International Journal of Intelligent Information Systems

Volume 3, Issue 6, December 2014

  • Effective Load Balancing in Cloud Computing

    Zeinab Goudarzi, Ahmad Faraahi

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 1-9
    Received: 18 September 2014
    Accepted: 22 September 2014
    Published: 27 September 2014
    Downloads:
    Views:
    Abstract: Internet, from its beginning so far, has undergone a lot of changes which some of them has changed human’s lifestyle in recent decades. One of the latest changes in the functionality of the Internet has been the introduction of Cloud Computing. Cloud Computing is a new internet service, which involves virtualization, distributed computing, networki... Show More
  • Parallel Image Processing Using Algorithmic Skeletons

    Sare Eslami Khorami

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 10-14
    Received: 30 September 2014
    Accepted: 5 October 2014
    Published: 17 October 2014
    Downloads:
    Views:
    Abstract: In the last few decades, image processing has achieved significant theoretical and practical progress. It has been so fast that image processing can be easily traced in several disciplines and industries. At present, various methods have been proposed to implement image processing. The present paper aims to present a technique for image processing ... Show More
  • A New Organization Model for Self-Organizing Multi-Agent Systems Based on Self-Adaptation Features

    Amin Rahmanzadeh, Ali Farahani, Eslam Nazemi

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 15-22
    Received: 30 September 2014
    Accepted: 5 October 2014
    Published: 17 October 2014
    Downloads:
    Views:
    Abstract: Complexity of information technology systems is increasing continually. A very good solution would be using agents in implementing and controlling these systems. Multi-Agent Systems are good examples of using agents for system control and implementation. On the other hand, Multi-Agent systems need to be controlled and managed too. Using organizatio... Show More
  • Improving Honeyd for Automatic Generation of Attack Signatures

    Motahareh Dehghan, Babak Sadeghiyan

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 23-27
    Received: 7 October 2014
    Accepted: 11 October 2014
    Published: 20 October 2014
    Downloads:
    Views:
    Abstract: In this paper, we design and implement a new Plugin to Honeyd which generates attack signature, automatically. Current network intrusion detection systems work on misuse detectors, where the packets in the monitored network are compared against a repository of signatures. But, we focus on automatic signature generation from malicious network traffi... Show More
  • Measuring the Qualitative Feature of Combined Services

    Aalia Hemmati, Sima Emadi

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 28-32
    Received: 8 October 2014
    Accepted: 11 October 2014
    Published: 20 October 2014
    Downloads:
    Views:
    Abstract: The combination of web services is the result of complex and increasing needs of the users and disability of single web services in resolving the user’s needs. One of the important challenges in the field of web 2.0 is the combination of web services based on their qualitative features. Since it is probable that there would be several different com... Show More
  • Malware Detection Using Data Mining Techniques

    Sara Najari, Iman Lotfi

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 33-37
    Received: 8 October 2014
    Accepted: 11 October 2014
    Published: 20 October 2014
    Downloads:
    Views:
    Abstract: Nowadays, malicious software attacks and threats against data and information security has become a complex process. The variety and number of these attacks and threats has resulted in providing various type of defending ways against them, but unfortunately current detection technologies are ineffective to cope with new techniques of malware design... Show More
  • An Efficient Approach Toward Increasing Wireless Sensor Networks Lifetime Using Novel Clustering in Fuzzy Logic

    Morteza Asghari Reykandeh, Ismaeil Asghari Reykandeh

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 38-44
    Received: 7 October 2014
    Accepted: 11 October 2014
    Published: 27 October 2014
    Downloads:
    Views:
    Abstract: Wireless sensor network (WSN) is composed of a large number of sensor nodes that are connected to each other. In order to collect more efficient information, wireless sensor networks are classified into groups. Classification is an efficient way to increase the lifetime of wireless sensor networks. In this network, devices have limited power proces... Show More
  • Segmentation of Cells from 3-D Confocal Images of Live Embryo

    Ali Zeynali Aaq Qaleh, Seyyed Mahdi Haji Mirahmadi

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 45-48
    Received: 10 October 2014
    Accepted: 14 October 2014
    Published: 27 October 2014
    Downloads:
    Views:
    Abstract: Partial-differential-equation- based segmentation has been employed to accurately extract the shapes of membranes and nuclei from time lapse confocal microscopy images, taken throughout early Zebrafish embryogenesis. This strategy is a prerequisite for an accurate quantitative analysis of cell shape and morphodynamics during organogenesis and is th... Show More
  • A new Method to Detect Circles in Images Based on Genetic Algorithms

    Navid Khalili Dizaji, Nazila Masoudi, Aidin Sakhvati

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 49-55
    Received: 21 October 2014
    Accepted: 23 October 2014
    Published: 27 October 2014
    Downloads:
    Views:
    Abstract: Object detection is one of the key issues in digital image processing. Over the years, many algorithms have been created for detecting meaningful objects on the image which are based on specific characteristics of object or complex mathematical methods. Circle detection is one of these types of methods. One of the best methods for circle detection ... Show More
  • Presenting an Algorithm for Choosing an Optimum Local Service Based on the Qualitative Feature of Combining

    Aalia Hemmati, Sima Emadi

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 56-60
    Received: 21 October 2014
    Accepted: 23 October 2014
    Published: 29 October 2014
    Downloads:
    Views:
    Abstract: The combination of web services is the result of complex and increasing needs of the users and disability of single web services in resolving the users’ needs. One of the important challenges in the field of web 2.0 is the combination of web services based on their qualitative features. Since it is probable that there would be several different com... Show More
  • Software Development for Identifying Persian Text Similarity

    Elham Mahdipour, Rahele Shojaeian Razavi, Zahra Gheibi

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 61-66
    Received: 21 October 2014
    Accepted: 23 October 2014
    Published: 29 October 2014
    Downloads:
    Views:
    Abstract: The vast span of nouns, words and verbs in Persian language and the availability of information in all fields in the form of paper, book and internet arises the need of a system to compare texts and evaluate their similarities. In this paper a system has been presented for comparing the text and determining the degree of Persian (Farsi) text simila... Show More
  • Area and Depth Investigation of Anzali Pond Using Satellite Imageries and Group Method of Data Handling Neural Network

    Farshad Parhizkar Miandehi, Asadollah Shahbahrami

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 67-70
    Received: 21 October 2014
    Accepted: 23 October 2014
    Published: 31 October 2014
    Downloads:
    Views:
    Abstract: Analysis of changes in natural resources is one of the fundamental issues in remote sensing. Several research studies regarding the process of changes in natural resources using satellite imageries and image processing techniques have been done. Anzali pond is one of the important ecosystems in Iran that under the impact of some factors such as dro... Show More
  • An Introduction to Software-Defined Networking

    Babak Darabinejad, Seyed Rasoul Mousavi Fayyeh

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 71-74
    Received: 24 October 2014
    Accepted: 27 October 2014
    Published: 3 November 2014
    Downloads:
    Views:
    Abstract: Although computer networks have spread worldwide, organizations that use networking technologies, have complained about the fact that no new feature has been added. Due to their newly emerged needs, they also prefer to automate many tasks. Moreover, they prefer their networks to be developed using software, rather than expensive and new hardware. S... Show More
  • Solving Quadratic Assignment Problem Using Water Cycle Optimization Algorithm

    Maryam Parhizgar, Farhad Mortezapour Shiri

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 75-79
    Received: 24 October 2014
    Accepted: 27 October 2014
    Published: 3 November 2014
    Downloads:
    Views:
    Abstract: The Quadratic Assignment Problem (QAP) is one of combinatorial optimization problems which devote some facilities to some locations. The aim of this problem is assignment of each facility to a location which minimizes total cost. Because the QAP is NP-hard, so it couldn’t be solved by exact methods. In recent years, meta-heuristic algorithms are us... Show More
  • Utilizing Automatic Recognition and Classification of Images for Pattern Recognition

    Mohammad Hadi Yousofi, Habib Yousofi, Sayyed Amir Mohammad Razavi

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 80-83
    Received: 27 October 2014
    Accepted: 30 October 2014
    Published: 5 November 2014
    Downloads:
    Views:
    Abstract: Pattern recognition is a scientific approach for categorizing objects to class or subject numbers. These subjects need to be classified based on their applications (can be image, signal or any other type of measurements). Occupation, automation, military information, communication, industry and commercial applications and many other fields can bene... Show More
  • Automatic Persian Text Summarizer Using Simulated Annealing and Genetic Algorithm

    Elham Mahdipour, Masoumeh Bagheri

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 84-90
    Received: 7 October 2014
    Accepted: 11 October 2014
    Published: 6 November 2014
    Downloads:
    Views:
    Abstract: Automatic text summarization is a process to reduce the volume of text documents using computer programs to create a text summary with keeping the key terms of the documents. Due to cumulative growth of information and data, automatic text summarization technique needs to be applied in various domains. The approach helps in decreasing the quantity ... Show More
  • Integrating Type-1 Fuzzy and Type-2 Fuzzy Clustering with K-Means for Pre-Processing Input Data in Classification Algorithms

    Vahid Nouri, Mohammad Reza Akbarzadeh, Tootoonchi, Alireza Rowhanimanesh

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 91-97
    Received: 10 October 2014
    Accepted: 14 October 2014
    Published: 6 November 2014
    Downloads:
    Views:
    Abstract: In several papers, clustering has been used for preprocessing datasets before applying classification algorithms in order to enhance classification results. A strong clustered dataset as input to classification algorithms can significantly improve the computation time. This can be particularly useful in “Big Data” where computation time is equally ... Show More
  • Color Image Encryption by Code Image and Hill Algorithm

    Ali Moradmard, Mohammad Tahghighi Sharabiani

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 98-102
    Received: 1 November 2014
    Accepted: 5 November 2014
    Published: 11 November 2014
    Downloads:
    Views:
    Abstract: Today in a digital world, protection of information plays an essential role in message exchange and trading. Encryption is used to meet the security needs of safe transaction. Regarding the importance of the issue and the shift of traditional stage to digital stage, familiarity with encryption methods seems necessary. Different data have different ... Show More
  • Modeling and Prediction of Changes in Anzali Pond Using Multiple Linear Regression and Neural Network

    Farshad Parhizkar Miandehi, Erfan Zidehsaraei, Mousa Doostdar

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 103-108
    Received: 3 November 2014
    Accepted: 6 November 2014
    Published: 11 November 2014
    Downloads:
    Views:
    Abstract: Iranian ponds and water ecosystems are valuable assets which play decisive roles in economic, social, security and political affairs. Within the past few years, many Iranian water ecosystems such asUrmia Lake, Karoun River and Anzali Pond have been under disappearance threat. Ponds are habitats which cannot be replaced and this makes it necessary t... Show More
  • The Magnetic Induction Communications for the Wireless Underground Sensor Networks

    Farzam Saeednia, Shapour Khorshidi, Mohssen Masoumi

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 109-114
    Received: 6 November 2014
    Accepted: 10 November 2014
    Published: 12 November 2014
    Downloads:
    Views:
    Abstract: The most important difference between the wireless underground sensor networks (WUSNs) andthe wireless ground sensor networksis the propagation environment of the signal .In fact, the underground environments consist of soil, rock and water instead of the air. The challenging reasons of these environments to propagate the wireless signal via the El... Show More
  • Hospital Information Systems: A Survey of the Current Situation in Iran

    Mohsen Pourali, Abbas Ghodrat Panah

    Issue: Volume 3, Issue 6-1, December 2014
    Pages: 115-119
    Received: 8 November 2014
    Accepted: 12 November 2014
    Published: 17 November 2014
    Downloads:
    Views:
    Abstract: The main objective of hospital information systems (HIS) is to support hospital activities at practical, tactical and strategic levels. Computer based hospital information systems use computer hardware and software to collect, store, process, review and establish link with administrative data related to all hospital activities and to satisfy all th... Show More