ICCKE 2018 Program

October 25, 2018





Thursday, October 25

Morning

8:15 – 8:30

Opening

8:30 – 10:00

Sessions (A1, A2, A3)

10:00 – 10:30

Break

10:30 – 11:30

Keynote Speech 1

11:30 – 13:00

Sessions (B1, B2, B3)

13:00 – 14

Break


Thursday, October 25 Afternoon

14 – 15

Keynote Speech 2

15 – 16:30

Sessions (C1, C2, C3)

16:30– 17:00

Break

17:00 – 18:30

Sessions (D1, D2, D3)

18:30 – 19:00

Closing





Session

Topics

Session Chairs

Paper Count


Paper IDs


A1

Semantic Web and NLP

Prof. Kahani

Dr. Ensan

5

37, 69, 84, 137, 139,142

A2

Human Computation …

Computer Security and Cryptology

Dr. Amin-Toosi

Dr. Ghaemi-Bafghi

5

41, 61, 130, 59, 63

A3

Evolutionary Computation …,

Parallel Programming …

Dr. Rohani

Prof. Akbarzadeh

Dr. Savadi

5

34, 64, 90, 128, 120

B1

Data Analytics,

Bioinformatics

Prof. Naghibzadeh

Dr. Behkamal

5

8, 55, 124, 117, 134

B2

Wireless Ad-hoc…,

Applications of ICT…

Parallel Programming …

Prof. Yaghmaee-Moghaddam

Dr. Hoseini-Seno

Dr. Noori

5

47, 70, 119, 96, 115

B3

Image Processing

Dr. Taherinia

Dr. Sadooghi-Yazdi

5

12, 13, 92, 116, 122

C1

Software Engineering,

Computer Algorithms

Dr. Rasoolzadegan

Dr. Paydar

Dr. Araban

Dr. Abrishami

5

53, 60, 28, 56, 108

C2

Machine Learning

Dr. Monsefi

Dr. Harati

5

29, 40, 66,  85

C3

Image Processing,

Video Analysis and Processing

Dr. Taherinia

Dr. Vahedian

4

133, 67, 68, 77

D1

Smart City …,

Dependable and Real-time …


Dr. Asadi

Dr. Sedaghat


5

91, 79, 121, 43, 80

D2

Machine Learning,

Neural Networks…

Dr. Monsefi

Dr. Ghiasi-Shirazi

5

95, 99, 5, 101,126

D3

Medical Image Processing,

Visual Recognition:…

Prof. Pourreza

Dr. Fazl-Ersi

5

15, 89, 23, 52, 129







Session A1: Semantic Web and NLP

Paper ID

Paper Title

Authors

37

An Extensive Comparison of Feature Extraction Methods for Paraphrase Detection

Hassan Shahmohammadi, MirHossein Dezfoulian , Muharram Mansoorizadeh

69

Frequent itemsets as meaningful events in graphs for summarizing biomedical texts

Milad Moradi

84

Persian Plagirisim Detection Using CNNs

Soghra Lazemi,

Hossein Ebrahimpour-komleh

Nasser Noroozi

137

The Study on Quranic Surahs' Topic Sameness Using NLP Techniques

Ehsan Khadangi

Mohammad Moein Fazeli

Amin Shahmohammadi

139

Word Embedding In Small Corpora: A Case Study in Quran

Zeinab Aghahadi

Alireza Talebpour

142

Presenting a Computing Method for Finding the Central Verse of Quranic Surahs

 

Meisam Ahmadi

Ehsan Khadangi

Seyed Peyman Shariatpanahi

Mohammad-Hadi Foroughmand-Araabi

 





Session A2: Human Computation … Computer Security and Cryptology

Paper ID

Paper Title

Authors

41

A Privacy Preserving Method for Crowdsourcing in Indoor Fingerprinting Localization

Nasim Alikhani ,

Vahideh Moghtadaiee,

Amir Mahdi Sazdar ,

Seyed Ali Ghorashi

61

The Impact of Demographic Factors on Persuasion Strategies in Personalized Recommender System

Fakhroddin Noorbehbahani

Zeinab Zarein

130

Moving Target Defense against Advanced Persistent Threats for Cybersecurity Enhancement

Masoud Khosravi-Farmad,

Ali Ahmadian Ramaki

Abbas Ghaemi Bafghi

59


Transfer Learning based Intrusion Detection

Zahra Taghiyarrenani,

Ali Fanian,

Ehsan Mahdavi,

Abdolreza Mirzaei,

Hamed Farsi

63

Network Steganography based on PVD idea

Vajiheh Sabeti

Minoo Shoaei









Session A3: Evolutionary Computation …, Parallel Programming …

Paper ID

Paper Title

Authors

34


A Novel Combination of Bees and Firefly Algorithm to Optimize Continuous Problems


Jafar Gholami,

Somayeh Mohammadi

64


Optimal Camera Placement Using Sine-Cosine Algorithm


Ahmad Fatlawi

Abedin Vahedian

Naseer K. Bachache

90

Obstacle Detection Using GoogleNet

Pouyan Salavati

Hossein Mahvash Mohammadi

128

Effects of Pre-processing on the ECG Signal Sparsity

and Compression Quality

Sara Monem Khorasani

Ghosheh Abed Hodtani

Mohammad Molavi Kakhki

120

A Scalable Method for One-mode Projection of Bipartite Networks based on Hadoop platform

Mahsa Asadi,

Nasser Ghadiri,

Mohammad Amin Nikbakht





Session B1: Data Analytics, Bioinformatics

Paper ID

Paper Title

Authors

8

Analyze Students Performance of a National Exam Using Feature Selection Methods


Hanieh Zehtab Hashemi, Parvane Parvasideh,

Zahra Hasan Larijani,

Fatemeh Moradi

55

Data Driven Identification of Factors Affecting the Job Satisfaction of Programmers


Shohreh Teimouri ,

Hossein Amirkhani

124

Maximum Degree Based Heuristics for Influence Maximization

Maryam Adineh

Mostafa Nouri-Baygi

117


Feature Selection in Microarray Gene Expression Data Using Fisher Discriminant Ratio


Saeed Sarbazi-Azad

Mohammad Saniee Abadeh

Mehdi Irannejad Najaf Abadi

134

A Graph Database Approach for Temporal Modeling

of Disease Progression

Hoda Memarzadeh,

Nasser Ghadiri,

Sara Parikhah Zarmehr





Session B2: Wireless Ad-hoc…, Applications of ICT…Parallel Programming …

Paper ID

Paper Title

Authors

47

A Proximity Mode Selection Method in Device to Device Communications

Marzieh Sheybani,

Mehri Mehrjoo ,

Mahdi Kazeminia


70

EGlossy: An Energy-Efficient Glossy-based synchronization and flooding protocol in IoT

Samira Parvin Gilavan

Gholamhosein Ekbatanifard

119

Development of an Adaptive Multipath Routing Algorithm by examining the congestion and channel fault of one-hop nodes in network-on-chip

Forough Shafiei

Vahid Sattari-Naeini

96

Routing in VANETs Based on Intersection Using SDN and Fog Computing

Naserali Noorani

Seyed Amin Hosseini Seno

115

Effective Realization of Ternary Logic Circuits by Adapted Map Minimization Method

Elham Darvish

Reza Faghih Mirzaee





Session B3: Image Processing

Paper ID

Paper Title

Authors

12


Max-Min Ant Colony Optimization Method for Edge Detection Exploiting a New Heuristic Information Function


Saba Kheirinejad,

Seyed Mohammad Hossein Hasheminejad,

Nooshin Riahi

13


One dimensional second order derivative local binary pattern for hand gestures classification using sEMG signals


Sayed Mohamad Tabatabaei, Abdolah Chalechale

92

Froth Flotation classification of Antimony based on

histogram of bubbles perimeters

Mehrad Ghorbani Moghaddam, Ehsan Fazl Ersi,

Abedin Vahedian

116

A New Algorithm for Detection of Vegetation Regions in High Resolution Aerial and Satellite Images

Marjan Mazruei

Mahdi Saadatmand-Tarzjan

Mohsen Shamirzaei

122

Region Expansion Algorithm: A Well-Quality Region Proposal Generation

Maryam Taghizadeh

Abdolah Chalechale









Session C1: Software Engineering, Computer Algorithms

Paper ID

Paper Title

Authors

53


Arselda: an Improvement on Adaptive Random Testing by Adaptive Region Selection


Mohammad Rezaalipour,

Lida Talebsafay,

Mojtaba Vahidi-Asl

60


Test Model Generation using Equivalence Partitioning


Sorour Jahanbin,

Bahman Zamani

28


An Experimental Study on Robustness and Responsiveness Testing of Iranian Android Games


Samad Paydar,

Aidin Azamnouri

56

Semi-Federated Scheduling of Multiple Periodic

Real-Time DAGs of Non-Preemptable Tasks

Masoud Shariati,

Mahmoud Naghibzadeh, Hamid Noori

108

Fast Motif Discovery using a New Motif Extension

Algorithm

Rahele Mohammadi, Morteza Moradi

Mahmoud Naghibzadeh, Abdorreza Savadi





Session C2: Machine Learning

Paper ID

Paper Title

Authors

29


Toward a Progressive Optimization: Application to Control Design

Mohsen Jalaeian-F,

Seyed Mohammad Ahmadi

40

Robust two stage unsupervised metric learning for domain adaptation

Samaneh Azarbarzin,

Fatemeh Afsari

66

A New Semi-supervised Method for Network Traffic

Classification Based on X-means Clustering and

Label Propagation

Fakhroddin Noorbehbahani

Sadeq Mansoori

85


Book2Vec: Representing Books in Vector Space without using the Contents

Soraya Anvari

Hossein Amirkhani











Session C3: Image Processing, Video Analysis and Processing

Paper ID

Paper Title

Authors

133

Single Sample Face Recognition: Discriminant Scaled Space vs Sparse Representation-based Classification

Reza Serajeh

Amir Mousavinia


67

Extending RISC-V ISA for Accelerating the H.265/HEVC Deblocking Filter

Mohammadsadegh Alizadeh

68

No-Reference Deep Compressed-based VideoQuality Assessment

Mohammadsadegh Alizadeh

77

Violence Detection in Indoor Surveillance Cameras Using Motion Trajectory and Differential Histogram of Optical Flow

Tahereh Zarrat Ehsan

Manoochehr Nahvi





Session D1: Smart City …, Dependable and Real-time …

Paper ID

Paper Title

Authors

91

Designing a light-weighted multi-class and novel multiple logical fuzzy controller to manage intelligent urban traffic

Kazem Saedi,

Amir Hossein Mohajerzadeh

79

P4 to SDNet: Automatic Generation of an Efficient Protocol-Independent Packet Parser on Reconfigurable Hardware

Abbas Yazdinejad

Ali Bohlooli

Kamal Jamshidi

121

A novel approach for automation of smart homes, based on Internet of Things, using fuzzy ontology

Milad Lesani,

Marjan Naderan,

Seyed Enayatallah Alavi

43

DR: Overhead Efficient RLC Crosstalk Avoidance Code

Zahra Shirmohammadi,

Hadi Zamani sabzi

80

A Novel Ultra Low Power Accuracy Configurable Adder at Transistor Level

Arghavan Mohammad Hassani

Morteza Rezaalipour

Masoud Dehyadegari



Session D2: Machine Learning, Neural Networks…

Paper ID

Paper Title

Authors

95


A Sensitivity Analysis on the Air Quality Index based on the Pollutants Concentrations in Tehran

Saba Fotouhi

M. Hassan Shirali-Shahreza

Adel Mohammadpour

99

Modeling Temporal Dynamics of User Preferences in Movie Recommendation

Hamidreza Tahmasbi

Mehrdad Jalali

Hassan Shakeri

5

A Stacked Autoencoders Approach for a P300 Speller BCI

Hamed Ghazikhani,

Modjtaba Rouhani