فا   |   En
Login
72 73 74 75 76 77 78 79 80 81 82 83 84
Paper Title Authors Conference Abstract
A Learning Fuzzy Controller to Control Exploration Rate in XCS Ali Hamzeh
Adel Rahmani
Nahid Parsa
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Explore/Exploit dilemma is one of the most challenging issues in reinforcement learning area as well as learning classifier systems such as XCS. In this paper, an intelligent method is proposed to ... more
Explore/Exploit dilemma is one of the most challenging issues in reinforcement learning area as well as learning classifier systems such as XCS. In this paper, an intelligent method is proposed to control the exploration rate in XCS to improve its long-term performance. This method is called Intelligent Exploration Method (IEM) and is applied to some benchmark problems to show the advantages of adaptive exploration rate for XCS. less
Explore/Exploit dilemma is one of the most challenging issues in reinforcement learning area as well as learning classifier systems such as XCS. In this paper, an intelligent method is proposed to ... more
خرید مقاله
A Semantic Web Context-Sensitive Trust Model for Research Networks Alireza Ziai
Ehsan Akhgari
Arash Ganjoo Haghighi
Hassan Abolhassani
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Trust is the highest level layer of the Semantic Web. In this paper, a specialized social network concept - a Research Network - is defined formally, and a trust model is ... more
Trust is the highest level layer of the Semantic Web. In this paper, a specialized social network concept - a Research Network - is defined formally, and a trust model is specified on top of it. The trust model specifies trust queries as well as an algorithm to answer them. Trust propagation, and the reductive method are discussed in detail. Also, the result of applying the trust query algorithm on a test data set is discussed. The trust model, as well as the related concepts have been defined formally. less
Trust is the highest level layer of the Semantic Web. In this paper, a specialized social network concept - a Research Network - is defined formally, and a trust model is ... more
خرید مقاله
An Improved Heuristic Method for Solving Label Correspondence in Cluster Ensembles Abdolreza Mirzaei
Mohammad Rahmati
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Ensemble based methods have successfully been used in a variety of application. Recently using these methods in clustering algorithms has attracted a great deal of interest. Voting and averaging are two ... more
Ensemble based methods have successfully been used in a variety of application. Recently using these methods in clustering algorithms has attracted a great deal of interest. Voting and averaging are two effective combining methods that are frequently used in multiple classifier systems. To use these methods in an unsupervised scenario (to combine multiple partitioning of data) the partitions must be relabeled first, i.e. similar partitions in different partitioning gets the same label. This phase has a great influence on the ensemble performance. In this paper a new heuristic label assignment method is proposed. The result of the Monte Carlo simulation and experimental results on real data show that the performance of ensemble method could be significantly improved using this method. less
Ensemble based methods have successfully been used in a variety of application. Recently using these methods in clustering algorithms has attracted a great deal of interest. Voting and averaging are two ... more
خرید مقاله
3D Visibility Graph Mojtaba Nouri Bygi
Mohammad Ghodsi
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
The visibility graph is a fundamental geometric structure which is useful in many applica- tions, including illumination and rendering, motion planning, pattern recognition, and sensor networks. While the concept of visibility graph ... more
The visibility graph is a fundamental geometric structure which is useful in many applica- tions, including illumination and rendering, motion planning, pattern recognition, and sensor networks. While the concept of visibility graph is widely studied for 2D scenes, there is not any acceptable equivalence of visibility graph for 3D space. In this paper we explain some reason for this absence. Then we try to ¯nd a new way to de¯ne geometric structure in 3D space. Following our new way, we easily de¯ne a new structure called 3D visibility graph which we believe is the natural way to extend visibility graph in 3D scenes. We show how to compute it in an acceptable time. keywords: computational geometry, visibility graph, 3D visibility. less
The visibility graph is a fundamental geometric structure which is useful in many applica- tions, including illumination and rendering, motion planning, pattern recognition, and sensor networks. While the concept of visibility graph ... more
خرید مقاله
Ultra-Leaky SRAM Cells Caused by Process Variation: Detection and Leakage Suppression at System-Level Maziar Goudarzi
Tohru Ishihara
Hiroto Yasuura
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Exceptionally leaky transistors are increasingly more frequent in nano-scale technologies due to lower threshold voltage and its increased variation. Such leaky transistors may even change position with changes in the operating voltage ... more
Exceptionally leaky transistors are increasingly more frequent in nano-scale technologies due to lower threshold voltage and its increased variation. Such leaky transistors may even change position with changes in the operating voltage and temperature, and hence, static physical redundancy is not sufficient to tolerate such threats to yield. We show that in SRAM cells this leakage depends on the cell value and propose a first softwarebased runtime technique that suppresses such abnormal leakages by storing safe values in the corresponding cache lines before going to standby mode. Analysis shows the performance penalty is, in the worst case, linearly dependent to the number of so-cured cache lines while the energy saving linearly increases by the time spent in standby mode. Analysis and experimental results on commercial processors confirm that the technique is viable if the standby duration is more than a small fraction of a second. less
Exceptionally leaky transistors are increasingly more frequent in nano-scale technologies due to lower threshold voltage and its increased variation. Such leaky transistors may even change position with changes in the operating voltage ... more
خرید مقاله
Target Cost Weight Training for Unit Selection Speech Synthesis Majid Namnabat
M. Mehdi Homayounpour
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
In recent years, the unit selection-based concatenative speech synthesis method using a large corpus has attracted great attention, as it produces more natural quality speech compared to the parameter driven models. ... more
In recent years, the unit selection-based concatenative speech synthesis method using a large corpus has attracted great attention, as it produces more natural quality speech compared to the parameter driven models. Weights of cost functions of unit selection approach have great effect on output quality. Important proportion or weight of every feature must be determined such a manner that cost functions has suitable correlation by human perceptual. In this paper, we proposed a new approach to automatically determine optimal weights for target cost using classification and regression trees. In this method, an objective measure by suitable correlation to human perceptually is initially selected. So, for instances of every phoneme, a classification tree has build to predict objective measure. Therefore, the proportion importance of every feature in classifying data using regression trees are determined and considered as weight of this feature. The objective measure prediction has over 50% correlation using the proposed method that showed 65% improvement relation to previous methods. less
In recent years, the unit selection-based concatenative speech synthesis method using a large corpus has attracted great attention, as it produces more natural quality speech compared to the parameter driven models. ... more
خرید مقاله
Applying a new Collaborative Pedagogical Practice to a Virtual learning Environment Farhang Arab sheibani
Feridoon Arab sheibani
Mohammad Reza Rezaie
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
This paper presents a report on research carried out in the field of networked collaborative learning. In particular, we present a theory/model-based approach applied to a distance education course that is ... more
This paper presents a report on research carried out in the field of networked collaborative learning. In particular, we present a theory/model-based approach applied to a distance education course that is developed and taught in a virtual learning environment. In this educational practice, our objective has been twofold: first, to improve distance teaching and learning, and second, to facilitate social interaction among students and between tutor and students via the Web. To that end, our research approach has been based on the following actions: First, we analysed the goals, needs, expectations and preferences of our students, based on a previous pilot experience on distance collaborative learning, in order to understand what is actually happening in networked learning when collaboration becomes an integrated part of the whole learning process. Second, we proceeded to the design, development and implementation of a new pedagogical practice, called Virtual Study Group, to encourage and enhance learning through collaborative construction of knowledge and reflective interaction which contribute to a deeper understanding of the course contents. The paper focuses mainly on the latter. Finally, we provide a critical analysis and evaluation of the outcomes of this experience and of the many issues arising from applying this collaborative pedagogical practice to a virtual learning environment. less
This paper presents a report on research carried out in the field of networked collaborative learning. In particular, we present a theory/model-based approach applied to a distance education course that is ... more
خرید مقاله
Inspiration By Predator-Prey Interaction for Congestion Control In Communication Networks Morteza Analoui
Shahram Jamali
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
We believe that future network applications will benefit by adopting key biological principles and mechanisms. This paper is a successful attempt in order to design a congestion control mechanism. This attempt ... more
We believe that future network applications will benefit by adopting key biological principles and mechanisms. This paper is a successful attempt in order to design a congestion control mechanism. This attempt is based on predator-prey mathematical model. We show that interaction of those Internet entities that involved in congestion control mechanisms is similar to predator-prey interaction. This similarity motivates us to map the predator-prey approach to the Internet congestion control mechanism and design a bio-inspired congestion control scheme. The results show that using appropriately defined parameters, this model leads to a stable, fair and high performance congestion control algorithm. less
We believe that future network applications will benefit by adopting key biological principles and mechanisms. This paper is a successful attempt in order to design a congestion control mechanism. This attempt ... more
خرید مقاله
Multipath Routing in Mobile Ad hoc Networks: Design Issues Maysam Yabandeh
Hossein Mohammadi
Nasser Yazdani
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Mobile Ad-hoc Networking (MANET) is an emerging issue in research and industry since its inherent properties satisfy a broad range of requirements and dreams of the future networking. The infrastructure-less nature ... more
Mobile Ad-hoc Networking (MANET) is an emerging issue in research and industry since its inherent properties satisfy a broad range of requirements and dreams of the future networking. The infrastructure-less nature of MANETs as well as mobility requirement, makes the routing process as a major basis and consequently challenge for building such networks. Due to frequent changes in the topology of a MANET, route discovery process should be invoked frequently, resulting in significant time, processing, and energy overhead. One might mention that discovering and maintaining multiple routes might degrade the problem in terms of time complexity and energy consumption. In this paper, we discuss the design issues and challenges for a typical multipath routing algorithm for MANETs and identify the major ideas behind different approaches. We also provide a comparative survey of proposed methods as well as their appropriate design issues. less
Mobile Ad-hoc Networking (MANET) is an emerging issue in research and industry since its inherent properties satisfy a broad range of requirements and dreams of the future networking. The infrastructure-less nature ... more
خرید مقاله
A New Structure for Datapath Synthesis Arash Ahmadi
Mark Zwolinski
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
From high level synthesis point of view, target design can be divided into two parts: controller and datapath. Single shared bus is a suitable structure for datapath synthesis regarding interconnections costs ... more
From high level synthesis point of view, target design can be divided into two parts: controller and datapath. Single shared bus is a suitable structure for datapath synthesis regarding interconnections costs which suffers from several drawbacks such as its low data communication bandwidth. It has also been shown that the wordlength of functional units has a great impact on design costs. A combination of both methods is the core idea of this paper which is offering an improved communication structure. In this method datapath is partitioned into groups connected to segmented shared buses and every partition has a different width and all the functional units connected to a bus partition have the same input/output word-lengths. Having controlled the group binding and word-length of the functional units, as well as the other synthesis parameters, a high-level synthesis tool is introduced to implement DSP algorithms in digital hardware. The tool uses a multi-objective optimization genetic algorithm to minimize the circuit area, delay, power consumption and digital noise by selecting optimal grouping and word-length for the shared bus structure. Results demonstrate that savings can be made in the overall system costs by applying this method. less
From high level synthesis point of view, target design can be divided into two parts: controller and datapath. Single shared bus is a suitable structure for datapath synthesis regarding interconnections costs ... more
خرید مقاله
72 73 74 75 76 77 78 79 80 81 82 83 84
Conferences and Events





Registration in Computer Society of Iran
Search Papers