Volume 12 (2024)
Volume 11 (2023)
Volume 10 (2022)
Volume 9 (2021)
Volume 8 (2020)
Volume 7 (2019)
Volume 6 (2018)
Volume 5 (2017)
Volume 4 (2016)
Volume 3 (2015)
Volume 2 (2014)
Volume 1 (2013)

Efficiency of a multi-objective imperialist competitive algorithm: A bi-objective location-routing-inventory problem with probabilistic routes

N. Nekooghadirli; R. Tavakkoli-Moghaddam; V.R. Ghezavati

Volume 2, Issue 2 , July 2014, , Pages 105-112

https://doi.org/10.22044/jadm.2014.292

Abstract
  An integrated model considers all parameters and elements of different deficiencies in one problem. This paper presents a new integrated model of a supply chain that simultaneously considers facility location, vehicle routing and inventory control problems as well as their interactions in one problem, ...  Read More

F.1. General
Data sanitization in association rule mining based on impact factor

A. Telikani; A. Shahbahrami; R. Tavoli

Volume 3, Issue 2 , July 2015, , Pages 131-140

https://doi.org/10.5829/idosi.JAIDM.2015.03.02.02

Abstract
  Data sanitization is a process that is used to promote the sharing of transactional databases among organizations and businesses, it alleviates concerns for individuals and organizations regarding the disclosure of sensitive patterns. It transforms the source database into a released database so that ...  Read More

F.4.4. Experimental design
Application of statistical techniques and artificial neural network to estimate force from sEMG signals

V. Khoshdel; A. R Akbarzadeh

Volume 4, Issue 2 , July 2016, , Pages 135-141

https://doi.org/10.5829/idosi.JAIDM.2016.04.02.02

Abstract
  This paper presents an application of design of experiments techniques to determine the optimized parameters of artificial neural network (ANN), which are used to estimate force from Electromyogram (sEMG) signals. The accuracy of ANN model is highly dependent on the network parameters settings. There ...  Read More

H.5. Image Processing and Computer Vision
Sparse Structured Principal Component Analysis and Model Learning for Classification and Quality Detection of Rice Grains

S. Mavaddati

Volume 8, Issue 2 , April 2020, , Pages 161-175

https://doi.org/10.22044/jadm.2019.7402.1877

Abstract
  In scientific and commercial fields associated with modern agriculture, the categorization of different rice types and determination of its quality is very important. Various image processing algorithms are applied in recent years to detect different agricultural products. The problem of rice classification ...  Read More

H.3.15.3. Evolutionary computing and genetic algorithms
Winner Determination in Combinatorial Auctions using Hybrid Ant Colony Optimization and Multi-Neighborhood Local Search

M. B. Dowlatshahi; V. Derhami

Volume 5, Issue 2 , July 2017, , Pages 169-181

https://doi.org/10.22044/jadm.2017.880

Abstract
  A combinatorial auction is an auction where the bidders have the choice to bid on bundles of items. The WDP in combinatorial auctions is the problem of finding winning bids that maximize the auctioneer’s revenue under the constraint that each item can be allocated to at most one bidder. The WDP ...  Read More

H.3.15.1. Adaptive hypermedia
Hybrid Adaptive Educational Hypermedia ‎Recommender Accommodating User’s Learning ‎Style and Web Page Features‎

M. Tahmasebi; F. Fotouhi; M. Esmaeili

Volume 7, Issue 2 , April 2019, , Pages 225-238

https://doi.org/10.22044/jadm.2018.6397.1755

Abstract
  Personalized recommenders have proved to be of use as a solution to reduce the information overload ‎problem. Especially in Adaptive Hypermedia System, a recommender is the main module that delivers ‎suitable learning objects to learners. Recommenders suffer from the cold-start and the sparsity ...  Read More

H.3.15.3. Evolutionary computing and genetic algorithms
Tuning Shape Parameter of Radial Basis Functions in Zooming Images using Genetic Algorithm

A.M Esmilizaini; A.M Latif; Gh. Barid Loghmani

Volume 6, Issue 2 , July 2018, , Pages 251-262

https://doi.org/10.22044/jadm.2017.4815.1575

Abstract
  Image zooming is one of the current issues of image processing where maintaining the quality and structure of the zoomed image is important. To zoom an image, it is necessary that the extra pixels be placed in the data of the image. Adding the data to the image must be consistent with the texture in ...  Read More

Solving Traveling Salesman Problem based on Biogeography-based Optimization and Edge Assembly Cross-over

A. Salehi; B. Masoumi

Volume 8, Issue 3 , July 2020, , Pages 313-329

https://doi.org/10.22044/jadm.2020.7835.1922

Abstract
  Biogeography-Based Optimization (BBO) algorithm has recently been of great interest to researchers for simplicity of implementation, efficiency, and the low number of parameters. The BBO Algorithm in optimization problems is one of the new algorithms which have been developed based on the biogeography ...  Read More

H.6.2.2. Fuzzy set
Identification of Cement Rotary Kiln in Noisy Condition using Takagi-Sugeno Neuro-fuzzy System

N. Moradkhani; M. Teshnehlab

Volume 7, Issue 3 , July 2019, , Pages 367-375

https://doi.org/10.22044/jadm.2018.5295.1638

Abstract
  Cement rotary kiln is the main part of cement production process that have always attracted many researchers’ attention. But this complex nonlinear system has not been modeled efficiently which can make an appropriate performance specially in noisy condition. In this paper Takagi-Sugeno neuro-fuzzy ...  Read More

H.6. Pattern Recognition
Robust Iris Recognition in Unconstrained Environments

A. Noruzi; M. Mahlouji; A. Shahidinejad

Volume 7, Issue 4 , November 2019, , Pages 495-506

https://doi.org/10.22044/jadm.2019.7434.1884

Abstract
  A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by him/her. Iris recognition (IR) is known to be the most reliable and accurate biometric identification system. The iris recognition system (IRS) consists of an automatic segmentation ...  Read More

H.6. Pattern Recognition
Holistic Farsi handwritten word recognition using gradient features

Z. Imani; Z. Ahmadyfard; A. Zohrevand

Volume 4, Issue 1 , March 2016, , Pages 19-25

https://doi.org/10.5829/idosi.JAIDM.2016.04.01.03

Abstract
  In this paper we address the issue of recognizing Farsi handwritten words. Two types of gradient features are extracted from a sliding vertical stripe which sweeps across a word image. These are directional and intensity gradient features. The feature vector extracted from each stripe is then coded using ...  Read More

H.5. Image Processing and Computer Vision
Image authentication using LBP-based perceptual image hashing

R. Davarzani; S. Mozaffari; Kh. Yaghmaie

Volume 3, Issue 1 , March 2015, , Pages 21-30

https://doi.org/10.5829/idosi.JAIDM.2015.03.01.03

Abstract
  Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary ...  Read More

H.5. Image Processing and Computer Vision
Iris localization by means of adaptive thresholding and Circular Hough Transform

S. Memar Zadeh; A. Harimi

Volume 5, Issue 1 , March 2017, , Pages 21-28

https://doi.org/10.22044/jadm.2016.731

Abstract
  In this paper, a new iris localization method for mobile devices is presented. Our system uses both intensity and saturation threshold on the captured eye images to determine iris boundary and sclera area, respectively. Estimated iris boundary pixels which have been placed outside the sclera will be ...  Read More

D. Data
An Evolutionary Multi-objective Discretization based on Normalized Cut

M. Hajizadeh-Tahan; M. Ghasemzadeh

Volume 8, Issue 1 , January 2020, , Pages 25-37

https://doi.org/10.22044/jadm.2019.8507.1989

Abstract
  Learning models and related results depend on the quality of the input data. If raw data is not properly cleaned and structured, the results are tending to be incorrect. Therefore, discretization as one of the preprocessing techniques plays an important role in learning processes. The most important ...  Read More

H.3.2.2. Computer vision
A Pixon-based Image Segmentation Method Considering Textural Characteristics of Image

M. H. Khosravi

Volume 7, Issue 1 , January 2019, , Pages 27-34

https://doi.org/10.22044/jadm.2017.5988.1706

Abstract
  Image segmentation is an essential and critical process in image processing and pattern recognition. In this paper we proposed a textured-based method to segment an input image into regions. In our method an entropy-based textured map of image is extracted, followed by an histogram equalization step ...  Read More

H.5. Image Processing and Computer Vision
Automatic Optic Disc Center and Boundary Detection in Color Fundus Images

F. Abdali-Mohammadi; A. Poorshamam

Volume 6, Issue 1 , March 2018, , Pages 35-46

https://doi.org/10.22044/jadm.2017.967

Abstract
  Accurately detection of retinal landmarks, like optic disc, is an important step in the computer aided diagnosis frameworks. This paper presents an efficient method for automatic detection of the optic disc’s center and estimating its boundary. The center and initial diameter of optic disc are ...  Read More

Dynamic anomaly detection by using incremental approximate PCA in AODV-based MANETs

Meysam Alikhani; Mohammad Ahmadi Livani

Volume 1, Issue 2 , July 2013, , Pages 89-101

https://doi.org/10.22044/jadm.2013.100

Abstract
  Mobile Ad-hoc Networks (MANETs) by contrast of other networks have more vulnerability because of having nature properties such as dynamic topology and no infrastructure. Therefore, a considerable challenge for these networks, is a method expansion that to be able to specify anomalies with high accuracy ...  Read More

A new methodology for deriving the efficient frontier of stocks portfolios: An advanced risk-return model

Sh. Mehrjoo; M. Jasemi; A. Mahmoudi

Volume 2, Issue 2 , July 2014, , Pages 113-123

https://doi.org/10.22044/jadm.2014.305

Abstract
  In this paper after a general literature review on the concept of Efficient Frontier (EF), an important inadequacy of the Variance based models for deriving EFs and the high necessity for applying another risk measure is exemplified. In this regard for this study the risk measure of Lower Partial Moment ...  Read More

A.1. General
Designing stable neural identifier based on Lyapunov method

F. Alibakhshi; M. Teshnehlab; M. Alibakhshi; M. Mansouri

Volume 3, Issue 2 , July 2015, , Pages 141-147

https://doi.org/10.5829/idosi.JAIDM.2015.03.02.03

Abstract
  The stability of learning rate in neural network identifiers and controllers is one of the challenging issues which attracts great interest from researchers of neural networks. This paper suggests adaptive gradient descent algorithm with stable learning laws for modified dynamic neural network (MDNN) ...  Read More

D.3. Data Storage Representations
Fuzzy multi-criteria selection procedures in choosing data source

E. Azhir; N. Daneshpour; Sh. Ghanbari

Volume 4, Issue 2 , July 2016, , Pages 143-156

https://doi.org/10.5829/idosi.JAIDM.2016.04.02.03

Abstract
  Technology assessment and selection has a substantial impact on organizations procedures in regards to technology transfer. Technological decisions are usually made by a group of experts, and whereby integrity of these viewpoints to a single decision can be quite complex. Today, operational databases ...  Read More

H.3. Artificial Intelligence
Hand Gesture Recognition from RGB-D Data using 2D and 3D Convolutional Neural Networks: a comparative study

M. Kurmanji; F. Ghaderi

Volume 8, Issue 2 , April 2020, , Pages 177-188

https://doi.org/10.22044/jadm.2019.7903.1929

Abstract
  Despite considerable enhances in recognizing hand gestures from still images, there are still many challenges in the classification of hand gestures in videos. The latter comes with more challenges, including higher computational complexity and arduous task of representing temporal features. Hand movement ...  Read More

H.3.15.3. Evolutionary computing and genetic algorithms
A Hybrid MOEA/D-TS for Solving Multi-Objective Problems

Sh. Lotfi; F. Karimi

Volume 5, Issue 2 , July 2017, , Pages 183-195

https://doi.org/10.22044/jadm.2017.886

Abstract
  In many real-world applications, various optimization problems with conflicting objectives are very common. In this paper we employ Multi-Objective Evolutionary Algorithm based on Decomposition (MOEA/D), a newly developed method, beside Tabu Search (TS) accompaniment to achieve a new manner for solving ...  Read More

B.3. Communication/Networking and Information Technology
Behavior-Based Online Anomaly Detection for a Nationwide Short Message Service

Z. Shaeiri; J. Kazemitabar; Sh. Bijani; M. Talebi

Volume 7, Issue 2 , April 2019, , Pages 239-247

https://doi.org/10.22044/jadm.2019.6924.1812

Abstract
  As fraudsters understand the time window and act fast, real-time fraud management systems becomes necessary in Telecommunication Industry. In this work, by analyzing traces collected from a nationwide cellular network over a period of a month, an online behavior-based anomaly detection system is provided. ...  Read More

F.4.17. Survival analysis
Extracting Predictor Variables to Construct Breast Cancer Survivability Model with Class Imbalance Problem

S. Miri Rostami; M. Ahmadzadeh

Volume 6, Issue 2 , July 2018, , Pages 263-276

https://doi.org/10.22044/jadm.2017.5061.1609

Abstract
  Application of data mining methods as a decision support system has a great benefit to predict survival of new patients. It also has a great potential for health researchers to investigate the relationship between risk factors and cancer survival. But due to the imbalanced nature of datasets associated ...  Read More

Shuffled Frog-Leaping Programming for Solving Regression Problems

M. Abdollahi; M. Aliyari Shoorehdeli

Volume 8, Issue 3 , July 2020, , Pages 331-341

https://doi.org/10.22044/jadm.2020.7847.1924

Abstract
  There are various automatic programming models inspired by evolutionary computation techniques. Due to the importance of devising an automatic mechanism to explore the complicated search space of mathematical problems where numerical methods fails, evolutionary computations are widely studied and applied ...  Read More