عنوان مقاله | نویسنده(ها) | مربوط به کنفرانس | چکیده | خرید مقاله |
---|---|---|---|---|
سيد علي نيك نژاد, غلامرضا قاسم ثاني
|
چهاردهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
ترجمه ماش يني مي تواند د ر سطوح مختلف پردازش زبان
انجام شود كه هر چه عمق تحل يل بي شتر باشد (سطوح بالاتر ) به
پردازش پيچيده تر و نت يجه مطلوب تر منجر خواهد شد . ما در ا ي ن
مقاله به صورت مختصر نتيجه پياده ساز ي ي ك مترجم ماش يني از
زبان فارس ي به انگل يسي را شرح خواهيم داد كه از سطح معنايي براي
ترجمه استفاده مي كند. مترجم توليد شده مبتن ي بر قاعده بوده و
گرامرهاي مورد استفاده در آن براي هر دو زبان انگليسي و فارسي بر اساس تئوري گرامري HPSG بنا شده است . معنا در اين مترجم توسط ساختار معنايي MRS نمايش داده مي شود.
|
||
سيد عباس حسيني آمره ئي, محمدمهدي همايونپور
|
چهاردهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
بازشناسي زبان، تشخيص زبان يك گفتار يا گويش تلفني ضبط شده
مي باشد كه امروزه با توسعه استفاده از فناوري اطلاعات در صنايع
مختلف كاربردهاي آن روز به روز افزايش مي يابد . در اين مقاله براي دسته بندي زبان يك گويش تلفني از روش هاي ،PRLM ،GMM PPRLM و PPR استفاده مي شود. آزمايش ها بر روي دادگان تلفني OGI-MLTS انجام شده است. بهترين نتيجه بدست آمده مربوط به روش PPR است كه با دقت 87/91% داده هاي 45 ثانيه اي و با دقت %79/48 داده هاي 10 ثانيه اي زبان فارسي و انگليسي را از هم تشخيص مي دهد. بهترين راندمان بدست آمده براي تشخيص همزمان 10 زبان به كمك روش GMM برابر 59/94% است.
|
||
مهدي جعفري زاده, سياوش خرسندي
|
چهاردهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
متناسب با کاربرده اي مختلف ، پروتکلهاي گوناگوني بر اي
کنترل دسترسي به کانال در شبکهه اي حسگر ز يرآب ي طراح ي شده
است. ولي تا بحال ي ک پروتکل خوشه اي مناسب بر اي کاربرده اي
مانيتورينگ بلادرنگ توسعه نيافته است. يکي از معمار ي پروتکل ه اي کارا براي کاربردهاي مذکور در شبکههاي خشکي LEACH است . در اين مقاله خواهيم ديد که به کار بردن پروتکل LEACH اصلي در زير آب به دليل مشکلات محيطي اعم از تأخير انتشار و واريانس اين تأخير،
متداول بودن خرابي گرهها و خطاي بيت بالا در ارتباطات صو تي عملاً
شبکه را از فعاليت بازميدارد. ولي ميتوان با اعمال تغ ييرات ي شامل
گستردهتر کردن مراحل فاز پيکربندي و ارسال بستة کنترل ي از سو ي
سرخوشه براي گرههاي سالم، کارايي اين پروتکل را از منظر بهره وري
استفاده از پهناي باند تا ۶۰ % بازي ابي کرد و پيوست گي اطلاعات را در
بيشتر از % ۹۹ زمان تضمين کرد.
|
||
F. Abdoli, M. Kahani
|
چهاردهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران
|
Abstract—In this paper we discussed about utilizing
methods and techniques of semantic web in the Intrusion
Detection Systems. To extract semantic relations between
computer attacks and intrusions in a Distributed Intrusion
Detection System, we use ontology. Protégé software is our
selected software for building ontology. In addition, we
utilized Jena framework to make interaction between
MasterAgent and attacks ontology. Our Distributed
Intrusion Detection System is a network which contains
some IDSagents and a special MasterAgent. MasterAgent
contains our proposed attacks ontology. Every time a
IDSagent detects an attack or new suspected condition, it
sends detection’s report for MasterAgent. Therefore, it can
extract the semantic relationship among computer attacks
and suspected situations in the network with proposed
ontology. Finally, the experience shows that the pruposed
system reduced the rate of false positive and false negative.
|
||
Sussan Sanati, Mohammad Hossein Yaghmaee, Asghar Beheshti
|
چهاردهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران
|
Wireless sensor networks are limited in energy.
Any routing protocol used in wireless sensor networks
should take into consideration the time sensitive nature of
the traffic in such networks, along with the amount of
energy left for each sensor.
In this paper we present an energy aware packet delivery
mechanism for probabilistic Quality of Service (QoS)
guarantee in wireless sensor networks. Each node takes
routing decisions based on geographic progress towards the
destination sink, required end-to-end total reaching
probability, delay at the candidate forwarding node and
residual energy. The simulation results demonstrate that the
proposed protocol effectively improves the energy usage
efficiency of the sensor nodes, maximizing the lifetime of the
entire sensor network, while keeping guaranteed QoS.
|
||
A. Banitalebi, S. K. Setarehdan, G. A. Hossein-Zadeh
|
چهاردهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران
|
A user of Brain Computer Interface (BCI) system
must be able to control external computer devices with
brain activity. Although the proof-of-concept was
given decades ago, the reliable translation of user
intent into device control commands is still a major
challenge. There are problems associated with
classification of different BCI tasks. In this paper we
propose the use of chaotic indices of the BCI. We use
largest Lyapunov exponent, mutual information,
correlation dimension and minimum embedding
dimension as the features for the classification of EEG
signals which have been released by BCI Competition
IV. A multi-layer Perceptron classifier and a KMSVM(
support vector machine classifier based on kmeans
clustering) is used for classification process,
which lead us to an accuracy of 95.5%, for
discrimination between two motor imagery tasks.
|
||
Atefeh Torkaman, Nasrollah Moghaddam Charkari, Mahnaz Aghaeipour
|
چهاردهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران
|
Classification is a well known task in data mining
and machine learning that aims to predict the class of
items as accurately as possible. A well planned data
classification system makes essential data easy to find.
An object is classified into one of the categories called
classes according to the features that well separated
the classes. Actually, classification maps an object to
its classification label. Many researches used different
learning algorithms to classify data; neural networks,
decision trees, etc.
In this paper, a new classification approach based
on cooperative game is proposed. Cooperative game is
a branch of game theory consists of a set of players
and a characteristic function which specifies the value
created by different subsets of the players in the game.
In order to find classes in classification process,
objects can be imagine as the players in a game and
according to the values which obtained by these
players, classes will be separated. This approach can
be used to classify a population according to their
contributions. In the other words, it applies equally to
different types of data. Through out this paper, a
special case in medical diagnosis was studied. 304
samples taken from human leukemia tissue consists of
17 attributes which determine different CD markers
related to leukemia were analyzed. These samples
collected from different types of leukemia at Iran Blood
Transfusion Organization (IBTO). Obtained results
demonstrate that cooperative game is very promising
to use directly for classification.
|
||
S.A. Hosseini Amereii, M.M. Homayounpour
|
چهاردهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران
|
Two popular and better performing approaches to
language Identification (LID) are Phone Recognition
followed by Language Modeling (PRLM) and Parallel
PRLM. In this paper, we report several improvements
in Phone Recognition which reduces error rate in
PRLM and PPRLM based LID systems. In our previous
paper, we introduced APRLM approach that reduces
error rate for about 1.3% in LID tasks. In this paper,
we suggest other solution that overcomes APRLM. This
new LID approach is named Generalized PRLM or
GPRLM. Several language identification experiments
were conducted and the proposed improvements were
evaluated using OGI-MLTS corpus. Our results show
that GPRLM overcomes PPRLM and APRLM about
2.5% and 1.2% respectively in two language
classification tasks.
|
||
A. R. Khanteymoori, M. B. Menhaj, M. M. Homayounpour
|
چهاردهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران
|
A new structure learning approach for Bayesian
networks (BNs) based on asexual reproduction
optimization (ARO) is proposed in this paper. ARO can
be essentially considered as an evolutionary based
algorithm that mathematically models the budding
mechanism of asexual reproduction. In ARO, a parent
produces a bud through a reproduction operator;
thereafter the parent and its bud compete to survive
according to a performance index obtained from the
underlying objective function of the optimization
problem; this leads to the fitter individual. The
proposed method is applied to real-world and
benchmark applications, while its effectiveness is
demonstrated through computer simulation. Results of
simulation show that ARO outperforms GA because
ARO results good structure in comparison with GA
and the speed of convergence in ARO is more than GA.
Finally, the ARO performance is statistically shown.
|
||
Arash Abbasi, Mohammad Hossein Kahaei
|
چهاردهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران
|
The presence of undetected direct path conditions in
the TOA (Time of Arrival)-based indoor geolocation
introduces major errors into distance measurements.
In the proposed location estimation, an improved
procedure is introduced in Ultra-wideband (UWB)
systems in Line of Sight (LOS) and Non-Line of Sight
(NLOS) multipath environments by incorporating the
skewness as new statistic information of multipath
channel. Weighted least square error (WLS) algorithm
is used to estimate source position in this paper.
Simulation results show effectiveness of the proposed
algorithm, by reducing source localization error.
Uncertainty region between NLOS and LOS
identification is reduced in the proposed method
compared to previous methods..
|
||
رضا نورمندیپور, احمد خادمزاده, امیرمسعود رحمانی
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|
||
غلامرضا زرگر, پیمان کبیری
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|
||
سرور سرافرازی, حسین نظامآبادیپور, سعید سریزدی
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|
||
سمانه لایقیان جوان
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|
||
فرایین آئینی
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|
||
حمیدرضا توحیدیپور, سیدعلی سیدصالحی, حسین بهبود
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|
||
جواد عباسی آقا ملکی, علیرضا احمدیفرد
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|
||
مجید سلیمی, محمد مهدی شیرمحمدی
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|
||
مصطفی اسفندیار
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|
||
میثم صفرعلی نجار, محمد عبداللهی ازگمی
|
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
|
|