Original Research Paper
1. An Improvement over Random Early Detection Algorithm: A Self-Tuning Approach

S. Jamali; N. Alipasandi; B. Alipasandi

Volume 2, Issue 2 , Summer and Autumn 2014, Pages 57-61


  Random Early Detection (RED) is one of the most commonly used Active Queue Management (AQM) algorithms that is recommended by IETF for deployment in the network. Although RED provides low average queuing delay and high throughput at the same time, but effectiveness of RED is highly sensitive to the RED ...  Read More

Original Research Paper
2. Bidding Strategy in Spot Markets with Definition of a New Market Power Index by Using Conjectural Variation

M. Hafezi_Nasab; M. Rashidinejad; A. Abdollahi; I. Taheri

Volume 2, Issue 2 , Summer and Autumn 2014, Pages 63-68


  In this paper, the concept of Conjectural Variation (CV) is used to specify optimal generation decision for generation companies (Gencos). The conjecture of Genco is defined as its belief or expectation about the reaction of rivals to change of its output. Using CV method, each Genco has to learn and ...  Read More

Original Research Paper
3. A New Method for Sperm Detection in Infertility Cure: Hypothesis Testing Based on Fuzzy Entropy Decision

S.V. Shojaedini; M. Heydari

Volume 2, Issue 2 , Summer and Autumn 2014, Pages 69-76


  In this paper, a new method is introduced for sperm detection in microscopic images for infertility treatment. In this method, firstly a hypothesis testing function is defined to separate sperms from plasma, non-sperm semen particles and noise. Then, some primary candidates are selected for sperms by ...  Read More

Original Research Paper
4. Facial Expression Recognition Based on Anatomical Structure of Human Face

S. Mohseni; G. Ardeshir; N. Zarei

Volume 2, Issue 2 , Summer and Autumn 2014, Pages 77-83


  Automatic analysis of human facial expressions is one of the challenging problems in machine vision systems. It has many applications in human-computer interactions such as, social signal processing, social robots, deceit detection, interactive video and behavior monitoring. In this paper, we develop ...  Read More

Original Research Paper
5. Security Analysis of the Distance Bounding Protocol Proposed by Jannati and Falahati

F. Baghernejad; N. Bagheri; M. Safkhani

Volume 2, Issue 2 , Summer and Autumn 2014, Pages 85-92


  In this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by Jannati and Falahati (so-called JF). We prove that an adversary can recover key bits of JF protocol with probability of “1” while the complexity of attack is “2n” runs of ...  Read More

Original Research Paper
6. UWB Mixer improvement with Regulated Voltage Source

B. Shojaei Tabatabaei; P. Amiri

Volume 2, Issue 2 , Summer and Autumn 2014, Pages 93-99


  This paper presents a design of an UWB downconversion integrated CMOS resistive ring mixer with Linear Voltage Regulator (LVR), to supply required biasing voltages for the mixer section. The designed mixer circuit has been optimized for using in heart rate extraction system with microwave Doppler radar ...  Read More