فهرست مطالب

Advances in Computer Research - Volume:8 Issue: 4, Autumn 2017

Journal of Advances in Computer Research
Volume:8 Issue: 4, Autumn 2017

  • تاریخ انتشار: 1396/04/13
  • تعداد عناوین: 9
|
  • Azam Razaghi, Mehdi Golsorkhtabaramiri Pages 1-12
    Radio Frequency Identification Systems (RFID) are wireless identification technology that provide communication and identification of tagged objects through wireless communications. In some applications, a single reader is not enough to cover a specific identification area, so readers are placed very close to each other for optimal connectivity and coverage. This environment is called Dense Reader Environments (DREs). Such networks are susceptible to reader collision problems that cause decreases the performance of network. The reader-to-reader collision is an important challenge in dense reader RFID networks, that lead to the reading throughput barrier and degrade the system performance. In this paper we propose a reader anti-collision protocol based on the density of each reader in order to improve the network's throughput in dense RFID systems. Proposed algorithm develops based on GDRA but in this new approach each reader choice a time slot based on its density. Simulation results show that proposed algorithm provide higher throughput in compression with GDRA.
    Keywords: RFID, Dense RFID Systems, Anti-collision Protocol, Reader to Reader Collision, throughput
  • Hossein Sadr, Mojdeh Nazari Solimandarabi, Mahsa Mirhosseini Moghadam Pages 13-21
    detecting optical characters is the main responsibility to convert printed documents and manuscripts to digital format. In this article, detecting Persian handwritten letters by using the combination of classifiers and features were assessed, hence geometric and statistical section's features were used. In order to detect each letter, we divide it into two parts; the major and the minor parts. Then, we present some features for them. Preprocess algorithm prepare the possibility to unify dimension features for multiple words and deliver to classifier for detecting . We can get the hierarchy classification by separating the letters. After that, the optimal answer will be reached by using GA method of different SVM, ML and KNN classifications.
    Extraction algorithm of needed features was proved by using the evaluation of the basis of PCA. Empirical results represent classification of 94.3 and 92 accuracy in simple and multiple parts in 20 times repetition, respectively.
    eywords— Classifier's Combination, Optical Character recognition, Persian handwritten, Reducing feature.
    Keywords: Classifier's Combination, Optical Character recognition, Persian handwritten, Reducing feature
  • Mohammad Firoozian, Seyed Hossein Hosseinian, Mehrdad Abedi Pages 23-35
    Microgrids are applied not only generate power, but also producing a sinusoidal output voltage and supplying nonlinear loads. In this paper, using A current control scheme for selective harmonic compensation is proposed for shunt active power filters. In the active power filters using voltage source converters that are capable of dual-use technology to improve the quality of the selected compensation can be paid. Using this system, an improved individual harmonic and THD with these requirements will be modified. Simulation results show the effectiveness of the proposed method for compensating current harmonics to an acceptable level.In the microgrid some of resources connected to the grid with a converter’s. Therefore, the proposed system has the following advantages:1- Feeding the energy to the utility
    2- Harmonic elimination Function and improved power quality
    Among these resources Fuel Cells offer lower emission and higher efficiency than anther recourses such as Diesel Engines but are likely to be too expensive for many applications.
    Keywords: voltage source converter, active filter, power quality, market, Microgrid
  • Abdulbaghi Ghaderzadeh, Mehdi Kargahi, Midia Reshadi Pages 37-57
    The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough information about other peers thus they can use trust management to reason about future interactions with other peers. In fact any peer need to know the exact prediction of the trustworthiness of other peers. In the proposed approach the Bayesian network based trust management model is used to infer the trust value of task processor peers based on various aspects of their behaviors. The previous behavior of peers is considered to determine meticulous trust value of these peers in completely distributed environment. Science the trust is multifaceted concept each aspect is evaluated using a single Bayesian network to provide finer-grained inference of trust. In the proposed model, DisTriB(Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks), many aspects such as network link capacity and workload of task processor peers is used to construct the Bayesian network. The optimum time window size is found to obtain better performance too. Finally, a robust, asynchronous, gossip-based protocol is proposed that can withstand high-churn and failure rates, and can spread the trustworthiness of peers while the processing of tasks in the proposed collaborative computing system is performed. Simulation results shows that the proposed approach outperforms previous works.
    Keywords: Trust, Gossip Learning, Bayesian network, Time Window, Distributed P2P Computing Networks
  • Elham Heidari, Sajjad Tavassoli Pages 59-72
    Content-based image retrieval (CBIR) has been an active research topic in the last decade. In this paper we proposed an image retrieval method using global and local features. Firstly, for local features extraction, SURF algorithm produces a set of interest points for each image and a set of 64-dimensional descriptors for each interest points and then to use Bag of Visual Words model, a clustering algorithm is used to obtain the visual vocabulary and each resulted centroid represent a visual word. Then, images are viewed as BoVW represented as histogram. In order to improve retrieval performance, global feature is extracted by HSV color feature. Finally, this approach uses the combined local and global features as feature vectors to provide image retrieval. The COREL image database have been used for our experimental results. The experimental results show that the performance of the combination of both local and global features is much higher than each of them, which is applied separately.
    Keywords: SURF, K-Means, Bag-of-Visual Word, Color Features, CBIR
  • Ali Allahverdipour, Farhad Soleimanian Gharehchopogh Pages 73-86
    With increasing speed of information and documents on the Web, need to classify them in different categories and clusters to be felt. Clustering try to find related structures in datasets which they are not categorized, yet. Concerning the needs, a new approach for text documents categorization is presented in this paper which included three phases: pre-processing documents and selection feature, K-Means clustering and Naïve Bayes (NB) optimization. The proposed model uses K-Means and NB algorithms that utilize K-Means algorithm to find minimum distances between features from center of clusters and NB algorithm for computing the probability of each feature into documents and using them to clustering features, separately. The proposed model optimizes performance of K-Means algorithm by using NB properties in clustering. Therefore, the model overcomes to the challenges of labeling different documents and origin of K-Means algorithm which it refers to categorizing text documents as un-supervised model. Finally, the experiment results of proposed algorithm and K-Means algorithms are evaluated based on evaluation methods and are compared in validated datasets.
    Keywords: Text Categorization, Machine Learning, Feature Selection, K-Means Algorithm, Naïve Bayes algorithm
  • Shiva Taghipoureivazi Pages 87-94
    Residue Number System is a numerical system which arithmetic operations are performed parallelly. One of the main factors that affects the system’s performance is the complexity of reverse converter. It should be noted that the complexity of this part should not affect the earned speed of parallelly performed arithmetic unit. Therefore in this paper a high speed converter for moduli set {2n-1, 2n -1, 2n} is proposed which is based on Two-Part RNS and Chinese Reminder Theorem. Using this method has increased the speed of reverse converter. To have an accurate comparison both unit gate model and synthesized silicon tools are used and their parameters are compared in terms of delay and area. Converters are implemented in hardware description language and correctness for various n values are verified by simulation and execution on Cadence. As the results show, the proposed circuit has lower delay by around 21% in comparison to previous presented converter.
    Keywords: Chinese Remainder Theorem (CRT), Computer Arithmetic, parallel processing, Residue Number System (RNS), R, B Converter, VLSI Architectures
  • Mirsaeid Hosseini, Sepideh Ehsani Pages 95-105
    The wireless sensor network (WSN) is typically comprised many tiny nodes equipped with processors, sender/receiver antenna and limited battery in which it is impossible or not economic to recharge. Meanwhile, network lifespan is one of the most critical issues because of limited and not renewal used battery in WSN. Several mechanisms have been proposed to prolong network lifespan such as LEACH, HEED and CHEF, but in all of them nodes consume energy continuously. One of the promising technique is to apply dynamic sleep/wake up scheduling. In this paper, a novel sleep/wake up scheduling algorithm is proposed so-called FT-ECCKN . Each node executes sleep/wake up scheduling right after sending/receiving data where a node changes its status to sleep mode if it has at least k neighbors awake in its radius neighborhood with more residual energy in comparison with the node executing scheduler. Whenever the number of nodes is more than 2k, fuzzy TOPSIS method is used to rank nodes based on residual energy and coverage distance to select k out of number of nodes in ranking list. To evaluate the proposed algorithm, 25 scenarios are conducted in the experimental field 800X600 m^2 between 100 through 500 nodes increasing with 100 numbers and k belongs to {1,2,…5}. Totally, our proposed algorithm outperforms 23.27 percent in term of network life time in comparison with EC-CKN method for overall scenarios. Remarkable results show that the proposed algorithm is beneficial for large scale fields with dense nodes along with smallest k.
    Keywords: wireless sensor network, dynamic sleep, wake up algorithm, Fuzzy TOPSIS
  • Majid Mohammadpour, Hamid Parvin, Ali Chamkoori Pages 107-119
    Routing in computer networks has played a special role in recent years. The cause of this is the role of routing in a performance of the networks. The quality of service and security is one of the most important challenges in routing due to lack of reliable methods. Routers use routing algorithms to find the best route to a particular destination. When talking about the best path, we consider parameters like the number of hops, change times, and communication cost of sending data packet. In this study we will try to improve the routing operations using local and global smart factors. The Ants Colony Algorithm is a multi-factor solution for optimization issues. This solution has models based on the ants’ collective intelligence and has attracted some users in computer networks through converting to an efficient technology. Although the Ant is a simple insect, but a colony of them are able to perform useful tasks such as finding the shortest path to the food source and to share this information with other ants through leaving back a chemical material called pheromone. This algorithm consists of three stages. The first phase is clustering nodes of the network to smaller colonies. This phase is conducted by using learning automata network in accordance with the need of the network; For example, putting nodes in one cluster which will have more close relations in near future. The second phase is finding the routes of the network by ants, and the third phase is sending network.
    Keywords: routing, Computer Networks, Ant Colony Algorithms, learning