Vai al contenuto principale della pagina
| Autore: |
Moshiri Behzad
|
| Titolo: |
Conference proceedings of 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI) : Tehran, Iran, Nov. 5-6th, 2015, Iran University of Science and Technology / / Behzad Moshiri, conference chair
|
| Pubblicazione: | Piscataway, NJ : , : IEEE, , [2015] |
| ©2015 | |
| Descrizione fisica: | 1 online resource (1207 pages) : illustrations |
| Disciplina: | 658.4038 |
| Soggetto topico: | Engineering - Technological innovations |
| Knowledge management - Data processing | |
| Nota di contenuto: | 1-Decomposed Fuzzy PID Controller for Power Inverters Regulation: An Overview -- 2-Electrical Energy Consumption Forecasting for Turkey using Grey Forecasting Technics with Rolling Mechanism -- 3-A high dynamic range CMOS image sensor with a novel pixel-level logarithmic counter memory -- 4-Adoption of e-Procurement Systems in Developing Countries: A Nigerian Public Sector Perspective -- 5-Bad data detection and identification in power system state estimation with network parameters uncertainty -- 6-Design and Simulation of A Low Power RF Front- End for Short Range Outdoor Applications -- 7-An FPGA-based Technique for Linearizing RF Power Amplifiers -- 8-Real time eye detection using edge detection and euclidean distance -- 9-Using Risk Management to Balance Agile Methods -- 10-Knowledge uncertainty supervision in automatic control and measurements -- 11-Absorptive capacity: a hub of Blue Ocean and red ocean strategies and capability transformation in innovative business environments -- 12-Impedance Matching Networks for Current Output Integrated Circuits -- 13-SDD: A Skin Detection Dataset for Training and Assessment of Human Skin Classifiers -- 14-Using micro-blogging to dismantle knowledge hierarchies in product development teams -- 15-Developing a Teaching Framework to support software inspection -- 16-Distributed Wideband Power Amplifier Using Reactive Coupled Line Feedback Structure -- 17-Performance Analysis of Microsystems in the Presence of Pull-In Instability -- 18-Chattering Analysis of Second Order Sliding Mode Algorithms for Linear Plants with Disturbance -- 19-A semi-blind watermarking algorithm for color images using chaotic maps -- 20-PSWG: An Automatic Stop-word List Generator for Persian Information Retrieval Systems Based on Similarity Function & POS Information -- 21-Authentication and authorizing scheme based on umts aka protocol for cognitive radio networks -- 22-A supervisory control strategy for visibility maintenance in the leader-follower formation -- 23-Synchronization of Chaotic Gyroscopes via an Adaptive Robust Controller -- 24-Investigation of problems related to open-innovation in research organizations -- 25-A trust model for resource selection in cloud computing environment -- 26-A novel LBP method for invariant texture classification -- 27-A novel CMC based method for MRI brain image segmentation -- 28-Estimation of project completion time using proper fuzzy combination of regression methods -- 29-Cloud-based load testing method for web services with VMs management -- 30-A Image Steganography Scheme Based On Discrete Wavelet Transform Using Lattice Vector Quantization And Reed-Solomon Encoding -- 31-An Assessment of the Effect of e-service quality management on the organizational performance -- 32-A conceptual model on customers lifestyles and purchase from the virtual stores -- 33-A new robust and non-blind digital image watermarking scheme based on integer wavelet transform -- 34-AdjusƟng the Electric Field and Voltage DistribuƟon Along a 400 kV Transmission Line Composite Insulator Using Corona Ring -- 35-A Query Ontology to Facilitate Web Service Discovery -- 36-Automatic MRI Image Threshold using Fuzzy Support Vector Machines -- 37-An overview of some of the QoS routing protocols in wireless sensor networks -- 38-A fault-tolerant rouƟng algorithm in 3D topology manycore processors -- 39-Automatic MRI Image Segmentation using Water Flow like Algorithm and Fuzzy Entropy -- 40-Design of a Control System for Dual-buck Inverters Used in Grid-connection Applications -- 41-Developing a hybrid method for solving optimal control problems of the musculoskeletal system of the human body: Combination of linear and angular actuators -- 42-Real Time Earthquake Prediction Using Cross-Correlation Analysis & Transfer Function Model -- 43-An Intelligent Interactive Marketing System based-on Internet of Things (IoT) -- 44-fMRI Brain Decoding of Facial Expressions Based on Multi-voxel Pattern Analysis -- 45-PTokenizer: POS Tagger Tokenizer -- 46-An approach for detecting anomalies by assessing the inter-arrival time of UDP packets and flows using Benford's Law -- 47-Trust Prediction in Multiplex Networks -- 48-A hybrid method based on neural networks and a metaheuristic bat algorithm for stock price prediction -- 49-Twisting control algorithm for the yaw and pitch tracking of a Twin rotor UAV -- 50-Motion Planning for an Autonomous Underwater Vehicle -- 51-A new system for discovering usage profiles -- 52-An Analytical Method to Optimal Allocation of Wind based-DG Considering Time-Varying Load Model in Radial Distribution Systems -- 53-Optimal Allocation of Wind-based DG based on Analytical Expression With Time-Varying Combined Generation-Load Models in Distribution Networks -- 54-Breast Cancer Diagnosis Using , Grey-level Cooccurrence Matrices , Decision Tree Classification and Evolutionary Feature Selection -- 55-Chaos Control of Permanent Magnet Synchronous Motors using Single Feedback Control -- 56-A Component-Based Content Distribution Network Architecture in Cloud Environments -- 57-PI control method based storage to control the microgrid in a state separated from the main network -- 58-Smart way to verify the identity of the sound, based on neural network technique Identification by Voice -- 59-The Impact of Shunt-FACTS Devices on Distance Relay Performance -- 60-Effect of Unbalanced Load on the Performance of Islanding Detection Methods -- 61-A Novel Fake Color Scheme Based on Depth Protection for MR Passive/Optical Sensors -- 62-Outage Study of Cognitive Relay Network with Multiple Primary Users and Outdated CSI -- 63-Design of a Fully Differential Current Buffer (FDCB) based on a new Common Mode Feedforward (CMFF) based Common Mode Separation Technique -- 64-The Combination of Load Shedding and Removal of Capacitors in Under Frequency Situations -- 65-A Proposed Architecture for Soft Computing in Smart Grid as a Cloud-based Service -- 66-Enhancing LDA-based Discrimination of Left and Right Hand Motor Imagery: Outperforming the Winner of BCI Competition II -- 67-Multi-User Searchable Encryption Scheme with General Access Structure -- 68-Transient modeling of transmission lines components with respect to corona phenomenon and grounding system to reduce the transient voltages caused by lightning Impulse -- 69-Cuckoo Search Algorithm and Its Application for Secondary Protein Structure Prediction -- 70-A Low-Voltage High-Speed High-Linearity MOSFET-Only Analog Bootstrapped Switch for Sample-and-Hold Circuits -- 71-Control of the Blood Glucose Level in Diabetic Patient Using Predictive Controller and delay differential equation -- 72-Investigation of Very Fast Transient over Voltages in Gas Insulated Substations -- 73-Increase the efficiency of DCT method for detection of copy-move forgery in complex and smooth images -- 74-Optimal the added Relay node placement using GELS to increase the lifetime of wireless sensor network -- 75-Design and fabrication of a robot for neurorehabilitation;Smart RoboWrist -- 76-Performance evaluaƟon of the OFDM modulaƟon in IEEE 802.11-based wireless industrial networks -- 77-Outage Constrained Multi-hope Spectrum Sharing System with Co-Channel Interference -- 78-Novel Voltage Control Method in Distribution Networks with DG resources -- 79-A Survey on Bone Metastasis by Finite Difference Method -- 80-Adaptive control of human posture in a specific movement -- 81-A new multi-focus image fusion technique based on variance in DCT domain -- 82-Enhancement Lifetime of Wireless Sensor Networks with Mobile Sink Managed and Improved Routing and Control Power Consumption -- 83-New Method for Management of Moving Objects Trajectories in Intelligent Transportation Systems -- 84-Improving Routing in Wireless Sensor Networks having Mobile Sinks through Fuzzy Algorithm -- 85-A Modified Ant Colony Based Approach to Digital Image Edge Detection -- 86-Enhancing Path-Oriented Test Data Generation |
| Using Adaptive Random Testing Techniques -- 87-A novel delay based scheduling algorithm for video traffic in LTE -- 88-On the performance evaluation of hybrid decodeamplify-forward relaying protocol with adaptive M-QAM modulation over Rayleigh fading channels -- 89-Implementation of indirect rotor-flux-oriented control in induction machine using fuzzy logic based on TLBO -- 90-New Hybrid Evolutionary Biclustring Algorithm Based on Transposed Virtual Error -- 91-Service composition with knowledge. | |
| of quality in the cloud Environment using the cuckoo optimization and artificial bee colony algorithms -- 92-Variable step size modified clipped LMS algorithm -- 93-A new local distace-based outlier detection approach for fuzzy data by vertex metric -- 94-Compromise between economic dispatching and improvement of voltage profile using PSO algorithm in IEEE standard network -- 95-Using patient's speech signal for vocal ford disorders detection based on lifting scheme -- 96-Parallel genetic algorithm based on GPU for solving quadratic assignment problem -- 97-Determining the window size based on modiĮed 45o rotation skeleton-based region method -- 98-Classification of Radar Clutters With Artificial Neural Network -- 99-State feedback time-optimal controller for linear systems with input delay -- 100-Wideband noise Įgure low noise ampliĮer design for 3.5-4.5 GHz -- 101-Estimating the time of a change in Poisson rate parameter with a genetic algorithm -- 102-An investigation on length variation and its effect on positioning of the linkages of a robot mechanical manipulator (RRT) using direct dynamic method -- 103-Energy-aware method in connected asymmetrical point Coverage wireless sensor network using ant colony Algorithm -- 104-Manifold Based Persian Digit Recognition Using the Modified Locally Linear Embedding and Linear Discriminative Analysis -- 105-A novel dynamic multi-hop Clustering Protocol based on Renewable Energy for Energy Harvesting wireless sensor networks -- 106-Image Segmentation Using a Modified Fuzzy C-Means Clustering -- 107-Multi-focus image fusion in DCT domain based on correlation coefficient -- 108-Fuzzy Based Controller Design for Parallel Hybrid Electric Vehicle -- An Approach to Fuel Consumption and Emission Reduction -- 109-Modeling and Transient analysis of Overhead Transmission Lines Considering Corona Phenomenon and Skin Effect -- 110-Controller Placement in Software-Defined WAN Using Multi Objective Genetic Algorithm -- 111-A Hybrid NSGA-II for Solving MultiObjective Controller Placement in SDN -- 112-Sensor Localization for Cooperative Spectrum Sensing in the Network with Random Geometric primary -- 113-Fault tolerant control system design by using adaptive observer, case study: civilian aircraft -- 114-Influence of Stone Wales defect on magnetic resistance of zigzag graphene nanoribbons -- 115-Algorithm to improve job scheduling problem in cloud computing environment -- 116-Simulation of DAC-based truncated sinc excitation pulse generator -- 117-Smart on-board UAV system: Using computer vision system to find a movable and stationary target -- 118-An approach to reduce cold start in compound recommender systems using semantic technology and social -- 119-Using salt and pepper noise detection and removal based on neighbor pixels in gray-scale images -- 120-The comparison of two approaches Jiles-Atherton and Preisach in simulating hysteresis cycle -- 121-Optimization of Hybrid PV-Battery Storage System Using New Hunting Search Algorithm with considering reliability -- 122-Automatic loop detection in the Sequence of system calls -- 123-Comparison of the accuracy of effort estimation methods -- 124-Scaled Consensus of Multi-agent Systems Under Time-varying Delay -- 125-A Framework for Improving Find Best Marketing Targets Using a Hybrid Genetic Algorithm and Neural Networks -- 126-Improving resource management of IaaS Providers in Cloud Federation -- 127-LARFH: provisioning dynamic approach based on learning automata for data fault-tolerance in the cloud storage -- 128-Formal Verification of UML Statecharts using the LOTOS Formal Language -- 129-Automatic Identification of chromosomal abnormalities in metaphase karyotype Using paired images in human chromosomes -- 130-A MapReduce-based online Image Retrieval System using Bag-of-Words Model -- 131-Analysis of the dynamic behavior of induction motors by changing the parameters of feedback linearization strategy -- 132-A recommender system by using classification based on frequent paƩern mining and J48 algorithm -- 133-A Genesio-Tesi Chaotic Control Using An Adaptive-Neural Observer Based RISE Controller -- 134-Wing rock suppression via backstepping controller -- 135-Automatic verification of uml state chart by bogor model checking tool -- Automatic formal verification of network and distributed systems -- 136-Channel estimation with adaptive incremental strategy over distributed sensor networks -- 137-Comparative approach to web application firewalls -- 138-A Novel Control Strategy Based on Fuzzy Logic for Switched Reluctance Machine in Battery Charging Mode -- 139-SystemaƟc literature review in the area of Enterprise Architecture during past 10 years -- 140-Studying the deficiencies and problems of different architecture in developing distributed systems and analyze the existing solution -- 141-Deadline-constrained workflow scheduling using imperialist competitive algorithm on infrastructure as a service clouds -- 142-A new algorithm for mining frequent patterns in Can Tree -- 143-Brain extraction using isodata clustering algorithm aided by histogram analysis -- 144-Query or Spam: Detecting fraudulent web requests using stream clustering -- 145-Towards automatic generation of formal specifications for UML consistency verification -- 146-Applying of PID, FPID, TID and ITID controllers on AVR system using particle swarm optimization (PSO) -- 147-Task priority and self-organization mechanism in holarchy architecture -- 148-Robust Speed Control of Induction Machine Using Synergetic Controller -- 149-Artificial Real Time Digital Control of Asynchronous Machine -- 150-A Neural-Network based gender detection algorithm on full-face photograph -- 151-Segmentation of Breast Images to find the Lesions using the Decreased Neighborhood Graph algorithm -- 152-Modified CBDS for defending against collaborative attacks by malicious nodes in MANETs -- 153-A 2.8-10.6GHz Low-Power Low-Noise Amplifier for Ultra-Wideband Receivers -- 154-Comparison between Performance of Conventional,Fuzzy and Fractional Order PID Controllers in Practical Speed Control of Induction Motor -- 155-An Adaptive Search Engine Considering User's Community -- 156-Breast cancer detection in mammograms using Wavelet and Contourlet transformations -- 157-Fuel Oil leak Detection in Power Plant with Recurrent Neural Network and Execute in Programmable Logic Controller -- 158-Sensor-less Control of Nonlinear Systems in Brunovsky Form Using Super-twisting Differentiator -- 159-Adaptive and Distributed TDMA Scheduling Protocol for mobile ad hoc networks (MANET) -- 160-Combining wireless sensor networks and cloud computing: security perspective -- 161-Numerical investigation of water drop movement within a microchannel under electrowetting phenomenon -- 162-An Improvement on LEACH Protocol (EZ-LEACH) -- 163-Energy Efficient Spherical Divisions for VBF-based Routing in Dense UWSNs -- 164-A powerful novel method for ECG signal de-noising using different thresholding and Dual Tree Complex Wavelet Transform -- 165-A new method for solving the open shop scheduling using imperialist competitive algorithm and tabu search with regard to maintenance of machine -- 166-Image Processing Techniques for Classification of Linear Welding Defects -- 167-A New Approach to Improve Load Balancing for Increasing Fault Tolerance and Decreasing Energy Consumption in Cloud Computing -- 168-A Robust Image Watermarking Scheme Based on Discrete Wavelet Transforms -- 169-A New Method to Enhance the Efficiency of peer-to-peer Vehicular Networks -- 170-A New Inexpensive System For SHM Of Bridge Decks Using Wireless Sensor Networks Based On Measurements Of Temperature And Humidity -- 171-E-Mail Spam Detection Based on Part of Speech Tagging -- 172-Web Content Extraction Using Contextual Rules -- Sirjan University of Technology, Sirjan, Iran -- 173-Game Theoretic Approaches In Modeling and Solving Smart Grid Issues -- 174-IPv6 Based RouƟng in | |
| Building AutomaƟon Network -- 175-Designing and implementation of Fuzzy Expert system for diagnosis of Herpes Zoster -- 176-Design of a System for Enhancing Web Page Readability -- 177-Low-rate False Alarm Intrustion Detection System with Genetic Algorithm Approach -- 178-Evaluation of the Algorithms of Face Identification -- 179-Using of Emotion Mining Techniques for Opinions Analysis on the Issue of Hijab -- 180-The XMLization of a Dependency Treebank in CoNLL Format for Evaluating. | |
| Linguistic Queries using XQuery -- 181-A Machine Vision System for Defect Detection of a Traveling Grate Conveyor -- 182-A Modified Digital to Digital Encoding Method to Improve the Wireless Body Area Network (WBAN) Transmission -- Young Researchers and Elite Club, Ashtian Branch, Islamic Azad University, Ashtian, Iran -- 183-A Method for Securing Username and Password gainst the KeyLogger Software Using the Logistic Map Chaos Function -- 184-Image Splicing Forgery Detection using Local Binary Pattern and Discrete Wavelet Transform -- 185-Challenges and security issues in cloud computing from two perspectives: Data security and privacy protection -- 186-Investigating NFC technology from the perspective of security, analysis of attacks and existing risk -- 187-New Approaches to Fingerprint Authentication Using Software Methods Based on Fingerprint Texture -- 188-Network Security Metric Based on Attack Duration -- Islamic Azad University, South Tehran Branch, Tehran, Iran -- 189-Intelligent Rescuer Robot for Detecting Victims Accurately in Natural Disasters -- 190-Increasing energy efficiency through maximizing channel capacity with a minimum power allocation in the Femtocell network -- 191-Classification of Persian Handwritten Digits Using Spiking Neural Networks -- 192-An efficient modeling algorithm for intrusion detecƟon systems using C5.0 and Bayesian Network structures -- 193-Web Data Extraction Using Textual Anchors -- 194-Using WBAN as an intelligent adviser gadget -- 195-Hydrogen gas detection using Metal-Oxide-Semiconductor capacitor with Ni/SiO2/Si structure -- 196-Measuring electron density, electric field and temperature of a micro-discharge air plasma jet using optical emission spectroscopy -- 197-Optimizing NAO humanoid walking using ABC algorithm -- 198-Improving wireless sensor network lifetime using layering in hierarchical routing -- 199-Implementing UTM based on PfSense platform -- 200-Survey on Sequential Pattern Mining Algorithms -- 201-A two-phase Sampling Algorithm for Social Networks -- 202-An Suggested method to University Courses Presentation Based on Cart Algorithm to Pun Universities -- 203-Eīect of Doping on OpƟcal ProperƟes of In2S3 Produced Nano Layers;Chemical DeposiƟon,Kramers-Kronig Method -- 204-Effect of Doping on Optoelectronic Properties of Tin Dioxide Layers Produced by Chemical Deposition -- 205-A review of gender separation of moving faces -- 206-A Low-Phase-Noise Millimeter Wave Quadrature VCO in 180nm CMOS Process -- 207-Noisy Image Restoration Based on Optimized Cellular Neural Network -- 208-Clustering and optimal routing in wireless sensor networks using Harmony Search Algorithm -- 209-Intelligent image watermarking robust against cropping attack -- 210-Performance Evaluation of PIDD Controller for Automatic Generation Control in Interconnected Thermal System with Reheat Turbine in Deregulated Environment. | |
| Sommario/riassunto: | Its objective is to discuss through papers, new theoretical developments, techniques and demonstrate the scientific results in the field of Mechatronics, Robotic, Electrical, Computer technology and their application to real world problems and industries. |
| Altri titoli varianti: | 2015 2nd International Conference on Knowledge-Based Engineering and Innovation |
| Titolo autorizzato: | Conference proceedings of 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI) ![]() |
| ISBN: | 1-4673-6506-8 |
| Formato: | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione: | Inglese |
| Record Nr.: | 9910136368203321 |
| Lo trovi qui: | Univ. Federico II |
| Opac: | Controlla la disponibilità qui |