انجمن کامپیوتر ایران

برای عضویت کلیک کنید

آرشیو مقالات

عنوان مقاله نویسنده(ها) مربوط به کنفرانس چکیده خرید مقاله
Hosein Sabaghian-Bidgoli, Nasser Yazdani, Farshad Lahouti
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Locating sensor nodes is essential for many applications and protocols in wireless sensor network. Large numbers of localization algorithms have been proposed to do this. Distributed algorithms decrease communication cost while having lower accuracy. In this paper we propose a distributed method to localize sensor node using only neighboring information. Our focus is on location estimation although some ideas are also presented for implementation. Our algorithm employs an error analysis scheme and calculates expected error as well as estimated location for each sensor node. Simulation results confirm effectiveness of our scheme and prove capability of using connectivity approach.
Seyyed Amir Asghari, Hossein Pedram, Mohammad Khademi
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
One of the important issues in power and performance trade off analysis in Network on Chip designs is communication. Communication portion in the power consumption of System on Chip can be up to 50% of the whole power of consumption of the chip. This deems to be more important for Network on Chips which center around an intercommunication networks. Many Networks on Chip routers have been designed; however most of them have not been implemented until now. In this paper, design and implementation of a synchronous Network on Chip router based on asynchronous communication mechanism are presented. We designed a router with scalability feature which is synthesized in both FPGA and ASIC infrastructures. In addition, the proposed router uses low resource utilization percentage of FPGA and ASIC.
M. Alinia Ahandani, N. Pourqorban Shirjoposht, R. Banimahd
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Job-shop scheduling problem is demonstrated as one of the NP-complete problems. To solve this problem, we propose two types of hybrid shuffled frog leaping algorithm. Hybrid algorithms are generated by combining the shuffled frog leaping and a local search method. Also a new local search method by combining two other simple local searches is proposed. The obtained results demonstrate that our proposed hybrid algorithms have a better performance than their nonhybrid competitors. Also a comparison among proposed hybrid shuffled frog leaping and hybrid genetic algorithms demonstrate that the hybrid shuffled frog leaping algorithms can be generated a better schedule than their genetic algorithm competitors. A caparison of the best obtained results with the results reported in the considered literature shows that our proposed algorithms have a comparable performance.
M. valizadeh, N. armanfard, M. komeili, E. kabir
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
In this paper, we present a novel hybrid algorithm for binarization of badly illuminated document images. This algorithm locally enhances the document image and makes the gray levels of text and background pixels separable. Afterward a simple global binarization algorithm binarizes the enhanced image. The enhancement process is a novel method that uses a separate transformation function to map the gray level of each pixel into a new domain. For each pixel, the transformation function is determined using its neighboring pixels gray level. The proposed binarization algorithm is robust for wide variety of degraded document images. Evaluation over a set of degraded document images illustrates the effectiveness of our proposed binarization algorithm.
Ali B. Hashemi, M.R Meybodi
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
PSO, like many stochastic search methods, is very sensitive to efficient parameter setting. As modifying a single parameter may result in a large effect. In this paper, we propose a new a new learning automatabased approach for adaptive PSO parameter selection. In this approach three learning automata are utilized to determine values of each parameter for updating particles velocity namely inertia weight, cognitive and social components. Experimental results show that the proposed algorithms compared to other schemes such as SPSO, PSO-IW, PSO TVAC, PSO-LP, DAPSO, GPSO, and DCPSO have the same or even higher ability to find better local minima. In addition, proposed algorithms converge to stopping criteria significantly faster than most of the PSO algorithms.
M. H. Moattar, M. M. Homayounpour
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
One of the most important phases of speaker indexing is speaker clustering which aims to find the number of speakers in a speech document and merge the speech segments corresponding to a single speaker. The most critical source of problem in speaker clustering is the speech segments duration which may be so short that proper segment modeling becomes hard to achieve. An alternative suggestion in these situations is to adapt global models with new data instead of building the speaker models from the ground. In this paper we investigate two adaptation techniques in eigen-voice space for improving clustering performance especially for shorter speech utterances. These techniques were embedded in a clustering framework and evaluated on a set of domestic conversational speech. We have also compared the proposed methods with some other known techniques. The experiments show a considerable improvement in speaker clustering performance.
Hoda Maleki, Babak Sadeghiyan
چهاردهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Reversible Cellular Automata is applicable in cryptographic functions. A reversible CA can be obtained by employing reversible rules. In this paper, we propose 65280 two-dimensional reversible CA rules by compounding one-dimensional reversible rules. We produce these rules by alternately applying onedimensional CA rule f1 to the rows and applying another rule f2 to the columns of the configuration matrix of twodimensional CA. In addition to describing these rules, we consider the required cryptographic properties such as completeness, strict avalanche criteria, non-linearity, and differential-profile flatness for our proposed approach. According to the obtained results, 9463 rules are specified as appropriate rules for the purpose of applying in cryptographic functions. Only 510 rules do not satisfy any of the mentioned cryptographic properties and the other remain rules satisfy some of the properties.
مهدی محمدی, ناصر قاسم‌آقایی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
مریم بیسادی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
زینب بنی‌اسدی, حسین نظام‌آبادی‌پور, ملیحه مغفوری
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
زیبا اسلامی, هدی قوامی‌پور
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
علی جراحی, بهرنگ مهرپرور, بهروز مینایی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
جواد عباسی آقاملکی, علیرضا احمدی‌فرد
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
محمدحسن صمدانی, مهدی شجری, محمدمهدی آهنی‌ها
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
طیبه رجب‌زاده, عابدین واحدیان, حمیدرضا پوررضا
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
مصطفی چرمی, علی محلوجی‌فر
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
فاطمه آخوندی, الهه خانی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
زهرا نریمانی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
هاله عربی, حسین ابراهیم‌نژاد
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
محمد امین مهرعلیان, کاظم فولادی
پانزدهمین کنفرانس ملی سالانه انجمن کامپیوتر ایران
1 87 88 89 90 91 92 93 143