|
The 6th ICCKE Program
October 20, 2016
Download
Morning Session
|
07:45 – 08:00
|
Opening
|
08:00 – 09:00
|
Keynote Speech 1
|
09:00 – 10:30
|
Sessions (A1, A2, A3)
|
10:30 – 10:45
|
Break
|
10:45 – 12:30
|
Sessions (B1, B2, B3)
|
12:30 – 14:00
|
Launch Break
|
|
Afternoon Session
|
14:00 – 15:00
|
Keynote Speech 2
|
15:00 – 16:45
|
Sessions (C1, C2, C3)
|
16:45 – 17:00
|
Break
|
17:00 – 19:00
|
Sessions (D1, D2, D3)
|
19:00 – 19:30
|
Closing
|
Session
|
Topics
(# of accepted papers)
|
Chairs
|
Session
Title
|
Paper
Count
|
Paper Ids
|
A1
|
Bioinformatics (1)
Human Computation and Crowdsourcing Systems (2)
Data Quality: Analysis and Assessment (1)
|
Prof. Naghibzadeh
Dr. Behkamal
|
Bioinformatics, Crowdsourcing and Data
Quality
|
4
|
200,
248, 171,
100
|
A2
|
Software Engineering (2)
Semantic Web and NLP (2)
|
Prof. Kahani
Dr. Rasoolzadegan
|
Software Engineering and
Semantic Web
|
4
|
64, 28,
111, 112
|
A3
|
Video Analysis and Processing (1)
Visual Recognition: Categorization, Detection and Indexing (2)
Medical Image Processing (1)
|
Dr. Vahedian
Dr. Fazl-Ersi
|
Computer Vision
|
4
|
185,
142, 122,
149
|
B1
|
Medical Image Processing (5)
|
Dr. Pourreza
Dr. Taherinia
|
Medical Image Processing
|
5
|
196, 113, 226, 35, 217
|
B2
|
Pattern Recognition and Applications (5)
|
Prof. Sadoghi-Yazdi
Dr. Harati
|
Pattern Recognition and Applications
|
5
|
231, 191, 129, 17, 246
|
B3
|
Parallel Programming and Architecture (2)
Dependable and Real-time Embedded Systems (3)
|
Dr. Savadi
Dr. Sedaghat
|
Embedded Systems and Parallel
Programming
|
5
|
210, 156,
236, 164, 182
|
C1
|
Computer Security and Cryptology (5)
|
Dr. Ghaemi Bafghi
Dr. Amintoosi
|
Computer Security and
Cryptology
|
5
|
33, 169, 16, 81, 212
|
C2
|
Machine Learning (5)
|
Dr. Monsefi
Dr. Ghiasi-Shirazi
|
Machine Learning – 1
|
5
|
26, 79, 88, 175, 207
|
C3
|
Grid and Cloud Computing (5)
|
Dr. Abrishami
Dr. Ensan
|
Grid and Cloud Computing
|
5
|
186, 125, 139, 154, 228
|
D1
|
Soft
Computing (2)
Evolutionary
Computation and Metaheuristic Optimization Methods (4)
|
Prof. Akbarzadeh T
Dr. Rouhani
|
Soft Computing
|
6
|
121, 103, 128, 21, 18, 150
|
D2
|
Machine Learning (5)
|
Dr. Monsefi
Dr. Ghiasi-Shirazi
|
Machine Learning – 2
|
5
|
92, 176, 205, 181, 219
|
D3
|
Applications of ICT in Smart Grid (1)
Wireless Ad-hoc and Sensor Networks (5)
|
Prof. Yaghmaee
Dr. Hosseini Seno
|
Wireless Sensor Networks and
Smart Grid
|
6
|
242,
188, 158, 137, 82, 127
|
Session: A1
|
Id
|
Paper Title
|
Authors
|
200
|
A Combined SVM and Markov Model approach for Splice Site
Identification
|
E. Pashaei, A. Yilmaz, N. Aydin
|
248
|
A Survey on Participant Recruitment in Crowdsensing Systems
|
H. Amintoosi, M. Davari
|
171
|
Quality of Claim Metrics in Social Sensing Systems: A case study
on IranDeal
|
P. Taghizadeh Naderi, H. Tabatabaee Malazi,
M. Ghassemian, H. Haddadi
|
100
|
Big Data Roadmaps for Small and Medium Enterprises (SMEs)
|
R. Shokri
|
Session: A2
|
Id
|
Paper Title
|
Authors
|
64
|
Bidirectional Model Transformation Approaches A
Comparative Study
|
L. Samimi-Dehkordi, B. Zamani,
S. Kolahdouz-Rahimi
|
28
|
Towards a Tracing Framework for Model-Driven Software
Systems
|
F. Hojaji, B. Zamani, A. Hamou Lhadj
|
111
|
Modular-based Measuring Semantic Quality of Ontology
|
M. Ardakani Movaghati,
A. Abdollahzadeh Barforoush
|
112
|
Monotonic filter for hierarchical translation models
|
S. Salami, M. Shamsfard
|
Session: A3
|
Id
|
Paper Title
|
Authors
|
185
|
Anomaly and tampering detection of cameras by providing details
|
S.M. Hosseini, A.H. Taherinia
|
142
|
A New Approach In Single Image Super Resolution
|
S. Sarmadi, Z. Shamsa
|
122
|
Improving Person Recognition by Weight Adaptation of
Soft Biometrics
|
S. Gharghabi, B. Azari, F. Shamshirdar,
R. Safabakhsh
|
149
|
Wavelet Based Single Trial Event Related Potential
Extraction in Very Low SNR Conditions
|
S. Mortaheb, F. Rostami, S. Shahin,
R. Amirfattahi
|
Session: B1
|
Id
|
Paper Title
|
Authors
|
196
|
Accurate Automatic Localisation of Lung Nodules using
Graph Cut and Snakes Algorithms
|
N. Mirderikvand, M. Naderan,
A. Jamshidnezhad
|
113
|
Automatic Recognition of white blood cells using
Weighted Two Phase Test Sample Sparse Representation
|
A. Khoshdel, H. Talebi, A. Davoudi,
A. Mohammadi, M.B. Menhaj, M. Ghorbani
|
226
|
Design and implementation of a new algorithm to count
white blood cells using machine vision system
|
Z. Khandan Khadem Alreza, A. Karimians
|
35
|
Feature weighting for cancer tumor detection in
mammography images using gravitational search algorithm
|
F. Shirazi, E. Rashedi
|
217
|
Automatic Graph-Based Method for Classification of
Retinal Vascular Bifurcations and Crossovers
|
Z. Ghanaei
|
Session: B2
|
Id
|
Paper Title
|
Authors
|
231
|
An improved density peaks method for data clustering
|
S.A. Seydi, A. Lotfi, P. Moradi
|
191
|
Detection of Hypernasality from Speech Signal Using
Group Delay and Wavelet Transform
|
A. Mirzaei, M. Vali
|
129
|
Face recognition based on modified discriminant
independent component analysis
|
M. Mollaee, M.H. Moattar
|
17
|
Persian Offline Signature Verification Based on
Curvature and Gradient Histograms
|
A. Soleimani Bajestani, K. Fouladi, B.N. Araabi
|
246
|
Training LDCRF model on unsegmented sequences using
Connectionist Temporal Classification
|
A. Ahooye Atashin
|
Session: B3
|
Id
|
Paper Title
|
Authors
|
210
|
A Dynamic Special-Purpose Scheduler for Scheduling
Concurrent Kernels on GPU
|
R. Mohammadi, K. Shekofteh,
M. Naghibzadeh, H. Noori
|
156
|
Parallelization of a Color DCT Watermarking Algorithm
using a CUDA-based Approach
|
A. Ahmadi Mohammadabadi, A. Chalechale
|
236
|
ASIP Design
for Two Dimensional Cordic based DFT and DCT Algorithms
|
M. Pivezhandi, M. Eshghi
|
164
|
Cool Elevator: A Thermal-Aware Routing Algorithm for
Partially Connected 3D NoCs
|
E. Taheri, A. Patooghy, K. Mohammadi
|
182
|
Improving Stateful Robustness Testing of Embedded
Real-Time Operating System
|
R. Shahpasand, Y. Sedaghat, S. Paydar
|
Session: C1
|
Id
|
Paper Title
|
Authors
|
33
|
A Model for Evaluating Trust between Users in Social
Neworks Based on Subjective Logic
|
M. Zohreie, H. Shakeri
|
169
|
A New Anonymous Unlinkable Mobile Payment Protocol
|
F. Zamanian, H. Mala
|
16
|
MetaSPD: Metamorphic Analysis for Automatic Software
Piracy Detection
|
A. Khalilian, H. Golbaghi, A. Nourazar,
H. Haghighi, M. Vahidi-Asl
|
81
|
Network Security Risk Analysis Using Attacker’s
Behavioral Parameters
|
H. Ketabdar, R. Rezaee, A. GhaemiBafghi,
M. Khosravi-Farmad
|
212
|
A Threat Risk Estimation Model for Computer Network
Security
|
R. Rezaee, A. Ghaemi Bafghi,
M. Khosravi-Farmad
|
Session: C2
|
Id
|
Paper Title
|
Authors
|
26
|
A Fuzzy Decision Tree Approach for Imbalanced Data
Classification
|
S. Sardari, M. Eftekhari
|
79
|
A New Method for Classification of POLSAR Images
|
N. Aghayi, G. Akbarizadeh
|
88
|
A New Method to Improve Classification Accuracy of
Fused RADAR and Optical Data
|
D. Karimi, K. Rangzan, G. Akbarizadeh,
M. Kabolizadeh
|
175
|
Classification of Iranian Paintings Using Texture
Analysis
|
S. Keshvari, A. Chalechale
|
207
|
Hierarchical Cooperation of Experts in Leaning from
Crowds
|
M. Esmaeily, S. Abbaasi, H. Sadoghi Yazdi,
R. Monsefi
|
Session: C3
|
Id
|
Paper Title
|
Authors
|
186
|
A Centralized Reinforcement Learning Method for
Multi-agent Job Scheduling in Grid
|
M. Moradi Vastegani
|
125
|
Data center Task Scheduling Through
Biogeography-Based Optimization Model With the Aim of Reducing Makespan
|
A. Abbasi, Mohmmad R. Khayyambashi,
H. Khosravi-Farsani
|
139
|
HFIaaS: a proposed FPGA IaaS framework using HLS
|
M. Asghari
|
154
|
Multi-level Intrusion detection system in cloud
environment based on trust level
|
Z. Salek Shahrezai, F. Mousavi Madani
|
228
|
PPRA: A new pre-fetching and prediction based
replication algorithm in data grid
|
A. Toroghi, M. Beigrezai, M.R. Meybodi
|
Session: D1
|
Id
|
Paper Title
|
Authors
|
121
|
Intelligent Active Force Control of a Helicopter Seat
Suspension using Iterative Learning Algorithm
|
S. Ahmadi, M. Gohari, M. Tahmasebi
|
103
|
Multi-Objective Mobile Robot Path Planning Based on
A* Search
|
K. Jeddisaravi, R. Javanmard Alitappeh,
F. Gadelha Guimaraes
|
128
|
Multi-objective Estimation of Distribution algorithm
based on Voronoi and Local search
|
E. Mohagheghi, M. Akbarzadeh Totonchi
|
21
|
Using fuzzy c-means clustering algorithm for common
lecturers timetabling among departments
|
H. Babaei, J. Karimpour, H. Oroji
|
18
|
Intelligent Fault Diagnosis of Induction Motors Based
on Multi-Objective Feature Selection Using NSGA-II
|
A.H. Arjmand Monfared, N. Sargolzaei
|
150
|
An Energy Efficient Metaheuristic Method for Micro
Robots Indoor Area Coverage Problem
|
S. Saeedvand, H.S. Aghdasi
|
Session: D2
|
Id
|
Paper Title
|
Authors
|
92
|
Implementation of Artificial Features in Improvement
of Biometrics Based PPG
|
S. Panahi Moghadam, S. Rashidi
|
176
|
Robust Crowdsourcing-based Linear Regression
|
S. Abbaasi, E. Shams Davodly,
M. Mohammadi
|
205
|
TI-QSSVM: Two Independent Quarter Sphere Support
Vector Machine for binary classification
|
R. Rezvani, R. Monsefi
|
181
|
Towards an Spiking Deep Belief Network for Face
Recognition Application
|
M. Fatahi, M. Ahmadi, A. Ahmadi,
M. Shahsavari, P. Devienne
|
219
|
Weighted Semi-Supervised Manifold Clustering via
sparse representation
|
A. Abedi
|
Session: D3
|
Id
|
Paper Title
|
Authors
|
242
|
Modeling
SIP Normal Traffic to Detect and Prevent SIP-VoIP Flooding Attacks Using
Fuzzy Logic
|
M. Hosseinpour, M.H. Yaghmaee Moghaddam, S.A. Hosseini Seno, H.
Khosravi Roshkhari
|
188
|
A Replication Dilemma Game for Cooperative Data
Replication in Ad Hoc Networks
|
A. Tajali, N. Sedigh, S.A. Hoseini Seno
|
158
|
Antenna Selection: A Novel Approach to Improve Energy
Efficiency in Massive MIMO Systems
|
M. Arash, E. Yazdian, M. Fazel
|
137
|
Distributed Weighted Averaging-Based Robust Cubature
Kalman Filter for State Estimation of Nonlinear Systems in Sensor Networks
|
B. Safarinejadian, F. Mohammadnia
|
82
|
Investigating and Evaluating Energy-Efficient Routing
Protocols in Wireless Sensor Networks
|
M. Manouchehri
|
127
|
Research on A Location-based Task Assignment for
Mobile Sensing
|
L. Wang, S. Wang
|
|
|
| |