Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2024
Prize-Collecting Steiner Tree: A 1.79 Approximation
STOC 2024: Proceedings of the 56th Annual ACM Symposium on Theory of ComputingPages 1641–1652https://doi.org/10.1145/3618260.3649789Prize-Collecting Steiner Tree (PCST) is a generalization of the Steiner Tree problem, a fundamental problem in computer science. In the classic Steiner Tree problem, we aim to connect a set of vertices known as terminals using the minimum-weight tree in ...
- research-articleOctober 2023
Fraud detection in financial statements using data mining and GAN models
Expert Systems with Applications: An International Journal (EXWA), Volume 227, Issue Chttps://doi.org/10.1016/j.eswa.2023.120144AbstractFinancial statements are analytical reports published periodically by financial institutions explaining their performance from different perspectives. As these reports are the fundamental source for decision-making by many stakeholders,...
- research-articleMay 2023
Improving loss function for deep convolutional neural network applied in automatic image annotation
The Visual Computer: International Journal of Computer Graphics (VISC), Volume 40, Issue 3Pages 1617–1629https://doi.org/10.1007/s00371-023-02873-3AbstractAutomatic image annotation (AIA) is a mechanism for describing the visual content of an image with a list of semantic labels. Typically, there is a massive imbalance between positive and negative tags in a picture—in other words, an image includes ...
- research-articleFebruary 2023
TET: Text emotion transfer
AbstractText style transfer aims at transforming the style of a piece of text while keeping its primary content. The style of the text is usually defined as a particular writing tone in different categories, such as formality, politeness, sentiment, and ...
- research-articleJuly 2022
Word embedding for mixed-emotions analysis
Journal of Intelligent Information Systems (JIIS), Volume 60, Issue 1Pages 49–72https://doi.org/10.1007/s10844-022-00720-wAbstractWord embedding is the process of converting words into vectors of real numbers which is of great interest in natural language processing. Recently, the performance of word embedding models has been the subject of some studies in emotion analysis. ...
-
- research-articleJune 2022
Efficient approximations for cache-conscious data placement
PLDI 2022: Proceedings of the 43rd ACM SIGPLAN International Conference on Programming Language Design and ImplementationPages 857–871https://doi.org/10.1145/3519939.3523436There is a huge and growing gap between the speed of accesses to data stored in main memory vs cache. Thus, cache misses account for a significant portion of runtime overhead in virtually every program and minimizing them has been an active research ...
- research-articleMarch 2022
TraitLWNet: a novel predictor of personality trait by analyzing Persian handwriting based on lightweight deep convolutional neural network
Multimedia Tools and Applications (MTAA), Volume 81, Issue 8Pages 10673–10693https://doi.org/10.1007/s11042-022-12295-3AbstractBased on psychologists’ theories, an individual’s handwriting somehow symbolizes a type of personality trait that can be a projection of the person’s innate. A person’s handwriting is the result of an organized system and has scientific bases that ...
- research-articleMarch 2021
A part-level learning strategy for JPEG image recompression detection
Multimedia Tools and Applications (MTAA), Volume 80, Issue 8Pages 12235–12247https://doi.org/10.1007/s11042-020-10200-4AbstractRecompression is a prevalent form of multimedia content manipulation. Different approaches have been developed to detect this kind of alteration for digital images of well-known JPEG format. However, they are either limited in performance or ...
- articleFebruary 2019
Distributed task allocation in multi-agent environments using cellular learning automata
Soft Computing - A Fusion of Foundations, Methodologies and Applications (SOFC), Volume 23, Issue 4Pages 1199–1218https://doi.org/10.1007/s00500-017-2839-5People's safety is threatened by the repetition of critical events. Many people lose their lives due to unprofessional rescue operation as well as time pressure of the rescue operation. A key problem in urban search and rescue teams, considering the ...
- research-articleJanuary 2018
SW: a blind LSBR image steganalysis technique
ICCMS '18: Proceedings of the 10th International Conference on Computer Modeling and SimulationPages 14–18https://doi.org/10.1145/3177457.3177488Blind image steganalysis is exploring body of digital images for the likely presence of hidden secret messages without knowledge of the employed steganographic technique. This paper proposes a novel image steganalysis technique to attack spatial domain ...
- articleMarch 2017
A novel forensic image analysis tool for discovering double JPEG compression clues
Multimedia Tools and Applications (MTAA), Volume 76, Issue 6Pages 7749–7783https://doi.org/10.1007/s11042-016-3409-zThis paper presents a novel technique to discover double JPEG compression traces. Existing detectors only operate in a scenario that the image under investigation is explicitly available in JPEG format. Consequently, if quantization information of JPEG ...
- research-articleNovember 2016
A machine learning approach to fab-of-origin attestation
2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)Pages 1–6https://doi.org/10.1145/2966986.2966992We introduce a machine learning approach for distinguishing between integrated circuits fabricated in a ratified facility and circuits originating from an unknown or undesired source based on parametric measurements. Unlike earlier approaches, which seek ...
- research-articleMay 2016
Harnessing fabrication process signature for predicting yield across designs
2016 IEEE International Symposium on Circuits and Systems (ISCAS)Pages 898–901https://doi.org/10.1109/ISCAS.2016.7527386Yield estimation is an indispensable piece of information at the onset of high-volume manufacturing (HVM) of a device. The increasing demand for faster time-to-market and for designs with growing quality requirements and complexity, requires a quick and ...
- articleMarch 2016
Quantization-Unaware Double JPEG Compression Detection
Journal of Mathematical Imaging and Vision (JMIV), Volume 54, Issue 3Pages 269–286https://doi.org/10.1007/s10851-015-0602-zThe current double JPEG compression detection techniques identify whether or not an JPEG image file has undergone the compression twice, by knowing its embedded quantization table. This paper addresses another forensic scenario in which the quantization ...
- tutorialNovember 2015
Yield Forecasting in Fab-to-Fab Production Migration Based on Bayesian Model Fusion
Yield estimation is an indispensable piece of information at the onset of high-volume production of a device. It can be used to refine the process/design in time so as to guarantee high production yield. In the case of migration of production of a ...
- research-articleNovember 2015
Yield forecasting in fab-to-fab production migration based on Bayesian Model Fusion
2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)Pages 9–14https://doi.org/10.1109/ICCAD.2015.7372543Yield estimation is an indispensable piece of information at the onset of high-volume production of a device. It can be used to refine the process/design in time so as to guarantee high production yield. In the case of migration of production of a ...
- articleDecember 2014
An improved Differential Evolution algorithm using learning automata and population topologies
Applied Intelligence (KLU-APIN), Volume 41, Issue 4Pages 1150–1169https://doi.org/10.1007/s10489-014-0585-2A new variant of Differential Evolution (DE), called ADE-Grid, is presented in this paper which adapts the mutation strategy, crossover rate (CR) and scale factor (F) during the run. In ADE-Grid, learning automata (LA), which are powerful decision ...
- articleMay 2014
An efficient routing algorithm to preserve $$k$$k-coverage in wireless sensor networks
The Journal of Supercomputing (JSCO), Volume 68, Issue 2Pages 599–623https://doi.org/10.1007/s11227-013-1054-0One of the major challenges in the area of wireless sensor networks is simultaneously reducing energy consumption and increasing network lifetime. Efficient routing algorithms have received considerable attention in previous studies for achieving the ...
- articleJanuary 2014
To evaluate the application of alkoxide sol-gel method in fabrication of 3YSZ-MWCNTs nanocomposites, in an attempt to improve its mechanical properties
Journal of Nanomaterials (NANO), Volume 2014Article No.: 189, Page 189https://doi.org/10.1155/2014/867367In the present research work, fabrication of YSZ-CNTs composite system through alkoxide sol-gel processing was evaluated, in an attempt to improve its mechanical properties. Nanocomposites containing 0.5-2 wt% MWCNTs were then fabricated through the ...
- articleMay 2013
Architectural design and implementation of intelligent embodied conversational agents using fuzzy knowledge base
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 25, Issue 3Pages 811–823In this paper, a general architecture is proposed for developing embodied conversational agents with fuzzy ontology knowledge base. The proposed architecture enables agents to interact with the user via multimodal channels in a virtual reality ...