• Home
  • neural network
    • List of Articles neural network

      • Open Access Article

        1 - Identify and assess the relative importance of knowledge management strategies by using ANN (Case study Knowledge base Software Companies)
        Saeedeh khabbazkar Mohsen Shafiei Nikabadi مائده  دهقان
        Abstract: Knowledge management is an important resource for any organization. Organizations to implement knowledge management strategies, improve innovation in processes, activities, products and services. The aim of this study is to identify the key strategies of knowl More
        Abstract: Knowledge management is an important resource for any organization. Organizations to implement knowledge management strategies, improve innovation in processes, activities, products and services. The aim of this study is to identify the key strategies of knowledge management by ANN .The innovative aspect of the research is, the use of artificial neural networks (ANN) to rank the strategies of knowledge management. The population consists of the all employees of the   knowledge based software companies in Tehran, that the total questionnaires were distributed, only 123 were usable. This study is practical from the objective aspect, and descriptive-survey from data collection method aspect. Data from the surveys and questionnaires obtained and then by using the ANN techniques h as been investigated the research objectives.  Results and ANN outputs indicated that sequencely, explicit knowledge startegy is the most important criteria of Knowledge management strategy and tacit khowledge, internal and external strategy are the next priorities  knowledge based  software companies  are located in Tehran.  Manuscript profile
      • Open Access Article

        2 - Automatic Sepration of Learnrs in Learning Groups Based on Identifying Learning Style from Their Behavior in Learning Environment
        mohammad sadegh rezaei gholamali montazer
        Automatic identification of learners groups based on similarity of learning style improves e-learning systems from the viewpoint of learning adaptation and collaboration among learners. In this paper, a new system is proposed for identifying groups of learners, who have More
        Automatic identification of learners groups based on similarity of learning style improves e-learning systems from the viewpoint of learning adaptation and collaboration among learners. In this paper, a new system is proposed for identifying groups of learners, who have similar learning style, by using learners’ behavior information in an e-learning environment. Proposed clustering method for separation of learners is developed based on ART neural network structure and Snap-Drift neural network learning process. This artificial network enables us to identify learners groups in uncertain group separation parameters, without knowing appropriate number of groups.  The results of an empirical evaluation of the proposed method, which are based on two criteria, “Davies-Bouldin” and “Purity and Gathering”, indicate that our proposed method outperforms other clustering methods in terms of accuracy. Manuscript profile
      • Open Access Article

        3 - Product purchasing prediction in an online store by designing an artificial neural network using clickstream data
        Mahbube Mottaghi
        One of the key capabilities of competitive online stores is the effective prediction of customer buying as much as possible to apply customer service strategies to convert users to buyers and to increase sales rates. Data mining and artificial intelligence techniques ar More
        One of the key capabilities of competitive online stores is the effective prediction of customer buying as much as possible to apply customer service strategies to convert users to buyers and to increase sales rates. Data mining and artificial intelligence techniques are successful in categorizing and forecasting. Work has been proven in timely systems, such as e-commerce sites. In this paper, we propose a non-post-error neural network model with the aim of predicting purchases at user active stages in an online store. The training and evaluation of the neural network was performed using a set of revised sessions from server logs. The accuracy and retrieval power of the proposed neural network is 8999.79% and 89.696%, which indicates the high ability of this network (about 90%) in predicting the purchase Manuscript profile
      • Open Access Article

        4 - Modified orthogonal chaotic colonial competition algorithm and its application in improving pattern recognition in multilayer perceptron neural network
        Payman Moallem mehrdad sadeghi hariri MAHDI hashemi
        Despite the success of the Colonial Competition Algorithm (ICA) in solving optimization problems, this algorithm still suffers from repeated entrapment in the local minimum and low convergence speed. In this paper, a new version of this algorithm, called Modified Orthog More
        Despite the success of the Colonial Competition Algorithm (ICA) in solving optimization problems, this algorithm still suffers from repeated entrapment in the local minimum and low convergence speed. In this paper, a new version of this algorithm, called Modified Orthogonal Chaotic Colonial Competition (COICA), is proposed. In the policy of absorbing the proposed version, each colony seeks the space to move towards the colonizer through the definition of a new orthogonal vector. Also, the possibility of selecting powerful empires is defined through the boltzmann distribution function, and the selection operation is performed through the roulette wheel method. The proposed multilevel perceptron neural network (MLP) algorithm is used to classify standard datasets, including ionosphere and sonar. To evaluate the performance of this algorithm and to evaluate the generalizability of the trained neural network with the proposed version, the K-Fold cross-validation method has been used. The results obtained from the simulations confirm the reduction of network training error as well as the improved generalizability of the proposed algorithm. Manuscript profile
      • Open Access Article

        5 - Comparison of support vector machine and artificial neural network classification methods to produce landuse maps (Case study: Bojagh National Park)
        Mahsa Abdoli Laktasaraei Maryam  Haghighi khomami
        National parks and wildlife shelter are the most important natural heritages; therefore, knowing of quantitative and qualitative changes in their land use plays an essential role in the quality of these areas' management. various algorithms have been developed to classi More
        National parks and wildlife shelter are the most important natural heritages; therefore, knowing of quantitative and qualitative changes in their land use plays an essential role in the quality of these areas' management. various algorithms have been developed to classify satellite imagery in remote sensing, selecting an appropriate classification algorithm is very important in achieving the accurate results. In this research, a more accurate algorithm was determined by comparing the classification accuracy of two artificial neural network and support vector machine algorithms, and it was used to examine the process of the land use changes. The present study was performed in Boujagh National Park, in the Guilan Province, during the years 2000 to 2017, using satellite imagery ETM and OLI of Landsat 7 and 8. The results of the research revealed that the support vector machine algorithm with overall accuracy and Kappa coefficient of 86.42 and 0.83 respectively for the year 2000 and, 90.65 and 0.88 for the year 2017, classified the satellite images more precisely, in comparison with the artificial neural network algorithm with overall accuracy and Kappa coefficient of 83.71 and 0.80 respectively for the year 2000 and overall accuracy and Kappa coefficient of 89.25 and 0.87 for the year 2017. Therefore, the land use maps of the support vector machine algorithm were used to determine the land use changes. The study of land use change by this method concluded that the areas of the waterbody, sea, grassland and agriculture have decreased and marshland, woody and bare lands classes showed an increase during the study period. Manuscript profile
      • Open Access Article

        6 - Comparing A Hybridization of Fuzzy Inference System and Particle Swarm Optimization Algorithm with Deep Learning to Predict Stock Prices
        Majid Abdolrazzagh-Nezhad mahdi kherad
        Predicting stock prices by data analysts have created a great business opportunity for a wide range of investors in the stock markets. But the fact is difficulte, because there are many affective economic factors in the stock markets that they are too dynamic and compl More
        Predicting stock prices by data analysts have created a great business opportunity for a wide range of investors in the stock markets. But the fact is difficulte, because there are many affective economic factors in the stock markets that they are too dynamic and complex. In this paper, two models are designed and implemented to identify the complex relationship between 10 economic factors on the stock prices of companies operating in the Tehran stock market. First, a Mamdani Fuzzy Inference System (MFIS) is designed that the fuzzy rules set of its inference engine is found by the Particle Swarm Optimization Algorithm (PSO). Then a Deep Learning model consisting of 26 neurons is designed wiht 5 hidden layers. The designed models are implemented to predict the stock prices of nine companies operating on the Tehran Stock Exchange. The experimental results show that the designed deep learning model can obtain better results than the hybridization of MFIS-PSO, the neural network and SVM, although the interperative ability of the obtained patterns, more consistent behavior with much less variance, as well as higher convergence speed than other models can be mentioned as significant competitive advantages of the MFIS-PSO model Manuscript profile
      • Open Access Article

        7 - Comparison of the MLP and RBF Neural Networks for the Determination of Confined Aquifer Parameters
        Tahereh Azari Nozar Samani
        In this paper, Multi-Layer Perceptron (MLP) and Radial Basis Function (RBF) Artificial Neural Networks (ANNs) are designed for the determination of confined aquifer parameters: transmissibility and storage coefficient. The networks are trained for the well function of c More
        In this paper, Multi-Layer Perceptron (MLP) and Radial Basis Function (RBF) Artificial Neural Networks (ANNs) are designed for the determination of confined aquifer parameters: transmissibility and storage coefficient. The networks are trained for the well function of confined aquifers. By applying the principal component analysis (PCA) on the training data sets the topology of the MLP and RBF networks is reduced and fixed to [1×12×1] and [1×14×1], respectively regardless of number of records in the pumping test data. The networks generate the optimal match point coordinates for any individual real pumping test data set. The match point coordinates are then incorporated with Theis analytical solution (1935) and the aquifer parameter values are determined. The generalization ability and performance of the developed networks is evaluated with 100000 sets of synthetic data and their accuracy is compared with that of type curve matching technique by two sets of real pumping test data. The results showed that though both MLP and RBF networks are able to determine the confined aquifers parameters and eliminate graphical error inherent in the type curve matching technique but the MLP network is more accurate than the RBF network. Therefore, the proposed MLP network is recommended as an accurate automatic and fast procedure for the confined aquifer parameters estimation. Manuscript profile
      • Open Access Article

        8 - Converting protein sequence to image for classification with convolutional neural network
        reza ahsan mansour ebrahimi dianat dianat
        Since methods for sequencing machine learning sequences were not successful in classifying healthy and cancerous proteins, it is imperative to find a way to represent these sequences to classify healthy and ill individuals with deep learning approaches. In this study di More
        Since methods for sequencing machine learning sequences were not successful in classifying healthy and cancerous proteins, it is imperative to find a way to represent these sequences to classify healthy and ill individuals with deep learning approaches. In this study different methods of protein sequence representation for classification of protein sequence of healthy individuals and leukemia have been studied. Results showed that conversion of amino acid letters to one-dimensional feature vectors in classification of 2 classes was not successful and only one disease class was detected. By changing the feature vector to colored numbers, the accuracy of the healthy class recognition was slightly improved. The binary protein sequence representation method was more efficient than the previous methods with the initiative of sequencing the sequences in both one-dimensional and two-dimensional (image by Gabor filtering). Protein sequence representation as binary image was classified by applying Gabor filter with 100% accuracy of the protein sequence of healthy individuals and 98.6% protein sequence of those with leukemia. The findings of this study showed that the representation of protein sequence as binary image by applying Gabor filter can be used as a new effective method for representation of protein sequences for classification Manuscript profile
      • Open Access Article

        9 - A Novel Method based on the Cocomo model to increase the accuracy of software projects effort estimates
        mahdieh salari vahid khatibi amid khatibi
        It is regarded as a crucial task in a software project to estimate the criteria, and effort estimation in the primary stages of software development is thus one of the most important challenges involved in management of software projects. Incorrect estimation can lead t More
        It is regarded as a crucial task in a software project to estimate the criteria, and effort estimation in the primary stages of software development is thus one of the most important challenges involved in management of software projects. Incorrect estimation can lead the project to failure. It is therefore a major task in efficient development of software projects to estimate software costs accurately. Therefore, two methods were presented in this research for effort estimation in software projects, where attempts were made to provide a way to increase accuracy through analysis of stimuli and application of metaheuristic algorithms in combination with neural networks. The first method examined the effect of the cuckoo search algorithm in optimization of the estimation coefficients in the COCOMO model, and the second method was presented as a combination of neural networks and the cuckoo search optimization algorithm to increase the accuracy of effort estimation in software development. The results obtained on two real-world datasets demonstrated the proper efficiency of the proposed methods as compared to that of similar methods. Manuscript profile
      • Open Access Article

        10 - Analysis and Evaluation of Techniques for Myocardial Infarction Based on Genetic Algorithm and Weight by SVM
        hojatallah hamidi Atefeh Daraei
        Although decreasing rate of death in developed countries because of Myocardial Infarction, it is turned to the leading cause of death in developing countries. Data mining approaches can be utilized to predict occurrence of Myocardial Infarction. Because of the side effe More
        Although decreasing rate of death in developed countries because of Myocardial Infarction, it is turned to the leading cause of death in developing countries. Data mining approaches can be utilized to predict occurrence of Myocardial Infarction. Because of the side effects of using Angioplasty as main method for diagnosing Myocardial Infarction, presenting a method for diagnosing MI before occurrence seems really important. This study aim to investigate prediction models for Myocardial Infarction, by applying a feature selection model based on Wight by SVM and genetic algorithm. In our proposed method, for improving the performance of classification algorithm, a hybrid feature selection method is applied. At first stage of this method, the features are selected based on their weights, using weight by Support Vector Machine. At second stage, the selected features, are given to genetic algorithm for final selection. After selecting appropriate features, eight classification methods, include Sequential Minimal Optimization, REPTree, Multi-layer Perceptron, Random Forest, K-Nearest Neighbors and Bayesian Network, are applied to predict occurrence of Myocardial Infarction. Finally, the best accuracy of applied classification algorithms, have achieved by Multi-layer Perceptron and Sequential Minimal Optimization. Manuscript profile
      • Open Access Article

        11 - The Separation of Radar Clutters using Multi-Layer Perceptron
        Mohammad Akhondi Darzikolaei Ataollah Ebrahimzadeh Elahe Gholami
        Clutter usually has negative influence on the detection performance of radars. So, the recognition of clutters is crucial to detect targets and the role of clutters in detection cannot be ignored. The design of radar detectors and clutter classifiers are really complica More
        Clutter usually has negative influence on the detection performance of radars. So, the recognition of clutters is crucial to detect targets and the role of clutters in detection cannot be ignored. The design of radar detectors and clutter classifiers are really complicated issues. Therefore, in this paper aims to classify radar clutters. The novel proposed MLP-based classifier for separating radar clutters is introduced. This classifier is designed with different hidden layers and five training algorithms. These training algorithms consist of Levenberg-Marquardt, conjugate gradient, resilient back-propagation, BFGS and one step secant algorithms. Statistical distributions are established models which widely used in the performance calculations of radar clutters. Hence In this research, Rayleigh, Log normal, Weibull and K-distribution clutters are utilized as input data. Then Burg’s reflection coefficients, skewness and kurtosis are three features which applied to extract the best characteristics of input data. In the next step, the proposed classifier is tested in different conditions and the results represent that the proposed MLP-based classifier is very successful and can distinguish clutters with high accuracy. Comparing the results of proposed technique and RBF-based classifier show that proposed method is more efficient. The results of simulations prove that the validity of MLP-based method. Manuscript profile
      • Open Access Article

        12 - Improvement in Accuracy and Speed of Image Semantic Segmentation via Convolution Neural Network Encoder-Decoder
        Hanieh Zamanian Hassan Farsi Sajad Mohammadzadeh
        Recent researches on pixel-wise semantic segmentation use deep neural networks to improve accuracy and speed of these networks in order to increase the efficiency in practical applications such as automatic driving. These approaches have used deep architecture to predic More
        Recent researches on pixel-wise semantic segmentation use deep neural networks to improve accuracy and speed of these networks in order to increase the efficiency in practical applications such as automatic driving. These approaches have used deep architecture to predict pixel tags, but the obtained results seem to be undesirable. The reason for these unacceptable results is mainly due to the existence of max pooling operators, which reduces the resolution of the feature maps. In this paper, we present a convolutional neural network composed of encoder-decoder segments based on successful SegNet network. The encoder section has a depth of 2, which in the first part has 5 convolutional layers, in which each layer has 64 filters with dimensions of 3×3. In the decoding section, the dimensions of the decoding filters are adjusted according to the convolutions used at each step of the encoding. So, at each step, 64 filters with the size of 3×3 are used for coding where the weights of these filters are adjusted by network training and adapted to the educational data. Due to having the low depth of 2, and the low number of parameters in proposed network, the speed and the accuracy improve compared to the popular networks such as SegNet and DeepLab. For the CamVid dataset, after a total of 60,000 iterations, we obtain the 91% for global accuracy, which indicates improvements in the efficiency of proposed method. Manuscript profile
      • Open Access Article

        13 - DeepSumm: A Novel Deep Learning-Based Multi-Lingual Multi-Documents Summarization System
        Shima Mehrabi Seyed Abolghassem Mirroshandel Hamidreza  Ahmadifar
        With the increasing amount of accessible textual information via the internet, it seems necessary to have a summarization system that can generate a summary of information for user demands. Since a long time ago, summarization has been considered by natural language pro More
        With the increasing amount of accessible textual information via the internet, it seems necessary to have a summarization system that can generate a summary of information for user demands. Since a long time ago, summarization has been considered by natural language processing researchers. Today, with improvement in processing power and the development of computational tools, efforts to improve the performance of the summarization system is continued, especially with utilizing more powerful learning algorithms such as deep learning method. In this paper, a novel multi-lingual multi-document summarization system is proposed that works based on deep learning techniques, and it is amongst the first Persian summarization system by use of deep learning. The proposed system ranks the sentences based on some predefined features and by using a deep artificial neural network. A comprehensive study about the effect of different features was also done to achieve the best possible features combination. The performance of the proposed system is evaluated on the standard baseline datasets in Persian and English. The result of evaluations demonstrates the effectiveness and success of the proposed summarization system in both languages. It can be said that the proposed method has achieve the state of the art performance in Persian and English. Manuscript profile
      • Open Access Article

        14 - Drone Detection by Neural Network Using GLCM and SURF Features
        Tanzia  Ahmed Tanvir  Rahman Bir  Ballav Roy Jia Uddin
        This paper presents a vision-based drone detection method. There are a number of researches on object detection which includes different feature extraction methods – all of those are used distinctly for the experiments. But in the proposed model, a hybrid feature extrac More
        This paper presents a vision-based drone detection method. There are a number of researches on object detection which includes different feature extraction methods – all of those are used distinctly for the experiments. But in the proposed model, a hybrid feature extraction method using SURF and GLCM is used to detect object by Neural Network which has never been experimented before. Both are very popular ways of feature extraction. Speeded-up Robust Feature (SURF) is a blob detection algorithm which extracts the points of interest from an integral image, thus converts the image into a 2D vector. The Gray-Level Co-Occurrence Matrix (GLCM) calculates the number of occurrences of consecutive pixels in same spatial relationship and represents it in a new vector- 8 × 8 matrix of best possible attributes of an image. SURF is a popular method of feature extraction and fast matching of images, whereas, GLCM method extracts the best attributes of the images. In the proposed model, the images were processed first to fit our feature extraction methods, then the SURF method was implemented to extract the features from those images into a 2D vector. Then for our next step GLCM was implemented which extracted the best possible features out of the previous vector, into a 8 × 8 matrix. Thus, image is processed in to a 2D vector and feature extracted from the combination of both SURF and GLCM methods ensures the quality of the training dataset by not just extracting features faster (with SURF) but also extracting the best of the point of interests (with GLCM). The extracted featured related to the pattern are used in the neural network for training and testing. Pattern recognition algorithm has been used as a machine learning tool for the training and testing of the model. In the experimental evaluation, the performance of proposed model is examined by cross entropy for each instance and percentage error. For the tested drone dataset, experimental results demonstrate improved performance over the state-of-art models by exhibiting less cross entropy and percentage error. Manuscript profile
      • Open Access Article

        15 - Recognizing Transliterated English Words in Persian Texts
        Ali Hoseinmardy Saeedeh Momtazi
        One of the most important problems of text processing systems is the word mismatch problem. This results in limited access to the required information in information retrieval. This problem occurs in analyzing textual data such as news, or low accuracy in text classific More
        One of the most important problems of text processing systems is the word mismatch problem. This results in limited access to the required information in information retrieval. This problem occurs in analyzing textual data such as news, or low accuracy in text classification and clustering. In this case, if the text-processing engine does not use similar/related words in the same sense, it may not be able to guide you to the appropriate result. Various statistical techniques have been proposed to bridge the vocabulary gap problem; e.g., if two words are used in similar contexts frequently, they have similar/related meanings. Synonym and similar words, however, are only one of the categories of related words that are expected to be captured by statistical approaches. Another category of related words is the pair of an original word in one language and its transliteration from another language. This kind of related words is common in non-English languages. In non-English texts, instead of using the original word from the target language, the writer may borrow the English word and only transliterate it to the target language. Since this kind of writing style is used in limited texts, the frequency of transliterated words is not as high as original words. As a result, available corpus-based techniques are not able to capture their concept. In this article, we propose two different approaches to overcome this problem: (1) using neural network-based transliteration, (2) using available tools that are used for machine translation/transliteration, such as Google Translate and Behnevis. Our experiments on a dataset, which is provided for this purpose, shows that the combination of the two approaches can detect English words with 89.39% accuracy. Manuscript profile
      • Open Access Article

        16 - Utilizing Gated Recurrent Units to Retain Long Term Dependencies with Recurrent Neural Network in Text Classification
        Nidhi Chandra Laxmi  Ahuja Sunil Kumar Khatri Himanshu Monga
        The classification of text is one of the key areas of research for natural language processing. Most of the organizations get customer reviews and feedbacks for their products for which they want quick reviews to action on them. Manual reviews would take a lot of time a More
        The classification of text is one of the key areas of research for natural language processing. Most of the organizations get customer reviews and feedbacks for their products for which they want quick reviews to action on them. Manual reviews would take a lot of time and effort and may impact their product sales, so to make it quick these organizations have asked their IT to leverage machine learning algorithms to process such text on a real-time basis. Gated recurrent units (GRUs) algorithms which is an extension of the Recurrent Neural Network and referred to as gating mechanism in the network helps provides such mechanism. Recurrent Neural Networks (RNN) has demonstrated to be the main alternative to deal with sequence classification and have demonstrated satisfactory to keep up the information from past outcomes and influence those outcomes for performance adjustment. The GRU model helps in rectifying gradient problems which can help benefit multiple use cases by making this model learn long-term dependencies in text data structures. A few of the use cases that follow are – sentiment analysis for NLP. GRU with RNN is being used as it would need to retain long-term dependencies. This paper presents a text classification technique using a sequential word embedding processed using gated recurrent unit sigmoid function in a Recurrent neural network. This paper focuses on classifying text using the Gated Recurrent Units method that makes use of the framework for embedding fixed size, matrix text. It helps specifically inform the network of long-term dependencies. We leveraged the GRU model on the movie review dataset with a classification accuracy of 87%. Manuscript profile
      • Open Access Article

        17 - Evaluation of Pattern Recognition Techniques in Response to Cardiac Resynchronization Therapy (CRT)
        Mohammad Nejadeh Peyman Bayat Jalal Kheirkhah Hassan Moladoust
        Cardiac resynchronization therapy (CRT) improves cardiac function in patients with heart failure (HF), and the result of this treatment is decrease in death rate and improving quality of life for patients. This research is aimed at predicting CRT response for the progno More
        Cardiac resynchronization therapy (CRT) improves cardiac function in patients with heart failure (HF), and the result of this treatment is decrease in death rate and improving quality of life for patients. This research is aimed at predicting CRT response for the prognosis of patients with heart failure under CRT. According to international instructions, in the case of approval of QRS prolongation and decrease in ejection fraction (EF), the patient is recognized as a candidate of implanting recognition device. However, regarding many intervening and effective factors, decision making can be done based on more variables. Computer-based decision-making systems especially machine learning (ML) are considered as a promising method regarding their significant background in medical prediction. Collective intelligence approaches such as particles swarm optimization (PSO) algorithm are used for determining the priorities of medical decision-making variables. This investigation was done on 209 patients and the data was collected over 12 months. In HESHMAT CRT center, 17.7% of patients did not respond to treatment. Recognizing the dominant parameters through combining machine recognition and physician’s viewpoint, and introducing back-propagation of error neural network algorithm in order to decrease classification error are the most important achievements of this research. In this research, an analytical set of individual, clinical, and laboratory variables, echocardiography, and electrocardiography (ECG) are proposed with patients’ response to CRT. Prediction of the response after CRT becomes possible by the support of a set of tools, algorithms, and variables. Manuscript profile
      • Open Access Article

        18 - Deep Learning Approach for Cardiac MRI Images
        Afshin Sandooghdar Farzin Yaghmaee
        Deep Learning (DL) is the most widely used image-analysis process, especially in medical image processing. Though DL has entered image processing to solve Machine Learning (ML) problems, identifying the most suitable model based on evaluation of the epochs is still an o More
        Deep Learning (DL) is the most widely used image-analysis process, especially in medical image processing. Though DL has entered image processing to solve Machine Learning (ML) problems, identifying the most suitable model based on evaluation of the epochs is still an open question for scholars in the field. There are so many types of function approximators like Decision Tree, Gaussian Processes and Deep Learning, used in multi-layered Neural Networks (NNs), which should be evaluated to determine their effectiveness. Therefore, this study aimed to assess an approach based on DL techniques for modern medical imaging methods according to Magnetic Resonance Imaging (MRI) segmentation. To do so, an experiment with a random sampling approach was conducted. One hundred patient cases were used in this study for training, validation, and testing. The method used in this study was based on full automatic processing of segmentation and disease classification based on MRI images. U-Net structure was used for the segmentation process, with the use of cardiac Right Ventricular Cavity (RVC), Left Ventricular Cavity (LVC), Left Ventricular Myocardium (LVM), and information extracted from the segmentation step. With train and using random forest classifier, and Multilayer Perceptron (MLP), the task of predicting the pathologic target class was conducted. Segmentation extracted information was in the form of comprehensive features handcrafted to reflect demonstrative clinical strategies. Our study suggests 92% test accuracy for cardiac MRI image segmentation and classification. As for the MLP ensemble, and for the random forest, test accuracy was equal to 91% and 90%, respectively. This study has implications for scholars in the field of medical image processing. Manuscript profile
      • Open Access Article

        19 - Detection of Attacks and Anomalies in the Internet of Things System using Neural Networks Based on Training with PSO Algorithms, Fuzzy PSO, Comparative PSO and Mutative PSO
        Mohammad  Nazarpour navid nezafati Sajjad  Shokouhyar
        Integration and diversity of IOT terminals and their applicable programs make them more vulnerable to many intrusive attacks. Thus, designing an intrusion detection model that ensures the security, integrity, and reliability of IOT is vital. Traditional intrusion detect More
        Integration and diversity of IOT terminals and their applicable programs make them more vulnerable to many intrusive attacks. Thus, designing an intrusion detection model that ensures the security, integrity, and reliability of IOT is vital. Traditional intrusion detection technology has the disadvantages of low detection rates and weak scalability that cannot adapt to the complicated and changing environment of the Internet of Things. Hence, one of the most widely used traditional methods is the use of neural networks and also the use of evolutionary optimization algorithms to train neural networks can be an efficient and interesting method. Therefore, in this paper, we use the PSO algorithm to train the neural network and detect attacks and abnormalities of the IOT system. Although the PSO algorithm has many benefits, in some cases it may reduce population diversity, resulting in early convergence. Therefore,in order to solve this problem, we use the modified PSO algorithm with a new mutation operator, fuzzy systems and comparative equations. The proposed method was tested with CUP-KDD data set. The simulation results of the proposed model of this article show better performance and 99% detection accuracy in detecting different malicious attacks, such as DOS, R2L, U2R, and PROB. Manuscript profile
      • Open Access Article

        20 - An Intelligent Model for Multidimensional Personality Recognition of Users using Deep Learning Methods
        Hossein Sadr fatemeh mohades deilami morteza tarkhan
        Due to the significant growth of textual information and data generated by humans on social networks, there is a need for systems that can automatically analyze the data and extract valuable information from them. One of the most important textual data is people's opini More
        Due to the significant growth of textual information and data generated by humans on social networks, there is a need for systems that can automatically analyze the data and extract valuable information from them. One of the most important textual data is people's opinions about a particular topic that are expressed in the form of text. Text published by users on social networks can represent their personality. Although machine learning based methods can be considered as a good choice for analyzing these data, there is also a remarkable need for deep learning based methods to overcome the complexity and dispersion of content and syntax of textual data during the training process. In this regard, the purpose of this paper is to employ deep learning based methods for personality recognition. Accordingly, the convolutional neural network is combined with the Adaboost algorithm to consider the possibility of using the contribution of various filter lengths and gasp their potential in the final classification via combining various classifiers with respective filter sizes using AdaBoost. The proposed model was conducted on Essays and YouTube datasets. Based on the empirical results, the proposed model presented superior performance compared to other existing models on both datasets. Manuscript profile
      • Open Access Article

        21 - Sentiment analysis for stock market predection with deep neural network: A case study for international corporate stock database
        hakimeh mansour Saeedeh Momtazi Kamran Layeghi
        Emotional analysis is used as one of the main pillars in various fields such as financial management, marketing and economic changes forecasting in different countries. In order to build an emotion analyzer based on users' opinions on social media, after extracting impo More
        Emotional analysis is used as one of the main pillars in various fields such as financial management, marketing and economic changes forecasting in different countries. In order to build an emotion analyzer based on users' opinions on social media, after extracting important features between words by convolutional layers, we use LSTM layers to establish the relationship behind the sequence of words and extract the important features of the text. With discovery of new features extracted by LSTM, the ability of the proposed model to classify the stock values of companies increases. This article is based on the data of Nguyen et al. (2015) and uses only the emotional information of people in social networks to predict stocks. Given that we categorize each user's message into one of the emotional classes "Strong Buy", "Buy", "Hold", "Sell", "Strong Sell", this model can predict the stock value of the next day, whether it will be high or low. The proposed structure consisted of 21 layers of neural networks consisting of convolutional neural networks and long short-term memory network. These networks were implemented to predict the stock markets of 18 companies. Although some of the previously presented models have used for emotion analysis to predict the capital markets, the advanced hybrid methods have not been performed in deep networks with a good forecasting accuracy. The results were compared with 8 baseline methods and indicate that the performance of the proposed method is significantly better than other baselines. For daily forecasts of stocks changes, it resulted in 19.80% improvement in the prediction accuracy, compared with the deep CNN, and 24.50% and 23.94% improvement compared with the models developed by Nguyen et al. (2015) and Derakhshan et al. (2019), respectively. Manuscript profile
      • Open Access Article

        22 - Edge Detection and Identification using Deep Learning to Identify Vehicles
        Zohreh Dorrani Hassan Farsi Sajad Mohammadzadeh
        A deep convolution neural network (CNN) is used to detect the edge. First, the initial features are extracted using VGG-16, which consists of 5 convolutions, each step is connected to a pooling layer. For edge detection of the image, it is necessary to extract informati More
        A deep convolution neural network (CNN) is used to detect the edge. First, the initial features are extracted using VGG-16, which consists of 5 convolutions, each step is connected to a pooling layer. For edge detection of the image, it is necessary to extract information of different levels from each layer to the pixel space of the edge, and then re-extract the feature, and perform sampling. The attributes are mapped to the pixel space of the edge and a threshold extractor of the edges. It is then compared with a background model. Using background subtraction, foreground objects are detected. The Gaussian mixture model is used to detect the vehicle. This method is performed on three videos, and compared with other methods; the results show higher accuracy. Therefore, the proposed method is stable against sharpness, light, and traffic. Moreover, to improve the detection accuracy of the vehicle, shadow removal conducted, which uses a combination of color and contour features to identify the shadow. For this purpose, the moving target is extracted, and the connected domain is marked to be compared with the background. The moving target contour is extracted, and the direction of the shadow is checked according to the contour trend to obtain shadow points and remove these points. The results show that the proposed method is very resistant to changes in light, high-traffic environments, and the presence of shadows, and has the best performance compared to the current methods. Manuscript profile
      • Open Access Article

        23 - Recognition of Attention Deficit/Hyperactivity Disorder (ADHD) Based on Electroencephalographic Signals Using Convolutional Neural Networks (CNNs)
        Sara Motamed Elham Askari
        Impulsive / hyperactive disorder is a neuro-developmental disorder that usually occurs in childhood, and in most cases parents find that the child is more active than usual and have problems such as lack of attention and concentration control. Because this problem might More
        Impulsive / hyperactive disorder is a neuro-developmental disorder that usually occurs in childhood, and in most cases parents find that the child is more active than usual and have problems such as lack of attention and concentration control. Because this problem might interfere with your own learning, work, and communication with others, it could be controlled by early diagnosis and treatment. Because the automatic recognition and classification of electroencephalography (EEG) signals is challenging due to the large variation in time features and signal frequency, the present study attempts to provide an efficient method for diagnosing hyperactive patients. The proposed method is that first, the recorded brain signals of hyperactive subjects are read from the input and in order to the signals to be converted from time range to frequency range, Fast Fourier Transform (FFT) is used. Also, to select an effective feature to check hyperactive subjects from healthy ones, the peak frequency (PF) is applied. Then, to select the features, principal component analysis and without principal component analysis will be used. In the final step, convolutional neural networks (CNNs) will be utilized to calculate the recognition rate of individuals with hyperactivity. For model efficiency, this model is compared to the models of K- nearest neighbors (KNN), and multilayer perceptron (MLP). The results show that the best method is to use feature selection by principal component analysis and classification of CNNs and the recognition rate of individuals with ADHD from healthy ones is equal to 91%. Manuscript profile
      • Open Access Article

        24 - Hierarchical Weighted Framework for Emotional Distress Detection using Personalized Affective Cues
        Nagesh Jadhav
        Emotional distress detection has become a hot topic of research in recent years due to concerns related to mental health and complex nature distress identification. One of the challenging tasks is to use non-invasive technology to understand and detect emotional distres More
        Emotional distress detection has become a hot topic of research in recent years due to concerns related to mental health and complex nature distress identification. One of the challenging tasks is to use non-invasive technology to understand and detect emotional distress in humans. Personalized affective cues provide a non-invasive approach considering visual, vocal, and verbal cues to recognize the affective state. In this paper, we are proposing a multimodal hierarchical weighted framework to recognize emotional distress. We are utilizing negative emotions to detect the unapparent behavior of the person. To capture facial cues, we have employed hybrid models consisting of a transfer learned residual network and CNN models. Extracted facial cue features are processed and fused at decision using a weighted approach. For audio cues, we employed two different models exploiting the LSTM and CNN capabilities fusing the results at the decision level. For textual cues, we used a BERT transformer to learn extracted features. We have proposed a novel decision level adaptive hierarchical weighted algorithm to fuse the results of the different modalities. The proposed algorithm has been used to detect the emotional distress of a person. Hence, we have proposed a novel algorithm for the detection of emotional distress based on visual, verbal, and vocal cues. Experiments on multiple datasets like FER2013, JAFFE, CK+, RAVDESS, TESS, ISEAR, Emotion Stimulus dataset, and Daily-Dialog dataset demonstrates the effectiveness and usability of the proposed architecture. Experiments on the enterface'05 dataset for distress detection has demonstrated significant results. Manuscript profile
      • Open Access Article

        25 - Identify and Clustering Challenges of knowledge-based Enterprises using ANN and BPMS Approaches; Case study: Yazd KBEs
        Mojtaba GholiPour Mohammad Ali Vahdat Zad Mohammad Saleh Oliua Hasan Khademi Zareu
        Knowledge always is a powerful tool in stabilizing position of individual/community service to the public and excellence approach in current autonomous communities. Value of knowledge has been more necessary if it capable for transfer to the High-Tec and needed Technolo More
        Knowledge always is a powerful tool in stabilizing position of individual/community service to the public and excellence approach in current autonomous communities. Value of knowledge has been more necessary if it capable for transfer to the High-Tec and needed Technologies of humanity societies. Knowledge Based Enterprise (KBE) is a real-law enterprise such as factory that transfer Knowledge to production/services. However KBEs are causing for sustainable knowledge economy and development native knowledge in more countries, but these enterprises havnt optimize occasion in view of quantity, production quality and service extensive according to the 20 years growth view of Iran. Purpose of this study is to identifying encounter challenges of KBEs that located on Yazds Science and Technology Park (STP) and clustering these challenges with ANN method exactly. The Samples contains 137 person such as manager and top employees of these enterprises. Number of reached challenges have been 59 that were attained from literature and experts guidelines were designed and distributed between samples suddenly. According to the PB artificial neural network, reliabilities of samples were confirmed with MSE=2.0332 and priority done with Multilayer Perceptron (MLP) artificial neural network and with inspiration of Business Process Management System (BPMS) approach. According to the BPMS approach and MLP method, Result show that challenges did cluster in three factions known as: management activities, operational activities and support activities. Thus, number of management, operational and support activities in order were 27, 15 and 17 items exactly. Manuscript profile
      • Open Access Article

        26 - Identification and Priorities KBEs Challenges using ANN Method (Case study: Yazds KBEs)
        Mojtaba GholiPour Mohammad Ali Vahdat Zad Mohammad Saleh Oliua Hasan Khademi Zareu
        The role of knowledge and science are paid attention in national development because creating expertise and improving the Total factor productivity of production. Furthermore, the position of technology and knowledge is considered vital as endogenous factors in this dev More
        The role of knowledge and science are paid attention in national development because creating expertise and improving the Total factor productivity of production. Furthermore, the position of technology and knowledge is considered vital as endogenous factors in this development process. On the other hand, the conversion of knowledge into product and service will meet the needs of different communities. Knowledge-based companies are included as institutions that work as factories converting knowledge into product and service. Although, knowledge-based companies create sustainable knowledge-based economy and development of indigenous knowledge in many countries, but in accordance with the country's 20-year outlook and in terms of quality and quantity, they are not in ideal situation and are faced with challenges in their own development process. This research aims at identifying challenges facing knowledge-based companies located in Yazd's Science and Technology Park of Eghbal and prioritizing these challenges using Artificial Neural Network. The case study includes 137 managers and senior staff of these companies. Fifty nine challenges obtained from related literatures and experts’ opinions have been compiled in a questionnare and distributed among target population. One hundred and twenty eight collected questionnairs were validated by BP Artificial Neural Network and confirmed with MSE=2.0332 and challenges were prioritized with Artificial Neural Networks Radial Basis Function. The research proved that 19 of 59 challenges were priority among which economic problems of the country, industry and domestic markets recession and government’s unbalanced support policies can be pointed out. Manuscript profile
      • Open Access Article

        27 - Prediction of Growth of Small and Medium Enterprises with the Combination of Artificial Neural Networks and Meta-Heuristic Algorithm
        حامد ابراهیم خانی مصطفی کاظمی Alireza Pooya Amir Mohammad  Fakoor Saghih
        The growth of a company is considered to be an important economic goal. Given that many small and medium enterprises do not grow into growth and fail in the early years of their operations, a predictive system of corporate growth can be offset by the huge costs Starting More
        The growth of a company is considered to be an important economic goal. Given that many small and medium enterprises do not grow into growth and fail in the early years of their operations, a predictive system of corporate growth can be offset by the huge costs Starting businesses, entrepreneurs and companies to pay. Accordingly, the purpose of this study was to predict the growth of small and medium enterprises with the combination of neural network and meta-heuristic algorithms. The purpose of this research was applied and based on the method of doing descriptive-modeling work. Statistical population of this research was all small and medium enterprises of Zanjan province. Statistical sample size According to the growth of companies, 158 companies has been designated. In order to collect data in this study, interviews, questionnaires and documents of companies have been used. Validity and reliability of the questionnaire were verified and and using Cronbach's alpha coefficient. In order to analyze the research data using confirmatory factor analysis methods, the neural network of multilayer perceptron, neural network combined with genetic algorithm and neural network combined with particle swarm algorithm have been used. The results show that all three methods are able to predict the growth of the company. Among these three methods, the best predictive method for growth of the company is the neural network combined with the particle swarm algorithm with the least error rate compared to the other two methods. Manuscript profile
      • Open Access Article

        28 - Evaluation efficiency of the internal structure of decision making units in the past, present and future using dynamic network data envelopment analysis and artificial neural network
        javad niknafs mphammadali keramati jalal haghighatmonfared
        Network data envelopment analysis models and dynamic network data envelopment analysis models cannot evaluated the future performance of the internal structure of decision-making units .In other words, all NDEA and DNDEA models evaluate the past performance of their DMU More
        Network data envelopment analysis models and dynamic network data envelopment analysis models cannot evaluated the future performance of the internal structure of decision-making units .In other words, all NDEA and DNDEA models evaluate the past performance of their DMUs and their internal structure, and measure their efficiency and inefficiency, and ultimately rank them based on that assessment .In this paper, we are going to evaluation the future efficiency of deposit and lending sections in bank branches. In order to notified inefficiencies in the internal structure of a unit before the occurrence, we will prevent it.This approach can change the role of managers from the evaluator to the planner .First, using the literature of the subject and opinion of the experts, the structure of the bank branches and the network variables were determined .Then, the values of variables are forecasted using the artificial neural network for the next two periods.Finally, a DNDEA model is formulated using the values of past periods and predicted values.Using its efficiency, its branches and its internal structure have been evaluated in the past, present and future. Manuscript profile
      • Open Access Article

        29 - Solving Multi-Criteria Decision Making Problems Using Artificial Neural Networks
        M. abdoos N. Mozayani
        Decision making is finding the best compromised solution from all feasible alternatives. Multi-criteria decision making is one of the most applied branches of decision making. Many methods have been presented for solving MCDM problems ever since. Among these methods, si More
        Decision making is finding the best compromised solution from all feasible alternatives. Multi-criteria decision making is one of the most applied branches of decision making. Many methods have been presented for solving MCDM problems ever since. Among these methods, simple additive weighting, SAW, is the most commonly used method. In this paper, two methods are proposed for solving MCDM problems based on artificial neural networks. This paper shows an application of soft computing techniques in classic problems, such as decision making. Herein, two methods are presented based on both supervised and unsupervised neural networks. The results of the methods have been compared with SAW. Manuscript profile
      • Open Access Article

        30 - An Adaptive Wavelet-Based Signal Denoising Schem
        M. nasri H. Nezamabadi-pour S. Saryazdi
        In this paper, a new class of nonlinear thresholding functions with a tunable shape parameter for wavelet-based signal denoising is presented. In addition, a new learning technique for training of thresholding neural network is introduced. Unlike to existing methods, bo More
        In this paper, a new class of nonlinear thresholding functions with a tunable shape parameter for wavelet-based signal denoising is presented. In addition, a new learning technique for training of thresholding neural network is introduced. Unlike to existing methods, both the shape and the threshold parameters are tuned simultaneously using LMS rule. This permits us to consider the effects of both the threshold and the shape parameters on denoising. The proposed functions are tested in both universal-threshold and subband-adaptive denoising and compared with conventional functions. In addition, to evaluate the proposed training method, several numerical examples are performed. The experimental results obtained from denoising of several standard benchmark signals confirm the efficiency and effectiveness of the proposed methods. Manuscript profile
      • Open Access Article

        31 - Determining of Classifiers Behavior Using Hidden Markov Model Based Decision Template
        H. Sadoghi Yazdi
        Studying of classifier behavior is interested from viewpoint of error checking and presentation of suitable solution for decreasing error rates and decreasing performance. Weakness operation of recognition system is because of small number of training samples, noisy sam More
        Studying of classifier behavior is interested from viewpoint of error checking and presentation of suitable solution for decreasing error rates and decreasing performance. Weakness operation of recognition system is because of small number of training samples, noisy samples, unsuitable extracted features, method of determining of system response. Presentation of suitable model for behavior or response of recognition system, we can improve operation of recognition system. In this paper, a new hidden Markov model based decision template is generated for modeling of neurons behavior in neural network. In existing methods, relation of neurons and interaction between them is not studied whereas; response of neural network includes response value of all neurons. So, relations of neurons are modeled using new hidden Markov decision templates. This method is used into three applications include recognition of Farsi number images, normal traffic in internet network, and recognition of types of vehicles. Increasing performance of neural network indicates to superiority of the proposed system. Manuscript profile
      • Open Access Article

        32 - Application of Neuro Space Mapping in Modeling Semiconductor Devices
        M. Gordi Armaki S. E. Hosseini Mohammad Kazem Anvarifard
        In this paper an efficient method for modeling semiconductor devices using the drift-diffusion (DD) model and neural network is presented. Unlike HD model which is complicated, time consuming with high processing cost, the proposed method has lower complexity and higher More
        In this paper an efficient method for modeling semiconductor devices using the drift-diffusion (DD) model and neural network is presented. Unlike HD model which is complicated, time consuming with high processing cost, the proposed method has lower complexity and higher simulate speed. In our method, a RBF neural network is used to modify DD parameters. The modified DD model can generate simulate results of accurate HD model. The proposed method is first applied to a silicon n-i-n diode in one dimension, and then to a silicon thin-film MOSFET in two dimensions, both for interpolation and extrapolation. The obtained results for basic variables, i.e., electron and potential distribution for different voltages, confirm the high efficiency of the proposed method. Manuscript profile
      • Open Access Article

        33 - Training of MLP Neural Network for Data Classification by GSA Method
        M. Dehbashian Seyed-Hamid Zahiri
        Nowadays, several techniques have presented for data classification. One of these techniques is neural network that has attracted many interests. In this classifier, selection a suitable learning method is very important for training of the network. Error back propagati More
        Nowadays, several techniques have presented for data classification. One of these techniques is neural network that has attracted many interests. In this classifier, selection a suitable learning method is very important for training of the network. Error back propagation is the most usual training method of neural networks that late convergence and stopping in local optimum points are its weakness. New approach in neural networks training is the usage of heuristic algorithms. This paper suggests a new learning method namely gravitational search algorithm (GSA) in training of neural network for data classification. GSA method is the latest and the most novel version of swarm intelligence optimization methods. This algorithm is inspired fby the law of Newtonian gravity and mass concept in nature. In this paper, a MLP neural network is trained for classification of five benchmark data set by GSA method. Also, the proposed method efficiency in training and testing of neural network compared with those of two training methods error back propagation and particle swarm optimization. Final results showed the GSA method extraordinary performance for data correct classification in most of cases. Also, in these experiments the GSA method produced stable results in all of cases. In addition, the run time of GSA method is shorter than that of the PSO. Manuscript profile
      • Open Access Article

        34 - Neural Control of the Induction Motor Drive: Robust Against Rotor and Stator Resistances Variations and Suitable for Very Low and High Speeds
        H. Moayedi Rad M. A. Shamsi-Nejad mohsen Farshad
        In this paper, induction motor speed control drive is designed with application two multilayer feed-forward neural networks. That those are used one for generate PWM pulse and other for estimation of required torque and flux information. For trained of the PWM wave gene More
        In this paper, induction motor speed control drive is designed with application two multilayer feed-forward neural networks. That those are used one for generate PWM pulse and other for estimation of required torque and flux information. For trained of the PWM wave generate neural network is used from compound information two voltage and current classic model. Also, against general classic models for generate of the switching pulses is used as compound from reference voltage and current two motor phases. With these ideas are eliminated problems of the voltage and current classic models (flux saturation in current model for high speeds and voltage drop in voltage model for low speeds). As voltage profile is improved in this paper. The required feedback signals estimation (including: rotor flux, torque, etc.) is estimated by multilayer feed-forward neural network. That for robustness of the above estimator against rotor and stator resistances variations in time work of motor is used from compound trained data of the voltage and current classic models, because the voltage and current of the general classic models to sequence are independent of rotor and stator resistances. The simulation results by MATLAB-Simulink verify the proposed drive in improvement of the speed profile in transient and steady-state operating modes. Also, it verify clearly robust of the proposed drive against rotor and stator resistances variations in time work. Manuscript profile
      • Open Access Article

        35 - Modeling and Analysis Iterated Prison Dilemma Game by Grossberg Counter-Propagation Neural Network
        Gh. A. Montazer N. Rastegar Ramshe Alireza Askarzadeh
        Most of the time effective decisions in strategic situations such as competitive issues require a non-linear mapping between stimulus and response. Artificial neural networks can be an appropriate way for modeling and solving these kinds of problems. Prison Dilemma Game More
        Most of the time effective decisions in strategic situations such as competitive issues require a non-linear mapping between stimulus and response. Artificial neural networks can be an appropriate way for modeling and solving these kinds of problems. Prison Dilemma Game is a well-known game that is proposed in game theory. This paper tries to describe how using neural network, the iterated prisoner’s dilemma game can be modeled and analyzed. To do this a Grossberg Counter-Propagation Neural Network (GCP-NN) has been designed to play this game. Results show the capability of this method in complete modeling game. The results present the efficiency of the new method in comparison with the two conventional methods: Tit For Tat (TFT) strategy and Perceptron modeled game. Manuscript profile
      • Open Access Article

        36 - Designing a Self-Tuning Frequency Controller Based on ANNs for an Isolated Microgrid
        F. Habibi H. Bevrani J. Moshtag
        Increasing electrical energy demand, as well as fossil fuel shortages and environmental concerns have caused to use uncommon sources such as distributed generations (DGs) and renewable energy sources (RESs) into modern power systems. A microgrid (MG) system consists of More
        Increasing electrical energy demand, as well as fossil fuel shortages and environmental concerns have caused to use uncommon sources such as distributed generations (DGs) and renewable energy sources (RESs) into modern power systems. A microgrid (MG) system consists of several DGs and RESs which is responsible to provide both electrical and heat powers for local loads. Due to the MGs nonlinearity/complexity which is imposed to the conventional power systems, classical and nonflexible control structures may not represent desirable performance over a wide range of operating conditions. Therefore, more flexible/intelligent control methods are needed most of the past. Hence, in this paper addresses to design an online/self-tuning PI-controller based on artificial neural networks (ANNs) for optimal regulating the MG systems frequency. Manuscript profile
      • Open Access Article

        37 - Electrical Islanding Detection in Electrical Distribution Networks with Distributed Generation Using Discrete Wavelet Transform and Artificial Neural Network
        M. Heidari Orejloo S. Gh. Seifossadat M. Razaz
        In this paper a new algorithm is provided for detecting of electrical islands, based on analysis of transient signals using discrete wavelet transform (DWT) and artificial neural network (ANN). The neural network is taught for Classification of events to the "islands" o More
        In this paper a new algorithm is provided for detecting of electrical islands, based on analysis of transient signals using discrete wavelet transform (DWT) and artificial neural network (ANN). The neural network is taught for Classification of events to the "islands" or "non-islands". Needed features for classification are extracted by DWT of DG transient voltage signal. DIgSILENT, MATLAB and WEKA softwares are used for simulation. Proposed method is tested on a CIGRE medium voltage distribution system with two different types of DGs. The final method is chosen from among 162 relay projects with respect to different criteria, including accuracy, speed, simplicity and cost efficiency is the best. With The analysis done in the best relay selection for DGs, the voltage signal, the mother wavelet db4 and seventh level wavelet transform are used. Simulation results show that this method in compared with existing methods, can detect the electrical islands, with a shorter time and higher accuracy. Manuscript profile
      • Open Access Article

        38 - Simulation of Electrical Fault in Stator Winding of Permanent Magnet Synchronous Motor and Discriminating It from Other Possible Electrical Faults Using Probabilistic Neural Network
        M. Taghipour-gorjikolaie S. M. Razavi M. A. Shamsi-Nejad
        One of the most common electrical faults in Permanent Magnet Synchronous Motor (PMSM) is inter-turn fault in stator winding. At the incipient steps it seems not dangerous and so light, but spreading this fault can leads to irreparable Consequences. In this paper, the in More
        One of the most common electrical faults in Permanent Magnet Synchronous Motor (PMSM) is inter-turn fault in stator winding. At the incipient steps it seems not dangerous and so light, but spreading this fault can leads to irreparable Consequences. In this paper, the intelligent system is presented to protect PMSMs from this kind fault. At the first, intelligent protection system determine the condition of the motor (which can be: Normal, Phase-phase short circuit, Open circuit and Inter-turn fault conditions). If the system determines the faults then send an alarm to operator and also if the fault is inter-turn, it can determine the damaged phase. Obtaining results show that Probabilistic Neural Network can be the most reliable and robust protection system for PMSMs against internal faults, especially inter-turn faults. Manuscript profile
      • Open Access Article

        39 - Application of Wide-Area Synchrophasor Measurement System to Alleviate Blackouts by Rotor Angle Instability
        S. Kiarostami S. Kiarostami
        In this paper, a Wide-Area protection system to deal with rotor angle instabilities is proposed. Firstly, a system blackout model is developed and secondly the extreme contingencies that lead to large blackouts are extracted. Initiating events that ultimately lead to ro More
        In this paper, a Wide-Area protection system to deal with rotor angle instabilities is proposed. Firstly, a system blackout model is developed and secondly the extreme contingencies that lead to large blackouts are extracted. Initiating events that ultimately lead to rotor angle instabilities are determined by artificial neural network (ANN). Coherent generators are detected by an algorithm using the data presented by phasor measurement units (PMUs). Based on identification of coherent generators, the power system is split into stable islands by disconnecting the weak interconnecting lines and load shedding. The performance of the proposed strategy is verified by simulations on the IEEE 39-bus sample power system. Manuscript profile
      • Open Access Article

        40 - An Efficient Method for Modulation Recognition of MPSK Signals in Fading Channels
        S. Hakimi
        Automatic modulation recognition of digital signals is an essential for intelligent communication systems. Most automatic classifications of digital signal types deal with recognizing signals formats in presence of additive white Gaussian noise (AWGN) in channels. Howev More
        Automatic modulation recognition of digital signals is an essential for intelligent communication systems. Most automatic classifications of digital signal types deal with recognizing signals formats in presence of additive white Gaussian noise (AWGN) in channels. However, real world communication environments, such as wireless communication channels, suffer from fading effects. There are few methods proposed to perform in fading channels. This paper presents a high efficient method for identification of M-array phase shift keying (MPSK) digital signal type. The proposed method is heuristic hybrid, formed by a multilayer perceptron (MLP) neural network as the classifier and the bees algorithm (BA) as the optimizer. An equalizer is also used to reduce channel effects. A suitable combination of higher order statistics, up to eighth, is considered as prominent characteristics of signals. Simulation results validate the high efficiency of the proposed technique in recognizing the types of digital signals even at low SNRs. Manuscript profile
      • Open Access Article

        41 - Human Action Recognition in Still Image of Human Pose using Multi-Stream neural Network
        Roghayeh Yousefi K. Faez
        Today, human action recognition in still images has become one of the active topics in computer vision and pattern recognition. The focus is on identifying human action or behavior in a single static image. Unlike the traditional methods that use videos or a sequence of More
        Today, human action recognition in still images has become one of the active topics in computer vision and pattern recognition. The focus is on identifying human action or behavior in a single static image. Unlike the traditional methods that use videos or a sequence of images for human action recognition, still images do not involve temporal information. Therefore, still image-based action recognition is more challenging compared to video-based recognition. Given the importance of motion information in action recognition, the Im2flow method has been used to estimate motion information from a static image. To do this, three deep neural networks are combined together, called a three-stream neural network. The proposed structure of this paper, namely the three-stream network, stemmed from the combination of three deep neural networks. The first, second and third networks are trained based on the raw color image, the optical flow predicted by the image, and the human pose obtained in the image, respectively. In other words, in this study, in addition to the predicted spatial and temporal information, the information on human pose is also used for human action recognition due to its importance in recognition performance. Results revealed that the introduced three-stream neural network can improve the accuracy of human action recognition. The accuracy of the proposed method on Willow7 action, Pascal voc2012, and Stanford10 data sets were 91.8%, 91.02%, and 96.97%, respectively, which indicates the promising performance of the introduced method compared to state-of-the-art performance. Manuscript profile
      • Open Access Article

        42 - An Adaptive Multi-Objective Clustering Algorithm based on Auction_Prediction for Mobile Target Tracking in Wireless Sensor Network
        Roghieh Alinezhad Sepideh Adabi arash Sharifi
        One of the applications of sensor networks is to track moving target. In designing the algorithm for target tracking two issues are of importance: reduction of energy consumption and improvement of the tracking quality. One of the solutions for reduction of energy consu More
        One of the applications of sensor networks is to track moving target. In designing the algorithm for target tracking two issues are of importance: reduction of energy consumption and improvement of the tracking quality. One of the solutions for reduction of energy consumption is to form a tracking cluster. Two major challenges in formation of the tracking cluster are when and how it should be formed. To decrease the number of messages which are exchanged to form the tracking cluster an auction mechanism is adopted. The sensor’s bid in an auction is dynamically and independently determined with the aim of establishing an appropriate tradeoff between network lifetime and the accuracy of tracking. Furthermore, since the tracking cluster should be formed and activated before the target arrives to the concerned region (especially in high speed of target), avoidance from delay in formation of the tracking cluster is another challenge. Not addressing the mentioned challenge results in increased target missing rate and consequently energy loss. To overcome this challenge, it is proposed to predict the target’s position in the next two steps by using neural network and then, simultaneously form the tracking clusters in the next one and two steps. The results obtained from simulation indicate that the proposed algorithm outperforms AASA (Auction-based Adaptive Sensor Activation). Manuscript profile
      • Open Access Article

        43 - Improving the Architecture of Convolutional Neural Network for Classification of Images Corrupted by Impulse Noise
        Mohammad Momeny M. Agha Sarram A. M.  Latif R. Sheikhpour
        Impulse noise is one the common noises which reduces the performance of convolutional neural networks (CNNs) in image classification. Preprocessing for removal of impulse noise is a costly process which may have a destructive effect on the training and validation of the More
        Impulse noise is one the common noises which reduces the performance of convolutional neural networks (CNNs) in image classification. Preprocessing for removal of impulse noise is a costly process which may have a destructive effect on the training and validation of the convolutional neural networks due to insufficient improvement of noisy images. In this paper, a convolutional neural network is proposed which is robust to impulse noise. Proposed CNN classify images corrupted by impulse noise without any preprocessing for noise removal. A noise detection layer is placed at the beginning of the proposed CNN to prevent the processing of noisy values. The ILSVRC-2012 database is used to train the proposed CNN. Experimental results show that preventing the impact of impulse noise on the training process and classification of CNN can increase the accuracy and speed of the network training. The proposed CNN with error of 0.24 is better than other methods in classification of noisy image corrupted by impulse noise with 10% density. The time complexity of O(1) in the proposed CNN for robustness to noise indicates the superiority of the proposed CNN. Manuscript profile
      • Open Access Article

        44 - Comprehensive Optimal Management System of Distributed Resources Using Dynamic Neural Network in Modeling of Electricity Consumption Uncertainty for Grid-Connected Microgrids
        Mohammad Veysi محمدرضا سلطانپور jafar Khalilpour hadi niaei
        In this paper, to enhance the optimal planning for power management of micrigrids, a strategy is proposed using power sharing through coordination between microgrids and the neighborhood system, which has no additional costs for generating units. The uncertainty values More
        In this paper, to enhance the optimal planning for power management of micrigrids, a strategy is proposed using power sharing through coordination between microgrids and the neighborhood system, which has no additional costs for generating units. The uncertainty values of electrical consumers are modeled by dynamic neural network, considering the implementation process and high accuracy of forecasting. In another view, to supply the electrical energy of microgrid, diesel generator, renewable energies such as solar energy and wind energy and so, battery energy storage are used, in addition to the upstream grid connection. As well as, using of the reliability factors, along with a detailed assessment of current costs will improve the performance of microgrid. Hence, the loss of power supply probability (LPSP) and loss of load expectations (LOLE) are expressed as factors for assessing the accuracy of current costs. The proposed model is implemented in GAMS and MATLAB environment and the simulation results clearly demonstrate the desired performance of the proposed algorithm, and leads to gaining revenue for the under-study system. Manuscript profile
      • Open Access Article

        45 - Convolutional Neural Networks for Sentiment Analysis in Persian Social Media
        M. Rohanian M. Salehi A. Darzi وحید رنجبر
        With the social media engagement on the rise, the resulting data can be used as a rich resource for analyzing and understanding different phenomena around us. A sentiment analysis system employs these data to find the attitude of social media users towards certain entit More
        With the social media engagement on the rise, the resulting data can be used as a rich resource for analyzing and understanding different phenomena around us. A sentiment analysis system employs these data to find the attitude of social media users towards certain entities in a given document. In this paper we propose a sentiment analysis method for Persian text using Convolutional Neural Network (CNN), a feedforward Artificial Neural Network, that categorize sentences into two and five classes (considering their intensity) by applying a layer of convolution over input data through different filters. We evaluated the method on three different datasets of Persian social media texts using Area under Curve metric. The final results show the advantage of using CNN over earlier attempts at developing traditional machine learning methods for Persian texts sentiment classification especially for short texts. Manuscript profile
      • Open Access Article

        46 - Performance Improvement of Polynomial Neural Network Classifier using Whale Optimization Algorithm
        Mahsa Memari A. Harifi a. Khalili
        Polynomial neural network (PNN) is a supervised learning algorithm which is one of the most popular models used in real applications. The architectural complexity of polynomial neural network in terms of both number of partial descriptions (PDs) and number of layers, le More
        Polynomial neural network (PNN) is a supervised learning algorithm which is one of the most popular models used in real applications. The architectural complexity of polynomial neural network in terms of both number of partial descriptions (PDs) and number of layers, leads to more computation time and more storage space requirement. In general, it can be said that the architecture of the polynomial neural networks is very complex and it requires large memory and computation time. In this research, a novel approach has been proposed to improve the classification performance of a polynomial neural network using the Whale Optimization Algorithm (PNN-WOA). In this approach, the PDs are generated at the first layer based on the combination of two features. The second layer nodes consists of PDs generated in the first layer, input variables and bias. Finally, the polynomial neural network output is obtained by sum of weighted values of the second layer outputs. Using the Whale Optimization Algorithm (WOA), the best vector of weighting coefficients will be obtained in such a way that the PNN network reach to the highest classification accuracy. Eleven different dataset from UCI database has been used as input data of proposed PNN-WOA and the results has been presented. The proposed method outperforms state-of-the-art approaches such as PNN-RCGA, PNN-MOPPSO, RCPNN-PSO and S-TWSVM in most cases. For datasets, an improvement of accuracy between 0.18% and 10.33% can be seen. Also, the results of the Friedman test indicate the statistical superiority of the proposed PNN-WOA model compared to other methods with p value of 0.039. Manuscript profile
      • Open Access Article

        47 - Numeric Polarity Detection based on Employing Recursive Deep Neural Networks and Supervised Learning on Persian Reviews of E-Commerce Users in Opinion Mining Domain
        Sepideh Jamshidinejad Fatemeh Ahmadi-Abkenari Peiman Bayat
        Opinion mining as a sub domain of data mining is highly dependent on natural language processing filed. Due to the emerging role of e-commerce, opinion mining becomes one of the interesting fields of study in information retrieval scope. This domain focuses on various s More
        Opinion mining as a sub domain of data mining is highly dependent on natural language processing filed. Due to the emerging role of e-commerce, opinion mining becomes one of the interesting fields of study in information retrieval scope. This domain focuses on various sub areas such as polarity detection, aspect elicitation and spam opinion detection. Although there is an internal dependency among these sub sets, but designing a thorough framework including all of the mentioned areas is a highly demanding and challenging task. Most of the literatures in this area have been conducted on English language and focused on one orbit with a binary outcome for polarity detection. Although the employment of supervised learning approaches is among the common utilizations in this area, but the application of deep neural networks has been concentrated with various objectives in recent years so far. Since the absence of a trustworthy and a complete framework with special focuses on each impacting sub domains is highly observed in opinion mining, hence this paper concentrates on this matter. So, through the usage of opinion mining and natural language processing approaches on Persian language, the deep neural network-based framework called RSAD that was previously suggested and developed by the authors of this paper is optimized here to include the binary and numeric polarity detection output of sentences on aspect level. Our evaluation on RSAD performance in comparison with other approaches proves its robustness. Manuscript profile
      • Open Access Article

        48 - An Intelligent Vision System for Automatic Forest Fire Surveillance
        Mohammad Sadegh  Kayhanpanah Behrooz Koohestani
        Fighting forest fires to avoid their potential dangers as well as protect natural resources is a challenge for researchers. The goal of this research is to identify the features of fire and smoke from the unmanned aerial vehicle (UAV) visual images for classification, o More
        Fighting forest fires to avoid their potential dangers as well as protect natural resources is a challenge for researchers. The goal of this research is to identify the features of fire and smoke from the unmanned aerial vehicle (UAV) visual images for classification, object detection, and image segmentation. Because forests are highly complex and nonstructured environments, the use of the vision system is still having problems such as the analogues of flame characteristics to sunlight, plants, and animals, or the smoke blocking the images of the fire, which causes false alarms. The proposed method in this research is the use of convolutional neural networks (CNNs) as a deep learning method that can automatically extract or generate features in different layers. First, we collect data and increase them according to data augmentation methods, and then, the use of a 12-layer network for classification as well as transfer learning method for segmentation of images is proposed. The results show that the data augmentation method used due to resizing and processing the input images to the network to prevent the drastic reduction of the features in the original images and also the CNNs used can extract the fire and smoke features in the images well and finally detect and localize them. Manuscript profile
      • Open Access Article

        49 - A POI Recommendation Model According to the Behavior Pattern of Users Based on Friends List Using Deep Learning
        sadaf safavi mehrdad jalali
        The rapid growth of Location-based Social Networks (LBSNs) is a great opportunity to provide personalized recommendation services. An important task to recommend an accurate Point-of-Interests (POIs) to users, given the challenges of rich contexts and data sparsity, is More
        The rapid growth of Location-based Social Networks (LBSNs) is a great opportunity to provide personalized recommendation services. An important task to recommend an accurate Point-of-Interests (POIs) to users, given the challenges of rich contexts and data sparsity, is to investigate numerous significant traits of users and POIs. In this work, a novel method is presented for POI recommendation to develop the accurate sequence of top-k POIs to users, which is a combination of convolutional neural network, clustering and friendship. To discover the likeness, we use the mean-shift clustering method and only consider the influence of the most similarities in pattern’s friendship, which has the greatest psychological and behavioral impact rather than all user’s friendship. The new framework of a convolutional neural network with 10 layers can predict the next suitable venues and then select the accurate places based on the shortest distance from the similar friend behavior pattern. This approach is appraised on two LBSN datasets, and the experimental results represent that our strategy has significant improvements over the state-of-the-art techniques for POI recommendation. Manuscript profile
      • Open Access Article

        50 - A Step towards All-Optical Deep Neural Networks: Utilizing Nonlinear Optical Element
        Aida Ebrahimi Dehghan Pour S. K.
        In recent years, optical neural networks have received a lot of attention due to their high speed and low power consumption. However, these networks still have many limitations. One of these limitations is implementing their nonlinear layer. In this paper, the implement More
        In recent years, optical neural networks have received a lot of attention due to their high speed and low power consumption. However, these networks still have many limitations. One of these limitations is implementing their nonlinear layer. In this paper, the implementation of nonlinear unit for an optical convolutional neural network is investigated, so that using this nonlinear unit, we can realize an all-optical convolutional neural network with the same accuracy as the electrical networks, while providing higher speed and lower power consumption. In this regard, first of all, different methods of implementing optical nonlinear unit are reviewed. Then, the impact of utilizing saturable absorber, as the nonlinear unit in different layers of CNN, on the network’s accuracy is investigated, and finally, a new and simple method is proposed to preserve the accuracy of the optical neural networks utilizing saturable absorber as the nonlinear activating function. Manuscript profile
      • Open Access Article

        51 - Designing a model based on blockchain technology to strengthen cyber security in the banking industry
        hossein amoozadkhalili neda haghi Reza Tavakkoli-Moghaddam
        Designing a model based on blockchain technology to strengthen cyber security in the banking industry is one of the new methods studied in the banking industry to strengthen cyber security. Accordingly, this study seeks to achieve the goal of evaluating a model based on More
        Designing a model based on blockchain technology to strengthen cyber security in the banking industry is one of the new methods studied in the banking industry to strengthen cyber security. Accordingly, this study seeks to achieve the goal of evaluating a model based on blockchain technology to strengthen cyber security in the banking industry based on artificial neural networks. This model is based on a conceptual model used in an MLP neural network simulation that simulates a blockchain-like process. Also, the neural networks created in the block chain have a strong connection and the possibility of breaking them is low. The data became closer to normal distribution after learning, indicating that blockchain technology will be able to provide cyber security. The level of correlation and efficiency presented was also reported and the findings of the study showed that the efficiency related to blockchain technologies after learning reached the level of 770.57 units, which shows that using the MLP method to learn the process of blockchain technology can be Lead to greater efficiency for cyber security. Also, the value of variance is equal to 27.77 and the mean value of computational values is equal to 0.35 and the value of correlation is equal to 0.99. Manuscript profile
      • Open Access Article

        52 - Sonic wave velocity estimation using intelligent system and multi resolution graph base clustering: A case study from one of Iranian south field
        مرتضی نوری مینا کریمی خالدی
        Abstract Compressional and shear velocity are two fundamental parameters, which have many applications in petrophysical, geophysical, and geomechanical operations. These two parameters can be obtained using Dipole Sonic Imaging tool (DSI), but unfortunately this tool More
        Abstract Compressional and shear velocity are two fundamental parameters, which have many applications in petrophysical, geophysical, and geomechanical operations. These two parameters can be obtained using Dipole Sonic Imaging tool (DSI), but unfortunately this tool is run just in few wells of a field. Therefore it is important to predict compressional and shear velocity indirectly from the other conventional well logs that have good correlation with these parameters in wells without these logs. Classical methods to predict the mentioned parameters are utilizing correlations and regression analysis. However, the best tool is intelligent systems including Artificial Neural Network, Fuzzy Logic, Adaptive Neuro Fuzzy Inference System, and Multi resolution graph base clustering for performing such tasks. In this paper 1321 data points from Kangan and Dalan formations which have compressional and shear velocity are used. These data are divided into two groups: 995 and 326 data points were used for construction of intelligent systems and model testing, respectively. The results showed that despite differences in concept, all of the intelligent techniques were successful for estimation of compressional and shear velocities. The Multi resolution graph base clustering. The method had the best performance among the others due to precise clustering the data points. Using this method, the compressional and shear velocity were correlated with correlation factor of 0.9505 and 0.9407, respectively. The developed model does not incorporate depth or lithological data as a part of the inputs to the network. This means that utilized methodology is applicable to any field. Manuscript profile
      • Open Access Article

        53 - Porosity modeling in Azadegan oil field: a comparative study of Bayesian theory of data fusion, multi layer neural network, and multiple linear regression techniques
        عطیه  مظاهری طرئی حسین معماریان بهزاد تخم چی بهزاد مشیری
        Porosity parameter is an important reservoir property that can be obtained by studying the well core. However, all wells in a field do not have a core. Additionally, in some wells such as horizontal wells, measuring the well core is practically impossible. However, for More
        Porosity parameter is an important reservoir property that can be obtained by studying the well core. However, all wells in a field do not have a core. Additionally, in some wells such as horizontal wells, measuring the well core is practically impossible. However, for almost all wells, log data is available. Usually these logs are used to estimate porosity. The porosity value obtained from this method is influenced by factors such as temperature, pressure, fluid type, and amount of hydrocarbons in shale formations. Thus it is slightly different from the exact value of porosity. Thus, estimates are prone to error and uncertainty. One of the best and yet most practical ways to reduce the amount of uncertainty in measurement is using various sources and data fusion techniques. The main benefit of these techniques is that they increase confidence and reduce risk and error in decision making. In this paper, in order to determine porosity values, data from four wells located in Azadegan oil field are used. First, multilayer neural network and multiple linear regressions are used to estimate the values and then the results of these techniques are compared with a data fusion method (Bayesian theory). To check if it would be possible to generalize these three methods on other data, the porosity parameter of another independent well in this field is also estimated by using these techniques. Number of input variables to estimate porosity in both the neural network and the multiple linear regressions methods is 7, and in the data fusion technique, a maximum of 7 input variables is used. Finally, by comparing the results of the three methods, it is concluded that the data fusion technique (Bayesian theory) is a considerably more accurate technique than multilayer neural network, and multiple linear regression, when it comes to porosity value estimation; Such that the results are correlated with the ground truth greater than 90%. Manuscript profile
      • Open Access Article

        54 - Application of Artificial Intelligence during History matching in One of fractured oil Reservoirs
        ناصر اخلاقی ریاض خراط صدیقه مهدوی
        Nowadays different methods of soft computing to reduce time and calculation content are widely used in oil and gas industry. One of the main applications of these methods is prediction of the results of different processes in oil industry which their estimation with More
        Nowadays different methods of soft computing to reduce time and calculation content are widely used in oil and gas industry. One of the main applications of these methods is prediction of the results of different processes in oil industry which their estimation with usual methods is too difficult and has either no single response or their response finding need more time and cost due to their nonlinear of the related problems. Because of much uncertainty on information which used in simulators, the results of these simulation models may have lot errors so production data (Pressure, Production Rate, Water Oil Ratio (WOR), Gas Oil Ratio (GOR) and etc.) during reservoir life is used to historical accommodation between simulator results and actual data. The main purpose of this study is investigation and feasibility study of a usual method of artificial intelligence in oil industry, which is based on the soft computing. In this study, Artificial Neural Network (ANN) is used to make a predicting model for bottom hole pressure and for one of the fractured oil reservoirs with the seven years history of production. Some unconditional parameters such as fracture porosity, horizontal and vertical fracture permeability, height of matrix and matrix-fracture dual porosity were applied as input data of the networks, and pressure was applied as an output in network making. Applied data in network making is achieved from the 50 runs with simulator. The conclusion of this study showed that predicting model of ANN with error less than 4% and reduces the time of process, has a good ability to history matching. Manuscript profile
      • Open Access Article

        55 - Application of Artificial Intelligence during History matching in One of fractured oil Reservoirs
        ناصر اخلاقی Reyaz kharata Sedigheh Mahdavi
        Nowadays different methods of soft computing to reduce time and calculation content are widely used in oil and gas industry. One of the main applications of these methods is prediction of the results of different processes in oil industry which their estimation with u More
        Nowadays different methods of soft computing to reduce time and calculation content are widely used in oil and gas industry. One of the main applications of these methods is prediction of the results of different processes in oil industry which their estimation with usual methods is too difficult and has either no single response or their response finding need more time and cost due to their nonlinear of the related problems. Because of much uncertainty on information which used in simulators, the results of these simulation models may have lot errors so production data (Pressure, Production Rate, Water Oil Ratio (WOR), Gas Oil Ratio (GOR) and etc.) during reservoir life is used to historical accommodation between simulator results and actual data. The main purpose of this study is investigation and feasibility study of a usual method of artificial intelligence in oil industry, which is based on the soft computing. In this study, Artificial Neural Network (ANN) is used to make a predicting model for bottom hole pressure and for one of the fractured oil reservoirs with the seven years history of production. Some unconditional parameters such as fracture porosity, horizontal and vertical fracture permeability, height of matrix and matrix-fracture dual porosity were applied as input data of the networks, and pressure was applied as an output in network making. Applied data in network making is achieved from the 50 runs with simulator. The conclusion of this study showed that predicting model of ANN with error less than 4% and reduces the time of process, has a good ability to history matching. Manuscript profile
      • Open Access Article

        56 - Improve the detection of buried channel, using Artificial Neural Networks and seismic attributes
        Alireza Ghazanfari Abdolrahim Javaherian Mojtaba Seddigh Arabani
        Channels are one of the most important stratigraphic and morphological events. If channels place in a suitable position such as enclosed in impermeable place can make suitable oil and gas reservoir; So identifying channels are crucial. Different tools such as filters, s More
        Channels are one of the most important stratigraphic and morphological events. If channels place in a suitable position such as enclosed in impermeable place can make suitable oil and gas reservoir; So identifying channels are crucial. Different tools such as filters, seismic attributes, artificial neural networks, and meta-attributes have played an important role in this regard. In this paper dip-steering cube, dip-steer median filter, dip-steer diffusion filter, and fault enhancement filter, have been used. Then, various seismic attributes such as similarity, texture, spectral decomposition, energy and polar dip have been defined and studied. Therefore, work on F3 real seismic data of Dutch part of the North sea for detecting channels has been started by detecting suitable attributes. For identifying the channel in data, it has been used from compilation and combination of seismic attributes using supervised ANN (multi-layer perceptron), and development of mata-attributes, then recombine meta-attributes created along the channel, and using different interpretation point, for eliminating the impact of facies and lithology changes along the channel. Among the advantages and the reasons for using this kind of neural network (supervised), which increases the effect of the neural network and improves the result, is the ability to train the network by specifying the channel and non-channel points used in this paper. Finally, using the above methods, the identification of the channel examined in the above seismic data has been improved, and the channel has been properly detected and extracted throughout its entire length. Manuscript profile
      • Open Access Article

        57 - Compilation of artificial neural networks and the thinned Fault likelihood auto-tracking algorithm, for identification, interpretation and extraction of faults
        Alireza Ghazanfari Hoseyn Mohammadrezaei Hamidreza Ansari
        Fault identification and investigating their evolution is of special importance in the exploration and development of hydrocarbon resources. Success in exploration and development of hydrocarbon fields, need to recognition of petroleum systems and in this regard one of More
        Fault identification and investigating their evolution is of special importance in the exploration and development of hydrocarbon resources. Success in exploration and development of hydrocarbon fields, need to recognition of petroleum systems and in this regard one of the most important topics is identifying faults and their extension condition as a main fluid migration path, specially in deeper zones. Faults and fractures have crucial role in making high permeable and porous segments and cut reservoir and cap rock in the fluid migration path. In addition, for maximizing the production of hydrocarbon from reservoirs and also for reducing the risk of drilling, it is necessary to gain information about geometry and nature of faults of reservoirs. In this paper, the purpose is investigating the performance of combination of neural networks and Fault Likelihood auto-tracking algorithm for identification and interpretation of faults in seismic data. At first using the Dip-steering feature of software, the early filter for accurate identification of dip of structures in the data, have been designed and applied. Then with designing and applying the appropriate filters, the seismic data have been improved. After that proper seismic attributes for fault identification have been calculated from seismic data. With picking fault and non-fault points from data, a supervised neural network using the selected attributes was formed and after training the network, the appropriate output achieved. Then the output of neural network has been used as a input for Thinned Fault Likelihood auto-tracking algorithm. The output of this part contains a volume of tracked faults. Finally using sub-tools of TFL and optimal setting of parameters, 3D fault planes has been interpreted and extracted. Manuscript profile
      • Open Access Article

        58 - Permeability estimation using petrophysical logs and artificial intelligence methods: A case study in the Asmari reservoir of Ahvaz oil field
        Abouzar Mohsenipour Bahman Soleimani iman Zahmatkesh Iman  Veisi
        Permeability is one of the most important petrophysical parameters that play a key role in the discussion of production and development of hydrocarbon fields. In this study, first, the magnetic resonance log in Asmari reservoir was evaluated and permeability was calcula More
        Permeability is one of the most important petrophysical parameters that play a key role in the discussion of production and development of hydrocarbon fields. In this study, first, the magnetic resonance log in Asmari reservoir was evaluated and permeability was calculated using two conventional methods, free fluid model (Coates) and Schlumberger model or mean T2 (SDR). Then, by constructing a simple model of artificial neural network and also combining it with Imperialist competition optimization (ANN-ICA) and particle swarm (ANN-PSO) algorithms, the permeability was estimated. Finally, the results were compared by comparing the estimated COATES permeability and SDR permeability with the actual value, and the estimation accuracy was compared in terms of total squared error and correlation coefficient. The results of this study showed an increase in the accuracy of permeability estimation using a combination of optimization algorithms with artificial neural network. The results of this method can be used as a powerful method to obtain other petrophysical parameters. Manuscript profile
      • Open Access Article

        59 - Performance evaluation model of educational centers using artificial neural network: One of the government organizations in the country
        zaman azhdari Hosein Abdollahi samad Borzoian morteza Taheri mostafa Ebrahimpour Azbari
        The purpose of this study is “to design a model for evaluating the performance of educational centers of one of the government organizations in the country using artificial neural network”. This is an evaluation study to evaluate the performance of public organizational More
        The purpose of this study is “to design a model for evaluating the performance of educational centers of one of the government organizations in the country using artificial neural network”. This is an evaluation study to evaluate the performance of public organizational educational centers. The information required for this research was collected through parallel information channels such as using the documents of educational centers under the organization and referring to their documents while maintaining the classification level. The statistical population of this study was five educational centers, one of the government organizations that hold educational courses for about 10 thousand personnel between 2013 and 2020; Based on the opinion of experts and the results of related studies, the inputs and outputs of the research were selected and determined. In order to reduce the input and output variables, the structural equation modeling method - partial least squares were used. In order to train the MLP bilayer neural network, the training method was used. After the teaching of neural network. The performance of neural network was examined through test patterns. The value (mean square error) of the MSE corresponds to 13 equal test patterns and 74/7413, which indicated the high accuracy of the trained network. Finally, the performance of the educational centers was ranked based on the analyzed data. Manuscript profile
      • Open Access Article

        60 - Assessing Users’ Recreational Demand in Urban Parks in Tehran with the Help of the Artificial Neural Network
               
        The advantages of public green spaces are clear. However, it is hard to estimate which parks provide higher standards for users’ (both tourists and citizens) recreational demands. This study provided a model to assess recreational demands in urban parks with the help of More
        The advantages of public green spaces are clear. However, it is hard to estimate which parks provide higher standards for users’ (both tourists and citizens) recreational demands. This study provided a model to assess recreational demands in urban parks with the help of the artificial neural network. The aim was to clarify the rules of satisfaction among the users’ recreational demands in urban parks. In 22 districts of the city of Tehran, 104 local urban parks (with a high diversity of the quality of welfare services and design) were selected. Using the user-centered viewpoint, we assessed the recreational demand. A field study from 1395 to 1396 helped to investigate the role of the urban district and park service variables in increasing the demand for urban parks. Results of trained networks showed that the artificial neural network created the best function of topology optimization with a higher coefficient of determination in three categorists of training, validation, and test data. Sensitivity analysis showed that the number of urban district parks, sports areas, cultural areas, and the quality of landscape with a sensitivity coefficient of 183.5, 58.1, 52.7, and 30.4, respectively, had the highest effect on the users’ recreational demand in urban parks. The suggested model would be a decision support system in designing urban parks. Such an approach would help improve urban development based on tourism attractions and would develop urban tourism on a broader scale. Manuscript profile
      • Open Access Article

        61 - Stock Price Movement Prediction Using Directed Graph Attention Network
        Alireza Jafari Saman Haratizadeh
        Prediction of the future behavior of the stock market has always attracted researchers' attention as an important challenge in the field of machine learning. In recent years deep learning methods have been successfully applied in this domain to improve prediction perfor More
        Prediction of the future behavior of the stock market has always attracted researchers' attention as an important challenge in the field of machine learning. In recent years deep learning methods have been successfully applied in this domain to improve prediction performance. Previous studies have demonstrated that aggregating information from related stocks can improve the performance of prediction. However, the capacity of modeling the stocks relations as directed graphs and the power of sophisticated graph embedding techniques such as Graph Attention Networks have not been exploited so far for prediction in this domain. In this work, we introduce a framework called DeepNet that creates a directed graph representing how useful the data from each stock can be for improving the prediction accuracy of any other stocks. DeepNet then applies Graph Attention Network to extract a useful representation for each node by aggregating information from its neighbors, while the optimal amount of each neighbor's contribution is learned during the training phase. We have developed a novel Graph Attention Network model called DGAT that is able to define unequal contribution values for each pair of adjacent nodes in a directed graph. Our evaluation experiments on the Tehran Stock Exchange data show that the introduced prediction model outperforms the state-of-the-art baseline algorithms in terms of accuracy and MCC measures. Manuscript profile
      • Open Access Article

        62 - Convolutional Neural Networks for Medical Image Segmentation and Classification: A Review
        Jenifer S Carmel Mary Belinda M J
        Medical imaging refers to the process of obtaining images of internal organs for therapeutic purposes such as discovering or studying diseases. The primary objective of medical image analysis is to improve the efficacy of clinical research and treatment options. Deep le More
        Medical imaging refers to the process of obtaining images of internal organs for therapeutic purposes such as discovering or studying diseases. The primary objective of medical image analysis is to improve the efficacy of clinical research and treatment options. Deep learning has revamped medical image analysis, yielding excellent results in image processing tasks such as registration, segmentation, feature extraction, and classification. The prime motivations for this are the availability of computational resources and the resurgence of deep Convolutional Neural Networks. Deep learning techniques are good at observing hidden patterns in images and supporting clinicians in achieving diagnostic perfection. It has proven to be the most effective method for organ segmentation, cancer detection, disease categorization, and computer-assisted diagnosis. Many deep learning approaches have been published to analyze medical images for various diagnostic purposes. In this paper, we review the works exploiting current state-of-the-art deep learning approaches in medical image processing. We begin the survey by providing a synopsis of research works in medical imaging based on convolutional neural networks. Second, we discuss popular pre-trained models and General Adversarial Networks that aid in improving convolutional networks’ performance. Finally, to ease direct evaluation, we compile the performance metrics of deep learning models focusing on covid-19 detection and child bone age prediction. Manuscript profile
      • Open Access Article

        63 - Using Sentiment Analysis and Combining Classifiers for Spam Detection in Twitter
        mehdi salkhordeh haghighi Aminolah Kermani
        The welcoming of social networks, especially Twitter, has posed a new challenge to researchers, and it is nothing but spam. Numerous different approaches to deal with spam are presented. In this study, we attempt to enhance the accuracy of spam detection by applying one More
        The welcoming of social networks, especially Twitter, has posed a new challenge to researchers, and it is nothing but spam. Numerous different approaches to deal with spam are presented. In this study, we attempt to enhance the accuracy of spam detection by applying one of the latest spam detection techniques and its combination with sentiment analysis. Using the word embedding technique, we give the tweet text as input to a convolutional neural network (CNN) architecture, and the output will detect spam text or normal text. Simultaneously, by extracting the suitable features in the Twitter network and applying machine learning methods to them, we separately calculate the Tweeter spam detection. Eventually, we enter the output of both approaches into a Meta Classifier so that its output specifies the final spam detection or the normality of the tweet text. In this study, we employ both balanced and unbalanced datasets to examine the impact of the proposed model on two types of data. The results indicate an increase in the accuracy of the proposed method in both datasets. Manuscript profile
      • Open Access Article

        64 - Comparing the Semantic Segmentation of High-Resolution Images Using Deep Convolutional Networks: SegNet, HRNet, CSE-HRNet and RCA-FCN
        Nafiseh Sadeghi Homayoun Mahdavi-Nasab Mansoor Zeinali Hossein Pourghasem
        Semantic segmentation is a branch of computer vision, used extensively in image search engines, automated driving, intelligent agriculture, disaster management, and other machine-human interactions. Semantic segmentation aims to predict a label for each pixel from a giv More
        Semantic segmentation is a branch of computer vision, used extensively in image search engines, automated driving, intelligent agriculture, disaster management, and other machine-human interactions. Semantic segmentation aims to predict a label for each pixel from a given label set, according to semantic information. Among the proposed methods and architectures, researchers have focused on deep learning algorithms due to their good feature learning results. Thus, many studies have explored the structure of deep neural networks, especially convolutional neural networks. Most of the modern semantic segmentation models are based on fully convolutional networks (FCN), which first replace the fully connected layers in common classification networks with convolutional layers, getting pixel-level prediction results. After that, a lot of methods are proposed to improve the basic FCN methods results. With the increasing complexity and variety of existing data structures, more powerful neural networks and the development of existing networks are needed. This study aims to segment a high-resolution (HR) image dataset into six separate classes. Here, an overview of some important deep learning architectures will be presented with a focus on methods producing remarkable scores in segmentation metrics such as accuracy and F1-score. Finally, their segmentation results will be discussed and we would see that the methods, which are superior in the overall accuracy and overall F1-score, are not necessarily the best in all classes. Therefore, the results of this paper lead to the point to choose the segmentation algorithm according to the application of segmentation and the importance degree of each class. Manuscript profile
      • Open Access Article

        65 - Data-Driven Sliding Mode Control Based on Projection Recurrent Neural Network for HIV Infection: A Singular Value Approach
        Ashkan  Zarghami mehdi  Siahi Fereidoun Nowshiravan Rahatabad
        In the present study, drug treatment of HIV infection is investigated using a Data-Driven Sliding Mode Control (DDSMC) combined with a Projection Recurrent Neural Network (PRNN). The major objective is to establish the control law that eliminates the need for HIV infect More
        In the present study, drug treatment of HIV infection is investigated using a Data-Driven Sliding Mode Control (DDSMC) combined with a Projection Recurrent Neural Network (PRNN). The major objective is to establish the control law that eliminates the need for HIV infection mathematical formulae and ensures that the physical limits of the actuator are reached. This is accomplished by creating the concepts of model-free adaptive control, in which the relation between input and output is described using local dynamic linearized models based on quasi-partial derivatives. To determine the DDSMC law, a performance index is first defined based on the fulfillment of a discrete-time exponential reaching condition. By turning this index into a quadratic programming problem, the dynamics of the PRNN are extracted based on projection theory. The closed-loop system is explicitly determined using the optimizer output equation and the closed-loop stability analysis is evaluated using the singular value approach. The simulation results reveal that the proposed algorithm has robust performance in conducting the state variables of HIV infection to the healthy equilibrium point in the face of model uncertainty and external disturbances when compared to one of the newest control techniques. Manuscript profile
      • Open Access Article

        66 - Identification of Cancer-Causing Genes in Gene Network Using Feedforward Neural Network Architecture
        مصطفی اخوان صفار abbas ali rezaee
        Identifying the genes that initiate cancer or the cause of cancer is one of the important research topics in the field of oncology and bioinformatics. After the mutation occurs in the cancer-causing genes, they transfer it to other genes through protein-protein interact More
        Identifying the genes that initiate cancer or the cause of cancer is one of the important research topics in the field of oncology and bioinformatics. After the mutation occurs in the cancer-causing genes, they transfer it to other genes through protein-protein interactions, and in this way, they cause cell dysfunction and the occurrence of disease and cancer. So far, various methods have been proposed to predict and classify cancer-causing genes. These methods mostly rely on genomic and transcriptomic data. Therefore, they have a low harmonic mean in the results. Research in this field continues to improve the accuracy of the results. Therefore, network-based methods and bioinformatics have come to the aid of this field. In this study, we proposed an approach that does not rely on mutation data and uses network methods for feature extraction and feedforward three-layer neural network for gene classification. For this purpose, the breast cancer transcriptional regulatory network was first constructed. Then, the different features of each gene were extracted as vectors. Finally, the obtained vectors were given to a feedforward neural network for classification. The obtained results show that the use of methods based on multilayer neural networks can improve the accuracy and harmonic mean and improve the performance compared to other computational methods. Manuscript profile
      • Open Access Article

        67 - Multi-level ternary quantization for improving sparsity and computation in embedded deep neural networks
        Hosna Manavi Mofrad Seyed Ali ansarmohammadi Mostafa Salehi
        Deep neural networks (DNNs) have achieved great interest due to their success in various applications. However, the computation complexity and memory size are considered to be the main obstacles for implementing such models on embedded devices with limited memory and co More
        Deep neural networks (DNNs) have achieved great interest due to their success in various applications. However, the computation complexity and memory size are considered to be the main obstacles for implementing such models on embedded devices with limited memory and computational resources. Network compression techniques can overcome these challenges. Quantization and pruning methods are the most important compression techniques among them. One of the famous quantization methods in DNNs is the multi-level binary quantization, which not only exploits simple bit-wise logical operations, but also reduces the accuracy gap between binary neural networks and full precision DNNs. Since, multi-level binary can’t represent the zero value, this quantization does’nt take advantage of sparsity. On the other hand, it has been shown that DNNs are sparse, and by pruning the parameters of the DNNs, the amount of data storage in memory is reduced while computation speedup is also achieved. In this paper, we propose a pruning and quantization-aware training method for multi-level ternary quantization that takes advantage of both multi-level quantization and data sparsity. In addition to increasing the accuracy of the network compared to the binary multi-level networks, it gives the network the ability to be sparse. To save memory size and computation complexity, we increase the sparsity in the quantized network by pruning until the accuracy loss is negligible. The results show that the potential speedup of computation for our model at the bit and word-level sparsity can be increased by 15x and 45x compared to the basic multi-level binary networks. Manuscript profile
      • Open Access Article

        68 - Stock market prediction using optimized grasshopper optimization algorithm and time series algorithms
        Vahid Safari dehnavi masoud shafiee
        Stock market prediction serves as an attractive and challenging field for researchers in financial markets. Many of the models used in stock market prediction are not able to predict accurately or these models require a large amount of input data, which increases the vo More
        Stock market prediction serves as an attractive and challenging field for researchers in financial markets. Many of the models used in stock market prediction are not able to predict accurately or these models require a large amount of input data, which increases the volume of networks and learning complexity, all of which ultimately reduce the accuracy of forecasting. This article proposes a method for forecasting the stock market that can effectively predict the stock market. In this paper, the past market price is used to reduce the volume of input data and this data is placed in a regressor model. Manuscript profile
      • Open Access Article

        69 - Proposing an FCM-MCOA Clustering Approach Stacked with Convolutional Neural Networks for Analysis of Customers in Insurance Company
        Motahareh Ghavidel meisam Yadollahzadeh tabari Mehdi Golsorkhtabaramiri
        To create a customer-based marketing strategy, it is necessary to perform a proper analysis of customer data so that customers can be separated from each other or predict their future behavior. The datasets related to customers in any business usually are high-dimension More
        To create a customer-based marketing strategy, it is necessary to perform a proper analysis of customer data so that customers can be separated from each other or predict their future behavior. The datasets related to customers in any business usually are high-dimensional with too many instances and include both supervised and unsupervised ones. For this reason, companies today are trying to satisfy their customers as much as possible. This issue requires careful consideration of customers from several aspects. Data mining algorithms are one of the practical methods in businesses to find the required knowledge from customer’s both demographic and behavioral. This paper presents a hybrid clustering algorithm using the Fuzzy C-Means (FCM) method and the Modified Cuckoo Optimization Algorithm (MCOA). Since customer data analysis has a key role in ensuring a company's profitability, The Insurance Company (TIC) dataset is utilized for the experiments and performance evaluation. We compare the convergence of the proposed FCM-MCOA approach with some conventional optimization methods, such as Genetic Algorithm (GA) and Invasive Weed Optimization (IWO). Moreover, we suggest a customer classifier using the Convolutional Neural Networks (CNNs). Simulation results reveal that the FCM-MCOA converges faster than conventional clustering methods. In addition, the results indicate that the accuracy of the CNN-based classifier is more than 98%. CNN-based classifier converges after some couples of iterations, which shows a fast convergence in comparison with the conventional classifiers, such as Decision Tree (DT), Support Vector Machine (SVM), K-Nearest Neighborhood (KNN), and Naive Bayes (NB) classifiers. Manuscript profile
      • Open Access Article

        70 - Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method
        Nazila Mohammadi Gholamreza   Memarzadeh Tehran Sedigheh Tootian Isfahani
        It is inevitable to properly manage the implementation of information and communication technology policies in a planned way in order to improve the country's position in the fields of science and technology. The purpose of this research is to provide a model of the eff More
        It is inevitable to properly manage the implementation of information and communication technology policies in a planned way in order to improve the country's position in the fields of science and technology. The purpose of this research is to provide a model of the effective factors on the implementation of Iran's ICT policies with the help of the neural network technique and based on Giddens' constructive theory. From the point of view of conducting it, this research is of a survey type and based on the purpose, it is of an applied type because it is trying to use the results of the research in the Ministry of Communication and Information Technology and the Iranian Telecommunications Company. Data collection is based on library and field method. The tool for collecting information is research researcher-made questionnaire. The statistical population of the research is information and communication technology experts at the headquarters of Iran Telecommunication Company (810 people), of which 260 people were randomly selected as a sample based on Cochran's formula. MATLAB software was used for data analysis. According to the findings, the best combination for development is when all input variables are considered at the same time, and the worst case is when the infrastructure development variable is ignored, and the most important based on network sensitivity analysis is related to infrastructure development and the least important is related to content supply. Manuscript profile
      • Open Access Article

        71 - A semantic sentiment recognition model based on ontology and cellular deep learning automata
        Hoshang Salehi Reza Ghaemi maryam khairabadi
        Today, social networks and communication media play a significant role in the daily life of users. Users talk and exchange information in different fields in social networks. In the sentences and comments of users, there are negative and positive feelings in relation to More
        Today, social networks and communication media play a significant role in the daily life of users. Users talk and exchange information in different fields in social networks. In the sentences and comments of users, there are negative and positive feelings in relation to the news of the day, current events, etc., and recognizing these feelings faces many challenges. So far, various methods such as machine learning, statistical approaches, artificial intelligence, etc., have been proposed for the purpose of detecting emotions, which despite their many applications; But they have not yet been able to have acceptable accuracy, transparency and accuracy. Therefore, in this article, an ontology-based semantic analysis model using cellular deep learning automata based on GMDH deep neural network is presented. Ontology approach is used to select salient features based on production rules and cellular deep learning automata is used to classify user sentiments. The main innovation of this article is the proposed algorithm that a deep learning method is developed to process only one expression and then by transferring it to the field of cellular automata, parallel or distributed processing is provided. In this article, the data sets of Amazon customers, Twitter, Facebook, fake news of COVID-19, Amazon and fake news network are used. By simulating the proposed method, it was observed that the proposed method has an average improvement of 3% compared to other methods Manuscript profile
      • Open Access Article

        72 - Petrophysical Modeling of Lower Zone of Ratawi Formation, using Neural Network Method in Assimilating Seismic and Geological Well Log Data
        Javid Hanachi Alireza Bashari
        Esfandiar field is located at the northern part of the Persian . This field is a single large anticline with Lulu field of Saudi Arabia, with , 20 KM length and 7 KM width. The field was discovered in 1966 by drilling of well E1, on the northern culmination of t More
        Esfandiar field is located at the northern part of the Persian . This field is a single large anticline with Lulu field of Saudi Arabia, with , 20 KM length and 7 KM width. The field was discovered in 1966 by drilling of well E1, on the northern culmination of the field. wells E3 and E2 were drilled at the top of structure in the southern part of the field. DSTs tests results of E1 proved that the top of Lower Ratawi formation contain 15 m oil column. E3 well test result regards as a dry hole DSTs test results of E2 were not conclusive due to inadequate testing plans . E4 Appraisal well contained, 14 m oil column at the Lower Ratawi. Log interpretations results indicated, E2 and E3 wells contains oil in Yamama formation in the southern part of the field which has not been tested properly. Lower Ratawi (Top oil-bearing zone ), Zone 'B' of Lower Ratawi (Oil bearing zone at bottom), Yamama were constructed based on the existing data. Petrophysical and geophysical data has been used for the Lower Ratawi reservoir, as a result the geological models (structural and porosity models), with applying, related software’s and neural network geophysical method are generated . At the conclusion, the recommended plan consists of horizontal drilling wells for oil production in Lower Ratawi in the north of the field has been proposed. Manuscript profile
      • Open Access Article

        73 - Modeling of Solar Power Plant Using a Neural Network Based on the Equivalent of a Single Diode
        Ali Reza reisi Rohollah  Abdollahi
        <p style="padding-right: 30px; text-align: justify;"><!-- [if gte mso 9]><xml> <o:OfficeDocumentSettings> <o:TargetScreenSize>800x600</o:TargetScreenSize> </o:OfficeDocumentSettings> </xml><![endif]--><!-- [if gte mso 9]><xml> <w:WordDocument> <w:View>Norma More
        <p style="padding-right: 30px; text-align: justify;"><!-- [if gte mso 9]><xml> <o:OfficeDocumentSettings> <o:TargetScreenSize>800x600</o:TargetScreenSize> </o:OfficeDocumentSettings> </xml><![endif]--><!-- [if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves/> <w:TrackFormatting/> <w:PunctuationKerning/> <w:ValidateAgainstSchemas/> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF/> <w:LidThemeOther>EN-US</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>FA</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables/> <w:SnapToGridInCell/> <w:WrapTextWithPunct/> <w:UseAsianBreakRules/> <w:DontGrowAutofit/> <w:SplitPgBreakAndParaMark/> <w:EnableOpenTypeKerning/> <w:DontFlipMirrorIndents/> <w:OverrideTableStyleHps/> </w:Compatibility> <w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel> <m:mathPr> <m:mathFont m:val="Cambria Math"/> <m:brkBin m:val="before"/> <m:brkBinSub m:val="&#45;-"/> <m:smallFrac m:val="off"/> <m:dispDef/> <m:lMargin m:val="0"/> <m:rMargin m:val="0"/> <m:defJc m:val="centerGroup"/> <m:wrapIndent m:val="1440"/> <m:intLim m:val="subSup"/> <m:naryLim m:val="undOvr"/> </m:mathPr></w:WordDocument> </xml><![endif]--><!-- [if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false" DefSemiHidden="false" DefQFormat="false" DefPriority="99" LatentStyleCount="371"> <w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 2"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 3"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 4"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 5"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 6"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 7"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 8"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 9"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 6"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 7"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 8"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 9"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 1"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 2"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 3"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 4"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 5"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 6"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 7"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 8"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 9"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Normal Indent"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="footnote text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="annotation text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="header"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="footer"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index heading"/> <w:LsdException Locked="false" Priority="35" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="caption"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="table of figures"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="envelope address"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="envelope return"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="footnote reference"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="annotation reference"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="line number"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="page number"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="endnote reference"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="endnote text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="table of authorities"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="macro"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="toa heading"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number 5"/> <w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Closing"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Signature"/> <w:LsdException Locked="false" Priority="0" SemiHidden="true" UnhideWhenUsed="true" Name="Default Paragraph Font"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text Indent"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Message Header"/> <w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Salutation"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Date"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text First Indent"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text First Indent 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Note Heading"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text Indent 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text Indent 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Block Text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Hyperlink"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="FollowedHyperlink"/> <w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/> <w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Document Map"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Plain Text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="E-mail Signature"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Top of Form"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Bottom of Form"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Normal (Web)"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Acronym"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Address"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Cite"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Code"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Definition"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Keyboard"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Preformatted"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Sample"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Typewriter"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Variable"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Normal Table"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="annotation subject"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="No List"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Outline List 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Outline List 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Outline List 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Simple 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Simple 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Simple 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Classic 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Classic 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Classic 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Classic 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Colorful 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Colorful 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Colorful 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 6"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 7"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 8"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 6"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 7"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 8"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table 3D effects 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table 3D effects 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table 3D effects 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Contemporary"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Elegant"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Professional"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Subtle 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Subtle 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Web 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Web 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Web 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Balloon Text"/> <w:LsdException Locked="false" Priority="39" Name="Table Grid"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Theme"/> <w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/> <w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading"/> <w:LsdException Locked="false" Priority="61" Name="Light List"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/> <w:LsdException Locked="false" Priority="70" Name="Dark List"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/> <w:LsdException Locked="false" SemiHidden="true" Name="Revision"/> <w:LsdException Locked="false" Priority="34" QFormat="true" Name="List Paragraph"/> <w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/> <w:LsdException Locked="false" Priority="30" QFormat="true" Name="Intense Quote"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/> <w:LsdException Locked="false" Priority="19" QFormat="true" Name="Subtle Emphasis"/> <w:LsdException Locked="false" Priority="21" QFormat="true" Name="Intense Emphasis"/> <w:LsdException Locked="false" Priority="31" QFormat="true" Name="Subtle Reference"/> <w:LsdException Locked="false" Priority="32" QFormat="true" Name="Intense Reference"/> <w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/> <w:LsdException Locked="false" Priority="37" SemiHidden="true" UnhideWhenUsed="true" Name="Bibliography"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/> <w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/> <w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/> <w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/> <w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/> <w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/> <w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 1"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 1"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 1"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 2"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 2"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 2"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 3"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 3"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 3"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 4"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 4"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 4"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 5"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 5"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 5"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 6"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 6"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 6"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 1"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 1"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 1"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 2"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 2"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 2"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 3"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 3"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 3"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 4"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 4"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 4"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 5"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 5"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 5"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 6"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 6"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 6"/> </w:LatentStyles> </xml><![endif]--><!-- [if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0mm 5.4pt 0mm 5.4pt; mso-para-margin:0mm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman",serif;} </style> <![endif]--></p> <p class="Abstract" style="padding-right: 30px; text-align: justify;"><span style="mso-bidi-font-weight: normal;">Various methods have been proposed for modeling solar panels, but modeling solar power plants using them is associated with challenges. In equivalent circuit-based methods, the modeling depends on factory data that changes over time. Modeling of voltage-current characteristic using intelligent methods such as neural network was less considered due to the low accuracy of modeling. In this article, a method independent of the manufacturer's data for modeling the solar power plant is presented, so that it is possible to accurately model the solar power plants that have been installed for several years. The proposed method consists of two steps, in the first step, open circuit voltage, maximum power point and short circuit current are modeled according to atmospheric conditions using neural network. In the second step, the unknown parameters of the equivalent circuit are determined by circuit analysis relations and using neural network outputs. Finally, to evaluate the proposed method, a 3-kW solar power plant was modeled, and the results show the appropriate accuracy of the proposed method for modeling the solar power plant.</span></p> <p style="padding-right: 90px; text-align: justify;">&nbsp;</p> Manuscript profile
      • Open Access Article

        74 - Predicting the workload of virtual machines in order to reduce energy consumption in cloud data centers using the combination of deep learning models
        Zeinab Khodaverdian Hossein Sadr Mojdeh Nazari Soleimandarabi Seyed Ahmad Edalatpanah
        Cloud computing service models are growing rapidly, and inefficient use of resources in cloud data centers leads to high energy consumption and increased costs. Plans of resource allocation aiming to reduce energy consumption in cloud data centers has been conducted usi More
        Cloud computing service models are growing rapidly, and inefficient use of resources in cloud data centers leads to high energy consumption and increased costs. Plans of resource allocation aiming to reduce energy consumption in cloud data centers has been conducted using live migration of Virtual Machines (VMs) and their consolidation into the small number of Physical Machines (PMs). However, the selection of the appropriate VM for migration is an important challenge. To solve this issue, VMs can be classified according to the pattern of user requests into Delay-sensitive (Interactive) or Delay-Insensitive classes, and thereafter suitable VMs can be selected for migration. This is possible by virtual machine workload prediction .In fact, workload predicting and predicting analysis is a pre-migration process of a virtual machine. In this paper, In order to classification of VMs in the Microsoft Azure cloud service, a hybrid model based on Convolution Neural Network (CNN) and Gated Recurrent Unit (GRU) is proposed. Microsoft Azure Dataset is a labeled dataset and the workload of virtual machines in this dataset are in two labeled Delay-sensitive (Interactive) or Delay-Insensitive. But the distribution of samples in this dataset is unbalanced. In fact, many samples are in the Delay-Insensitive class. Therefore, Random Over-Sampling (ROS) method is used in this paper to overcome this challenge. Based on the empirical results, the proposed model obtained an accuracy of 94.42 which clearly demonstrates the superiority of our proposed model compared to other existing models. Manuscript profile
      • Open Access Article

        75 - Design and implementation of a survival model for patients with melanoma based on data mining algorithms
        farinaz sanaei Seyed Abdollah  Amin Mousavi Abbas Toloie Eshlaghy ali rajabzadeh ghotri
        Background/Purpose: Among the most commonly diagnosed cancers, melanoma is the second leading cause of cancer-related death. A growing number of people are becoming victims of melanoma. Melanoma is also the most malignant and rare form of skin cancer. Advanced cases of More
        Background/Purpose: Among the most commonly diagnosed cancers, melanoma is the second leading cause of cancer-related death. A growing number of people are becoming victims of melanoma. Melanoma is also the most malignant and rare form of skin cancer. Advanced cases of the disease may cause death due to the spread of the disease to internal organs. The National Cancer Institute reported that approximately 99,780 people were diagnosed with melanoma in 2022, and approximately 7,650 died. Therefore, this study aims to develop an optimization algorithm for predicting melanoma patients' survival. Methodology: This applied research was a descriptive-analytical and retrospective study. The study population included patients with melanoma cancer identified from the National Cancer Research Center at Shahid Beheshti University between 2008 and 2013, with a follow-up period of five years. An optimization model was selected for melanoma survival prognosis based on the evaluation metrics of data mining algorithms. Findings: A neural network algorithm, a Naïve Bayes network, a Bayesian network, a combination of decision tree and Naïve Bayes network, logistic regression, J48, and ID3 were selected as the models used in the national database. Statistically, the studied neural network outperformed other selected algorithms in all evaluation metrics. Conclusion: The results of the present study showed that the neural network with a value of 0.97 has optimal performance in terms of reliability. Therefore, the predictive model of melanoma survival showed a better performance both in terms of discrimination power and reliability. Therefore, this algorithm was proposed as a melanoma survival prediction model. Manuscript profile
      • Open Access Article

        76 - An Intrusion Detection System based on Deep Learning for CAN Bus
        Fatemeh Asghariyan Mohsen Raji
        In recent years, with the advancement of automotive electronics and the development of modern vehicles with the help of embedded systems and portable equipment, in-vehicle networks such as the controller area network (CAN) have faced new security risks. Since the CAN bu More
        In recent years, with the advancement of automotive electronics and the development of modern vehicles with the help of embedded systems and portable equipment, in-vehicle networks such as the controller area network (CAN) have faced new security risks. Since the CAN bus lacks security systems such as authentication and encryption to deal with cyber-attacks, the need for an intrusion detection system to detect attacks on the CAN bus seem to be very necessary. In this paper, a deep adversarial neural network (DACNN) is proposed to detect various types of security intrusions in CAN buses. For this purpose, the DACNN method, which is an extension of the CNN method using adversarial learning, detects intrusion in three stages; In the first stage, CNN acts as a feature descriptor and the main features are extracted, and in the second stage, the discriminating classifier classifies these features and finally, the intrusion is detected using the adversarial learning. In order to show the efficiency of the proposed method, a real open source dataset was used in which the CAN network traffic on a real vehicle during message injection attacks is recorded on a real vehicle. The obtained results show that the proposed method performs better than other machine learning methods in terms of false negative rate and error rate, which is less than 0.1% for DoS and drive gear forgery attack and RPM forgery attack while this rate is less than 0.5% for fuzzy attack. Manuscript profile
      • Open Access Article

        77 - Improvement of intrusion detection system on Industrial Internet of Things based on deep learning using metaheuristic algorithms
        mohammadreza zeraatkarmoghaddam majid ghayori
        Due to the increasing use of industrial Internet of Things (IIoT) systems, one of the most widely used security mechanisms is intrusion detection system (IDS) in the IIoT. In these systems, deep learning techniques are increasingly used to detect attacks, anomalies or i More
        Due to the increasing use of industrial Internet of Things (IIoT) systems, one of the most widely used security mechanisms is intrusion detection system (IDS) in the IIoT. In these systems, deep learning techniques are increasingly used to detect attacks, anomalies or intrusions. In deep learning, the most important challenge for training neural networks is determining the hyperparameters in these networks. To overcome this challenge, we have presented a hybrid approach to automate hyperparameter tuning in deep learning architecture by eliminating the human factor. In this article, an IDS in IIoT based on convolutional neural networks (CNN) and recurrent neural network based on short-term memory (LSTM) using metaheuristic algorithms of particle swarm optimization (PSO) and Whale (WOA) is used. This system uses a hybrid method based on neural networks and metaheuristic algorithms to improve neural network performance and increase detection rate and reduce neural network training time. In our method, considering the PSO-WOA algorithm, the hyperparameters of the neural network are determined automatically without the intervention of human agent. In this paper, UNSW-NB15 dataset is used for training and testing. In this research, the PSO-WOA algorithm has use optimized the hyperparameters of the neural network by limiting the search space, and the CNN-LSTM neural network has been trained with this the determined hyperparameters. The results of the implementation indicate that in addition to automating the determination of hyperparameters of the neural network, the detection rate of are method improve 98.5, which is a good improvement compared to other methods. Manuscript profile
      • Open Access Article

        78 - Nonlinear Fractional Intelligent Controller for Photovoltaic Inverters
        Hadi Delavari Sara Arjmandpour
        <p style="text-align: justify; padding-right: 30px;"><!-- [if gte mso 9]><xml> <o:OfficeDocumentSettings> <o:TargetScreenSize>800x600</o:TargetScreenSize> </o:OfficeDocumentSettings> </xml><![endif]--><!-- [if gte mso 9]><xml> <w:WordDocument> <w:View>Norma More
        <p style="text-align: justify; padding-right: 30px;"><!-- [if gte mso 9]><xml> <o:OfficeDocumentSettings> <o:TargetScreenSize>800x600</o:TargetScreenSize> </o:OfficeDocumentSettings> </xml><![endif]--><!-- [if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves/> <w:TrackFormatting/> <w:PunctuationKerning/> <w:ValidateAgainstSchemas/> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF/> <w:LidThemeOther>EN-US</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>FA</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables/> <w:SnapToGridInCell/> <w:WrapTextWithPunct/> <w:UseAsianBreakRules/> <w:DontGrowAutofit/> <w:SplitPgBreakAndParaMark/> <w:EnableOpenTypeKerning/> <w:DontFlipMirrorIndents/> <w:OverrideTableStyleHps/> </w:Compatibility> <w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel> <m:mathPr> <m:mathFont m:val="Cambria Math"/> <m:brkBin m:val="before"/> <m:brkBinSub m:val="&#45;-"/> <m:smallFrac m:val="off"/> <m:dispDef/> <m:lMargin m:val="0"/> <m:rMargin m:val="0"/> <m:defJc m:val="centerGroup"/> <m:wrapIndent m:val="1440"/> <m:intLim m:val="subSup"/> <m:naryLim m:val="undOvr"/> </m:mathPr></w:WordDocument> </xml><![endif]--><!-- [if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false" DefSemiHidden="false" DefQFormat="false" DefPriority="99" LatentStyleCount="371"> <w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 2"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 3"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 4"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 5"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 6"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 7"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 8"/> <w:LsdException Locked="false" Priority="9" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="heading 9"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 6"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 7"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 8"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index 9"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 1"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 2"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 3"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 4"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 5"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 6"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 7"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 8"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" Name="toc 9"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Normal Indent"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="footnote text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="annotation text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="header"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="footer"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="index heading"/> <w:LsdException Locked="false" Priority="35" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="caption"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="table of figures"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="envelope address"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="envelope return"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="footnote reference"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="annotation reference"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="line number"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="page number"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="endnote reference"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="endnote text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="table of authorities"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="macro"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="toa heading"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Bullet 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Number 5"/> <w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Closing"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Signature"/> <w:LsdException Locked="false" Priority="0" SemiHidden="true" UnhideWhenUsed="true" Name="Default Paragraph Font"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text Indent"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="List Continue 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Message Header"/> <w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Salutation"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Date"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text First Indent"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text First Indent 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Note Heading"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text Indent 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Body Text Indent 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Block Text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Hyperlink"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="FollowedHyperlink"/> <w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/> <w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Document Map"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Plain Text"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="E-mail Signature"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Top of Form"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Bottom of Form"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Normal (Web)"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Acronym"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Address"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Cite"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Code"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Definition"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Keyboard"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Preformatted"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Sample"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Typewriter"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="HTML Variable"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Normal Table"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="annotation subject"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="No List"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Outline List 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Outline List 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Outline List 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Simple 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Simple 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Simple 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Classic 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Classic 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Classic 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Classic 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Colorful 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Colorful 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Colorful 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Columns 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 6"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 7"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Grid 8"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 4"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 5"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 6"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 7"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table List 8"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table 3D effects 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table 3D effects 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table 3D effects 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Contemporary"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Elegant"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Professional"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Subtle 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Subtle 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Web 1"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Web 2"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Web 3"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Balloon Text"/> <w:LsdException Locked="false" Priority="39" Name="Table Grid"/> <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true" Name="Table Theme"/> <w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/> <w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading"/> <w:LsdException Locked="false" Priority="61" Name="Light List"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/> <w:LsdException Locked="false" Priority="70" Name="Dark List"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/> <w:LsdException Locked="false" SemiHidden="true" Name="Revision"/> <w:LsdException Locked="false" Priority="34" QFormat="true" Name="List Paragraph"/> <w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/> <w:LsdException Locked="false" Priority="30" QFormat="true" Name="Intense Quote"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/> <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/> <w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/> <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/> <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/> <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/> <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/> <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/> <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/> <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/> <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/> <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/> <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/> <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/> <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/> <w:LsdException Locked="false" Priority="19" QFormat="true" Name="Subtle Emphasis"/> <w:LsdException Locked="false" Priority="21" QFormat="true" Name="Intense Emphasis"/> <w:LsdException Locked="false" Priority="31" QFormat="true" Name="Subtle Reference"/> <w:LsdException Locked="false" Priority="32" QFormat="true" Name="Intense Reference"/> <w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/> <w:LsdException Locked="false" Priority="37" SemiHidden="true" UnhideWhenUsed="true" Name="Bibliography"/> <w:LsdException Locked="false" Priority="39" SemiHidden="true" UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/> <w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/> <w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/> <w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/> <w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/> <w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/> <w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 1"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 1"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 1"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 2"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 2"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 2"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 3"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 3"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 3"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 4"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 4"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 4"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 5"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 5"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 5"/> <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light Accent 6"/> <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/> <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/> <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/> <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/> <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful Accent 6"/> <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful Accent 6"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 1"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 1"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 1"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 2"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 2"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 2"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 3"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 3"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 3"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 4"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 4"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 4"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 5"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 5"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 5"/> <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light Accent 6"/> <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/> <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/> <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/> <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/> <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful Accent 6"/> <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful Accent 6"/> </w:LatentStyles> </xml><![endif]--><!-- [if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0mm 5.4pt 0mm 5.4pt; mso-para-margin:0mm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman",serif;} </style> <![endif]--><span style="font-size: 10.0pt; font-family: 'Times New Roman',serif; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;">At present, with the significant growth of energy consumption, increase of greenhouse gases and environmental pollutants, more attention is directed toward renewable energies. Renewable energies include geothermal, wind, photovoltaic energy and etc. Among the advantages of photovoltaic energy, its wide range and easy access, helping to preserve the environment, compatibility with distributed power networks, low noise, quick installation and lower cost compared to other energies can be noted. Important challenges facing photovoltaic systems are changing climatic conditions and parameters variation that affect the performance of the system. In this paper, to track the maximum power point in a photovoltaic system, a fuzzy fractional order sliding mode controller based on disturbance observer and uncertainty estimator using neural network is designed. The sliding mode control is used to reduce chattering, neural network to estimate the system uncertainties, fuzzy system to estimate the coefficient of the signum function in the control law and disturbance observer to approximate the disturbances in the system. Also, the stability of the system has been proven using the Lyapunov method. The simulation results of the photovoltaic system confirm the effectiveness of the proposed method and shows satisfactory performance.</span></p> Manuscript profile
      • Open Access Article

        79 - Multi-Level Ternary Quantization for Improving Sparsity and Computation in Embedded Deep Neural Networks
        Hosna Manavi Mofrad ali ansarmohammadi Mostafa Salehi
        Deep neural networks (DNNs) have achieved great interest due to their success in various applications. However, the computation complexity and memory size are considered to be the main obstacles for implementing such models on embedded devices with limited memory and co More
        Deep neural networks (DNNs) have achieved great interest due to their success in various applications. However, the computation complexity and memory size are considered to be the main obstacles for implementing such models on embedded devices with limited memory and computational resources. Network compression techniques can overcome these challenges. Quantization and pruning methods are the most important compression techniques among them. One of the famous quantization methods in DNNs is the multi-level binary quantization, which not only exploits simple bit-wise logical operations, but also reduces the accuracy gap between binary neural networks and full precision DNNs. Since, multi-level binary can’t represent the zero value, this quantization does not take advantage of sparsity. On the other hand, it has been shown that DNNs are sparse, and by pruning the parameters of the DNNs, the amount of data storage in memory is reduced while computation speedup is also achieved. In this paper, we propose a pruning and quantization-aware training method for multi-level ternary quantization that takes advantage of both multi-level quantization and data sparsity. In addition to increasing the accuracy of the network compared to the binary multi-level networks, it gives the network the ability to be sparse. To save memory size and computation complexity, we increase the sparsity in the quantized network by pruning until the accuracy loss is negligible. The results show that the potential speedup of computation for our model at the bit and word-level sparsity can be increased by 15x and 45x compared to the basic multi-level binary networks. Manuscript profile
      • Open Access Article

        80 - Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method
        Nazila Mohammadi Gholamreza  Memarzadeh sedigheh tootian
        It is inevitable to properly manage the implementation of information and communication technology policies in a planned way in order to improve the country's position in the fields of science and technology. The purpose of this research is to provide a model of the eff More
        It is inevitable to properly manage the implementation of information and communication technology policies in a planned way in order to improve the country's position in the fields of science and technology. The purpose of this research is to provide a model of the effective factors on the implementation of Iran's ICT policies by the neural network technique and based on Giddens' constructive theory. From the point of view of conducting it, this research is of a survey type and based on the purpose, it is of an applied type because it is trying to use the results of the research in the Ministry of Communication and Information Technology and the Iranian Telecommunications Company. Data collection is based on library and field method. The tool for collecting information is researcher-made questionnaire. The statistical population of the research is ICT experts at the headquarters of Iran Telecommunication Company (810 people), of which 260 people were randomly selected as a sample based on Cochran's formula. MATLAB software was used for data analysis. According to the findings, the best combination for development is when all input variables are considered at the same time, and the worst case is when the infrastructure development variable is ignored, and the most important based on network sensitivity analysis is related to infrastructure development and the least important is related to content supply. Manuscript profile