6th International Symposium ; 2 · 6thInternationalSymposium on Telecommunications (1ST2012)...

13
6th International Symposium on Telecommunications (1ST 2012) Tehran, Iran 6-8 November 2012 Pages 607-1214 IC CC IEEE Catalog Number: CFP1209F-PRT -1-1_ ISBN: 978-1-4673-2072-6 2/2

Transcript of 6th International Symposium ; 2 · 6thInternationalSymposium on Telecommunications (1ST2012)...

Page 1: 6th International Symposium ; 2 · 6thInternationalSymposium on Telecommunications (1ST2012) Tehran,Iran 6-8November2012 Pages607-1214 ICCC IEEECatalogNumber: CFP1209F-PRT-1-1_ ISBN:

6th International Symposium on

Telecommunications

(1ST 2012)

Tehran, Iran

6-8 November 2012

Pages 607-1214

ICCC IEEE Catalog Number: CFP1209F-PRT-1-1_ ISBN: 978-1-4673-2072-6

2/2

Page 2: 6th International Symposium ; 2 · 6thInternationalSymposium on Telecommunications (1ST2012) Tehran,Iran 6-8November2012 Pages607-1214 ICCC IEEECatalogNumber: CFP1209F-PRT-1-1_ ISBN:

Distributed Estimation Over an Adaptive Diffusion Network Based on the Family of

Affine Projection Algorithms

607

Mohammad Shams Esfandabadi, Zahra Saffari

Dynamic Multichannel Interval Adjustment for WAVE Architecture

612

Ahad Akbarifar, Jamshid Bagherzadeh, Saleh Yousefi

Offline and Online Broadcast Scheduling Algorithms for File Broadcast in Mobile

WiMAX

615

Hamid Karimi, Saleh Yousefi, Maghsud Solimanpur, Raman Khenanisho

On the Better Performance ofADMR versus ODMRP

621

Shahin Mahdizadeh Aghdam, Mohammad Khansari

RLHOR: Reliability-Aware Location and History Based Opportunistic Routing

626Marzieh Barootkar, Akbar Ghaffarpour Rahbar

Combination of Standard Sliding Mode control and Second Order Sliding Mode

Control for Congestion Control of Differentiated Services Networks

632Roohollah Barzamini, Masoud Shafiee

A Distributed Locality-aware Neighbor Selection Algorithm for P2P Video Streamingover Wireless Mesh Networks

639Faranak Moayeri, Behzad Akbari, Mohammad Khansari, Behnam Ahmadifar

On Optimal Topology in Hierarchical P2P Live Video Streaming Networks

644Hamed Azarpira, Saleh Yousefi

Page 3: 6th International Symposium ; 2 · 6thInternationalSymposium on Telecommunications (1ST2012) Tehran,Iran 6-8November2012 Pages607-1214 ICCC IEEECatalogNumber: CFP1209F-PRT-1-1_ ISBN:

Locality Aware P2P Overlay Architecture for Live Video Streaming

650

Navid Bayat, Behzad Akbari, Hamidreza Rabiee, Mostafa Salehi

EECA: Energy Efficient Congestion Avoidance in Wireless Multimedia Sensor Network

656

Shahin Mahdizadeh Aghdam, Vahid Heydari, Mohammad Khansari

Adjustment Algorithm for Tunable Parameters in IEEE 802.11based on Quality of

Service

662

Maryam Heidari Moheb

On the Transmission of a Laplacian Source over an AWLN Channel with Bandwidth

Compression

669

Fariba Abbasi, AH Aghagolzadeh, Hamid Behroozi

Providing QoS Guarantee of Timeliness in Wireless Sensor Networks With a New

Routing Methodology

,

674

Omid Tavallaie, Hamid RezaNaji,Masoud Sabaei, Narges Arastouie

Energy-Efficient Flow Control in Wireless Mesh Networks

680

Tahmineh Mirzaei Solhi, Abdorasoul Ghasemi

On the Providing Signal Coverage for a Dense Map of Receivers in Indoor Environment

Using Integrating Ray Tracing - Genetic Algorithm

686Zeinab Talepour, Javad Ahmadi shokouh, Saeed Tavakoli

HCTT&R: A complete Scheme For Object Tracking And Recovery Of Lost Objects InCluster-Based Wireless Sensor Networks

691Behrouz Mahmoudzadeh, Karim Faez

Sensor Selection and Configuration in Visual Sensor Networks

697

Mojtaba Hoseini, Mehdi Dehghan, Hossien Pedram

Probability base Hop Selection Approach for Resource Control in Wireless SensorNetwork

., 703

Nazbanoo Farzaneh, Mohammad Hosein Yaghmaee Moghadam

Improving EEQR Algorithm in Wireless Sensor Networks

••, 709

Shohreh Ahvar, Mehdi Mahdavi, Ehsan Ahvar

Page 4: 6th International Symposium ; 2 · 6thInternationalSymposium on Telecommunications (1ST2012) Tehran,Iran 6-8November2012 Pages607-1214 ICCC IEEECatalogNumber: CFP1209F-PRT-1-1_ ISBN:

A New Queuing Management Mechanism for Congestion Performance Improvement in

Wireless Multimedia Sensor Networks

715

Omid Boroumand,Mahmood Kalemati, Maghsoud Abbaspour

Design and Implementation of a Shared Memory Switch Fabric

721

Mina Ejlali, Hossein Saidi, Mohammad Ali Montazeri, Ali Ghiasian

Switching Characteristics of SOA-based Sagnac Interferometer for Subpico second

Pulses

728

Morteza Jamali, Vahid Ahmadi, Mohammad Razaghi

Decrease Round-Trip Time in Reno TCP

733

Ehsan Kharati

Buffer Management For Self-Similar Network Traffic

737

Farnaz Amin, Kiarash Mizanian

Life Time Maximization for Connected Target Coverage in Wireless Sensor Networks

with Sink Mobility

743

Ehsan Saradar Torshizi, Saleh Yousefi, Jamshid Bagherzadeh

Data Centric Storage with Geographic Hash Table for Wireless Sensor Networks UsingResidue Number Systems

749

Montajab Ghanem, Masoud Sabaie

A novel CAC algorithm based on bandwidth degradation for more efficient provision of

the requirements of multimedia applications

754

Maryam Monemian, Pejman khadivi

Constraint-based Path selection algorithms for Minimizing Blockage in Multi Domain

Networks

760

Fatemeh Banaie, Mohammad Hosem Yaghmaee Moghadam, Nazbanoo Farzaneh

Page 5: 6th International Symposium ; 2 · 6thInternationalSymposium on Telecommunications (1ST2012) Tehran,Iran 6-8November2012 Pages607-1214 ICCC IEEECatalogNumber: CFP1209F-PRT-1-1_ ISBN:

Using Data Envelopment Analysis for Base Station Selection in Heterogeneous Wireless

Access Networks

766

S. Mojtaba Matinkhah, Siavash Khorsandi

Replica Placement Algorithms in Hybrid CDN-P2P Architectures

771

Fatemeh Keymasi Khalaji, Morteza Analoui

DEED: Dynamic Energy Efficient Distributed Cluster Forming Algorithm for Wireless

Sensors Network

776

Muhammad Amin Araghizadeh,Nasser Yazdani, Saeed Safari, Ali Reza Hedayati

A Blocking Probability Reduction Method in Path Computation Schemes for Inter

Domain Networks

782

Fatemeh Banaie, Mohammad Hosein YaghmaeeMoghadam, Nazbanoo Farzaneh

Information Technology

Efficient Optical Character Recognition on Graphics Processing Unit

789

Ehsan Arianyan, Seyed Ahmad Motamedi, Iman Arianyan

Text Detection and character Extraction in color images Using FFT domain Filteringand SVM classification

794

Mohammad Khodadadi Azadboni, Alireza Behrad

An effective method in text detection and characters recognition using fuzzy theory

800

Zeinab Akhbari, Najme Maleki, Samaneh Zamani, Mohammad-Hosein Yaghmaei-Moghaddam

Texture-Orientation Based Vanishing Point Detection Using Genetic Algorithm

806

MohammadHossein Barat, Saeid Saryazdi, Alireza Morsali, Hossein Nezamabadi-pour

Page 6: 6th International Symposium ; 2 · 6thInternationalSymposium on Telecommunications (1ST2012) Tehran,Iran 6-8November2012 Pages607-1214 ICCC IEEECatalogNumber: CFP1209F-PRT-1-1_ ISBN:

The Impact of Reference Normalization on AutomaticMT Evaluation

811

MohammadReza Mirsarraf, Nazanin Dehghani, Kiyana Zolfaghar, Peyman Abolghasemi

Document and Sentence Alignment in Comparable Corpora Using Bipartite GraphMatching

817

Zeinab Rahimi, Kaveh Taghipour, Shahram Khadivi, Nasim Afhami

A Pool-based Active Learning Method for Improving Farsi-English Machine

Translation System

822

Somayeh Bakhshaei, Shahram Khadivi

Active Learning of EHVS Parser for Persian Language Understanding

827

Mohammad Amin Tajgardoon, Fattaneh Jabbari, Hossein Sameti, Sara Bahaadini

Video Quality of Experience Evaluation based on Content-Aware Packet Loss Effect

Analysis

833

Amir Hossein Mandegar, Behzad Akbari, Mohammad Reza Heidari

EXPLOITING MULTIVIEW PROPERTIES IN SEMI-SUPERVISED VIDEO

CLASSIFICATION

837

Mahmood Karimian, Mostafa Tavassolipour, Shohreh Kasaei

Speech Enhancement Using Adaptive MMSE Estimator Under Signal Presence

Uncertainty and Laplacian Prior

843Mehdi Rashidi-Nejad, Hamid Reza Abutalebi

Binaural Speech Separation Based on the Time-Frequency Binary Mask

848

A. Mahmoodzadeh, H. R. Abutalebi, H. Soltanian-Zadeh, H. Sheikhzadeh

Influence Maximization in Independent Cascade Model with Positive and NegativeWord of Mouth

854

Ali Nazemian, Fattaneh Taghiyareh

A New Cat Swarm Optimization based Algorithm for Reliability-Oriented Task

Allocation in Distributed Systems

861

Reza Shojaee, Hamid Reza Faragardi, Sara Alaee, Nasser Yazdani

Page 7: 6th International Symposium ; 2 · 6thInternationalSymposium on Telecommunications (1ST2012) Tehran,Iran 6-8November2012 Pages607-1214 ICCC IEEECatalogNumber: CFP1209F-PRT-1-1_ ISBN:

An Application of the CORER Classifier on Customer Churn Prediction

867

Javad Basiri, Fattaneh Taghiyareh

Application of Nonnegative Matrix Factorization in Recommender Systems

873

Mehdi Hosseinzadeh Aghdam, Morteza Analoui, Peyman Kabiri

Emergent Holonic Organization by Stigmergy

877

Fariba Eftekhari, Naser Mozayani

Minimum Mean Square Error Estimation of Speech Spectral Amplitude Using Super-Gaussian Priors

882

Mahbube Kargariyan Marvasti, Hamid Reza Abutalebi

GSAED a new approach for digital image edge detection

887

Faterneh Deregeh, Hossein Nezamabadi-pour

Behavior Recognition and Anomaly Behavior Detection Using Clustering

892

A. Feizi, A. Aghagolzadeh, H. Seyedarabi

Progressive Sparse Image Sensing using Iterative Methods

897

Masoumeh Azghani, Farrokh Marvasti

Accurate Labeling of Time-Frequency Units in Monaural Voiced Speech Segregation

902

Sanam Imani Shamlou, Masoud Geravanchizadeh

Combination of Nested Microphone Array and Subband Processing for MultipleSimultaneous Speaker Localization

907

Ali Dehghan Firoozabadi, Hamid Reza Abutalebi

Towards Improving Enterprise Performance with Service Level Agreements

913

Abbass Asosheh, Parvaneh Hajinazari

Page 8: 6th International Symposium ; 2 · 6thInternationalSymposium on Telecommunications (1ST2012) Tehran,Iran 6-8November2012 Pages607-1214 ICCC IEEECatalogNumber: CFP1209F-PRT-1-1_ ISBN:

Distributed RDFS Knowledge-based System Update in Case of Deletions

919

Hamid 01iaei,Mahmoud Naghibzadeh

A Context-Aware Mobile Learning Model for Web-Based Learning Environments

924

Hana Sadat Fahim-Hashemi, Fatemeh Orooji, Fattaneh Taghiyareh

A Greedy Approach for Service Composition

929

Milad Torkashvan, Hassan Haghighi

A Method For Implementing Semantic Search On Relational Databases

936

Amir Harati Alamdari, Omid Bushehrian

Security Issues in ICT

A Novel Hybrid Anomaly Based Intrusion Detection Method

942

Kazem Qazanfari, Minoo Sadat Mirpouryan, Hossein Gharaee

Proposing a light weight semi-distributed IDS for mobile ad-hoc network based on

nodes' mode

948

Meism Yadollahzadeh Tabari, Ali Pouyan, Hamid Hassanpour, Saman Saleki

A Comprehensive Network Intrusion Detection and Prevention System Architecture

954

Minoo Sadat Mirpuryan, Tina Tavizi, Hossein Gharaee

A comprehensive Design for Decision Engine in Network Intrusion Detection and

Prevention System

959

Amir Reza Karbaschian, Minoo Sadat Mirpuryan, Tina Tavizi

Anomaly detection based on an enhanced projection distance

965

Shima Asgharian Jouibari, Saeed Jalili, Mohammad Rahmanimanesh

Page 9: 6th International Symposium ; 2 · 6thInternationalSymposium on Telecommunications (1ST2012) Tehran,Iran 6-8November2012 Pages607-1214 ICCC IEEECatalogNumber: CFP1209F-PRT-1-1_ ISBN:

Universal JPEG Steganalysis Based on Special Frequency Regions from Wavelet

Transform

971

Leila Omrani, Karim Faez

4 A Semi-Fragile Lossless Data Hiding Scheme Based on Multi-level Histogram Shift in

Image Integer Wavelet Transform Domain

976

M. A. Alavianmehr, Mehdi Rezaei, M. S. Helforush, A.Tashk

Improved pair-wise LSB matching steganography with a new evaluating system

982

Mahdi Khosravi, Simin Soleymanpour-Moghaddam, Maryam Mahyabadi

JPEG Image Steganalysis Using Block Based Optimal Wavelet Packet Decomposition

987

Leila Omrani, Karim Faez

Ontology-based Modeling ofDDoS Attacks for Attack Plan Detection

993

Morteza Ansarinia, Seyyed Amir Asghari, Afshin Souzani, Ahmadreza Ghaznavi

Automatic Learning of Attack Behavior Patterns Using Bayesian Networks

999

Fatemeh Kavousi, Behzad Akbari

Real-Time Botnet Command and Control Characterization at the Host Level

1005Farhood Farid Etemad, Payam Vahdani

Frequent Item set mining-based Alert Correlation for Extracting multi-stage Attack

Scenarios

1010

Samira Lagziyan, Fatemeh Amiri, AliReza Enayati, Hossien Gharaee

A Lower Capacity Bound of Secure End to End Data Transmission via GSM Network

1015

R. Kazemi, R. Mosayebi, S. M. Etemadi, M. Boloursaz, F. Behnia

Secure Data Communication through GSM Adaptive Multi Rate Voice Channel

1021

M. Boloursaz, A. H. Hadavi, R. Kazemi, F. Behnia

Page 10: 6th International Symposium ; 2 · 6thInternationalSymposium on Telecommunications (1ST2012) Tehran,Iran 6-8November2012 Pages607-1214 ICCC IEEECatalogNumber: CFP1209F-PRT-1-1_ ISBN:

Opportunistic Transmission of Secret Data Through Randomized Parallel Subcarriers

1027Mona Hajimomeni, Hasan Aghaeinia

DSBS: A Novel Dependable Secure Broadcast Stream over Lossy and Non-SynchronizedChannels

1033Jamshid Mohasefi, Hassan Nasiraee, Mohammad Nasiraee

VoIP Anomaly Detection by Combining OCSVM and PSO Algorithm

1038

Mahboobeh Shakeri Miandare, Saeed Jalili

A Dynamic Chaotic Hash Function Based upon Circle Chord Methods

1044

Mahdi Nouri, Ali Khezeli, Alireza Ramezani, Azita Ebrahimi

Cryptanalysis of the Reduced-Round Version of JH

1050

Saeid Nourizadeh, Mojtaba Javanmardi, Babak Sadeghiyan

Automated Formal Analysis of NetConf Protocol for Authentication Properties

1055

Farnaz Izadi, Hadi Shahriar Shahhoseini

Formal Security Analysis of Authentication in SNMPv3 Protocol by An Automated Tool

1060

Sepideh Asadi, Hadi Shahriar Shahhoseini

A Comprehensive Semi-Automated Incident Handling Workflow

1065

Sayed Hadi Hashemi, Mohammad Babaeizadeh, Mohsen Nowruzi, Hossein Hadian

Jazi,Mohammad Shahmoradi, Elaheh Biglar Beigi Samani

A Comprehensive Classification of Incident Handling Information

1071

Mohsen Nowruzi, Mojtaba Dehghan, Hossein Hadian Jazi, Mohammad Shahmoradi, SayedHadi Hashemi, Mohammad Babaeizadeh

A New DCT Based Scalable Distributed Fraud Detection Architecture

1076

Azadeh Namiranian, Mahmoud Reza Haashemi

Page 11: 6th International Symposium ; 2 · 6thInternationalSymposium on Telecommunications (1ST2012) Tehran,Iran 6-8November2012 Pages607-1214 ICCC IEEECatalogNumber: CFP1209F-PRT-1-1_ ISBN:

An Efficient Data Enrichment Scheme for Fraud Detection Using Social Network

Analysis

1082

Soheil Jamshidi, Mahmoud Reza Hashemi

FUZZGY: A Hybrid Model for Credit Card Fraud Detection

1088

Mohammad Reza HaratiNik, Mahdi Akrami, Shahram Khadivi, Mahdi Shajari

An Attack Graph Based Metric for Security Evaluation of Computer Networks

1094

Marjan Keramati, Ahmad Akbari

Using Security Metrics in Software Quality Assurance Process

1099

Athena Abdi, Afshin Souzani, Maliheh Amirfakhri, Azadeh Bamdad Moghaddam

Alleviating Controversiality Problem in Trust Estimation

1103

Mohsen Mohkami, Hassan Shakeri

Opinion Mining and Opinion Spam (A Literature Review Focusing on Product Reviews)

1109

Amir Arab Sheibani

Identity-based Signatures from Lattices

1114

Mohammad Zaheri, Babak Sadeghian

Elimination of Alignment Stage in Feature Extraction for a Slepian-Wolf FingerprintBiometric System

1119

S. Marouzi, G. Abed.Hodtani

A Mechanism-Based QoS and Security Requirements Consideration for MANETs QoS

Routing

1123

Shahrzad Sedaghat, Fazlollah Adibniya, Vali Derhami

A Generalization-Based Approach for Personalized Privacy Preservation in TrajectoryData Publishing

1129

Elahe Ghasemi Komishani, Mahdi Abadi

Page 12: 6th International Symposium ; 2 · 6thInternationalSymposium on Telecommunications (1ST2012) Tehran,Iran 6-8November2012 Pages607-1214 ICCC IEEECatalogNumber: CFP1209F-PRT-1-1_ ISBN:

Conceptual Authentication Speech Hashing base Upon Hypotrochoid Graph

1136Mahdi Nouri, Nooshin Farhangian, Zahra Zeinolabedini, Mahyar Safarinia

Low Rate DOS Traceback Based On Sum of Flows

1142

Mohammad Hamedi Hamzehkolaie, Mohammad Javad Shamani, M. B. Ghaznavi -

Ghoushchi

A new ROI extraction method for FKP images using global intensity

1147Nafiseh S.Moosavi Ehteshami, Mahmoud Tabandeh, Emad Fatemizadeh

Computation & Decision- Making Aspects

Semi-supervised Metric Learning Using Composite Kernel

1151

T. Zare, M. T. Sadeghi, H. R. Abutalebi

Unmixing of Hyperspectral Data Using Robust Statistics-based NMF

1157Roozbeh Rajabi, Hassan Ghassemian

A Gradient Descent based similarity refinement method for CBIR systems

1161

Esmat Rashedi, Hossein Nezamabadi-pour, Saeid Saryazdi

An Enhanced Significance Weighting Approach for Collaborative Filtering

1165Mohsen Raeesi, Mehdi Shajari

Face Recognition: A Sparse Representation-based Classification Using IndependentComponent Analysis

1170Mirhossein Mousavi Karimi, Hamid Soltanian-Zadeh

Face Verification Using Sparse Representation Techniques

1175Y. Amidi, M.T. Sadeghi

Page 13: 6th International Symposium ; 2 · 6thInternationalSymposium on Telecommunications (1ST2012) Tehran,Iran 6-8November2012 Pages607-1214 ICCC IEEECatalogNumber: CFP1209F-PRT-1-1_ ISBN:

3D Human Action Recognition Using Gaussian Processes Dynamical Models

1179

Hamed Jamalifar, Vahid Ghadakchi, Shohreh Kasaei

Remote Sensing Image Fusion Using Combining IHS and Curvelet Transform

1184

Seyed Abolfazl Valizadeh, Hassan Ghassemian

Effective Web Service Composition using Particle Swarm Optimization Algorithm

1190

Mahmood Allameh Amiri,Hadi Serajzadeh

Knowledge Map as a Decision Support Tool for Expert Finding in Research-based

Organizations

1195

Rizan Moradi ,Neda Eghbali ,Nafiseh Torkzade Mahani ,Ehraz Ketabchi ,Maryam S. Mirian

A Multi Context Dynamic Test Bed for Simulating Real World Constraints in Agents'Teamwork

1201

Sajjad Salehi,Fattaneh Taghiyareh,Mohammad Taghi Saffar,Kambiz Badie

Persica: A Persian corpus for multi-purpose text mining and Natural language-processing

1207

Hamid Eghbalzadeh,Behrooz Hosseini, Shahram Khadivi, Ali Khodabakhsh