Search Results - "Doroodchi, M M"
-
1
Showing a Progress Bar While Executing Stored Procedures
Published in 2011 44th Hawaii International Conference on System Sciences (01-01-2011)“…In this paper, we present a novel dynamic scheme to estimate the execution time of stored procedures inside the Database Management Systems (DBMS). Our…”
Get full text
Conference Proceeding -
2
Cramer-Rao lower bound on locations of sudden changes in a steplike signal
Published in IEEE transactions on signal processing (01-10-1996)“…Estimation of locations of sudden changes in a steplike signal has many signal processing applications; e.g., well-log signal segmentation, ionic-channel…”
Get full text
Journal Article -
3
A new reasoning based filter
“…A novel fuzzy filter is proposed. As recent studies show (Y. Choi and R. Krishnapuram, 1997), developing a rule based system capable of addressing all the…”
Get full text
Conference Proceeding -
4
Fuzzy cluster filter
Published in Proceedings of 3rd IEEE International Conference on Image Processing (1996)“…A generalized nonlinear filter called the fuzzy cluster filter is introduced. This filter applies fuzzy clustering inside a running-window to estimate the…”
Get full text
Conference Proceeding -
5
An expert system for nonlinear filtering
Published in 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation (1997)“…Expert systems have been introduced into many different areas of engineering. The demand for introducing the human knowledge in solving complicated problems of…”
Get full text
Conference Proceeding -
6
New paradigm in evaluating usability of E-learning system
Published in 2008 International Conference on Innovations in Information Technology (01-12-2008)“…Most researchers and experts in human computer interaction (HCI) and e-learning areas evaluate the system usability primarily based on user interfaces without…”
Get full text
Conference Proceeding -
7
WDMES: a comprehensive measurement system for web application development
Published in 2012 6th Euro American Conference on Telematics and Information Systems (EATIS) (23-05-2012)“…Metric selection in software engineering could be a cumbersome and time-consuming task, and in particular, for web information system due to its inherent…”
Get full text
Conference Proceeding -
8
Interactive Software Development Using Workflow
Published in 2009 International Conference on Future Computer and Communication (01-04-2009)“…Workflow in interactive media and software development can be used to improve the development process as well as adding new features to the system as opposed…”
Get full text
Conference Proceeding -
9
Activity Based Costing Using Unified Modeling Methodology
Published in 2009 International Conference on Information Management and Engineering (01-04-2009)“…Activity based costing (ABC) can be integrated with Unified modeling methodology (UMM) to identify the required activities and further calculate the cost…”
Get full text
Conference Proceeding -
10
An investigation on integrating XML-based security into Web services
Published in 2009 5th IEEE GCC Conference & Exhibition (01-03-2009)“…Web services provide many benefits for developing Web applications based on SOA (Service Oriented Architecture). However, there are some open issues such as…”
Get full text
Conference Proceeding -
11
XML Security beyond XSLT
Published in 2006 Innovations in Information Technology (01-11-2006)“…Extensible Markup Language (XML) is the 'love-child" of the World Wide Web Consortium (W3C). XML is expected to facilitate Internet B2B messaging because of…”
Get full text
Conference Proceeding -
12
Implementation of fuzzy cluster filter for nonlinear signal and image processing
Published in Proceedings of IEEE 5th International Fuzzy Systems (1996)“…A nonlinear filter known as fuzzy cluster filter (FCF) is introduced. This filter can be used for different signal and image processing applications. The…”
Get full text
Conference Proceeding -
13
Developing message-based trust model for Web applications
Published in 2008 International Conference on Innovations in Information Technology (01-12-2008)“…The Web application security challenge is to understand and assess the risk involved in securing a Web service today, based on existing security technology,…”
Get full text
Conference Proceeding