مرور Journal of Advances in Computer Research بر اساس تاریخ انتشار
در حال نمایش موارد 1 - 20 از 279
-
Translation Invariant Approach for Measuring Similarity of Signals
(Sari Branch, Islamic Azad University, 2010-08-01)In many signal processing applications, an appropriate measure to compare two signals plays a fundamental role in both implementing the algorithm and evaluating its performance. Several techniques have been introduced in ...
-
Mobile Robot Navigation Error Handling Using an Extended Kalman Filter
(Sari Branch, Islamic Azad University, 2010-08-01)Obviously navigation is one of the most complicated issues in mobile robots. Intelligent algorithms are often used for error handling in robot navigation. This Paper deals with the problem of Inertial Measurement Unit (IMU) ...
-
An Adaptive Segmentation Method Using Fractal Dimension and Wavelet Transform
(Sari Branch, Islamic Azad University, 2010-08-01)In analyzing a signal, especially a non-stationary signal, it is often necessary the desired signal to be segmented into small epochs. Segmentation can be performed by splitting the signal at time instances where signal ...
-
Transforming Fuzzy State Diagram to Fuzzy Petri net
(Sari Branch, Islamic Azad University, 2010-08-01)UML is known as one of the most common methods in software engineering. Since this language is semi-formal, many researches and efforts have been performed to transform this language into formal methods including Petri ...
-
Moving Objects Tracking Using Statistical Models
(Sari Branch, Islamic Azad University, 2010-08-01)Object detection plays an important role in successfulness of a wide range of applications that involve images as input data. In this paper we have presented a new approach for background modeling by nonconsecutive frames ...
-
Architectural Plan for Constructing Fault Tolerable Workflow Engines Based on Grid Service
(Sari Branch, Islamic Azad University, 2010-11-01)In this paper the design and implementation of fault tolerable architecture for scientific workflow engines is presented. The engines are assumed to be implemented as composite web services. Current architectures for ...
-
A New Method for Eye Detection in Color Images
(Sari Branch, Islamic Azad University, 2010-11-01)The problem of eye detection in face images is very important for a large number of applications ranging from face recognition to gaze tracking. In this paper we propose a new algorithm for eyes detection. First, the face ...
-
Blind Signal Separation Using an Extended Infomax Algorithm
(Sari Branch, Islamic Azad University, 2010-11-01)The Infomax algorithm is a popular method in blind source separation problem. In this article an extension of the Infomax algorithm is proposed that is able to separate mixed signals with any sub- or super-Gaussian ...
-
Human Computer Interaction Using Vision-Based Hand Gesture Recognition
(Sari Branch, Islamic Azad University, 2010-11-01)With the rapid emergence of 3D applications and virtual environments in computer systems; the need for a new type of interaction device arises. This is because the traditional devices such as mouse, keyboard, and joystick ...
-
On-Line Learning of a Persian Spoken Dialogue System Using Real Training Data
(Sari Branch, Islamic Azad University, 2010-11-01)The first spoken dialogue system developed for the Persian language is introduced. This is a ticket reservation system with Persian ASR and NLU modules. The focus of the paper is on learning the dialogue management module. ...
-
On Social Network Web Sites: Definition, Features, Architectures and Analysis Tools
(Sari Branch, Islamic Azad University, 2010-11-01)Development and usage of online social networking web sites are growing rapidly. Millions members of these web sites publicly articulate mutual "friendship" relations and share user-created contents, such as photos, videos, ...
-
A Robust Digital Image Watermarking Scheme Based on DWT
(Sari Branch, Islamic Azad University, 2010-11-01)In this paper a wavelet-based logo watermarking scheme is presented. The logo watermark is embedded into all sub-blocks of the LLn sub-band of the transformed host image, using quantization technique. Extracted logos from ...
-
Data Clustring Using A New CGA(Chaotic-Generic Algorithm) Approach
(Sari Branch, Islamic Azad University, 2011-02-01)Clustering is the process of dividing a set of input data into a number of subgroups. The members of each subgroup are similar to each other but different from members of other subgroups. The genetic algorithm has enjoyed ...
-
Service Differentiation of IEEE 802.11e
(Sari Branch, Islamic Azad University, 2011-02-01)The type of the applications for which Internet is being used has changed over the years. Multimedia applications, Real-time applications and Game playing require Quality of service. IEEE has proposed IEEE 802.11e, a quality ...
-
AHP Techniques for Trust Evaluation in Semantic Web
(Sari Branch, Islamic Azad University, 2011-02-01)The increasing reliance on information gathered from the web and other internet technologies raise the issue of trust. Through the development of semantic Web, One major difficulty is that, by its very nature, the semantic ...
-
Reduction in Cache Memory Power Consumption based on Replacement Quantity
(Sari Branch, Islamic Azad University, 2011-02-01)Today power consumption is considered to be one of the important issues. Therefore, its reduction plays a considerable role in developing systems. Previous studies have shown that approximately 50% of total power consumption ...
-
Prediction of Gain in LD-CELP Using Hybrid Genetic/PSO-Neural Models
(Sari Branch, Islamic Azad University, 2011-02-01)In this paper, the gain in LD-CELP speech coding algorithm is predicted using three neural models, that are equipped by genetic and particle swarm optimization (PSO) algorithms to optimize the structure and parameters of ...
-
Pedestrians Tracking in a Camera Network
(Sari Branch, Islamic Azad University, 2011-05-01)With the increase of the number of cameras installed across a video surveillance network, the ability of security staffs to attentively scan all the video feeds actually decreases. Therefore, the need for an intelligent ...
-
Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
(Sari Branch, Islamic Azad University, 2011-05-01)Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection ...
-
Design and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks
(Sari Branch, Islamic Azad University, 2011-05-01)Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in ...



