انجمن کامپیوتر ایران

برای عضویت کلیک کنید

آرشیو مقالات

عنوان مقاله نویسنده(ها) مربوط به کنفرانس چکیده خرید مقاله
Amir Kakekhani, Akbar Ghaffar Pour Rahbar
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
In WDM all-optical networks, physical impairments degrade optical signal to noise ratio (OSNR). Therefore, the quality of a lightpath must be checked during connection setup. Since during a lightpath setup, it may inject crosstalk on all previously established lightpaths with which it shares links or nodes, OSNR for those lightpaths should be checked as well as the OSNR of the tentative lightpath. If the number of hops for a lightpath increases, the amount of OSNR degradation increases due to crosstalk. Hence, longer paths are subject to higher QoT degradation due to crosstalk. In this paper, we enhance OSNR degradation for different lightpaths with different hop numbers in such a way that OSNR degradation for long-hop lightpaths becomes closer to short-hop lightpaths, i.e., a fair OSNR degradation. We provide a mechanism to estimate crosstalk risk at the routing process by which we can find the nodes with positive crosstalk risk. Then, rerouting procedure is used to reduce the crosstalk risks of these nodes by migrating some of lightpaths that pass through the nodes.
S. Motiee, M. R. Meybodi
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
A collection of web pages which are about a common topic and are created by individuals or any kind of associations that have a common interest on that specific topic is called a web community. Since at present, the size of the web is over 3 billion pages and it is still growing very fast, identification of web communities has become an increasingly hard task. In this paper, a method based on asynchronous cellular learning automata (ACLA) for identification of web communities is proposed. In the proposed method first an asynchronous cellular learning automaton is used to determine the related pages and their relevance degree (the relationship structure of web pages). For determination of relationship structure of web pages information about hyperlinks and the users’ behaviour in visiting the web pages are used. Then, an algorithm similar to the HITS algorithm is applied on the obtained structure to identify the web communities. One of the advantages of the proposed method is that the web community obtained using this method is not dependent on a specific web graph structure. To evaluate the proposed approach, it is implemented and the results are compared with the results obtained for two existing methods, HITS and a complete bipartite graph based method. Experimental results show the superiority of the proposed method.
A. Shirvani, H. Chegini, S. Setayeshi, C. Lucas
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Polynomials are one of the most powerful functions that have been used in many fields of mathematics such as curve fitting and regression. Low order polynomials are desired for their smoothness1, good local approximation and interpolation. Being smooth, they can be used to locally approximate almost any derivable function. This means that when linear functions fail in approximation (e.g. where the first order Taylor expansion equals zero) polynomial functions can be used in local approximation, such that one can achieve better estimations at extremums. In this paper, application of polynomial kernel functions in locally linear neurofuzzy models is shown. Using polynomial kernels in local models, better local approximations in prediction of chaotic time series such as Mackey-Glass is achieved, and the capability of the neurofuzzy network is enhanced.
Zahra Toony, Hedieh Sajedi, Mansour Jamzad
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Recently, a technique has been proposed for image hiding, that is based on block texture similarity where, blocks of secret image are compared with blocks of a set of cover images and the cover image with the most similar blocks to those of the secret image is selected as the best candidate cover image to conceal the secret image. In this paper, we propose a new image hiding method in which, the secret image is initially coded using a fuzzy coding/decoding method. By applying the fuzzy coder, each block of the secret image is compressed to a smaller block. In this way, after compressing the secret image to a smaller one, we hide it in a cover image. Obviously hiding a smaller secret image causes less distortion in the stego-image (the image that has secret image or data) and therefore higher quality stego-image is obtained. Consequently, the proposed method provides higher embedding rate and enhanced security.
A. R. Khanteymoori, M. M. Homayounpour, M. B. Menhaj
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
This paper describes the theory and implementation of dynamic Bayesian networks in the context of speaker identification. Dynamic Bayesian networks provide a succinct and expressive graphical language for factoring joint probability distributions, and we begin by presenting the structures that are appropriate for doing speaker identification in clean and noisy environments. This approach is notable because it expresses an identification system using only the concepts of random variables and conditional probabilities. We present illustrative experiments in both clean and noisy environments and our experiments show that this new approach is very promising in the field of speaker identification.
Arash Abbasi, Mohammad Hossein Kahaei
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
The presence of undetected direct path conditions in the TOA (Time of Arrival)-based indoor geolocation introduces major errors into distance measurements. In the proposed location estimation, an improved procedure is introduced in Ultra-wideband (UWB) systems in Line of Sight (LOS) and Non-Line of Sight (NLOS) multipath environments by incorporating the skewness as new statistic information of multipath channel. Weighted least square error (WLS) algorithm is used to estimate source position in this paper. Simulation results show effectiveness of the proposed algorithm, by reducing source localization error. Uncertainty region between NLOS and LOS identification is reduced in the proposed method compared to previous methods..
رضا نورمندی‌پور, احمد خادم‌زاده, امیرمسعود رحمانی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
غلامرضا زرگر, پیمان کبیری
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
سرور سرافرازی, حسین نظام‌آبادی‌پور, سعید سریزدی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
سمانه لایقیان جوان
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
فرایین آئینی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
حمیدرضا توحیدی‌پور, سیدعلی سیدصالحی, حسین بهبود
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
جواد عباسی آقا ملکی, علیرضا احمدی‌فرد
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
مجید سلیمی, محمد مهدی شیرمحمدی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
مصطفی اسفندیار
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
میثم صفرعلی نجار, محمد عبداللهی ازگمی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
حسین رحیمی, بابک یادگاری, اشکان سامی, ناصر پیرویان
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
سهیلا اشک زری طوسی, هادی صدوقی یزدی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
زهره کریمی, روح‌اله رمضانی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
مریم رحمانی‌نیا, علی امیری
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
1 114 115 116 117 118 119 120 143