ORIGINAL_ARTICLE
JENSEN’S INEQUALITY FOR GG-CONVEX FUNCTIONS
In this paper, we obtain Jensen’s inequality for GG-convex functions. Also, we get in- equalities alike to Hermite-Hadamard inequality for GG-convex functions. Some examples are given.
https://ijnaa.semnan.ac.ir/article_3725_6495b5167432572a458ef98bec36e414.pdf
2019-11-01
1
7
10.22075/ijnaa.2017.11330.1555
Jensen’s inequality
GG-convex
Integral inequality
Gholamreza
Zabandan
zabandan@khu.ac.ir
1
Kharazmi university
LEAD_AUTHOR
ORIGINAL_ARTICLE
Analysis of disassembled executable codes by abstract interpretation
The aim of this paper is to dene the abstract domain, abstract operator, abstract semantic, the environments and states of disassembled executable codes as well as a way to analysis the disassembled executable codes. Nowadays, static analysis on disassembled code going to grow. Reverse engineering and malware analysis use this technique. Thus, we tried to perform pluralization the requirements of static analysis by abstract interpretation as well as report some specic and advantage note in this paper. In addition, we present an algorithm to obtain the control ow graph of disassembled code.
https://ijnaa.semnan.ac.ir/article_4048_2f0bf098430d4aac72901e31b2747c69.pdf
2019-11-01
9
13
10.22075/ijnaa.2019.4048
Static analysis
Abstract domain
Abstract operator
Abstract semantic
Environment and state of abstract interpretation
mohammad hadi
alaeiyan
hadi_alaeiyan@comp.iust.ac.ir
1
Iran University of Science and Technology, Narmak, Tehran, 16844, Iran
LEAD_AUTHOR
ORIGINAL_ARTICLE
Optimally Local Dense Conditions for the Existence of Solutions for Vector Equilibrium Problems
In this paper, by using C-sequentially sign property for bifunctions, we provide sufficient conditions that ensure the existence of solutions of some vector equilibrium problems in Hausdorff topological vector spaces which ordered by a cone. The conditions which we consider are not imposed on the whole domain of the operators involved, but just on a locally segment-dense subset of the domain.
https://ijnaa.semnan.ac.ir/article_3549_600ab53f65a28aea0c8c5b5f237a6de8.pdf
2019-11-01
15
26
10.22075/ijnaa.2019.16783.1893
locally segment-dense set
vector equilibrium problem
C-sequentially sign property
Sirous
Moradi
sirousmoradi@gmail.com
1
Arak University
LEAD_AUTHOR
Maryam
Shokouhnia
shokoohniam63@yahoo.com
2
Department of Mathematics, Faculty of Science, Arak University, Arak, Iran
AUTHOR
Somaye
Jafari
s.jafari.math@gmail.com
3
Department of Mathematics, Arak University, Arak, Iran
AUTHOR
ORIGINAL_ARTICLE
Entropy of infinite systems and transformations
The Kolmogorov-Sinai entropy is a far reaching dynamical generalization of Shannon entropy of information systems. This entropy works perfectly for probability measure preserving (p.m.p.) transformations. However, it is not useful when there is no finite invariant measure. There are certain successful extensions of the notion of entropy to infinite measure spaces, or transformations with infinite invariant measures. The three main extensions are Parry, Krengel, and Poisson entropies. In this survey, we shortly overview the history of entropy, discuss the pioneering notions of Shannon and later contributions of Kolmogorov and Sinai, and discuss in somewhat more details the extensions to infinite systems. We compare and contrast these entropies with each other and with the entropy on finite systems.
https://ijnaa.semnan.ac.ir/article_4050_8ffa4224508e953e9acfb96439027198.pdf
2019-11-01
27
33
10.22075/ijnaa.2019.17400.1931
Infinite invariant measure
Kolmogorov-Sinai entropy
Parry entropy
Krengel entropy
Poisson entropy
Pinsker factor
Massoud
Amini
mamini@modares.ac.ir
1
Department of Mathematics
Tarbiat Modares University
Tehran, Iran
LEAD_AUTHOR
ORIGINAL_ARTICLE
Solving a nonlinear inverse system of Burgers equations
By applying finite difference formula to time discretization and the cubic B-splines for spatial variable, a numerical method for solving the inverse system of Burgers equations is presented. Also, the convergence analysis and stability for this problem are investigated and the order of convergence is obtained. By using two test problems, the accuracy of presented method is verified. Additionally, obtained numerical results of the cubic B-spline method are compared to trigonometric cubic B-spline method, exponential cubic B-spline method and radial basis function method. Implementation simplicity and less computational cost are the main advantages of proposed scheme compared to previous proposals.
https://ijnaa.semnan.ac.ir/article_4051_fa12b05921b7c3b29c6bbf2534ee5565.pdf
2019-11-01
35
54
10.22075/ijnaa.2019.11008.1537
System of Burgers equations
Cubic B-spline
Collocation method
Inverse problems
Convergence analysis
Stability analysis
Tikhonov regularization method
Ill-posed problems
Noisy data
Hamed
Zeidabadi
h.zeidabadi@std.du.ac.ir
1
School of Mathematics and Computer Science, Damghan University, P.O.Box 36715-364, Damghan, Iran.
AUTHOR
Reza
Pourgholi
pourgholi@du.ac.ir
2
School of Mathematics and Computer Science, Damghan University, P.O.Box 36715-364, Damghan, Iran.
AUTHOR
Seyyed Hashem
Tabasi
tabasi@du.ac.ir
3
School of mathematics and computer sienceses, Damghan University, Semnan, Iran.
LEAD_AUTHOR
ORIGINAL_ARTICLE
Completely Continuous Banach Algebras
For a Banach algebra $\fA$, we introduce ~$c.c(\fA)$, the set of all $\phi\in \fA^*$ such that $\theta_\phi:\fA\to \fA^*$ is a completely continuous operator, where $\theta_\phi$ is defined by $\theta_\phi(a)=a\cdot\phi$~~ for all $a\in \fA$. We call $\fA$, a completely continuous Banach algebra if $c.c(\fA)=\fA^*$. We give some examples of completely continuous Banach algebras and a sufficient condition for an open problem raised for the first time by J.E Gal\`{e}, T.J. Ransford and M. C. White: Is there exist an infinite dimensional amenable Banach algebra whose underlying Banach space is reflexive? We prove that a reflexive, amenable, completely continuous Banach algebra with the approximation property is trivial.
https://ijnaa.semnan.ac.ir/article_4052_98d6bd83d5d5695668206e7b12bb7f92.pdf
2019-11-01
55
62
10.22075/ijnaa.2019.1184.1268
Amenability
Completely continuous
Banach algebra
Bahman
Hayati
hayati@malayeru.ac.ir
1
Malayer University
LEAD_AUTHOR
ORIGINAL_ARTICLE
Solvability of infinite system of nonlinear singular integral equations in the C(I\times I, c) space and modified semi-analytic method to find a closed-form of solution
In this article, we discuss about solvability of infinite systems of singular integral equations with two variables in the Banach sequence space $C(I \times I, c)$ by applying measure of noncompactness and Meir-Keeler condensing operators. By presenting an example, we have illustrated our results. For validity of the results we introduce a modified semi-analytic method in the case of two variables to make an iteration algorithm to find a closed-form of solution for the above problem. The numerical results show that the produced sequence for approximating the solution of example is in the $c$ space with a high accuracy.
https://ijnaa.semnan.ac.ir/article_4053_f0d83ce21ced64ebc87901f2504b2f55.pdf
2019-11-01
63
76
10.22075/ijnaa.2019.16525.1875
Measure of noncompactness
Infinite systems of singular integral equations
Meir-Keeler condensing operators
Fixed point theorem
Modified homotopy perturbation
Anupam
Das
anupam.das@di.ku.dk
1
Department of Mathematics‎, ‎Rajiv Gandhi University‎, ‎Rono Hills‎, ‎Arunachal Pradesh‎, ‎India
AUTHOR
Mohsen
Rabbani
mrabbani@iausari.ac.ir
2
Islamic Azad University,Iran
LEAD_AUTHOR
Bipan
Hazarika
bh_rgu@yahoo.co.in
3
Department of Mathematics‎, ‎Gauhati University‎, ‎Guwahati-781014‎, ‎Assam‎, ‎India
AUTHOR
Reza
Arab
mathreza.arab@gmail.com
4
Department of Mathematics‎, ‎Islamic Azad University,Iran
AUTHOR
ORIGINAL_ARTICLE
COUPLED FIXED POINT THEOREMS FOR RATIONAL TYPE CONTRACTIONS VIA C-CLASS FUNCTIONS
In this paper, by using C-class functions, we will present a coupled
xed problem in b-metric space for the single-valued operators satisfying a generalized contraction condition. First part of the paper is related to some
xed point theorems, the second part presents the uniqueness and existence for the solution of the coupled
xed point problem and in the third part we discuss data dependence, well-posedness, Ulam-Hyers stability and limit shadowing property of the coupled
xed point set.
https://ijnaa.semnan.ac.ir/article_4054_283349094c7b0d3ea2014e1c94994c7b.pdf
2019-11-01
77
98
10.22075/ijnaa.2018.11820.1591
Fixed point
ordered metric space
rational type contraction
coupled
xed point
data dependence
well-posedness
Ulam-Hyers stability
limit shadowing property
Arslan
Hojat Ansari
analsisamirmath2@gmail.com
1
Department of Mathematics, Karaj Branch, Islamic Azad University, Karaj, Iran
LEAD_AUTHOR
BAHMAN
MOEINI
moeini145523@gmail.com
2
Department of Mathematics, Hidaj Branch, Islamic Azad University, Hidaj, Iran
AUTHOR
isa
YILDIRIM
isayildirim@atauni.edu.tr
3
Department of Mathematics, Faculty of Science, Ataturk University, 25240 Erzurum, Turkey.
AUTHOR
anca
MARIA OPREA4
anca.oprea@math.ubbcluj.ro
4
Babe s-Bolyai University, Faculty of Mathematics and Computer Sciences, 400084 Cluj-Napoca, Romania
AUTHOR
ORIGINAL_ARTICLE
Nash Equilibrium Strategy for Bi-matrix Games with L-R Fuzzy Payoffs
In this paper, bi-matrix games are investigated based on L-R fuzzy variables. Also, based on the fuzzy max order several models in non-symmetrical L-R fuzzy environment is constructed and the existence condition of Nash equilibrium strategies of the fuzzy bi-matrix games is proposed. At last, based on the Nash equilibrium of crisp parametric bi-matrix games, we obtain the Pareto and weak Pareto Nash equilibrium strategies of the fuzzy bi-matrix games.
https://ijnaa.semnan.ac.ir/article_4055_8ed4b87793f9dc8aa68d20d0f30da122.pdf
2019-11-01
99
109
10.22075/ijnaa.2018.13073.1674
Bi-matrix game
Nash equilibrium
L-R fuzzy variable
Fatemeh
Madandar
fatemeh.madandar@kiau.ac.ir
1
Department of Mathematics, Karaj Branch, Islamic Azad University, Karaj, Iran
AUTHOR
Somayeh
Haghayeghi
s.haghayeghi@kiau.ac.ir
2
Department of Mathematics, Karaj Branch, Islamic Azad University, Karaj, Iran
LEAD_AUTHOR
S.Mansour
Vaezpour
vaez@aut.ac.ir
3
Amirkabir University of Technology (Tehran Polytechnic)
AUTHOR
ORIGINAL_ARTICLE
Fixed point theorems for new J-type mappings in modular spaces
In this paper, we introduce $\rho$-altering $J$-type mappings in modular spaces. We prove some fixed point theorems for $\rho$-altering and $\rho$-altering $J$-type mappings in modular spaces. We also furnish illustrative examples to express relationship between these mappings. As a consequence, the results are applied to the existence of solution of an integral equation arising from an ODE system.
https://ijnaa.semnan.ac.ir/article_4056_3d32ca72a3d313a00aa8b96543758683.pdf
2019-11-01
111
118
10.22075/ijnaa.2019.1816.1475
Modular space
$rho$-Altering mapping
$rho$-Asymptotically regular mapping
$rho$-$J$-type mapping
$rho$-altering $J$-type mapping
Integral equation
Esmaiel
Feizi
efeizi1@gmail.com
1
University of Buali Sina
LEAD_AUTHOR
Zahra
Hossseini
z.hoseini@basu.ac.ir
2
Bu-Ali Sina University
AUTHOR
ORIGINAL_ARTICLE
Periodic Wave Shock solutions of Burgers equations
In this paper we investigate the exact peroidic wave shock solutions of the Burgers equations. Our purpose is to describe the asymptotic behavior of the solution in the cauchy problem for viscid equation with small parametr ε and to discuss in particular the case of periodic wave shock. We show that the solution of this problem approaches the shock type solution for the cauchy problem of the inviscid burgers equation. The results are formulated in classical mathematics and proved with infinitesimal techniques of non standard analysis.
https://ijnaa.semnan.ac.ir/article_4057_49e099cb1ae39d820ee91104b59d3f1a.pdf
2019-11-01
119
129
10.22075/ijnaa.2018.10791.1524
Non Standard Analysis
Boundary Problem
Viscid Burgers Equation
Inviscid Burgers Equation
Heat Equation. Peroidic wave shock
Saida
Bendaas
saida_bendaas@yahoo.fr
1
University of setif
LEAD_AUTHOR
ORIGINAL_ARTICLE
ON SOFT ULTRAFILTERS
In this paper, the concept of soft ultrafilters is introduced and some of the related structures such as soft Stone-Cech compactification, principal soft ultrafilters and basis for its topology are studied.
https://ijnaa.semnan.ac.ir/article_4058_8b868059554bccbd18e97696b2d76efb.pdf
2019-11-01
131
138
10.22075/ijnaa.2017.12670.1645
Stone-Cech compactification
ultrafilter
soft set
Alireza
Bagheri Salec
alireza_bagheri_salec@yahoo.com
1
Qom university
LEAD_AUTHOR
ORIGINAL_ARTICLE
Hermitian solutions to the system of operator equations T_iX=U_i.
In this article we consider the system of operator equations T_iX=U_i for i=1,2,...,n and give necessary and suffcient conditions for the existence of common Hermitian solutions to this system of operator equations for arbitrary operators without the closedness condition. Also we study the Moore-penrose inverse of a ncross 1 block operator matrix and. then give the general form of common Hermitian solutions to this system of equations. Cosequently, we give the necessary and sffcient conditions for the existence of common Hermitian solutions to the system of operator equati and also present the necessary conditions for solvability of the equation sum_{i=1}{n}T_iX_i=U
https://ijnaa.semnan.ac.ir/article_4059_01638be695de3fa1c98b915e397bc3bf.pdf
2019-11-01
139
152
10.22075/ijnaa.2017.1475.1378
Operator equation
Hermitian solution
Common solution
Existence of solution
Moore penrose inverse
S.Mansour
Vaezpour
vaez@aut.ac.ir
1
Amirkabir University of Technology (Tehran Polytechnic)
LEAD_AUTHOR
Zahra
Bakhtiari
za_bakhtiari@yahoo.com
2
Department of Mathematics, Payam e Nour University, Tehran, Iran
AUTHOR
ORIGINAL_ARTICLE
Adaptive fuzzy sliding mode and indirect radial-basis-function neural network controller for trajectory tracking control of a car-like robot
The ever-growing use of various vehicles for transportation, on the one hand, and the statistics ofsoaring road accidents resulting from human error, on the other hand, reminds us of the necessity toconduct more extensive research on the design, manufacturing and control of driver-less intelligentvehicles. For the automatic control of an autonomous vehicle, we need its dynamic model, which,due to the existing uncertainties, the un-modeled dynamics and the performed simplications, isimpossible to determine exactly. Add to this, the external disturbances that exist on the movementpath. In this paper, two adaptive controllers have been proposed for tracking the trajectory of acar-like robot. The rst controller includes an indirect radial-basis-function neural network whoseparameters are updated online via gradient descent. The second controller is adaptively updatedonline by means of fuzzy logic. The proposed controller includes a nonlinear robust section thatuses the sliding mode method and a fuzzy logic section that updates some of the nonlinear controlparameters online. The fuzzy logic system has been designed to deal with the chattering problem inthe controller of car-like robot. In both controllers, the parameters have been determined by means ofgenetic algorithm. The obtained results indicate that even with the consideration of un-ideal effectssuch as uncertainties and external disturbances, the proposed controller has been able to performsuccessfully.
https://ijnaa.semnan.ac.ir/article_4060_9007e962e4554f3cf3f646d18bb437b3.pdf
2019-11-01
153
166
10.22075/ijnaa.2019.4060
dynamic model
trajectory tracking
car-like robot
sliding mode
fuzzy logic system
Masoud
Shirzadeh
masoud_shirzad@aut.ac.ir
1
Dept. of Electrical Engineering, Amirkabir University of Technology, Tehran 15875-4413, Iran
AUTHOR
Abdollah
Amirkhani
amirkhani@iust.ac.ir
2
Dept. of Automotive Engineering, Iran University of Science and Technology, Tehran 16846-13114, Iran
LEAD_AUTHOR
Mohammad H.
Shojaeefard
3
Department of Automotive Engineering, Iran University of Science and Technology, Tehran 16846-13114, Iran
AUTHOR
Hamid
Behroozi
4
Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran
AUTHOR
ORIGINAL_ARTICLE
Home appliances energy management based on the IoT system
The idea of the Internet of Things (IoT) has turned out to be increasingly prominent in the cuttingedge period of innovation than at any other time. From little family unit gadgets to extensive modernmachines, the vision of IoT has made it conceivable to interface the gadgets with the physical worldaround them. This expanding prominence has likewise made the IoT gadgets and applications inthe focal point of consideration among aggressors. Officially, a few sorts of pernicious exercises existthat endeavor to bargain the security and protection of the IoT gadgets. One fascinating rising riskvector is the assaults that misuse the utilization of sensors on IoT gadgets. IoT gadgets are powerlessagainst sensor-based dangers because of the absence of legitimate security estimations accessible tocontrol the utilization of sensors by applications. By abusing the sensors (e.g., accelerometer, gyrator,mouthpiece, light sensor, and so on.) on an IoT gadget, assailants can separate data from the gadget,exchange malware to a gadget, or trigger a pernicious movement to bargain the gadget. In this review,we investigate different dangers focusing on IoT gadgets and talk about how their sensors can bemishandled for malignant purposes. Specically, we present an itemized study about existing sensor-based dangers to IoT gadgets and countermeasures that are grown specically to verify the sensorsof IoT gadgets. Besides, we talk about the security and protection issues of IoT gadgets with regardsto sensor-based dangers and nish up with future research headings
https://ijnaa.semnan.ac.ir/article_4061_c66440845bb97a5c5bca37dc920cfd2f.pdf
2019-11-01
167
175
10.22075/ijnaa.2019.4061
Energy management
Internet of Things (IoT)
Intelligent Systems
Smart home
Home Appliances
Energy consumption
Heliasadat
Hosseinian
helia.hosseinian@aut.ac.ir
1
Faculty of Mechanics, Electrical and Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran
LEAD_AUTHOR
Hamidreza
Damghani
hamidreza.damghani@gmail.com
2
Faculty of Mechanics, Electrical and Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran
AUTHOR
Leila
Damghani
3
Faculty of Computer Engineering- Artificial intelligence, Kharazmi University, Tehran, Iran
AUTHOR
Golnoosh
Nezam
golnooshnezam@gmail.com
4
Faculty of architecture engineering, West Tehran Branch, Islamic Azad University, Tehran, Iran
AUTHOR
Hediyehsadat
Hosseinian
hediyehsadat.hosseinian@gmail.com
5
Faculty of architecture engineering, South Tehran Branch, Islamic Azad University, Tehran, Iran
AUTHOR
ORIGINAL_ARTICLE
A new SDN-based framework for wireless local area networks
Nowadays wireless networks are becoming important in personal and public communication andgrowing very rapidly. Similarly, Software Dened Network (SDN) is an emerging approach to over-come challenges of traditional networks. In this paper, a new SDN-based framework is proposedto ne-grained control of 802.11 Wireless LANs. This work describes the benets of programmableAccess Points. The proposed framework is evaluated on a prototype. We show that this architectureallows us to react to application needs, adjust network conguration for a priority application, detectnetwork problems, and improve the user experience of the network. Our architecture relies on theIEEE 802.11 standard, and exploits it to collect information from the stations.
https://ijnaa.semnan.ac.ir/article_4062_12f38bf23e016238db2c83ac2297d059.pdf
2019-11-01
177
183
10.22075/ijnaa.2019.4062
Software Defined Networks
Wireless Networks
Control Plane
Wireless LANs
Data Plane
Ahmad
Jalili
jalili@gonbad.ac.ir
1
Faculty of Computer Engineering, Gonbad Kavous University, Gonbad Kavous, Iran
LEAD_AUTHOR
ORIGINAL_ARTICLE
A Novel Approach for Detecting Relationships in Social Networks Using Cellular Automata Based Graph Coloring
All the social networks can be modeled as a graph, where each roles as vertex and each relationroles as an edge. The graph can be show as G = [V;E], where V is the set of vertices and E is theset of edges. All social networks can be segmented to K groups, where there are members in eachgroup with same features. In each group each person knows other individuals and is in touch withthem. In this study, the main goal is introducing a new approach for detecting these groups andminimizing the number of these groups using a cellular automat algorithm. There are two types ofsocial networks, containing simulated social network and real social network. The results show thatthe introduced method has a great potential to signicantly reduce the number of colors assignedand running time of the program.
https://ijnaa.semnan.ac.ir/article_4063_17f403a51f166a173016427ef4cb1f31.pdf
2019-11-01
185
192
10.22075/ijnaa.2019.4063
Social networks
Graph coloring
Cellular automata
M.
Kashani
m.kashani@irost.ir
1
Department of Electrical Engineering and Information Technology Iranian Research Organization for Science and Technology (IROST), Tehran, Iran
LEAD_AUTHOR
S.V.
Shojaedini
2
Department of Electrical Engineering and Information Technology Iranian Research Organization for Science and Technology (IROST), Tehran, Iran
AUTHOR
S.
Gorgin
3
Department of Electrical Engineering and Information Technology Iranian Research Organization for Science and Technology (IROST), Tehran, Iran
AUTHOR
ORIGINAL_ARTICLE
Cystoscopy Image Classification Using Deep Convolutional Neural Networks
In the past three decades, the use of smart methods in medical diagnostic systems has attracted the attention of many researchers. However, no smart activity has been provided in the field of medical image processing for diagnosis of bladder cancer through cystoscopy images despite the high prevalence in the world. In this paper, two well-known convolutional neural networks (CNNs) and a multilayer neural network was applied to classify bladder cystoscopy images. One of the most important issues in training phase of neural networks is determining the learning rate because selecting too small or large learning rate leads to slow convergence, volatility and divergence, respectively. Therefore, an algorithm is required to dynamically change the convergence rate. In this respect, an adaptive method was presented for determining the learning rate so that the multilayer neural network could be improved. In this method, the learning rate is determined using a coefficient based on the difference between the accuracy of training and validation according to the output error. In addition, the rate of changes is updated according to the level of weight changes and output error. The proposed method was evaluated on 720 bladder cystoscopy images in four classes of blood in urine, benign and malignant masses. Based on the simulated results, the second proposed method (CNNs) achieved at least 17% decrease in error and increased the convergence speed of the proposed method in the classification of cystoscopy images, compared to the other competing methods.
https://ijnaa.semnan.ac.ir/article_4064_1ae5421a208b9f8020134d448f2ce28c.pdf
2019-11-01
193
215
10.22075/ijnaa.2019.4064
Cystoscopy Images
Medical Image Classication
MLP Neural Network
Adaptive Learning Rate
CNNs
Seyyed Mohammad Reza
Hashemi
smr.hashemi@shahroodut.ac.ir
1
Faculty of Computer Engineering and IT, Shahrood University of Technology, Shahrood, Iran
AUTHOR
Hamid
Hassanpour
h.hassanpour@shahroodut.ac.ir
2
Faculty of Computer Engineering and IT, Shahrood University of Technology, Shahrood, Iran
AUTHOR
Ehsan
Kozegar
kozegar@guilan.ac.ir
3
University of Guilan, Guilan, Iran
LEAD_AUTHOR
Tao
Tan
t.tan1@tue.nl
4
Eindhoven University of Technology, Eindhoven, The Netherlands
AUTHOR
ORIGINAL_ARTICLE
Real-time Prediction and Synchronization of Business Process Instances using Data and Control Perspective
Nowadays, in a competitive and dynamic environment of businesses, organizations need to moni-tor, analyze and improve business processes with the use of Business Process Management Systems(BPMSs). Management, prediction and time control of events in BPMS is one of the major chal-lenges of this area of research that has attracted lots of researchers. In this paper, we present a4-phase pipeline approach to the problem of synchronizing each pair of dependent process instancesto arrive at the corresponding pair of tasks simultaneous or near-simultaneous. In the rst phase,the process model is mined from the event log and enriched by the probabilistic distributions oftime information. In the second phase, the hidden processing dependency between the each pair ofdependent process instances is formally dened and is mined from the event log. In the third phase,a process state prediction algorithm is presented to predict the future route of process instance andthen predict the remaining time of the process instance to a given point in a predicted route of thebusiness process. In the fourth phase, an iterative synchronization algorithm is presented based onthe presented process state prediction algorithm to make each pair of dependent process instancesarrive at the corresponding pair of tasks simultaneous or near-simultaneous. Experimental resultson a real-life event log of BPI challenge 2012 show that the proposed method leads to 39% reductionin cycle time for dependent process instances.
https://ijnaa.semnan.ac.ir/article_4065_618bebc09d64eb0b627624c37dceb9af.pdf
2019-11-01
217
228
10.22075/ijnaa.2019.4065
Business Process
Synchronization
Cycle Time Prediction
Dependent Process Instances
Iman
Firouzian
iman.firouzian@gmail.com
1
Faculty of Computer and IT, Shahrood University of Technology, Shahrood, Iran
LEAD_AUTHOR
Morteza
Zahedi
2
Faculty of Computer and IT, Shahrood University of Technology, Shahrood, Iran
AUTHOR
Hamid
Hassanpour
h.hassanpour@shahroodut.ac.ir
3
Faculty of Computer Engineering and IT, Shahrood University of Technology, Shahrood, Iran
AUTHOR
ORIGINAL_ARTICLE
Natural scene text localization using edge color signature
Localizing text regions in images taken from natural scenes is one of the challenging problems dueto variations in font, size, color and orientation of text. In this paper, we introduce a new concept socalled Edge Color Signature for localizing text regions in an image. This method is able to localizeboth Farsi and English texts. In the proposed method rst a pyramid using different scales of theinput image is created. Then for each level of the pyramid an edge map is extracted. Afterward,several geometric features are employed to lter out the non-text edges from the extracted edges.At this stage we describe an edge using colors of its neighboring pixels. We use the mean-Shiftalgorithm to obtain the color modes surrounding each edge pixel. Subsequently, the connectededge pixels with similar color signatures are clustered using Single-Linkage clustering algorithm toconstruct meaningful groups. Finally, each of the clusters is labeled as text or non-text using anMLP based cascade classier. The proposed method has been evaluated on well-known ICDAR 2013and our Farsi dataset, the result is very promising.
https://ijnaa.semnan.ac.ir/article_4066_8532277f2c7c0711482667b2f116a1dd.pdf
2019-11-01
229
237
10.22075/ijnaa.2019.4066
Text localization
Natural scene images
Edge color signature
Clustering
Farsi language
Jalil
Ghavidel
jalil_ghavidel@shahroodut.ac.ir
1
Faculty of Computer Engineering, Shahrood University of Technology, Shahrood, Iran
AUTHOR
Alireza
Ahmadyfard
ahmadyfard@shahroodut.ac.ir
2
Faculty of Electrical and Robotic Engineering, Shahrood University of Technology, Shahrood, Iran
LEAD_AUTHOR
Morteza
Zahedi
3
Faculty of Computer Engineering, Shahrood University of Technology, Shahrood, Iran
AUTHOR