6th International Symposium ; 2 · 6thInternationalSymposium on Telecommunications (1ST2012)...
Transcript of 6th International Symposium ; 2 · 6thInternationalSymposium on Telecommunications (1ST2012)...
6th International Symposium on
Telecommunications
(1ST 2012)
Tehran, Iran
6-8 November 2012
Pages 607-1214
ICCC IEEE Catalog Number: CFP1209F-PRT-1-1_ ISBN: 978-1-4673-2072-6
2/2
Distributed Estimation Over an Adaptive Diffusion Network Based on the Family of
Affine Projection Algorithms
607
Mohammad Shams Esfandabadi, Zahra Saffari
Dynamic Multichannel Interval Adjustment for WAVE Architecture
612
Ahad Akbarifar, Jamshid Bagherzadeh, Saleh Yousefi
Offline and Online Broadcast Scheduling Algorithms for File Broadcast in Mobile
WiMAX
615
Hamid Karimi, Saleh Yousefi, Maghsud Solimanpur, Raman Khenanisho
On the Better Performance ofADMR versus ODMRP
621
Shahin Mahdizadeh Aghdam, Mohammad Khansari
RLHOR: Reliability-Aware Location and History Based Opportunistic Routing
626Marzieh Barootkar, Akbar Ghaffarpour Rahbar
Combination of Standard Sliding Mode control and Second Order Sliding Mode
Control for Congestion Control of Differentiated Services Networks
632Roohollah Barzamini, Masoud Shafiee
A Distributed Locality-aware Neighbor Selection Algorithm for P2P Video Streamingover Wireless Mesh Networks
639Faranak Moayeri, Behzad Akbari, Mohammad Khansari, Behnam Ahmadifar
On Optimal Topology in Hierarchical P2P Live Video Streaming Networks
644Hamed Azarpira, Saleh Yousefi
Locality Aware P2P Overlay Architecture for Live Video Streaming
650
Navid Bayat, Behzad Akbari, Hamidreza Rabiee, Mostafa Salehi
EECA: Energy Efficient Congestion Avoidance in Wireless Multimedia Sensor Network
656
Shahin Mahdizadeh Aghdam, Vahid Heydari, Mohammad Khansari
Adjustment Algorithm for Tunable Parameters in IEEE 802.11based on Quality of
Service
662
Maryam Heidari Moheb
On the Transmission of a Laplacian Source over an AWLN Channel with Bandwidth
Compression
669
Fariba Abbasi, AH Aghagolzadeh, Hamid Behroozi
Providing QoS Guarantee of Timeliness in Wireless Sensor Networks With a New
Routing Methodology
,
674
Omid Tavallaie, Hamid RezaNaji,Masoud Sabaei, Narges Arastouie
Energy-Efficient Flow Control in Wireless Mesh Networks
680
Tahmineh Mirzaei Solhi, Abdorasoul Ghasemi
On the Providing Signal Coverage for a Dense Map of Receivers in Indoor Environment
Using Integrating Ray Tracing - Genetic Algorithm
686Zeinab Talepour, Javad Ahmadi shokouh, Saeed Tavakoli
HCTT&R: A complete Scheme For Object Tracking And Recovery Of Lost Objects InCluster-Based Wireless Sensor Networks
691Behrouz Mahmoudzadeh, Karim Faez
Sensor Selection and Configuration in Visual Sensor Networks
697
Mojtaba Hoseini, Mehdi Dehghan, Hossien Pedram
Probability base Hop Selection Approach for Resource Control in Wireless SensorNetwork
., 703
Nazbanoo Farzaneh, Mohammad Hosein Yaghmaee Moghadam
Improving EEQR Algorithm in Wireless Sensor Networks
••, 709
Shohreh Ahvar, Mehdi Mahdavi, Ehsan Ahvar
A New Queuing Management Mechanism for Congestion Performance Improvement in
Wireless Multimedia Sensor Networks
715
Omid Boroumand,Mahmood Kalemati, Maghsoud Abbaspour
Design and Implementation of a Shared Memory Switch Fabric
721
Mina Ejlali, Hossein Saidi, Mohammad Ali Montazeri, Ali Ghiasian
Switching Characteristics of SOA-based Sagnac Interferometer for Subpico second
Pulses
728
Morteza Jamali, Vahid Ahmadi, Mohammad Razaghi
Decrease Round-Trip Time in Reno TCP
733
Ehsan Kharati
Buffer Management For Self-Similar Network Traffic
737
Farnaz Amin, Kiarash Mizanian
Life Time Maximization for Connected Target Coverage in Wireless Sensor Networks
with Sink Mobility
743
Ehsan Saradar Torshizi, Saleh Yousefi, Jamshid Bagherzadeh
Data Centric Storage with Geographic Hash Table for Wireless Sensor Networks UsingResidue Number Systems
749
Montajab Ghanem, Masoud Sabaie
A novel CAC algorithm based on bandwidth degradation for more efficient provision of
the requirements of multimedia applications
754
Maryam Monemian, Pejman khadivi
Constraint-based Path selection algorithms for Minimizing Blockage in Multi Domain
Networks
760
Fatemeh Banaie, Mohammad Hosem Yaghmaee Moghadam, Nazbanoo Farzaneh
Using Data Envelopment Analysis for Base Station Selection in Heterogeneous Wireless
Access Networks
766
S. Mojtaba Matinkhah, Siavash Khorsandi
Replica Placement Algorithms in Hybrid CDN-P2P Architectures
771
Fatemeh Keymasi Khalaji, Morteza Analoui
DEED: Dynamic Energy Efficient Distributed Cluster Forming Algorithm for Wireless
Sensors Network
776
Muhammad Amin Araghizadeh,Nasser Yazdani, Saeed Safari, Ali Reza Hedayati
A Blocking Probability Reduction Method in Path Computation Schemes for Inter
Domain Networks
782
Fatemeh Banaie, Mohammad Hosein YaghmaeeMoghadam, Nazbanoo Farzaneh
Information Technology
Efficient Optical Character Recognition on Graphics Processing Unit
789
Ehsan Arianyan, Seyed Ahmad Motamedi, Iman Arianyan
Text Detection and character Extraction in color images Using FFT domain Filteringand SVM classification
794
Mohammad Khodadadi Azadboni, Alireza Behrad
An effective method in text detection and characters recognition using fuzzy theory
800
Zeinab Akhbari, Najme Maleki, Samaneh Zamani, Mohammad-Hosein Yaghmaei-Moghaddam
Texture-Orientation Based Vanishing Point Detection Using Genetic Algorithm
806
MohammadHossein Barat, Saeid Saryazdi, Alireza Morsali, Hossein Nezamabadi-pour
The Impact of Reference Normalization on AutomaticMT Evaluation
811
MohammadReza Mirsarraf, Nazanin Dehghani, Kiyana Zolfaghar, Peyman Abolghasemi
Document and Sentence Alignment in Comparable Corpora Using Bipartite GraphMatching
817
Zeinab Rahimi, Kaveh Taghipour, Shahram Khadivi, Nasim Afhami
A Pool-based Active Learning Method for Improving Farsi-English Machine
Translation System
822
Somayeh Bakhshaei, Shahram Khadivi
Active Learning of EHVS Parser for Persian Language Understanding
827
Mohammad Amin Tajgardoon, Fattaneh Jabbari, Hossein Sameti, Sara Bahaadini
Video Quality of Experience Evaluation based on Content-Aware Packet Loss Effect
Analysis
833
Amir Hossein Mandegar, Behzad Akbari, Mohammad Reza Heidari
EXPLOITING MULTIVIEW PROPERTIES IN SEMI-SUPERVISED VIDEO
CLASSIFICATION
837
Mahmood Karimian, Mostafa Tavassolipour, Shohreh Kasaei
Speech Enhancement Using Adaptive MMSE Estimator Under Signal Presence
Uncertainty and Laplacian Prior
843Mehdi Rashidi-Nejad, Hamid Reza Abutalebi
Binaural Speech Separation Based on the Time-Frequency Binary Mask
848
A. Mahmoodzadeh, H. R. Abutalebi, H. Soltanian-Zadeh, H. Sheikhzadeh
Influence Maximization in Independent Cascade Model with Positive and NegativeWord of Mouth
854
Ali Nazemian, Fattaneh Taghiyareh
A New Cat Swarm Optimization based Algorithm for Reliability-Oriented Task
Allocation in Distributed Systems
861
Reza Shojaee, Hamid Reza Faragardi, Sara Alaee, Nasser Yazdani
An Application of the CORER Classifier on Customer Churn Prediction
867
Javad Basiri, Fattaneh Taghiyareh
Application of Nonnegative Matrix Factorization in Recommender Systems
873
Mehdi Hosseinzadeh Aghdam, Morteza Analoui, Peyman Kabiri
Emergent Holonic Organization by Stigmergy
877
Fariba Eftekhari, Naser Mozayani
Minimum Mean Square Error Estimation of Speech Spectral Amplitude Using Super-Gaussian Priors
882
Mahbube Kargariyan Marvasti, Hamid Reza Abutalebi
GSAED a new approach for digital image edge detection
887
Faterneh Deregeh, Hossein Nezamabadi-pour
Behavior Recognition and Anomaly Behavior Detection Using Clustering
892
A. Feizi, A. Aghagolzadeh, H. Seyedarabi
Progressive Sparse Image Sensing using Iterative Methods
897
Masoumeh Azghani, Farrokh Marvasti
Accurate Labeling of Time-Frequency Units in Monaural Voiced Speech Segregation
902
Sanam Imani Shamlou, Masoud Geravanchizadeh
Combination of Nested Microphone Array and Subband Processing for MultipleSimultaneous Speaker Localization
907
Ali Dehghan Firoozabadi, Hamid Reza Abutalebi
Towards Improving Enterprise Performance with Service Level Agreements
913
Abbass Asosheh, Parvaneh Hajinazari
Distributed RDFS Knowledge-based System Update in Case of Deletions
919
Hamid 01iaei,Mahmoud Naghibzadeh
A Context-Aware Mobile Learning Model for Web-Based Learning Environments
924
Hana Sadat Fahim-Hashemi, Fatemeh Orooji, Fattaneh Taghiyareh
A Greedy Approach for Service Composition
929
Milad Torkashvan, Hassan Haghighi
A Method For Implementing Semantic Search On Relational Databases
936
Amir Harati Alamdari, Omid Bushehrian
Security Issues in ICT
A Novel Hybrid Anomaly Based Intrusion Detection Method
942
Kazem Qazanfari, Minoo Sadat Mirpouryan, Hossein Gharaee
Proposing a light weight semi-distributed IDS for mobile ad-hoc network based on
nodes' mode
948
Meism Yadollahzadeh Tabari, Ali Pouyan, Hamid Hassanpour, Saman Saleki
A Comprehensive Network Intrusion Detection and Prevention System Architecture
954
Minoo Sadat Mirpuryan, Tina Tavizi, Hossein Gharaee
A comprehensive Design for Decision Engine in Network Intrusion Detection and
Prevention System
959
Amir Reza Karbaschian, Minoo Sadat Mirpuryan, Tina Tavizi
Anomaly detection based on an enhanced projection distance
965
Shima Asgharian Jouibari, Saeed Jalili, Mohammad Rahmanimanesh
Universal JPEG Steganalysis Based on Special Frequency Regions from Wavelet
Transform
971
Leila Omrani, Karim Faez
4 A Semi-Fragile Lossless Data Hiding Scheme Based on Multi-level Histogram Shift in
Image Integer Wavelet Transform Domain
976
M. A. Alavianmehr, Mehdi Rezaei, M. S. Helforush, A.Tashk
Improved pair-wise LSB matching steganography with a new evaluating system
982
Mahdi Khosravi, Simin Soleymanpour-Moghaddam, Maryam Mahyabadi
JPEG Image Steganalysis Using Block Based Optimal Wavelet Packet Decomposition
987
Leila Omrani, Karim Faez
Ontology-based Modeling ofDDoS Attacks for Attack Plan Detection
993
Morteza Ansarinia, Seyyed Amir Asghari, Afshin Souzani, Ahmadreza Ghaznavi
Automatic Learning of Attack Behavior Patterns Using Bayesian Networks
999
Fatemeh Kavousi, Behzad Akbari
Real-Time Botnet Command and Control Characterization at the Host Level
1005Farhood Farid Etemad, Payam Vahdani
Frequent Item set mining-based Alert Correlation for Extracting multi-stage Attack
Scenarios
1010
Samira Lagziyan, Fatemeh Amiri, AliReza Enayati, Hossien Gharaee
A Lower Capacity Bound of Secure End to End Data Transmission via GSM Network
1015
R. Kazemi, R. Mosayebi, S. M. Etemadi, M. Boloursaz, F. Behnia
Secure Data Communication through GSM Adaptive Multi Rate Voice Channel
1021
M. Boloursaz, A. H. Hadavi, R. Kazemi, F. Behnia
Opportunistic Transmission of Secret Data Through Randomized Parallel Subcarriers
1027Mona Hajimomeni, Hasan Aghaeinia
DSBS: A Novel Dependable Secure Broadcast Stream over Lossy and Non-SynchronizedChannels
1033Jamshid Mohasefi, Hassan Nasiraee, Mohammad Nasiraee
VoIP Anomaly Detection by Combining OCSVM and PSO Algorithm
1038
Mahboobeh Shakeri Miandare, Saeed Jalili
A Dynamic Chaotic Hash Function Based upon Circle Chord Methods
1044
Mahdi Nouri, Ali Khezeli, Alireza Ramezani, Azita Ebrahimi
Cryptanalysis of the Reduced-Round Version of JH
1050
Saeid Nourizadeh, Mojtaba Javanmardi, Babak Sadeghiyan
Automated Formal Analysis of NetConf Protocol for Authentication Properties
1055
Farnaz Izadi, Hadi Shahriar Shahhoseini
Formal Security Analysis of Authentication in SNMPv3 Protocol by An Automated Tool
1060
Sepideh Asadi, Hadi Shahriar Shahhoseini
A Comprehensive Semi-Automated Incident Handling Workflow
1065
Sayed Hadi Hashemi, Mohammad Babaeizadeh, Mohsen Nowruzi, Hossein Hadian
Jazi,Mohammad Shahmoradi, Elaheh Biglar Beigi Samani
A Comprehensive Classification of Incident Handling Information
1071
Mohsen Nowruzi, Mojtaba Dehghan, Hossein Hadian Jazi, Mohammad Shahmoradi, SayedHadi Hashemi, Mohammad Babaeizadeh
A New DCT Based Scalable Distributed Fraud Detection Architecture
1076
Azadeh Namiranian, Mahmoud Reza Haashemi
An Efficient Data Enrichment Scheme for Fraud Detection Using Social Network
Analysis
1082
Soheil Jamshidi, Mahmoud Reza Hashemi
FUZZGY: A Hybrid Model for Credit Card Fraud Detection
1088
Mohammad Reza HaratiNik, Mahdi Akrami, Shahram Khadivi, Mahdi Shajari
An Attack Graph Based Metric for Security Evaluation of Computer Networks
1094
Marjan Keramati, Ahmad Akbari
Using Security Metrics in Software Quality Assurance Process
1099
Athena Abdi, Afshin Souzani, Maliheh Amirfakhri, Azadeh Bamdad Moghaddam
Alleviating Controversiality Problem in Trust Estimation
1103
Mohsen Mohkami, Hassan Shakeri
Opinion Mining and Opinion Spam (A Literature Review Focusing on Product Reviews)
1109
Amir Arab Sheibani
Identity-based Signatures from Lattices
1114
Mohammad Zaheri, Babak Sadeghian
Elimination of Alignment Stage in Feature Extraction for a Slepian-Wolf FingerprintBiometric System
1119
S. Marouzi, G. Abed.Hodtani
A Mechanism-Based QoS and Security Requirements Consideration for MANETs QoS
Routing
1123
Shahrzad Sedaghat, Fazlollah Adibniya, Vali Derhami
A Generalization-Based Approach for Personalized Privacy Preservation in TrajectoryData Publishing
1129
Elahe Ghasemi Komishani, Mahdi Abadi
Conceptual Authentication Speech Hashing base Upon Hypotrochoid Graph
1136Mahdi Nouri, Nooshin Farhangian, Zahra Zeinolabedini, Mahyar Safarinia
Low Rate DOS Traceback Based On Sum of Flows
1142
Mohammad Hamedi Hamzehkolaie, Mohammad Javad Shamani, M. B. Ghaznavi -
Ghoushchi
A new ROI extraction method for FKP images using global intensity
1147Nafiseh S.Moosavi Ehteshami, Mahmoud Tabandeh, Emad Fatemizadeh
Computation & Decision- Making Aspects
Semi-supervised Metric Learning Using Composite Kernel
1151
T. Zare, M. T. Sadeghi, H. R. Abutalebi
Unmixing of Hyperspectral Data Using Robust Statistics-based NMF
1157Roozbeh Rajabi, Hassan Ghassemian
A Gradient Descent based similarity refinement method for CBIR systems
1161
Esmat Rashedi, Hossein Nezamabadi-pour, Saeid Saryazdi
An Enhanced Significance Weighting Approach for Collaborative Filtering
1165Mohsen Raeesi, Mehdi Shajari
Face Recognition: A Sparse Representation-based Classification Using IndependentComponent Analysis
1170Mirhossein Mousavi Karimi, Hamid Soltanian-Zadeh
Face Verification Using Sparse Representation Techniques
1175Y. Amidi, M.T. Sadeghi
3D Human Action Recognition Using Gaussian Processes Dynamical Models
1179
Hamed Jamalifar, Vahid Ghadakchi, Shohreh Kasaei
Remote Sensing Image Fusion Using Combining IHS and Curvelet Transform
1184
Seyed Abolfazl Valizadeh, Hassan Ghassemian
Effective Web Service Composition using Particle Swarm Optimization Algorithm
1190
Mahmood Allameh Amiri,Hadi Serajzadeh
Knowledge Map as a Decision Support Tool for Expert Finding in Research-based
Organizations
1195
Rizan Moradi ,Neda Eghbali ,Nafiseh Torkzade Mahani ,Ehraz Ketabchi ,Maryam S. Mirian
A Multi Context Dynamic Test Bed for Simulating Real World Constraints in Agents'Teamwork
1201
Sajjad Salehi,Fattaneh Taghiyareh,Mohammad Taghi Saffar,Kambiz Badie
Persica: A Persian corpus for multi-purpose text mining and Natural language-processing
1207
Hamid Eghbalzadeh,Behrooz Hosseini, Shahram Khadivi, Ali Khodabakhsh