Volume 12 (2024)
Volume 11 (2023)
Volume 10 (2022)
Volume 9 (2021)
Volume 8 (2020)
Volume 7 (2019)
Volume 6 (2018)
Volume 5 (2017)
Volume 4 (2016)
Volume 3 (2015)
Volume 2 (2014)
Volume 1 (2013)

H.6.4. Clustering
Entropy-based Consensus for Distributed Data Clustering

M. Owhadi-Kareshki; M.R. Akbarzadeh-T.

Volume 7, Issue 4 , November 2019, , Pages 551-561


  The increasingly larger scale of available data and the more restrictive concerns on their privacy are some of the challenging aspects of data mining today. In this paper, Entropy-based Consensus on Cluster Centers (EC3) is introduced for clustering in distributed systems with a consideration for confidentiality ...  Read More

An Improved Algorithm for Network Reliability Evaluation

Mohammad Ghasemzadeh

Volume 1, Issue 1 , March 2013, , Pages 19-25


  Binary Decision Diagram (BDD) is a data structure proved to be compact in representation and efficient in manipulation of Boolean formulas. Using Binary decision diagram in network reliability analysis has already been investigated by some researchers. In this paper we show how an exact algorithm for ...  Read More

H.6. Pattern Recognition
Classification of ECG signals using Hermite functions and MLP neural networks

A. Ebrahimzadeh; M. Ahmadi; M. Safarnejad

Volume 4, Issue 1 , March 2016, , Pages 55-65


  Classification of heart arrhythmia is an important step in developing devices for monitoring the health of individuals. This paper proposes a three module system for classification of electrocardiogram (ECG) beats. These modules are: denoising module, feature extraction module and a classification module. ...  Read More

C.3. Software Engineering
Method integration: An approach to develop agent oriented methodologies

E. Ghandehari; F. Saadatjoo; M. A. Zare Chahooki

Volume 3, Issue 1 , March 2015, , Pages 59-76


  Agent oriented software engineering (AOSE) is an emerging field in computer science  and  proposes some systematic ideas for multi agent systems analysis, implementation and maintenance. Despite the various methodologies introduced in the agent-oriented software engineering, the main challenges ...  Read More

J.10.3. Financial
The application of data mining techniques in manipulated financial statement classification: The case of turkey

G. Ozdagoglu; A. Ozdagoglu; Y. Gumus; G. Kurt Gumus

Volume 5, Issue 1 , March 2017, , Pages 67-77


  Predicting financially false statements to detect frauds in companies has an increasing trend in recent studies. The manipulations in financial statements can be discovered by auditors when related financial records and indicators are analyzed in depth together with the experience of auditors in order ...  Read More

H.5. Image Processing and Computer Vision
Segmentation Assisted Object Distinction for Direct Volume Rendering

A. Azimzadeh Irani; R. Pourgholi

Volume 8, Issue 1 , January 2020, , Pages 67-82


  Ray Casting is a direct volume rendering technique for visualizing 3D arrays of sampled data. It has vital applications in medical and biological imaging. Nevertheless, it is inherently open to cluttered classification results. It suffers from overlapping transfer function values and lacks a sufficiently ...  Read More

H.3. Artificial Intelligence
A New Routing Algorithm for Vehicular Ad-hoc Networks based on Glowworm Swarm Optimization Algorithm

R. Yarinezhad; A. Sarabi

Volume 7, Issue 1 , January 2019, , Pages 69-76


  Vehicular ad hoc networks (VANETs) are a particular type of Mobile ad hoc networks (MANET) in which the vehicles are considered as nodes. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles. In this paper, ...  Read More

A.1. General
Competitive Intelligence Text Mining: Words Speak

A. Zarei; M. Maleki; D. Feiz; M. A. Siahsarani kojuri

Volume 6, Issue 1 , March 2018, , Pages 79-92


  Competitive intelligence (CI) has become one of the major subjects for researchers in recent years. The present research is aimed to achieve a part of the CI by investigating the scientific articles on this field through text mining in three interrelated steps. In the first step, a total of 1143 articles ...  Read More

High impedance fault detection: Discrete wavelet transform and fuzzy function approximation

M. Banejad; H. Ijadi

Volume 2, Issue 2 , July 2014, , Pages 149-158


  This paper presets a method including a combination of the wavelet transform and fuzzy function approximation (FFA) for high impedance fault (HIF) detection in distribution electricity network. Discrete wavelet transform (DWT) has been used in this paper as a tool for signal analysis. With studying different ...  Read More

H.6.3.3. Pattern analysis
Overlap-based feature weighting: The feature extraction of Hyperspectral remote sensing imagery

M. Imani; H. Ghassemian

Volume 3, Issue 2 , July 2015, , Pages 181-190


  Hyperspectral sensors provide a large number of spectral bands. This massive and complex data structure of hyperspectral images presents a challenge to traditional data processing techniques. Therefore, reducing the dimensionality of hyperspectral images without losing important information is a very ...  Read More

H.6.5.4. Face and gesture recognition
Video-based face recognition in color space by graph-based discriminant analysis

S. Shafeipour Yourdeshahi; H. Seyedarabi; A. Aghagolzadeh

Volume 4, Issue 2 , July 2016, , Pages 193-201


  Video-based face recognition has attracted significant attention in many applications such as media technology, network security, human-machine interfaces, and automatic access control system in the past decade. The usual way for face recognition is based upon the grayscale image produced by combining ...  Read More

H.3.8. Natural Language Processing
A Novel Approach to Conditional Random Field-based Named Entity Recognition using Persian Specific Features

L. Jafar Tafreshi; F. Soltanzadeh

Volume 8, Issue 2 , April 2020, , Pages 227-236


  Named Entity Recognition is an information extraction technique that identifies name entities in a text. Three popular methods have been conventionally used namely: rule-based, machine-learning-based and hybrid of them to extract named entities from a text. Machine-learning-based methods have good performance ...  Read More

H.3. Artificial Intelligence
Ensemble Classification and Extended Feature Selection for Credit Card Fraud Detection

F. Fadaei Noghani; M. Moattar

Volume 5, Issue 2 , July 2017, , Pages 235-243


  Due to the rise of technology, the possibility of fraud in different areas such as banking has been increased. Credit card fraud is a crucial problem in banking and its danger is over increasing. This paper proposes an advanced data mining method, considering both feature selection and decision cost ...  Read More

H.5. Image Processing and Computer Vision
Compressed Image Hashing using Minimum Magnitude CSLBP

V. Patil; T. Sarode

Volume 7, Issue 2 , April 2019, , Pages 287-297


  Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized ...  Read More

B. Computer Systems Organization
Target Tracking Based on Virtual Grid in Wireless Sensor Networks

F. Hoseini; A. Shahbahrami; A. Yaghoobi Notash

Volume 6, Issue 2 , July 2018, , Pages 313-319


  One of the most important and typical application of wireless sensor networks (WSNs) is target tracking. Although target tracking, can provide benefits for large-scale WSNs and organize them into clusters but tracking a moving target in cluster-based WSNs suffers a boundary problem. The main goal of ...  Read More

Improving Accuracy of Recommender Systems using Social Network Information and Longitudinal Data

B. Hassanpour; N. Abdolvand; S. Rajaee Harandi

Volume 8, Issue 3 , July 2020, , Pages 379-389


  The rapid development of technology, the Internet, and the development of electronic commerce have led to the emergence of recommender systems. These systems will assist the users in finding and selecting their desired items. The accuracy of the advice in recommender systems is one of the main challenges ...  Read More

H.3. Artificial Intelligence
Forecasting Gold Price using Data Mining Techniques by Considering New Factors

A.R. Hatamlou; M. Deljavan

Volume 7, Issue 3 , July 2019, , Pages 411-420


  Gold price forecast is of great importance. Many models were presented by researchers to forecast gold price. It seems that although different models could forecast gold price under different conditions, the new factors affecting gold price forecast have a significant importance and effect on the increase ...  Read More

H.3.2.2. Computer vision
Depth Improvement for FTV Systems Based on the Gradual Omission of Outliers

H. Hosseinpour; Seyed A. Moosavie nia; M. A. Pourmina

Volume 7, Issue 4 , November 2019, , Pages 563-574


  Virtual view synthesis is an essential part of computer vision and 3D applications. A high-quality depth map is the main problem with virtual view synthesis. Because as compared to the color image the resolution of the corresponding depth image is low. In this paper, an efficient and confided method ...  Read More

Image quality enhancement in digital panoramic radiograph

Sekine Asadi Amiri; Ehsan Moudi

Volume 2, Issue 1 , March 2014, , Pages 1-6


  One of the most common positioning errors in panoramic radiography is palatoglossal air space above the apices of the root of maxillary teeth. It causes a radiolucency obscuring the apices of maxillary teeth. In the case of this positioning error, the imaging should be repeated. This causes the patient ...  Read More

H.3. Artificial Intelligence
PSO for multi-objective problems: Criteria for leader selection and uniformity distribution

H. Motameni

Volume 4, Issue 1 , March 2016, , Pages 67-76


  This paper proposes a method to solve multi-objective problems using improved Particle Swarm Optimization. We propose leader particles which guide other particles inside the problem domain. Two techniques are suggested for selection and deletion of such particles to improve the optimal solutions. The ...  Read More

C. Software/Software Engineering
Formal approach on modeling and predicting of software system security: Stochastic petri net

H. Motameni

Volume 3, Issue 1 , March 2015, , Pages 77-83


  To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by ...  Read More

H.3.2.4. Education
S3PSO: Students’ Performance Prediction Based on Particle Swarm Optimization

Seyed M. H. Hasheminejad; M. Sarvmili

Volume 7, Issue 1 , January 2019, , Pages 77-96


  Nowadays, new methods are required to take advantage of the rich and extensive gold mine of data given the vast content of data particularly created by educational systems. Data mining algorithms have been used in educational systems especially e-learning systems due to the broad usage of these systems. ...  Read More

I.3.7. Engineering
Artificial neural networks, genetic algorithm and response surface methods: The energy consumption of food and beverage industries in Iran

B. Hosseinzadeh Samani; H. HouriJafari; H. Zareiforoush

Volume 5, Issue 1 , March 2017, , Pages 79-88


  In this study, the energy consumption in the food and beverage industries of Iran was investigated. The energy consumption in this sector was modeled using artificial neural network (ANN), response surface methodology (RSM) and genetic algorithm (GA). First, the input data to the model were calculated ...  Read More

H.3. Artificial Intelligence
QoS-based Web Service Recommendation using Popular-dependent Collaborative Filtering

S. Adeli; P. Moradi

Volume 8, Issue 1 , January 2020, , Pages 83-93


  Since, most of the organizations present their services electronically, the number of functionally-equivalent web services is increasing as well as the number of users that employ those web services. Consequently, plenty of information is generated by the users and the web services that lead to the users ...  Read More

H.3.2.2. Computer vision
Camera Pose Estimation in Unknown Environments using a Sequence of Wide-Baseline Monocular Images

Seyyed A. Hoseini; P. Kabiri

Volume 6, Issue 1 , March 2018, , Pages 93-103


  In this paper, a feature-based technique for the camera pose estimation in a sequence of wide-baseline images has been proposed. Camera pose estimation is an important issue in many computer vision and robotics applications, such as, augmented reality and visual SLAM. The proposed method can track captured ...  Read More