• Home
  • پایگاه داده
    • List of Articles پایگاه داده

      • Open Access Article

        1 - A structure for object-oriented database queries using fuzzification of XML tags and by using ordered weighted average method to calculate the objects’ membership degree
        M. Dashti1 A. Harounabadi S. J. Mirabedini
        Any real world activity deals with a series of imprecise data. Managing this type of data using classic database systems leads to a tremendous loss of knowledge, and this issue necessitates the use of advanced database modeling techniques. Applying fuzzy theory and mode More
        Any real world activity deals with a series of imprecise data. Managing this type of data using classic database systems leads to a tremendous loss of knowledge, and this issue necessitates the use of advanced database modeling techniques. Applying fuzzy theory and modeling to classic databases can be a basis for intelligent information processing. In recent years, XML has become a very important standard language and structure especially for exchanging and displaying web-based information. Many researches have been performed to assess and expand the XML and imprecise data literature, but many few have assessed the concept of imprecise data within XML. In this study, fuzzy logic is merged into XML concept to reach a suitable solution for object-oriented database queries. By combining SQL and XML we can provide an independent language and database for storing and retrieving queries. This paper examines the queries in two forms of simple and complex queries. In complex queries, the focus is more on conjunctive queries. These queries are then expressed with fuzzy XML tags. The results of this paper show that the proposed method is able to support fuzzy queries with hypertext markup language. Manuscript profile
      • Open Access Article

        2 - improving intrusion detection systems by feature reducing based on genetics algorithm and data mining techniques
        Mehdi Keshavarzi hossein Momenzadeh
        The network-based computer systems play critical role in our modern society; so there is highly chance these systems might be target of intrusion and attacks. In order to implement full-scale security in a computer network, firewalls and other intrusion prevention mecha More
        The network-based computer systems play critical role in our modern society; so there is highly chance these systems might be target of intrusion and attacks. In order to implement full-scale security in a computer network, firewalls and other intrusion prevention mechanisms aren’t always enough and needs other systems called intrusion detection systems. An Intrusion detection system can be set of tools, algorithms and evidence that help to identify, locate and report illegal or not approved activities by the network. Intrusion detection systems can be established by software or hardware systems and each have their own advantages and disadvantages. Because of various characteristics of intrusion detection data, in this research we select effective characteristics using improved genetic algorithm. Then by means of standard data mining techniques, we present a model for data classification.For performance evaluation of this suggested method, we used NSL-KDD database that has more realistic records than other intrusion detection data.                                                                           Manuscript profile
      • Open Access Article

        3 - Introducing a new query database optimization method
        Peyman Arebi Amir Masoud Bidgoli Serajodin Katebi
        The grid database tries to store and scatter data over a wide geographical area in order to create a structure for storing data across the lattice environment in a distributed and heterogeneous manner. Due to the large amount of data, transaction processing in such an e More
        The grid database tries to store and scatter data over a wide geographical area in order to create a structure for storing data across the lattice environment in a distributed and heterogeneous manner. Due to the large amount of data, transaction processing in such an environment is very complex and time consuming. Obviously, using queries without optimization will greatly reduce the efficiency of transactions in this database, while using appropriate optimization algorithms can greatly increase efficiency. Many algorithms have been proposed to optimize queries, but due to the different network environments, different optimization algorithms are needed. This paper presents an algorithm that is consistent with the structure of lattice computing and works well in lattice database systems with high data volumes. Manuscript profile
      • Open Access Article

        4 - An Ensemble Classifier Method for Breast Cancer Detection Using Genetic Algorithm and Multistage Adjustment of Weights in the MLP Neural Network
        Amin Rezaeipanah S. J. Mirabedini ali mobaraki
        Today, with the increasing spread of science, the use of decision support systems can be of great help in the therapeutic policies of the Doctor. For this purpose, the use of artificial intelligence systems in predicting and diagnosing breast cancer, which is one of the More
        Today, with the increasing spread of science, the use of decision support systems can be of great help in the therapeutic policies of the Doctor. For this purpose, the use of artificial intelligence systems in predicting and diagnosing breast cancer, which is one of the most common cancers among women, is being considered. In this study, the process of diagnosis of breast cancer is done by using multistage weights in the MLP neural network in two layers. In the first layer, the three classifiers are trained simultaneously on the learning set data. Upon completion of the training, the output of the classifier of the first layer is accumulated together with the learning set data in the new sets. This set is given as an input to the second layer superconductor, and the supra-class mapping maps between the outputs of each of the ordinary classifiers of the first layer with the actual output classes. The three-layer structure of the first layer, as well as the second-layer supraclavicle, is a MLP neural network that optimizes the weights, effective properties and the size of the hidden layer simultaneously using an innovative genetic algorithm. In order to evaluate the accuracy of the proposed model, the Wisconsin database is used, which was created by the FNA test. Experiment results on the WBCD dataset the accuracy is 98.72% for the proposed method, which is relative to GAANN, CAFS algorithms provide better performance. Manuscript profile
      • Open Access Article

        5 - Using Ant Colony Algorithm and Pairwise Learning to Classify Attack in Intrusion Detection Systems
        Mohammad Ali Nadoomi Majid Sina
        Intrusion detection systems for security in computer networks have been proposed to be crossed if the attacker from other security equipment, able to detect it and prevent it from advancing. One of the challenges of these systems, it is high dimensional data. In this st More
        Intrusion detection systems for security in computer networks have been proposed to be crossed if the attacker from other security equipment, able to detect it and prevent it from advancing. One of the challenges of these systems, it is high dimensional data. In this study was to reduce the dimensions of a simple genetic algorithm with the length of the string variable we use. Then, according to selected characteristics, a meta-heuristic model for data classification, using ant colony algorithm offer. Classification model proposed by trying to divide the data into two samples is Hnjydh and Nahnjydh. The proposed method for evaluating the performance of database intrusion detection NSL-KDD than other data from the records of more realistic approach is used. The results of the experiments, the proposed method has better performance compared with other existing methods show. Manuscript profile
      • Open Access Article

        6 - Processing of exploration data in Zarshouran area, modeling of ore body and mineral resource estimation
        Arash Gourabjeiri pour Bahram Abolqasemi Alireza Najafi Mahnaz Taheri
        Zarshouran zone is located in South East of west Azerbayjan. From geological point of view this zone is a part ofAlborz-Azerbaijan zone and Precambrian hostrock forms the prevailing outcrop of Zarshouran zone which iscomposed of carbonates and acidic volcanic rocks to i More
        Zarshouran zone is located in South East of west Azerbayjan. From geological point of view this zone is a part ofAlborz-Azerbaijan zone and Precambrian hostrock forms the prevailing outcrop of Zarshouran zone which iscomposed of carbonates and acidic volcanic rocks to intermediate rocks. This sequence covered by sharpunconformity from red layers of Oligomiocene. The most important structure which effects in forming the oredeposit, is Imankhan anticline and the main structural features in Zarshouran ore deposit is ductile and brittlestructures and among these the main faults with the direction of North-West and South-East are probably inconnected with mineralization. Gold mineralization in this ore-deposit from different point of view is similar toepithermal mineralization in sedimentary rock especially in calcareous rocks (Carlin type gold deposit). Silicic,silicic argillic, sercitic-argillic and alunitic alteration are visible in the zone. The datas of different stages of thiszone have been gathered in GIS base and processed with Data mine Studio 3 software. At first 1427 geochemicalsamples were studied and the highest mineralization potential of the zone was specified and gold paragenesiseswere distinguished. Then based on drilled boreholes and statistical studies of datas sections and estimation spacewere specified and using the best method of estimation, ordinary kriging, and reservoir evaluation have beendone. Finally, based on different parts of mineral ore thicknesses and estimation error, the best drilling points forcomplementary survey of zone in the nets of 50,100,200 meters were specified. Manuscript profile
      • Open Access Article

        7 - A Database for use in Intelligent Personality Recognition System
        Vahid Ghods حوریه عربیان
        Graphology is the science of the study of personality and individual characteristics based on the handwriting. Aware of this knowledge can be used of great in society. In this paper, a database is introduced for graphology of Farsi handwriting and intelligent personalit More
        Graphology is the science of the study of personality and individual characteristics based on the handwriting. Aware of this knowledge can be used of great in society. In this paper, a database is introduced for graphology of Farsi handwriting and intelligent personality recognition.Database (including 140 samples of handwriting) was collected from two groups of students at the University of Applied Science and clients of Semnan prison. While getting an handwriting, participants were fill out personality inventory 71 questions MMPI in this study and 11 psychological parameters extracted from the questionnaire with each individual manuscript. The database can be used in research of Farsi handwriting graphology. Manuscript profile
      • Open Access Article

        8 - Speed Detection and Diagnosis of Symptoms by Using Color and Shape Information
        Hamed Hamidi Rad Hossein Pourghasem Homayoun Mahdavi-Nasab Ahmad Keshavarz
        Color and shape are basic characteristics which are used to recognize traffic signs. In this paper, a new speed limit sign detection method in various conditions is proposed. In this method, color image is segmented based on a thresholding technique in HSI color space. More
        Color and shape are basic characteristics which are used to recognize traffic signs. In this paper, a new speed limit sign detection method in various conditions is proposed. In this method, color image is segmented based on a thresholding technique in HSI color space. Then, corner features are detected using convolution masks and found the location of sign. The first advantage of this method is high accuracy to detect the location of sign. So, the object can be detected with 30% noise level, 30 meters for distances of signs, and  for rotated signs. The second advantage of the proposed method is high speed in sign detection. Utimately, the type of sign can be recognized with eliminate redundant information and match between extracted image and database image. If the illumination conditions be ideal, the recognition rate is obtained to 89%. Manuscript profile
      • Open Access Article

        9 - Modeling Of Irrigation and Drainage Networks with Remote Sensing and Gis (Case Study of Debye Sabili Area)
        ali afrous Ebrahim Nohani Hamid Behfar
        Underground water is one of the important sources of exploitation in arid and semi-arid regions. Therefore, in order to preserve the quality of groundwater, it is important to be aware of the local transmittal and temporal distribution of them. The purpose of this study More
        Underground water is one of the important sources of exploitation in arid and semi-arid regions. Therefore, in order to preserve the quality of groundwater, it is important to be aware of the local transmittal and temporal distribution of them. The purpose of this study was to investigate the local variations of groundwater quality in Sabili lands using interpolation method. Sabilly area is located in the north of Khuzestan province, north of Dezful city, which is under planting about 9100 hectares. After landing, reference and digitization of the map and data of the Sabilly area including meteorological parameters, groundwater quality in the area as well as soil science, geology and land classification, layers were created in the ArcCatalog layer. To prepare a variety of quality maps of the area, firstly, the wells studied by x and y (latitude and longitude) were created as points with qualitative information in the GIS software. Then, with the help of interpolation techniques (IDW), the quality maps of the region have been extracted. The results of groundwater quality zoning showed that TDS deviations from 160 mg / lit in the north of the area in al-Mahdi township to 1646 mg / lit in the east of the region in Sarbisheh village has changed.The amount of sodium and potassium in the Sarbisheh area is high and around the Gurpsifid is medium and the rest of the plain is low. The sodium absorption ratio (SAR) in the Sarbisheh area is high and around the Gurpsifid is medium and the rest of the plain is low. The results also showed that, in terms of the bicarbonate hazard of the region, is in the proper category for irrigation, Also the studied area was desirable for irrigation because of this place has been rich in calcium and magnesium. Manuscript profile
      • Open Access Article

        10 - Designing socio-economic database in GIS (a case study of Ardebil province)
        alireza estelaji
        Introduction   Capabilities of a database, information management and availability of data that is based on need. The purpose of this study design, data base analysis in GIS environment needs to be done. Data structure should be designed so that the logical connec More
        Introduction   Capabilities of a database, information management and availability of data that is based on need. The purpose of this study design, data base analysis in GIS environment needs to be done. Data structure should be designed so that the logical connection between the data maintained and based on the existing data management system can be implemented. Database of economic - social Ardebil in GIS (GIS) and its data model mapping (digital or Gallery) and the raster (image or cell) in the form of database software Arc GIS version 9.3 is stored. Research Methodology The aim of the study and application of methods and descriptive nature - is analytic. Results   Gallery of data containing location and descriptive data are included in the spatial data layers of national divisions, centers, layers, units politically, the country's international borders with Azerbaijan province, the province's streams and rivers, and the height of the curves, the road layer, inner layer of the lake, the cities and digital elevation model of Earth's layers, such as video, satellite images and maps of the province is scanned. The huge volume of spatial data in vector model in the form of a geographic database (GDB) have been entered into the GIS.   * Responsible Author:                                                                  a.estelaji@iausr.ac.ir                 Conclusion   The data types stored in the system, Location and a description and analysis of reports from various databases provided then Use them to help in planning and decision-makers need to be related to possible, This article has been cited in some of them.   Manuscript profile
      • Open Access Article

        11 - The role of operational risk events database in bank risk management
        Samane Shafiee Mohammad Hamed Khan Mohammadi Ahmad Karami Majid Ghoroghi
        Purpose: In order to manage operational risks as one of the most important risks of the banking system, it is important to create a comprehensive database of operational risk events. Therefore, the aim of the current research is to investigate the requirements and frame More
        Purpose: In order to manage operational risks as one of the most important risks of the banking system, it is important to create a comprehensive database of operational risk events. Therefore, the aim of the current research is to investigate the requirements and framework of creating such a database in order to prevent the occurrence of future harmful events and, as a result, manage operational risks.Methodology: First, the operational risk framework and the general definition of each of the blocks of the framework including internal and external loss data, risk self-assessment and control, scenario analysis and key risk indicators were presented. Then, the internal loss data was further investigated, and the legal requirements regarding the necessity of creating a comprehensive database of risk events to calculate the capital required to cover the operational risk were raised.Findings: Database of operational risk events in order to meet the bank's risk management goals, it should have certain characteristics such as comprehensiveness, threshold, type of event at two levels, the amount of gross loss of the event, indirect costs, amount savings, profit, opportunity cost, Be close to losses, accounting adjustments, date, cause and description, business lines, currency type and border risk. Also in any organization, business sector He is responsible for the risks associated with his activities. After aggregation, the mentioned risks are reported to the bank's board of directors for decision making.Originality / Value: Creating a comprehensive database of operational risk events in banks, while recognizing these events and adopting appropriate strategies to prevent these events from occurring in the future, leads to the accurate calculation of the amount required to cover operational risks and achieve capital adequacy goals. It is desired by the central bank. Manuscript profile