عنوان مقاله | نویسنده(ها) | مربوط به کنفرانس | چکیده | خرید مقاله |
---|---|---|---|---|
Amir Kakekhani, Akbar Ghaffar Pour Rahbar
|
چهاردهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران
|
In WDM all-optical networks, physical impairments
degrade optical signal to noise ratio (OSNR). Therefore,
the quality of a lightpath must be checked during
connection setup. Since during a lightpath setup, it may
inject crosstalk on all previously established lightpaths
with which it shares links or nodes, OSNR for those
lightpaths should be checked as well as the OSNR of the
tentative lightpath. If the number of hops for a lightpath
increases, the amount of OSNR degradation increases
due to crosstalk. Hence, longer paths are subject to
higher QoT degradation due to crosstalk. In this paper,
we enhance OSNR degradation for different lightpaths
with different hop numbers in such a way that OSNR
degradation for long-hop lightpaths becomes closer to
short-hop lightpaths, i.e., a fair OSNR degradation. We
provide a mechanism to estimate crosstalk risk at the
routing process by which we can find the nodes with
positive crosstalk risk. Then, rerouting procedure is used
to reduce the crosstalk risks of these nodes by migrating
some of lightpaths that pass through the nodes.
|
||
S. Motiee, M. R. Meybodi
|
چهاردهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران
|
A collection of web pages which are
about a common topic and are created by
individuals or any kind of associations that have a
common interest on that specific topic is called a
web community. Since at present, the size of the
web is over 3 billion pages and it is still growing
very fast, identification of web communities has
become an increasingly hard task. In this paper, a
method based on asynchronous cellular learning
automata (ACLA) for identification of web
communities is proposed. In the proposed method
first an asynchronous cellular learning automaton
is used to determine the related pages and their
relevance degree (the relationship structure of web
pages). For determination of relationship structure
of web pages information about hyperlinks and the
users’ behaviour in visiting the web pages are
used. Then, an algorithm similar to the HITS
algorithm is applied on the obtained structure to
identify the web communities. One of the
advantages of the proposed method is that the web
community obtained using this method is not
dependent on a specific web graph structure. To
evaluate the proposed approach, it is implemented
and the results are compared with the results
obtained for two existing methods, HITS and a
complete bipartite graph based method.
Experimental results show the superiority of the
proposed method.
|
||
A. Shirvani, H. Chegini, S. Setayeshi, C. Lucas
|
چهاردهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران
|
Polynomials are one of the most powerful functions
that have been used in many fields of mathematics
such as curve fitting and regression. Low order
polynomials are desired for their smoothness1, good
local approximation and interpolation. Being smooth,
they can be used to locally approximate almost any
derivable function. This means that when linear
functions fail in approximation (e.g. where the first
order Taylor expansion equals zero) polynomial
functions can be used in local approximation, such
that one can achieve better estimations at extremums.
In this paper, application of polynomial kernel
functions in locally linear neurofuzzy models is shown.
Using polynomial kernels in local models, better local
approximations in prediction of chaotic time series
such as Mackey-Glass is achieved, and the capability
of the neurofuzzy network is enhanced.
|
||
Zahra Toony, Hedieh Sajedi, Mansour Jamzad
|
چهاردهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران
|
Recently, a technique has been proposed for image
hiding, that is based on block texture similarity where,
blocks of secret image are compared with blocks of a
set of cover images and the cover image with the most
similar blocks to those of the secret image is selected
as the best candidate cover image to conceal the secret
image. In this paper, we propose a new image hiding
method in which, the secret image is initially coded
using a fuzzy coding/decoding method. By applying the
fuzzy coder, each block of the secret image is
compressed to a smaller block. In this way, after
compressing the secret image to a smaller one, we hide
it in a cover image. Obviously hiding a smaller secret
image causes less distortion in the stego-image (the
image that has secret image or data) and therefore
higher quality stego-image is obtained. Consequently,
the proposed method provides higher embedding rate
and enhanced security.
|
||
A. R. Khanteymoori, M. M. Homayounpour, M. B. Menhaj
|
چهاردهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران
|
This paper describes the theory and implementation
of dynamic Bayesian networks in the context of speaker
identification. Dynamic Bayesian networks provide a
succinct and expressive graphical language for
factoring joint probability distributions, and we begin
by presenting the structures that are appropriate for
doing speaker identification in clean and noisy
environments. This approach is notable because it
expresses an identification system using only the
concepts of random variables and conditional
probabilities. We present illustrative experiments in
both clean and noisy environments and our
experiments show that this new approach is very
promising in the field of speaker identification.
|
||
Arash Abbasi, Mohammad Hossein Kahaei
|
چهاردهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران
|
The presence of undetected direct path conditions in
the TOA (Time of Arrival)-based indoor geolocation
introduces major errors into distance measurements.
In the proposed location estimation, an improved
procedure is introduced in Ultra-wideband (UWB)
systems in Line of Sight (LOS) and Non-Line of Sight
(NLOS) multipath environments by incorporating the
skewness as new statistic information of multipath
channel. Weighted least square error (WLS) algorithm
is used to estimate source position in this paper.
Simulation results show effectiveness of the proposed
algorithm, by reducing source localization error.
Uncertainty region between NLOS and LOS
identification is reduced in the proposed method
compared to previous methods..
|
||
رضا نورمندیپور, احمد خادمزاده, امیرمسعود رحمانی
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|
||
غلامرضا زرگر, پیمان کبیری
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|
||
سرور سرافرازی, حسین نظامآبادیپور, سعید سریزدی
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|
||
سمانه لایقیان جوان
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|
||
فرایین آئینی
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|
||
حمیدرضا توحیدیپور, سیدعلی سیدصالحی, حسین بهبود
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|
||
جواد عباسی آقا ملکی, علیرضا احمدیفرد
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|
||
مجید سلیمی, محمد مهدی شیرمحمدی
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|
||
مصطفی اسفندیار
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|
||
میثم صفرعلی نجار, محمد عبداللهی ازگمی
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|
||
حسین رحیمی, بابک یادگاری, اشکان سامی, ناصر پیرویان
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|
||
سهیلا اشک زری طوسی, هادی صدوقی یزدی
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|
||
زهره کریمی, روحاله رمضانی
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|
||
مریم رحمانینیا, علی امیری
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|