S. H. Klidbary, S. Shouraki, A. Ghaffari, Soroush Sheikhpour Kourabbaslou
{"title":"Outlier robust fuzzy active learning method (ALM)","authors":"S. H. Klidbary, S. Shouraki, A. Ghaffari, Soroush Sheikhpour Kourabbaslou","doi":"10.1109/ICCKE.2017.8167903","DOIUrl":"https://doi.org/10.1109/ICCKE.2017.8167903","url":null,"abstract":"Active Learning Method (ALM) is a fuzzy learning method and is inspired by the approach of human's brain toward understanding complicated problems. In this algorithm, a Multi-Input Single-Output system is modeled by some Single-Input Single-Output sub-systems. Each sub-model tries to capture the input-output relationship of each sub-system on a plane called IDS plane. The output of the original system is then approximated by fuzzy aggregation of the output of all submodels. The most important step in ALM, though, is to choose an appropriate radius for ink drop spread, to achieve desirable result. In this paper, a novel method, based on the idea of K-Nearest Neighbor (KNN) algorithm, is proposed to locally choose appropriate radius for ink drop spread according to the density of the data points in each region of the IDS plane. It will be shown that by this criterion, not only the sparsity of data points in different regions of the dataset is taken into account, but also the algorithm will be equipped with the capability to identify and filter out the outliers. The mathematical analysis of this method is provided to confirm its validity and simulations were conducted on various datasets in order to evaluate its efficiency.","PeriodicalId":151934,"journal":{"name":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128693944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation and evaluation of OpenADR standard with AMI support in cloud computing","authors":"M. Khorasani, Lida Safarzadeh, M. Moghaddam","doi":"10.1109/ICCKE.2017.8167931","DOIUrl":"https://doi.org/10.1109/ICCKE.2017.8167931","url":null,"abstract":"The evolutions in the electrical industry in recent years cause many challenges and require new means and methods to deal with it. Changes in the electrical systems are inevitable with the advent of challenges and issues in energy markets. The rapid expansion of energy systems required smart grid and services like advanced metering infrastructure (AMI) with two-way interaction. Since devices in smart grid are producing large volumes of data and require vast storage capacity and processing power to analyze it, these services are deployed in a small area. As the count of customers and the amount of producing data grows, we need a scalable platform. Cloud computing provides a platform that matches these requirements and can be used as a solution for smart grids. Interactions between utilities and customers are done by OpenADR standard. This standard used for sending and receiving demand response signals. We implement OpenADR with AMI support in cloud computing environments and evaluate critical parameters such as required bandwidth and resources for deploying this standard. We formulate the relations between price and response time. Utilities and third-party companies can use this result to forecast amount of resources and investment for building infrastructure and deploying this standard.","PeriodicalId":151934,"journal":{"name":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115323005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A tow-level security approach for wireless sensor networks","authors":"Atefe Hosseiny, N. Farzaneh","doi":"10.1109/ICCKE.2017.8167902","DOIUrl":"https://doi.org/10.1109/ICCKE.2017.8167902","url":null,"abstract":"In recent decades, the significant expansion and popularity of wireless sensor networks in various applications have attracted the attention of many researchers. Energy and security restrictions are main challenges for the researchers. The application of these networks in inaccessible and dangerous environments and wireless communications between nodes have led them to be subjected to direct attacks; also wireless sensor networks in addition to external attacks face a new challenge of internal attacks that actually have made the methods such as encryption and authentication insufficient and thus new security procedures are needed. Recently, trust as a new and efficient method and a soft security mechanism could deal with internal attacks and provide optimum security in these networks. In this scheme a new security method is provided for wireless sensor networks composed of two main levels. In the first level a key agreement and a new authentication method based on elliptic curve cryptography are used to deal with external attacks. In the second level, a trust-based method is provided to deal with internal attacks. Comparison and simulation suggest that the proposed design in addition to focusing on reducing the energy consumption was successful in increasing network security and resistance against many attacks.","PeriodicalId":151934,"journal":{"name":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122764792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient implementation of a generalized convolutional neural networks based on weighted euclidean distance","authors":"Keivan Nalaie, Kamaledin Ghiasi-Shirazi, Modhammad-R. Akbarzadeh-T.","doi":"10.1109/ICCKE.2017.8167877","DOIUrl":"https://doi.org/10.1109/ICCKE.2017.8167877","url":null,"abstract":"Convolutional Neural Networks (CNNs) are multi-layer deep structures that have been very successful in visual recognition tasks. These networks basically consist of the convolution, pooling, and the nonlinearity layers, each of which operates on the representation produced by the preceding layer and generates a new representation. Convolution layers naturally compute some inner product between a plane represented by the weight parameters and input patches. Recently, Generalized Convolutional Neural Networks (GCNN) have been introduced which justify the use of some kernels or distance functions in place of the inner product operator inside the convolution layers. Although GCNNs gained interesting results on the MNIST dataset, their application to more challenging datasets is hindered by lack of an efficient implementation. In this paper, we focus on a specific generalized convolution operator which is based on the weighted L2 norm distance (WL2Dist). By replacing the nonlinear part with three convolution operators and using effective matrix-matrix multiplications, we were able to efficiently compute the WL2Dist convolution layer both on CPU and GPU. Our experiments show that, on CPU (GPU), the proposed implementation of the WL2Dist layer achieves a 5.5x (21x) speed-up over the initial BLAS-based (CUDA-based) implementations.","PeriodicalId":151934,"journal":{"name":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126322946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart cloud-assisted computation offloading system: A dynamic approach for energy optimization","authors":"Shabnam Namazkar, M. Sabaei","doi":"10.1109/ICCKE.2017.8167948","DOIUrl":"https://doi.org/10.1109/ICCKE.2017.8167948","url":null,"abstract":"Recently, computation offloading has become one of the common and efficient ways to minimize the energy expenditure. Considering the aspects of mobile-cloud communication, energy optimization is from the necessities of this offloading. Moreover, the variable and mobile states of mobile devices environments have a significance on this communication. In this article, we are going to suggest an adaptable approach for computation offloading by appropriate choosing from the free resources of the neighboring devices with a smart and automatic way. Here, the significance is that the most appropriate resources close by will be chosen conditioning the estimation that other devices around will not complete the computation successfully. Thus, other devices are served as a mean for setting a connection to the cloud and offloading the computation on it. In this approach, we have an application of MapReduce programming model and algorithm of Lyapunov to optimize the expenditure of energy by considering a time limitation for the whole process of computation. Ultimately, the simulations show that in our suggested approach the expenditure of energy has been significantly optimized despite the state of variety and dynamicity in the features and environments of devices.","PeriodicalId":151934,"journal":{"name":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122282227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling energy and performance of Phoenix++ based parallel programs","authors":"H. Shafiei, Hamid Noori, A. Harati","doi":"10.1109/ICCKE.2017.8167888","DOIUrl":"https://doi.org/10.1109/ICCKE.2017.8167888","url":null,"abstract":"In order to provide more processing power, computer systems manufacturers are trying to increase the performance of their products. Nowadays, multi-core processors are being used as a solution to reach more performance via thread level parallelism. MapReduce are considered as one of the most appropriate models of programming for data parallelism. Different frameworks have been developed based on this model. Phoenix++ is one of these frameworks that has been implemented for shared memory systems. Since computing is becoming more and more important in people's life, more and more energy spent computation. Energy is also becoming as big challenge in human life. Therefore doing energy efficient computation is becoming very important. For a long time, performance was considered as the most important metric for computing systems. However energy consumption has become as important as performance these days. We offer models in this paper to determine a system configuration for parallel programs based on Phoenix++ framework in way to minimize energy delay product (EDP) by selecting proper number of active cores, the number of threads, and working frequency level. The model accuracy is evaluated by running experiments on a real system.","PeriodicalId":151934,"journal":{"name":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132231381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward an emotional opinion formation model through agent-based modeling","authors":"A. Mansouri, F. Taghiyareh","doi":"10.1109/ICCKE.2017.8167883","DOIUrl":"https://doi.org/10.1109/ICCKE.2017.8167883","url":null,"abstract":"In the last few decades, many opinion formation models have been proposed to describe how opinion interactions among individuals result in different distributions of opinions within social systems. Emotion plays a key role when people try to influence others' opinions, but applying emotion to opinion formation models has attracted little attention. In this paper, we discuss how emotion can affect opinion formation in social systems. We have used the agent-based modeling and simulation approach due to the complexity of the system. For emotion modeling, we have used the circumplex model of affect, a dimensional model comprised of two dimensions: valence and arousal. The idea has been applied to the Deffuant basic opinion formation model, which is a continuous opinion, nonlinear, and discrete time model. The simulation results of the model show how output parameters of the same opinion formation model such as convergence time, opinion distribution, the number of resulting clusters, and the trend of opinions approaching the final distribution of opinions are affected by the emotional behavior of individuals. Therefore, the results lead us to conclude that considering emotional behavior alongside opinion interaction rules could produce more realistic opinion formation models.","PeriodicalId":151934,"journal":{"name":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133533813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characterization of schizophrenia by linear kernel canonical correlation analysis of resting-state functional MRI and structural MRI","authors":"Mina Mirjalili, G. Hossein-Zadeh","doi":"10.1109/ICCKE.2017.8167925","DOIUrl":"https://doi.org/10.1109/ICCKE.2017.8167925","url":null,"abstract":"In almost every mental disorder, there are deficiencies in both structure and function of the brain. So the need for analyzing complementary modalities that project all aspects of the brain is rising. The most severe kind of these disorders is schizophrenia. The main cause of schizophrenia is still unknown. Therefore, analyzing resting-state fMRI (rs-fMRI) and structural MRI (sMRI) to investigate the differences between schizophrenia and healthy control subjects is going to be helpful. For this aim, we used linear kernel canonical correlation analysis (L-kCCA). We extracted gray matter volume and amplitude of low frequency fluctuation (ALFF) as features for sMRI and rs-fMRI respectively. In this method we applied CCA to much lower dimension data compared to real one. In other words, we applied CCA to similarity matrices which were representative of the correlation of voxel values between subjects. So, the time and the need for memory are reduced. In addition to inter-subject variations, this method allows us to extract the regions which are associated to the subjects' variation in the two modalities. The method was applied to the images of 11 schizophrenia and 11 matched healthy control subjects which were acquired in Imam Khomeini hospital, Tehran, Iran. Based on the results, we can observe gray matter volume reduction in schizophrenia in precuneus, temporal and frontal regions. In frontal, temporal and occipital regions the ALFF is higher in healthy control subjects than schizophrenia and in precentral and right and left insula regions brain activity at rest is lower than patients.","PeriodicalId":151934,"journal":{"name":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124794850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing trust accuracy among online social network users utilizing data text mining techniques in apache spark","authors":"Pezhman Adib, S. Alirezazadeh, A. Nezarat","doi":"10.1109/ICCKE.2017.8167892","DOIUrl":"https://doi.org/10.1109/ICCKE.2017.8167892","url":null,"abstract":"The number of users and amount of data transfer are increasing per each minute with the rapid growth of social network platforms on the web while the users have no certain knowledge of each other. Thus, with the overwhelming spread of the internet and such bulk of data, people find it arduous to identify valid comments. Establishing a genuine and more accurate trust becomes harder if classical processing is used especially with the presence of profitable, oriented, devious and narrow-minded comments. Various methods have been employed so far to evaluate reliable users most of which combine trust algorithms, subject classification, and comment mining methods. Researches reveal that the majority of social network users firstly take into account an overall number of public trust standards such as the number of friends, followers, followings, and likes of individuals in order to trust them. However, a malicious user could manipulate this trust by building virtual qualities. Accordingly, this study supplies a dictionary of malicious words and weighs them by combining trust standards and text mining users' tweets. It is intended to identify malicious users and analyze their behavior to proceed a more accurate trust within distributed execution in Spark environment for providing a quicker call. The results of this study show that the suggested method benefits from a high diagnostic accuracy.","PeriodicalId":151934,"journal":{"name":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125707972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modular dynamic deep denoising autoencoder for speech enhancement","authors":"Razieh Safari, S. Ahadi, Sanaz Seyedin","doi":"10.1109/ICCKE.2017.8167886","DOIUrl":"https://doi.org/10.1109/ICCKE.2017.8167886","url":null,"abstract":"Deep Denoising Autoencoder (DDAE) is an effective method for noise reduction and speech enhancement. However, a single DDAE with a fixed number of frames for neural network input cannot extract contextual information sufficiently. It has also less generalization in unknown SNRs (signal-to-noise-ratio) and the enhanced output has some residual noise. In this paper, we use a modular model in which three DDAEs with different window lengths are stacked. Experimental results showes that our proposed architecture, namely modular dynamic deep denoising autoencoder (MD-DDAE) provides superior performance in comparison with the traditional DDAE models in different noisy conditions.","PeriodicalId":151934,"journal":{"name":"2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125928234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}