|
ICCKE
2017 Program
October 26-27, 2017
Download
Thursday, October
26
Morning
|
7:30 - 8
|
Opening
|
8 – 9
|
Keynote Speech 1
|
9 – 10:30
|
Sessions (A1, A2, A3)
|
10:30 – 11
|
Break
|
11 – 12:30
|
Sessions (B1, B2, B3)
|
12:30 – 14
|
Break
|
|
Thursday, October
26 Afternoon
|
14 – 15
|
Keynote Speech 2
|
15 – 16:30
|
Sessions (C1, C2, C3)
|
16:30 – 17
|
Break
|
17 – 18:30
|
Sessions (D1, D2, D3)
|
18:30 - 19
|
Break
|
|
Friday, October 27
Morning
|
8 – 9
|
Keynote Speech 3
|
9 – 10:30
|
Sessions (E1, E2, E3)
|
10:30 – 11
|
Break
|
11 – 12:30
|
Sessions (F1, F2, F3)
|
12:30 – 13
|
Closing
|
Session
|
Topics
|
Session
Chairs
|
Session
Title
|
Paper
Count
|
Paper IDs
|
A1
|
Semantic Web and NLP (4)
Data Analytics (1)
|
Prof. Kahani
Dr. Ensan
|
Semantic Web and NLP
|
5
|
31, 63, 142, 180, 183
|
A2
|
Software Engineering (3)
Bioinformatics (1)
|
Prof. Naghibzadeh
Dr. Rasoolzadegan
|
Software Engineering and Bioinformatics
|
4
|
79, 160, 199, 222
|
A3
|
Data Analytics (4)
|
Dr. Asadi
Dr. Nouri-Baygi
|
Data Analytics
|
4
|
103, 108, 149, 179
|
B1
|
Parallel
Programming and Architecture (5)
|
Dr. Savadi
Dr. Noori
|
Parallel Programming
|
5
|
47, 223, 133, 138, 141
|
B2
|
Computer Security and Cryptology (4)
|
Dr. Ghaemi
Dr. Amintoosi
|
Computer Security -1
|
4
|
119, 131, 157, 175
|
B3
|
Applications of ICT in Smart Grid (3)
Dependable and Real-time Embedded Systems(1)
|
Prof. Yaghmayee
Dr. Sedaghat
|
Smart Grid and Embedded Systems
|
4
|
66, 74, 147, 207
|
C1
|
Wireless Ad-hoc and Sensor Networks (4)
|
Dr. Hosseini Seno
Dr. Mohajerzadeh
|
Wireless Sensor Networks -1
|
4
|
14, 88,122, 148
|
C2
|
Computer Security and Cryptology (4)
|
Dr. Ghaemi
Dr. Araban
|
Computer Security -2
|
4
|
38, 48, 75, 115
|
C3
|
Medical Image Processing (3)
Visual Recognition(1)
|
Dr. Pourreza
Dr. Fazl-Ersi
|
Image Processing
|
4
|
33, 70, 195, 219
|
D1
|
Wireless Ad-hoc and Sensor Networks (4)
|
Dr. Hosseini Seno
Dr. Mohajerzadeh
|
Wireless Sensor Networks -2
|
4
|
162, 164, 171, 210
|
D2
|
Grid and Cloud Computing (3)
Digital Currency and Blockchain Technology (1)
|
Prof. Delarosa
Dr. Abrishami
|
Cloud Computing
|
4
|
41, 55, 92, 104
|
D3
|
Video Analysis and Processing (2)
Neural Networks and Kernel Methods (2)
|
Dr. Vahedian
Dr. Ghiasi-Shirazi
|
Video Processing and
Neural Networks
|
4
|
71, 94, 102, 132
|
E1
|
Machine Learning (4)
|
Dr. Monsefi
Dr. Harati
|
Machine Learning -1
|
4
|
49, 72, 95, 140
|
E2
|
Pattern Recognition and Application (5)
|
Prof. Sadoghi-Yazdi
Dr. Taherinia
|
Pattern Recognition -1
|
5
|
11, 30, 34, 35, 77
|
E3
|
Evolutionary Computation (5)
|
Dr. Rohani
Dr. Zomorodi
|
Evolutionary Computation -1
|
5
|
4, 12, 39, 57, 86
|
F1
|
Machine Learning (4)
Probabilistic Graphical Models (1)
|
Dr. Monsefi
Dr. Harati
|
Machine Learning -2
|
5
|
145, 154, 176, 205, 221
|
F2
|
Pattern Recognition and Application (3)
Evolutionary Computation (1)
|
Prof. Sadoghi Yazdi
Dr. Taherinia
|
Pattern Recognition -2
|
4
|
112, 165, 185, 197
|
F3
|
Evolutionary Computation (5)
|
Dr. Rohani
Dr. Zomorodi
|
Evolutionary Computation -2
|
5
|
96, 106, 156, 196, 206
|
* The number in parenthesis is the number of accepted papers in
that track
Session A1:
Semantic Web and NLP
|
Paper ID
|
Paper Title
|
Authors
|
31
|
Sentiment Analysis on Twitter using McDiarmid Tree Algorithm
|
Zahra Rezaei
Mehrdad Jalali
|
63
|
Semi-supervised approach for Persian word sense disambiguation
|
Mohamadreza Mahmoodvand Maryam Hourali
|
142
|
Enhancing Trust Accuracy among Online Social Network Users
Utilizing Data Text Mining Techniques in Apache Spark
|
Pezhman Adib
Amin Nezarat
Saeid
Alirezazadeh
|
180
|
Smart Home User Identification using Bag of Events Approach
|
Fatemeh Sadat Lesani
Faranak
Fotouhi Ghazvini
Hossein Amirkhani
|
183
|
A Scenario Based Approach for Behavior Analysis of Talented Students
|
Mohammad Rasool Fatemi
Behnam Bakhsh
Alireza
Zamani
Behshid
Behkamal
|
Session A2: Software Engineering and Bioinformatics
|
Paper ID
|
Paper Title
|
Authors
|
79
|
Contract Verification of ETL Transformations
|
Banafsheh Azizi
Bahman Zamani
Shekoufeh Kolahdouz-Rahimi
|
160
|
EMVille: A Gamification-Based Approach to Address the Equivalent
Mutant Problem
|
Mahdi Houshmand
Samad Paydar
|
199
|
A Novel Approach For Combinatorial Test Case Generation Using
Multi Objective Optimization
|
Arash Sabbagh
Mohammad Reza Keyvanpour
|
222
|
Protein’s number of β-sheets prediction using structural features
|
Amir Hossein Babolhakami
Behshid
Behkamal
Toktam Dehghani
Kobra Etminani
Mahmoud Naghibzadeh
|
Session A3: Data
Analytics
|
Paper ID
|
Paper Title
|
Authors
|
103
|
Golden Years, Golden Shores: A Study of Elders in Online Travel
Communities
|
Bartłomiej Balcerzak
Radosław Nielek
|
108
|
Ranking of Heart Hospitals using Cross-Efficiency and Two-stage
DEA model
|
Mirpouya Mirmozaffari
Alireza
Alinezhad
|
149
|
On Feature Prediction in Temporal Social Networks based on
Artificial Neural Network Learning
|
Saina Mohamadyari
Niousha Attar
Sadegh Aliakbari
|
179
|
MDMP A New algorithm to create inverted index files in Big Data
using Map-Reduce
|
Ahmad Arab
Saeid Abrishami
|
Session B1:
Parallel Programming
|
Paper ID
|
Paper Title
|
Authors
|
47
|
An analytical model for Segmented Bus enhanced Network on Chip
|
Hossein Bastan
Mohammad ali Montazeri
Amin Ghalami osguei
Amir Khorsandi
Hossein Saidi
|
223
|
A Performance Counter-based Control Flow Checking Technique for
Multi-core Processors
|
Hussen Al-haj Ahmad
Yasser Sedaghat
Mohammadreza Rezaei
|
133
|
VLAG: A very fast locality approximation model for GPU kernels
with regular access patterns
|
Amir
Rajabzadeh
Mohsen Kiani
|
138
|
Modeling Energy and Performance of Phoenix++ based Parallel
Programs
|
Homa Shafiei
Hamid Noori
Ahad Harati
|
141
|
A Low-Power Hybrid Non-Volatile Cache with Asymmetric Coding
|
Omid Hajihassani
Armin Ahmadzadeh
Mohsen Gavahi
Mohammadreza Raei
Dara Rahmati
Saeid Gorgin
|
Session B2:
Computer Security - 1
|
Paper ID
|
Paper Title
|
Authors
|
119
|
Online Privacy Preserving Outsourcing of Large Matrix
Multiplication
|
Fatemeh
Erfan
Hamid
Mala
|
131
|
A survey on digital evidence collection and analysis
|
Somayeh SoltaniSeyed Amin Hosseini Seno
|
157
|
Android malware detection based on overlapping of static features
|
Maryam
Nezhadkamali
Somayeh
Soltani
Seyyed
Amin Hosseini Seno
|
175
|
RAPP: An Efficient Revocation Scheme with Authentication and
Privacy Preserving for Vehicular Ad-hoc Networks
|
Amirreza
Sarencheh
Maryam
Rajabzade asaar
Mahmud
Salmasizadeh
Mohammadreza
Aref
|
Session B3:
Smart Grid and Embedded Systems
|
Paper ID
|
Paper Title
|
Authors
|
66
|
Residential power consumption forecasting in the smart grid using
ANFIS system
|
Mahmoud
Abbasi
Mohammad
Hossein-Yaghmaee Moghaddam
Farzad
Tashtarian
|
74
|
A Cloud-Based Open Automated Demand Response Protocol with AMI
Support
|
Lida
Safarzadeh
Mohammad
Sadegh Modir-Khorasani
Mohammad Hossein -Yaghmaee Moghaddam
|
147
|
SDT-free: An Efficient Crosstalk Avoidance Coding Mechanism
Considering Inductance Effects
|
Zahra Shirmohammadi
Seyed Ghassem Miremadi
|
207
|
A Spectrum Efficient Base Station Switching-off Mechanism for
Green Cellular Networks
|
Fahime Roghani Arvaje
Behrouz Shahgholi-Ghahfarokhi
|
Session C1:
Wireless Sensor Networks - 1
|
Paper ID
|
Paper Title
|
Authors
|
14
|
Using the combination of particle swarm algorithms and fuzzy
approach to provide a clustering method for network nodes with coverage
maintenance in wireless sensor networks
|
Seyed Amirreza Taghdisi Heydariyan
Amir Hussein Mohajerzadeh
|
88
|
A Stable Chaning Routing In Fog Based WSNs
|
Elham Mirzavand
Dadmehr Rahbari
Mohsen Nickray
|
122
|
Fast Fingerprinting Based Indoor Localization by Wi-Fi Signals
|
Nasim
Alikhani
Shima Amirinanloo
Vahideh Moghtadaiee
Seyed Ali Ghorashi
|
148
|
BER Performance of Uplink Massive MIMO With Low Resolution ADCs
|
Azad Azizzadeh
Reza
Mohammadkhani
Seyed Vahab Al-Din Makki
|
Session C2:
Computer Security – 2
|
Paper ID
|
Paper Title
|
Authors
|
38
|
BlindLocation: Supporting User Location Privacy Using Blind
Signature
|
Maede Ashouri-Talouki
Ahmad Baraani-Dastjerdi
Naser Movahedinia
|
48
|
SDSuPK: Secured Data Sharing using Proxy Kerberos to Improve
Openstack Swift Security
|
Sima Attarkhorasani
Reza Azmi
Vajiheh Sabeti
|
75
|
Amplified Template Attack of Cryptographic Algorithms
|
Davood Shanbehzadeh
Mohammad reza Baghri
|
115
|
Android Ransomware Detection Using Reduced Opcode Sequence And
Image Similarity
|
Alireza Karimi
Mohammad Hosein Moattar
|
Session C3:
Image Processing
|
Paper ID
|
Paper Title
|
Authors
|
33
|
Characterization of Schizophrenia by Linear Kernel Canonical
Correlation Analysis of Resting-state functional MRI and Structural MRI
|
Mina Mirjalili
Gholam-Ali Hossein-Zadeh
|
70
|
Corners as Interesting Points in Biologically Inspired Object
Recognition, HMAX
|
Hiwa
Sufikarimi
Karim Mohammadi
|
195
|
A New Algorithm for Multimodal Medical Image Fusion Based on the
Surfacelet Transform
|
Behzad
Rezaeifar
Mahdi Saadatmand-Tarzjan
|
219
|
Segmentation of skin lesions using an improved FLICM method
|
Salar Kanaani
|
Session D1:
Wireless Sensor Networks – 2
|
Paper ID
|
Paper Title
|
Authors
|
162
|
Beam Switching Techniques for Millimeter Wave Vehicle to
Infrastructure Communications
|
Hamed Mohammadi
Reza Mohammadkhani
|
164
|
A Tow-Level Security Approach for Wireless Sensor Networks
|
Atefe
Hosseiny
Nazbanou Farzaneh
|
171
|
CaTa-VN: Coordinated and Topology-aware Virtual Network Service
provisioning in Data Centers Network
|
Arezoo
Jahani
Leyli Mohammad Khanli
|
210
|
Congestion- and Selfishness-aware Social Routing in Delay
Tolerant Networks
|
Sepehr
Keykhaie
|
Session D2:
Cloud Computing
|
Paper ID
|
Paper Title
|
Authors
|
41
|
Implementation and Evaluation of OpenADR Standard with AMI
Support in Cloud Computing
|
Mohammad Sadegh Modir- Khorasani
Lida
Safarzadeh
Mohammad
Hossein Yaghmaee Moghaddam
|
55
|
Performance Profiling of Database Systems in Xen
|
Hesam
Tajbakhsh
Mostafa Dehsangi
Morteza
Analoui
|
92
|
Smart Cloud-assisted Computation Offloading System: A Dynamic
Approach for Energy Optimization
|
Shabnam Namazkar
Masoud Sabaei
|
104
|
Bitcoin: An SWOT Analysis
|
Sahar
Mirzayi
Mohammad
Mehrzad
|
Session D3:
Video Processing and Neural Networks
|
Paper ID
|
Paper Title
|
Authors
|
71
|
Patchwise object tracking via structural local sparse appearance
model
|
Hossein Kashiyani
Shahriar Baradaran Shokouhi
|
94
|
Additive Non-Gaussian Noise Channel Estimation by Using Minimum
Error Entropy Criterion
|
Ahmad Reza Heravi
Ghosheh
Abed Hodtani
|
102
|
Adaptive temporal error concealment based on the MB behavior
estimation in the video
|
Seyyed Mohammad Zabihi
Hossein
Ghanei-Yakhdan
Naser
Mehrshad
|
132
|
Modular Dynamic Deep Denoising Autoencoder for Speech Enhancement
|
Razieh
Safari
Seyed
Mohammad Ahadi
Sanaz
Seyedin
|
Session E1:
Machine Learning -1
|
Paper ID
|
Paper Title
|
Authors
|
49
|
A Comparative Analysis of Classification Algorithms in Diabetic
Retinopathy Screening
|
Saboora
Mohammadian-Roshan
Ali
Karsaz
Yaser
M. Roshan
|
72
|
Word Prediction from fMRI Data Based on C-SVC and A Series
Classifier
|
Fateme
Jalali
Afshin
Ebrahimi
Saeid
Alirezazadeh
|
95
|
On the Convergence Rate of the Fixed-Point Maximum Correntropy
Algorithm
|
Ahmad
Reza Heravi
Ghosheh
Abed Hodtani
|
140
|
Multi-layer Kullback-Leibler-based Complex NMF With LPC Error
clustering for Blind Source Separation
|
Amin
Amiri
sanaz
seyedin
mohammad
ahadi
|
Session E2:
Pattern Recognition -1
|
Paper ID
|
Paper Title
|
Authors
|
11
|
GLCM Features and Fuzzy Nearest Neighbor Classifier for Emotion
Recognition from Face
|
Maryam
Imani
Gholam
Ali Montazer
|
30
|
Bilingualism advantage in handwritten character recognition: A
deep learning investigation on Persian and Latin scripts
|
Zahra
Sadeghi
Alberto
Testolin
Marco
Zorzi
|
34
|
Adaptive Beamforming Based on Linearly Constrained Maximum
Correntropy Learning Algorithm
|
Mojtaba Hajiabadi
Hossein
Khoshbin
Ghosheh
Abed Hodtani
|
35
|
Learning Multi-Objective Binary Features for Image Representation
|
Nemat
Saeidi
Hossein
Karshenas
Hossein
Mahvash Mohammadi
|
77
|
A Novel Platform of Validity Concept and Fuzzy Kalman Filter
Applied to Conservation Voltage Reduction Assessment
|
Farnaz
Sabahi
|
Session E3:
Evolutionary Computation - 1
|
Paper ID
|
Paper Title
|
Authors
|
4
|
Bi-Objective version of Team Orienteering Problem (BTOP)
|
Milad
HajMirzaei
Koorush
Ziarati
Mohamad
taghi Naghibi
|
12
|
Toward an Emotional Opinion Formation Model through Agent-Based
Modeling
|
Alireza
Mansouri
Fattaneh
Taghiyareh
|
39
|
A Novel Sine and Cosine Algorithm for Global Optimization
|
Mostafa
Meshkat
Mohsen
Parhizgar
|
57
|
Inferring gene regulatory network using Path Consistency
Algorithm based on Conditional Mutual information and genetic algorithm
|
Sima Iranmanesh
Vahid Sattari-Naeini
Behnam
Ghavami
|
86
|
Designing an Intelligent Fuzzy PID controller for controlling and
directing military unmanned vehicle
|
Ali
Masoumi
Maryam
Hourali
Amir
Mohtarami
|
Session F1:
Machine Learning -2
|
Paper ID
|
Paper Title
|
Authors
|
145
|
Improving the Precision of KNN Classifier using Nonlinear
Weighting Method Based on the Spline Interpolation
|
Farideh Saneei
Abbas Harifi
Shahram Golzari-Hormozi
|
154
|
Path planning in polygonal domains for robots with limited
turning abilities
|
Mohammad Reza Ranjbar Divkoti
Mostafa Nouri Baygi
|
176
|
Modeling Intra-label Dynamics in Connectionist Temporal
Classification
|
Ashkan Sadeghi lotfabadi
Kamaledin
Ghiasi-Shirazi
Ahad
Harati
|
205
|
Optimistic Initial Value Analysis in a Greedy Selection Approach
to MAB Problems
|
Habib
Rajabi Mashhadi
Kambiz
Shojaee
|
221
|
A Reinforcement Learning Approach to Score Goals in Robocup 3D
Soccer Simulation for Nao Humanoid Robot
|
Mohammad
Amin Fahami
Mohamad
Roshanzamir
Navid
Hoseini Izadi
|
Session F2:
Pattern Recognition -2
|
Paper ID
|
Paper Title
|
Authors
|
112
|
Pre-Training of an Artificial Neural Network for Software Fault
Prediction
|
Moein
Owhadi-Kareshk
Yasser
Sedaghat
Mohammad-R.
Akbarzadeh-T.
|
165
|
Outlier Robust Fuzzy Active Learning Method (ALM)
|
Sajad
Haghzad Klidbary
Saeed
Bagheri Shouraki
Aboozar
Ghaffari
Soroush
SheikhpourKourabbaslou
|
185
|
Epileptic Seizure Classification using Novel Entropy Features
Applied on Maximal Overlap Discrete Wavelet Packet Transform of EEG Signals
|
Amirmasoud
Ahmadi
Shiva
Tafakori
Mohammad
Reza Daliri
|
197
|
Single Image Camera Identification Using I-Vectors
|
Arash
Rashidi
Farbod
Razzazi
|
Session F3:
Evolutionary Computation - 2
|
Paper ID
|
Paper Title
|
Authors
|
96
|
Modified Multi-Objective Hybrid DE and PSO Algorithms for
Resource Allocation in Forest Fires
|
Behnaz Mirzapour babajan
Hadi
S. Aghdasi
|
106
|
Efficient implementation of Weighted Euclidean Distance Based
Generalized Convolutional Neural Networks
|
Keivan
Nalaie
Kamaledin
Ghiasi-Shirazi
Modhammad.R
Akbarzadeh.T
|
156
|
Diagnosis of Coronary Artery Disease using Cuckoo Search and
Genetic Algorithm in Single Photon Emision Computed Tomography images
|
Najmeh
Samadiani
Saeed
Moameri
|
196
|
Optimal Control of HIV Stochastic Model through Genetic Algorithm
|
Fatemeh Saeedizadeh
Reihane
Kardehi Moghaddam
|
206
|
Generalized Differential Evolution
|
Habib
Rajabi Mashhadi
Kambiz
Shojaee-Ghandeshtani
Hossein
Sharifi Noghabi
|
|
|
|
Submission deadline: Extended to July 14, 2017
Notification of acceptance: Extended to August 21, 2017
Announced on August 14, 2017
Camera-ready deadline:
September 15, 2017 Extended to September 22nd
|
|