Pub Date : 2015-02-20DOI: 10.14419/JACST.V4I1.4162
Nima Afifi, H. Tavakoli
Today, mobile computing is one of the important issues in computer and network sciences. Using the processing power of mobile devices purposefully for solving complex issues is one of the research fields for researchers. One of the important issues in the optimization which needs a high processing power for finding the best possible answer is travelling salesman problem. In this paper, by providing a method based on the distributed parallel genetic algorithm on a number of mobile nodes in the Ad Hoc network, it was attempted to increase the speed of finding the best answer for the travelling salesman algorithm.
{"title":"The distributed parallel genetic algorithm on the ad hoc network","authors":"Nima Afifi, H. Tavakoli","doi":"10.14419/JACST.V4I1.4162","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4162","url":null,"abstract":"Today, mobile computing is one of the important issues in computer and network sciences. Using the processing power of mobile devices purposefully for solving complex issues is one of the research fields for researchers. One of the important issues in the optimization which needs a high processing power for finding the best possible answer is travelling salesman problem. In this paper, by providing a method based on the distributed parallel genetic algorithm on a number of mobile nodes in the Ad Hoc network, it was attempted to increase the speed of finding the best answer for the travelling salesman algorithm.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121688096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-02-18DOI: 10.14419/JACST.V4I1.4094
M. Farahmandian, A. Hatamlou
Various meta-heuristic optimization approaches have been recently created and applied in different areas. Many of these approaches are inspired by swarm behaviors in the nature. This paper studies the solving optimization problems using Black Hole Algorithm (BHA) which is a population-based algorithm. Since the performance of this algorithm was not tested in mathematical functions, we have studied this issue using some standard functions. The results of the BHA are compared with the results of GA and PSO algorithms which indicate that the performance of BHA is better than the other two mentioned algorithms.
{"title":"Solving optimization problems using black hole algorithm","authors":"M. Farahmandian, A. Hatamlou","doi":"10.14419/JACST.V4I1.4094","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4094","url":null,"abstract":"Various meta-heuristic optimization approaches have been recently created and applied in different areas. Many of these approaches are inspired by swarm behaviors in the nature. This paper studies the solving optimization problems using Black Hole Algorithm (BHA) which is a population-based algorithm. Since the performance of this algorithm was not tested in mathematical functions, we have studied this issue using some standard functions. The results of the BHA are compared with the results of GA and PSO algorithms which indicate that the performance of BHA is better than the other two mentioned algorithms.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116211710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-02-16DOI: 10.14419/JACST.V4I1.4211
Saeed Ahmadluei
The probability of failure free software operation for a specified period of time in a specified environment is called Reliability, it is one of the attributes of software quality and study about it come back to 1384. Exposition and spreading of new software systems and profound effect of it to human life emphasize the importance of software reliability analysis, until it poses formal definition at 1975. First race of reliability analysis methods that we called classic methods has stochastic process approach and in this way, attempt to predict the software behavior in future. Due to the ambiguity in fruitfulness of these solutions the challenge about reliability analysis continued till now. Great tendency in applying intelligence systems at variety of applications can be seen at 90 decade, and software reliability attracts some research direction to itself. Until now variety of methods in reliability analysis on the base of intelligence systems approach exhibited. In this survey the taxonomy of these methods represented with brief description of each one. Also comparison between these methods can be seen at the end of survey.
{"title":"Taxonomy of intelligence software reliability model","authors":"Saeed Ahmadluei","doi":"10.14419/JACST.V4I1.4211","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4211","url":null,"abstract":"The probability of failure free software operation for a specified period of time in a specified environment is called Reliability, it is one of the attributes of software quality and study about it come back to 1384. Exposition and spreading of new software systems and profound effect of it to human life emphasize the importance of software reliability analysis, until it poses formal definition at 1975. First race of reliability analysis methods that we called classic methods has stochastic process approach and in this way, attempt to predict the software behavior in future. Due to the ambiguity in fruitfulness of these solutions the challenge about reliability analysis continued till now. Great tendency in applying intelligence systems at variety of applications can be seen at 90 decade, and software reliability attracts some research direction to itself. Until now variety of methods in reliability analysis on the base of intelligence systems approach exhibited. In this survey the taxonomy of these methods represented with brief description of each one. Also comparison between these methods can be seen at the end of survey.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117266030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-02-16DOI: 10.14419/JACST.V4I1.4012
Masumeh Islami Nasab, R. Javidan
Calculating article similarities enables users to find similar articles and documents in a collection of articles. Two similar documents are extremely helpful for text applications such as document-to-document similarity search, plagiarism checker, text mining for repetition, and text filtering. This paper proposes a new method for calculating the semantic similarities of articles. WordNet is used to find word semantic associations. The proposed technique first compares the similarity of each part two by two. The final results are then calculated based on weighted mean from different parts. Results are compared with human scores to find how it is close to Pearson’s correlation coefficient. The correlation coefficient above 87 percent is the result of the proposed system. The system works precisely in identifying the similarities.
{"title":"A new approach for finding semantic similar scientific articles","authors":"Masumeh Islami Nasab, R. Javidan","doi":"10.14419/JACST.V4I1.4012","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4012","url":null,"abstract":"Calculating article similarities enables users to find similar articles and documents in a collection of articles. Two similar documents are extremely helpful for text applications such as document-to-document similarity search, plagiarism checker, text mining for repetition, and text filtering. This paper proposes a new method for calculating the semantic similarities of articles. WordNet is used to find word semantic associations. The proposed technique first compares the similarity of each part two by two. The final results are then calculated based on weighted mean from different parts. Results are compared with human scores to find how it is close to Pearson’s correlation coefficient. The correlation coefficient above 87 percent is the result of the proposed system. The system works precisely in identifying the similarities.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133098021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-02-13DOI: 10.14419/JACST.V4I1.3979
G. Hanji, M. V. Latte
During acquisition, transmission, storage and retrieval, quite often digital images become noised and mask the important details of an image and also present themselves with an ugly look. Such images if not processed properly, become useless for subsequent image processing operations like segmentation, classification etc. Hence the quality improvement (through denoising) of such noisy images becomes an important operation in the field of image processing. This paper proposes a two stage detection-estimation based filtering system to suppress random valued impulse noise from digital grey and color images based on neighborhood statistics of pixels of the working window under consideration. An adaptive working window and the adaptive tolerance computed from the pixels belonging to the current filtering window facilitates an appropriate detection of noisy pixels in the first phase, followed by the simple and computationally efficient restoration strategy in the second stage. The Simulation results prove that the proposed scheme exhibits much superior performance in comparison with other state of art image filtering methods in suppressing the random valued impulse noise from the digital grey and color images.
{"title":"A novel adaptive tolerance filter for random valued impulse noise suppression in digital grey and color images","authors":"G. Hanji, M. V. Latte","doi":"10.14419/JACST.V4I1.3979","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.3979","url":null,"abstract":"During acquisition, transmission, storage and retrieval, quite often digital images become noised and mask the important details of an image and also present themselves with an ugly look. Such images if not processed properly, become useless for subsequent image processing operations like segmentation, classification etc. Hence the quality improvement (through denoising) of such noisy images becomes an important operation in the field of image processing. This paper proposes a two stage detection-estimation based filtering system to suppress random valued impulse noise from digital grey and color images based on neighborhood statistics of pixels of the working window under consideration. An adaptive working window and the adaptive tolerance computed from the pixels belonging to the current filtering window facilitates an appropriate detection of noisy pixels in the first phase, followed by the simple and computationally efficient restoration strategy in the second stage. The Simulation results prove that the proposed scheme exhibits much superior performance in comparison with other state of art image filtering methods in suppressing the random valued impulse noise from the digital grey and color images.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121180153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-02-06DOI: 10.14419/JACST.V4I1.4129
Mohamed Sayed
The use of electronic response systems in classrooms can be effective, especially when coupled with a method allowing a question to be broken into manageable interactive questions. This paper develops the use of electronic response systems as a part of leading assessment delivery and data collection solutions in a blended learning environment. The technology that is the subject of this research consists of thirty-button response cards that transmit student responses to a receiver connected to the instructor laptop. The electronic response systems are proven to enhance the effective instructions, increase retentions, engage participants, and immediately assess understanding.
{"title":"An approach to implement interactive teaching in blended learning environments","authors":"Mohamed Sayed","doi":"10.14419/JACST.V4I1.4129","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4129","url":null,"abstract":"The use of electronic response systems in classrooms can be effective, especially when coupled with a method allowing a question to be broken into manageable interactive questions. This paper develops the use of electronic response systems as a part of leading assessment delivery and data collection solutions in a blended learning environment. The technology that is the subject of this research consists of thirty-button response cards that transmit student responses to a receiver connected to the instructor laptop. The electronic response systems are proven to enhance the effective instructions, increase retentions, engage participants, and immediately assess understanding.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125103049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-01-20DOI: 10.14419/JACST.V4I1.4038
M. Ghasemi, M. Khalili
The use of artificial neural networks in different areas of engineering science is growing by the day. The significant proportions of research in medical engineering, Therefore in this paper have tried to implemented MLP model with 47 parameters for diagnosis of bipolar disorder. Parameters such as: lack of pleasure, feelings of guilt, worthlessness, lack of success, mental anxiety, somatic anxiety disorder, the disorder of interest, etc. in next part, we done the manipulation structure of MLP model, for this work switching the function in layers. And comparing the error of manipulation structure with previous manipulation. We concluded with using purelin function in layers, the error of diagnosis reduces 4% and this value is an acceptable value.
{"title":"An optimized MLP model to diagnosis the bipolar disorder","authors":"M. Ghasemi, M. Khalili","doi":"10.14419/JACST.V4I1.4038","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.4038","url":null,"abstract":"The use of artificial neural networks in different areas of engineering science is growing by the day. The significant proportions of research in medical engineering, Therefore in this paper have tried to implemented MLP model with 47 parameters for diagnosis of bipolar disorder. Parameters such as: lack of pleasure, feelings of guilt, worthlessness, lack of success, mental anxiety, somatic anxiety disorder, the disorder of interest, etc. in next part, we done the manipulation structure of MLP model, for this work switching the function in layers. And comparing the error of manipulation structure with previous manipulation. We concluded with using purelin function in layers, the error of diagnosis reduces 4% and this value is an acceptable value.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124947717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-01-16DOI: 10.14419/JACST.V4I1.3982
F. Majidi, A. Harounabadi
Considering the promotion and complexities of software systems and need to services for repair and updating, success of this system is extremely dependent to its architecture and design. Architectural techniques due to being used by the architectures frequently have specified effect on qualitative characteristics. If this effect is quantitative and measurable for each technique will enable the architect to have more care and convenience for evaluation of design and architectural designs. In this study, at first to show the structure and behavior of software architecture using blackboard technique, component diagram and unified modeling language activity diagram together with required data in relation to nonfunctional needs as stereotypes and labels were used. Later, upon converting the actual model to the formal model, requirements for system performance evaluation on the formal model is provided. Upon analyzing the results, it is observed that the offered method can evaluate the performance of software architecture based on blackboard technique at the design age.
{"title":"Presentation of an executable model for evaluation of software architecture using blackboard technique and formal models","authors":"F. Majidi, A. Harounabadi","doi":"10.14419/JACST.V4I1.3982","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.3982","url":null,"abstract":"Considering the promotion and complexities of software systems and need to services for repair and updating, success of this system is extremely dependent to its architecture and design. Architectural techniques due to being used by the architectures frequently have specified effect on qualitative characteristics. If this effect is quantitative and measurable for each technique will enable the architect to have more care and convenience for evaluation of design and architectural designs. In this study, at first to show the structure and behavior of software architecture using blackboard technique, component diagram and unified modeling language activity diagram together with required data in relation to nonfunctional needs as stereotypes and labels were used. Later, upon converting the actual model to the formal model, requirements for system performance evaluation on the formal model is provided. Upon analyzing the results, it is observed that the offered method can evaluate the performance of software architecture based on blackboard technique at the design age.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114455327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-01-14DOI: 10.14419/JACST.V4I1.3935
Hossein Moradi, Hossein Kardan Moghaddam
In this article, we’ve tried to examine the hypothesis of the robustness of a form by using CAPTCHA against CSRF and login CSRF attacks. Our investigations showed that unlike public opinion, common attacks to bypass CAPTCHAs such as Optical Character Recognition (OCR) and 3rd party human attacks are not applicable in the CSRF case and instead, Clickjacking is the most important scenario of CSRF and login CSRF attacks against a secure session-dependent CAPTCHA form. Remember that the Clickjacking is also applicable to bypass the well-known CSRF protections, such as the secret token and the Referer header. Therefore, although the frequent application of CAPTCHA on every page of a website negatively impacts the user experience, but the robustness of a robust session-dependent CAPTCHA against the CSRF and login CSRF attacks is almost the same as the session-dependent security token. Moreover, when a website is using a session-independent or week pattern of CAPTCHA, attackers can bypass the CAPTCHAs and launch the CSRF or login CSRF attacks by using XSS, session hijacking, replay attacks or submitting a random response.
{"title":"Strategies and scenarios of CSRF attacks against the CAPTCHA forms","authors":"Hossein Moradi, Hossein Kardan Moghaddam","doi":"10.14419/JACST.V4I1.3935","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.3935","url":null,"abstract":"In this article, we’ve tried to examine the hypothesis of the robustness of a form by using CAPTCHA against CSRF and login CSRF attacks. Our investigations showed that unlike public opinion, common attacks to bypass CAPTCHAs such as Optical Character Recognition (OCR) and 3rd party human attacks are not applicable in the CSRF case and instead, Clickjacking is the most important scenario of CSRF and login CSRF attacks against a secure session-dependent CAPTCHA form. Remember that the Clickjacking is also applicable to bypass the well-known CSRF protections, such as the secret token and the Referer header. Therefore, although the frequent application of CAPTCHA on every page of a website negatively impacts the user experience, but the robustness of a robust session-dependent CAPTCHA against the CSRF and login CSRF attacks is almost the same as the session-dependent security token. Moreover, when a website is using a session-independent or week pattern of CAPTCHA, attackers can bypass the CAPTCHAs and launch the CSRF or login CSRF attacks by using XSS, session hijacking, replay attacks or submitting a random response.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"44 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121012383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-01-11DOI: 10.14419/JACST.V4I1.3994
A. Ansari, M. Khalili
artificial neural networks are used extensively in diagnosis are used and the system is able to detect a variety of conditions used in this study for diagnosis of major depressive disorder, 45 parameters were considered Implementation and operation using SVM model the use of different network error checked Education.
{"title":"Using of SVM for diagnosis of major depressive disorder","authors":"A. Ansari, M. Khalili","doi":"10.14419/JACST.V4I1.3994","DOIUrl":"https://doi.org/10.14419/JACST.V4I1.3994","url":null,"abstract":"artificial neural networks are used extensively in diagnosis are used and the system is able to detect a variety of conditions used in this study for diagnosis of major depressive disorder, 45 parameters were considered Implementation and operation using SVM model the use of different network error checked Education.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125568888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}