@article{ author = {Armanfard, Narges and Komeili, Majid and Kabir, Ehsanollah}, title = {A Novel Descriptor for Pedestrian Detection in Video Sequences}, abstract ={This paper presents a novel Texture-Edge Descriptor, TED, for background modeling and pedestrian detection in video sequences which models texture and edge information of each image block simultaneously. Each block is modeled as a group of adaptive TED histograms that are calculated for pixels of the block over a rectangular neighborhood. TED is an 8-bit binary code which is independent of the neighborhood size. Experimental results over real-world sequences from PETS database clearly show that TED outperforms LBP.}, Keywords = { pedestrian detection, texture, edge, block-based approach, background subtraction, surveillance systems }, volume = {2}, Number = {2}, pages = {1-8}, publisher = {ICT Research Institute(ITRC)}, url = {http://ijict.itrc.ac.ir/article-1-259-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-259-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2010} } @article{ author = {Moattar, Mohammad Hossein and Homayounpour, Mohammad Mehdi}, title = {A Robust Voice Activity Detection Based on Short Time Features of Audio Frames and Spectral Pattern of Vowel Sounds}, abstract ={This paper presents a set of voice activity detection (V AD) methods, that are easy to implement, robust against noise, and appropriate for real-time applications. The common characteristic is the use of a voting paradigm in all the proposed methods. In these methods, the decision on the voice activity of a given frame is based on comparing the features obtained from that frame with some thresholds. In the first method, a set of three features, namely frame energy, spectral flatness, and the most dominant frequency component is applied. In the second approach however, the spectral pattern of the frames of vowel sounds is used. To use the strengths of each of the above methods, the combination of these two decision approaches is also put forth in this paper. The performance of the proposed approaches is evaluated on different speech datasets with different noise characteristics and SNR levels. The approaches are compared with some conventional V AD algorithm such as ITU G. 729, AMR and AFE from different points of view. The evaluations show considerable performance improvement of the proposed approaches.}, Keywords = { voice activity detection, spectral flatness, vowel spectral pattern, noise robustness, vowel sounds }, volume = {2}, Number = {2}, pages = {9-19}, publisher = {ICT Research Institute(ITRC)}, url = {http://ijict.itrc.ac.ir/article-1-260-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-260-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2010} } @article{ author = {Hedayati, Alireza and Fesharaki, Mehdi}, title = {Peris: A Novel Dynamic Bandwidth Allocation (DBA) Method with Second-Price Auction in Next Generation Military Networks Based on EPON Technology}, abstract ={In the foreseeable future, networks of access devices that can cooperate and effectively communicate with military backbone infrastructure will significantly influence and simplify military operations. As one of the promising solutions for developing next generation military networks, Ethernet Passive Optical Network (EPON) has received great attention from both industry and academia in recent years. Based on the EPON technology, bandwidth constraint is a critical issue in military communication. In this paper we propose Peris, a novel dynamic bandwidth allocation method with second price auction in next generation military networks based on EPON technology. In this new method, the OL T (similar to the leaders) is responsible for the auction management which effectively and fairly responds to the bandwidth requests of the users through their own ONUs and allocates the winners the amount of requested available bandwidth. Simulation results show that comparing Peris with IPACT, regarding QoS parameters such as packet loss ratio, line utilization and throughput, it has better performance.}, Keywords = { Next Generation Military Network, Ethernet Passive Optical Network (EPON), Bandwidth Allocation, SecondĀ­ Price Auction }, volume = {2}, Number = {2}, pages = {21-28}, publisher = {ICT Research Institute(ITRC)}, url = {http://ijict.itrc.ac.ir/article-1-261-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-261-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2010} } @article{ author = {NaderiDehkordi, Mohammad and Badie, Kambiz and Khademzadeh, Ahm}, title = {A New GA Approach Based on Pareto Ranking Strategy for Privacy Preserving of Association Rule Mining}, abstract ={With fast progress of the networks, data mining and information sharing techniques, the security of the privacy of sensitive information in a database becomes a vital issue to be resolved. The mission of association rule mining is discovering hidden relationships between items in database and revealing frequent itemsets and strong association rules. Some rules or frequent itemsets called sensitive which contains some critical information that is vital or private for its owner. In this paper, we investigate the problem of hiding sensitive knowledge. We decide to hide sensitive knowledge both in frequent patterns and association rule extraction steps. In order to conceal association rules and save the utility of transactions in dataset, we select Genetic Algorithm to find optimum state of modification. In our approach various hiding styles are applied in different multi-objective fitness functions. First objective of these functions is hiding sensitive rules and the second one is keeping the accuracy of transactions in dataset. After sanitization process we test the sanitization performance by evaluation of various criterions. Indeed our novel framework consists of dataset preprocessing, Genetic Algorithm-based core approach and different sanitizing measurements. Finally we establish some experiments and test our approach by larger datasets and compare the performance with well-known existing ones.}, Keywords = { Association Rule Mining, Privacy Preserving, Sensitive Association Rule, Multi-objective Optimization, Genetic Algorithms }, volume = {2}, Number = {2}, pages = {29-41}, publisher = {ICT Research Institute(ITRC)}, url = {http://ijict.itrc.ac.ir/article-1-262-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-262-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2010} } @article{ author = {Saadat, Parinaz and MinaeiBidgoli, Behrouz}, title = {Scaling Up Performance of Web Services by Pre-Serialization Response Analysis}, abstract ={Web services are the inseparable part of many scientific applications. Consider communication between two partial differential equation (PDE) solvers on different domains, such applications work by exchanging large arrays containing floating point data with high accuracy. The reliance of web services on SOAP leads to performance degradation in similar scenarios as the serialization of outgoing messages containing large arrays of doubles is a primary SOAP performance bottleneck. Various aspects of this problem are examined from the point of views including alternative formats, XML coding compression, differential serialization, differential de-serialization, etc. This paper proposes an approach which combines the idea behind differential serialization and differential de-serialization with a completely different implementation.}, Keywords = { web services, serialization, performance, SOAP }, volume = {2}, Number = {2}, pages = {43-49}, publisher = {ICT Research Institute(ITRC)}, url = {http://ijict.itrc.ac.ir/article-1-263-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-263-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2010} } @article{ author = {Faili, Heshaam and Azadnia, Mohamm}, title = {The First Persian Context Sensitive Spell Checker}, abstract ={In this article an attempt to introduce the first Persian context sensitive spell checker, which tries to detect and correct the :eat-word spelling error of Persian text is presented. The proposed method is a statistical approach which uses Bayesian framework as its probabilistic model and also uses mutual information metric as a semantic relatedness measure between different Persian words. Our experiments on sample test data, shows that accuracy of correction method is about 80% with respect to Fl-measure.}, Keywords = { Persian language, real-word error, Bayesian framework, mutual information }, volume = {2}, Number = {2}, pages = {51-59}, publisher = {ICT Research Institute(ITRC)}, url = {http://ijict.itrc.ac.ir/article-1-264-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-264-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2010} } @article{ author = {ShamsEsfandAbadi, Mohammad and Palangi, Hami}, title = {The Unified Approach to Set-Membership and Selective Partial Update Adaptive Filtering Algorithms}, abstract ={In this paper we show how the classical and modern adaptive filter algorithms can be introduced in a unified way. The Max normalized least mean squares (MAX-NLMS), N-Max NLMS, the family of SPU-NLMS, SPU transform domain adaptive filter (SPU-TDAF), and SPU subband adaptive filter (SPU-SAF) are particular algorithms are established in a unified way. Following this, the concept of set-membership (SM) adaptive filtering is extended to this framework, and a unified approach to derivation of SM and SM-SPU adaptive filters is presented. The SM-NLMS, SM-TDAF, SM-SAF, SM-SPU-NLMS, and SM-SPUSAF are presented based on this approach. Also, this concept is extended to the SPU affine projection (SPU-AP) and SPUTDAF algorithms and two new algorithms which are called SM-SPU-AP and SM-SPU-TDAF algorithms, are established. These novel algorithms are computationally efficient. The good performance of the presented algorithms is demonstrated in system identification application.}, Keywords = { Adaptive filter, selective partial update, set-membership }, volume = {2}, Number = {2}, pages = {61-70}, publisher = {ICT Research Institute(ITRC)}, url = {http://ijict.itrc.ac.ir/article-1-265-en.html}, eprint = {http://ijict.itrc.ac.ir/article-1-265-en.pdf}, journal = {International Journal of Information and Communication Technology Research}, issn = {2251-6107}, eissn = {2783-4425}, year = {2010} }