D.4. Data Encryption
A New Method for Encryption of Color Images based on Combination of Chaotic Systems

H. Khodadadi; A. Zandvakili

Volume 7, Issue 3 , July 2019, , Pages 377-383

https://doi.org/10.22044/jadm.2019.7510.1895

Abstract
  This paper presents a new method for encryption of color images based on a combination of chaotic systems, which makes the image encryption more efficient and robust. The proposed algorithm generated three series of data, ranged between 0 and 255, using a chaotic Chen system. Another Chen system was ...  Read More

H.5.7. Segmentation
Image Segmentation using Improved Imperialist Competitive Algorithm and a Simple Post-processing

V. Naghashi; Sh. Lotfi

Volume 7, Issue 4 , November 2019, , Pages 507-519

https://doi.org/10.22044/jadm.2019.3935.1464

Abstract
  Image segmentation is a fundamental step in many of image processing applications. In most cases the image’s pixels are clustered only based on the pixels’ intensity or color information and neither spatial nor neighborhood information of pixels is used in the clustering process. Considering ...  Read More

B.3. Communication/Networking and Information Technology
A new model for persian multi-part words edition based on statistical machine translation

M. Zahedi; A. Arjomandzadeh

Volume 4, Issue 1 , March 2016, , Pages 27-34

https://doi.org/10.5829/idosi.JAIDM.2016.04.01.04

Abstract
  Multi-part words in English language are hyphenated and hyphen is used to separate different parts. Persian language consists of multi-part words as well. Based on Persian morphology, half-space character is needed to separate parts of multi-part words where in many cases people incorrectly use space ...  Read More

H.5. Image Processing and Computer Vision
A stack-based chaotic algorithm for encryption of colored images

H. Khodadadi; O. Mirzaei

Volume 5, Issue 1 , March 2017, , Pages 29-37

https://doi.org/10.22044/jadm.2016.735

Abstract
  In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic ...  Read More

Feature selection using genetic algorithm for classification of schizophrenia using fMRI data

Hossein Shahamat; Ali A. Pouyan

Volume 3, Issue 1 , March 2015, , Pages 30-37

https://doi.org/10.5829/idosi.JAIDM.2015.03.01.04

Abstract
  In this paper we propose a new method for classification of subjects into schizophrenia and control groups using functional magnetic resonance imaging (fMRI) data. In the preprocessing step, the number of fMRI time points is reduced using principal component analysis (PCA). Then, independent component ...  Read More

H.6.3.1. Classifier design and evaluation
Exploiting Associations between Class Labels in Multi-label Classification

Z. Mirzamomen; Kh. Ghafooripour

Volume 7, Issue 1 , January 2019, , Pages 35-45

https://doi.org/10.22044/jadm.2018.5306.1652

Abstract
  Multi-label classification has many applications in the text categorization, biology and medical diagnosis, in which multiple class labels can be assigned to each training instance simultaneously. As it is often the case that there are relationships between the labels, extracting the existing relationships ...  Read More

H.6.5.13. Signal processing
Interval Type-II Fuzzy H∞ Frequency Control for an Island Microgrid

F. Sabahi

Volume 8, Issue 1 , January 2020, , Pages 39-48

https://doi.org/10.22044/jadm.2019.6982.1825

Abstract
  Frequency control is one of the key parts for the arrangement of the performance of a microgrid (MG) system. Theoretically, model-based controllers may be the ideal control mechanisms; however, they are highly sensitive to model uncertainties and have difficulty with preserving robustness. The presence ...  Read More

I. Computer Applications
Color Reduction in Hand-drawn Persian Carpet Cartoons before Discretization using image segmentation and finding edgy regions

M. Fateh; E. Kabir

Volume 6, Issue 1 , March 2018, , Pages 47-58

https://doi.org/10.22044/jadm.2017.908

Abstract
  In this paper, we present a method for color reduction of Persian carpet cartoons that increases both speed and accuracy of editing. Carpet cartoons are in two categories: machine-printed and hand-drawn. Hand-drawn cartoons are divided into two groups: before and after discretization. The purpose of ...  Read More

Designing an adaptive fuzzy control for robot manipulators using PSO

F. Solaimannouri; M. Haddad zarif; M. M. Fateh

Volume 2, Issue 2 , July 2014, , Pages 125-133

https://doi.org/10.22044/jadm.2014.307

Abstract
  This paper presents designing an optimal adaptive controller for tracking control of robot manipulators based on particle swarm optimization (PSO) algorithm. PSO algorithm has been employed to optimize parameters of the controller and hence to minimize the integral square of errors (ISE) as a performance ...  Read More

C. Software/Software Engineering
Improving the performance of MFCC for Persian robust speech recognition

D. Darabian; H. Marvi; M. Sharif Noughabi

Volume 3, Issue 2 , July 2015, , Pages 149-156

https://doi.org/10.5829/idosi.JAIDM.2015.03.02.04

Abstract
  The Mel Frequency cepstral coefficients are the most widely used feature in speech recognition but they are very sensitive to noise. In this paper to achieve a satisfactorily performance in Automatic Speech Recognition (ASR) applications we introduce a noise robust new set of MFCC vector estimated through ...  Read More

C. Software/Software Engineering
Bridging the semantic gap for software effort estimation by hierarchical feature selection techniques

S. Beiranvand; M.A. Z.Chahooki

Volume 4, Issue 2 , July 2016, , Pages 157-168

https://doi.org/10.5829/idosi.JAIDM.2016.04.02.04

Abstract
  Software project management is one of the significant activates in the software development process. Software Development Effort Estimation (SDEE) is a challenging task in the software project management. SDEE is an old activity in computer industry from 1940s and has been reviewed several times. A SDEE ...  Read More

C.3. Software Engineering
A Hybrid Meta-heuristic Approach to Cope with State Space Explosion in Model Checking Technique for Deadlock Freeness

N. Rezaee; H. Momeni

Volume 8, Issue 2 , April 2020, , Pages 189-199

https://doi.org/10.22044/jadm.2019.7564.1900

Abstract
  Model checking is an automatic technique for software verification through which all reachable states are generated from an initial state to finding errors and desirable patterns. In the model checking approach, the behavior and structure of system should be modeled. Graph transformation system is a ...  Read More

H.4.6. Computational Geometry and Object Modeling
A New Ontology-Based Approach for Human Activity Recognition from GPS Data

A. Mousavi; A. Sheikh Mohammad Zadeh; M. Akbari; A. Hunter

Volume 5, Issue 2 , July 2017, , Pages 197-210

https://doi.org/10.22044/jadm.2017.889

Abstract
  Mobile technologies have deployed a variety of Internet–based services via location based services. The adoption of these services by users has led to mammoth amounts of trajectory data. To use these services effectively, analysis of these kinds of data across different application domains is required ...  Read More

H.6.2.2. Fuzzy set
Developing a Course Recommender by Combining Clustering and Fuzzy Association Rules

Sh. Asadi; Seyed M. b. Jafari; Z. Shokrollahi

Volume 7, Issue 2 , April 2019, , Pages 249-262

https://doi.org/10.22044/jadm.2018.6260.1739

Abstract
  Each semester, students go through the process of selecting appropriate courses. It is difficult to find information about each course and ultimately make decisions. The objective of this paper is to design a course recommender model which takes student characteristics into account to recommend appropriate ...  Read More

D. Data
Impact of Patients’ Gender on Parkinson’s disease using Classification Algorithms

M. Abdar; M. Zomorodi-Moghadam

Volume 6, Issue 2 , July 2018, , Pages 277-285

https://doi.org/10.22044/jadm.2017.4673.1555

Abstract
  In this paper the accuracy of two machine learning algorithms including SVM and Bayesian Network are investigated as two important algorithms in diagnosis of Parkinson’s disease. We use Parkinson's disease data in the University of California, Irvine (UCI). In order to optimize the SVM algorithm, ...  Read More

Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals

M. Zeynali; H. Seyedarabi; B. Mozaffari Tazehkand

Volume 8, Issue 3 , July 2020, , Pages 343-356

https://doi.org/10.22044/jadm.2020.7858.1923

Abstract
  Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity ...  Read More

G.3.2. Logical Design
Fast Mux-based Adder with Low Delay and Low PDP

H. Tavakolaee; Gh. Ardeshir; Y. Baleghi

Volume 7, Issue 3 , July 2019, , Pages 385-392

https://doi.org/10.22044/jadm.2018.7177.1853

Abstract
  Adders, as one of the major components of digital computing systems, have a strong influence on their performance. There are various types of adders, each of which uses a different algorithm to do addition with a certain delay. In addition to low computational delay, minimizing power consumption is also ...  Read More

H.5. Image Processing and Computer Vision
Video Abstraction in H.264/AVC Compressed Domain

A. R. Yamghani; F. Zargari

Volume 7, Issue 4 , November 2019, , Pages 521-535

https://doi.org/10.22044/jadm.2019.7850.1928

Abstract
  Video abstraction allows searching, browsing and evaluating videos only by accessing the useful contents. Most of the studies are using pixel domain, which requires the decoding process and needs more time and process consuming than compressed domain video abstraction. In this paper, we present a new ...  Read More

F.2.7. Optimization
Applications of two new algorithms of cuckoo optimization (CO) and forest optimization (FO) for solving single row facility layout problem (SRFLP)

M. Maadi; M. Javidnia; M. Ghasemi

Volume 4, Issue 1 , March 2016, , Pages 35-48

https://doi.org/10.5829/idosi.JAIDM.2016.04.01.05

Abstract
  Nowadays, due to inherent complexity of real optimization problems, it has always been a challenging issue to develop a solution algorithm to these problems. Single row facility layout problem (SRFLP) is a NP-hard problem of arranging a number of rectangular facilities with varying length on one side ...  Read More

Timing analysis
Fuzzy clustering of time series data: A particle swarm optimization approach

Z. Izakian; M. Mesgari

Volume 3, Issue 1 , March 2015, , Pages 39-46

https://doi.org/10.5829/idosi.JAIDM.2015.03.01.05

Abstract
  With rapid development in information gathering technologies and access to large amounts of data, we always require methods for data analyzing and extracting useful information from large raw dataset and data mining is an important method for solving this problem. Clustering analysis as the most commonly ...  Read More

H.6.3.2. Feature evaluation and selection
Feature extraction of hyperspectral images using boundary semi-labeled samples and hybrid criterion

M. Imani; H. Ghassemian

Volume 5, Issue 1 , March 2017, , Pages 39-53

https://doi.org/10.22044/jadm.2017.787

Abstract
  Feature extraction is a very important preprocessing step for classification of hyperspectral images. The linear discriminant analysis (LDA) method fails to work in small sample size situations. Moreover, LDA has poor efficiency for non-Gaussian data. LDA is optimized by a global criterion. Thus, it ...  Read More

G.3.9. Database Applications
Using Combined Descriptive and Predictive Methods of Data Mining for Coronary Artery Disease Prediction: a Case Study Approach

M. Shamsollahi; A. Badiee; M. Ghazanfari

Volume 7, Issue 1 , January 2019, , Pages 47-58

https://doi.org/10.22044/jadm.2017.4992.1599

Abstract
  Heart disease is one of the major causes of morbidity in the world. Currently, large proportions of healthcare data are not processed properly, thus, failing to be effectively used for decision making purposes. The risk of heart disease may be predicted via investigation of heart disease risk factors ...  Read More

H.6.2.2. Fuzzy set
Improvement of Rule Generation Methods for Fuzzy Controller

N. Mohammadkarimi; V. Derhami

Volume 8, Issue 1 , January 2020, , Pages 49-54

https://doi.org/10.22044/jadm.2018.5593.1670

Abstract
  This paper proposes fuzzy modeling using obtained data. Fuzzy system is known as knowledge-based or rule-bases system. The most important part of fuzzy system is rule-base. One of problems of generation of fuzzy rule with training data is inconsistence data. Existence of inconsistence and uncertain states ...  Read More

F.2.7. Optimization
A Hybrid Meta-Heuristic Algorithm based on Imperialist Competition Algorithm

R. Roustaei; F. Yousefi Fakhr

Volume 6, Issue 1 , March 2018, , Pages 59-67

https://doi.org/10.22044/jadm.2016.823

Abstract
  The human has always been to find the best in all things. This Perfectionism has led to the creation of optimization methods. The goal of optimization is to determine the variables and find the best acceptable answer Due to the limitations of the problem, So that the objective function is minimum or ...  Read More

Employing data mining to explore association rules in drug addicts

Farzaneh Zahedi; Mohammad-Reza Zare-Mirakabad

Volume 2, Issue 2 , July 2014, , Pages 135-139

https://doi.org/10.22044/jadm.2014.308

Abstract
  Drug addiction is a major social, economic, and hygienic challenge that impacts on all the community and needs serious threat. Available treatments are successful only in short-term unless underlying reasons making individuals prone to the phenomenon are not investigated. Nowadays, there are some treatment ...  Read More