HH-FRBC: Halving Hierarchical Fuzzy Rule-Based Classifier
76. HH-FRBC: Halving Hierarchical Fuzzy Rule-Based Classifier

Azam Amouzadi; Abdolreza Mirzaei

Volume 1, Issue 3 , Summer and Autumn 2014, , Pages 215-224

Abstract
  The main objective of this article is to improve the accuracy of Mamdani fuzzy rule-based classification systems. Although these systems tend to perform successfully with respect to ...  Read More
Persian Texts Part of Speech Tagging Using Artificial Neural Networks
77. Persian Texts Part of Speech Tagging Using Artificial Neural Networks

Zahra Hosseini Pozveh; Amirhassan Monadjemi; Ali Ahmadi

Volume 3, Issue 4 , Summer and Autumn 2016, , Pages 233-241

Abstract
  Part of speech tagging (POS) is a basic task in natural language processing applications such as morphological parsing, information retrieval, machine translation and question answering. ...  Read More
Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method
78. Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method

Mohammad Amini; Jalal Rezaeenour; Esmaeil Hadavandi

Volume 1, Issue 4 , Summer and Autumn 2014, , Pages 293-305

Abstract
  Data mining techniques are widely used for intrusion detection since they have the capability of automation and improving the performance. However, using a single classification technique ...  Read More
Simulating the Resource Freeing Attack: Using Cloudsim Simulator
79. Simulating the Resource Freeing Attack: Using Cloudsim Simulator

Shakiba Nayebalsadr; Morteza Analoui

Volume 2, Issue 4 , Summer and Autumn 2015, , Pages 293-302

Abstract
  Virtualization is a technique to make the cloud computations secure. This technique can reduce the costs and increase the reliability of systems by means of sharing the physical resources ...  Read More
A Growing Hierarchical Approach to Batch Linear Manifold Topographic Map Formation
80. A Growing Hierarchical Approach to Batch Linear Manifold Topographic Map Formation

Peyman Adibi

Volume 1, Issue 1 , Winter and Spring 2014, , Pages 47-59

Abstract
  The linear manifold topographic map (LMTM) is a model for unsupervised learning of multiple low-dimensional linear manifolds from a set of data samples in a topology-preserving map. ...  Read More
Change Impact Analysis by Concept Propagation
81. Change Impact Analysis by Concept Propagation

Zeinab mahzoon; Omid Bushehrian

Volume 5, Issue 1 , Winter and Spring 2018, , Pages 51-56

http://dx.doi.org/10.22108/jcs.2019.111708.1007

Abstract
  Software maintenance is an important phase of the software life cycle. An important task in this phase is to locate code fragments affected by user change requests. However, performing ...  Read More
Enhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality
82. Enhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality

Yoones A Sekhavat; Hosein Zarei

Volume 3, Issue 1 , Winter and Spring 2016, , Pages 53-62

Abstract
  Augmented Reality (AR) has introduced new forms of interaction and presentation in mobile applications. Mobile games have also taken the advantages of this technology to implement novel ...  Read More
Improving Face Recognition Systems Security Using Local Binary Patterns
83. Improving Face Recognition Systems Security Using Local Binary Patterns

Abdolhossein Fathi; Fardin Abdali-Mohammadi

Volume 2, Issue 1 , Winter and Spring 2015, , Pages 55-62

Abstract
  Face recognition systems suffer from different spoofing attacks like photograph-based and video-based spoofing attacks. This paper presents a new method to empower the face recognition ...  Read More
A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO
84. A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO

Azam Davahli; mahboubeh shamsi; Golnoush Abaei

Volume 7, Issue 1 , Winter and Spring 2020, , Pages 63-79

http://dx.doi.org/10.22108/jcs.2020.119468.1033

Abstract
  As a result of an incredibly fast growth of the number and diversity of smart devices connectable to the internet, commonly through open wireless sensor networks (WSNs) in internet ...  Read More
Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier
85. Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier

Amir Hossein Rasekh; Mohammad Hadi Sadreddini; Seyed Mostafa Fakhrahmad

Volume 1, Issue 2 , Winter and Spring 2014, , Pages 123-132

Abstract
  Machine translation is considered as a branch of machine intelligence with about fifty years background. Ambiguity of language is the most problematic issue in machine translation systems, ...  Read More
Training-Free Object Matching and Retrieval Using Speeded Up Robust Features
86. Training-Free Object Matching and Retrieval Using Speeded Up Robust Features

Reza Nasiripour; Hassan Farsi; Sajad Mohamadzadeh

Volume 2, Issue 2 , Winter and Spring 2015, , Pages 141-153

Abstract
  Traditionally, object retrieval methods require a set of images of a specific object for training. In this paper, we propose a new object retrieval method using a single query image, ...  Read More
A New Scheme for Storage and Retrieval of Shared Text Files
87. A New Scheme for Storage and Retrieval of Shared Text Files

Hussein Shirvani; Hamed Vahdat-Nejad

Volume 2, Issue 3 , Summer and Autumn 2015, , Pages 223-231

Abstract
  Recently, there has been an increasing need for storage spaces in the cloud centers. Efficient techniques for storing files can slow down this trend. In this paper, we investigate the ...  Read More
Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features
88. Semantic Segmentation of Aerial Images Using Fusion of Color and Texture Features

Mahdie Rezaeian; Rasoul Amirfattahi; Saeid Sadri

Volume 1, Issue 3 , Summer and Autumn 2014, , Pages 225-238

Abstract
  This paper presents a semantic method for aerial image segmentation. Multi-class aerial images are often featured with large intra-class variations and inter-class similarities. Furthermore, ...  Read More
A more Accurate Clustering Method by using Co-author Social Networks for Author Name Disambiguation
89. A more Accurate Clustering Method by using Co-author Social Networks for Author Name Disambiguation

Mohammad Hossein Nadimi; Mostafa Mosakhani

Volume 1, Issue 4 , Summer and Autumn 2014, , Pages 307-317

Abstract
  Digital libraries may keep millions of citation records and bibliographic attributes such as title, authors' names, and the place of publication. Since the materials and contents in ...  Read More
An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound
90. An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound

Touraj Shabanian; Massoud Reza Hashemi; Ahmad Askarian; Behnaz Omoomi

Volume 1, Issue 1 , Winter and Spring 2014, , Pages 61-71

Abstract
  Routing methods for optimal distribution of traffic in data networks that can also provide quality of service (QoS) for users is one of the challenges in recent years' research on next ...  Read More
A Study on Intelligent Authorship Methods in Persian Language
91. A Study on Intelligent Authorship Methods in Persian Language

Zeinab Farahmandpour; Hooman Nikmehr

Volume 2, Issue 1 , Winter and Spring 2015, , Pages 63-76

Abstract
  Author identification is an attempt to demonstrate the characteristics of the author of a piece of language information so that in the end, it would be possible to significantly distinguish ...  Read More
Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET
92. Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET

Maryam Zarezadeh; Mohammad Ali Doostari; Seyyed Hamid Haj Seyyed Javadi

Volume 3, Issue 1 , Winter and Spring 2016, , Pages 63-72

Abstract
  Considering the dynamic and wireless topology of the mobile ad hoc networks (MANETs), the implementation of security in such networks is an important problem. Key revocation is a solution ...  Read More
Mining Association Rules from Semantic Web Data without User Intervention
93. Mining Association Rules from Semantic Web Data without User Intervention

Reza Ramezani; Mohammad Ali Nematbakhsh; Mohamad Saraee

Volume 7, Issue 1 , Winter and Spring 2020, , Pages 81-94

http://dx.doi.org/10.22108/jcs.2020.121763.1046

Abstract
  With the introduction and standardization of the semantic web as the third generation of the web, this technology has attracted and received more human attention than ever. Thus, the ...  Read More
MRAR: Mining Multi-Relation Association Rules
94. MRAR: Mining Multi-Relation Association Rules

Reza Ramezani; Mohamad Saraee; Mohammad Ali Nematbakhsh

Volume 1, Issue 2 , Winter and Spring 2014, , Pages 133-158

Abstract
  In this paper, we introduce a new class of association rules (ARs) named"Multi-Relation Association Rules" which in contrast to primitive ARs (thatare usually extracted from multi-relational ...  Read More
A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments
95. A Novel Grammar-Based Approach to Atrial Fibrillation Arrhythmia Detection for Pervasive Healthcare Environments

Hanieh Lobabi-Mirghavami; Fardin Abdali-Mohammadi; Abdolhossein Fathi

Volume 2, Issue 2 , Winter and Spring 2015, , Pages 155-163

Abstract
  Today, pervasive systems have become an inseparable part of computer science and engineering. These systems provide automated connection with remote access and seamless transmission ...  Read More
New Functions for Mass Calculation in Gravitational Search Algorithm
96. New Functions for Mass Calculation in Gravitational Search Algorithm

Sepehr Ebrahimi Mood; Esmat Rashedi; Mohammad Masoud Javidi

Volume 2, Issue 3 , Summer and Autumn 2015, , Pages 233-246

Abstract
  Nowadays, optimization problems are large-scale and complicated, so heuristic optimization algorithms have become common for solving them. Gravitational Search Algorithm (GSA) is one ...  Read More
A Sample-Based Approach to Data Quality Assessment in Spatial Databases with Application to Mobile Trajectory Nearest-Neighbor Search
97. A Sample-Based Approach to Data Quality Assessment in Spatial Databases with Application to Mobile Trajectory Nearest-Neighbor Search

Bagher Saberi; Nasser Ghadiri

Volume 1, Issue 3 , Summer and Autumn 2014, , Pages 239-249

Abstract
  Spatial data is playing an emerging role in new technologies such as web and mobile mapping and Geographic Information Systems (GIS). Important decisions in political, social and many ...  Read More
A Novel Solution for Author Attribution Problem in Anonymous E-mail
98. A Novel Solution for Author Attribution Problem in Anonymous E-mail

Farahnaz Rezaeian Zadeh; Shohreh Ajoudanian

Volume 1, Issue 4 , Summer and Autumn 2014, , Pages 319-327

Abstract
  Due to increasing criminal activities by anonymous E-mails in the cyber world, it is a challenging task to extract beneficial knowledge from E-mail systems. This problem in cyber world ...  Read More
Solution of the Generalized Interval Linear Programming Problems: Pessimistic and Optimistic Approaches
99. Solution of the Generalized Interval Linear Programming Problems: Pessimistic and Optimistic Approaches

Mehdi Ghatee

Volume 1, Issue 2 , Winter and Spring 2014, , Pages 159-167

Abstract
  This paper deals with linear programming problem with interval numbers as coefficients to exhibit with uncertainty. Since, the set of common intervals is not a field, we define generalized ...  Read More
Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m)
100. Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m)

Hashem Rezaei; Alireza Shafieinejad

Volume 8, Issue 1 , Winter and Spring 2021, , Pages 1-18

http://dx.doi.org/10.22108/jcs.2021.123698.1051

Abstract
  Elliptic curve cryptography (ECC) is one of the most popular public key systems in recent years due to its both high security and low resource consumption. Thus, ECC is more appropriate ...  Read More