Original/Review Paper H.5. Image Processing and Computer Vision
Morphological Exudate Detection in Retinal Images using PCA-based Optic Disc Removal

J. Darvish; M. Ezoji

Volume 7, Issue 4 , November 2019, Pages 487-493

https://doi.org/10.22044/jadm.2019.1488

Abstract
  Diabetic retinopathy lesion detection such as exudate in fundus image of retina can lead to early diagnosis of the disease. Retinal image includes dark areas such as main blood vessels and retinal tissue and also bright areas such as optic disk, optical fibers and lesions e.g. exudate. In this paper, ...  Read More

Original/Review Paper H.6. Pattern Recognition
Robust Iris Recognition in Unconstrained Environments

A. Noruzi; M. Mahlouji; A. Shahidinejad

Volume 7, Issue 4 , November 2019, Pages 495-506

https://doi.org/10.22044/jadm.2019.7434.1884

Abstract
  A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by him/her. Iris recognition (IR) is known to be the most reliable and accurate biometric identification system. The iris recognition system (IRS) consists of an automatic segmentation ...  Read More

Research Note H.5.7. Segmentation
Image Segmentation using Improved Imperialist Competitive Algorithm and a Simple Post-processing

V. Naghashi; Sh. Lotfi

Volume 7, Issue 4 , November 2019, Pages 507-519

https://doi.org/10.22044/jadm.2019.3935.1464

Abstract
  Image segmentation is a fundamental step in many of image processing applications. In most cases the image’s pixels are clustered only based on the pixels’ intensity or color information and neither spatial nor neighborhood information of pixels is used in the clustering process. Considering ...  Read More

Review Article H.5. Image Processing and Computer Vision
Video Abstraction in H.264/AVC Compressed Domain

A. R. Yamghani; F. Zargari

Volume 7, Issue 4 , November 2019, Pages 521-535

https://doi.org/10.22044/jadm.2019.7850.1928

Abstract
  Video abstraction allows searching, browsing and evaluating videos only by accessing the useful contents. Most of the studies are using pixel domain, which requires the decoding process and needs more time and process consuming than compressed domain video abstraction. In this paper, we present a new ...  Read More

Original/Review Paper H.3.14. Knowledge Management
A New Algorithm for High Average-utility Itemset Mining

A. Soltani; M. Soltani

Volume 7, Issue 4 , November 2019, Pages 537-550

https://doi.org/10.22044/jadm.2019.7483.1893

Abstract
  High utility itemset mining (HUIM) is a new emerging field in data mining which has gained growing interest due to its various applications. The goal of this problem is to discover all itemsets whose utility exceeds minimum threshold. The basic HUIM problem does not consider length of itemsets in its ...  Read More

Original/Review Paper H.6.4. Clustering
Entropy-based Consensus for Distributed Data Clustering

M. Owhadi-Kareshki; M.R. Akbarzadeh-T.

Volume 7, Issue 4 , November 2019, Pages 551-561

https://doi.org/10.22044/jadm.2018.4237.1514

Abstract
  The increasingly larger scale of available data and the more restrictive concerns on their privacy are some of the challenging aspects of data mining today. In this paper, Entropy-based Consensus on Cluster Centers (EC3) is introduced for clustering in distributed systems with a consideration for confidentiality ...  Read More

Research Note H.3.2.2. Computer vision
Depth Improvement for FTV Systems Based on the Gradual Omission of Outliers

H. Hosseinpour; Seyed A. Moosavie nia; M. A. Pourmina

Volume 7, Issue 4 , November 2019, Pages 563-574

https://doi.org/10.22044/jadm.2019.7278.1864

Abstract
  Virtual view synthesis is an essential part of computer vision and 3D applications. A high-quality depth map is the main problem with virtual view synthesis. Because as compared to the color image the resolution of the corresponding depth image is low. In this paper, an efficient and confided method ...  Read More

Original/Review Paper H.3.5. Knowledge Representation Formalisms and Methods
Context-aware Modeling for Spatio-temporal Data Transmitted from a Wireless Body Sensor Network

N. Khozouie; F. Fotouhi Ghazvini; B. Minaei

Volume 7, Issue 4 , November 2019, Pages 575-588

https://doi.org/10.22044/jadm.2018.6005.1707

Abstract
  Context-aware systems must be interoperable and work across different platforms at any time and in any place. Context data collected from wireless body area networks (WBAN) may be heterogeneous and imperfect, which makes their design and implementation difficult. In this research, we introduce a model ...  Read More

Original/Review Paper C.5. Operating Systems
Analytical evaluation of an innovative decision-making algorithm for VM live migration

M. Tajamolian; M. Ghasemzadeh

Volume 7, Issue 4 , November 2019, Pages 589-596

https://doi.org/10.22044/jadm.2018.7178.1847

Abstract
  In order to achieve the virtual machines live migration, the two "pre-copy" and "post-copy" strategies are presented. Each of these strategies, depending on the operating conditions of the machine, may perform better than the other. In this article, a new algorithm is presented that automatically decides ...  Read More

Original/Review Paper I.3.7. Engineering
A Technique for Improving Web Mining using Enhanced Genetic Algorithm

F. Nosratian; H. Nematzadeh; H. Motameni

Volume 7, Issue 4 , November 2019, Pages 597-606

https://doi.org/10.22044/jadm.2018.3746.1435

Abstract
  World Wide Web is growing at a very fast pace and makes a lot of information available to the public. Search engines used conventional methods to retrieve information on the Web; however, the search results of these engines are still able to be refined and their accuracy is not high enough. One of the ...  Read More

Original/Review Paper H.6.3.2. Feature evaluation and selection
A Novel Architecture for Detecting Phishing Webpages using Cost-based Feature Selection

A. Zangooei; V. Derhami; F. Jamshidi

Volume 7, Issue 4 , November 2019, Pages 607-616

https://doi.org/10.22044/jadm.2019.7183.1852

Abstract
  Phishing is one of the luring techniques used to exploit personal information. A phishing webpage detection system (PWDS) extracts features to determine whether it is a phishing webpage or not. Selecting appropriate features improves the performance of PWDS. Performance criteria are detection accuracy ...  Read More

Research Note D. Data
Prediction and Diagnosis of Diabetes Mellitus using a Water Wave Optimization Algorithm

S. Taherian Dehkordi; A. Khatibi Bardsiri; M. H. Zahedi

Volume 7, Issue 4 , November 2019, Pages 617-630

https://doi.org/10.22044/jadm.2018.6446.1758

Abstract
  Data mining is an appropriate way to discover information and hidden patterns in large amounts of data, where the hidden patterns cannot be easily discovered in normal ways. One of the most interesting applications of data mining is the discovery of diseases and disease patterns through investigating ...  Read More