A Survey on Transformation Methods of XML Documents to Ontologies
51. A Survey on Transformation Methods of XML Documents to Ontologies

Mohammadereza Pourkhani; Bita Shadgar; Alireza Osareh

Volume 4, Issue 2 , Summer and Autumn 2017, , Pages 81-100

http://dx.doi.org/10.22108/jcs.2018.106872.0

Abstract
  Nowadays, the great amount of information is stored in many data resources such as relational databases, XML documents and so on. Semantic Web is aimed to make current Web information ...  Read More
Evaluating Behavioral Intentions of Tourists in e-Tourism
52. Evaluating Behavioral Intentions of Tourists in e-Tourism

Fahimeh Parsaei; Mehran Rezaei; Monireh Arabjafari

Volume 1, Issue 2 , Winter and Spring 2014, , Pages 95-109

Abstract
  Tourism is one of the major sources of income for many countries and with the advent of internet, using this new channel (internet) for providing different services of tourism, i.e., ...  Read More
Toward A More Efficient Gröbner-based Algebraic Cryptanalysis
53. Toward A More Efficient Gröbner-based Algebraic Cryptanalysis

Hossein Arabnezhad; Babak Sadeghian

Volume 7, Issue 2 , Summer and Autumn 2020, , Pages 103-117

http://dx.doi.org/10.22108/jcs.2020.123673.1050

Abstract
  In this paper, we propose a new method to launch a more efficient algebraic cryptanalysis. Algebraic cryptanalysis aims at finding the secret key of a cipher by solving a collection ...  Read More
The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines
54. The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines

Zeinab Basereh; Shahram Golzari; Abbas Harifi

Volume 3, Issue 2 , Winter and Spring 2016, , Pages 111-125

Abstract
  In this paper, the binary gravitational search algorithm and support vector machines have been used to diagnose epilepsy. At first, features are extracted from EEG signals by using ...  Read More
A High-Payload Audio Watermarking Scheme for Real-Time Applications
55. A High-Payload Audio Watermarking Scheme for Real-Time Applications

Ramin Almasi; Hooman Nikmehr

Volume 2, Issue 2 , Winter and Spring 2015, , Pages 119-127

Abstract
  Digital audio watermarking is mainly used for ownership protection of digital audio. In this research, an audio watermarking method is presented which can be adopted in real-time situations ...  Read More
Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition
56. Adaptive Interval Type-2 Fuzzy Inference System for Facial Expression Recognition

Mehran Safayani; Vahid Farmani; Maedeh Ahmadi; Abdolreza Mirzaei

Volume 2, Issue 3 , Summer and Autumn 2015, , Pages 125-207

Abstract
  Fuzzy Inference systems have been successfully applied for different pattern recognition problems. However, in some real-world applications such as facial expression recognition, the ...  Read More
A New Hybrid Method for VoIP Stream Steganography
57. A New Hybrid Method for VoIP Stream Steganography

Hossein Moodi; Ahmad Reza Naghsh-Nilchi

Volume 3, Issue 3 , Summer and Autumn 2016, , Pages 175-182

Abstract
  In this article, a new stream steganography method for real time digital data network environment with the focus on VoIP is presented. This method consists of a combination of Least ...  Read More
Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms
58. Comparison of Hybrid and Filter Feature Selection Methods to Identify Candidate Single Nucleotide Polymorphisms

Farideh Halakou; Mahdi Eftekhari; Ali Esmailizadeh

Volume 1, Issue 3 , Summer and Autumn 2014, , Pages 205-2013

Abstract
  During the last decade, applying feature selection methods in bioinformatics has become an essential necessity for model building. This is due to the high dimensional nature of many ...  Read More
Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks
59. Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks

Narges Mehran; Naser Movahhedinia

Volume 3, Issue 4 , Summer and Autumn 2016, , Pages 217-231

Abstract
  Named Data Networking (NDN), a data-centric enabled-cache architecture, as one of the candidates for the future Internet, has the potential to overcome many of the current Internet ...  Read More
A Context-Aware Reflective-State Framework to Reconfigure Service-Based Applications
60. A Context-Aware Reflective-State Framework to Reconfigure Service-Based Applications

Yousef Rastegari; Fereidoon Shams

Volume 2, Issue 4 , Summer and Autumn 2015, , Pages 281-292

Abstract
  Service-based applications (SBA) offer flexible functionalities in wide range ofenvironments. Therefore, they should be able to dynamically adapt to differentquality concerns such as ...  Read More
DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations
61. DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations

Farhad Zafari; Faria Nassiri-Mofakham; Ali Zeinal Hamadani

Volume 1, Issue 4 , Summer and Autumn 2014, , Pages 283-292

Abstract
  During the last decades, opponent modeling techniques, utilized to improve the negotiation outcome, have sparked interest in the negotiation research community. In this study, we first ...  Read More
An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols
62. An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols

Hamid Reza Mahrooghi; Rasool Jalili

Volume 6, Issue 1 , Winter and Spring 2019, , Pages 25-42

http://dx.doi.org/10.22108/jcs.2019.113429.1011

Abstract
  CryptoPAi is a hybrid operational-epistemic framework for specification and analysis of security protocols with genuine support for cryptographic constructs. This framework includes ...  Read More
Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments
63. Towards a Model-Driven Framework for Simulating Interactive Emergency Response Environments

Samaneh HoseinDoost; Afsaneh Fatemi; Bahman Zamani

Volume 5, Issue 1 , Winter and Spring 2018, , Pages 35-49

http://dx.doi.org/10.22108/jcs.2018.112297.1008

Abstract
  Due to the increasing occurrence of unexpected events and the need for pre-crisis planning to reduce risks and losses, modeling emergency response environments (ERE) is needed more ...  Read More
Formalizing the main characteristics of QVT-based model transformation languages
64. Formalizing the main characteristics of QVT-based model transformation languages

Alireza Rouhi; Kevin Lano

Volume 7, Issue 1 , Winter and Spring 2020, , Pages 35-62

http://dx.doi.org/10.22108/jcs.2020.121740.1047

Abstract
  Model-Driven Development (MDD) aims at developing software more productively by using models as the main artifacts. Here, the models with high abstraction levels must be transformed ...  Read More
The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images
65. The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images

Dariush Alimoradi; Maryam Hasanzadeh

Volume 1, Issue 1 , Winter and Spring 2014, , Pages 39-46

Abstract
  Blind image steganalysis is a technique for discovering the message hidden in images in an independent manner than embedding the hidden message. The content of the image contribute ...  Read More
A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set
66. A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set

MohammadReza Taheri; Nasim Shafiee; Mohammad Esmaeildoust; Zhale Amirjamshidi; Reza Sabbaghi-nadooshan; Keivan Navi

Volume 2, Issue 1 , Winter and Spring 2015, , Pages 43-54

Abstract
  The moduli set 2 n−1 − 1, 2 n+1 − 1, 2 n , 2 n − 1 has been recently proposed inliterature for class of 4n-bit dynamic range in residue number system. Due toonly ...  Read More
Structural and Non-Structural Similarity Combination of Users in Social Networks
67. Structural and Non-Structural Similarity Combination of Users in Social Networks

Azam Malekmohammad; Hadi Khosravi

Volume 3, Issue 1 , Winter and Spring 2016, , Pages 43-52

Abstract
  Estimating similarity is expressed in many domains and sciences. For instance, data mining, web mining, clustering, search engines, ontology mapping and social networks require the ...  Read More
BLProM: A black-box approach for detecting business-layer processes in the web applications
68. BLProM: A black-box approach for detecting business-layer processes in the web applications

Mitra Alidoosti; Alireza Nowroozi; Ahmad Nickabadi

Volume 6, Issue 2 , Summer and Autumn 2019, , Pages 65-80

http://dx.doi.org/10.22108/jcs.2020.117223.1028

Abstract
  Web application vulnerability scanners cannot detect business logic vulnerabilities (vulnerabilities related to logic) because they are not able to understand the business logic of ...  Read More
Robust Face Recognition Under Illumination Changes and Pose Variations
69. Robust Face Recognition Under Illumination Changes and Pose Variations

Hamid Hassanpour; Omid Kohansal; Sekineh Asadi Amiri

Volume 5, Issue 2 , Summer and Autumn 2018, , Pages 81-89

http://dx.doi.org/10.22108/jcs.2018.110882.

Abstract
  There are many applications for face recognition. Due to illumination changes, and pose variations of facial images, face recognition is often a challenging and a complicated ...  Read More
A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems
70. A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems

Fahimeh Farahbod; Mahdi Eftekhari

Volume 1, Issue 2 , Winter and Spring 2014, , Pages 111-122

Abstract
  we propose in this article a new hybrid method for modeling accurate fuzzy rule based classication systems. The new method is a combination of manifold based data mapping method, a ...  Read More
A Context Model for Business Process Adaptation based on Ontology Reasoning
71. A Context Model for Business Process Adaptation based on Ontology Reasoning

Leila Kord Toudeshki; Mir Ali Seyyedi; Afshin Salajegheh

Volume 7, Issue 2 , Summer and Autumn 2020, , Pages 119-140

http://dx.doi.org/10.22108/jcs.2021.124660.1056

Abstract
  The surrounding context information of business processes is unpredictable and dynamically changing over time. Therefore, they should dynamically adapt themselves to different changes ...  Read More
AUBUE: An Adaptive User-Interface Based on Users' Emotions
72. AUBUE: An Adaptive User-Interface Based on Users' Emotions

Fariba Noori; Mohammad Kazemifard

Volume 3, Issue 2 , Winter and Spring 2016, , Pages 127-145

Abstract
  This paper is an attempt to introduce AUBUE - Adaptive User-Interface Based on Users' Emotions- in which users' emotions are detected through the users` interactions with the keyboard; ...  Read More
A New Implementation for a 2^n-1 Modular Adder Through Carbon Nanotube Field Effect Transistors
73. A New Implementation for a 2^n-1 Modular Adder Through Carbon Nanotube Field Effect Transistors

Seyyed Ashkan Ebrahimi; Mohammad Reza Reshadinezhad

Volume 2, Issue 2 , Winter and Spring 2015, , Pages 129-139

Abstract
  The modulo 2^n ± 1 are the most applied modulo set in residue number system (RNS). The modulo adder 2^n-1 is very important due to its variety of applications in DSP, like addition/subtraction ...  Read More
Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem
74. Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem

Pendar Alirezazadeh; Abdolhossein Fathi; Fardin Abdali-Mohammadi

Volume 3, Issue 3 , Summer and Autumn 2016, , Pages 183-191

Abstract
  Recently, researchers have shown an increased interest in kinship verification via facial images in the field of computer vision. The matter of fact is that kinship verification is ...  Read More
Toward automatic Transformation of Service Choreography into UML State Machine
75. Toward automatic Transformation of Service Choreography into UML State Machine

Yousef Rastegari; Fereidoon Shams

Volume 2, Issue 3 , Summer and Autumn 2015, , Pages 209-222

Abstract
  An adaptive process consists of dynamic elements, and management rules which govern their run-time behaviors. The WS-CDL describes collaborative business processes between service consumers ...  Read More