فا   |   En
ورود به سایت
عنوان مقاله نویسنده (ها) مربوط به کنفرانس چکیده
Extending SAT-Plan to handle iterative actions Nina Ghanbari Ghooshchi
Gholam-Reza Ghasem-Sani
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Many real world problems have iterative behaviors, so planners should be able to tackle such problems and generate iterative plans. Iterative actions have been considered by a few of planners, and ... مشاهده کامل
Many real world problems have iterative behaviors, so planners should be able to tackle such problems and generate iterative plans. Iterative actions have been considered by a few of planners, and most of the efforts have been based on linear planning. In this paper, we show how SAT-Plan, which is one of the fastest existing planners, can be extended to generate recursive plans. Generated recursive plans are similar to those that are generated by humans for iterative problems. The main idea in this work is based on the mathematical induction, and has been implemented. Results obtained from testing the extended SAT-Plan on several examples from the blocks-world domain, confirms the success of the proposed idea. عدم مشاهده کامل
Many real world problems have iterative behaviors, so planners should be able to tackle such problems and generate iterative plans. Iterative actions have been considered by a few of planners, and ... مشاهده کامل
خرید مقاله
Run-time Verification and Fault Tolerance of Real-time and Reactive Programs with Real-time Logic Approach Saeed Jalili
Mehdi MirzaAghaei
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Conventional software validation methods for real-time and reactive programs are not fully reliable. Considering complexity of formal verification and incompleteness of testing approaches, runtime verification approach is used. In this paper, Safety ... مشاهده کامل
Conventional software validation methods for real-time and reactive programs are not fully reliable. Considering complexity of formal verification and incompleteness of testing approaches, runtime verification approach is used. In this paper, Safety properties (after extracting from program requirement specification) are represented in Real-Time Logic (RTL) and fault tolerant module reaction are added to the program. Program monitoring module (which is realized by Functional, Timing and Deadline Aspects) is weaved to the program code. The enriched program executes in the environment. The monitoring module verifies program behavior by considering the specified safety properties and when any violence of a property is detected, then the specified reaction (Fault Tolerance) activates and navigates the program to a safe state. عدم مشاهده کامل
Conventional software validation methods for real-time and reactive programs are not fully reliable. Considering complexity of formal verification and incompleteness of testing approaches, runtime verification approach is used. In this paper, Safety ... مشاهده کامل
خرید مقاله
Managing Variability at Business Process Level for Information Systems Product Lines Maryam Razavian
Ramtin Khosravi
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Variability management is a major concern in successful exploitation of variabilities and commonalities of software product families which also affects different aspects of development activities. To use software product line approach in ... مشاهده کامل
Variability management is a major concern in successful exploitation of variabilities and commonalities of software product families which also affects different aspects of development activities. To use software product line approach in information systems context, it is necessary to bring in variability in different phases of the life cycle, including business modeling which is recognized as a key part of developing enterprise information systems. This paper presents a method for variability management at business process level which covers the activities of eliciting variability, representing variability in business process models, and also managing dependencies among different variabilities. The method supports traceability by mapping variabilities at business process level to assets of lower levels of abstraction, including feature and use case models. To model business processes, UML activity diagrams are exploited. عدم مشاهده کامل
Variability management is a major concern in successful exploitation of variabilities and commonalities of software product families which also affects different aspects of development activities. To use software product line approach in ... مشاهده کامل
خرید مقاله
Image Registration in E-Learning Applications T. Lotfi
S. Kasaei
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Real-time video transmission is considered as an important way for information broadcasting. One noticeable example in this area is E-leaning applications, which is based on real-time video processing and transmission. On the ... مشاهده کامل
Real-time video transmission is considered as an important way for information broadcasting. One noticeable example in this area is E-leaning applications, which is based on real-time video processing and transmission. On the other hand, the process of registration is a fundamental component in automatic image and video processing. In our previous work, we implemented a new method for cut detection technique based on dominant lines and angles. This paper introduces a new video registration technique that uses dominant angles extracted from edge information of the video frames in one shot. To the best of our knowledge, it is the first works done for registration in E-learning applications. This method is compatible with our application’s requirements and has a low complexity and high speed. We compare our method against three established techniques and present our results using different video sequences. عدم مشاهده کامل
Real-time video transmission is considered as an important way for information broadcasting. One noticeable example in this area is E-leaning applications, which is based on real-time video processing and transmission. On the ... مشاهده کامل
خرید مقاله
Obstacle Avoidance using a Near Optimal Trajectory for Omni-directional Mobile Robots Alireza Sahraei
Mohammad Taghi Manzuri
Masoud Tajfard
Saman Khoshbakht
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
This paper presents a computationally effective trajectory generation algorithm for omni-directional mobile robots. In this algorithm we use the Voronoi diagram to find a sketchy path that keeps away from obstacles ... مشاهده کامل
This paper presents a computationally effective trajectory generation algorithm for omni-directional mobile robots. In this algorithm we use the Voronoi diagram to find a sketchy path that keeps away from obstacles and then we smooth this path with a novel use of Bezier curves. This algorithm defines velocity magnitude of a robot along the curved path to satisfy optimality conditions and dynamic constrains. The algorithm has been implemented on real robots, and we present experimental results in different environments. عدم مشاهده کامل
This paper presents a computationally effective trajectory generation algorithm for omni-directional mobile robots. In this algorithm we use the Voronoi diagram to find a sketchy path that keeps away from obstacles ... مشاهده کامل
خرید مقاله
A Parallel Genetic Local Search Algorithm for Computer Intrusion Detection M. Saniee Abadeh
J. Habibi
Z. Barzegar
M. Sergi
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
The security of networked computers plays a strategic role in modern computer systems. This task is so complicated because the determination of normal and abnormal behaviors in computer networks is hard, ... مشاهده کامل
The security of networked computers plays a strategic role in modern computer systems. This task is so complicated because the determination of normal and abnormal behaviors in computer networks is hard, as the boundaries cannot be well defined. This paper proposes a parallel genetic local search algorithm (PAGELS) to generate fuzzy rules capable of detecting intrusive behaviors in computer networks. The system uses the Michigan’s approach, where each individual represents a fuzzy rule which has the form “if condition then prediction”. In the presented algorithm the global population is divided into some subpopulations, each assigned to a distinct processor. Each subpopulation consists of the same class fuzzy rules. These rules evolve independently in the proposed parallel manner. Experimental results show that the presented algorithm produces fuzzy rules which can be used to construct a reliable intrusion detection system. عدم مشاهده کامل
The security of networked computers plays a strategic role in modern computer systems. This task is so complicated because the determination of normal and abnormal behaviors in computer networks is hard, ... مشاهده کامل
خرید مقاله
A Performance Comparison of Different Back Propagation Neural Networks in Inverse Kinematics Mahdi Hosseini
Leila Sharif
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Error Back Propagation, a class of neural networks, is proposed to solve the inverse kinematics problem in robotic manipulator. In this approach a network has been trained to learn a desired ... مشاهده کامل
Error Back Propagation, a class of neural networks, is proposed to solve the inverse kinematics problem in robotic manipulator. In this approach a network has been trained to learn a desired set of joint angles positions from a given set of end effectors positions. This paper demonstrates some methods of Back Propagation neural network which can be used to solve inverse kinematics. Next the performance of these methods has been compared for inverse kinematics problems. The used Error Back Propagation techniques are the Standard, Momentum and Delta Bar- Delta. عدم مشاهده کامل
Error Back Propagation, a class of neural networks, is proposed to solve the inverse kinematics problem in robotic manipulator. In this approach a network has been trained to learn a desired ... مشاهده کامل
خرید مقاله
A Uniform BIST Strategy for CPU Data Path in RT Level of Abstraction Rahebeh Niaraki Asli
Sattar Mirzakuchaki
Sharzad Mirkhani
Zainalabedin Navabi
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
The flexible DFT strategy helps designers control the eventual cost of test during the chip design phase. To reach a uniform test strategy for CPU data path, we use S-graph information. ... مشاهده کامل
The flexible DFT strategy helps designers control the eventual cost of test during the chip design phase. To reach a uniform test strategy for CPU data path, we use S-graph information. But register files and internal memory structures cannot be easily represented by S-graphs. In most processors investigated, one can find some sort of internal memory like general-purpose registers, stacks or queues. The control hardware and addressing schemes of such structures make it difficult to test them. We design a wrapper around these structures to isolate them from data path and incorporate them to S-graphs applications. These compatible S-graphs provide a uniform BIST strategy for the whole data path. The wrapper design can test itself concurrently with other modules so it can reduce the test application time. We apply our method on SAYEH CPU as a vehicle. عدم مشاهده کامل
The flexible DFT strategy helps designers control the eventual cost of test during the chip design phase. To reach a uniform test strategy for CPU data path, we use S-graph information. ... مشاهده کامل
خرید مقاله
A Vision System Based on Neural Network for a Mobile Robot and Statistical Analyses of Its Errors M. H. Korayem
V. Ehtemam
V. Azimirad
R. Sabzevari
M. Madani
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
This paper is about the vision and odometry errors of a sweeper mobile robot. The robot takes advantage of color recognition in its vision in order to detect different types of ... مشاهده کامل
This paper is about the vision and odometry errors of a sweeper mobile robot. The robot takes advantage of color recognition in its vision in order to detect different types of objects having different colors. An effective artificial neural network which is extremely easy to implement and is surprisingly quick in practice for mobile robots is introduced. Consequently, the connectionist is applied on the robot for object detection and the gained results are compared with other methods. Also experimental tests plus statistical analyses are carried out in order to measure the robot localization errors. عدم مشاهده کامل
This paper is about the vision and odometry errors of a sweeper mobile robot. The robot takes advantage of color recognition in its vision in order to detect different types of ... مشاهده کامل
خرید مقاله
Estimation of Complexity in Agent Oriented Methodologies via Evaluation of Models and Artifacts Reza Basseda
Azin Moallem
Tannaz Alinaghi
Fattaneh Taghiyare
دوازدهمین کنفرانس بین‌المللی سالانه انجمن کامپیوتر ایران
Several methodologies with their own characteristics have been proposed in the area of agent-oriented software engineering. Consequently, deciding which methodology to select in a specific case is an important issue and ... مشاهده کامل
Several methodologies with their own characteristics have been proposed in the area of agent-oriented software engineering. Consequently, deciding which methodology to select in a specific case is an important issue and it can lead to decrease software development cost and effort. Thus, importance of evaluation of methodologies will be highlighted in choosing the appropriate methodology in the development process of an application. It can also help in developing new methodologies and improving existing ones. In this paper, we are going to provide an evaluation framework of agent oriented methodologies. To demonstrate the usage of the suggested framework, it is applied to evaluate two methodologies (MESSAGE and Prometheus) using a proper example. Results show that, using our method, methodologies can be truly compared and evaluated. عدم مشاهده کامل
Several methodologies with their own characteristics have been proposed in the area of agent-oriented software engineering. Consequently, deciding which methodology to select in a specific case is an important issue and ... مشاهده کامل
خرید مقاله
کنفرانس‌ها و رخدادها





عضویت در انجمن کامپیوتر ایران
جستجوی مقالات