﻿<?xml version="1.0" encoding="utf-8"?><records><record><language>per</language><publisher>RICEST</publisher><journalTitle>Journal of Information Systems and Telecommunication (JIST) </journalTitle><issn>2322-1437</issn><eissn>2345-2773</eissn><publicationDate>2014-12</publicationDate><volume>2</volume><issue>8</issue><startPage>1</startPage><endPage>10</endPage><documentType>article</documentType><title language="eng">A Study on Clustering for Clustering Based Image De-noising</title><authors><author><name>Hossein Bakhshi Golestani</name><email>h.b.golestani@gmail.com</email><affiliationId>1</affiliationId></author><author><name>Mohsen Joneidi</name><email>joneidi@knights.ucf.edu</email><affiliationId>2</affiliationId></author><author><name>Mostafa Sadeghi</name><email>m.saadeghii@gmail.com</email><affiliationId>3</affiliationId></author></authors><affiliationsList><affiliationName affiliationId="1">Sharif</affiliationName><affiliationName affiliationId="2">Sharif</affiliationName><affiliationName affiliationId="3">Sharif</affiliationName></affiliationsList><abstract language="eng">In this paper, the problem of de-noising of an image contaminated with Additive White Gaussian Noise (AWGN) is studied. This subject is an open problem in signal processing for more than 50 years. In the present paper, we suggest a method based on global clustering of image constructing blocks. As the type of clustering plays an important role in clustering-based de-noising methods, we address two questions about the clustering. The first, which parts of the data should be considered for clustering? The second, what data clustering method is suitable for de-noising? Then clustering is exploited to learn an over complete dictionary. By obtaining sparse decomposition of the noisy image blocks in terms of the dictionary atoms, the de-noised version is achieved. Experimental results show that our dictionary learning framework outperforms its competitors in terms of de-noising performance and execution time.</abstract><fullTextUrl>http://jist.ir/Article/14856</fullTextUrl><keywords><keyword>Image de-noising</keyword><keyword>data clustering</keyword><keyword>dictionary learning</keyword><keyword>histogram equalization and sparse representation</keyword></keywords></record><record><language>per</language><publisher>RICEST</publisher><journalTitle>Journal of Information Systems and Telecommunication (JIST) </journalTitle><issn>2322-1437</issn><eissn>2345-2773</eissn><publicationDate>2014-12</publicationDate><volume>2</volume><issue>8</issue><startPage>1</startPage><endPage>10</endPage><documentType>article</documentType><title language="eng">Facial Expression Recognition Using Texture Description of Displacement Image</title><authors><author><name>Hamid Sadeghi</name><email>hamid.sadeghi@aut.ac.ir</email><affiliationId>1</affiliationId></author><author><name>Abolghasem Asadollah Raie</name><email>raie@aut.ac.ir</email><affiliationId>2</affiliationId></author><author><name>Mohammad Reza Mohammadi</name><email>mrmohammadi@ee.sharif.edu</email><affiliationId>3</affiliationId></author></authors><affiliationsList><affiliationName affiliationId="1">Amirkabir</affiliationName><affiliationName affiliationId="2">Amirkabir</affiliationName><affiliationName affiliationId="3">Sharif</affiliationName></affiliationsList><abstract language="eng">In recent years, facial expression recognition, as an interesting problem in computer vision has been performed by means of static and dynamic methods. Dynamic information plays an important role in recognizing facial expression. However, using the entire dynamic information in the expression image sequences is of higher computational cost compared to the static methods.  To reduce the computational cost, instead of entire image sequence, only neutral and emotional faces can be employed. In the previous research, this idea was used by means of DLBPHS method in which facial important small displacements were vanished by subtracting LBP features of neutral and emotional face images. In this paper, a novel approach is proposed to utilize two face images. In the proposed method, the face component displacements are highlighted by subtracting neutral image from emotional image; then, LBP features are extracted from the difference image. The proposed method is evaluated on standard databases and the results show a signiﬁcant accuracy improvement compared to DLBPHS.</abstract><fullTextUrl>http://jist.ir/Article/14860</fullTextUrl><keywords><keyword>Facial expression recognition</keyword><keyword>difference image</keyword><keyword>displacement image</keyword><keyword>Local Binary Patterns (LBP)</keyword><keyword>Support Vector Machine (SVM)</keyword><keyword></keyword><keyword></keyword><keyword></keyword></keywords></record><record><language>per</language><publisher>RICEST</publisher><journalTitle>Journal of Information Systems and Telecommunication (JIST) </journalTitle><issn>2322-1437</issn><eissn>2345-2773</eissn><publicationDate>2014-12</publicationDate><volume>2</volume><issue>8</issue><startPage>1</startPage><endPage>10</endPage><documentType>article</documentType><title language="eng">SIP Vulnerability Scan Framework</title><authors><author><name>Mitra Alidoosti</name><email>alidoosti@comp.iust.ac.ir</email><affiliationId>1</affiliationId></author><author><name>Hassan Asgharian</name><email>asgharian@iust.ac.ir</email><affiliationId>2</affiliationId></author><author><name>Ahmad akbari</name><email>akbari@iust.ac.ir</email><affiliationId>3</affiliationId></author></authors><affiliationsList><affiliationName affiliationId="1">Iran University of Science and Technology</affiliationName><affiliationName affiliationId="2">Iran University of Science and Technology</affiliationName><affiliationName affiliationId="3"></affiliationName></affiliationsList><abstract language="eng">The purpose of this paper is to provide a framework for detecting vulnerabilities in SIP (Session Initiation Protocol) networks. We try to find weaknesses in SIP enabled entities that an attacker by exploiting them is able to attack the system and affect it. This framework is provided by the concept of penetration testing and is designed to be flexible and extensible, and has the capability to customize for other similar session based protocols. To satisfy the above objectives, the framework is designed with five main modules for discovery, information modeling, operation, evaluation and report. After setting up a test-bed as a typical VoIP system to show the validity of the proposed framework, this system has been implemented as a SIP vulnerability scanner. We also defined appropriate metrics for gathering the performance statistics of SIP components. Our test bed is deployed by open-source applications and used for validation and also evaluation of the proposed framework.</abstract><fullTextUrl>http://jist.ir/Article/14854</fullTextUrl><keywords><keyword>Vulnerability scanner</keyword><keyword>SIP</keyword><keyword>Denial of Service Attacks</keyword><keyword>Framework</keyword><keyword>Evaluation</keyword></keywords></record><record><language>per</language><publisher>RICEST</publisher><journalTitle>Journal of Information Systems and Telecommunication (JIST) </journalTitle><issn>2322-1437</issn><eissn>2345-2773</eissn><publicationDate>2014-12</publicationDate><volume>2</volume><issue>8</issue><startPage>1</startPage><endPage>10</endPage><documentType>article</documentType><title language="eng">Blog feed search in Persian Blogosphere</title><authors><author><name>Mohammad Sadegh Zahedi</name><email>sadeghzahedi@gmail.com</email><affiliationId>1</affiliationId></author><author><name>Abolfazl Aleahmad</name><email>aleahmad@ut.ac.ir</email><affiliationId>2</affiliationId></author><author><name>rahgozar rahgozar</name><email>rahgozar@ut.ac.ir</email><affiliationId>3</affiliationId></author><author><name>Farhad Oroumchian</name><email>farhadoroumchian@uowdubai.ac.ae</email><affiliationId>4</affiliationId></author></authors><affiliationsList><affiliationName affiliationId="1">Tehran</affiliationName><affiliationName affiliationId="2">Tehran</affiliationName><affiliationName affiliationId="3"></affiliationName><affiliationName affiliationId="4">University of Wollongong in Dubai</affiliationName></affiliationsList><abstract language="eng">Blogs are one of the main user generated content on the web. So, it is necessary to present retrieval algorithms to the meet information need of weblog users. The goal of blog feed search is to rank blogs regarding their recurrent relevance to the topic of the query.
In this paper, the state-of-the-art blog retrieval methods are surveyed and then they are evaluated and compared in Persian blogosphere. Also, one of the best retrieval models is optimized by using data fusion methods. Evaluation of the proposed algorithm is carried out based on a standard Persian weblogs dataset with 45 diverse queries. Our comparisons show considerable improvement over existing blog retrieval algorithms.</abstract><fullTextUrl>http://jist.ir/Article/14868</fullTextUrl><keywords><keyword>Blog Feed Search</keyword><keyword>Blog Retrieval</keyword><keyword>Persian Blogosphere</keyword><keyword>Voting model</keyword><keyword></keyword><keyword></keyword><keyword></keyword><keyword></keyword></keywords></record><record><language>per</language><publisher>RICEST</publisher><journalTitle>Journal of Information Systems and Telecommunication (JIST) </journalTitle><issn>2322-1437</issn><eissn>2345-2773</eissn><publicationDate>2014-12</publicationDate><volume>2</volume><issue>8</issue><startPage>1</startPage><endPage>10</endPage><documentType>article</documentType><title language="eng">Trust evaluation in unsupervised network: A fuzzy logic approach</title><authors><author><name>Golnar Assadat	 Afzali</name><email>g.afzali@gmail.com</email><affiliationId>1</affiliationId></author><author><name>Monireh Hosseini</name><email>hosseini@kntu.ac.ir</email><affiliationId>2</affiliationId></author></authors><affiliationsList><affiliationName affiliationId="1">Department of Industrial Engineering, K. N. Toosi University of Technology, Tehran, Iran</affiliationName><affiliationName affiliationId="2">Department of Industrial Engineering, K. N. Toosi University of Technology, Tehran, Iran</affiliationName></affiliationsList><abstract language="eng">Because of the possibility of anonymity and impersonation in social networks, trust plays an important role in these networks. Pear to pear networks, by eliminating the supervisor roles, besides its benefit in decreasing management costs, have problems in trust and security of users. In this research, by using social networks as supervised networks, trust level of users is evaluated and by identifying these users in unsupervised networks, appropriate trust level is assigned to them.</abstract><fullTextUrl>http://jist.ir/Article/14866</fullTextUrl><keywords><keyword>trust</keyword><keyword>unsupervised networks</keyword><keyword>trust factors</keyword><keyword>fuzzy logic</keyword><keyword></keyword><keyword></keyword><keyword></keyword><keyword></keyword></keywords></record><record><language>per</language><publisher>RICEST</publisher><journalTitle>Journal of Information Systems and Telecommunication (JIST) </journalTitle><issn>2322-1437</issn><eissn>2345-2773</eissn><publicationDate>2014-12</publicationDate><volume>2</volume><issue>8</issue><startPage>1</startPage><endPage>10</endPage><documentType>article</documentType><title language="eng">Security Analysis of Scalar Costa Scheme Against Known Message Attack in DCT-Domain Image Watermarking</title><authors><author><name>Reza Samadi</name><email>r.samadi@stu.um.ac.ir</email><affiliationId>1</affiliationId></author><author><name>Seyed Alireza	 Seyedin</name><email>seyedin@um.ac.ir</email><affiliationId>2</affiliationId></author></authors><affiliationsList><affiliationName affiliationId="1">Ferdowsi</affiliationName><affiliationName affiliationId="2">Ferdowsi University of Mashhad</affiliationName></affiliationsList><abstract language="eng">This paper proposes an accurate information-theoretic security analysis of Scalar Costa Scheme (SCS) when the SCS is employed in the embedding layer of digital image watermarking. For this purpose, Discrete Cosine Transform (DCT) coefficients are extracted from the cover images. Then, the SCS is used to embed watermarking messages into mid-frequency DCT coefficients. To prevent unauthorized embedding and/or decoding, the SCS codebook is randomized using the pseudorandom dither signal which plays the role of the secret key. A passive attacker applies Known Message Attack (KMA) on the watermarked messages to practically estimate the secret key. The security level is measured using residual entropy (equivocation) of the secret key provided that the attacker’s observations are available. It can be seen that the practical security level of the SCS depends on the host statistics which has contradiction with previous theoretical result. Furthermore, the practical security analysis of the SCS leads to the different values of the residual entropy in comparison with previous theoretical equation. It will be shown that these differences are mainly due to existence of uniform regions in images that cannot be captured by previous theoretical analysis. Another source of such differences is ignoring the dependencies between the observations of non-uniform regions in previous theoretical analysis. To provide an accurate reformulation, the theoretical equation for the uniform regions and the empirical equation for the non-uniform regions are proposed. Then, by combining these equations a new equation is presented for the whole image which considers both host statistics and observations dependencies. Finally, accuracy of the proposed formulations is examined through exhaustive simulations.</abstract><fullTextUrl>http://jist.ir/Article/14863</fullTextUrl><keywords><keyword>scalar Costa scheme</keyword><keyword>known message attack</keyword><keyword>discrete cosine transform</keyword><keyword>residual entropy</keyword><keyword>watermarking</keyword><keyword></keyword><keyword></keyword><keyword></keyword></keywords></record><record><language>per</language><publisher>RICEST</publisher><journalTitle>Journal of Information Systems and Telecommunication (JIST) </journalTitle><issn>2322-1437</issn><eissn>2345-2773</eissn><publicationDate>2014-12</publicationDate><volume>2</volume><issue>8</issue><startPage>1</startPage><endPage>10</endPage><documentType>article</documentType><title language="eng">Tracking Performance of Semi-Supervised Large Margin Classifiers in Automatic Modulation Classification</title><authors><author><name>Hamidreza Hosseinzadeh</name><email>hr.hosseinzadeh@yahoo.com</email><affiliationId>1</affiliationId></author><author><name>Farbod Razzazi</name><email>razzazi@srbiau.ac.ir</email><affiliationId>2</affiliationId></author><author><name>Afrooz Haghbin</name><email>ahaghbin@gmail.com</email><affiliationId>3</affiliationId></author></authors><affiliationsList><affiliationName affiliationId="1">Islamic Azad</affiliationName><affiliationName affiliationId="2"></affiliationName><affiliationName affiliationId="3">Science and Research university</affiliationName></affiliationsList><abstract language="eng">Automatic modulation classification (AMC) in detected signals is an intermediate step between signal detection and demodulation, and is also an essential task for an intelligent receiver in various civil and military applications. In this paper, we propose a semi-supervised Large margin AMC and evaluate it on tracking the received signal to noise ratio (SNR) changes to classify all forms of signals in a cognitive radio environment. To achieve this objective, two structures for self-training of large margin classifiers were developed in additive white Gaussian noise (AWGN) channels with priori unknown SNR. A suitable combination of the higher order statistics and instantaneous characteristics of digital modulation are selected as effective features. Simulation results show that adding unlabeled input samples to the training set, improve the tracking capacity of the presented system to robust against environmental SNR changes.</abstract><fullTextUrl>http://jist.ir/Article/14862</fullTextUrl><keywords><keyword>Automatic modulation classification</keyword><keyword>AMC</keyword><keyword>Tracking performance evaluation</keyword><keyword>Passive-Aggressive Classifier</keyword><keyword>Self Training</keyword><keyword>Semi-supervised learming</keyword><keyword></keyword><keyword></keyword></keywords></record><record><language>per</language><publisher>RICEST</publisher><journalTitle>Journal of Information Systems and Telecommunication (JIST) </journalTitle><issn>2322-1437</issn><eissn>2345-2773</eissn><publicationDate>2014-12</publicationDate><volume>2</volume><issue>8</issue><startPage>1</startPage><endPage>10</endPage><documentType>article</documentType><title language="eng">Joint Source and Channel Analysis for Scalable Video Coding Using Vector Quantization over OFDM System</title><authors><author><name>Farid Jafarian</name><email>farid.jafarian@birjand.ac.ir</email><affiliationId>1</affiliationId></author><author><name>Hassan Farsi</name><email>hs_farsi@yahoo.co.uk</email><affiliationId>2</affiliationId></author></authors><affiliationsList><affiliationName affiliationId="1">Birjand</affiliationName><affiliationName affiliationId="2">Birjand</affiliationName></affiliationsList><abstract language="eng">Conventional wireless video encoders employ variable-length entropy encoding and predictive coding to achieve high compression ratio but these techniques render the extremely sensitive encoded bit-stream to channel errors. To prevent error propagation, it is necessary to employ various additional error correction techniques. In contrast, alternative technique, vector quantization (VQ), which doesn’t use variable-length entropy encoding, have the ability to impede such an error through the use of fix-length code-words. In this paper, we address the problem of analysis of joint source and channel for VQ based scalable video coding (VQ-SVC). We introduce intra-mode VQ-SVC and VQ-3D-DCT SVC, which offer similar compression performance to intra-mode H.264 and 3D-DCT respectively, while offering inherent error resilience. In intra-mode VQ-SVC, 2D-DCT and in VQ-3D-DCT SVC, 3D-DCT is applied on video frames to exploit DCT coefficients then VQ is employed to prepare the codebook of DCT coefficients. In this low bitrate video codecs, high level robustness is needed against the wireless channel fluctuations. To achieve such robustness, we propose and calculate optimal codebook of VQ-SVC and optimal channel code rate using joint source and channel coding (JSCC) technique. Next, the analysis is developed for transmission of video using an OFDM system over multipath Rayleigh fading and AWGN channel. Finally, we report the performance of these schemes to minimize end-to-end distortion over the wireless channel.</abstract><fullTextUrl>http://jist.ir/Article/14858</fullTextUrl><keywords><keyword>Vector Quantization</keyword><keyword>Joint Source and Channel Coding</keyword><keyword>Video Coding</keyword><keyword>Wireless Channel</keyword><keyword></keyword><keyword></keyword><keyword></keyword><keyword></keyword></keywords></record></records>