فا   |   En
Login
76 77 78 79 80 81 82 83 84 85 86 87 88
Paper Title Authors Conference Abstract
Human Identification by Gait using k-mean Clustering Algorithm and Dynamic Time Warping A. Amiri
M. Fathy
R. Tahery
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Gait Recognition refers to automatic identification of an individual based on his/her style of walking; it's a new biometrics recognition technology. This paper describes a new approach to gait recognition based ... more
Gait Recognition refers to automatic identification of an individual based on his/her style of walking; it's a new biometrics recognition technology. This paper describes a new approach to gait recognition based on kmean clustering algorithm. Body silhouette is extracted by a simple background subtraction, and the clustering is performed to partition image sequence into clusters, so the vectors of feature can be extracted. The recognition is achieved by dynamic time warping technique. We evaluate the proposed gait recognition method on the Gait Challenge database of the University of South Florida (USF), and the experimental results demonstrate that our approach has a good recognition performance. less
Gait Recognition refers to automatic identification of an individual based on his/her style of walking; it's a new biometrics recognition technology. This paper describes a new approach to gait recognition based ... more
خرید مقاله
A Multi-Determiner Privacy Protection System for Pervasive Computing Environments Anis Yousefi
Rasool Jalili
Mahdi Niamanesh
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
One of the most challenging problems of pervasive computing is protecting the privacy of individuals' data by respecting the principles of awareness and consent with minimum distraction. A suitable approach should consider ... more
One of the most challenging problems of pervasive computing is protecting the privacy of individuals' data by respecting the principles of awareness and consent with minimum distraction. A suitable approach should consider the intention of all authorized entities determining data disclosure and usage regulations. Therefore, as an extension to current privacy protection approaches which consider only one determiner for a private data item, we propose the idea of multi-determiner privacy protection. In this paper, we investigate possible determiners of private data and propose a set of meta-data which are required to cover the concept of multideterminacy including ownership-information, operators, and DELEGATION behavior. Besides, we devise and evaluate a deadlock-free and conflict-free algorithm to manage ownership and DELEGATION scenario in answering a request. We subsequently integrate the algorithm and the required meta-data in a multi-determiner privacy protection architecture which works as a mediator to protect multi-determiner private data. We demonstrate the applicability of our work through a prototype implementation and realization of a sample scenario. less
One of the most challenging problems of pervasive computing is protecting the privacy of individuals' data by respecting the principles of awareness and consent with minimum distraction. A suitable approach should consider ... more
خرید مقاله
A priori decision threshold parameter setting in speaker verification systems M. Raissi Dehkordi
M.M. Homayounpour
J. Kabudian
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Threshold setting methods are one of the most important tasks in any speaker verification system. Equal Error Rate (EER) and Minimum Error Rate (MER) criteria are usually used for performance evaluation ... more
Threshold setting methods are one of the most important tasks in any speaker verification system. Equal Error Rate (EER) and Minimum Error Rate (MER) criteria are usually used for performance evaluation in speaker verification systems. It is important to know that EER and MER are two a posteriori methods for decision threshold estimation and can not be used in real world applications. In real world applications decision thresholds should be determined a priori, i.e. a validation phase is needed to conduct some inter-speaker and intra-speaker verification tests and to use obtained distances or likelihoods for estimation of a priori decision thresholds. In this paper, we present a least square error based method for calculation of parameters which we need to estimate decision thresholds. For this we use means and variances of inter-speaker and intra-speaker distances and estimate necessary parameters for calculating decision thresholds. The proposed method leads to an optimum a priori estimation of decision threshold values. less
Threshold setting methods are one of the most important tasks in any speaker verification system. Equal Error Rate (EER) and Minimum Error Rate (MER) criteria are usually used for performance evaluation ... more
خرید مقاله
Effects of Applying Normalization Methods in Accuracy of Speaker Verification Systems M. Raissi Dehkordi
M.M Homayounpor
J. Kabudian
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Normalization methods are used to improve accuracy in speaker verification systems. In this paper, some of the most usual normalization methods including maximum, TNorm, and ZNorm normalization methods were investigated on GMM ... more
Normalization methods are used to improve accuracy in speaker verification systems. In this paper, some of the most usual normalization methods including maximum, TNorm, and ZNorm normalization methods were investigated on GMM speaker modeling approach. Maximum normalization method was shown to have the best accuracy among the studied methods. Also, hybrids of normalization methods led to better speaker verification accuracy. In this paper, serial hybrid of normalization methods was also considered. It was shown that applying Maximum normalization method for two successive times leads to the best result. Serial hybrid approach increased recognition time. So we proposed twostage normalization approach that has special consideration on accuracy and recognition time of speaker verification system. less
Normalization methods are used to improve accuracy in speaker verification systems. In this paper, some of the most usual normalization methods including maximum, TNorm, and ZNorm normalization methods were investigated on GMM ... more
خرید مقاله
Probing Attack Detection on Computer Networks using Support Vector Machine Hamid Reza Shoja Moadab
Mohammad Mehdi Homayounpour
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Attacks on Computer networks can be divided into four groups including denial of service (DOS), unauthorized access from remote machine (R2L), unauthorized access to super user privileges (U2R) and probing (Probe). ... more
Attacks on Computer networks can be divided into four groups including denial of service (DOS), unauthorized access from remote machine (R2L), unauthorized access to super user privileges (U2R) and probing (Probe). Using information collected from a system along probing attack, an attacker can identify vulnerability of victim system and specify the kind of attack to penetrate that system. Probing attack is the preamble of other attacks, so if that attack is detected and prevented, the immunity of the system is more promoted . In this paper we use support vector machine (SVM) to detect probing attack. The results of our experiments performed on dataset provided by the DARPA intrusion detection evaluation program; show that SVM classifier outperforms many other classifiers for detection of probing attacks. less
Attacks on Computer networks can be divided into four groups including denial of service (DOS), unauthorized access from remote machine (R2L), unauthorized access to super user privileges (U2R) and probing (Probe). ... more
خرید مقاله
A Modified Version of SNOW2.0 Hadi Ahmadi
Yaser Esmaeili Salehani
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
In 2000, Ekdahl and Johansson introduced the stream cipher SNOW, as a proposal for the NESSIE project, but a few Guess and Determine (GD) attacks followed and indicated certain weaknesses in ... more
In 2000, Ekdahl and Johansson introduced the stream cipher SNOW, as a proposal for the NESSIE project, but a few Guess and Determine (GD) attacks followed and indicated certain weaknesses in the design. Then a new version of SNOW, called SNOW2.0, was developed as a modified version of SNOW1.0. Yet this stream cipher is also vulnerable against some introduced attacks. This paper gives some criteria of modifying an LFSR-based stream cipher against GD attacks. Next, using one of these criteria, we introduce a modified version of SNOW2.0 with respect to GD attacks. The results of evaluating the modified SNOW2.0 against other general attacks show that the new proposed algorithm is more resistant against other types of general attacks, i.e. TMDTO, distinguishing and algebraic attacks. less
In 2000, Ekdahl and Johansson introduced the stream cipher SNOW, as a proposal for the NESSIE project, but a few Guess and Determine (GD) attacks followed and indicated certain weaknesses in ... more
خرید مقاله
A Conceptualization of B2B Electronic Commerce Success From Sell Side Perspective Behshid Behkamal
Mohammad Kazem Akbari
Mohsen Kahani
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
In our paper, a new approach for critical success factors of Business to Business (B2B) electronic commerce is presented. Important aspects of this approach can be classified into three main groups; ... more
In our paper, a new approach for critical success factors of Business to Business (B2B) electronic commerce is presented. Important aspects of this approach can be classified into three main groups; environmental, internal and inter-organizational factors. The first group pertains to the factors that change the conditions equally for all companies in the business space and are out of influence of firms. Internal factors comprise individual features of companies, such as business strategies, culture, resources and etc. The Inter-organizational dimension is included the factors that are related to organization ability to set up Inter-organizational relationships electronically. Experimental results showed promising in evaluating the quality of business enterprises. less
In our paper, a new approach for critical success factors of Business to Business (B2B) electronic commerce is presented. Important aspects of this approach can be classified into three main groups; ... more
خرید مقاله
A Novel Modulo 2n+1 Adder Scheme Somayeh Timarchi
Keivan Navi
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Modulo 2n +1 adders are important for several applications including residue number system implementations, digital signal processors and cryptography algorithms. In this paper we present a new number system and a novel ... more
Modulo 2n +1 adders are important for several applications including residue number system implementations, digital signal processors and cryptography algorithms. In this paper we present a new number system and a novel addition algorithm for its operands. In this paper, we present two new architectures for designing modulo 2n +1 adder, based on ripple carry adder. The first architecture utilizes a more rapid architecture whereas the second applies less hardware. In the proposed method, the special treatment required for zero operands in diminished-one number system is removed. In the fastest modulo 2n +1 adders in normal binary system, we are faced with 3-operand adders. This problem is also resolved in this paper. less
Modulo 2n +1 adders are important for several applications including residue number system implementations, digital signal processors and cryptography algorithms. In this paper we present a new number system and a novel ... more
خرید مقاله
Information Theoretic Text Classification A. Aavani
A. Farjudian
M. Salmani-Jelodar
A. Andalib
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
The assignment of natural language texts to two or more predefined categories based on their contents, is an important component in many information organization and management tasks. This paper presents an information ... more
The assignment of natural language texts to two or more predefined categories based on their contents, is an important component in many information organization and management tasks. This paper presents an information theoretic approach for text classification problem that we call it ITTC. Here, we prove that ITTC is theoretically equivalent to Bayesian classifier. However, when classification task is performed over dynamic or noisy data, or when the training data do not represent all probable cases, ITTC outperforms Bayesian classifier. We also show that the complexity of ITTC over test set grows linearly by the size of input data .We use some news groups, to evaluate the superior performance of our approach. less
The assignment of natural language texts to two or more predefined categories based on their contents, is an important component in many information organization and management tasks. This paper presents an information ... more
خرید مقاله
Farsi phoneme duration modelling using multivariate adaptive regression splines (MARS) Masoomeh Bahreini
Mohammad Mehdi Homayounpour
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
In this paper, the application of “Multivariate Adaptive Regression Splines” (MARS) to the problem of segmental (phonemic) duration modelling in Farsi text-to-speech systems is presented. Segmental duration is influenced by a number ... more
In this paper, the application of “Multivariate Adaptive Regression Splines” (MARS) to the problem of segmental (phonemic) duration modelling in Farsi text-to-speech systems is presented. Segmental duration is influenced by a number of contextual factors such as segment identity, stress, position of a target segment within a syllable, word, and phrase. These factors interact with each other and a good model of segment duration should account for the problem of factor's interaction. Databases of speech data often encounters with sparse data problem. MARS is a technique to estimate general functions of high-dimensional arguments given sparse data, which automatically selects the parameters and the structure of the model based on available data and deals with the problem of interaction between factors. Besides highly accurate prediction, a MARS model also allows interpretation of its structure. Using MARS method for Farsi segmental duration modeling yields a correlation coefficient of 86.50 between observed and predicted durations for training data of and a correlation coefficient of 80.83 between observed and predicted durations for testing data. The performance of MARS model was also compared to Multi-Layer Perceptron (MLP) neural network. MLP neural netwok was trained using an error Back Propagation algorithm. Using MLP neural network for segmental duration medeling of Farsi language leads to a model with a correlation coefficient between observed and predicted durations of 84.86 for training data and 80.97 for testing data. less
In this paper, the application of “Multivariate Adaptive Regression Splines” (MARS) to the problem of segmental (phonemic) duration modelling in Farsi text-to-speech systems is presented. Segmental duration is influenced by a number ... more
خرید مقاله
76 77 78 79 80 81 82 83 84 85 86 87 88
Conferences and Events





Registration in Computer Society of Iran
Search Papers