Search Results - "Doroodchi, M M"

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Showing a Progress Bar While Executing Stored Procedures by Roudaki, A, Doroodchi, M M, Juan Li

    “…In this paper, we present a novel dynamic scheme to estimate the execution time of stored procedures inside the Database Management Systems (DBMS). Our…”
    Get full text
    Conference Proceeding
  2. 2

    Cramer-Rao lower bound on locations of sudden changes in a steplike signal by Reza, A.M., Doroodchi, M.

    Published in IEEE transactions on signal processing (01-10-1996)
    “…Estimation of locations of sudden changes in a steplike signal has many signal processing applications; e.g., well-log signal segmentation, ionic-channel…”
    Get full text
    Journal Article
  3. 3

    A new reasoning based filter by Doroodchi, M., Reza, A.M.

    “…A novel fuzzy filter is proposed. As recent studies show (Y. Choi and R. Krishnapuram, 1997), developing a rule based system capable of addressing all the…”
    Get full text
    Conference Proceeding
  4. 4

    Fuzzy cluster filter by Doroodchi, M., Reza, A.M.

    “…A generalized nonlinear filter called the fuzzy cluster filter is introduced. This filter applies fuzzy clustering inside a running-window to estimate the…”
    Get full text
    Conference Proceeding
  5. 5

    An expert system for nonlinear filtering by Doroodchi, M.

    “…Expert systems have been introduced into many different areas of engineering. The demand for introducing the human knowledge in solving complicated problems of…”
    Get full text
    Conference Proceeding
  6. 6

    New paradigm in evaluating usability of E-learning system by Nikmehr, N., Doroodchi, M.

    “…Most researchers and experts in human computer interaction (HCI) and e-learning areas evaluate the system usability primarily based on user interfaces without…”
    Get full text
    Conference Proceeding
  7. 7

    WDMES: a comprehensive measurement system for web application development by Mazinanian, D., Doroodchi, M., Hassany, M.

    “…Metric selection in software engineering could be a cumbersome and time-consuming task, and in particular, for web information system due to its inherent…”
    Get full text
    Conference Proceeding
  8. 8

    Interactive Software Development Using Workflow by Roudaki, A., Doroodchi, M.

    “…Workflow in interactive media and software development can be used to improve the development process as well as adding new features to the system as opposed…”
    Get full text
    Conference Proceeding
  9. 9

    Activity Based Costing Using Unified Modeling Methodology by Roudaki, A., Doroodchi, M.

    “…Activity based costing (ABC) can be integrated with Unified modeling methodology (UMM) to identify the required activities and further calculate the cost…”
    Get full text
    Conference Proceeding
  10. 10

    An investigation on integrating XML-based security into Web services by Doroodchi, M, Iranmehr, A, Pouriyeh, S A

    Published in 2009 5th IEEE GCC Conference & Exhibition (01-03-2009)
    “…Web services provide many benefits for developing Web applications based on SOA (Service Oriented Architecture). However, there are some open issues such as…”
    Get full text
    Conference Proceeding
  11. 11

    XML Security beyond XSLT by Farzaneh, K., Doroodchi, M.

    Published in 2006 Innovations in Information Technology (01-11-2006)
    “…Extensible Markup Language (XML) is the 'love-child" of the World Wide Web Consortium (W3C). XML is expected to facilitate Internet B2B messaging because of…”
    Get full text
    Conference Proceeding
  12. 12

    Implementation of fuzzy cluster filter for nonlinear signal and image processing by Doroodchi, M., Reza, A.M.

    “…A nonlinear filter known as fuzzy cluster filter (FCF) is introduced. This filter can be used for different signal and image processing applications. The…”
    Get full text
    Conference Proceeding
  13. 13

    Developing message-based trust model for Web applications by Sharifnia, M.B., Iranmehr, A., Doroodchi, M.

    “…The Web application security challenge is to understand and assess the risk involved in securing a Web service today, based on existing security technology,…”
    Get full text
    Conference Proceeding