فهرست مطالب

Academic Research in Computer Engineering - Volume:2 Issue:1, 2018
  • Volume:2 Issue:1, 2018
  • تاریخ انتشار: 1397/01/22
  • تعداد عناوین: 7
|
  • Sorayya Amouei *, Kamal Mirzaie, Fatemeh Saadatjoo, Ali Mohammad Latif Pages 5-16
    Vector Quantization (VQ) was the powerful technique in image compression. Generating a good codebook is an important part of VQ. There are various algorithms in order to generate an optimal codebook. Recently, Swarm Intelligence (SI) algorithms were adapted to obtain the near-global optimal codebook of VQ. In this paper, we proposed a new method based on a hybrid particle swarm optimization (PSO) and firefly algorithm (FA) to construct the codebook of VQ. The proposed method used PSO algorithm as the initial of FA to develop the VQ. This method is called PSO-FA model. Experimental results indicate that the proposed model is faster than FA. Furthermore, the reconstructed images get higher quality than FA, but it is no significant superiority to the PSO algorithm.
    Keywords: Image Compression, Vector Quantization, Swarm Intelligence, Firefly Algorithm, Particle Swarm Optimization Algorithm
  • Marziyeh Bahrami, Mohammad Esmaeili * Pages 17-23
    Reliability of a system is associated with its probability as well as the various risk factors. The probability of a system is defined by its operation and maintenance, over a period of time, without making any proper changes. For the control system of hybrid vehicles that works on the vibrational and magnetic environment, high reliability must meet the executive and the security requirements of the entire system. Reliability of the substrate was noted from the various stages of designing, installation, and testing. In this paper, we reviewed the proposed methods for the designing a reliability model software. The software, in turn, would offer a hybrid vehicles controller. The error rate and the average time between failures, was obtained with the stress analysis. After the software was tested, the evaluation was performed with G–O, J–M, and Musa methods, and Littlewood-Verral model. Based on the analyses, suitable results were obtained that could be further used to reduce the consumables components and the average time between failures. White box and black box testing was performed for predicting the reliability of the software. Ultimately, the results were and the results of the simulation were referred in this paper. The proposed method could assist the manufacturers in achieving a reliable system.
    Keywords: Control Circuitry, Ensuring Design, Error Rate, Hybrid Vehicles, Stress Analysis, Software Evaluation, Software Testing
  • Uranus Kazemi *, Reza Boostani Pages 24-33
    Cloud computing means relations of many computers are performed by a contact channels like internet. In this way, we will have ability to send, receive, and save data in the internet. Also, cloud computing gives a chance to compute or have parallel processing with using many virtual machines. Nowadays, efficiency, scalability, availability and security may express great risk in cloud computing. At the moment, our industry is change to the cloud computing. Because, this technique is very reliable and economical. In many companies, there are obstacles in relation to the security with using cloud computing service. One of the most important security issues is a lock of audit for various security aspects in cloud computing environment. This descriptive analytic study examines matter in connection to availability, the subject of scalability , the risks of cloud computing, the security of the information and infrastructure audit and also we will pay attention to identify how infrastructure based on cloud computing are safer and more accessible.
    Keywords: Cloud Computing, Scalability, Risk, Availability, Security
  • Ayub Hamidi, Madeh Shokri *, Aso Bozorgpanah Pages 34-39
    In exploring association rules, most of the previous studies have been conducted on the optimization of the efficiency, however, determination of the backup, and safety threshold, has a great effect on the quality of the association rules, and is still of importance. In the traditional algorithms for association rule mining, the two parameters of the confidence, are always determined by the deciding user, using trial and error. Despite the high impact of this task on the performance of the algorithms for association rule mining, these algorithms do not have a good performance in Big Data. Therefore, designing a method to automatically find the best value for these parameters, in Big Data, is a necessity. In this article, a new method for enhancing the calculative efficiency in Big Data to determine the best threshold is suggested. In this method, using the Shuffle Frog Leaping Algorithm (SFLA), first the best fitness for each frog is determined, then the minimum support and confidence are specified. The results show that the SFLA could yield better threshold than genetic and a-priori algorithms. The superiority of the suggested method is that it has the capability of functioning in Big Data, and it is more probable to escape the local optimum trap than the genetic algorithm; moreover, its convergence is quick and its search accuracy is high.
    Keywords: Shuffle Frog Leaping Algorithm, Big Data, Association Rule Mining
  • Amir Karbalaei Hassan * Pages 40-45
    As the number of users of surveillance cameras increased in public places, the need was felt that the camera automatically recognize normal and abnormal activities were to quickly achieve higher detection and diagnosis without fatigue and human error can notify the protective forces. For this purpose, we introduce an integrated descriptor where the background and foreground information simultaneously apply Fourier transform to extract the information, we do feature extraction using Gabor filter to reduce the dimensions of a space and feature selection Maximum Relevance Minimum Redundancy (MRMR) use and the training and support vector machine classifier will recognize the activity. The advantages of this approach are the property of not separating foreground from background to meet the needs of Arbitration in Sport games as well and the use of classifiers using feature selection step and the speed and accuracy MRMR to reduce the dimensions noted.
    Keywords: Activity Detection, Video Descriptor, Dimension Reduction, Feature Extraction, Monitoring
  • Aziz Hanifi * Pages 46-52
    Data gathering in Wireless Sensor Networks (WSNs) is one of the important operations in these networks. These operations require energy consumption. Due to the restricted energy of nodes, the energy productivity should be considered as a key objective in design of sensor networks. Therefore the clustering is a suitable method that used in energy consumption management. For this purpose many methods have been proposed. Between these methods the LEACH algorithm has been attend as a basic method. This algorithm uses distributed clustering method for data gathering and aggregation. The LEACH-C Method that is the improvement of LEACH, perform the clustering in centralized mode. In this method, collecting the energy level information of every node directly in each period increases the energy cost. In this paper, cluster head selection for increasing the network lifetime has been proposed based on fuzzy theory. The proposed ideas have been implemented over the LEACH-C protocol. Evaluation results show that the proposed methods have a better performance in energy consumption and lifetime of the network in comparison with similar methods.
    Keywords: Clustering, Sensor Networks, Fuzzy Theory, Energy Estimates
  • Piyush Wani, Sheeraaz Shaikh *, Priyadarshan Prabhakar, Suryansh Rajan, Nalini A. Mhetre Pages 53-58
    This paper discusses the design and implementation of easier access to IOT devices and endorses security in the system. To provide access to owner many researchers have made use of technologies like passwords, GPS based authentication, RFID authentication, Wi-Fi, NFC based authentication. To provide security to Internet of Things (IoT) resources the user has to provide the above mentioned credential for proving his identity. This is important to provide security against intruders and malicious intents. But this creates extra effort for user to prove him as an authorized user. We are proposing a system that is efficient itself to identify its true owner and alert him when a malicious attempt of access if made. The system will relieve the user from providing authentication details and provide hassle free access to his IoT devices. The paper will further discuss efficient solution for the security trade-off that would be encountered. The system is based on wireless protocol 802.15.4 Bluetooth which will prove as an identity for user. This Bluetooth signal will be sensed by the reader on the IoT resources and grant access rights to the user. Bluetooth had been evolved through years and latest version is optimized for minimal battery utilization and its influence is limited to few meters making it most suitable signal channel for authentication approvals.
    Keywords: Access System, Admin application, Owner application