2019
10
1
0
0
JENSEN’S INEQUALITY FOR GGCONVEX FUNCTIONS
2
2
In this paper, we obtain Jensen’s inequality for GGconvex functions. Also, we get in equalities alike to HermiteHadamard inequality for GGconvex functions. Some examples are given.
1

1
7


Gholamreza
Zabandan
Kharazmi university
Kharazmi university
Iran
zabandan@khu.ac.ir
Jensen’s inequality
GGconvex
Integral inequality
Analysis of disassembled executable codes by abstract interpretation
2
2
The aim of this paper is to dene the abstract domain, abstract operator, abstract semantic, the environments and states of disassembled executable codes as well as a way to analysis the disassembled executable codes. Nowadays, static analysis on disassembled code going to grow. Reverse engineering and malware analysis use this technique. Thus, we tried to perform pluralization the requirements of static analysis by abstract interpretation as well as report some specic and advantage note in this paper. In addition, we present an algorithm to obtain the control ow graph of disassembled code.
1

9
13


mohammad hadi
alaeiyan
Iran University of Science and Technology, Narmak, Tehran, 16844, Iran
Iran University of Science and Technology,
Iran
hadi_alaeiyan@comp.iust.ac.ir
Static analysis
Abstract domain
Abstract operator
Abstract semantic
Environment and state of abstract interpretation
Optimally Local Dense Conditions for the Existence of Solutions for Vector Equilibrium Problems
2
2
In this paper, by using Csequentially sign property for bifunctions, we provide sufficient conditions that ensure the existence of solutions of some vector equilibrium problems in Hausdorff topological vector spaces which ordered by a cone. The conditions which we consider are not imposed on the whole domain of the operators involved, but just on a locally segmentdense subset of the domain.
1

15
26


Sirous
Moradi
Arak University
Arak University
Iran
sirousmoradi@gmail.com


Maryam
Shokouhnia
Department of Mathematics, Faculty of Science, Arak University, Arak, Iran
Department of Mathematics, Faculty of Science,
Iran
shokoohniam63@yahoo.com


Somaye
Jafari
Department of Mathematics, Arak University, Arak, Iran
Department of Mathematics, Arak University,
Iran
s.jafari.math@gmail.com
locally segmentdense set
vector equilibrium problem
Csequentially sign property
Entropy of infinite systems and transformations
2
2
The KolmogorovSinai entropy is a far reaching dynamical generalization of Shannon entropy of information systems. This entropy works perfectly for probability measure preserving (p.m.p.) transformations. However, it is not useful when there is no finite invariant measure. There are certain successful extensions of the notion of entropy to infinite measure spaces, or transformations with infinite invariant measures. The three main extensions are Parry, Krengel, and Poisson entropies. In this survey, we shortly overview the history of entropy, discuss the pioneering notions of Shannon and later contributions of Kolmogorov and Sinai, and discuss in somewhat more details the extensions to infinite systems. We compare and contrast these entropies with each other and with the entropy on finite systems.
1

27
33


Massoud
Amini
Department of Mathematics
Tarbiat Modares University
Tehran, Iran
Department of Mathematics
Tarbiat Modares
Iran
mamini@modares.ac.ir
Infinite invariant measure
KolmogorovSinai entropy
Parry entropy
Krengel entropy
Poisson entropy
Pinsker factor
Solving a nonlinear inverse system of Burgers equations
2
2
By applying finite difference formula to time discretization and the cubic Bsplines for spatial variable, a numerical method for solving the inverse system of Burgers equations is presented. Also, the convergence analysis and stability for this problem are investigated and the order of convergence is obtained. By using two test problems, the accuracy of presented method is verified. Additionally, obtained numerical results of the cubic Bspline method are compared to trigonometric cubic Bspline method, exponential cubic Bspline method and radial basis function method. Implementation simplicity and less computational cost are the main advantages of proposed scheme compared to previous proposals.
1

35
54


Reza
Pourgholi
School of Mathematics and Computer Science, Damghan University, P.O.Box 36715364, Damghan, Iran.
School of Mathematics and Computer Science,
Iran
pourgholi@du.ac.ir


Seyyed Hashem
Tabasi
School of mathematics and computer sienceses, Damghan University, Semnan, Iran.
School of mathematics and computer sienceses,
Iran
tabasi@du.ac.ir


Hamed
Zeidabadi
School of Mathematics and Computer Science, Damghan University, P.O.Box 36715364, Damghan, Iran.
School of Mathematics and Computer Science,
Iran
h.zeidabadi@std.du.ac.ir
System of Burgers equations
Cubic Bspline
Collocation method
Inverse problems
Convergence analysis
Stability analysis
Tikhonov regularization method
Illposed problems
Noisy data
Completely Continuous Banach Algebras
2
2
For a Banach algebra $fA$, we introduce ~$c.c(fA)$, the set of all $phiin fA^*$ such that $theta_phi:fAto fA^*$ is a completely continuous operator, where $theta_phi$ is defined by $theta_phi(a)=acdotphi$~~ for all $ain fA$. We call $fA$, a completely continuous Banach algebra if $c.c(fA)=fA^*$. We give some examples of completely continuous Banach algebras and a sufficient condition for an open problem raised for the first time by J.E Gal`{e}, T.J. Ransford and M. C. White: Is there exist an infinite dimensional amenable Banach algebra whose underlying Banach space is reflexive? We prove that a reflexive, amenable, completely continuous Banach algebra with the approximation property is trivial.
1

55
62


Bahman
Hayati
Malayer University
Malayer University
Iran
hayati@malayeru.ac.ir
Amenability
Completely continuous
Banach algebra
Solvability of infinite system of nonlinear singular integral equations in the C(Itimes I, c) space and modified semianalytic method to find a closedform of solution
2
2
In this article, we discuss about solvability of infinite systems of singular integral equations with two variables in the Banach sequence space $C(I times I, c)$ by applying measure of noncompactness and MeirKeeler condensing operators. By presenting an example, we have illustrated our results. For validity of the results we introduce a modified semianalytic method in the case of two variables to make an iteration algorithm to find a closedform of solution for the above problem. The numerical results show that the produced sequence for approximating the solution of example is in the $c$ space with a high accuracy.
1

63
76


Anupam
Das
Department of Mathematics‎, ‎Rajiv Gandhi University‎, ‎Rono Hills‎, ‎Arunachal Pradesh‎, ‎India
Department of Mathematics‎, ‎Rajiv
Iran
anupam.das@di.ku.dk


Mohsen
Rabbani
Islamic Azad University,Iran
Islamic Azad University,Iran
Iran
mrabbani@iausari.ac.ir


Bipan
Hazarika
Department of Mathematics‎, ‎Gauhati University‎, ‎Guwahati781014‎, ‎Assam‎, ‎India
Department of Mathematics‎, ‎Gauha
Iran
bh_rgu@yahoo.co.in


Reza
Arab
Department of Mathematics‎, ‎Islamic Azad University,Iran
Department of Mathematics‎, ‎Islam
Iran
mathreza.arab@gmail.com
Measure of noncompactness
Infinite systems of singular integral equations
MeirKeeler condensing operators
Fixed point theorem
Modified homotopy perturbation
COUPLED FIXED POINT THEOREMS FOR RATIONAL TYPE CONTRACTIONS VIA CCLASS FUNCTIONS
2
2
In this paper, by using Cclass functions, we will present a coupled
xed problem in bmetric space for the singlevalued operators satisfying a generalized contraction condition. First part of the paper is related to some
xed point theorems, the second part presents the uniqueness and existence for the solution of the coupled
xed point problem and in the third part we discuss data dependence, wellposedness, UlamHyers stability and limit shadowing property of the coupled
xed point set.
1

77
98


Arslan
Hojat Ansari
Department of Mathematics, Karaj Branch, Islamic Azad University, Karaj, Iran
Department of Mathematics, Karaj Branch,
Iran
analsisamirmath2@gmail.com


BAHMAN
MOEINI
Department of Mathematics, Hidaj Branch, Islamic Azad University, Hidaj, Iran
Department of Mathematics, Hidaj Branch,
Iran
moeini145523@gmail.com


isa
YILDIRIM
Department of Mathematics, Faculty of Science, Ataturk University, 25240 Erzurum,
Turkey.
Department of Mathematics, Faculty of Science,
Iran
isayildirim@atauni.edu.tr


anca
MARIA OPREA4
Babe sBolyai University, Faculty of Mathematics and Computer Sciences, 400084 ClujNapoca, Romania
Babe sBolyai University, Faculty of Mathematics
Iran
anca.oprea@math.ubbcluj.ro
Fixed point
ordered metric space
rational type contraction
coupled
xed point
data dependence
wellposedness
UlamHyers stability
limit shadowing property
Nash Equilibrium Strategy for Bimatrix Games with LR Fuzzy Payoffs
2
2
In this paper, bimatrix games are investigated based on LR fuzzy variables. Also, based on the fuzzy max order several models in nonsymmetrical LR fuzzy environment is constructed and the existence condition of Nash equilibrium strategies of the fuzzy bimatrix games is proposed. At last, based on the Nash equilibrium of crisp parametric bimatrix games, we obtain the Pareto and weak Pareto Nash equilibrium strategies of the fuzzy bimatrix games.
1

99
109


S.Mansour
Vaezpour
Amirkabir University of Technology (Tehran Polytechnic)
Amirkabir University of Technology (Tehran
Iran
vaez@aut.ac.ir


Somayeh
Haghayeghi
Department of Mathematics, Karaj Branch, Islamic Azad University, Karaj, Iran
Department of Mathematics, Karaj Branch,
Iran
s.haghayeghi@kiau.ac.ir


Fatemeh
Madandar
Department of Mathematics, Karaj Branch, Islamic Azad University, Karaj, Iran
Department of Mathematics, Karaj Branch,
Iran
fatemeh.madandar@kiau.ac.ir
Bimatrix game
Nash equilibrium
LR fuzzy variable
Fixed point theorems for new Jtype mappings in modular spaces
2
2
In this paper, we introduce $rho$altering $J$type mappings in modular spaces. We prove some fixed point theorems for $rho$altering and $rho$altering $J$type mappings in modular spaces. We also furnish illustrative examples to express relationship between these mappings. As a consequence, the results are applied to the existence of solution of an integral equation arising from an ODE system.
1

111
118


Esmaiel
Feizi
University of Buali Sina
University of Buali Sina
Iran
efeizi1@gmail.com


Zahra
Hossseini
BuAli Sina University
BuAli Sina University
Iran
z.hoseini@basu.ac.ir
Modular space
$rho$Altering mapping
$rho$Asymptotically regular mapping
$rho$$J$type mapping
$rho$altering $J$type mapping
Integral equation
Periodic Wave Shock solutions of Burgers equations
2
2
In this paper we investigate the exact peroidic wave shock solutions of the Burgers equations. Our purpose is to describe the asymptotic behavior of the solution in the cauchy problem for viscid equation with small parametr ε and to discuss in particular the case of periodic wave shock. We show that the solution of this problem approaches the shock type solution for the cauchy problem of the inviscid burgers equation. The results are formulated in classical mathematics and proved with infinitesimal techniques of non standard analysis.
1

119
129


saida
bendaas
University of setif
University of setif
Iran
saida_bendaas@yahoo.fr
Non Standard Analysis
Boundary Problem
Viscid Burgers Equation
Inviscid Burgers Equation
Heat Equation. Peroidic wave shock
ON SOFT ULTRAFILTERS
2
2
In this paper, the concept of soft ultrafilters is introduced and some of the related structures such as soft StoneCech compactification, principal soft ultrafilters and basis for its topology are studied.
1

131
138


Alireza
Bagheri Salec
Qom university
Qom university
Iran
alireza_bagheri_salec@yahoo.com
StoneCech compactification
ultrafilter
soft set
Hermitian solutions to the system of operator equations T_iX=U_i.
2
2
In this article we consider the system of operator equations T_iX=U_i for i=1,2,...,n and give necessary and suffcient conditions for the existence of common Hermitian solutions to this system of operator equations for arbitrary operators without the closedness condition. Also we study the Moorepenrose inverse of a ncross 1 block operator matrix and. then give the general form of common Hermitian solutions to this system of equations. Cosequently, we give the necessary and sffcient conditions for the existence of common Hermitian solutions to the system of operator equati and also present the necessary conditions for solvability of the equation sum_{i=1}{n}T_iX_i=U
1

139
152


S.Mansour
Vaezpour
Amirkabir University of Technology (Tehran Polytechnic)
Amirkabir University of Technology (Tehran
Iran
vaez@aut.ac.ir


Zahra
Bakhtiari
Department of Mathematics, Payam e Nour University, Tehran, Iran
Department of Mathematics, Payam e Nour University
Iran
za_bakhtiari@yahoo.com
Operator equation
Hermitian solution
Common solution
Existence of solution
Moore penrose inverse
Adaptive fuzzy sliding mode and indirect radialbasisfunction neural network controller for trajectory tracking control of a carlike robot
2
2
The evergrowing use of various vehicles for transportation, on the one hand, and the statistics ofsoaring road accidents resulting from human error, on the other hand, reminds us of the necessity toconduct more extensive research on the design, manufacturing and control of driverless intelligentvehicles. For the automatic control of an autonomous vehicle, we need its dynamic model, which,due to the existing uncertainties, the unmodeled dynamics and the performed simplications, isimpossible to determine exactly. Add to this, the external disturbances that exist on the movementpath. In this paper, two adaptive controllers have been proposed for tracking the trajectory of acarlike robot. The rst controller includes an indirect radialbasisfunction neural network whoseparameters are updated online via gradient descent. The second controller is adaptively updatedonline by means of fuzzy logic. The proposed controller includes a nonlinear robust section thatuses the sliding mode method and a fuzzy logic section that updates some of the nonlinear controlparameters online. The fuzzy logic system has been designed to deal with the chattering problem inthe controller of carlike robot. In both controllers, the parameters have been determined by means ofgenetic algorithm. The obtained results indicate that even with the consideration of unideal effectssuch as uncertainties and external disturbances, the proposed controller has been able to performsuccessfully.
1

153
166


Masoud
Shirzadeh
Dept. of Electrical Engineering,
Amirkabir University of Technology,
Tehran 158754413, Iran
Dept. of Electrical Engineering,
Amirkabir
Iran
masoud_shirzad@aut.ac.ir


Abdollah
Amirkhani
Dept. of Automotive Engineering,
Iran University of Science and Technology,
Tehran 1684613114, Iran
Dept. of Automotive Engineering,
Iran University
Iran
amirkhani@iust.ac.ir


Mohammad H.
Shojaeefard
Department of Automotive Engineering, Iran University of Science and Technology, Tehran 1684613114, Iran
Department of Automotive Engineering, Iran
Iran


Hamid
Behroozi
Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran
Department of Electrical Engineering, Sharif
Iran
dynamic model
trajectory tracking
carlike robot
sliding mode
fuzzy logic system
Home appliances energy management based on the IoT system
2
2
The idea of the Internet of Things (IoT) has turned out to be increasingly prominent in the cuttingedge period of innovation than at any other time. From little family unit gadgets to extensive modernmachines, the vision of IoT has made it conceivable to interface the gadgets with the physical worldaround them. This expanding prominence has likewise made the IoT gadgets and applications inthe focal point of consideration among aggressors. Officially, a few sorts of pernicious exercises existthat endeavor to bargain the security and protection of the IoT gadgets. One fascinating rising riskvector is the assaults that misuse the utilization of sensors on IoT gadgets. IoT gadgets are powerlessagainst sensorbased dangers because of the absence of legitimate security estimations accessible tocontrol the utilization of sensors by applications. By abusing the sensors (e.g., accelerometer, gyrator,mouthpiece, light sensor, and so on.) on an IoT gadget, assailants can separate data from the gadget,exchange malware to a gadget, or trigger a pernicious movement to bargain the gadget. In this review,we investigate different dangers focusing on IoT gadgets and talk about how their sensors can bemishandled for malignant purposes. Specically, we present an itemized study about existing sensorbased dangers to IoT gadgets and countermeasures that are grown specically to verify the sensorsof IoT gadgets. Besides, we talk about the security and protection issues of IoT gadgets with regardsto sensorbased dangers and nish up with future research headings
1

167
175


Heliasadat
Hosseinian
Faculty of Mechanics, Electrical and Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran
Faculty of Mechanics, Electrical and Computer
Iran
helia.hosseinian@aut.ac.ir


Hamidreza
Damghani
Faculty of Mechanics, Electrical and Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran
Faculty of Mechanics, Electrical and Computer
Iran
hamidreza.damghani@gmail.com


Leila
Damghani
Faculty of Computer Engineering Artificial intelligence, Kharazmi University, Tehran, Iran
Faculty of Computer Engineering Artificial
Iran


Golnoosh
Nezam
Faculty of architecture engineering, West Tehran Branch, Islamic Azad University, Tehran, Iran
Faculty of architecture engineering, West
Iran
golnooshnezam@gmail.com


Hediyehsadat
Hosseinian
Faculty of architecture engineering, South Tehran Branch, Islamic Azad University, Tehran, Iran
Faculty of architecture engineering, South
Iran
hediyehsadat.hosseinian@gmail.com
Energy management
Internet of Things (IoT)
Intelligent Systems
Smart home
Home Appliances
Energy consumption
A new SDNbased framework for wireless local area networks
2
2
Nowadays wireless networks are becoming important in personal and public communication andgrowing very rapidly. Similarly, Software Dened Network (SDN) is an emerging approach to overcome challenges of traditional networks. In this paper, a new SDNbased framework is proposedto negrained control of 802.11 Wireless LANs. This work describes the benets of programmableAccess Points. The proposed framework is evaluated on a prototype. We show that this architectureallows us to react to application needs, adjust network conguration for a priority application, detectnetwork problems, and improve the user experience of the network. Our architecture relies on theIEEE 802.11 standard, and exploits it to collect information from the stations.
1

177
183


Ahmad
Jalili
Faculty of Computer Engineering, Gonbad Kavous University, Gonbad Kavous, Iran
Faculty of Computer Engineering, Gonbad
Iran
jalili@gonbad.ac.ir
Software Defined Networks
Wireless Networks
Control Plane
Wireless LANs
Data Plane
A Novel Approach for Detecting Relationships in Social Networks Using Cellular Automata Based Graph Coloring
2
2
All the social networks can be modeled as a graph, where each roles as vertex and each relationroles as an edge. The graph can be show as G = [V;E], where V is the set of vertices and E is theset of edges. All social networks can be segmented to K groups, where there are members in eachgroup with same features. In each group each person knows other individuals and is in touch withthem. In this study, the main goal is introducing a new approach for detecting these groups andminimizing the number of these groups using a cellular automat algorithm. There are two types ofsocial networks, containing simulated social network and real social network. The results show thatthe introduced method has a great potential to signicantly reduce the number of colors assignedand running time of the program.
1

185
192


M.
Kashani
Department of Electrical Engineering and Information Technology Iranian Research Organization for Science and
Technology (IROST), Tehran, Iran
Department of Electrical Engineering and
Iran
m.kashani@irost.ir


S.V.
Shojaedini
Department of Electrical Engineering and Information Technology Iranian Research Organization for Science and
Technology (IROST), Tehran, Iran
Department of Electrical Engineering and
Iran


S.
Gorgin
Department of Electrical Engineering and Information Technology Iranian Research Organization for Science and
Technology (IROST), Tehran, Iran
Department of Electrical Engineering and
Iran
Social networks
Graph coloring
Cellular automata
Cystoscopy Image Classification Using Deep Convolutional Neural Networks
2
2
In the past three decades, the use of smart methods in medical diagnostic systems has attracted the attention of many researchers. However, no smart activity has been provided in the field of medical image processing for diagnosis of bladder cancer through cystoscopy images despite the high prevalence in the world. In this paper, two wellknown convolutional neural networks (CNNs) and a multilayer neural network was applied to classify bladder cystoscopy images. One of the most important issues in training phase of neural networks is determining the learning rate because selecting too small or large learning rate leads to slow convergence, volatility and divergence, respectively. Therefore, an algorithm is required to dynamically change the convergence rate. In this respect, an adaptive method was presented for determining the learning rate so that the multilayer neural network could be improved. In this method, the learning rate is determined using a coefficient based on the difference between the accuracy of training and validation according to the output error. In addition, the rate of changes is updated according to the level of weight changes and output error. The proposed method was evaluated on 720 bladder cystoscopy images in four classes of blood in urine, benign and malignant masses. Based on the simulated results, the second proposed method (CNNs) achieved at least 17% decrease in error and increased the convergence speed of the proposed method in the classification of cystoscopy images, compared to the other competing methods.
1

193
215


Seyyed Mohammad Reza
Hashemi
Faculty of Computer Engineering and IT, Shahrood University of Technology, Shahrood, Iran
Faculty of Computer Engineering and IT, Shahrood
Iran
smr.hashemi@shahroodut.ac.ir


Hamid
Hassanpour
Faculty of Computer Engineering and IT, Shahrood University of Technology, Shahrood, Iran
Faculty of Computer Engineering and IT, Shahrood
Iran
h.hassanpour@shahroodut.ac.ir


Ehsan
Kozegar
University of Guilan, Guilan, Iran
University of Guilan, Guilan, Iran
Iran
kozegar@guilan.ac.ir


Tao
Tan
Eindhoven University of Technology, Eindhoven, The Netherlands
Eindhoven University of Technology, Eindhoven,
Iran
t.tan1@tue.nl
Cystoscopy Images
Medical Image Classication
MLP Neural Network
Adaptive Learning Rate
CNNs
Realtime Prediction and Synchronization of Business Process Instances using Data and Control Perspective
2
2
Nowadays, in a competitive and dynamic environment of businesses, organizations need to monitor, analyze and improve business processes with the use of Business Process Management Systems(BPMSs). Management, prediction and time control of events in BPMS is one of the major challenges of this area of research that has attracted lots of researchers. In this paper, we present a4phase pipeline approach to the problem of synchronizing each pair of dependent process instancesto arrive at the corresponding pair of tasks simultaneous or nearsimultaneous. In the rst phase,the process model is mined from the event log and enriched by the probabilistic distributions oftime information. In the second phase, the hidden processing dependency between the each pair ofdependent process instances is formally dened and is mined from the event log. In the third phase,a process state prediction algorithm is presented to predict the future route of process instance andthen predict the remaining time of the process instance to a given point in a predicted route of thebusiness process. In the fourth phase, an iterative synchronization algorithm is presented based onthe presented process state prediction algorithm to make each pair of dependent process instancesarrive at the corresponding pair of tasks simultaneous or nearsimultaneous. Experimental resultson a reallife event log of BPI challenge 2012 show that the proposed method leads to 39% reductionin cycle time for dependent process instances.
1

217
228


Iman
Firouzian
Faculty of Computer and IT,
Shahrood University of Technology, Shahrood, Iran
Faculty of Computer and IT,
Shahrood University
Iran
iman.firouzian@gmail.com


Morteza
Zahedi
Faculty of Computer and IT,
Shahrood University of Technology, Shahrood, Iran
Faculty of Computer and IT,
Shahrood University
Iran


Hamid
Hassanpour
Faculty of Computer Engineering and IT, Shahrood University of Technology, Shahrood, Iran
Faculty of Computer Engineering and IT, Shahrood
Iran
h.hassanpour@shahroodut.ac.ir
Business Process
Synchronization
Cycle Time Prediction
Dependent Process Instances
Natural scene text localization using edge color signature
2
2
Localizing text regions in images taken from natural scenes is one of the challenging problems dueto variations in font, size, color and orientation of text. In this paper, we introduce a new concept socalled Edge Color Signature for localizing text regions in an image. This method is able to localizeboth Farsi and English texts. In the proposed method rst a pyramid using different scales of theinput image is created. Then for each level of the pyramid an edge map is extracted. Afterward,several geometric features are employed to lter out the nontext edges from the extracted edges.At this stage we describe an edge using colors of its neighboring pixels. We use the meanShiftalgorithm to obtain the color modes surrounding each edge pixel. Subsequently, the connectededge pixels with similar color signatures are clustered using SingleLinkage clustering algorithm toconstruct meaningful groups. Finally, each of the clusters is labeled as text or nontext using anMLP based cascade classier. The proposed method has been evaluated on wellknown ICDAR 2013and our Farsi dataset, the result is very promising.
1

229
237


Jalil
Ghavidel
Faculty of Computer Engineering, Shahrood University of Technology, Shahrood, Iran
Faculty of Computer Engineering, Shahrood
Iran
jalil_ghavidel@shahroodut.ac.ir


Alireza
Ahmadyfard
Faculty of Electrical and Robotic Engineering, Shahrood University of Technology, Shahrood, Iran
Faculty of Electrical and Robotic Engineering,
Iran
ahmadyfard@shahroodut.ac.ir


Morteza
Zahedi
Faculty of Computer Engineering, Shahrood University of Technology, Shahrood, Iran
Faculty of Computer Engineering, Shahrood
Iran
Text localization
Natural scene images
Edge color signature
Clustering
Farsi language