ICCKE 2013Pub Date : 2013-12-16DOI: 10.1109/ICCKE.2013.6682810
M. Jafari, Alireza Mohammad shahri, S. H. Elyas
{"title":"Optimal tuning of Brain Emotional Learning Based Intelligent Controller using Clonal Selection Algorithm","authors":"M. Jafari, Alireza Mohammad shahri, S. H. Elyas","doi":"10.1109/ICCKE.2013.6682810","DOIUrl":"https://doi.org/10.1109/ICCKE.2013.6682810","url":null,"abstract":"In this paper, an optimal parameter assignment methodology for intelligent controller based on computational model of emotional learning in mammalian brain is presented. Brain Emotional Learning Based Intelligent Controller (BELBIC) is an intelligent controller based on emotional learning process in mammalian limbic system. The proposed controller has been applied to control a single link flexible joint manipulator. In this paper, the CLONAL Selection Algorithm is utilized to obtain superior controller parameters in order to minimize Rise time, Settling time and Overshoot.","PeriodicalId":321117,"journal":{"name":"ICCKE 2013","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116692665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scheduling hard real-time tasks on multi-core using intelligent rate-monotonic","authors":"Amin Rezaeian, Mahmoud Naghibzadeh, Peyman Neamatollahi","doi":"10.1109/ICCKE.2013.6682836","DOIUrl":"https://doi.org/10.1109/ICCKE.2013.6682836","url":null,"abstract":"Recently, researchers have applied semi-partitioned approaches to improve performance of hard real-time scheduling algorithms in multiprocessor architectures. RMLS is one of these methods. However, advantages of using semi-partitioned methods are often limited by well-known scheduling algorithms such as RM and EDF, which the former is simple but inefficient and the latter is efficient but has high processing overhead. There is an intelligent algorithm working on uniprocessor named IRM which takes advantages of both RM and EDF algorithms using that we present a new method called intelligent rate-monotonic least splitting to improve RMLS. Experimental results show that the proposed algorithm outperforms many other algorithms in literature in terms of processor utilization.","PeriodicalId":321117,"journal":{"name":"ICCKE 2013","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124910908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICCKE 2013Pub Date : 2013-12-16DOI: 10.1109/ICCKE.2013.6682841
Mostafa Mofarreh-Bonab, S. Ghorashi
{"title":"A low complexity and high speed gradient descent based secure localization in Wireless Sensor Networks","authors":"Mostafa Mofarreh-Bonab, S. Ghorashi","doi":"10.1109/ICCKE.2013.6682841","DOIUrl":"https://doi.org/10.1109/ICCKE.2013.6682841","url":null,"abstract":"In many applications of Wireless Sensor Networks (WSNs) such as monitoring applications or routing, localization is one of the important issues that affect directly the network quality of operation. Secure localization in WSNs needs to detect malicious nodes and exclude them in order to avoid deception by attackers. Accurate and appropriate methods that are usually iterative algorithms such as gradient descent, least median square (LMdS) and voting based secure localization have been introduced in the recent literature. Gradient descent based secure localization has better performance in terms of convergence speed and accuracy while have the minimum complexity compared to the other methods, however, still more convergence speed is needed for real-time applications. In this paper, a new gradient based method has been introduced which has higher convergence speed among all existing algorithms and the probability of fault for this algorithm is less than other algorithms. The other advantage of the proposed method is its low complexity in comparison to the other methods and its capability to be implemented in hardware. Simulation results show that the introduced algorithm's convergence speed is about 10 times more than the gradient descent algorithm with same localization error.","PeriodicalId":321117,"journal":{"name":"ICCKE 2013","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129938905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICCKE 2013Pub Date : 2013-12-16DOI: 10.1109/ICCKE.2013.6682858
Bita Shams, M. Khansari
{"title":"Immunization of complex networks using stochastic hill-climbing algorithm","authors":"Bita Shams, M. Khansari","doi":"10.1109/ICCKE.2013.6682858","DOIUrl":"https://doi.org/10.1109/ICCKE.2013.6682858","url":null,"abstract":"Recently, there is a growing interest in how to mitigate epidemic spreading through complex networks such as infection propagation in population, rumor spreading in social interaction, and, malicious attacks in computer networks. Due to high cost and limitation of immunization resources, a well-established strategy is required to select whom to inoculate. In this paper, we propose a new immunization strategy based on stochastic hill-climbing algorithm to find a subset of nodes whose immunization efficiently reduce the network vulnerability to worst-case epidemic size. Our experiments show that SHCI shows up to 31% improvement in real networks and up to 89% in model networks compared to targeted immunization algorithms which immunize nodes based on their centrality.","PeriodicalId":321117,"journal":{"name":"ICCKE 2013","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128738980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICCKE 2013Pub Date : 2013-12-16DOI: 10.1109/ICCKE.2013.6682818
Soudabeh Taghian Dinani, M. Zekri, B. Nazari
{"title":"Fuzzy high-order sliding-mode control of blood glucose concentration","authors":"Soudabeh Taghian Dinani, M. Zekri, B. Nazari","doi":"10.1109/ICCKE.2013.6682818","DOIUrl":"https://doi.org/10.1109/ICCKE.2013.6682818","url":null,"abstract":"This paper represents a fuzzy high-order sliding-mode (F-HOSM) controller in order to regulate blood glucose concentration in type 1 diabetics. This method uses merits of both fuzzy concept and high-order sliding-mode control so that not only the blood glucose level can be efficiently controlled, but also the amount of chattering in control effort will be significantly alleviated. Moreover the amount of control effort will decrease to its half in comparison to that in HOSM controller leading to a less risk of hypoglycemia, which is the most dangerous phenomenon in controlling the blood glucose level of diabetics. The efficiency of the proposed controller is validated by computer simulation. This controller is used to regulate the blood glucose level in a well-known diabetic model called minimal model.","PeriodicalId":321117,"journal":{"name":"ICCKE 2013","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121150514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICCKE 2013Pub Date : 2013-12-16DOI: 10.1109/ICCKE.2013.6682812
M. Vakili, S. Zahiri
{"title":"Parasitic-aware Optimization of a 2.4GHz Cross-Coupled LC VCO using IPO compared to PSO","authors":"M. Vakili, S. Zahiri","doi":"10.1109/ICCKE.2013.6682812","DOIUrl":"https://doi.org/10.1109/ICCKE.2013.6682812","url":null,"abstract":"A parasitic aware radio frequency computer aided design (RF CAD) tool based on an Inclined Planes system Optimization algorithm (IPO) is introduced. Also, in comparison to IPO, RF CAD tool was implemented with Particle Swarm Optimization algorithm (PSO). This CAD tool optimizes three structures of Cross-Coupled LC voltage controlled oscillator (LC VCOs) (i.e. CMOS alone, NMOS alone, PMOS alone VCOs) for 2.4GHz central frequency based on IEEE 802.11 in a commercial 0.18um RF CMOS technology, simultaneously. Parasitic aware RF CAD tool casts RF circuit synthesis as weighted multi-objective optimization quandary. Two major objectives fitness (i.e. phase noise and power consumption) are evaluated by harmonic balance (HB) analysis in HSPICE RF. Then results are sent to optimization core which is implemented in MATLAB. At the end, this CAD tool presents optimal parameters for final design.","PeriodicalId":321117,"journal":{"name":"ICCKE 2013","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116333133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICCKE 2013Pub Date : 2013-12-16DOI: 10.1109/ICCKE.2013.6682873
Behdad Behmadi Moghaddas, M. Kahani, Seyyed Ahmad Toosi, Asef Pourmasoumi, Ahmad Estiri
{"title":"Pasokh: A standard corpus for the evaluation of Persian text summarizers","authors":"Behdad Behmadi Moghaddas, M. Kahani, Seyyed Ahmad Toosi, Asef Pourmasoumi, Ahmad Estiri","doi":"10.1109/ICCKE.2013.6682873","DOIUrl":"https://doi.org/10.1109/ICCKE.2013.6682873","url":null,"abstract":"The increasingly vast amount of information, particularly on the Web, has resulted in a profound need for automatic summarization systems. The systems, in turn, need to be evaluated in terms of how desirably they can retrieve information. The evaluation is done by comparing the machine summaries against a standard reference corpus containing a reasonably large number of text sources and the summaries that human beings have made out of them. Due to the lack of such a standard corpus for Persian, the summarizers that were developed used to be evaluated against the small corpora constructed by the developers of the proposed systems. This made the systems non-comparable. Thus, Pasokh was constructed as a standard large enough reference corpus. It took over 2000 man-hours of work.","PeriodicalId":321117,"journal":{"name":"ICCKE 2013","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131162124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICCKE 2013Pub Date : 2013-12-16DOI: 10.1109/ICCKE.2013.6682833
S. J. Mousavirad, H. Ebrahimpour-Komleh
{"title":"Feature selection using modified imperialist competitive algorithm","authors":"S. J. Mousavirad, H. Ebrahimpour-Komleh","doi":"10.1109/ICCKE.2013.6682833","DOIUrl":"https://doi.org/10.1109/ICCKE.2013.6682833","url":null,"abstract":"Feature selection process is one of the main steps in data mining and knowledge discovery. Feature selection is a process to remove redundant and irreverent features without reducing the classification accuracy. This paper tries to select the best features set using imperialist competitive algorithm. Imperialist competitive algorithm is a novel population based algorithm which is inspired sociopolitical process of imperialist competition. In this paper, a modified imperialist competitive algorithm is presented and then this proposed algorithm is applied to feature selection process. To verify the effectiveness of the proposed approach, experiments carried out on some datasets. Results showed the features set selected by the imperialist competitive algorithm provide the better classification performance compared to the other methods.","PeriodicalId":321117,"journal":{"name":"ICCKE 2013","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133809664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICCKE 2013Pub Date : 2013-12-16DOI: 10.1109/ICCKE.2013.6682846
Faezeh Pournaghdali, Amir Rajabzadeh, M. Ahmadi
{"title":"VHDLSFI: A simulation-based multi-bit fault injection for dependability analysis","authors":"Faezeh Pournaghdali, Amir Rajabzadeh, M. Ahmadi","doi":"10.1109/ICCKE.2013.6682846","DOIUrl":"https://doi.org/10.1109/ICCKE.2013.6682846","url":null,"abstract":"Decreasing technology sizing makes the CMOS devices more error prone to alpha particles and cosmic radiation. Therefore, the probability of occurring multi faults in such devices is increasing. This paper presents a simulation-based multi-bit fault injection tool, named VHDLSFI, aiming at conducting multi-bit fault injection campaign to analyze the dependability of digital systems modeled by VHDL description language. This fault injection tool utilizes the Force and Release statements which are features in the VHDL 2008 standard to inject transient and permanent single and multi-bit faults. Different fault models are developed using force and release statements. A VHDL model of DP32 processor is evaluated by this fault injection tool to demonstrate its functionality. A total of 2000 single faults and 7000 double faults have been injected into the ALU, Register File, General Registers, and different Buses in the processor using VHDLSFI fault injection tool. Only one single or one double fault is injected in each run. The results show that the percentages of errors propagation vary between 7% and 89% depending on single or double faults, the different workload programs, and location of the injected faults in the processor. The error propagation latency is much lower when the double faults in injected in DP32 processor.","PeriodicalId":321117,"journal":{"name":"ICCKE 2013","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115425659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICCKE 2013Pub Date : 2013-12-16DOI: 10.1109/ICCKE.2013.6682860
Reza Sharifnya, M. Abadi
{"title":"A novel reputation system to detect DGA-based botnets","authors":"Reza Sharifnya, M. Abadi","doi":"10.1109/ICCKE.2013.6682860","DOIUrl":"https://doi.org/10.1109/ICCKE.2013.6682860","url":null,"abstract":"A botnet is a network of compromised hosts (bots) remotely controlled by a so-called bot herder through one or more command and control (C&C) servers. New generation botnets, such as Conficker and Murofet, tend to use a form of domain fluxing for command and control. Each domain fluxing bot generates a list of domain names using a domain name generation algorithm (DGA) and queries each of them until one of them is resolved to a C&C server. Since the bot herder registers only a few of these domain names, the domain fluxing bots generate many failed DNS queries. Even though some efforts have been focused on the detection of DGA-based botnets, but none of them consider the history of suspicious activities. This makes the detection system has a potentially high false alarm rate. In this paper, we propose a novel reputation system to detect DGA-based botnets. Our main goal is to automatically assign a high negative reputation score to each host that is involved in suspicious bot activities. To achieve this goal, we first choose DNS queries with similar characteristics at the end of each time window. We then identify hosts that algorithmically generated a large set of suspicious domain names and add them to a so-called suspicious group activity matrix. We also identify hosts with high numbers of failed DNS queries and add them to a so called suspicious failure matrix. We finally calculate the negative reputation score of each host in these two matrices and detect hosts with high negative reputation scores as bot-infected. We evaluate our reputation system using DNS queries collected from the campus network. The experimental results show that it can successfully detect DGA-based botnets with a high detection rate and a low false alarm rate while providing real-time monitoring in large-scale networks.","PeriodicalId":321117,"journal":{"name":"ICCKE 2013","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129654212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}