• Home
  • Identification
    • List of Articles Identification

      • Open Access Article

        1 - Applying genetic algorithm for automatic service identification based on quality metrics
        Jan Mohammad Rajabi saeed parsa masoud bagheri ali akbar
        Service-oriented architecture improves the stability and operational capability of software systems for passive defense measures. Automatic identification of services using quality of service measures ensures the successful deployment of service-oriented architecture an More
        Service-oriented architecture improves the stability and operational capability of software systems for passive defense measures. Automatic identification of services using quality of service measures ensures the successful deployment of service-oriented architecture and is great importance to speed up software development life cycle. Little attention to non-functional requirements, no considerations for concurrent effects of business activities and entities and non-automated ranking of candidate services are the major issues with current approaches. The approach proposed in this paper considers both the business processes and entities, simultaneously to detect services. Applying a genetic algorithm, candidate services are identified based on quality metrics i.e. granularity, coupling, cohesion and convergence. These metrics are obtained from breaking goals to requirements of level. The TOPSIS method is applied to rank the candidate services. The illustrated case study is shown that high quality services can be identified automatically with minimal software developer’s interventions. Manuscript profile
      • Open Access Article

        2 - An Intelligent Algorithm for the Process Section of Radar Surveillance Systems
        Habib Rasi
        In this paper, an intelligent algorithm for clustering, intra-pulse modulation detection and separation and identification of overlapping radar pulse train is presented. In most cases, based only on primary features of incoming radar signals, the modern electronic intel More
        In this paper, an intelligent algorithm for clustering, intra-pulse modulation detection and separation and identification of overlapping radar pulse train is presented. In most cases, based only on primary features of incoming radar signals, the modern electronic intelligence system cannot recognize the different devices of the same type or class. A very important role is played by Measurement and Signature Intelligence. A radar intercept receiver passively collects incoming pulse samples from a number of unknown emitters. The information such as Pulse Repetition Interval (PRI), Angle of Arrival (AoA), Pulse Width (PW), Radio Frequencies (RF), and Doppler shifts are not usable. In the proposed algorithm, for clustering of overlapping pulses received from self-organization neural network SOFM (due to its high accuracy in comparison with other neural networks, such as CLNN and neural networks (Fuzzy ART), and for detecting intra-pulse modulation type, matrix method, and for identifying the radar type, RBF neural network have been used. The simulation results of the proposed algorithm shows that in the presence 5% noise and 5% missing pulse, the accuracy of the clustering part of the proposed algorithm is equivalent to 91/8%, intra-pulse modulation recognition accuracy is 98%, the detection accuracy is 2/99%, and the total output of the algorithm precision is 89/244%, respectively. Manuscript profile
      • Open Access Article

        3 - Parameter Estimation in Hysteretic Systems Based on Adaptive Least-Squares
        Mansour Peimani Mohammad Javad Yazdanpanah Naser Khaji
        In this paper, various identification methods based on least-squares technique to estimate the unknown parameters of structural systems with hysteresis are investigated. The Bouc-Wen model is used to describe the behavior of hysteretic nonlinear systems. The adaptive ve More
        In this paper, various identification methods based on least-squares technique to estimate the unknown parameters of structural systems with hysteresis are investigated. The Bouc-Wen model is used to describe the behavior of hysteretic nonlinear systems. The adaptive versions are based on the fixed and variable forgetting factor and the optimized version is based on optimized adaptive coefficient matrix. Simulation results show the efficient performance of the proposed technique in identification and tracking of hysteretic structural system parameters compared with other least square based algorithms. Manuscript profile
      • Open Access Article

        4 - Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier
        Kimia Bolouri Mehdi Javanmard Mohammad Firouzmand
        Identifying the source camera of an image is one of the most important issues of digital court and is useful in many applications, such as images that are presented in court as evidence. In many methods, the image noise characteristics, extraction of Sensor Pattern Nois More
        Identifying the source camera of an image is one of the most important issues of digital court and is useful in many applications, such as images that are presented in court as evidence. In many methods, the image noise characteristics, extraction of Sensor Pattern Noise and its correlation with non-uniformity of the light response (PNU) are used. In this paper we have presented a method based on photo response non uniformity (PRNU) that provides some features for classification by support vector machine (SVM). Because the noise model is affected by the complexity of the image, we used the wavelet transform to de-noise and reduce edge effects in PRNU noise pattern and also raise the detection accuracy. We also used the Precision processing theory to reduce the image size, then we simplified and summarized the data using the Single Value Decomposition (SVD) Or principal component analysis (PCA). The results show that using two-level wavelet transform and summarized data is more suitable using PCA. Manuscript profile
      • Open Access Article

        5 - Feature selection for author identification of Persian online short texts
        somayeh arefi mohamad ehsan basiri omid roozmand
        The growing use of social media and online communication to express opinions, exchange ideas, and also the expanding use of of this platforms by Persian users has increased Persian texts on the Web. This remarkable growth, along with abusive use of the writer's anonymit More
        The growing use of social media and online communication to express opinions, exchange ideas, and also the expanding use of of this platforms by Persian users has increased Persian texts on the Web. This remarkable growth, along with abusive use of the writer's anonymity, reveals the need for the author's automatic identification system in this language. In this research, the purpose of the study is to investigate the factors affecting the identification of authors of Persian reviews produced by cell-phone buyers and also to evaluate supervised and unsupervised methods. The factors considered in this research include lexical, syntactic, semantic, structural, grammatical, text-specific, and specific to social networks. After extracting these features, selecting the best features is tested by four algorithms including feature correlation, gain ratio, OneR, and principal components analysis. In the following, K-means, EM and density-based clustering will be used for clustering and Bayesian network, random forest, and Bagging will be used for categorization. The evaluation of the above algorithms on Persian comments of Samsung phone buyers indicates that the best performance among the clustering algorithms is 59/16% obtained by the EM algorithm on top-15 features selected by OneR, while the random forest algorithm using top-90 features selected by gain ratio with 79/57% achieves the best performance among the classification algorithms. Also, the comparison of features showed that syntactic features had the most effect on the identification of the author of short texts, and then, lexical, text-specific, specific to social networks, structural, grammatical and semantic features, respectively. Manuscript profile
      • Open Access Article

        6 - Membership in social network son the level of identification and social security adolescents
        Abbas Ali  Shahidi
        Social networks are consequence of Internet and ICT applications. The study aimed to investigate the effect of membership in a social network virtual on the level of Identification and sense of security adolescents. The research was descriptive and causal- comparative. More
        Social networks are consequence of Internet and ICT applications. The study aimed to investigate the effect of membership in a social network virtual on the level of Identification and sense of security adolescents. The research was descriptive and causal- comparative. The population was consist of all boys and girls in the city of Arak that selected 200 people with using purposive sampling. To collect data was used Question naira sordid gentrification (ISI)and social security questionnaire .The data were analyzed with T- test and analysis of variance and using SPSS software. Result showed that between levels of identification and social security in the member sandman- members adolescents،there was no significant difference. Based on the findings of this study seem that membership in social networks alone do not explain the levels ofidenti ficationor social security Ado lessens and other factors such as family, school environment and educational environment and other condition straining and develop end processing the adolescents can influence the form at ion fid entity and sense of security of them. Manuscript profile
      • Open Access Article

        7 - A study of the nature of private data in the performance mechanism of IoT technology tools
        hosein sadeghi Mahdi  Naser
        The invention of Internet of Things technology and its application has led to the development of industry and trade in countries. Tools that include Internet of Things technology are tools that enable simulation of human performance by tools by embedding multiple stimul More
        The invention of Internet of Things technology and its application has led to the development of industry and trade in countries. Tools that include Internet of Things technology are tools that enable simulation of human performance by tools by embedding multiple stimuli and sensors. But the mechanism of action of these tools has challenges in maintaining the security of private information. The first issue in this regard is the necessity of nature and separation of private data of the non-private type. In the Iranian legal system, the only legal document in this field is Article 58 of Electronic Commerce Law, and the ambiguous text of this article has challenged the identification of this type of data. In this article, for an unknown reason, by separating the types of private data, not only has nature of this data been disrupted, but only a specific category of this data has been subject to the terms of the article for processing and no other provisions have been established. Is. However, in European Union, there are relatively comprehensive regulations in field of identifying the nature of private data, four criteria of identification based on the nature of the data processed, the purposes of using the processed data, concept of nicknamed data and Encrypted data exchanged in decentralized platforms (including China blockchain technology) has been identified as the criterion for identifying this type of data. Application of these criteria by policymakers in Iran could be the solution to many of the challenges ahead.. Manuscript profile
      • Open Access Article

        8 - Providing a model for talent identification and succession in order to establish a competency system (Case study: Bank Mellat companies)
        elaheh sheykhi masoud haghighi Alireza Rezghirostami
        The new era is characterized by features such as innovation, knowledge development, globalization and increased competition; For this reason, organizations are doing their best to win the growing competition, of which human resources is the most important. The present More
        The new era is characterized by features such as innovation, knowledge development, globalization and increased competition; For this reason, organizations are doing their best to win the growing competition, of which human resources is the most important. The present study is a descriptive-survey research and in terms of data collection, it is a type of descriptive survey research. The statistical population of the study is 755 managers and experts of Bank Mellat companies who have selected a sample of 255 people using the Cochran's formula and a simple sampling method. A questionnaire was used to collect information. For data analysis, Smart PLS software have been used. Following this research, components and indicators were determined. On the other hand, in the relationships between the components, it was found that the identified components for each variable have a high correlation with them and have been able to explain the main variable well. Finally, during modeling, it was found that talent identification has an effect on succession and the establishment of the competency system, and in addition, succession has a mediating role in the effect of talent identification on competency. Manuscript profile
      • Open Access Article

        9 - Plato’s Mathematical Ontology in Islamic and Western Interpretations
        Mohammad Saket Nalkiashari Ali Naqi  Baqershahi
        Mathematics has always been considered to be among certain sciences; however, the objects of mathematical knowledge have continually occupied the minds of mathematicians and philosophers of mathematics. The theory stating that the objects of mathematics consist of a num More
        Mathematics has always been considered to be among certain sciences; however, the objects of mathematical knowledge have continually occupied the minds of mathematicians and philosophers of mathematics. The theory stating that the objects of mathematics consist of a number of certain immaterial and separate affairs which are independent of the world of the human mind and thought has been attributed to Plato, and several realist philosophers who, in spite of all their differences, have been called neo-Platonists. Commentators of Plato have failed in providing any clear and consistent interpretation, whether in terms of ontology or semantics, of his philosophy of mathematics, which has resulted in some misunderstandings in this regard and some ambiguity in his whole philosophy. When completing his PhD dissertation at the University of Bristol, Paul Pritchard presented an interpretation of Plato’s ontology, according to which the objects of mathematics are the same sensible things. Here, the allegory of the divided line has been interpreted differently, and the existing ambiguities have been removed. In this paper, the authors have examined this interpretation and compared it with other interpretations of Plato’s ontology of mathematics. They also refer to its effects on Plato’s philosophy of mathematics in general and reveal that, unlike its traditional interpretation, his philosophy of mathematics does not conflict with Benacerraf’s identification problem. Moreover, the authors demonstrate that, based on Mulla Sadra’s arguments, the theory of Ideas is a completely consistent theory in terms of ontology and, thus, Plato’s philosophy of mathematics is a consistent body of philosophy. Manuscript profile
      • Open Access Article

        10 - شناسایی فرآیندهای کسب‌وکار (مطالعه موردی: شرکت ساماندهی صنایع و مشاغل شهر تهران)
        Mehrdad Agha Mohammad Ali Kermani حیدر بیرانوند Atieh bozorgipour
        مدیریت فرآیندهای کسب‌وکار یک روش‌شناسی نظام‌مند به‌منظور شناسایی، طراحی/ بازطراحی، ایجاد، مستندسازی، اندازه‌گیری، پایش و کنترل فرآیندهای کسب‌وکار، به‌منظور ایجاد ارزش برای مشتریان سازمان با چابکی بالاتر است. پژوهش حاضر با توجه به اهمیت بسیار بالای شناسایی فرآیندها به عن More
        مدیریت فرآیندهای کسب‌وکار یک روش‌شناسی نظام‌مند به‌منظور شناسایی، طراحی/ بازطراحی، ایجاد، مستندسازی، اندازه‌گیری، پایش و کنترل فرآیندهای کسب‌وکار، به‌منظور ایجاد ارزش برای مشتریان سازمان با چابکی بالاتر است. پژوهش حاضر با توجه به اهمیت بسیار بالای شناسایی فرآیندها به عنوان سنگ بنای طراحی و بهبود مستمر فرآیندهای کسب‌وکار، به ارائه یک رویکرد جدید و بسیار کارا جهت شناسایی فرآیندهای سازمان پرداخته است. معماری فرآیندهای سازمانی عنوان این رویکرد می‌باشد. در ادامه، شرکت ساماندهی صنایع و مشاغل شهر تهران به عنوان مطالعه موردی مورد بررسی قرار گرفته است و سه مورد از فرآیندهای اصلی آن شناسایی‌شده‌اند. نتایج نشان می‌دهد که با استفاده از این روش، امر شناسایی و کشف فرآیندهای سازمان با دقت و کارایی فوق‌العاده بالایی صورت پذیرفته و در قالبی کاملاً استاندارد ارائه می‌گردد. Manuscript profile
      • Open Access Article

        11 - Exploring of Opportunity Identification Process in Corporate of Converging Technologies
        Mohammad hashemi Ali Mobini Dehkordi Mohammad Reza Meigounpoory kamal sakhdari
        In the present era, technological innovation is a key factor in the development and advancement of societies, and technological entrepreneurship is recognized as the main source of disruptive innovation through identifying and effectively exploiting technological opport More
        In the present era, technological innovation is a key factor in the development and advancement of societies, and technological entrepreneurship is recognized as the main source of disruptive innovation through identifying and effectively exploiting technological opportunities. Given the emerging concept of "convergence" in high technologies and novel opportunities resulting from that, it is necessary to recognize the various dimensions of this phenomenon, especially the process of identifying opportunities, as the first and most fundamental step of the technological entrepreneurship process. This research is based on the epistemology of "interpretiveism" and it is exploratory and based on literature on Entrepreneurial opportunities, technological corporate entrepreneurship, interdisciplinary studies and convergent technologies. In this research, the unit of analysis, is the "opportunity identification process" and the level of analysis, is "organization" and the concept of "convergence" as the dominant approach to research has been considered. Also, the research method is qualitative and research strategy, is a multiple case study. The collection of research data has been done through a semi-structured interview and observation of archival documents. The results of the research indicate the great importance of factors such as interdisciplinary understanding, interdisciplinary absorptive capacity, and the type of human capital in the process of identifying opportunities in active companies in the field of converging technologies Manuscript profile
      • Open Access Article

        12 - The New Generation of Partial Discharge Measuring Systems and Their Application in Defect Identification of High Voltage Equipment
        H. R. Mirzaei A. Akbari A. Mazhab Jafari Mohammad Kharezi
        This paper presents a new impedance based fault location algorithm for practical radial distribution systems. The algorithm uses the fundamental components of voltages and currents recorded by a digital fault recorder usually installed at the head of main feeders.
        This paper presents a new impedance based fault location algorithm for practical radial distribution systems. The algorithm uses the fundamental components of voltages and currents recorded by a digital fault recorder usually installed at the head of main feeders. Manuscript profile
      • Open Access Article

        13 - Web Robot Detection Using Fuzzy Rough Set Theory
        S. Rahimi J. Hamidzadeh
        Web robots are software programs that traverse the internet autonomously. Their most important task is to fetch information and send it to the origin server. The high consumption of network bandwidth by them and server performance reduction, have caused the web robot de More
        Web robots are software programs that traverse the internet autonomously. Their most important task is to fetch information and send it to the origin server. The high consumption of network bandwidth by them and server performance reduction, have caused the web robot detection problem. In this paper, fuzzy rough set theory has been used for web robot detection. The proposed method includes 4 phases. In the first phase, user sessions have identified using fuzzy rough set clustering. In the second phase, a vector of 10 features is extracted for each session. In the third phase, the identified sessions are labeled using a heuristic method. In the fourth phase, these labels are improved using fuzzy rough set classification. The proposed method performance has been evaluated on a real world dataset. The experimental results have been compared with state-of-the-art methods, and show the superiority of the proposed method in terms of F-measure. Manuscript profile
      • Open Access Article

        14 - Identification of Coherent Machines Based on Slow Coherency
        S. H.  Adeli A.  Rabiee
        To study the stability of dynamic systems, it is neither practical nor necessary to model the entire interconnected system in details. In more specific application, such as dynamic security assessment and system control design, reduced order models of the entire system, More
        To study the stability of dynamic systems, it is neither practical nor necessary to model the entire interconnected system in details. In more specific application, such as dynamic security assessment and system control design, reduced order models of the entire system, or part of it, are needed to satisfy computational or design constraints. In this paper, a dynamic reduction method based on coherency concept is developed and slow coherency identification is used to identify coherency machine. Despite its simplicity, the proposed method provides an effective approach to recognize coherence generators. Furthermore, a new clustering method is suggested in this paper to improve acceleration of coherence machines identification. Finally, the accuracy of proposed method is evaluated by time domain simulation and compared with other methods. The obtained results indicate that the new proposed grouping method works more quickly than the other methods in the area, concluding that, without loss of accuracy, it can be readily used in dynamic studies of power systems. Manuscript profile
      • Open Access Article

        15 - Improving the Architecture of Convolutional Neural Network for Classification of Images Corrupted by Impulse Noise
        Mohammad Momeny M. Agha Sarram A. M.  Latif R. Sheikhpour
        Impulse noise is one the common noises which reduces the performance of convolutional neural networks (CNNs) in image classification. Preprocessing for removal of impulse noise is a costly process which may have a destructive effect on the training and validation of the More
        Impulse noise is one the common noises which reduces the performance of convolutional neural networks (CNNs) in image classification. Preprocessing for removal of impulse noise is a costly process which may have a destructive effect on the training and validation of the convolutional neural networks due to insufficient improvement of noisy images. In this paper, a convolutional neural network is proposed which is robust to impulse noise. Proposed CNN classify images corrupted by impulse noise without any preprocessing for noise removal. A noise detection layer is placed at the beginning of the proposed CNN to prevent the processing of noisy values. The ILSVRC-2012 database is used to train the proposed CNN. Experimental results show that preventing the impact of impulse noise on the training process and classification of CNN can increase the accuracy and speed of the network training. The proposed CNN with error of 0.24 is better than other methods in classification of noisy image corrupted by impulse noise with 10% density. The time complexity of O(1) in the proposed CNN for robustness to noise indicates the superiority of the proposed CNN. Manuscript profile
      • Open Access Article

        16 - Hoax Identification of Indonesian Tweeters using Ensemble Classifier
        Gus Nanang Syaifuddiin Rizal Arifin Desriyanti Desriyanti Ghulam Asrofi  Buntoro Zulkham Umar  Rosyidin Ridwan Yudha  Pratama Ali  Selamat
        Fake information, better known as hoaxes, is often found on social media. Currently, social media is not only used to make friends or socialize with friends online, but some use it to spread hate speech and false information. Hoaxes are very dangerous in social life, es More
        Fake information, better known as hoaxes, is often found on social media. Currently, social media is not only used to make friends or socialize with friends online, but some use it to spread hate speech and false information. Hoaxes are very dangerous in social life, especially in countries with large populations and ethnically diverse cultures, such as Indonesia. Although there have been many studies on detecting false information, the accuracy and efficiency still need to be improved. To help prevent the spread of these hoaxes, we built a model to identify false information in Indonesian using an ensemble classifier that combines the n-gram method, term frequency-inverse document frequency, and passive-aggressive classifier method. The evaluation process was carried out using 5000 samples from Twitter social media accounts in this study. The testing process is carried out using four schemes by dividing the dataset into training and test data based on the ratios of 90:10, 80:20, 70:30, and 60:40. The inspection results show that our software can accurately detect hoaxes at 91.8%. We also found an increase in the accuracy and precision of hoax detection testing using the proposed method compared to several previous studies. The results show that our proposed method can be developed and used in detecting hoaxes in Indonesian on various social media platforms. Manuscript profile
      • Open Access Article

        17 - Presenting a model of contextual views with emphasis on improving the visual quality of cities, a case study of Yasuj city in 1401
        Javad  Takhsha Amir  Aminzadeh
        Contextualism, one of the common views in urban planning, considers the context as a historical event in which the elements of the city are known, addressed and constructed. What is needed in the lively and lively life of a city is to adapt the container of the environm More
        Contextualism, one of the common views in urban planning, considers the context as a historical event in which the elements of the city are known, addressed and constructed. What is needed in the lively and lively life of a city is to adapt the container of the environment to the contents of the building in a historical process. The confusion and anxiety of urban views in most cities of Iran, especially in contemporary and modern cities, is a tolerable issue. Unfortunately, today, not only the show is not considered as a part of the urban space; Rather, it is often built as a unit for the supply of owners. This issue has caused disturbance and perceptual confusion in urban spaces. While dealing with, analyzing and studying the facades of urban buildings, part of the urban walls is of special importance. Landscape architecture as a codified knowledge to improve the quality of man-made environments, has always claimed to pay attention to the cultural values ​​and specific identity of each region, but contemporary and new cities are becoming more and more similar, this issue is more pronounced in different cities Relaxing views based on local materials and climate can help to give identity, a sense of belonging and peace of mind to citizens. The main purpose of this article is to identify the criteria and patterns of contextualism and to create a favorable visual environment and to deal with new urban views with a case study of Yasuj with emphasis on ecology and its role in urban planning and architecture and their interaction with sustainable development, culture and behaviors. It is social actions and taking into account the urban wall (facade) that leads to a desirable and ideal atmosphere that indirectly and indirectly affects them and the personality of citizens. Manuscript profile
      • Open Access Article

        18 - Designing an Effective Model for Celebrity Endorsers’ Advertising Considering the Interaction Effect of Internalization and Resource Identification on the Behavior and Attitude of the Consumer
        nasim motamednia mirzahasan hoseini ehsan jamali aliakbar jokar
        Purpose: This research has been conducted to design an effective model for celebrity endorsers’ advertising considering the interaction effect of internalization and resource identification on the behavior and attitude of the consumer in private banks of the Tehran prov More
        Purpose: This research has been conducted to design an effective model for celebrity endorsers’ advertising considering the interaction effect of internalization and resource identification on the behavior and attitude of the consumer in private banks of the Tehran province Methodology: The mixed method (qualitative-quantitative) was used in this research. The qualitative method is based on the fundamental conceptualization approach, and the quantitative method is based on the descriptive-survey approach with a practical goal. In the qualitative part with the systematic (meta-synthesis) review approach, the statistical population includes all the research conducted in the area of effectiveness of the celebrity endorsers’ advertising from various authenticated conferences and journals from 1997 to 2022 internationally and from 2011 to 2021 domestically. At the beginning of the data analysis, the concepts and dimensions were assessed in the MAXQDA software using open coding, and Cohen’s kappa reliability index was calculated and confirmed at 0.89. Then the final model was evaluated using the Delphi method. 245 questionnaires were analyzed using the PLS software to test the model among the clients of private banks in the Tehran province using the mixed sampling method Conclusion:In the qualitative part considering the input indexes and criteria, 556 articles and dissertations (Farsi and English) related to the celebrity endorsers’ advertising subject were studied. The results extracted from 28 studies (16 English and 12 Farsi) were analyzed ultimately. Finally, the relationships between the models of the research were studied in the quantitative part. 11 relationships were confirmed, but 4 were not confirmed Manuscript profile
      • Open Access Article

        19 - Identification and Prioritization of Emerging Technologies in Road Transportation Using Multi-Criteria Decision Making (MCDM)
        mehrnoosh bastenegar Reza Pouya Nasrin Sakhaian Haji Mohammadi
        In today's world, issues such as the depletion of energy resources, environmental pollution, the increase in material and spiritual damages caused by accidents, the supervision and management of intercity transportation, the increase in wasted time, and the rapid growth More
        In today's world, issues such as the depletion of energy resources, environmental pollution, the increase in material and spiritual damages caused by accidents, the supervision and management of intercity transportation, the increase in wasted time, and the rapid growth of transportation demand in the world have become a serious problem in the road transportation sector. This is while the existence of smooth and safe transportation is one of the most fundamental infrastructures for development and increasing the level of well-being and social welfare in any country. On the other hand, the rapid growth of emerging technologies that play a driving role in various industries and economic sectors and guide the transportation industry towards becoming intelligent, increasing efficiency, and raising the level of service quality has attracted the attention of policymakers and planners in the country to use these emerging technologies to solve the serious problems in this field. Due to the limitations of resources, naturally, a comprehensive understanding and then prioritization of these technologies can be a step towards getting out of the current situation. In this research, an attempt has been made to identify emerging technologies in road transportation by conducting library studies and then prioritizing them using the multi-criteria decision-making method (TOPSIS). The results indicate that according to the indicators of national strategic goals in this sector, the "smart communication networks" technology ranks first, followed closely by "traffic automation" and "smart buses" technologies in the second and third ranks, respectively, with an index close to the first rank. Manuscript profile
      • Open Access Article

        20 - Application identification through intelligent traffic classification
        Shaghayegh Naderi
        Traffic classification and analysis is one of the big challenges in the field of data mining and machine learning, which plays an important role in providing security, quality assurance and network management. Today, a large amount of transmission traffic in the network More
        Traffic classification and analysis is one of the big challenges in the field of data mining and machine learning, which plays an important role in providing security, quality assurance and network management. Today, a large amount of transmission traffic in the network is encrypted by secure communication protocols such as HTTPS. Encrypted traffic reduces the possibility of monitoring and detecting suspicious and malicious traffic in communication infrastructures (instead of increased security and privacy of the user) and its classification is a difficult task without decoding network communications, because the payload information is lost, and only the header information (which is encrypted too in new versions of network communication protocols such as TLS1.03) is accessible. Therefore, the old approaches of traffic analysis, such as various methods based on port and payload, have lost their efficiency, and new approaches based on artificial intelligence and machine learning are used in cryptographic traffic analysis. In this article, after reviewing the traffic analysis methods, an operational architectural framework for intelligent traffic analysis and classification has been designed. Then, an intelligent model for Traffic Classification and Application Identification is presented and evaluated using machine learning methods on Kaggle141. The obtained results show that the random forest model, in addition to high interpretability compared to deep learning methods, has been able to provide high accuracy in traffic classification compared to other machine learning methods. Finally, tips and suggestions about using machine learning methods in the operational field of traffic classification have been provided. Manuscript profile
      • Open Access Article

        21 - Automatic Lung Diseases Identification using Discrete Cosine Transform-based Features in Radiography Images
        Shamim Yousefi Samad Najjar-Ghabel
        The use of raw radiography results in lung disease identification has not acceptable performance. Machine learning can help identify diseases more accurately. Extensive studies were performed in classical and deep learning-based disease identification, but these methods More
        The use of raw radiography results in lung disease identification has not acceptable performance. Machine learning can help identify diseases more accurately. Extensive studies were performed in classical and deep learning-based disease identification, but these methods do not have acceptable accuracy and efficiency or require high learning data. In this paper, a new method is presented for automatic interstitial lung disease identification on radiography images to address these challenges. In the first step, patient information is removed from the images; the remaining pixels are standardized for more precise processing. In the second step, the reliability of the proposed method is improved by Radon transform, extra data is removed using the Top-hat filter, and the detection rate is increased by Discrete Wavelet Transform and Discrete Cosine Transform. Then, the number of final features is reduced with Locality Sensitive Discriminant Analysis. The processed images are divided into learning and test categories in the third step to create different models using learning data. Finally, the best model is selected using test data. Simulation results on the NIH dataset show that the decision tree provides the most accurate model by improving the harmonic mean of sensitivity and accuracy by up to 1.09times compared to similar approaches. Manuscript profile
      • Open Access Article

        22 - Identification of gas in carbonate rock using wavelet transform
        Hassan Omrani Hashem omrani
        Gas can be diagnosed in clean sand rock by petrophysical log. It is not easy to determine the gas in carbonate rock by petrophysical log. The R.F.T. tool is used to determine the gas in carbonate rock. The fluid density in the rock is determined by calculating the press More
        Gas can be diagnosed in clean sand rock by petrophysical log. It is not easy to determine the gas in carbonate rock by petrophysical log. The R.F.T. tool is used to determine the gas in carbonate rock. The fluid density in the rock is determined by calculating the pressure difference related to depth. The R.F.T. tool has some disadvantages, such as being expensive, taking much time to run, and rock having a neutron porosity of about 15%, and sometimes the R.F.T. tool is stuck in well. This study applies the wavelet transformation, a recent advance in signal analysis technique, to detect reservoir rock fluid. The porosity and water saturation are denoised using the "demy" mother wavelet. At last, the pore hydrocarbon saturation, porosity denoise by the "demy" wavelet, pore volume plot and R.F.T. tool are plotted together in one figure to identify the kind of fluid in sand and carbonate rocks. Manuscript profile
      • Open Access Article

        23 - Application Identification Through Intelligent Traffic Classification
        Shaghayegh Naderi
        Traffic classification and analysis is one of the big challenges in the field of data mining and machine learning, which plays an important role in providing security, quality assurance and network management. Today, a large amount of transmission traffic in the network More
        Traffic classification and analysis is one of the big challenges in the field of data mining and machine learning, which plays an important role in providing security, quality assurance and network management. Today, a large amount of transmission traffic in the network is encrypted by secure communication protocols such as HTTPS. Encrypted traffic reduces the possibility of monitoring and detecting suspicious and malicious traffic in communication infrastructures (instead of increased security and privacy of the user) and its classification is a difficult task without decoding network communications, because the payload information is lost, and only the header information (which is encrypted too in new versions of network communication protocols such as TLS1.03) is accessible. Therefore, the old approaches of traffic analysis, such as various methods based on port and payload, have lost their efficiency, and new approaches based on artificial intelligence and machine learning are used in cryptographic traffic analysis. In this article, after reviewing the traffic analysis methods, an operational architectural framework for intelligent traffic analysis and classification has been designed. Then, an intelligent model for Traffic Classification and Application Identification is presented and evaluated using machine learning methods on Kaggle141. The obtained results show that the random forest model, in addition to high interpretability compared to deep learning methods, has been able to provide high accuracy in traffic classification (95% and 97%) compared to other machine learning methods. Finally, tips and suggestions about using machine learning methods in the operational field of traffic classification have been provided. Manuscript profile