Technical Program of
The 3rd
International eConference
on
Computer and Knowledge Engineering
(ICCKE 2013)
October 31 & November 1, 2013 - Ferdowsi
University of Mashhad
Thursday, October
31, 2013
|
8:45 – 9
|
Conference Opening
|
9 - 10
|
keynote
Speaker (Prof. Spencer)
|
10 - 12
|
Sessions (A1, A2, A3)
|
12 - 14
|
Break
|
14 – 15:30
|
Sessions (B1, B2, B3)
|
15:30 – 16
|
Break
|
16 – 17:30
|
Sessions (C1, C2, C3)
|
Local Time - TEHRAN (UTC+3:30)
Friday, November
1, 2013
|
9 – 10
|
keynote Speaker (Prof. Sarrafzadeh)
|
10 - 12
|
Sessions (D1, D2, D3)
|
12 - 14
|
Break
|
14 – 15:30
|
Sessions (E1, E2, E3)
|
15:30 – 16
|
Break
|
16 – 17:30
|
Sessions (F1, F2)
|
Local Time - TEHRAN (UTC+3:30)
Other
Program
|
October 30 to November 2, 2013
|
eWorkshops
|
Session
|
Title
|
Paper Code
|
A1
|
Intelligent
Systems 1
|
53,
65, 80, 99, 142, 197
|
A2
|
Semantic
Web & NLP
|
194,
273, 301, 359, 372, 423
|
A3
|
Knowledge
Engineering 1
|
46,
150, 219, 323, 332, 356
|
B1
|
Ad
Hoc and Sensor Networks 1
|
117,
143, 206, 272
|
B2
|
Smart
Grid 1
|
59,
78, 146, 154
|
B3
|
Systems
and Applications Security 1
|
86,
108, 115, 285
|
C1
|
Systems
and Applications Security 2
|
232,
290, 315, 370
|
C2
|
Image
Processing
|
25,
111, 239, 259, 455
|
C3
|
Pattern
Recognition and Applications 1
|
58,
69, 70, 76, 420
|
D1
|
Intelligent
Systems 2
|
264,
304, 312, 362, 454, 457
|
D2
|
Ad
Hoc and Sensor Networks 2
|
278,
279, 296, 396, 431, 433
|
D3
|
Grid
and Cloud Computing
|
77,
102, 148, 308, 348, 358
|
E1
|
Smart
Grid 2
|
159,
181, 189, 434
|
E2
|
Pattern
Recognition and Applications 2
|
185,
216, 224, 230, 302
|
E3
|
Systems
and Applications Security 3
|
371,
379, 398, 73
|
F1
|
Embedded
Systems
|
192,
233, 298
|
F2
|
Knowledge
Engineering 2
|
374,
375, 450
|
Keynote
Speakers
Time
|
Keynote Speaker
|
Title
|
October 31, 2013
9 – 10 AM
|
Prof. Bruce Spencer
|
Shallow and Deep Semantics: Semantic Search Engines and Beyond
|
November 1, 2013
9 – 10 AM
|
Prof. Abdolhossein Sarrafzadeh
|
Intelligent and Affective Tutoring Systems - emerging trends and
future possibilities
|
Local Time -
TEHRAN (UTC+3:30)
*
Present Time: 20 minute (15 Minute present + 5 Minute Discussion)
Local Time - TEHRAN (UTC+3:30)
.
A1 Session – Intelligent Systems
1
Thu, October 31, 2013 – Time: 10
– 12
|
Session Chair: Dr. Harati
|
Paper Code
|
Paper
Title
|
Authors
|
Present
Time
|
53
|
New Method for Optimization of License Plate
Recognition system with Use of Edge Detection and Connected Component
|
Reza Azad
Hamidreza Shayegh
|
10– 10:20
|
65
|
The Application of Fuzzy Adaptive Kalman
Filtering and Smoother Kalman for Well Logging
|
Paknosh Karimaghaee
Sina Soltani
|
10:20 – 10:40
|
80
|
Optimal Tuning of Brain Emotional Learning
Based Intelligent Controller Using Clonal Selection Algorithm
|
Mohammad Jafari
Alireza Mohammadshahri
SeyyedHamidElyas
|
10:40 - 11
|
99
|
Parasitic-aware Optimization of a 2.4GHz Cross-Coupled LC VCO
Using IPO Compared to PSO
|
Mohammad Reza Vakili
Seyed Hamid Zahiri
|
11 – 11:20
|
142
|
Fuzzy High-Order Sliding-Mode Control of Blood Glucose
Concentration
|
Soudabeh Taghian Dinani
Maryam Zakri
Behzad Nazari
|
11:20 – 11:40
|
197
|
A Hybridization of ICA–GA based Evolutionary Fuzzy Systems for
Cancer Tumor Detection
|
Danial Jalal Nouri
Mohammad Saniee Abadeh
|
11:40 – 12
|
A2 Session – Semantic Web &
NLP
Thu, October 31, 2013 – Time: 10
– 12
|
Session Chair: Prof. Kahani
|
Paper Code
|
Paper
Title
|
Authors
|
Present
Time
|
194
|
Distributed Classification of Persian News
(Case study: Hamshahri News Dataset)
|
Leila Esmaeili
Vahid Amiry
Mohammad Kazem Akbari
Saeed Sharifian
|
10– 10:20
|
273
|
WEBSTUIRE : WEB-based Support Tool for User
Interface Requirements Elicitation
|
Azita Soltanian Bojnord
Rodina Binti Ahmad
|
10:20 – 10:40
|
301
|
Folder Classification of Urdu and Hindi
Language E-mail Messages
|
M Tariq Banday
Shafiya Afzal Sheikh
|
10:40 - 11
|
359
|
Creating a Novel Semantic Video Search Engine
Through Enrichment Textual and Temporal Features of Subtitled Youtube Media
Fragments
|
Babak Farhadi
Mohammad Bagher Ghaznavi Ghoushchi
|
11 – 11:20
|
372
|
ParsiPardaz: Persian Language Processing
Toolkit
|
Zahra Sarabi
Hooman Mahyar
Mojgan Farhoodi
|
11:20 – 11:40
|
423
|
Graph-based Partitioning of Ontology with
Semantic Similarity
|
Soudabeh Ghafourian
Amin Rezaeian
Mahmoud Naghibzadeh
|
11:40 – 12
|
A3 Session – Knowledge
Engineering 1
Thu, October 31, 2013 – Time: 10
– 12
|
Session Chair: Prof. Naghibzadeh
|
Paper Code
|
Paper
Title
|
Authors
|
Present
Time
|
46
|
New Algorithm for Recommender Systems based
on Singular Value Decomposition Method
|
Zeinab Sharifi
Mansoor Rezghi
Mahdi Nasiri
|
10– 10:20
|
150
|
Confabulation based Recomender System
|
Azadeh Soltani
Mohammad-R Akbarzadeh-T
|
10:20 – 10:40
|
219
|
Resource Recommender System Based on Tag and
Time for Social Tagging System
|
Negin Misaghian
Mehrdad Jalali
Mohammad Hossein Moattar
|
10:40 - 11
|
323
|
PAD: A Semantic Social Network
|
Samad Paydar
Mohsen Kahani
Fattane Zarrinkalam
|
11 – 11:20
|
332
|
Evaluating the Effects of Textual Features on
Authorship Attribution Accuracy
|
Reza Ramezani
Navid Sheydaei
Mohsen Kahani
|
11:20 – 11:40
|
356
|
A survey on community detection methods based
on the nature of social networks
|
Maryam Pourkazemi
Mohammadreza Keyvanpour
|
11:40 – 12
|
B1 Session – Ad Hoc and Sensor Networks 1
Thu, October 31, 2013 – Time: 14
– 15:30
|
Session Chair: Prof.Yaghmaee
|
Paper Code
|
Paper
Title
|
Authors
|
Present
Time
|
117
|
File Transfer in Vehicular Delay Tolerant
Networks using Fountain Coding
|
Seyed
Masoud Mousavi Langari
Saleh Yousefi
Sam Jabbehdari
Keywan Zayer
|
14– 14:20
|
143
|
Energy Efficient Cooperative Spectrum Sensing
by MIMO Sensors in Wireless Sensor Network
|
Seyed Hani Hojjati
Ataollah Ebrahimzadeh
Seyed Mehdi Hosseini Andargoli
Maryam Najimi
|
14:20 – 14:40
|
206
|
Highway Chain Collision Avoidance using
Inter-Vehicular Communications
|
Mohammad Javad Fazel Ashrafi
Saleh Yousefi
Hamid Karimi
Seyed Mohammad Hosseini
Habib Rostami
Hamid Reza Ataeian
|
14:40 - 15
|
272
|
Low complexity Distributed adaptive blind
channel estimation for dereverberation in ad hoc sensor networks
|
Zohre Foroushi
Vahid TabatabaVakili
|
15 – 15:20
|
B2 Session – Smart Grid 1
Thu, October 31, 2013 – Time: 14
– 15:30
|
Session Chair: Dr. Rajabi Mashhadi
|
Paper Code
|
Paper
Title
|
Authors
|
Present
Time
|
59
|
Behavior Improvement of Wind Turbines with
DFIG by a New Fractional-Order Control Strategy During Steady State and Fault
Conditions
|
mohsen
hosseinabadi
hasan rastegar
|
14– 14:20
|
78
|
Short-Term Price Forecasting Under High
Penetration of Wind Generation Units in Smart Grid Environment
|
Iman Nazer Kakhki
Hossein Taherian
Mohammad Reza Aghaebrahimi
|
14:20 – 14:40
|
146
|
Fast Multi-Match Packet Classification Using
Index Bits
|
Mohammad Eslamdoost
Mahmood Ahmadi
Arash Ahmadi
shaghayegh Gomar
|
14:40 - 15
|
154
|
Application of An Improved SVR Based Bat
Algorithm for Short-Term Price Forecasting in the Iranian Pay-as-Bid
Electricity Market
|
Hossein Taherian
Iman Nazer Kakhki
Mohammad Reza Aghaebrahimi
|
15 – 15:20
|
B3 Session – Systems and
Applications Security 1
Thu, October 31, 2013 – Time: 14
– 15:30
|
Session Chair: Dr. Ghaemi
|
Paper Code
|
Paper
Title
|
Authors
|
Present
Time
|
86
|
A Novel Block-Based Steganographic Method
|
Mehran Iranpour
Mohammad Rahmati
|
14– 14:20
|
108
|
Optimal Energy Detection in Cognitive Radios
Networks in the Presence of Malicious Users
|
Mohammad Javad Saber
Seyed Mohammad Sajad Sadough
|
14:20 – 14:40
|
115
|
CVSS-based Security Metrics for Quantitative
Analysis Of Attack Graphs
|
Marjan Keramati
Ahmad Akbari
Mahsa Keramati
|
14:40 - 15
|
285
|
A New Alert Correlation Framework Based on
Entropy
|
Mohammad GhasemiGol
Abbas Ghaemi-Bafghi
|
15 – 15:20
|
C1 Session – Systems and
Applications Security 2
Thu, October 31, 2013 – Time: 16
– 17:30
|
Session Chair:
Dr. Abadi
|
Paper Code
|
Paper
Title
|
Authors
|
Present
Time
|
232
|
A novel image encryption method based on
chaos maps
|
Esmaeil Besharatei Fard
Reza Ebrahimi Atani
|
16– 16:20
|
290
|
New Blind Signature Schemes Based on the
(Elliptic Curve) Discrete Logarithm Problem
|
Hamid Mala
Nafiseh Nezhadansari
|
16:20 – 16:40
|
315
|
A Privacy Protection Mechanism for Location-based
Mobile Coupons
|
Alireza Kazeminia
Behrouz Shahgholi Ghahfarokhi
|
16:40 - 17
|
370
|
Digital Realization of Twisted Tent Map and
Ship Map with LFSR as a Pseudo-Chaos Generator
|
Farnaz Khani
Arash Ahmadi
|
17 – 17:20
|
C2 Session – Image Processing
Thu, October 31, 2013 – Time: 16
– 17:40
|
Session Chair: Dr. Vahedian
|
Paper Code
|
Paper
Title
|
Authors
|
Present
Time
|
25
|
Flexible Soccer Video Summarization in
Compressed Domain
|
Vahid Kiani
Hamid Reza Pourreza
|
16– 16:20
|
111
|
Simple and Efficient Method to Measure Vessel
Tortusity
|
Hamid Reza Pourreza
Mariam Pourreza
Touka Banaee
|
16:20 – 16:40
|
239
|
A New Pacth-Based Active Contour for
Segmentation of the Myocardium of the Left Ventricle in Cardiac Magnetic
Resonace Images
|
Mohammad-Bagher Khamehchian
Mahdi Saadatmand-Tarzjan
|
16:40 - 17
|
259
|
Human Detection in Semi-dense Scenes Using
HOG descriptor and Mixture of SVMs
|
Afsane Rajaei
Hamidreza Shayegh
Nasrollah Moghaddam Charkari
|
17 – 17:20
|
455
|
Modified Contour-Based Algorithm for Multiple
Objects Tracking and Detection
|
Hamid Rajabi
Manoochehr Nahvi
|
17:20 – 17:40
|
C3 Session – Pattern Recognition
and Applications 1
Thu, October 31, 2013 – Time: 16
– 17:40
|
Session Chair: Dr. Sadooghi
|
Paper Code
|
Paper
Title
|
Authors
|
Present
Time
|
58
|
Weighted Averaging Clustering Algorithm for
Haplotype Reconstruction Problem
|
Ardeshir Baharian
Mahdi Heydari
Akram Salimi
|
16– 16:20
|
69
|
Urmia Lake Level Forecasting Using Brain
Emotional Learning (BEL)
|
Reza Mahdi Hadi
Saeid Shokri
Peyman Ayubi
|
16:20 – 16:40
|
70
|
A Novel Infrared Touch Sensing Using
K-Nearest Neighbor Algorithm
|
Saeid Jafarizadeh
Reza Boostani
Ali Akbar Safavi
|
16:40 - 17
|
76
|
Performance Study of Set-Membership NLMS
Algorithm Over an Adaptive Incremental Network
|
Mohammad Shams Esfand Abadi
Hamid Eskandari
|
17 – 17:20
|
420
|
Relationship between Naïve Bayes Error and
Max-Dependency Criterion in Feature Selection Problems
|
Nafiseh Sedaghat
Mahmood Fathy
Mohammad-Hossein Modarressi
|
17:20 – 17:40
|
D1 Session – Intelligent Systems
2
Fri, November 1, 2013 – Time: 10
– 12
|
Session Chair: Prof. Akbarzadeh
|
Paper Code
|
Paper
Title
|
Authors
|
Present
Time
|
264
|
Jumper Firefly Algorithm
|
Mahdi Bidar
Hamidreza Rashidy Kanan
|
10– 10:20
|
304
|
An ABC Based Approach to Test Case Generation
for BPEL Processes
|
Mohammad Daghaghzadeh
Morteza Babamir
|
10:20 – 10:40
|
312
|
Expressmind: recommending contents in an
anonymous social network
|
Mohammad Hossein Namaki
Behdad Bakhshinategh
Majid Noorhoseini
Mehdi Dehghan
|
10:40 - 11
|
362
|
Immunization of complex networks using
stochastic hill-climbing algorithm
|
Bita Shams
Mohammad Khansari
|
11 – 11:20
|
454
|
Using Orthogonal basis Functions and Template
Matching to Learn Whiteboard Cleaning Task by Imitation
|
Mohsen Falahi
Masoumeh Jannatifar
|
11:20 – 11:40
|
457
|
Bic-NSCSA: A Hybrid Artificial immune system
model for DNA microarray bi-clustering
|
Taraneh Abtahi
Mohammad-R Akbarzadeh-T
|
11:40 – 12
|
D2 Session – Ad Hoc and Sensor
Networks 2
Fri, November 1, 2013 – Time: 10
– 12
|
Session Chair: Dr. Hosseini
|
Paper Code
|
Paper
Title
|
Authors
|
Present
Time
|
278
|
A Low Complexity and High Speed Gradient
Descent Based Secure Localization in Wireless Sensor Networks
|
Mostafa Mofarreh-bonab
Seyed Ali Ghorashi
|
10– 10:20
|
279
|
GIS based topology for wireless sensor
network modeling: Arc-Node topology approach
|
S.Amin Hosseini
Behrooz Minaei Bidgoli
Mehdi Afzali
|
10:20 – 10:40
|
296
|
Mobile Target Tracking in non-overlapping
Wireless Visual Sensor Networks using Neural Networks
|
Mohammad Saokrou
Mahmood Fathy
Mojtaba Hosseni
|
10:40 - 11
|
396
|
Proposing a centralized trust management
system to detect compromised node in WSN
|
Fatemeh Hajibabaei
Mohammad Hossin Yaghmae Moghaddam
|
11 – 11:20
|
431
|
Multi-Sensor Estimation using CKF and DKF
|
Ehsan Mirzazadeh
Behzad Moshiri
|
11:20 – 11:40
|
433
|
VECU: TCP Congestion Algorithm For High Speed
Ad Hoc Wireless Networks
|
Maryam Shafiei
Naser Yazdani
|
11:40 – 12
|
D3 Session – Grid and Cloud
Computing
Fri, November 1, 2013 – Time: 10
– 12
|
Session Chair: Dr. Abrishami
|
Paper Code
|
Paper
Title
|
Authors
|
Present
Time
|
77
|
An Analysis of Vendor Lock-in Problem in
Cloud Storage
|
Seyed Majid Razavian
Hadi Khani
Nasser Yazdani
Fatemeh Ghassemi
|
10– 10:20
|
102
|
A Bilateral Negotiation Mechanism for
SLA-based job Superscheduling in Grid-Federation
|
Hadi Kalati
Hossein Deldari
|
10:20 – 10:40
|
148
|
Optimization of Data Mining with Evolutionary
Algorithms for Cloud Computing Application
|
Hamid Malmir
Fardad Farokhi
Reza Sabbaghi-Nadooshan
|
10:40 - 11
|
308
|
Energy-aware Scheduling Algorithm for
Precedence-Constrained Parallel Tasks of Network-intensive Applications in a
Distributed Homogeneous Environment
|
Vahid Ebrahimirad
Aboozar Rajabi
Maziar Goudarzi
|
11 – 11:20
|
348
|
MTCTTM:A Cost-Time Scheduling Algorithm For
Tasks In Utility Grids
|
Roholla Mehri
Gholamhossein Dastghaibyfard
|
11:20 – 11:40
|
358
|
Time and Cost trade-off using multi-objective
task scheduling in utility Grids
|
Shiva Alemzadeh
Gh Dastghaibyfard
|
11:40 – 12
|
E1 Session – Smart Grid 2
Fri, November 1, 2013 – Time: 14
– 15:30
|
Session Chair: Dr. Rajabi Mashhadi
|
Paper Code
|
Paper
Title
|
Authors
|
Present
Time
|
159
|
An Efficient Privacy Preserving Scheme of
High Frequency Reports for Secure Smart Grid Communications
|
Samaneh Hajy Mahdizadeh Zargar
Mohammad Hosein Yaghmaee
|
14– 14:20
|
181
|
New method for evaluating anti-SPIT in VoIP
networks
|
Mina Amanian
Mohammad Hossein Yaghmaee Moghaddam
Hossein Khosravi Roshkhari
|
14:20 – 14:40
|
189
|
Kalman Filter-Based Discrete Data Estimation
for Linear Dynamic Wireless Channels
|
Mohammad Hassan Majidi Mithridad Pourmir
Seyed Mohammad Sajad Sadough
|
14:40 - 15
|
434
|
Small Signal Stability Improvement of a Wind
Turbine-based Doubly Fed Induction Generator in a Microgrid Environment
|
Seyed Mohammad Amelian
R. Hooshmand
A. Khodabakhshian
Hossein Saberi
|
15 – 15:20
|
E2 Session – Pattern Recognition
and Applications 2
Fri, November 1, 2013 – Time: 14
– 15:40
|
Session Chair: Dr. Monsefi
|
Paper Code
|
Paper
Title
|
Authors
|
Present
Time
|
185
|
ZDF: An Adaptive Discretization Method to
Improve Separability of Classes
|
Fatemeh Kaveh-Yazdy
Mohammad-Reza Zare-Mirakabad
|
14– 14:20
|
216
|
A New Combinatorial Algorithm for QRS
Detection
|
Saeed Alavi
Mahdi Saadatmand-Tarzjan
|
14:20 – 14:40
|
224
|
Feature Selection using Modified Imperialist
Competititive Algorithm
|
Seyed jalaleddin mousavirad
Hossein Ebrahimpour-Komleh
|
14:40 - 15
|
230
|
The Brain’s Neural Classifiers Considering
both the Posterior Probabilities and Generalities to Control the Mechanism
Underlying Decision Making; An Evidence for Computational Bayesian
Classifiers
|
Morteza Saraf
Hamed Azami
Mohammad Reza Daliri
Saeid Sanei
|
15 – 15:20
|
302
|
A Set of new kernel function for Support
vector machines: An approach based on Chebyshev polynomials
|
Sara Zafar Jafarzadeh
Mohammad Aminian
Sohrab Efati
|
15:20 – 15:40
|
E3 Session – Systems and
Applications Security 3
Fri, November 1, 2013 – Time: 14
– 15:30
|
Session Chair: Dr. Ghaemi
|
Paper Code
|
Paper
Title
|
Authors
|
Present
Time
|
371
|
A Novel Reputation System to Detect DGA-Based
Botnets
|
Reza Sharifnya
Mahdi Abadi
|
14– 14:20
|
379
|
Efficient Design of Elliptic Curve Point
Multiplication based on Fast Montgomery Modular Multiplication
|
Maryam Mohammadi
Amir Sabbagh Molahosseini
|
14:20 – 14:40
|
398
|
MalHunter: Automatic Generation of Multiple
Behavioral Signatures for Polymorphic Malware Detection
|
Haniye Razeghi Borojerdi
Mahdi Abadi
|
14:40 - 15
|
73
|
Trust Assessment in Social Participatory
Networks
|
Haleh Amintoosi
Mohammad Allahbakhsh
Salil kanhere
Masood Niazi Torshiz
|
15 – 15:20
|
F1 Session – Embedded Systems
Fri, November 1, 2013 – Time: 16
– 17:30
|
Session Chair: Dr. Sedaghat
|
Paper Code
|
Paper
Title
|
Authors
|
Present
Time
|
192
|
An Overview of Fault Tolerance Techniques for
Real-Time Operating Systems
|
Reza Ramezani
Yasser Sedaghat
|
16– 16:20
|
233
|
Scheduling Hard Real-time Tasks on Multi-core
using Intelligent Rate-monotonic
|
Amin Rezaeian
Mahmoud Naghibzadeh
Peyman Neamatollahi
|
16:20 – 16:40
|
298
|
VHDLSFI: A Simulation-based Multi-Bit Fault
Injection for Dependability Analysis
|
Faezeh Pournaghdali
Amir Rajabzadeh
Mahmood Ahmadi
|
16:40 - 17
|
F2 Session – Knowledge
Engineering 2
Fri, November 1, 2013 – Time: 16
– 17:30
|
Session Chair: Prof. Naghibzadeh
|
Paper Code
|
Paper
Title
|
Authors
|
Present
Time
|
374
|
Measuring Relationship Strength in Online
Social Networks based on users’ activities and profile information
|
Ehsan Khadangi
Ali Zarean
Alireza Bagheri
Ali Bagheri Jafarabadi
|
16– 16:20
|
375
|
Comparing MLP, SVM and KNN for predicting
trust between users in Facebook
|
Ehsan Khadangi
Alireza Bagheri
|
16:20 – 16:40
|
450
|
Pasokh: A Standard Corpus for the Evaluation
of Persian Text Summarizers
|
Behdad Behmadi Moghaddas
Mohsen Kahani
Seyyed Ahmad Toosi
Asef Pourmasoumi
Ahmad Estiri
|
16:40 - 17
|
|