Volume 1, Issue 2
مرور بر اساس
ارسال های اخیر
-
Word Sense Disambiguation Based on Lexical and Semantic Features Using Naive Bayes Classifier
(University of Isfahan & Iranian Society of Cryptology, 2014-04-01)Machine translation is considered as a branch of machine intelligence with about fifty years background. Ambiguity of language is the most problematic issue in machine translation systems, which may lead to unclear or wrong ...
-
MRAR: Mining Multi-Relation Association Rules
(University of Isfahan & Iranian Society of Cryptology, 2014-04-01)In this paper, we introduce a new class of association rules (ARs) named"Multi-Relation Association Rules" which in contrast to primitive ARs (thatare usually extracted from multi-relational databases), each rule item ...
-
Solution of the Generalized Interval Linear Programming Problems: Pessimistic and Optimistic Approaches
(University of Isfahan & Iranian Society of Cryptology, 2014-04-01)This paper deals with linear programming problem with interval numbers as coefficients to exhibit with uncertainty. Since, the set of common intervals is not a field, we define generalized interval numbers to produce an ...
-
A New Hybrid Approach for Modeling Accurate Fuzzy Rule Based Classification Systems
(University of Isfahan & Iranian Society of Cryptology, 2014-04-01)we propose in this article a new hybrid method for modeling accurate fuzzy rule based classication systems. The new method is a combination of manifold based data mapping method, a heuristic fuzzy rule based construction ...
-
Evaluating Behavioral Intentions of Tourists in e-Tourism
(University of Isfahan & Iranian Society of Cryptology, 2014-04-01)Tourism is one of the major sources of income for many countries and with the advent of internet, using this new channel (internet) for providing different services of tourism, i.e., e-tourism, is growing rapidly. This is ...
-
Ranking of Common Architectural Styles Based on Availability, Security and Performance Quality Attributes
(University of Isfahan & Iranian Society of Cryptology, 2014-04-01)An architect designs software using architectural styles and quality attributes. To satisfy quality attributes, architectural tactics are used. An architectural tactic determines how to implement a quality attribute in ...



