eng
ICT Research Institute(ITRC)
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
2010-06
2
2
1
8
article
A Novel Descriptor for Pedestrian Detection in Video Sequences
Narges Armanfard
1
Majid Komeili
2
Ehsanollah Kabir
3
Dept. of Electrical and Computer Eng. Tarbiat Modarres University Tehran, Iran
Dept. of Electrical and Computer Eng. Tarbiat Modarres University Tehran, Iran
Dept. of Electrical and Computer Eng. Tarbiat Modarres University Tehran, Iran
This paper presents a novel Texture-Edge Descriptor, TED, for background modeling and pedestrian detection in video sequences which models texture and edge information of each image block simultaneously. Each block is modeled as a group of adaptive TED histograms that are calculated for pixels of the block over a rectangular neighborhood. TED is an 8-bit binary code which is independent of the neighborhood size. Experimental results over real-world sequences from PETS database clearly show that TED outperforms LBP.
http://ijict.itrc.ac.ir/article-1-259-en.pdf
pedestrian detection
texture
edge
block-based approach
background subtraction
surveillance systems
eng
ICT Research Institute(ITRC)
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
2010-06
2
2
9
19
article
A Robust Voice Activity Detection Based on Short Time Features of Audio Frames and Spectral Pattern of Vowel Sounds
Mohammad Hossein Moattar
1
Mohammad Mehdi Homayounpour
2
Laboratory for Intelligent Signal and Speech Processing, Computer Engineering and IT Dept. Amirkabir University of Technology (AUT) Tehran, Iran
Laboratory for Intelligent Signal and Speech Processing, Computer Engineering and IT Dept. Amirkabir University of Technology (AUT) Tehran, Iran
This paper presents a set of voice activity detection (V AD) methods, that are easy to implement, robust against noise, and appropriate for real-time applications. The common characteristic is the use of a voting paradigm in all the proposed methods. In these methods, the decision on the voice activity of a given frame is based on comparing the features obtained from that frame with some thresholds. In the first method, a set of three features, namely frame energy, spectral flatness, and the most dominant frequency component is applied. In the second approach however, the spectral pattern of the frames of vowel sounds is used. To use the strengths of each of the above methods, the combination of these two decision approaches is also put forth in this paper. The performance of the proposed approaches is evaluated on different speech datasets with different noise characteristics and SNR levels. The approaches are compared with some conventional V AD algorithm such as ITU G. 729, AMR and AFE from different points of view. The evaluations show considerable performance improvement of the proposed approaches.
http://ijict.itrc.ac.ir/article-1-260-en.pdf
voice activity detection
spectral flatness
vowel spectral pattern
noise robustness
vowel sounds
eng
ICT Research Institute(ITRC)
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
2010-06
2
2
21
28
article
Peris: A Novel Dynamic Bandwidth Allocation (DBA) Method with Second-Price Auction in Next Generation Military Networks Based on EPON Technology
Alireza Hedayati
1
Mehdi Fesharaki
2
CE Department, Science and Research Branch, Islamic Azad University, Tehran, Iran
ICT Department, Malek Ashtar University of Technology (MUT), Tehran, Iran
In the foreseeable future, networks of access devices that can cooperate and effectively communicate with military backbone infrastructure will significantly influence and simplify military operations. As one of the promising solutions for developing next generation military networks, Ethernet Passive Optical Network (EPON) has received great attention from both industry and academia in recent years. Based on the EPON technology, bandwidth constraint is a critical issue in military communication. In this paper we propose Peris, a novel dynamic bandwidth allocation method with second price auction in next generation military networks based on EPON technology. In this new method, the OL T (similar to the leaders) is responsible for the auction management which effectively and fairly responds to the bandwidth requests of the users through their own ONUs and allocates the winners the amount of requested available bandwidth. Simulation results show that comparing Peris with IPACT, regarding QoS parameters such as packet loss ratio, line utilization and throughput, it has better performance.
http://ijict.itrc.ac.ir/article-1-261-en.pdf
Next Generation Military Network
Ethernet Passive Optical Network (EPON)
Bandwidth Allocation
SecondĀ Price Auction
eng
ICT Research Institute(ITRC)
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
2010-06
2
2
29
41
article
A New GA Approach Based on Pareto Ranking Strategy for Privacy Preserving of Association Rule Mining
Mohammad Naderi Dehkordi
1
Kambiz Badie
2
Ahmad Khadem zadeh
3
Faculty member of Islamic Azad University-Najafabad Branch Isfahan, Iran
Education and Research Institute for ICT Tehran, Iran
Education and Research Institute for ICT Tehran, Iran
With fast progress of the networks, data mining and information sharing techniques, the security of the privacy of sensitive information in a database becomes a vital issue to be resolved. The mission of association rule mining is discovering hidden relationships between items in database and revealing frequent itemsets and strong association rules. Some rules or frequent itemsets called sensitive which contains some critical information that is vital or private for its owner. In this paper, we investigate the problem of hiding sensitive knowledge. We decide to hide sensitive knowledge both in frequent patterns and association rule extraction steps. In order to conceal association rules and save the utility of transactions in dataset, we select Genetic Algorithm to find optimum state of modification. In our approach various hiding styles are applied in different multi-objective fitness functions. First objective of these functions is hiding sensitive rules and the second one is keeping the accuracy of transactions in dataset. After sanitization process we test the sanitization performance by evaluation of various criterions. Indeed our novel framework consists of dataset preprocessing, Genetic Algorithm-based core approach and different sanitizing measurements. Finally we establish some experiments and test our approach by larger datasets and compare the performance with well-known existing ones.
http://ijict.itrc.ac.ir/article-1-262-en.pdf
Association Rule Mining
Privacy Preserving
Sensitive Association Rule
Multi-objective Optimization
Genetic Algorithms
eng
ICT Research Institute(ITRC)
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
2010-06
2
2
43
49
article
Scaling Up Performance of Web Services by Pre-Serialization Response Analysis
Parinaz Saadat
1
Behrouz Minaei Bidgoli
2
Computer engineering department lran University of Science and Technology Tehran, Iran
Computer engineering department [ran University of Science and Technology Tehran, Iran
Web services are the inseparable part of many scientific applications. Consider communication between two partial differential equation (PDE) solvers on different domains, such applications work by exchanging large arrays containing floating point data with high accuracy. The reliance of web services on SOAP leads to performance degradation in similar scenarios as the serialization of outgoing messages containing large arrays of doubles is a primary SOAP performance bottleneck.
Various aspects of this problem are examined from the point of views including alternative formats, XML coding compression, differential serialization, differential de-serialization, etc. This paper proposes an approach which combines the idea behind differential serialization and differential de-serialization with a completely different implementation.
http://ijict.itrc.ac.ir/article-1-263-en.pdf
web services
serialization
performance
SOAP
eng
ICT Research Institute(ITRC)
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
2010-06
2
2
51
59
article
The First Persian Context Sensitive Spell Checker
Heshaam Faili
1
Mohammad Azadnia
2
School of Electrical and Computer Engineering, College of Engineering, University of Tehran, Tehran, Iran
Information Technology Department Iran Telecom Research Center Tehran, Iran
In this article an attempt to introduce the first Persian context sensitive spell checker, which tries to detect and correct the :eat-word spelling error of Persian text is presented. The proposed method is a statistical approach which uses Bayesian framework as its probabilistic model and also uses mutual information metric as a semantic relatedness measure between different Persian words. Our experiments on sample test data, shows that accuracy of correction method is about 80% with respect to Fl-measure.
http://ijict.itrc.ac.ir/article-1-264-en.pdf
Persian language
real-word error
Bayesian framework
mutual information
eng
ICT Research Institute(ITRC)
International Journal of Information and Communication Technology Research
2251-6107
2783-4425
2010-06
2
2
61
70
article
The Unified Approach to Set-Membership and Selective Partial Update Adaptive Filtering Algorithms
Mohammad Shams Esfand Abadi
1
Hamid Palangi
2
Faculty of Electrical and Computer Engineering Shahid Rajaee Teacher Training University Tehran, Iran
Department of Electrical Engineering Sharif University of Technology Tehran, Iran
In this paper we show how the classical and modern adaptive filter algorithms can be introduced in a unified way. The Max normalized least mean squares (MAX-NLMS), N-Max NLMS, the family of SPU-NLMS, SPU transform domain adaptive filter (SPU-TDAF), and SPU subband adaptive filter (SPU-SAF) are particular algorithms are established in a unified way. Following this, the concept of set-membership (SM) adaptive filtering is extended to this framework, and a unified approach to derivation of SM and SM-SPU adaptive filters is presented. The SM-NLMS, SM-TDAF, SM-SAF, SM-SPU-NLMS, and SM-SPUSAF are presented based on this approach. Also, this concept is extended to the SPU affine projection (SPU-AP) and SPUTDAF algorithms and two new algorithms which are called SM-SPU-AP and SM-SPU-TDAF algorithms, are established. These novel algorithms are computationally efficient. The good performance of the presented algorithms is demonstrated in system identification application.
http://ijict.itrc.ac.ir/article-1-265-en.pdf
Adaptive filter
selective partial update
set-membership