• List of Articles


      • Open Access Article

        1 - Assessment of Performance Improvement in Hyperspectral Image Classification Based on Adaptive Expansion of Training Samples
        Maryam Imani
        High dimensional images in remote sensing applications allow us to analysis the surface of the earth with more details. A relevant problem for supervised classification of hyperspectral image is the limited availability of labeled training samples, since their collectio Full Text
        High dimensional images in remote sensing applications allow us to analysis the surface of the earth with more details. A relevant problem for supervised classification of hyperspectral image is the limited availability of labeled training samples, since their collection is generally expensive, difficult and time consuming. In this paper, we propose an adaptive method for improving the classification of hyperspectral images through expansion of training samples size. The represented approach utilizes high-confidence labeled pixels as training samples to re-estimate classifier parameters. Semi-labeled samples are samples whose class labels are determined by GML classifier. Samples whose discriminator function values are large enough are selected in an adaptive process and considered as semi-labeled (pseudo-training) samples added to the training samples to train the classifier sequentially. The results of experiments show that proposed method can solve the limitation of training samples in hyperspectral images and improve the classification performance. Manuscript Document
      • Open Access Article

        2 - Internet Banking, Cloud Computing: Opportunities, Threats
        Monireh Hosseini Elias Fathi Kiadehi
        With the extension of Internet and its applications, internet banking is introduced as an efficient and cost effective way to provide services to customers. Towards the end of previous decade, cloud computing has been offered as a revolution in Internet application as a Full Text
        With the extension of Internet and its applications, internet banking is introduced as an efficient and cost effective way to provide services to customers. Towards the end of previous decade, cloud computing has been offered as a revolution in Internet application as a service which effect on the way that service is provided. Regarding the service improvement based on customer’s needs, cloud computing is a quick move in informational services. This study tried to consider each aspect of internet banking and cloud computing strengths, weaknesses, opportunities and threats and provide SWOT analysis for Internet banking using cloud computing. In the following, the study tried to provide a practical solution for financial agencies and banks to provide better Internet banking services using cloud computing technology. Finally a SWOT analysis of internet banking using cloud computing technology is discussed and approved with expert opinions using fuzzy Delphi method. Manuscript Document
      • Open Access Article

        3 - Low Complexity Median Filter Hardware for Image Impulsive Noise Reduction
        Hossein Zamani HosseinAbadi samavi96 samavi96 Nader Karimi
        Median filters are commonly used for removal of the impulse noise from images. De-noising is a preliminary step in online processing of images, thus hardware implementation of median filters is of great interest. Hence, many methods, mostly based on sorting the pixels, Full Text
        Median filters are commonly used for removal of the impulse noise from images. De-noising is a preliminary step in online processing of images, thus hardware implementation of median filters is of great interest. Hence, many methods, mostly based on sorting the pixels, have been developed to implement median filters. Utilizing vast amount of hardware resources and not being fast are the two main disadvantages of these methods. In this paper a method for filtering images is proposed to reduce the needed hardware elements. A modular pipelined median filter unit is first modeled and then the designed module is used in a parallel structure. Since the image is applied in rows and in a parallel manner, the amount of necessary hardware elements is reduced in comparison with other hardware implementation methods. Also, image filtering speed has increased. Implementation results show that the proposed method has advantageous speed and efficiency. Manuscript Document
      • Open Access Article

        4 - A Stochastic Lyapunov Theorem with Application to Stability Analysis of Networked Control Systems
        Babak Tavassoli Parviz Jabehdar Maralani
        The source of randomness in stochastic systems is an input with stochastic behavior as treated in the existing literature. Special types of stochastic processes such as the Wiener process or the Brownian motion have served as an adequate model of such an input for years Full Text
        The source of randomness in stochastic systems is an input with stochastic behavior as treated in the existing literature. Special types of stochastic processes such as the Wiener process or the Brownian motion have served as an adequate model of such an input for years. The body of stochastic systems theory is elegantly shaped around such input models. An example is the Itô’s formula. With development of new applications, we are faced with various phenomena that are more demanding from a stochastic modeling approach. To cope with this problem we restate the stochastic Lyapunov theorem such that it can be applied to a wider class of stochastic systems. In this paper stochastic systems are considered without imposing assumptions on the nature of the stochastic input and the way it affects the sample trajectories. Lyapunov stability theorem is represented for this type of systems in terms of a stability notion that generalizes the notion of stability in moments. As a result, the new theorem finds a larger domain of applications while it can be reduced to some known versions of the stochastic Lyapunov theorem. As an application, an existing deterministic result for nonlinear networked control systems is extended to a more practical probabilistic setting which extends the available analysis tools for checking the stability of continuous-time nonlinear networked control systems in the stochastic setting. The results are applied to a two-channel magnetic levitation system which is controlled over a local communication network to obtain a bound on the rate of transmission failures due to the presence of noise in the industrial environment. Manuscript Document
      • Open Access Article

        5 - GoF-Based Spectrum Sensing of OFDM Signals over Fading Channels
        Seyed Sadra Kashef paeez azmi Hamed Sadeghi
        Goodness-of-Fit (GoF) based spectrum sensing of orthogonal frequency-division multiplexing (OFDM) signals is investigated in this paper. To this end, some novel local sensing methods based on Shapiro-Wilk (SW), Shapiro-Francia (SF), and Jarque-Bera (JB) tests are first Full Text
        Goodness-of-Fit (GoF) based spectrum sensing of orthogonal frequency-division multiplexing (OFDM) signals is investigated in this paper. To this end, some novel local sensing methods based on Shapiro-Wilk (SW), Shapiro-Francia (SF), and Jarque-Bera (JB) tests are first studied. In essence, a new threshold selection technique is proposed for SF and SW tests. Then, three studied methods are applied to spectrum sensing for the first time and their performance are analyzed. Furthermore, the computational complexity of the above methods is computed and compared to each other. Simulation results demonstrate that the SF detector outperforms other existing GoF-based methods over AWGN channels. Furthermore simulation results demonstrate the superiority of the proposed SF method in additive colored Gaussian noise channels and over fading channel in comparison with the conventional energy detector. Manuscript Document
      • Open Access Article

        6 - An Ultra-Wideband Common Gate LNA With Gm-Boosted And Noise Canceling Techniques
        Amin Jamalkhah Ahmad Hakimi
        In this paper, an ultra-wideband (UWB) common gate low-noise amplifier (LNA) with gm-boosted and noise-cancelling techniques is presented. In this scheme we utilize gm-boosted stage for cancelling the noise of matching device. The bandwidth extension and flat gain are a Full Text
        In this paper, an ultra-wideband (UWB) common gate low-noise amplifier (LNA) with gm-boosted and noise-cancelling techniques is presented. In this scheme we utilize gm-boosted stage for cancelling the noise of matching device. The bandwidth extension and flat gain are achieved by using of series and shunt peaking techniques. Simulated in .13 um Cmos technology, the proposed LNA achieved 2.38-3.4dB NF and S11 less than -11dB in the 3.1-10.6 GHz band. Maximum power gain (S21) is 11dB and -3dB bandwidth is 1 .25-11.33 GHz. The power consumption of LNA is 5.8mW. Manuscript Document
      • Open Access Article

        7 - Load Balanced Spanning Tree in Metro Ethernet Networks
        Ghasem Mirjalily Samira Samadi
        Spanning Tree Protocol (STP) is a link management standard that provides loop free paths in Ethernet networks. Deploying STP in metro area networks is inadequate because it does not meet the requirements of these networks. STP blocks redundant links, causing the risk of Full Text
        Spanning Tree Protocol (STP) is a link management standard that provides loop free paths in Ethernet networks. Deploying STP in metro area networks is inadequate because it does not meet the requirements of these networks. STP blocks redundant links, causing the risk of congestion close to the root. As a result, STP provides poor support for load balancing in metro Ethernet networks. A solution for this problem is using multi-criteria spanning tree by considering criterions related to load balancing over links and switches. In our previous work, an algorithm named Best Spanning Tree (BST) is proposed to find the best spanning tree in a metro Ethernet network. BST is based on the computation of total cost for each possible spanning tree; therefore, it is very time consuming especially when the network is large. In this paper, two heuristic algorithms named Load Balanced Spanning Tree (LBST) and Modified LBST (MLBST) will be proposed to find the near-optimal balanced spanning tree in metro Ethernet networks. The computational complexity of the proposed algorithms is much less than BST algorithm. Furthermore, simulation results show that the spanning tree obtained by proposed algorithms is the same or similar to the spanning tree obtained by BST algorithm. Manuscript Document
      • Open Access Article

        8 - Node to Node Watermarking in Wireless Sensor Networks for Authentication of Self Nodes
        Hassan Farsi Seyed Morteza Nourian
        In order to solve some security issues in Wireless Sensor Networks (WSNs), node to node authentication method based on digital watermarking technique for verification of relative nodes is proposed. In the proposed method, some algorithms with low computational for gener Full Text
        In order to solve some security issues in Wireless Sensor Networks (WSNs), node to node authentication method based on digital watermarking technique for verification of relative nodes is proposed. In the proposed method, some algorithms with low computational for generation, embedding and detection of security ID are designed. The collected data packets by the nodes are marked using security ID. In the proposed method, header is used to mark the packets. Since the nature of the sensor networks is cooperative, using the head of the packets is proposed for authentication. Also using the marked head can prevent from sending and receiving fake data in the other nodes. Simulations have been performed in environments with imposing unrealistic data and having a probability from 1% to 10%. Comparing the proposed method with other methods shows that the proposed method in term of security, reducing traffic and increasing network lifetime is more effective. Manuscript Document