Welcome to ICCKE 2013 Website
ICCKE in facebook

ICCKE 2013 Accepted papers

The review process for the 3rd International eConference on Computer and Knowledge Engineering (ICCKE 2013) has been completed.
Based on the recommendations of the reviewers and the Program Committee, we are pleased to publish papers identified above has been accepted for oral presentation.
The eConference received 424 submissions from different countries, which were reviewed by international experts. Only about 22% of the submitted papers were selected for presentation in the eConference.

Code

Paper Title

25

Flexible Soccer Video Summarization in Compressed Domain

46

New Algorithm for Recommender Systems based on Singular Value Decomposition Method

53

New Method for Optimization of License Plate Recognition system with Use of Edge Detection and Connected Component

58

Weighted Averaging Clustering Algorithm for Haplotype Reconstruction Problem

59

Harmonic behavior improvement of wind turbines with DFIG by a new fractional-order control strategy during steady state and fault conditions

65

The Application of Fuzzy Adaptive Kalman Filtering and Smoother Kalman for Nuclear Well Logging

69

Urmia Lake Level Forecasting Using Brain Emotional Learning (BEL)

70

A Novel Infrared Touch Sensing Using K-Nearest Neighbor Algorithm

73

Trust Assessment in Social Participatory Sensing Systems

76

Performance Study of Set-Membership NLMS Algorithm Over an Adaptive Incremental Network

77

An Analysis of Vendor Lock-in Problem in Cloud Storage

78

Short-Term Price Forecasting Under High Penetration of Wind Generation Units in Smart Grid Environment

80

Optimal Tuning of Brain Emotional Learning Based Intelligent Controller Using Clonal Selection Algorithm

86

A Novel Block-Based Steganographic Method

99

Parasitic-aware Optimization of a 2.4GHz Cross-Coupled LC VCO Using IPO Compared to PSO

102

A Bilateral Negotiation Mechanism for SLA-based job Superscheduling in Grid-Federation

108

Optimal Energy Detection in Cognitive Radios Networks in the Presence of Malicious Users

111

Simple and Efficient Method to Measure Vessel Tortusity

115

CVSS-based Security Metrics for Quantitative Analysis Of Attack Graphs

117

File Transfer in Vehicular Delay Tolerant Networks using Fountain Coding

142

Fuzzy High-Order Sliding-Mode Control of Blood Glucose Concentration

143

Energy Efficient Cooperative Spectrum Sensing by MIMO Sensors in Wireless Sensor Network

146

Fast Multi-Match Packet Classification Using Index Bits

148

Optimization of Data Mining with Evolutionary Algorithms for Cloud Computing Application

150

Confabulation based Recomender System

154

Application of An Improved SVR Based Bat Algorithm for Short-Term Price Forecasting in the Iranian Pay-as-Bid Electricity Market

159

An Efficient Privacy Preserving via Group Signature in Smart Grid

181

New method for evaluating anti-SPIT in VoIP networks

185

ZDF: An Adaptive Discretization Method to Improve Separability of Classes

189

Kalman Filter-Based Discrete Data Estimation for Linear Dynamic Wireless Channels

192

An Overview of Fault Tolerance Techniques for Real-Time Operating Systems

194

Distributed Classification of Persian News (Case study: Hamshahri News Dataset)

197

A Hybridization of ICA–GA based Evolutionary Fuzzy Systems for Cancer Tumor Detection

206

Highway Chain Collision Avoidance using Inter-Vehicular Communications

216

A New Combinatorial Algorithm for QRS Detection

219

Resource Recommender System Based on Tag and Time for Social Tagging System

224

Feature Selection using Modified Imperialist Competititive Algorithm

230

The Brain’s Neural Classifiers Considering both the Posterior Probabilities and Generalities to Control the Mechanism Underlying Decision Making; An Evidence for Computational Bayesian Classifiers

232

A novel image encryption method based on chaos maps

233

Scheduling Hard Real-time Tasks on Multi-core using Intelligent Rate-monotonic

239

A New Pacth-Based Active Contour for Segmentation of the Myocardium of the Left Ventricle in Cardiac Magnetic Resonace Images

259

Human Detection in Semi-dense Scenes Using HOG descriptor and Mixture of SVMs

264

Jumper Firefly Algorithm

272

Low complexity Distributed adaptive blind channel estimation for dereverberation in ad hoc sensor networks

273

WEBSTUIRE : WEB-based Support Tool for User Interface Requirements Elicitation

278

A Low Complexity and High Speed Gradient Descent Based Secure Localization in Wireless Sensor Networks

279

GIS based topology for wireless sensor network modeling: Arc-Node topology approach

285

A New Alert Correlation Framework Based on Entropy

290

New Blind Signature Schemes Based on the (Elliptic Curve) Discrete Logarithm Problem

296

Mobile Target Tracking in non-overlapping Wireless Visual Sensor Networks using Neural Networks

298

VHDLSFI: A Simulation-based Multi-Bit Fault Injection for Dependability Analysis

301

Folder Classification of Urdu and Hindi Language E-mail Messages

302

A Set of new kernel function for Support vector machines: An approach based on Chebyshev polynomials

304

An ABC Based Approach to Test Case Generation for BPEL Processes

308

Energy-aware Scheduling Algorithm for Precedence-Constrained Parallel Tasks of Network-intensive Applications in a Distributed Homogeneous Environment

312

Expressmind: recommending contents in an anonymous social network

315

A Privacy Protection Mechanism for Location-based Mobile Coupons

323

PAD: A Semantic Social Network

332

Evaluating the Effects of Textual Features on Authorship Attribution Accuracy

348

MTCTTM:A Cost-Time Scheduling Algorithm For Tasks In Utility Grids

356

Analytical framework for identifying community methods based on the nature of social network

358

Time and Cost trade-off using multi-objective task scheduling in utility Grids

359

Creating a Novel Semantic Video Search Engine Through Enrichment Textual and Temporal Features of Subtitled Youtube Media Fragments

362

Immunization of complex networks using stochastic hill-climbing algorithm

370

Digital Realization of Twisted Tent Map and Ship Map with LFSR as a Pseudo-Chaos Generator

371

A Novel Reputation System to Detect DGA-Based Botnets

372

PLP Toolkit: Persian Language Processing Toolkit

374

Measuring Relationship Strength in Online Social Networks based on users’ activities and profile information

375

Comparing MLP, SVM and KNN for predicting trust in Facebook social network based on users’ interactions and profile similarity

379

Efficient Design of Elliptic Curve Point Multiplication based on Fast Montgomery Modular Multiplication

396

Proposing a centralized trust system in wireless sensor networks being resistant against routing and trust system attacks

398

MalHunter: Automatic Generation of Multiple Behavioral Signatures for Polymorphic Malware Detection

420

Relationship between Naïve Bayes Error and Dependency Criteria in Feature Selection Problems

423

Graph-based Partitioning of Ontology with Semantic Similarity

431

Multi-Sensor Estimation using CKF and DKF

433

VECU: A New TCP Congestion Algorithm For Ad Hoc Wireless Networks

434

Small Signal stability Improvement of a Microgrid including a Wind Turbine-based Doubly Fed Induction Generator

450

Pasokh: The Standard Corpus for the Evaluationof Persian Text Summarizers

454

Using Orthogonal basis Functions and Template Matching to Learn Whiteboard Cleaning Task by Imitation

455

Modified Contour-Based Algorithm for Multiple Objects Tracking and Detection

457

Bic-NSCSA: A Hybrid Artificial immune system model for DNA microarray bi-clustering


Search Site


Login




  Resend Confirm Mail  
  Log in Problems?
 New User? Sign Up!


    Number of Visitors :402772
©2011 Ferdowsi University Of Mashhad.