{"title":"Flow-sensitive points-to analysis for Java programs using BDDs","authors":"Hamid A. Toussi, A. Rasoolzadegan","doi":"10.1109/ICCKE.2014.6993367","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993367","url":null,"abstract":"Doing a flow-sensitive points-to analysis benefits many program analyses which need precise results, however, many prefer to do a flow-insensitive analysis to gain speed and overcome the memory limitations of a flow-sensitive points-to analysis. We are able to overcome these limitations by representing and manipulating points-to sets more efficiently. Binary Decision Diagrams (BDDs) have been shown to be a very efficient representation of points-to sets. A reasonable formulation of the solution is of great importance to achieve this efficiency. In this work, we formulate and employ BDDs to represent points-to sets in flow-sensitive points-to analysis for Java programs. Our method was compared with default points-to set in Soot program analysis framework (hybrid points-to set). The results are very promising and show the effectiveness of our method for sufficiently large programs.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114667286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Qualitative reinforcement learning to accelerate finding an optimal policy","authors":"Fatemeh Telgerdi, A. Khalilian, A. Pouyan","doi":"10.1109/ICCKE.2014.6993424","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993424","url":null,"abstract":"Reinforcement Learning (RL) has been known as a popular area of machine learning in which the autonomous agent improves its behavior using interactions with the environment. The problem though is that this process is often time consuming, costly and achieving an optimal policy might be rather slow. One way to alleviate this problem is qualitative learning by providing some initial knowledge from the environment for the agent. In this paper, a new algorithm has been introduced based on qualitative learning that aggregates states after some early episodes of learning. The learning then continues on the new qualitative environment. In order to evaluate the proposed algorithm, experiments on two benchmark environments have been conducted. The obtained results demonstrate the effectiveness of the new algorithm in accelerating the learning process.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116908480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Content-based human actions retrieval by a novel low complex action representation","authors":"Mohsen Ramezani, F. Yaghmaee","doi":"10.1109/ICCKE.2014.6993466","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993466","url":null,"abstract":"Fast growth of multimedia data (e.g. videos) on the web makes some challenges on regular searching methods. To this end, Content-Based Video Retrieval (CBVR) was introduced as a considerable research interest for managing the collected videos' search on the Internet. Furthermore, due to relating most of these videos to humans, human action retrieval is considered as a new topic in CBVR. In this paper, we seek to improve the accuracy of state-of-the-art CBVR retrieval algorithms with minor computational cost. In this method, local feature points of each video are extracted and the moving directions and scales of the included action are calculated using the points' gradient. The point's gradients on different axis are concatenated into a vector to represent the point. Then, each video's vectors are grouped into four clusters which their centers are considered as the main directions and scales for an action. Moreover, dissimilarity of two videos is calculated by utilizing a novel fuzzy distance measure between their group centers. The experimental results on the most used UCF YouTube dataset with 11 action categories illustrated that, in contrast to the Bag-of-Words model, our method can perform better with less computational cost.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121083599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decision making improvement in social marketing strategy through dependent multi-dimensional opinion formation","authors":"Sajjad Salehi, F. Taghiyareh","doi":"10.1109/ICCKE.2014.6993353","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993353","url":null,"abstract":"One of the most interesting topics in social network research is opinion formation. In this paper we have introduced a new dependent multi-dimensional opinion formation method. This method models agents with several dependent opinions so that modifying the agent's opinion about one issue can affect its opinion about another issue. Agents share their opinion with agents which have trusted them. A directed graph is used for modeling this trust network. It can be modified based on the opinion sharing between agents. By applying this algorithm in the marketing area, Predicted opinions could be used for creating management reports to facilitate strategy definition and decision making. The results of applying this method on the “Epinion” dataset show that agent's opinions converge to a stable state and a set of clusters have been formed in the community. Prediction of agent's opinion can be used for identifying appropriate products and customers and defining right marketing strategy.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"337 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122979330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Nadi, Shahram Golzari Hormozi, Atefeh Foroozandeh, M. H. Nadimi Shahraki
{"title":"A new method for mining maximal frequent itemsets based on graph theory","authors":"F. Nadi, Shahram Golzari Hormozi, Atefeh Foroozandeh, M. H. Nadimi Shahraki","doi":"10.1109/ICCKE.2014.6993407","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993407","url":null,"abstract":"Mining itemsets plays an important role in all fields of data mining research, such as: association rules, clustering, and classification. Mining all frequent itemsets leads to a massive number of itemsets. This problem can be reduced by finding maximal frequent itemsets (MFI). In this paper, a new method for mining all MFI based on graph theory, is proposed. In the presented method, first, a square matrix corresponding to the transaction elements of database is formed. Then the graph of this matrix is considered and its maximal complete subgraphs (maximal cliques) which are in one-to-one correspondence with MFI are found. Experimental results verify the advantages of the proposed method including: efficiency, simplicity, accuracy, reasonable time and memory space. Moreover, the presented method has good performance in the case of large databases.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121880543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Programming language criteria for model transformation evaluation","authors":"Leila Samimi-Dehkordi, A. Khalilian, B. Zamani","doi":"10.1109/ICCKE.2014.6993469","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993469","url":null,"abstract":"Model Driven Engineering (MDE) has been considered as an effective discipline in the development of software systems. One integral concept of this paradigm is model-to-model transformation which can be used in different levels of abstraction. The prominent role of Model Transformations leads to use them to refine, refactor, migrate, improve, and analyze models. Currently, there exist numerous languages for model transformation. However, a major problem is the lack of an effective and comprehensive technique for assessment and comparison of model transformation approaches. To address this problem, in this paper, a new method has been developed based on the programming language evaluation criteria. Then, the proposed method has been applied on five widely-used model transformation languages. Analyzing the results demonstrate that no language is absolutely superior to the others; but rather we are enabled to choose an appropriate language for a certain application.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128249185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Medical software runtime checking using Petri-nets & software agents","authors":"Negar Majma, S. M. Babamir","doi":"10.1109/ICCKE.2014.6993410","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993410","url":null,"abstract":"Nowadays, a new generation of Health Information systems (HIS) called e-health is developing. Health-related equipment can be defined as electronic devices that are able to be implanted in the patient's body to help his health state. Insulin pump and pacemaker device are some instances of such equipment. Most of the patients who use these devices do not have much technical knowledge. Therefore, these devices must be self-configuring and self-managing. More significantly, they should be able to tolerate and remove errors. As these equipment are often sensitive and may affect the life of human beings, their software are called vital software programs. Even a small error in these vital software programs may endanger lives of human being. The runtime test of these software programs is necessary. This article aims at presenting a solution to verify the performance of these devices. Pacemaker device as a sample is studied. The proposed strategy suggests the application of reactive model-based software agents which play the role of an oracle in a software test. This agent's knowledgebase is obtained by Petri net drawn based on the proper state of device implementation. Petri net first turns into matrix thanks to linear algebra and then changes to rules which the agent uses to make decisions. Using its intelligence, the agent directs the error, if identified, to the safe mode. The safe mode is meant to be the patient's proper heart rate. Checking at runtime by use of the agent in addition to the assurance of accurate performance of device can make quick decision makings at crisis time possible for those devices related to human health.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129191610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Driving point impedance restriction in synthesis of linear antenna arrays using competition over resources optimization algorithm","authors":"R. Gholami, B. Zakeri, S. Mohseni, H. Abedi","doi":"10.1109/ICCKE.2014.6993465","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993465","url":null,"abstract":"In the recent years, many heuristic optimization algorithms derived from the behavior of biological or physical systems in nature have been developed. In this paper, we propose a new optimization algorithm based on competitive behavior of group animals. The competition gradually results in an increase in population of wealthy group which gives a fast convergence to the optimization algorithm. In the following, after a detailed explanation of the algorithm and pseudo code, we compare it with particle swarm optimizations as a famous heuristic algorithm. The proposed method is used to determine an optimal set of amplitude weights of antennas and element spacing that satisfy the optimal goal during constant first null beamwidth (FNBW) for aperiodic linear array. It is to be noted that the desired prescribed nulls depth and side lobes level (SLL) is achieved simultaneously with the narrowest possible FNBW. In addition, because of practical consideration in array antennas, restriction of driving-point impedance (DPI) of each element is proposed during pattern synthesis. Final array factor without and with impedance optimization are compared with uniform amplitude excitation and equal element spacing array factor as reference. The proposed algorithm on known array antenna synthesis, shows faster and superior results compared to other optimization algorithms.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114641680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saeid Ashouri, Hossein Khosraviroshkhari, Seyed Amin Hosseini Seno, M. H. Yaghmaee Moghaddam
{"title":"VoIP performance comparison in wireless networks with different encryption methods","authors":"Saeid Ashouri, Hossein Khosraviroshkhari, Seyed Amin Hosseini Seno, M. H. Yaghmaee Moghaddam","doi":"10.1109/ICCKE.2014.6993350","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993350","url":null,"abstract":"VoIP (Voice over Internet Protocol) popularity is increasing due to its various benefits therefore it is a popular technology used in Wireless networks. Hence, Quality of Service in terms of its specific parameters has to be satisfied. VoIP Performance is generally limited to specific factors such as MOS, R-Factor, Jitter, Delay which will be described in this paper. We then investigate and compare these factors for different Wireless conditions. The comparison is made over a wireless media with variable encryption method and performance parameters are calculated for each situation. The test-bed is strictly managed to provide a same condition in terms of the resources and the devices location within all tests and the experimental results are presented. We represent how VoIP performance is influenced under different wireless situations. We conclude that under the same bandwidth condition, changing the encryption method will not influence VoIP MOS and R-Factor while changes Delay and Jitter.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":" 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113953039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hierarchical fuzzy approach for adaptation of pre-given parameters in an interval type-2 TSK fuzzy neural structure","authors":"Shirin Fartash Toloue, M. Akbarzadeh-T.","doi":"10.1109/ICCKE.2014.6993352","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993352","url":null,"abstract":"In self-evolving type-2 fuzzy neural structures, there are several pre-given parameters that are conventionally defined before the runtime by using trial-and-error. This approach is very time-consuming and does not guarantee that the selected values are the most appropriate ones for ensuring high convergence speed. To overcome these drawbacks, here a hierarchical fuzzy controller is proposed. The proposed hierarchical controller helps to increase precision since it dynamically adjusts pre-given parameters online by considering the error changes. Moreover, the proposed structure helps to reduce complexity and avoid “curse of dimensionality” which is a common phenomenon when the number of input variables to the fuzzy system is large. Hence, this structure is suitable for type-2 fuzzy neural systems which usually have several pre-given parameters to be adjusted. The proposed hierarchical fuzzy controller is applied to an interval type-2 TSK fuzzy neural network and the performance is investigated by comparing the results with trial-and-error approach in two different applications of identification and control. The simulation results indicate that the proposed method can effectively cover the drawbacks of trial-and-error approach while it enhances the precision of the system.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122267987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}