Search Results - "2017 7th International Conference on Computer and Knowledge Engineering (ICCKE)"

Refine Results
  1. 1

    A survey on digital evidence collection and analysis by Soltani, Somayeh, Seno, Seyed Amin Hosseini

    “…The growth of digital technologies results in the growth of digital crimes. Digital forensics aims to collect crime-related evidence from various digital media…”
    Get full text
    Conference Proceeding
  2. 2

    Fast fingerprinting based indoor localization by Wi-Fi signals by Alikhani, Nasim, Amirinanloo, Shima, Moghtadaiee, Vahideh, Ghorashi, Seyed Ali

    “…Indoor localization is vital for location based services as well as security purposes. Wireless local area network (WLAN) positioning systems based on…”
    Get full text
    Conference Proceeding
  3. 3

    Pre-training of an artificial neural network for software fault prediction by Owhadi-Kareshk, Moein, Sedaghat, Yasser, Akbarzadeh-T., Mohammad-R.

    “…Software fault prediction is one of the significant stages in the software testing process. At this stage, the probability of fault occurrence is predicted…”
    Get full text
    Conference Proceeding
  4. 4

    BER performance of uplink massive MIMO with low-resolution ADCs by Azizzadeh, Azad, Mohammadkhani, Reza, Makki, Seyed Vahab Al-Din

    “…Massive multiple-input multiple-output (MIMO) is a promising technology for next generation wireless communication systems (5G). In this technology, Base…”
    Get full text
    Conference Proceeding
  5. 5

    Sentiment analysis on Twitter using McDiarmid tree algorithm by Rezaei, Zahra, Jalali, Mehrdad

    “…In recent years advent of social networking services has created large amounts of data. Microblogging website is a kind of social network in which users share…”
    Get full text
    Conference Proceeding
  6. 6

    Android ransomware detection using reduced opcode sequence and image similarity by Karimi, Alireza, Moattar, Mohammad Hosein

    “…Nowadays Ransomwares are not limited to personal computers. Increasing the number of people accessing cell phones, availability of mobile phone application…”
    Get full text
    Conference Proceeding
  7. 7

    Bitcoin, an SWOT analysis by Mirzayi, Sahar, Mehrzad, Mohammad

    “…In the year 2009, a new virtual currency called Bitcoin was introduced to the world. Bitcoin generation and transactions are based on hashes and asymmetric…”
    Get full text
    Conference Proceeding
  8. 8

    Outlier robust fuzzy active learning method (ALM) by Klidbary, Sajad Haghzad, Shouraki, Saeed Bagheri, Ghaffari, Aboozar, Kourabbaslou, Soroush Sheikhpour

    “…Active Learning Method (ALM) is a fuzzy learning method and is inspired by the approach of human's brain toward understanding complicated problems. In this…”
    Get full text
    Conference Proceeding
  9. 9

    Golden years, golden shores: A study of elders in online travel communities by Balcerzak, Bartlomiej, Nielek, Radoslaw

    “…In this paper we present our exploratory findings related to extracting knowledge and experiences from a community of senior tourists. By using tools of…”
    Get full text
    Conference Proceeding
  10. 10

    A comparative analysis of classification algorithms in diabetic retinopathy screening by Mohammadian, Saboora, Karsaz, Ali, Roshan, Yaser M.

    “…Automated screening of diabetic retinopathy plays an important role in diagnosis of the disease in early stages and preventing blindness in patients with…”
    Get full text
    Conference Proceeding
  11. 11

    Residential power consumption forecasting in the smart grid using ANFIS system by Nokar, Mahmoud Abbasi, Tashtarian, Farzad, Moghaddam, Mohammad Hossein Yaghmaee

    “…This paper offers a form of filtration based on moving average filter and KNN imputation method, for pre-processing hourly electricity load data for Short-Term…”
    Get full text
    Conference Proceeding
  12. 12

    VLAG: A very fast locality approximation model for GPU kernels with regular access patterns by Kiani, Mohsen, Rajabzadeh, Amir

    “…Performance modeling plays an important role for optimal hardware design and optimized application implementation. This paper presents a very low overhead…”
    Get full text
    Conference Proceeding
  13. 13

    SDT-free: An efficient crosstalk avoidance coding mechanism considering inductance effects by Shirmohammadi, Zahra, Miremadi, Seyed Ghassem

    “…An efficient numeral-based coding mechanism, called SDT-free is proposed in this paper that avoids crosstalk faults. The SDT-free coding mechanism completely…”
    Get full text
    Conference Proceeding
  14. 14

    Characterization of schizophrenia by linear kernel canonical correlation analysis of resting-state functional MRI and structural MRI by Mirjalili, Mina, Hossein-Zadeh, Gholam-Ali

    “…In almost every mental disorder, there are deficiencies in both structure and function of the brain. So the need for analyzing complementary modalities that…”
    Get full text
    Conference Proceeding
  15. 15

    Toward an emotional opinion formation model through agent-based modeling by Mansouri, Alireza, Taghiyareh, Fattaneh

    “…In the last few decades, many opinion formation models have been proposed to describe how opinion interactions among individuals result in different…”
    Get full text
    Conference Proceeding
  16. 16

    Diagnosis of Coronary Artery Disease using Cuckoo Search and genetic algorithm in single photon emision computed tomography images by Samadiani, Najmeh, Moameri, Saeed

    “…Coronary Artery Disease (CAD) is a kind of cardiovascular disease and a heart attack is the first sign of CAD. Cardiac SPECT is one of the efficient methods to…”
    Get full text
    Conference Proceeding
  17. 17

    A reinforcement learning approach to score goals in RoboCup 3D soccer simulation for nao humanoid robot by Fahami, Mohammad Amin, Roshanzamir, Mohamad, Izadi, Navid Hoseini

    “…Reinforcement learning is one of the best methods to train autonomous robots. Using this method, a robot can learn to make optimal decisions without detailed…”
    Get full text
    Conference Proceeding
  18. 18

    Enhancing trust accuracy among online social network users utilizing data text mining techniques in apache spark by Adib, Pezhman, Nezarat, Amin, Alirezazadeh, Saeid

    “…The number of users and amount of data transfer are increasing per each minute with the rapid growth of social network platforms on the web while the users…”
    Get full text
    Conference Proceeding
  19. 19

    GLCM features and fuzzy nearest neighbor classifier for emotion recognition from face by Imani, Maryam, Montazer, Gholam Ali

    “…An emotion recognition method from the face images is proposed in this paper, which can recognize seven emotions of human, i.e., six basic expressions in…”
    Get full text
    Conference Proceeding
  20. 20

    Semi-supervised approach for Persian word sense disambiguation by Mahmoodvand, Mohamadreza, Hourali, Maryam

    “…Word-sense disambiguation is one of the key concepts in natural language processing. The main goal of a language is to present a specific concept to the…”
    Get full text
    Conference Proceeding