انجمن کامپیوتر ایران

برای عضویت کلیک کنید

آرشیو مقالات

عنوان مقاله نویسنده(ها) مربوط به کنفرانس چکیده خرید مقاله
M. Khazaei, R. Berangi
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
In recent years many researches have focused on ad-hoc networks, mainly because of their independence to any specific structure. These networks suffers from frequent and rapid topology changes that cause many challenges in their routing. Most of the routing protocols try to find a path between source and destination nodes because any path will expire, offer a short period, the path reconstruction may cause the network inefficiency. The proposed protocol build two paths between source and destination and create backup paths during the route reply process, route maintenance process and local recovery process in order to improve the data transfer and the fault tolerance. The protocol performance is demonstrated by using the simulation results obtain from the global mobile simulation software(Glomosim). The experimental results show that this protocol can decrease the packet loss ratio rather than DSR and SMR and it is useful for the applications that need a high level of reliability.
Maedeh Ashouri Talouki, Mohammad-ali NematBakhsh, Ahmad Baraani
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Blinded data mining is a branch of data mining technique which is focused on protecting user privacy. To mine sensitive data such as medical information, it is desirable to protect privacy and there is not worry about revealing personalized data. In this paper a new approach for blinded data mining is suggested. It is based on ontology and k-anonymity generalization method. Our method generalizes a private table by considering table fields’ ontology, so that each tuple will become k-anonymous and less specific to not reveal sensitive information. This method is implemented using protégé and java for evaluation.
M. valizadeh, M. komeili, N. armanfard, E. kabir
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
This paper presents an efficient algorithm for adaptive binarization of degraded document images. Document binarization algorithms suffer from poor and variable contrast in document images. We propose a contrast independent binarization algorithm that does not require any parameter setting by user. Therefore, it can handle various types of degraded document images. The proposed algorithm involves two consecutive stages. At the first stage, independent of contrast between foreground and background, some parts of each character are extracted and in the second stage, the gray level of foreground and background are locally estimated. For each pixel, the average of estimated foreground and background gray levels is defined as threshold. After extensive experiments, the proposed binarization algorithm demonstrate superior performance against four well-know binarization algorithms on a set of degraded document images captured with camera.
Ali Nodehi, Mohamad Tayarani, Fariborz Mahmoudi
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Quantum Evolutionary Algorithm (QEA) is a novel optimization algorithm which uses a probabilistic representation for solution and is highly suitable for combinatorial problems like Knapsack problem. Fractal image compression is a well-known problem which is in the class of NP-Hard problems. Genetic algorithms are widely used for fractal image compression problems, but QEA is not used for this kind of problems yet. This paper uses a novel Functional Sized population Quantum Evolutionary Algorithm for fractal image compression. Experimental results show that the proposed algorithm has a better performance than GA and conventional fractal image compression algorithms.
Heshaam Faili
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Increasing the domain of locality by using treeadjoining- grammars (TAG) encourages some researchers to use it as a modeling formalism in their language application. But parsing with a rich grammar like TAG faces two main obstacles: low parsing speed and a lot of ambiguous syntactical parses. We uses an idea of the shallow parsing based on a statistical approach in TAG formalism, named supertagging, which enhanced the standard POS tags in order to employ the syntactical information about the sentence. In this paper, an error-driven method in order to approaching a full parse from the partial parses based on TAG formalism is presented. These partial parses are basically resulted from supertagger which is followed by a simple heuristic based light parser named light weight dependency analyzer (LDA). Like other error driven methods, the process of generation the deep parses can be divided into two different phases: error detection and error correction, which in each phase, different completion heuristics applied on the partial parses. The experiments on Penn Treebank show considerable improvements in the parsing time and disambiguation process.
A. Nadi, S. S. Tayarani-Bathaie, R. Safabakhsh
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
In this paper we present a new approach for evolving an optimized neural network architecture for a three layer feedforward neural network with a mutation based genetic algorithm. In this study we will optimize the weights and the network architecture simultaneously through a new presentation for the three layer feedforward neural network. The goal of the method is to find the optimal number of neurons and their appropriate weights. This optimization problem so far has been solved by looking at the general architecture of the network but we optimize the individual neurons of the hidden layer. This change results in a search space with much higher resolution and an increased speed of convergence. Evaluation of algorithm by 3 data sets reveals that this method shows a very good performance in comparison to current methods.
حميد اسدي, محمد حسين كهايي
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
اين مقاله مسئله جداسازي كور سيستمهاي طيف گسترده پرش فركانسي (FHSS) را با استفاده از يك المان آرايهاي بدون دانستن الگوي پرش و يا جهت سيگنال ورودي (DOA) براي كاربردهاي زمانحقيقي مورد بررسي قرار ميدهد. در اين مقاله الگوريتم مورد استفاده، الگوريتم تخمين و قطري سازي توام ماتريس كاميولنت (JADE) ميباشد. مزيت اين الگوريتم، سرعت بالاي آن ميباشد كه باعث شده است براي كاربردهاي زمان-حقيقي مناسب باشد. اما مشكل الگوريتم JADE رعايت نكردن ترتيب منابع يا جايگشت آنها به هنگام جداسازي است. براي حل مشكل جايگشت در اين مقاله، از ماتريس همبستگي استفاده ميكنيم.
مسعود هادیان دهکردی, رضا علیمرادی, علیرضا شاه حسینی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
حمید مهدی, امیرمسعود رحمانی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
رحمت قاسمی, علی داد, محمد نقیب‌زاده
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
عماد ابراهیمی, حبیب رجبی مشهدی, ساسان ناصح
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
تکتم ذوقی, رضا بوستانی, پیمان گیفانی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
مریم زمردی مقدم
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
سعید حیاتی, سعید سریزدی, حسین نظام‌آبادی‌پور, اسماء شمسی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
علیرضا شاه‌حسینی, سیدعلی‌اصغر بهشتی شیرازی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
صادق علی‌اکبری
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
اکبر مومنی, کریم خزایی, عقیل اسماعیلی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
احسان خراطی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
محمد رهنمای هدایت
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
علیرضا خان تیموری, صادق جعفری, یعقوب علی‌اکبر پورگنجینه کتاب
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
1 2 3 4 5 143