• Published Issues

    OpenAccess
    • List of Articles process

      • Open Access Article

        1 - Array Processing Based on GARCH Model
        H. Amiri H. Amindavar M. Kamarei
        In this paper, we propose a new model for additive noise based on GARCH time-series in arraysignal processing. Due to the some reasons such as complex implementation and computational problems, probability distribution function of additive noise is assumed Gaussian. In More
        In this paper, we propose a new model for additive noise based on GARCH time-series in arraysignal processing. Due to the some reasons such as complex implementation and computational problems, probability distribution function of additive noise is assumed Gaussian. In the different applications, scrutiny and measurement of noise shows that noise can sometimes significantly non-Gaussian and thus the methods based on Gaussian noise will degrade in an actual conditions. Heavy-tail probability density function (PDF) and time-varying statistical characteristics (e.g.; variance) are the most features of the additive noise process. On the other hand, GARCH process has important properties such as heavy-tail PDF (as excess kurtosis) and volatility modeling through feedback mechanism onto conditional variance so that it seems the GARCH model is a good candidate for the additive noise model in the array processing applications. In this paper, we propose a new method based on GARCH using the maximum likelihood approach in array processing and verify the performance of this approach in the estimation of the Direction-of-Arrivals of sources against the other methods and using the Cramer-Rao Bound. Manuscript profile
      • Open Access Article

        2 - Computer Aided Graphology for Farsi Handwriting
        A. A. Bahrami Sharif E. Kabir
        Graphology is the science of study and analysis of the personality of an individual from his/her style of handwriting. In western communities, the most important application of graphology is the recruitment of job applicants. In this regard, computer aided extraction an More
        Graphology is the science of study and analysis of the personality of an individual from his/her style of handwriting. In western communities, the most important application of graphology is the recruitment of job applicants. In this regard, computer aided extraction and analysis of features from handwriting can be of great assistance to graphologists. The most dominant features of handwriting employed in graphology include the shape of the page margins, line spacing, line skew, word slant, size of letters, text density, writing speed and regularity. In this paper a number of methods are proposed for automated extraction of some of these features from Farsi handwriting. Experimental results on 118 test samples of different writers are presented and discussed. Manuscript profile
      • Open Access Article

        3 - An Agent-Based Parallel Programming for Grid Programming
        H. Deldari
        Computational grids have provided the usage of computational distributed resources for computation-intensive applications. The development of programs that use these capabilities is one of the challenging issues for grid computing. In this article, an effort has been ma More
        Computational grids have provided the usage of computational distributed resources for computation-intensive applications. The development of programs that use these capabilities is one of the challenging issues for grid computing. In this article, an effort has been made in order to solve this problem by presenting mobile-agent-based parallel programming on the grid. The presentation of this model, which has been materialized by extending Alchemi™ grid infrastructure, adding agent properties and navigational commands that let the user to develop his/her program by using agents’ mobility and communication between them. In order to evaluate the system, algorithm of matrix multiplication as well as algorithm of finding the convex hull of a series of points have been implemented in the mentioned system. Manuscript profile
      • Open Access Article

        4 - Design and Implementation of Two Pipeline Architectures for Computing High-Order Moments of Grey-Level Images
        M. Monajati E. Kabir  
        Moments are utilized in image processing for pattern recognition, machine vision and numerous feature extraction techniques. Due to computational complexity, it is difficult to use high order moments in real time processing. This paper presents the design of two new arc More
        Moments are utilized in image processing for pattern recognition, machine vision and numerous feature extraction techniques. Due to computational complexity, it is difficult to use high order moments in real time processing. This paper presents the design of two new architectures for real time computation of moments, up to order 14, M00 to M77, in gray level images, based on parallel systolic arrays and pipelining technique, using a 0.18μm CMOS technology. Implementation of the moment processing element (MPE) of the first architecture illustrates a processing speed of 125 frames/s for 1024×1024 grey-level images. The maximum operating frequency and the power consumption for an architecture with 5 elements is 133 MHz and 14.36 mW, respectively. Since the design is very low power, the number of parallel MPE’s can be easily increased. Simulation shows that with 11 parallel MPE’s, the first 49 moments of 1024×1024 image are computed with the speed of 30 frames/sec. To further decrease the latency of the first architecture, the second architecture is proposed, in which the add operation is performed only with a single adder and a compressor. Simulation shows that the latency of the second architecture is 3.3 times lower than that of the first architecture. Implementation of the second architecture illustrates the maximum operating frequency and the power consumption of 125 MHz and 58.34 mW, respectively. Operating frequency and power consumption of the second architecture is approximately the same as that of the first architecture which befit real time applications. Manuscript profile
      • Open Access Article

        5 - Design of Low Power High Speed Dilation Operator for Binary Images in CMOS Technology
        M. hajirahimi E. Kabir  
        This paper describes the design of hybrid wave-pipeline architecture for implementation of real time morphological dilation. With minor changes to this architecture, it can be utilized for erosion, closing, and opening operators. The new architecture results in higher s More
        This paper describes the design of hybrid wave-pipeline architecture for implementation of real time morphological dilation. With minor changes to this architecture, it can be utilized for erosion, closing, and opening operators. The new architecture results in higher speed, less hardware complexity, and lower area and power dissipation compared to conventional pipeline implementation. In addition, it is faster than the wave-pipeline structure, without the difficulty of balancing the delay of long signal paths. Using the new architecture, three ASIC chips in 0.18µm CMOS are designed for binary image processing through Verilog. These chips dilate a 1024×1024 image by a 21×21 structuring element in 256.58μ s. The maximum frequency of the operations is 5.882 GHz, 5 GHz, and 4.167 GHz. For the power supply of 1.8 V and the 4.167 GHz frequency, the power dissipation is 597mW, 478 mW, and 410 mW, and the chip area is 0.118 mm2, 0.087 mm2, and 0.075 mm2, respectively. Manuscript profile
      • Open Access Article

        6 - Optimizing OLAP Queries by Mapping Data Cube to Two Dimensional Space
        m.k. sohraby Ahmad Abdollahzadeh Barforoush
        Data warehouse and OLAP are essential elements of decision support systems (DSS) and have been studied in database issues extensively. The requirements of decision support systems are different from on-line transactional processing systems. Query optimization and effici More
        Data warehouse and OLAP are essential elements of decision support systems (DSS) and have been studied in database issues extensively. The requirements of decision support systems are different from on-line transactional processing systems. Query optimization and efficient data cube computation have primary roles in improving functionality of DSS. This paper presents a new method for query processing in data warehouses and computing data cubes using bottom-up cube computation techniques. Results of implementation show that the proposed algorithm outperforms two best known algorithms (based on time criterion), and is much faster than them in answering to monotonic query with large volume of data. Furthermore, 2-dimensional view of ex-cube and transforming the data cube to a hyper graph structure, reduce the required space of the algorithm when we aggregate subsets of cube's dimension. Manuscript profile
      • Open Access Article

        7 - Unsupervised Image Clustering Using Central Force Optimization Algorithm Unsupervised Image Clustering Using Central Force Optimization Algorithm
        M. H. Mozafari Maref Seyed-Hamid Zahiri
        Central Force Optimization (CFO) is a new member of heuristic algorithms which has been recently proposed and added to swarm intelligence algorithms. In this paper, an effective unsupervised image clustering technique is proposed, using CFO and called CFO-clustering. In More
        Central Force Optimization (CFO) is a new member of heuristic algorithms which has been recently proposed and added to swarm intelligence algorithms. In this paper, an effective unsupervised image clustering technique is proposed, using CFO and called CFO-clustering. In the presented method, each probe includes the information of center of the clusters, and fitness function contains both inter-distance and intra-distance of the samples. Extensive experimental results show that the proposed CFO-clustering outperforms other similar clustering algorithms which were designed based on the evolutionary techniques. Manuscript profile
      • Open Access Article

        8 - Phrase Segmentation on Persian Texts Using Neural Networks
        M. M. Mirdamadi A. M. Zareh Bidoki M. Rezaeian
        Word and phrase segmentation is one of the main activities in natural languages processing (NLP). Many programs in NLP need to be preprocessed for extraction of text’s words and distinction phrases. Getting meaningful words with their prefix and suffix is the main and t More
        Word and phrase segmentation is one of the main activities in natural languages processing (NLP). Many programs in NLP need to be preprocessed for extraction of text’s words and distinction phrases. Getting meaningful words with their prefix and suffix is the main and the final goal of segmentation. This activity depends on various natural languages can be easy or hard. Persian is among the languages with complex preprocessing tasks. One of the complexity sources is handling different writing scripts. In written Persian texts, we have two kinds of spaces: short space and white space. Also there are various scripts for writing Persian texts, differing in the style of writing words, using or elimination of spaces within or between words, using various forms of characters and so on. In this paper, we want to suggest a statistical method for phrase segmentation on Persian texts using neural networks due to using in search engines. For this purpose, we use occurrence likelihood of uniwords and biwords in corpus. The suggested algorithm includes four steps and could detect about 89.6% of correct tokens. Experimental results show this method can improve the performance of the usual methods Manuscript profile
      • Open Access Article

        9 - Wavelet Detection of Partial Discharges in High Voltage Cables
        B. Badrzadeh S. M.  Shahrtash
        This paper has proposed an on-line method of partial discharges (PDs) detection. Fundamental difficulty in PD measurement is that PD signal is so minute that can be easily contaminated by huge amount of noise and this makes PD detection rather obscure. Thus, noise reduc More
        This paper has proposed an on-line method of partial discharges (PDs) detection. Fundamental difficulty in PD measurement is that PD signal is so minute that can be easily contaminated by huge amount of noise and this makes PD detection rather obscure. Thus, noise reduction algorithms have been extensively deployed to mitigate the noise. Among which, Digital Signal Processing (DSP) techniques are becoming more and more applicable. Compared by linear predictor and Least Mean Square (LMS), a wavelet-based noise reduction algorithm has been utilised. Some significant considerations in wavelet denoising such as selection of level of decomposition and reconstruction, mother wavelets, methods of signal extension,thresholding criterion have been discussed deeply. In order to prove the effectiveness of our algorithm, real data extracted from an 11 kV cable has been used Manuscript profile
      • Open Access Article

        10 - Evaluation of Fuzzy-Vault-based Key Agreement Schemes in Wireless Body Area Networks Using the Fuzzy Analytical Hierarchy Process
        M. Ebrahimi H. R. Ahmadi M. Abbasnejad Ara
        Wireless body area networks (WBAN) may be deployed on each person’s body for pervasive and real time health monitoring. As WBANs deal with personal health data, securing the data during communication is essential. Therefore, enabling secure communication in this area ha More
        Wireless body area networks (WBAN) may be deployed on each person’s body for pervasive and real time health monitoring. As WBANs deal with personal health data, securing the data during communication is essential. Therefore, enabling secure communication in this area has been considered as an important challenge. Due to the WBAN characteristics and constraints caused by the small size of the nodes, selection of the best key agreement scheme is very important. This paper intends to evaluate different key agreement schemes in WBANs and find the best one. To achieve this goal, three schemes from existing research named OPFKA, PSKA and ECG-IJS are considered and a fuzzy analytical hierarchy process (FAHP) method is employed to find the best scheme. Manuscript profile
      • Open Access Article

        11 - Fault Detection by Integrating Canonical Variate Analysis and Independent Component Analysis Based on Local Outlier Factor
        E. Tavasolipour M. T. Hamidi Beheshti A.  Ramezani
        In this paper a novel process monitoring scheme is proposed because of the importance of fault detection and identification in industrial processes. In this method, process dynamic and effect of outliers are considered concurrently. First, the proposed approach uses CVA More
        In this paper a novel process monitoring scheme is proposed because of the importance of fault detection and identification in industrial processes. In this method, process dynamic and effect of outliers are considered concurrently. First, the proposed approach uses CVA method to implement the process dynamic. Then ICA method is performed for dimension reduction of data. The outliers elimination and control limit calculation are based on the Local Outlier Factor algorithm. This algorithm doesn’t consider a special distribution for process variables, thus conforming to data in real industrial processes. The proposed method is applied to fault detection in the Tennessee Eastman process. Results clearly indicate better performance of the proposed scheme compared to the alternative methods. Manuscript profile
      • Open Access Article

        12 - An Efficient Bread First Search Algorithm on CPU and GPU
        P. Keshavarzi H. Deldari S. Abrishami
        Graphs are powerful data representations used in enormous computational domains. In graph-based applications, a systematic exploration of graph such as a breath first search often is a fundamental component in the processing of the vast data sets. In this paper we prese More
        Graphs are powerful data representations used in enormous computational domains. In graph-based applications, a systematic exploration of graph such as a breath first search often is a fundamental component in the processing of the vast data sets. In this paper we presented a hybrid method that in each level of processing of graph chooses the best implementation of algorithms implemented on CPU or GPU, while avoid poor performance on low and high degree graphs. Our method shows improved performance over the current state-of-the-art implementation and our results proves it. Manuscript profile
      • Open Access Article

        13 - Onset Detection for Tar Solo Based on Pitch and Energy Features
        B. Farrokhi E. Kabir
        This paper develops a new method of onset detection for the Tar, a traditional Iranian musical instrument. The proposed method is based on both types of pitch and energy features and an adaptive peak picking algorithm is utilized for primary onset detection. An improved More
        This paper develops a new method of onset detection for the Tar, a traditional Iranian musical instrument. The proposed method is based on both types of pitch and energy features and an adaptive peak picking algorithm is utilized for primary onset detection. An improved template matching method is used to detect fundamental frequencies and finally, onsets are tagged based on primary onsets and fundamental frequencies. This step is especially useful to detect the reaz, repeatedly played notes with the same frequency and short durations. For the evaluation of the method, a data set with predetermined onsets was produced and the results were compared with an energy based method explained in terms of F measure. Manuscript profile
      • Open Access Article

        14 - A Novel Cascading Scheme to Improve Speed and Accuracy of a VMMR System
        M. Biglari
        In the last decade, many researches have been done on fine-grained recognition. The main category of the object is known in this problem and the goal is to determine the subcategory or fine-grained category. Vehicle Make and Model Recognition (VMMR) is a hard fine-grain More
        In the last decade, many researches have been done on fine-grained recognition. The main category of the object is known in this problem and the goal is to determine the subcategory or fine-grained category. Vehicle Make and Model Recognition (VMMR) is a hard fine-grained classification problem, due to the large number of classes, substantial inner-class and small inter-class distance. Furthermore, improving system accuracy leads to increasing in processing time. As we can see the state-of-the-art machine vision tool like convolutional neural networks lacks in real-time processing time. In this paper, a method has been presented briefly for VMMR firstly. Secondly, a cascading scheme for improving both speed and accuracy of this VMMR system has been proposed. In order to eliminate extra processing cost, the proposed cascading scheme applies classifiers to the input image in a sequential manner. Some effective criterions for an efficient ordering of classifiers are proposed and finally a fusion of them is used in the cascade algorithm. For evaluation purposes, a new dataset with more than 5000 vehicles of 28 different makes and models has been collected. The experimental results on this dataset and comprehensive CompCars dataset show outstanding performance of our approach. Our cascading scheme results up to 80% increase in the system processing speed. Manuscript profile
      • Open Access Article

        15 - A Novel Cascading Scheme to Improve Speed and Accuracy of a VMMR System
        M. Biglari ali Soleimani H. Hassanpour
        In the last decade, many researches have been done on fine-grained recognition. The main category of the object is known in this problem and the goal is to determine the subcategory or fine-grained category. Vehicle Make and Model Recognition (VMMR) is a hard fine-grain More
        In the last decade, many researches have been done on fine-grained recognition. The main category of the object is known in this problem and the goal is to determine the subcategory or fine-grained category. Vehicle Make and Model Recognition (VMMR) is a hard fine-grained classification problem, due to the large number of classes, substantial inner-class and small inter-class distance. Furthermore, improving system accuracy leads to increasing in processing time. As we can see the state-of-the-art machine vision tool like convolutional neural networks lacks in real-time processing time. In this paper, a method has been presented briefly for VMMR firstly. Secondly, a cascading scheme for improving both speed and accuracy of this VMMR system has been proposed. In order to eliminate extra processing cost, the proposed cascading scheme applies classifiers to the input image in a sequential manner. Some effective criterions for an efficient ordering of classifiers are proposed and finally a fusion of them is used in the cascade algorithm. For evaluation purposes, a new dataset with more than 5000 vehicles of 28 different makes and models has been collected. The experimental results on this dataset and comprehensive CompCars dataset show outstanding performance of our approach. Our cascading scheme results up to 80% increase in the system processing speed. Manuscript profile
      • Open Access Article

        16 - Seam Carving Speed Improvement by Odd and Even Subimages Decomposition
        F. Siar S. Mozaffari
        Seam carving is one of content aware image retargeting techniques. In this method, a path of pixels with lowest energy, called seam, crossing from top to bottom or from left to right in an image is extracted. By removing or inserting seams, size of the image can be chan More
        Seam carving is one of content aware image retargeting techniques. In this method, a path of pixels with lowest energy, called seam, crossing from top to bottom or from left to right in an image is extracted. By removing or inserting seams, size of the image can be changed. Speed and quality are two main parameters in seam carving. In this paper a new method for speed enhancement of seam carving is proposed. The input image is decomposed into odd and even subimages and searching for seams is performed in parallel in these subimages. Compared to the original seam carving, the proposed method improves the speed at least by two times while maintain image’s quality unchanged. Previous seam searching algorithms can be utilized in our method or it can be combined with other parallel processing schemes. Finally, image quality of the proposed seam carving is improved. Manuscript profile
      • Open Access Article

        17 - Proposing a Robust Method Against Adversarial Attacks Using Scalable Gaussian Process and Voting
        Mehran Safayani Pooyan Shalbafan Seyed Hashem Ahmadi Mahdieh Falah aliabadi Abdolreza Mirzaei
        In recent years, the issue of vulnerability of machine learning-based models has been raised, which shows that learning models do not have high robustness in the face of vulnerabilities. One of the most well-known defects, or in other words attacks, is the injection of More
        In recent years, the issue of vulnerability of machine learning-based models has been raised, which shows that learning models do not have high robustness in the face of vulnerabilities. One of the most well-known defects, or in other words attacks, is the injection of adversarial examples into the model, in which case, neural networks, especially deep neural networks, are the most vulnerable. Adversarial examples are generated by adding a little purposeful noise to the original examples so that from the human user's point of view there is no noticeable change in the data, but machine learning models make mistakes in categorizing the data. One of the most successful methods for modeling data uncertainty is Gaussian processes, which have not received much attention in the field of adversarial examples. One reason for this could be the high computational volume of these methods, which limits their used in the real issues. In this paper, a scalable Gaussian process model based on random features has been used. This model, in addition to having the capabilities of Gaussian processes for proper modeling of data uncertainty, is also a desirable model in terms of computational cost. A voting-based process is then presented to deal with adversarial examples. Also, a method called automatic relevant determination is proposed to weight the important points of the images and apply them to the kernel function of the Gaussian process. In the results section, it is shown that the proposed model has a very good performance against fast gradient sign attack compared to competing methods. Manuscript profile
      • Open Access Article

        18 - Proposing a Novel Write Circuit to Reduce Energy and Delay of Writing Operations in STT-MRAM Memories Using the Temperature Method
        امیرمحمد حاجی صادقی حمیدرضا زرندی Sh. Jalilian
        With the advancement of technology and the shrinking dimensions of transistors in CMOS technology, several challenges have arisen. One of the main concerns in using CMOS-based memory is the high power consumption of this type of memory. Therefore, new and non-volatile m More
        With the advancement of technology and the shrinking dimensions of transistors in CMOS technology, several challenges have arisen. One of the main concerns in using CMOS-based memory is the high power consumption of this type of memory. Therefore, new and non-volatile memories were introduced to address the shortcomings of conventional volatile memory. One of the emerging non-volatile technologies is STT-MRAM memory, an effective and efficient alternative to conventional memory such as SRAMs due to low leakage power, high density, and short access time. The positive features of STT-MRAMs make it possible to use them at different memory hierarchy levels, especially the cache level. However, STT-MRAMs suffer from high write energy. In this paper, we present a new write circuit using the temperature method; in addition to improving the high write energy, write delay is also improved. The proposed circuit lead to 22.5% and 18.62% improvement in energy and writing delay, respectively, compared to the existing methods. Manuscript profile
      • Open Access Article

        19 - Autonomous Controlling System for Structural Health Monitoring Wireless Sensor Networks
        Sahand Hashemi Seyyed Amir Asghari Mohammad Reza Binesh Marvasti
        Nowadays, office, residential, and historic buildings often require special monitoring. Obviously, such monitoring involves costs, errors and challenges. As a result of factors such as lower cost, broader application, and ease of installation, wireless sensor networks a More
        Nowadays, office, residential, and historic buildings often require special monitoring. Obviously, such monitoring involves costs, errors and challenges. As a result of factors such as lower cost, broader application, and ease of installation, wireless sensor networks are frequently replacing wired sensor networks for structural health monitoring. Depending on the type and condition of a structure, factors such as energy consumption and accuracy, as well as fault tolerance are important. Particularly when wireless sensor networks are involved, these are ongoing challenges which, despite research, have the possibility of being improved. Using the Markov decision process and wake-up sensors, this paper proposes an innovative approach to monitoring stable and semi-stable structures, reducing the associated cost and error over existing methods, and according to the problem, we have advantages both in implementation and execution. Thus, the proposed method uses the Markov decision process and wake-up sensors to provide a new and more efficient technique than existing methods in order to monitor the health of stable and semi-stable structures. This approach is described in six steps and compared to widely used methods, which were tested and simulated in CupCarbon simulation environment with different metrics, and shows that the proposed solution is better than similar solutions in terms of a reduction of energy consumption from 11 to 70%, fault tolerance in the transferring of messages from 10 to 80%, and a reduction of cost from 93 to 97%. Manuscript profile
      • Open Access Article

        20 - Improving Age Estimation of Dental Panoramic Images Based on Image Contrast Correction by Spatial Entropy Method
        Masoume Mohseni Hussain Montazery Kordy Mehdi Ezoji
        In forensic dentistry, age is estimated using dental radiographs. Our goal is to automate these steps using image processing and pattern recognition techniques. With a dental radiograph, the contour is extracted and features such as apex, width and tooth length are dete More
        In forensic dentistry, age is estimated using dental radiographs. Our goal is to automate these steps using image processing and pattern recognition techniques. With a dental radiograph, the contour is extracted and features such as apex, width and tooth length are determined, which are used to estimate age. Optimizing the resolution of radiographic images is an important step in contour extraction and age estimation. In this article, the aim is to improve the image resolution in order to extract the appropriate area and proper segmentation of the tooth, which makes it possible to estimate age better. In this model, due to the low resolution of radiographic images, in order to increase the accuracy of extracting the desired area of each tooth (ROI), the image resolution increases using spatial entropy based on the spatial distribution of pixel brightness, along with another increasing resolution method, like the Laplacian pyramids. Increasing the resolution of the image leads to the extraction of appropriate ROI and the removal of unwanted areas. The database used in this study is 154 adolescent panoramic radiographs, of which 73 are male and 81 are female. This database is prepared from Babol University of Medical Sciences. The results show that by using fixed tooth segmentation methods and only by applying the proposed effective method to improve image resolution, the extraction of appropriate ROI increased from 66% to 78% which shows a good improvement. The extracted ROI is then delivered to the segmented block and the contour extracted. After contour extraction, age is estimated. The age estimation using the proposed method is closer to the manual age estimate compared to the method that does not use the proposed algorithm to increase the image resolution. Manuscript profile
      • Open Access Article

        21 - Performance Evaluation of TMDFET-based SRAM Memory Cell Compared to Si-MOSFET Technology
        فرزانه ایزدی نسب Morteza Gholipour
        Transition metal dichalcogenides FETs (TMDFETs) are among the emerging devices that have been considered by researchers in recent years. In this paper, the effect of parameter variations, temperature and power supply on the performance of TMDFET transistors has been inv More
        Transition metal dichalcogenides FETs (TMDFETs) are among the emerging devices that have been considered by researchers in recent years. In this paper, the effect of parameter variations, temperature and power supply on the performance of TMDFET transistors has been investigated in comparison with Si-MOSFET technology. The results indicate that TMDFET is less sensitive to these variations compared to Si-MOSFET devices. By selecting the appropriate transistors size ratios, the performance of the TMDFET-based conventional 6-transistor static random access memory cell is evaluated in comparison with the Si-MOSFET in 16nm technology. Simulations are performed at room temperature, 0.7 V supply voltage and the same conditions for both TMDFET and Si-MOSFET devices. The results of the simulations show that TMDFET-based SRAM cell has 29.44% more WTP, corresponding to more writing ability, 49.49% more WTI×WTV, corresponding to higher writing noise margin, and 29.48% lower read delay. In other words, a TMDFET-based SRAM cell performs better than Si-MOS-SRAM in terms of write ability, static read margin, and read delay. Manuscript profile
      • Open Access Article

        22 - Numeric Polarity Detection based on Employing Recursive Deep Neural Networks and Supervised Learning on Persian Reviews of E-Commerce Users in Opinion Mining Domain
        Sepideh Jamshidinejad Fatemeh Ahmadi-Abkenari Peiman Bayat
        Opinion mining as a sub domain of data mining is highly dependent on natural language processing filed. Due to the emerging role of e-commerce, opinion mining becomes one of the interesting fields of study in information retrieval scope. This domain focuses on various s More
        Opinion mining as a sub domain of data mining is highly dependent on natural language processing filed. Due to the emerging role of e-commerce, opinion mining becomes one of the interesting fields of study in information retrieval scope. This domain focuses on various sub areas such as polarity detection, aspect elicitation and spam opinion detection. Although there is an internal dependency among these sub sets, but designing a thorough framework including all of the mentioned areas is a highly demanding and challenging task. Most of the literatures in this area have been conducted on English language and focused on one orbit with a binary outcome for polarity detection. Although the employment of supervised learning approaches is among the common utilizations in this area, but the application of deep neural networks has been concentrated with various objectives in recent years so far. Since the absence of a trustworthy and a complete framework with special focuses on each impacting sub domains is highly observed in opinion mining, hence this paper concentrates on this matter. So, through the usage of opinion mining and natural language processing approaches on Persian language, the deep neural network-based framework called RSAD that was previously suggested and developed by the authors of this paper is optimized here to include the binary and numeric polarity detection output of sentences on aspect level. Our evaluation on RSAD performance in comparison with other approaches proves its robustness. Manuscript profile
      • Open Access Article

        23 - An Intelligent Vision System for Automatic Forest Fire Surveillance
        Mohammad Sadegh  Kayhanpanah Behrooz Koohestani
        Fighting forest fires to avoid their potential dangers as well as protect natural resources is a challenge for researchers. The goal of this research is to identify the features of fire and smoke from the unmanned aerial vehicle (UAV) visual images for classification, o More
        Fighting forest fires to avoid their potential dangers as well as protect natural resources is a challenge for researchers. The goal of this research is to identify the features of fire and smoke from the unmanned aerial vehicle (UAV) visual images for classification, object detection, and image segmentation. Because forests are highly complex and nonstructured environments, the use of the vision system is still having problems such as the analogues of flame characteristics to sunlight, plants, and animals, or the smoke blocking the images of the fire, which causes false alarms. The proposed method in this research is the use of convolutional neural networks (CNNs) as a deep learning method that can automatically extract or generate features in different layers. First, we collect data and increase them according to data augmentation methods, and then, the use of a 12-layer network for classification as well as transfer learning method for segmentation of images is proposed. The results show that the data augmentation method used due to resizing and processing the input images to the network to prevent the drastic reduction of the features in the original images and also the CNNs used can extract the fire and smoke features in the images well and finally detect and localize them. Manuscript profile
      • Open Access Article

        24 - Evaluation of the Progression of Boxwood Blight Disease in the Forests of Northern Iran Using Satellite Image Processing Techniques
        marzieh ghavidel Peiman Bayat Mohammadebrahim farashiani
        In recent years, boxwood dieback has become one of the essential concerns of practitioners and managers of the natural resources of the country. To control the expansion of the factors contributing to the dieback of box trees, the early detection and preparation of dist More
        In recent years, boxwood dieback has become one of the essential concerns of practitioners and managers of the natural resources of the country. To control the expansion of the factors contributing to the dieback of box trees, the early detection and preparation of distribution maps are required. Assessment data can play an important role in this regard. The combination of high-resolution and low-spectrum panchromatic images with low resolution is used for evaluating the extent of destruction. Also, spectral and textural features are considered simultaneously in images extracted from Landsat 8 satellite. Finally, by extracting effective features from the candidate description space with the help of genetic algorithm and using the appropriate classification in the form of simultaneous application of fuzzy clustering and maximum similarity classification of area resulted in good accuracy in 2014-2018. The coefficients obtained from the models confirm their model validation for future estimates and the possibility it usage to assess the extent of the affected areas and the evolution of progress for all regions. Manuscript profile
      • Open Access Article

        25 - A Step towards All-Optical Deep Neural Networks: Utilizing Nonlinear Optical Element
        Aida Ebrahimi Dehghan Pour S. K.
        In recent years, optical neural networks have received a lot of attention due to their high speed and low power consumption. However, these networks still have many limitations. One of these limitations is implementing their nonlinear layer. In this paper, the implement More
        In recent years, optical neural networks have received a lot of attention due to their high speed and low power consumption. However, these networks still have many limitations. One of these limitations is implementing their nonlinear layer. In this paper, the implementation of nonlinear unit for an optical convolutional neural network is investigated, so that using this nonlinear unit, we can realize an all-optical convolutional neural network with the same accuracy as the electrical networks, while providing higher speed and lower power consumption. In this regard, first of all, different methods of implementing optical nonlinear unit are reviewed. Then, the impact of utilizing saturable absorber, as the nonlinear unit in different layers of CNN, on the network’s accuracy is investigated, and finally, a new and simple method is proposed to preserve the accuracy of the optical neural networks utilizing saturable absorber as the nonlinear activating function. Manuscript profile
      • Open Access Article

        26 - Improving IoT Botnet Anomaly Detection Based on Dynamic Feature Selection and Hybrid Processing
        Boshra Pishgoo Ahmad akbari azirani
        The complexity of real-world applications, especially in the field of the Internet of Things, has brought with it a variety of security risks. IoT Botnets are known as a type of complex security attacks that can be detected using machine learning tools. Detection of the More
        The complexity of real-world applications, especially in the field of the Internet of Things, has brought with it a variety of security risks. IoT Botnets are known as a type of complex security attacks that can be detected using machine learning tools. Detection of these attacks, on the one hand, requires the discovery of their behavior patterns using batch processing with high accuracy, and on the other hand, must be operated in real time and adaptive like stream processing. This highlights the importance of using batch/stream hybrid processing techniques for botnet detection. Among the important challenges of these processes, we can mention the selection of appropriate features to build basic models and also the intelligent selection of basic models to combine and present the final result. In this paper, we present a solution based on a combination of stream and batch learning methods with the aim of botnet anomaly detection. This approach uses a dynamic feature selection method that is based on a genetic algorithm and is fully compatible with the nature of hybrid processing. The experimental results in a data set consisting of two known types of botnets indicate that on the one hand, the proposed approach increases the speed of hybrid processing and reduces the detection time of the botnets by reducing the number of features and removing inappropriate features, and on the other hand, increases accuracy by selecting appropriate models for combination. Manuscript profile
      • Open Access Article

        27 - Design and Collection of Speech Data as the First Step of Localization the Intelligent Diagnosis of Autism in Iranian Children
        Maryam Alizadeh Shima tabibian
        Autism Spectrum Disorder is a type of disorder in which, the patients suffer from a developmental disorder that manifests itself by symptoms such as inability to social communication. Thus, the most apparent sign of autism is a speech disorder. The first part of this pa More
        Autism Spectrum Disorder is a type of disorder in which, the patients suffer from a developmental disorder that manifests itself by symptoms such as inability to social communication. Thus, the most apparent sign of autism is a speech disorder. The first part of this paper reviews research studies conducted to automatically diagnose autism based on speech processing methods. According to our review, the main speech processing approaches for diagnosing autism can be divided into two groups. The first group detects individuals with autism by processing their answers or feelings in response to questions or stories. The second group distinguishes people with autism from healthy people because of the accuracy of recognizing their spoken utterances based on automatic speech recognition systems. Despite much research being conducted outside Iran, few studies have been conducted in Iran. The most important reason for this is the lack of rich data that meet the needs of autism diagnosis based on the speech processing of suspected people. In the second part of the paper, we discuss the process of designing, collecting, and evaluating a speaker-independent dataset for autism diagnosis in Iranian children as the first step in the localization of the mentioned field. Manuscript profile