{"title":"Price and QoS competition in cloud market by using cellular learning automata","authors":"Shakiba Kheradmand, M. Meybodi","doi":"10.1109/ICCKE.2014.6993349","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993349","url":null,"abstract":"Recently cloud computing has gained enormous attention in the industry with an increasing number of cloud service providers. Their tendency to cloud computing is of benefit for cloud users, as the increasing number of cloud providers results in a competitive market for attracting and satisfying new and current cloud users. In this paper, price and quality of service (QoS) competition in an oligopoly cloud market is presented. To do so, nature of a non-cooperating competition in an oligopoly cloud market is characterized to understand how the cloud providers select optimum prices, without knowledge of decisions made by cloud users. An M/M/c queue is used to model the cloud provider and a utility function is defined for cloud users regarding their requirements. Competition for finding optimal prices was modeled by using cloud providers as cells of CLA and applying CALA in each cell for learning pricing behavior. Finally, the effect of model parameters is investigated.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123732382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sajad Khodarahmi Jahan Abad, Mohammad-Reza Zare-Mirakabad, M. Rezaeian
{"title":"An approach for classifying large dataset using ensemble classifiers","authors":"Sajad Khodarahmi Jahan Abad, Mohammad-Reza Zare-Mirakabad, M. Rezaeian","doi":"10.1109/ICCKE.2014.6993440","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993440","url":null,"abstract":"Efficiency of general classification models in various problems is different according to the characteristics and the space of the problem. Even in a particular issue, it may not be distinguished a special privilege for a classifier method than the others. Ensemble classifier methods aim to combine the results of several classifiers to cover the deficiency of each classifier by others. This combination faces high computational complexity if it includes a lazy base classifier, especially when handling large datasets. In this paper a method is proposed to combine the results of classifiers, which uses clustering as a part of the training, resulting in reducing the computational complexity, while it provides an acceptable accuracy. In this method the base classifiers are trained by a part of the input dataset, first. Then, according to the labels defined by the base classifiers, the clusters are created for another part of dataset. Finally, the samples contained in the clusters, the cluster that each sample belongs to it, and the distance of each sample to the center of all clusters are given to an artificial neural network and the final class label of test data is determined by the neural network. Experiments on several datasets show advantages of proposed model.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128702181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new model predictive current controller with common mode voltage alleviation in three-phase inverters","authors":"N. Safari, A. Khoshooei, J. Moghani","doi":"10.1109/ICCKE.2014.6993335","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993335","url":null,"abstract":"Pulse width modulation controlled inverters produce Common-Mode Voltage (CMV), which is the main culprit of many system drawbacks ranging from Electromagnetic Interference (EMI) issues to bearing damage and insulation aging. Former methods for common-mode voltage reduction based on voltage control cause a great deal of extra harmonic distortion in output currents. In this paper, a method named as Near State based Model Predictive Control (NS-MPC) is proposed which by using Model Predictive Control (MPC) algorithm operating in a low sampling frequency and applying the real non-zero state vectors of the converter used together with new virtual state vectors produced by Near State PWM (NSPWM) generates the switching pattern in each sampling cycle. Theory and simulations show that this proposed method exhibits superior common mode voltage reduction along with a generally satisfactory performance.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129619977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facial emotion recognition method based on Pyramid Histogram of Oriented Gradient over three direction of head","authors":"Sh. Shokrani, P. Moallem, M. Habibi","doi":"10.1109/ICCKE.2014.6993346","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993346","url":null,"abstract":"Today Human Computer Interaction (HCI) is one of the most important topics in machine vision and image processing fields. Through features can get beneficial information about the variety of emotions and gestures which are produced by the movements of facial major parts. In this paper we presented the technique of Pyramid Histogram of Oriented Gradient for feature extraction and compare it with gabor filters. Six basic facial expressions plus the neutral pose are considered in the evaluations. The KNN and SVM techniques are used in the classification phase. Unlike most emotion detection approaches that focus on frontal face view this method concentrates on three views of the face and can easily be generalized to other poses and feelings. We have tested our algorithm on the Radboud faces database (RaFD) over three directions of head (frontal, 45 degree to the right and 45 degree to the left). Cohn-Kanade (CK+) and JAFFE are two other databases used in this work. The experiments using the proposed method demonstrate favorable results. In the best condition by using Pyramid Histogram Of Oriented Gradient plus KNN classification, the success rates were 100, 96.7, 98.1, 98.3 and 98.9 % for RaFD (frontal pose), RaFD (45 degree to the right), RaFD (45 degree to the left), JAFFE and CK+ databases respectively.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127473874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Loss-tolerant confidential efficient authenticated broadcast scheme","authors":"H. Nasiraee, J. B. Mohasefi","doi":"10.1109/ICCKE.2014.6993363","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993363","url":null,"abstract":"In symmetric cryptography, TESLA variants are well-known valuable source authentication broadcast scheme that are secure and efficient. But TESLA, versus asymmetric approaches, do not provide confidentiality and immediate authentication, need the synchronization of parties, are not flexible due to synchronization and finally have delayed verification and overflow problem. In this paper, we have proposed a novel secure broadcast protocol that is simple, secure and efficient like TESLA variants, to overcome shortages of TESLA variants. The method provides confidentiality and has two immediate and non-immediate authentication modes. It is loss-tolerant intrinsically, which with the best of our knowledge is the first loss-tolerant confidential authenticated broadcast scheme on lossy channels, which only uses symmetric keys. We show the proposal is efficient even on resource constrained networks by conducting a real world scenario experiment.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126716881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Bagher Bahador, M. Abadi, Asghar Tajoddin
{"title":"HPCMalHunter: Behavioral malware detection using hardware performance counters and singular value decomposition","authors":"Mohammad Bagher Bahador, M. Abadi, Asghar Tajoddin","doi":"10.1109/ICCKE.2014.6993402","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993402","url":null,"abstract":"Malicious programs, also known as malware, often use code obfuscation techniques to make static analysis more difficult and to evade signature-based detection. To resolve this problem, various behavioral detection techniques have been proposed that focus on the run-time behaviors of programs in order to dynamically detect malicious ones. Most of these techniques describe the run-time behavior of a program on the basis of its data flow and/or its system call traces. Recent work in behavioral malware detection has shown promise in using hardware performance counters (HPCs), which are a set of special-purpose registers built into modern processors providing detailed information about hardware and software events. In this paper, we pursue this line of research by presenting HPCMalHunter, a novel approach for real-time behavioral malware detection. HPCMalHunter uses HPCs to collect a set of event vectors from the beginning of a program's execution. It also uses the singular value decomposition (SVD) to reduce these event vectors and generate a behavioral vector for the program. By applying support vector machines (SVMs) to the feature vectors of different programs, it is able to identify malicious programs in real-time. Our results of experiments show that HPCMalHunter can detect malicious programs at the beginning of their execution with a high detection rate and a low false alarm rate.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123384561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Sharifi, S. Alirezaee, R. Heydari, M. Ahmadi, S. Erfani, M. Naserian
{"title":"A double threshold energy detection cooperative spectrum sensing scheme over Nakagami and Rician fading channels","authors":"I. Sharifi, S. Alirezaee, R. Heydari, M. Ahmadi, S. Erfani, M. Naserian","doi":"10.1109/ICCKE.2014.6993437","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993437","url":null,"abstract":"Cooperative spectrum sensing is an efficient scheme to deal with the effects of fading components on detection performance in cognitive radio networks. Energy efficiency is one of the impacting factors of this solution. In this paper, we apply the optimal double threshold `n-ratio' fusion rule over Nakagami and Rician fading channels and examine its performance through numerical simulations. Evaluations indicate that `2-ratio' and `1-ratio' logics outperform other data fusion schemes in both Nakagami and Rician channels. Moreover, the optimal K-coefficient is derived to determine the thresholds (λ1 and λ2) in double thresholds scheme for both fading conditions. While the optimal parameters are applied, the reduction of the consumed energy is presented as a tradeoff between detection performance and cooperation overhead.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126263664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Behshid Behkamal, E. Bagheri, M. Kahani, Majid Sazvar
{"title":"Data accuracy: What does it mean to LOD?","authors":"Behshid Behkamal, E. Bagheri, M. Kahani, Majid Sazvar","doi":"10.1109/ICCKE.2014.6993457","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993457","url":null,"abstract":"Linked Open Data provides a distributed model for the semantic web to create knowledge by publishing public available data and meaningfully interlinking dispersed data sources. It is undeniable that the realization of this goal depends strongly on the quality of the published data. Since, data quality is a multi-dimensional concept which is defined by a number of quality factors, in order to study data quality in depth; it is necessary to study each quality factor separately as well as the properties of its environment. The main objective of this work is to propose a set of metrics that enable the assessment of the accuracy of data sets from both semantic and syntactic accuracy viewpoints.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122975023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learner knowledge level calculation by concept map and concept weight estimation using neural networks","authors":"A. Kardan, Negin Razavi","doi":"10.1109/ICCKE.2014.6993394","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993394","url":null,"abstract":"Nowadays we can observe fast expansion of the E-learning environment with an increase in the usage of internet and other technologies. In every educational environment, one of the most important challenges and issues is learner knowledge assessment. Because of this reason, it is necessary that an accurate method for learner assessment be implemented in every educational system. One of the newest tools that is used for teaching and assessment in schools and universities, is the concept map. The concept map is a graph that is used for representation and organization of knowledge in a special field. This graph contains concepts and meaningful relations between them. In this study, a new approach is proposed for the assessment of knowledge level by a concept map. In this approach, an expert person and student draw their concept map and then the score of the student is estimated in every concept in the map by comparing the student's map with the expert's map. Afterwards, a test of all of the concepts in the map is taken by the student and his/her total score is obtained. Finally, using the scores of each concept and total score, the weight or importance of each concept is calculated by neural networks.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122195392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic external Persian plagiarism detection using vector space model","authors":"P. Mahdavi, Zahra Siadati, F. Yaghmaee","doi":"10.1109/ICCKE.2014.6993398","DOIUrl":"https://doi.org/10.1109/ICCKE.2014.6993398","url":null,"abstract":"Nowadays, extremely wide and facilitated access to the Internet has made the plagiarism and text reuse more common. Many studies have been conducted on automatic plagiarism detection. But there are few studies on automatic Persian plagiarism detection methods due to lack of a suitable Persian corpus. In this paper, an external Persian plagiarism detection method based on the vector space model (VSM) has been proposed. To implement and examine this method, a Persian corpus has been developed. Several optimizations have been done during the study. These optimizations make the algorithm very fast and accurate. The test results of the proposed method shows an accuracy of 0.87 and a processing time cost of less than 10 minutes.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114156618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}