انجمن کامپیوتر ایران

برای عضویت کلیک کنید

آرشیو مقالات

عنوان مقاله نویسنده(ها) مربوط به کنفرانس چکیده خرید مقاله
F. Abdoli, M. Kahani
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Abstract—In this paper we discussed about utilizing methods and techniques of semantic web in the Intrusion Detection Systems. To extract semantic relations between computer attacks and intrusions in a Distributed Intrusion Detection System, we use ontology. Protégé software is our selected software for building ontology. In addition, we utilized Jena framework to make interaction between MasterAgent and attacks ontology. Our Distributed Intrusion Detection System is a network which contains some IDSagents and a special MasterAgent. MasterAgent contains our proposed attacks ontology. Every time a IDSagent detects an attack or new suspected condition, it sends detection’s report for MasterAgent. Therefore, it can extract the semantic relationship among computer attacks and suspected situations in the network with proposed ontology. Finally, the experience shows that the pruposed system reduced the rate of false positive and false negative.
Sussan Sanati, Mohammad Hossein Yaghmaee, Asghar Beheshti
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Wireless sensor networks are limited in energy. Any routing protocol used in wireless sensor networks should take into consideration the time sensitive nature of the traffic in such networks, along with the amount of energy left for each sensor. In this paper we present an energy aware packet delivery mechanism for probabilistic Quality of Service (QoS) guarantee in wireless sensor networks. Each node takes routing decisions based on geographic progress towards the destination sink, required end-to-end total reaching probability, delay at the candidate forwarding node and residual energy. The simulation results demonstrate that the proposed protocol effectively improves the energy usage efficiency of the sensor nodes, maximizing the lifetime of the entire sensor network, while keeping guaranteed QoS.
A. Banitalebi, S. K. Setarehdan, G. A. Hossein-Zadeh
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
A user of Brain Computer Interface (BCI) system must be able to control external computer devices with brain activity. Although the proof-of-concept was given decades ago, the reliable translation of user intent into device control commands is still a major challenge. There are problems associated with classification of different BCI tasks. In this paper we propose the use of chaotic indices of the BCI. We use largest Lyapunov exponent, mutual information, correlation dimension and minimum embedding dimension as the features for the classification of EEG signals which have been released by BCI Competition IV. A multi-layer Perceptron classifier and a KMSVM( support vector machine classifier based on kmeans clustering) is used for classification process, which lead us to an accuracy of 95.5%, for discrimination between two motor imagery tasks.
Atefeh Torkaman, Nasrollah Moghaddam Charkari, Mahnaz Aghaeipour
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Classification is a well known task in data mining and machine learning that aims to predict the class of items as accurately as possible. A well planned data classification system makes essential data easy to find. An object is classified into one of the categories called classes according to the features that well separated the classes. Actually, classification maps an object to its classification label. Many researches used different learning algorithms to classify data; neural networks, decision trees, etc. In this paper, a new classification approach based on cooperative game is proposed. Cooperative game is a branch of game theory consists of a set of players and a characteristic function which specifies the value created by different subsets of the players in the game. In order to find classes in classification process, objects can be imagine as the players in a game and according to the values which obtained by these players, classes will be separated. This approach can be used to classify a population according to their contributions. In the other words, it applies equally to different types of data. Through out this paper, a special case in medical diagnosis was studied. 304 samples taken from human leukemia tissue consists of 17 attributes which determine different CD markers related to leukemia were analyzed. These samples collected from different types of leukemia at Iran Blood Transfusion Organization (IBTO). Obtained results demonstrate that cooperative game is very promising to use directly for classification.
S.A. Hosseini Amereii, M.M. Homayounpour
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Two popular and better performing approaches to language Identification (LID) are Phone Recognition followed by Language Modeling (PRLM) and Parallel PRLM. In this paper, we report several improvements in Phone Recognition which reduces error rate in PRLM and PPRLM based LID systems. In our previous paper, we introduced APRLM approach that reduces error rate for about 1.3% in LID tasks. In this paper, we suggest other solution that overcomes APRLM. This new LID approach is named Generalized PRLM or GPRLM. Several language identification experiments were conducted and the proposed improvements were evaluated using OGI-MLTS corpus. Our results show that GPRLM overcomes PPRLM and APRLM about 2.5% and 1.2% respectively in two language classification tasks.
A. R. Khanteymoori, M. B. Menhaj, M. M. Homayounpour
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
A new structure learning approach for Bayesian networks (BNs) based on asexual reproduction optimization (ARO) is proposed in this paper. ARO can be essentially considered as an evolutionary based algorithm that mathematically models the budding mechanism of asexual reproduction. In ARO, a parent produces a bud through a reproduction operator; thereafter the parent and its bud compete to survive according to a performance index obtained from the underlying objective function of the optimization problem; this leads to the fitter individual. The proposed method is applied to real-world and benchmark applications, while its effectiveness is demonstrated through computer simulation. Results of simulation show that ARO outperforms GA because ARO results good structure in comparison with GA and the speed of convergence in ARO is more than GA. Finally, the ARO performance is statistically shown.
Arash Abbasi, Mohammad Hossein Kahaei
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
The presence of undetected direct path conditions in the TOA (Time of Arrival)-based indoor geolocation introduces major errors into distance measurements. In the proposed location estimation, an improved procedure is introduced in Ultra-wideband (UWB) systems in Line of Sight (LOS) and Non-Line of Sight (NLOS) multipath environments by incorporating the skewness as new statistic information of multipath channel. Weighted least square error (WLS) algorithm is used to estimate source position in this paper. Simulation results show effectiveness of the proposed algorithm, by reducing source localization error. Uncertainty region between NLOS and LOS identification is reduced in the proposed method compared to previous methods..
رضا نورمندی‌پور, احمد خادم‌زاده, امیرمسعود رحمانی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
غلامرضا زرگر, پیمان کبیری
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
سرور سرافرازی, حسین نظام‌آبادی‌پور, سعید سریزدی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
سمانه لایقیان جوان
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
فرایین آئینی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
حمیدرضا توحیدی‌پور, سیدعلی سیدصالحی, حسین بهبود
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
جواد عباسی آقا ملکی, علیرضا احمدی‌فرد
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
مجید سلیمی, محمد مهدی شیرمحمدی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
مصطفی اسفندیار
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
میثم صفرعلی نجار, محمد عبداللهی ازگمی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
حسین رحیمی, بابک یادگاری, اشکان سامی, ناصر پیرویان
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
سهیلا اشک زری طوسی, هادی صدوقی یزدی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
زهره کریمی, روح‌اله رمضانی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
1 2 3 4 143