Code
|
Paper Title
|
25
|
Flexible Soccer Video Summarization in Compressed Domain
|
46
|
New Algorithm for Recommender Systems based on
Singular Value Decomposition Method
|
53
|
New Method for Optimization of License Plate
Recognition system with Use of Edge Detection and Connected Component
|
58
|
Weighted Averaging Clustering Algorithm for
Haplotype Reconstruction Problem
|
59
|
Harmonic behavior improvement of wind turbines
with DFIG by a new fractional-order control strategy during steady state and
fault conditions
|
65
|
The Application of Fuzzy Adaptive Kalman
Filtering and Smoother Kalman for Nuclear Well Logging
|
69
|
Urmia Lake Level Forecasting Using Brain
Emotional Learning (BEL)
|
70
|
A Novel Infrared Touch Sensing Using K-Nearest
Neighbor Algorithm
|
73
|
Trust Assessment in Social Participatory
Sensing Systems
|
76
|
Performance Study of Set-Membership NLMS
Algorithm Over an Adaptive Incremental Network
|
77
|
An Analysis of Vendor Lock-in Problem in Cloud
Storage
|
78
|
Short-Term Price Forecasting Under High
Penetration of Wind Generation Units in Smart Grid Environment
|
80
|
Optimal Tuning of Brain Emotional Learning
Based Intelligent Controller Using Clonal Selection Algorithm
|
86
|
A Novel Block-Based Steganographic Method
|
99
|
Parasitic-aware Optimization of a 2.4GHz
Cross-Coupled LC VCO Using IPO Compared to PSO
|
102
|
A Bilateral Negotiation Mechanism for
SLA-based job Superscheduling in Grid-Federation
|
108
|
Optimal Energy Detection in Cognitive Radios
Networks in the Presence of Malicious Users
|
111
|
Simple and Efficient Method to Measure Vessel
Tortusity
|
115
|
CVSS-based Security Metrics for Quantitative
Analysis Of Attack Graphs
|
117
|
File Transfer in Vehicular Delay Tolerant Networks using Fountain
Coding
|
142
|
Fuzzy High-Order Sliding-Mode Control of Blood
Glucose Concentration
|
143
|
Energy Efficient Cooperative Spectrum Sensing
by MIMO Sensors in Wireless Sensor Network
|
146
|
Fast Multi-Match Packet Classification Using
Index Bits
|
148
|
Optimization of Data Mining with Evolutionary
Algorithms for Cloud Computing Application
|
150
|
Confabulation based Recomender System
|
154
|
Application of An Improved SVR Based Bat
Algorithm for Short-Term Price Forecasting in the Iranian Pay-as-Bid
Electricity Market
|
159
|
An Efficient Privacy Preserving via Group
Signature in Smart Grid
|
181
|
New method for evaluating anti-SPIT in VoIP
networks
|
185
|
ZDF: An Adaptive Discretization Method to
Improve Separability of Classes
|
189
|
Kalman Filter-Based Discrete Data Estimation
for Linear Dynamic Wireless Channels
|
192
|
An Overview of Fault Tolerance Techniques for
Real-Time Operating Systems
|
194
|
Distributed Classification of Persian News
(Case study: Hamshahri News Dataset)
|
197
|
A Hybridization of ICA–GA based Evolutionary
Fuzzy Systems for Cancer Tumor Detection
|
206
|
Highway Chain Collision Avoidance using Inter-Vehicular
Communications
|
216
|
A New Combinatorial Algorithm for QRS
Detection
|
219
|
Resource Recommender System Based on Tag and
Time for Social Tagging System
|
224
|
Feature Selection using Modified Imperialist
Competititive Algorithm
|
230
|
The Brain’s Neural Classifiers Considering
both the Posterior Probabilities and Generalities to Control the Mechanism
Underlying Decision Making; An Evidence for Computational Bayesian
Classifiers
|
232
|
A novel image encryption method based on chaos
maps
|
233
|
Scheduling Hard Real-time Tasks on Multi-core
using Intelligent Rate-monotonic
|
239
|
A New Pacth-Based Active Contour for
Segmentation of the Myocardium of the Left Ventricle in Cardiac Magnetic
Resonace Images
|
259
|
Human Detection in Semi-dense Scenes Using HOG
descriptor and Mixture of SVMs
|
264
|
Jumper Firefly Algorithm
|
272
|
Low complexity Distributed adaptive blind
channel estimation for dereverberation in ad hoc sensor networks
|
273
|
WEBSTUIRE : WEB-based Support Tool for User
Interface Requirements Elicitation
|
278
|
A Low Complexity and High Speed Gradient
Descent Based Secure Localization in Wireless Sensor Networks
|
279
|
GIS based topology for wireless sensor network
modeling: Arc-Node topology approach
|
285
|
A New Alert Correlation Framework Based on Entropy
|
290
|
New Blind Signature Schemes Based on the
(Elliptic Curve) Discrete Logarithm Problem
|
296
|
Mobile Target Tracking in non-overlapping
Wireless Visual Sensor Networks using Neural Networks
|
298
|
VHDLSFI: A Simulation-based Multi-Bit Fault
Injection for Dependability Analysis
|
301
|
Folder Classification of Urdu and Hindi
Language E-mail Messages
|
302
|
A Set of new kernel function for Support
vector machines: An approach based on Chebyshev polynomials
|
304
|
An ABC Based Approach to Test Case Generation
for BPEL Processes
|
308
|
Energy-aware Scheduling Algorithm for
Precedence-Constrained Parallel Tasks of Network-intensive Applications in a
Distributed Homogeneous Environment
|
312
|
Expressmind: recommending contents in an
anonymous social network
|
315
|
A Privacy Protection Mechanism for Location-based
Mobile Coupons
|
323
|
PAD: A Semantic Social Network
|
332
|
Evaluating the Effects of Textual Features on
Authorship Attribution Accuracy
|
348
|
MTCTTM:A Cost-Time Scheduling Algorithm For
Tasks In Utility Grids
|
356
|
Analytical framework for identifying community
methods based on the nature of social network
|
358
|
Time and Cost trade-off using multi-objective
task scheduling in utility Grids
|
359
|
Creating a Novel Semantic Video Search Engine
Through Enrichment Textual and Temporal Features of Subtitled Youtube Media
Fragments
|
362
|
Immunization of complex networks using
stochastic hill-climbing algorithm
|
370
|
Digital Realization of Twisted Tent Map and
Ship Map with LFSR as a Pseudo-Chaos Generator
|
371
|
A Novel Reputation System to Detect DGA-Based
Botnets
|
372
|
PLP Toolkit: Persian Language Processing
Toolkit
|
374
|
Measuring Relationship Strength in Online
Social Networks based on users’ activities and profile information
|
375
|
Comparing MLP, SVM and KNN for predicting
trust in Facebook social network based on users’ interactions and profile
similarity
|
379
|
Efficient Design of Elliptic Curve Point
Multiplication based on Fast Montgomery Modular Multiplication
|
396
|
Proposing a centralized trust system in
wireless sensor networks being resistant against routing and trust system
attacks
|
398
|
MalHunter: Automatic Generation of Multiple
Behavioral Signatures for Polymorphic Malware Detection
|
420
|
Relationship between Naïve Bayes Error and
Dependency Criteria in Feature Selection Problems
|
423
|
Graph-based Partitioning of Ontology with
Semantic Similarity
|
431
|
Multi-Sensor Estimation using CKF and DKF
|
433
|
VECU: A New TCP Congestion Algorithm For Ad
Hoc Wireless Networks
|
434
|
Small Signal stability Improvement of a
Microgrid including a Wind Turbine-based Doubly Fed Induction Generator
|
450
|
Pasokh: The Standard Corpus for the
Evaluationof Persian Text Summarizers
|
454
|
Using Orthogonal basis Functions and Template
Matching to Learn Whiteboard Cleaning Task by Imitation
|
455
|
Modified Contour-Based Algorithm for Multiple
Objects Tracking and Detection
|
457
|
Bic-NSCSA: A Hybrid Artificial immune system
model for DNA microarray bi-clustering
|