The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Because of great volume of web information, information retrieval process of a search engine is of great importance. For each query of user, the number of queries can reach hundred thousands, whereas a few number of the first results have the chance of being checked by user; therefore, a search engine pays attention to putting relevance results in the first ranks as a necessity. This paper introduces...
This paper aims to identifying knowledge sharing criteria. For this purpose, the conditions under which knowledge sharing are likely to occur was studied from employee's viewpoints. The general result from this study is that employees assume privacy (personal intellectual property) for their personal knowledge (scientific knowledge, skills and experience). Therefore, they protect it out of other reach...
Malicious programs, also known as malware, often use code obfuscation techniques to make static analysis more difficult and to evade signature-based detection. To resolve this problem, various behavioral detection techniques have been proposed that focus on the run-time behaviors of programs in order to dynamically detect malicious ones. Most of these techniques describe the run-time behavior of a...
Nowadays, extremely wide and facilitated access to the internet has made the plagiarism and text reuse more common. Many studies have been conducted on automatic plagiarism detection. But there are few studies on automatic Persian plagiarism detection methods due to lack of a suitable Persian corpus. In this paper, an external Persian plagiarism detection method based on the vector space model (VSM)...
Wireless channels are highly prone to eavesdropping. To mitigate this problem encryption systems are used. Analog scrambling systems achieve confidentiality through modification of analog signals. Unfortunately, current literatures lack a thorough security analysis of these systems. In this paper security of hopping window time domain scrambler is investigated. It is shown that cipher-text of these...
In this paper a method is developed to estimate human articulated body parts bending motion based on Dictionary-Learning Sparse Representation (DLSR). The extracted features for training the dictionary are achieved by deformation gradient of proposed part, which is the non-translation portion of an affine transformation that determines the change between original shape and deformed shape. In order...
Network security risk assessment and mitigation are two processes in the risk management framework which need to be done accurately to improve the overall security level of a network. In this paper, in order to increase the accuracy of vulnerability exploitation probability estimation in the risk assessment phase, in addition to inherent characteristics of vulnerabilities, their temporal characteristics...
The main objective of wireless sensor networks is collecting data from ambient and transmitting achieved data to sink node. Limited energy resource for sensor node has posed so many challenges to these networks. The main constraint on wireless sensor networks is energy consumption which directly affects network lifetime. Lots of methods are proposed to improve these two parameters among which mobile...
Automatic detection of the human emotion is an important area in computer science and psychology to develop adaptive Human-Computer Interaction (HCI). In this paper, a novel approach is proposed to extract a user's pleasure during English comprehension. The approach is based on processing the mouse movement data during the interaction with the system and determining whether or not the user enjoys...
In this paper, a marker based human pose estimation from multi-view video sequences is presented. The pose estimation problem is defined as optimization of the 45 parameters which define body pose model and is solved using particle swarm optimization (PSO). The objective of this optimization is to maximize a fitness function which formulates how much body model matches with 2D marker's coordinate...
As a solution of avoiding ill-posed problem stem from sparse and large scale blurring matrix which has many singular values of different orders of magnitude close to the origin, in image restoration, Tikhonov regularization with l-curve parameter estimation as convex optimization problem has been proposed in this paper. Also, since the restored image is so sensitive to initial guess (start point)...
In symmetric cryptography, TESLA variants are well-known valuable source authentication broadcast scheme that are secure and efficient. But TESLA, versus asymmetric approaches, do not provide confidentiality and immediate authentication, need the synchronization of parties, are not flexible due to synchronization and finally have delayed verification and overflow problem. In this paper, we have proposed...
Histogram modification is one of the well- known and most effective techniques in increasing contrast and image quality enhancement. But, in some cases, traditional histogram modification would increase image contrast too much and cause image details to be lost. In this article, a new histogram modification method has been proposed that contains a combination of histogram division part and brightness...
Widespread use of SIP as a signalling protocol in VoIP networks is the main reason for tackling various challenges. SIP throughput can severely be degraded when an overload situation happens in the proxy servers due to several retransmissions from user agents. In this paper we try to prevent throughput reduction by properly distributing the loads over available proxy servers. The proposed scheme utilizes...
Vehicular traffic estimation is one of the major issues in intelligent transportation systems. Traffic information can be used by navigation systems to improve travel efficiency. Current traffic estimation systems rely on infrastructure deployment to monitor traffic state. Therefore, they are costly to implement. In this paper, we propose a new context-aware approach to traffic congestion estimation...
Ant meeting problem is a distributed problem that its purpose is to find an efficient path for ants to meet each other. Actually, ant robots suffer from the low memory and their restricted computational power. They communicate with their environment by leaving some symptoms like pheromones in their surroundings. In the problem of ants meeting, the ants should reach together in order to cooperate in...
In recent years, progress in the field of artificial neural networks provides a very important tool for complex problems in pattern recognition, data mining and medical diagnosis. The training algorithms of neural networks play an important role for adjustment the network parameters. Different algorithms have been presented for training neural networks; the most common one is the use of gradient descent...
In this paper, we present a novel algorithm for the recovery of images, corrupted by the salt-and-pepper noises. Specifically, we adopt a linear interpolation scheme to reconstruct the identified noisy pixels. Our extensive experimental results show that the resulting performance of our proposed method is higher than many of the traditional methods of noise removal. More explicitly, in the case of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.