Original/Review Paper H.8. Document and Text Processing
Plagiarism checker for Persian (PCP) texts using hash-based tree representative fingerprinting

Sh. Rafieian; A. Baraani dastjerdi

Volume 4, Issue 2 , July 2016, Pages 125-133

http://dx.doi.org/doi: 10.5829/idosi.JAIDM.2016.04.02.01

Abstract
  With due respect to the authors’ rights, plagiarism detection, is one of the critical problems in the field of text-mining that many researchers are interested in. This issue is considered as a serious one in high academic institutions. There exist language-free tools which do not yield any reliable ...  Read More

Original/Review Paper F.4.4. Experimental design
Application of statistical techniques and artificial neural network to estimate force from sEMG signals

V. Khoshdel; A. R Akbarzadeh

Volume 4, Issue 2 , July 2016, Pages 135-141

http://dx.doi.org/10.5829/idosi.JAIDM.2016.04.02.02

Abstract
  This paper presents an application of design of experiments techniques to determine the optimized parameters of artificial neural network (ANN), which are used to estimate force from Electromyogram (sEMG) signals. The accuracy of ANN model is highly dependent on the network parameters settings. There ...  Read More

Original/Review Paper D.3. Data Storage Representations
Fuzzy multi-criteria selection procedures in choosing data source

E. Azhir; N. Daneshpour; Sh. Ghanbari

Volume 4, Issue 2 , July 2016, Pages 143-156

http://dx.doi.org/10.5829/idosi.JAIDM.2016.04.02.03

Abstract
  Technology assessment and selection has a substantial impact on organizations procedures in regards to technology transfer. Technological decisions are usually made by a group of experts, and whereby integrity of these viewpoints to a single decision can be quite complex. Today, operational databases ...  Read More

Original/Review Paper C. Software/Software Engineering
Bridging the semantic gap for software effort estimation by hierarchical feature selection techniques

S. Beiranvand; M.A. Z.Chahooki

Volume 4, Issue 2 , July 2016, Pages 157-168

http://dx.doi.org/10.5829/idosi.JAIDM.2016.04.02.04

Abstract
  Software project management is one of the significant activates in the software development process. Software Development Effort Estimation (SDEE) is a challenging task in the software project management. SDEE is an old activity in computer industry from 1940s and has been reviewed several times. A SDEE ...  Read More

Original/Review Paper A.2. Control Structures and Microprogramming
Adaptive fuzzy pole placement for stabilization of non-linear systems

A. Karami-Mollaee

Volume 4, Issue 2 , July 2016, Pages 169-176

http://dx.doi.org/10.22044/jadm.2016.586

Abstract
  A new approach for pole placement of nonlinear systems using state feedback and fuzzy system is proposed. We use a new online fuzzy training method to identify and to obtain a fuzzy model for the unknown nonlinear system using only the system input and output. Then, we linearized this identified model ...  Read More

Original/Review Paper G. Information Technology and Systems
Development of a framework to evaluate service-oriented architecture governance using COBIT approach

M. Dehghani; S. Emadi

Volume 4, Issue 2 , July 2016, Pages 177-191

http://dx.doi.org/10.5829/idosi.JAIDM.2016.04.02.06

Abstract
  Nowadays organizations require an effective governance framework for their service-oriented architecture (SOA) in order to enable them to use a framework to evaluate their current state governance and determine the governance requirements, and then to offer a suitable model for their governance. Various ...  Read More

Original/Review Paper H.6.5.4. Face and gesture recognition
Video-based face recognition in color space by graph-based discriminant analysis

S. Shafeipour Yourdeshahi; H. Seyedarabi; A. Aghagolzadeh

Volume 4, Issue 2 , July 2016, Pages 193-201

http://dx.doi.org/10.5829/idosi.JAIDM.2016.04.02.07

Abstract
  Video-based face recognition has attracted significant attention in many applications such as media technology, network security, human-machine interfaces, and automatic access control system in the past decade. The usual way for face recognition is based upon the grayscale image produced by combining ...  Read More

Original/Review Paper H.3.8. Natural Language Processing
Extraction of Drug-Drug Interaction from Literature through Detecting Linguistic-based Negation and Clause Dependency

B. Bokharaeian; A. Diaz

Volume 4, Issue 2 , July 2016, Pages 203-212

http://dx.doi.org/10.5829/idosi.JAIDM.2016.04.02.08

Abstract
  Extracting biomedical relations such as drug-drug interaction (DDI) from text is an important task in biomedical NLP. Due to the large number of complex sentences in biomedical literature, researchers have employed some sentence simplification techniques to improve the performance of the relation extraction ...  Read More

Research Note F.4.5. Markov processes
Speech enhancement based on hidden Markov model using sparse code shrinkage

E. Golrasan; H. Sameti

Volume 4, Issue 2 , July 2016, Pages 213-218

http://dx.doi.org/10.5829/idosi.JAIDM.2016.04.02.09

Abstract
  This paper presents a new hidden Markov model-based (HMM-based) speech enhancement framework based on the independent component analysis (ICA). We propose analytical procedures for training clean speech and noise models by the Baum re-estimation algorithm and present a Maximum a posterior (MAP) estimator ...  Read More

Original/Review Paper H.3.14. Knowledge Management
Introducing an algorithm for use to hide sensitive association rules through perturb technique

M. Sakenian Dehkordi; M. Naderi Dehkordi

Volume 4, Issue 2 , July 2016, Pages 219-227

http://dx.doi.org/10.5829/idosi.JAIDM.2016.04.02.10

Abstract
  Due to the rapid growth of data mining technology, obtaining private data on users through this technology becomes easier. Association Rules Mining is one of the data mining techniques to extract useful patterns in the form of association rules. One of the main problems in applying this technique on ...  Read More

Original/Review Paper H.3. Artificial Intelligence
Prediction of rock strength parameters for an Iranian oil field using neuro-fuzzy method

M. Heidarian; H. Jalalifar; F. Rafati

Volume 4, Issue 2 , July 2016, Pages 229-234

http://dx.doi.org/10.5829/idosi.JAIDM.2016.04.02.11

Abstract
  Uniaxial compressive strength (UCS) and internal friction coefficient (µ) are the most important strength parameters of rock. They could be determined either by laboratory tests or from empirical correlations. The laboratory analysis sometimes is not possible for many reasons. On the other hand, ...  Read More

Original/Review Paper F.2.7. Optimization
Estimation of parameters of metal-oxide surge arrester models using Big Bang-Big Crunch and Hybrid Big Bang-Big Crunch algorithms

M.M Abravesh; A Sheikholeslami; H. Abravesh; M. Yazdani asrami

Volume 4, Issue 2 , July 2016, Pages 235-241

http://dx.doi.org/10.5829/idosi.JAIDM.2016.04.02.12

Abstract
  Metal oxide surge arrester accurate modeling and its parameter identification are very important for insulation coordination studies, arrester allocation and system reliability. Since quality and reliability of lightning performance studies can be improved with the more efficient representation of the ...  Read More

Review Article H.3. Artificial Intelligence
An indirect adaptive neuro-fuzzy speed control of induction motors

M. Vahedi; M. Hadad Zarif; A. Akbarzadeh Kalat

Volume 4, Issue 2 , July 2016, Pages 243-251

http://dx.doi.org/10.5829/idosi.JAIDM.2016.04.02.13

Abstract
  This paper presents an indirect adaptive system based on neuro-fuzzy approximators for the speed control of induction motors. The uncertainty including parametric variations, the external load disturbance and unmodeled dynamics is estimated and compensated by designing neuro-fuzzy systems. The contribution ...  Read More