Paper Title |
Authors |
Conference |
Abstract |
|
A Learning Fuzzy Controller to Control Exploration Rate in XCS |
Ali Hamzeh
Adel Rahmani
Nahid Parsa
|
دوازدهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران |
Explore/Exploit dilemma is one of the most challenging issues in reinforcement learning area as well as learning
classifier systems such as XCS. In this paper, an intelligent method is proposed to ... more
Explore/Exploit dilemma is one of the most challenging issues in reinforcement learning area as well as learning
classifier systems such as XCS. In this paper, an intelligent method is proposed to control the exploration rate in
XCS to improve its long-term performance. This method is called Intelligent Exploration Method (IEM) and is
applied to some benchmark problems to show the advantages of adaptive exploration rate for XCS. less
Explore/Exploit dilemma is one of the most challenging issues in reinforcement learning area as well as learning
classifier systems such as XCS. In this paper, an intelligent method is proposed to ... more
|
خرید مقاله
|
A Semantic Web Context-Sensitive Trust Model for Research Networks |
Alireza Ziai
Ehsan Akhgari
Arash Ganjoo Haghighi
Hassan Abolhassani
|
دوازدهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران |
Trust is the highest level layer of the Semantic Web. In this paper, a specialized social network concept - a
Research Network - is defined formally, and a trust model is ... more
Trust is the highest level layer of the Semantic Web. In this paper, a specialized social network concept - a
Research Network - is defined formally, and a trust model is specified on top of it. The trust model specifies trust
queries as well as an algorithm to answer them. Trust propagation, and the reductive method are discussed in
detail. Also, the result of applying the trust query algorithm on a test data set is discussed. The trust model, as
well as the related concepts have been defined formally. less
Trust is the highest level layer of the Semantic Web. In this paper, a specialized social network concept - a
Research Network - is defined formally, and a trust model is ... more
|
خرید مقاله
|
An Improved Heuristic Method for Solving Label Correspondence in Cluster Ensembles |
Abdolreza Mirzaei
Mohammad Rahmati
|
دوازدهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران |
Ensemble based methods have successfully been used in a variety of application. Recently using these
methods in clustering algorithms has attracted a great deal of interest. Voting and averaging are two ... more
Ensemble based methods have successfully been used in a variety of application. Recently using these
methods in clustering algorithms has attracted a great deal of interest. Voting and averaging are two effective
combining methods that are frequently used in multiple classifier systems. To use these methods in an
unsupervised scenario (to combine multiple partitioning of data) the partitions must be relabeled first, i.e.
similar partitions in different partitioning gets the same label. This phase has a great influence on the ensemble
performance. In this paper a new heuristic label assignment method is proposed. The result of the Monte Carlo
simulation and experimental results on real data show that the performance of ensemble method could be
significantly improved using this method. less
Ensemble based methods have successfully been used in a variety of application. Recently using these
methods in clustering algorithms has attracted a great deal of interest. Voting and averaging are two ... more
|
خرید مقاله
|
3D Visibility Graph |
Mojtaba Nouri Bygi
Mohammad Ghodsi
|
دوازدهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران |
The visibility graph is a fundamental geometric structure which is useful in many applica-
tions, including illumination and rendering, motion planning, pattern recognition, and sensor
networks. While the concept of visibility graph ... more
The visibility graph is a fundamental geometric structure which is useful in many applica-
tions, including illumination and rendering, motion planning, pattern recognition, and sensor
networks. While the concept of visibility graph is widely studied for 2D scenes, there is not
any acceptable equivalence of visibility graph for 3D space.
In this paper we explain some reason for this absence. Then we try to ¯nd a new way
to de¯ne geometric structure in 3D space. Following our new way, we easily de¯ne a new
structure called 3D visibility graph which we believe is the natural way to extend visibility
graph in 3D scenes. We show how to compute it in an acceptable time.
keywords: computational geometry, visibility graph, 3D visibility. less
The visibility graph is a fundamental geometric structure which is useful in many applica-
tions, including illumination and rendering, motion planning, pattern recognition, and sensor
networks. While the concept of visibility graph ... more
|
خرید مقاله
|
Ultra-Leaky SRAM Cells Caused by Process Variation: Detection and Leakage Suppression at System-Level |
Maziar Goudarzi
Tohru Ishihara
Hiroto Yasuura
|
دوازدهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران |
Exceptionally leaky transistors are increasingly more frequent in nano-scale technologies due to lower
threshold voltage and its increased variation. Such leaky transistors may even change position with changes in
the operating voltage ... more
Exceptionally leaky transistors are increasingly more frequent in nano-scale technologies due to lower
threshold voltage and its increased variation. Such leaky transistors may even change position with changes in
the operating voltage and temperature, and hence, static physical redundancy is not sufficient to tolerate such
threats to yield. We show that in SRAM cells this leakage depends on the cell value and propose a first softwarebased
runtime technique that suppresses such abnormal leakages by storing safe values in the corresponding
cache lines before going to standby mode. Analysis shows the performance penalty is, in the worst case, linearly
dependent to the number of so-cured cache lines while the energy saving linearly increases by the time spent in
standby mode. Analysis and experimental results on commercial processors confirm that the technique is viable
if the standby duration is more than a small fraction of a second. less
Exceptionally leaky transistors are increasingly more frequent in nano-scale technologies due to lower
threshold voltage and its increased variation. Such leaky transistors may even change position with changes in
the operating voltage ... more
|
خرید مقاله
|
Target Cost Weight Training for Unit Selection Speech Synthesis |
Majid Namnabat
M. Mehdi Homayounpour
|
دوازدهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران |
In recent years, the unit selection-based concatenative speech synthesis method using a large corpus has attracted great
attention, as it produces more natural quality speech compared to the parameter driven models. ... more
In recent years, the unit selection-based concatenative speech synthesis method using a large corpus has attracted great
attention, as it produces more natural quality speech compared to the parameter driven models. Weights of cost
functions of unit selection approach have great effect on output quality. Important proportion or weight of every feature
must be determined such a manner that cost functions has suitable correlation by human perceptual. In this paper, we
proposed a new approach to automatically determine optimal weights for target cost using classification and regression
trees. In this method, an objective measure by suitable correlation to human perceptually is initially selected. So, for
instances of every phoneme, a classification tree has build to predict objective measure. Therefore, the proportion
importance of every feature in classifying data using regression trees are determined and considered as weight of this
feature. The objective measure prediction has over 50% correlation using the proposed method that showed 65%
improvement relation to previous methods. less
In recent years, the unit selection-based concatenative speech synthesis method using a large corpus has attracted great
attention, as it produces more natural quality speech compared to the parameter driven models. ... more
|
خرید مقاله
|
Applying a new Collaborative Pedagogical Practice to a Virtual learning Environment |
Farhang Arab sheibani
Feridoon Arab sheibani
Mohammad Reza Rezaie
|
دوازدهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران |
This paper presents a report on research carried out in the field of networked collaborative learning. In
particular, we present a theory/model-based approach applied to a distance education course that is ... more
This paper presents a report on research carried out in the field of networked collaborative learning. In
particular, we present a theory/model-based approach applied to a distance education course that is developed
and taught in a virtual learning environment. In this educational practice, our objective has been twofold: first,
to improve distance teaching and learning, and second, to facilitate social interaction among students and
between tutor and students via the Web. To that end, our research approach has been based on the following
actions: First, we analysed the goals, needs, expectations and preferences of our students, based on a previous
pilot experience on distance collaborative learning, in order to understand what is actually happening in
networked learning when collaboration becomes an integrated part of the whole learning process. Second, we
proceeded to the design, development and implementation of a new pedagogical practice, called Virtual Study
Group, to encourage and enhance learning through collaborative construction of knowledge and reflective
interaction which contribute to a deeper understanding of the course contents. The paper focuses mainly on the
latter. Finally, we provide a critical analysis and evaluation of the outcomes of this experience and of the many
issues arising from applying this collaborative pedagogical practice to a virtual learning environment. less
This paper presents a report on research carried out in the field of networked collaborative learning. In
particular, we present a theory/model-based approach applied to a distance education course that is ... more
|
خرید مقاله
|
Inspiration By Predator-Prey Interaction for Congestion Control In Communication Networks |
Morteza Analoui
Shahram Jamali
|
دوازدهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران |
We believe that future network applications will benefit by adopting key biological principles and mechanisms.
This paper is a successful attempt in order to design a congestion control mechanism. This attempt ... more
We believe that future network applications will benefit by adopting key biological principles and mechanisms.
This paper is a successful attempt in order to design a congestion control mechanism. This attempt is based on
predator-prey mathematical model. We show that interaction of those Internet entities that involved in
congestion control mechanisms is similar to predator-prey interaction. This similarity motivates us to map the
predator-prey approach to the Internet congestion control mechanism and design a bio-inspired congestion
control scheme. The results show that using appropriately defined parameters, this model leads to a stable, fair
and high performance congestion control algorithm. less
We believe that future network applications will benefit by adopting key biological principles and mechanisms.
This paper is a successful attempt in order to design a congestion control mechanism. This attempt ... more
|
خرید مقاله
|
Multipath Routing in Mobile Ad hoc Networks: Design Issues |
Maysam Yabandeh
Hossein Mohammadi
Nasser Yazdani
|
دوازدهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران |
Mobile Ad-hoc Networking (MANET) is an emerging issue in research and industry since its inherent properties
satisfy a broad range of requirements and dreams of the future networking. The infrastructure-less nature ... more
Mobile Ad-hoc Networking (MANET) is an emerging issue in research and industry since its inherent properties
satisfy a broad range of requirements and dreams of the future networking. The infrastructure-less nature of
MANETs as well as mobility requirement, makes the routing process as a major basis and consequently
challenge for building such networks. Due to frequent changes in the topology of a MANET, route discovery
process should be invoked frequently, resulting in significant time, processing, and energy overhead. One might
mention that discovering and maintaining multiple routes might degrade the problem in terms of time
complexity and energy consumption. In this paper, we discuss the design issues and challenges for a typical
multipath routing algorithm for MANETs and identify the major ideas behind different approaches. We also
provide a comparative survey of proposed methods as well as their appropriate design issues. less
Mobile Ad-hoc Networking (MANET) is an emerging issue in research and industry since its inherent properties
satisfy a broad range of requirements and dreams of the future networking. The infrastructure-less nature ... more
|
خرید مقاله
|
A New Structure for Datapath Synthesis |
Arash Ahmadi
Mark Zwolinski
|
دوازدهمین کنفرانس بینالمللی سالانه انجمن کامپیوتر ایران |
From high level synthesis point of view, target design can be divided into two parts: controller and datapath.
Single shared bus is a suitable structure for datapath synthesis regarding interconnections costs ... more
From high level synthesis point of view, target design can be divided into two parts: controller and datapath.
Single shared bus is a suitable structure for datapath synthesis regarding interconnections costs which suffers
from several drawbacks such as its low data communication bandwidth. It has also been shown that the wordlength
of functional units has a great impact on design costs. A combination of both methods is the core idea of
this paper which is offering an improved communication structure. In this method datapath is partitioned into
groups connected to segmented shared buses and every partition has a different width and all the functional
units connected to a bus partition have the same input/output word-lengths. Having controlled the group binding
and word-length of the functional units, as well as the other synthesis parameters, a high-level synthesis tool is
introduced to implement DSP algorithms in digital hardware. The tool uses a multi-objective optimization genetic
algorithm to minimize the circuit area, delay, power consumption and digital noise by selecting optimal
grouping and word-length for the shared bus structure. Results demonstrate that savings can be made in the
overall system costs by applying this method. less
From high level synthesis point of view, target design can be divided into two parts: controller and datapath.
Single shared bus is a suitable structure for datapath synthesis regarding interconnections costs ... more
|
خرید مقاله
|