فهرس المقالات Homayoon Motameni


  • المقاله

    1 - A Review of Feature Selection Method Based on Optimization Algorithms
    Journal of Computer & Robotics , العدد 27 , السنة 16 , زمستان 2023
    Feature selection is the process of identifying relevant features and removing irrelevant and repetitive features with the aim of observing a subset of features that describe the problem well and with minimal loss of efficiency. One of the feature selection approaches i أکثر
    Feature selection is the process of identifying relevant features and removing irrelevant and repetitive features with the aim of observing a subset of features that describe the problem well and with minimal loss of efficiency. One of the feature selection approaches is using optimization algorithms. This work provides a summary of some meta-heuristic feature selection methods proposed from 2018 to 2021 that were designed and implemented on a wide range of different data. The results of the study showed that some meta-heuristic algorithms alone cannot perfectly solve the feature selection problem on all types of datasets with an acceptable speed. In other words, depending on dataset, a special meta-heuristic algorithm should be used. تفاصيل المقالة

  • المقاله

    2 - The Effect of DNA in Image Steganography on Privacy Preservation in Smart City
    سیستم های پویای کاربردی و کنترل , العدد 1 , السنة 5 , زمستان 2022
    The smart city is one of the Internet of Thing-based applications that its use is increasing today. One of the requirements of this system is privacy which protects citizens from disclosure. This paper proposes to protect citizens' privacy by combining chaotic functions أکثر
    The smart city is one of the Internet of Thing-based applications that its use is increasing today. One of the requirements of this system is privacy which protects citizens from disclosure. This paper proposes to protect citizens' privacy by combining chaotic functions and a new method of steganography and image blocking. In this paper, two methods are proposed. In the first proposed method, randomly selected secret data bits are hidden in the pixels of image blocks that have also been randomly selected by the least significant bit method. In the second proposed method, the secret data and image are first converted to the DNA sequence, then the secret data genomes are replaced with the least significant genomes of the pixels of the image blocks that have also been randomly selected. Simulation results show that DNA use increases the quality of hidden images compared to without DNA methods and existing methods. تفاصيل المقالة

  • المقاله

    3 - An Adaptive neuro-fuzzy Inference System to Evaluate Trustworthiness of Users in a Social Network
    سیستم های پویای کاربردی و کنترل , العدد 1 , السنة 6 , پاییز 2023
    In recent years, the emergence of various social networks has led to the growth of social network users. However, activity in such networks depends on the level of trust that users have in each other. Therefore, trust is essential and important issue in these networks, أکثر
    In recent years, the emergence of various social networks has led to the growth of social network users. However, activity in such networks depends on the level of trust that users have in each other. Therefore, trust is essential and important issue in these networks, especially when users interact with each other. In this article, we examine this issue and provide a method to evaluate it. It is not easy to measure the accuracy of trust for users who interact with social networks. Here, interactions are virtual. In this article, we have used the adaptive neuro-fuzzy inference system to evaluate trustworthiness by considering different personality attributes of users such as reliability, availability, interest, patience and adaptability. Using these features as input and based on the adaptive neuro-fuzzy inference system, we evaluated the trustworthiness of users in social network. The proposed adaptive neuro-fuzzy inference system is expandable because in this system, trust can be defined as a set of one or more personality attributes. Epinions social network dataset is also used to simulate and validate the proposed method. In the proposed method, the absolute mean value of error is less than 0.0095 and the value of F-score is more than 0.9884. Based on the obtained results and compared to the previous methods, the proposed adaptive neuro-fuzzy inference system shows an acceptable accuracy for evaluating the trustworthiness of users. تفاصيل المقالة

  • المقاله

    4 - Energy-Efficient virtual machine placement in cloud computing
    Journal of Advances in Computer Research , ستأتي المقالات قريبًا
    Provision of high-quality services to end users in a cost-effective way with minimum energy consumption is one of the main challenges facing cloud service providers. Accordingly, this paper presents an energy-efficient scheduling strategy in a QOS-Aware and cost-effecti أکثر
    Provision of high-quality services to end users in a cost-effective way with minimum energy consumption is one of the main challenges facing cloud service providers. Accordingly, this paper presents an energy-efficient scheduling strategy in a QOS-Aware and cost-effective manner for real-time workflow programs in cloud environment. The proposed approach utilizes dynamic voltage and frequency scaling technique on multi-core nonhomogeneous processors to fill the gaps within time schedule. The aim is to develop an energy-aware strategy which, besides yielding accurate results, maintains the high quality of the delivered services in a standard and financially-rational manner. The proposed scheduling algorithm is compared with other basic strategies in terms of different service quality requirements. The performed experiments demonstrate that the proposed approach outperforms existing methods and can be vowed as a promising scheduling strategy. تفاصيل المقالة

  • المقاله

    5 - CNL2C: ویرایشگر، یک بررسی کننده نحوی و تولید کننده کد برای CNUIML با استفاده از Xtext و Xtend
    سیستم های پویای کاربردی و کنترل , العدد 2 , السنة 7 , بهار 1403
    توسعه کاربر نهایی (EUD) یک حوزه تحقیقاتی پویا در علوم کامپیوتر است که بر توانمندسازی کاربران نهایی برای ایجاد و اصلاح نرم‌افزار از طریق رویکردهای مختلف تمرکز دارد و دائماً با روش‌ها و ابزارهای جدید در حال تکامل است. برای افزایش مشارکت کاربر نهایی، پژوهشها، توسعه ابزاره أکثر
    توسعه کاربر نهایی (EUD) یک حوزه تحقیقاتی پویا در علوم کامپیوتر است که بر توانمندسازی کاربران نهایی برای ایجاد و اصلاح نرم‌افزار از طریق رویکردهای مختلف تمرکز دارد و دائماً با روش‌ها و ابزارهای جدید در حال تکامل است. برای افزایش مشارکت کاربر نهایی، پژوهشها، توسعه ابزارهای کاربر پسند برای کاربران نهایی به منظور طراحی رابط کاربری، به علاوۀ کد منبع نهایی که از تجزیه و تحلیل و تبدیل خودکار این رابط کاربری به دست می‌آید، را پیشنهاد می‌کنند. برنامه نویسی زبان طبیعی کنترل شده از ویرایش محدود شده ای از یک زبان طبیعی برای کدنویسی استفاده می کند. این رویکرد دسترسی به برنامه نویسی را از طریق فراهم کردن امکان کدنویسی به زبانی آشنا توسط کاربران نهایی و درعین حال حفظ دقت و وضوح لازم، افزایش می دهد. این پژوهش توسعه زبان CNUIML و تولید یک ویرایشگر برای آن را با استفاده از Xtext بررسی کرده و به خطاهای نحوی و تولید کد مقصد با استفاده از Xtext و Xtend می پردازد. زبان CNUIML برای توصیف رابط های برنامه کاربردی تحت وب، با تمرکز بر نیازهای سیستم و نگرانی های کاربر نهایی مورد بهره بردای قرار می گیرد. برنامه های کاربردی وب از صفحات و فرم های به هم پیوسته تشکیل شده اند که درختی از اشیاء را شکل می دهند. متا مدل یک برنامه وب شامل فرم، فرم فرعی، آیتم داده و محدوده دامنه و نوع مقادیر است. هر برنامه مجموعه ای از فرم ها با انواع مقادیر و دامنه های خاص هر یک است. تفاصيل المقالة