Author><FirstName>Mehdi</FirstName><LastName>Azadimotlagh</LastName><Affiliation>Department of Computer Engineering of Jam, Persian Gulf University, Jam, Iran</Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Narges </FirstName><LastName>Jafari</LastName><Affiliation>Department of Computer Engineering, Amirkabir University of Technology, Tehran, Iran</Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Reza</FirstName><LastName>Sharafdini</LastName><Affiliation>Department of Mathematics, Persian Gulf University, Bushehr, Iran</Affiliation><Identifier Source="ORCID">0000-0002-3171-2209</Identifier></Author></AuthorList><History PubStatus="received"><Year>2024</Year><Month>10</Month><Day>25</Day></History><Abstract>&lt;p class="Sammary" style="page-break-after: auto;"&gt;Due to rapid urbanization, a balance between resources and urban growth is required. For the achievement of this equilibrium, the use of information technologies is essential. Smart cities are the answer to this requirement, as a result, they improve various aspects of urban life and address related challenges and/or mitigate them. Modern technologies, including a wide range of Internet of Things (IoT) sensors, are used in smart cities for collecting and analyzing data on different aspects of urban life to enhance their inhabitants' lives. Smart cities improve the sustainability and efficiency of urban dynamics. Today, smart cities can enhance services and citizens' lives in various fields such as governance, education, healthcare, transportation, and energy. Smart city applications require collaboration among individuals from various disciplines, including engineering, architecture, urban design, and economics, to plan, design, implement, and deploy a smart solution for a specific task. Therefore, a proper understanding of the applications and architecture of smart cities and the challenges they face is crucial. In this paper, we will provide background information about the applications of smart cities, describe the architecture of applications in smart cities, present security and privacy challenges to examine robustness and flexibility in smart city applications, and examine new trends in this field.&lt;/p&gt;</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">Urban Growth</Param></Object><Object Type="Keyword"><Param Name="Value"> Internet of Things</Param></Object><Object Type="Keyword"><Param Name="Value"> Smart Utilities</Param></Object><Object Type="Keyword"><Param Name="Value"> Infrastructure Implementation</Param></Object><Object Type="Keyword"><Param Name="Value"> Security</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/48360</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>13</Volume><Issue>49</Issue><PubDate PubStatus="epublish"><Year>2025</Year><Month>5</Month><Day>25</Day></PubDate></Journal><ArticleTitle>A Novel Hybrid Convolutional-Attention Recurrent Network (HCARN) for Enhanced Cybersecurity Threat Detection</ArticleTitle><VernacularTitle>A Novel Hybrid Convolutional-Attention Recurrent Network (HCARN) for Enhanced Cybersecurity Threat Detection</VernacularTitle><FirstPage>50</FirstPage><LastPage>62</LastPage><ELocationID EIdType="doi">10.61186/jist.48536.13.49.50</ELocationID><Language>en</Language><AuthorList><Author><FirstName>Archana</FirstName><LastName>Laddhad</LastName><Affiliation>Faculty of Computer Science, Oriental University, Indore – Madhya Pradesh, India  </Affiliation><Identifier Source="ORCID">0009-0009-3362-7778 </Identifier></Author><Author><FirstName>Gurveen </FirstName><LastName>Vaseer</LastName><Affiliation>Faculty of Computer Science, Oriental University, Indore – Madhya Pradesh, India  </Affiliation><Identifier Source="ORCID">0000-0002-9198-445X</Identifier></Author></AuthorList><History PubStatus="received"><Year>2024</Year><Month>11</Month><Day>9</Day></History><Abstract>&lt;p&gt;Cybersecurity solutions are critical for the protection of networks against constantly evolving threats. Traditional intrusion detection systems (IDS) struggle to adapt to the rapidly varying attack patterns, encouraging the exploration of advanced techniques such as deep learning. This study introduces a novel framework utilizing a Hybrid Convolutional-Attention Recurrent Network (HCARN) for identifying cybersecurity threat. Utilizing the CSE-CIC-IDS2018 dataset, the data preparation process includes data cleanup, feature extraction, and Information Gain-based feature choice. The HCARN architecture, integrates convolutional layers, attention mechanisms, and recurrent layers, is employed for categorization.&amp;nbsp; Convolutional layers effectively capture spatial features in the dataset, attention mechanisms highlight critical features, and recurrent layers model temporal dependencies. This allows HCARN to process and analyze complex patterns in network traffic, leading to more accurate threat diagnosis. The proposed model proves significant efficacy in distinguishing between major, moderate, and minor threats, attaining high accuracy and robustness in threat recognition. The incorporation of attention mechanisms allows the model to emphasize on critical features, while the recurrent layers pay attention to temporal dependencies in the dataset. The HCARN architecture determines classification accuracy, achieving 94.7% in K-fold validation, 95.4% in model training, and 92.3% in model testing while classifying major, moderate, minor threats satisfactorily, confirming its effectiveness in cybersecurity threat detection. This novel attempt underscores the potential of hybrid deep learning models in enhancing cybersecurity defenses against sophisticated attacks, paving the way for adaptive security systems.&lt;/p&gt;</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">Intrusion Detection Systems</Param></Object><Object Type="Keyword"><Param Name="Value"> CSE-CIC-IDS2018</Param></Object><Object Type="Keyword"><Param Name="Value"> Deep Learning</Param></Object><Object Type="Keyword"><Param Name="Value"> Hybrid Convolutional-Attention Recurrent Network</Param></Object><Object Type="Keyword"><Param Name="Value"> Cybersecurity</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/48536</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>13</Volume><Issue>49</Issue><PubDate PubStatus="epublish"><Year>2025</Year><Month>5</Month><Day>25</Day></PubDate></Journal><ArticleTitle>Enhancing IoT Device Behavior Prediction through Machine Learning Models</ArticleTitle><VernacularTitle>Enhancing IoT Device Behavior Prediction through Machine Learning Models</VernacularTitle><FirstPage>63</FirstPage><LastPage>76</LastPage><ELocationID EIdType="doi">10.61186/jist.47570.13.49.63</ELocationID><Language>en</Language><AuthorList><Author><FirstName>Shubham</FirstName><LastName>Minhass</LastName><Affiliation>Amity Institute of Information Technology, Amity university, Noida, Uttar Pradesh, India </Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Ritu</FirstName><LastName>Chauhan</LastName><Affiliation>Artificial Intelligence and IoT Lab, Center for Computational Biology and Bioinformatics, Amity university, Noida, Uttar Pradesh, India</Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Harleen</FirstName><LastName>Kaur</LastName><Affiliation>Department of Computer Science and Engineering, Jamia Hamdard, Delhi, India </Affiliation><Identifier Source="ORCID" /></Author></AuthorList><History PubStatus="received"><Year>2024</Year><Month>8</Month><Day>6</Day></History><Abstract>&lt;p&gt;There is an urgent need for precise and trustworthy models to forecast device behavior and evaluate vulnerabilities as a result of the Internet of Things' (IoT) explosive growth. By assessing the effectiveness of several machine learning algorithms logistic regression, decision trees, random forests, Na&amp;iuml;ve Bayes, and KNN on two popular IoT devices Alexa and Google Home Mini this study seeks to enhance IoT device behavior forecasting. Our results show that Na&amp;iuml;ve Bayes and random forest models are more accurate and efficient than other algorithms at predicting device behavior. These findings demonstrate how important algorithm selection is for maximizing the performance of IoT systems. The study also emphasizes the usefulness of precise device behavior prediction for practical uses such as industrial control systems, home automation, and medical monitoring. For example, accurate forecasts can improve decision-making in crucial situations, facilitate more seamless automation, and stop system failures. In addition to adding to the expanding corpus of research on IoT data analysis, this study establishes the foundation for the creation of increasingly sophisticated machine learning models that can manage the intricate and ever-changing nature of IoT ecosystems. Future studies should concentrate on increasing the dataset's diversity to encompass a wider range of IoT environments and devices and enhancing the model's adaptability to changing IoT environments.&lt;/p&gt;</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">Machine learning</Param></Object><Object Type="Keyword"><Param Name="Value"> predictive model</Param></Object><Object Type="Keyword"><Param Name="Value"> Smart Devices</Param></Object><Object Type="Keyword"><Param Name="Value"> Google Home Mini; Alexa</Param></Object><Object Type="Keyword"><Param Name="Value"> IoT; KNN</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/47570</ArchiveCopySource></ARTICLE></ArticleSet>