Search Results - "Raahemi, Bijan"
-
1
Intelligent Fraud Detection in Financial Statements Using Machine Learning and Data Mining: A Systematic Literature Review
Published in IEEE access (01-01-2022)“…Fraudulent financial statements (FFS) are the results of manipulating financial elements by overvaluing incomes, assets, sales, and profits while underrating…”
Get full text
Journal Article -
2
Bio-Inspired Feature Selection Algorithms With Their Applications: A Systematic Literature Review
Published in IEEE access (2023)“…Based on the principles of the biological evolution of nature, bio-inspired algorithms are gaining popularity in developing robust techniques for optimization…”
Get full text
Journal Article -
3
Multi-Layer Web Services Discovery Using Word Embedding and Clustering Techniques
Published in Data (Basel) (01-05-2022)“…We propose a multi-layer data mining architecture for web services discovery using word embedding and clustering techniques to improve the web service…”
Get full text
Journal Article -
4
Financial fraud detection using graph neural networks: A systematic review
Published in Expert systems with applications (15-04-2024)“…Financial fraud is a persistent problem in the finance industry that may have severe consequences for individuals, businesses, and economies. Graph Neural…”
Get full text
Journal Article -
5
News-based intelligent prediction of financial markets using text mining and machine learning: A systematic literature review
Published in Expert systems with applications (01-05-2023)“…Researchers and practitioners have attempted to predict the financial market by analyzing textual (e.g., news articles and social media) and numeric data…”
Get full text
Journal Article -
6
Detecting financial restatements using data mining techniques
Published in Expert systems with applications (30-12-2017)“…•Both intentional and unintentional restatements may destroy shareholders value.•Financial restatements (intentional/unintentional) detection models are…”
Get full text
Journal Article -
7
A dynamic feature selection and intelligent model serving for hybrid batch-stream processing
Published in Knowledge-based systems (28-11-2022)“…The increasing complexity of real-world applications, especially those related to the Internet of Things and cloud computing, highlights the importance of…”
Get full text
Journal Article -
8
A hybrid distributed batch-stream processing approach for anomaly detection
Published in Information sciences (08-01-2021)“…Batch and stream processing are separately and efficiently applied in many applications. However, some newer data-driven applications such as the Internet of…”
Get full text
Journal Article -
9
Incremental anomaly detection using two-layer cluster-based structure
Published in Information sciences (01-03-2018)“…Anomaly detection algorithms face several challenges, including processing speed, adapting to changes in dynamic environments, and dealing with noise in data…”
Get full text
Journal Article -
10
Modeling the speed-based vessel schedule recovery problem using evolutionary multiobjective optimization
Published in Information sciences (01-06-2018)“…•Model a speed-based VSRP (S-VSRP) as an MOO problem with two conflicting objectives: total delay and total financial loss.•Synthetically generate a set of…”
Get full text
Journal Article -
11
A new density-based subspace selection method using mutual information for high dimensional outlier detection
Published in Knowledge-based systems (15-03-2021)“…Outlier detection in high dimensional data faces the challenge of curse of dimensionality, where irrelevant features may prevent detection of outliers. In this…”
Get full text
Journal Article -
12
Subspace-based outlier detection using linear programming and heuristic techniques
Published in Expert systems with applications (30-11-2022)“…A useful strategy to perform outlier detection (OD) in highdimensional data, especially in the presence of multiple classes of outliers, is to decompose the…”
Get full text
Journal Article -
13
Knowledge sharing in dynamic virtual enterprises: A socio-technological perspective
Published in Knowledge-based systems (01-04-2011)“…The success of a virtual enterprise depends largely on the effective collaboration of its members in orchestrating their knowledge, skills, core competences…”
Get full text
Journal Article -
14
Data mining EEG signals in depression for their diagnostic value
Published in BMC medical informatics and decision making (23-12-2015)“…Quantitative electroencephalogram (EEG) is one neuroimaging technique that has been shown to differentiate patients with major depressive disorder (MDD) and…”
Get full text
Journal Article -
15
A fast and noise resilient cluster-based anomaly detection
Published in Pattern analysis and applications : PAA (01-02-2017)“…Clustering, while systematically applied in anomaly detection, has a direct impact on the accuracy of the detection methods. Existing cluster-based anomaly…”
Get full text
Journal Article -
16
Improving linear discriminant analysis with artificial immune system-based evolutionary algorithms
Published in Information sciences (15-04-2012)“…Mapping techniques based on the linear discriminant analysis face challenges when the class distribution is not Gaussian. While using evolutionary algorithms…”
Get full text
Journal Article -
17
Analysis of Quality of Services in LTE and Mobile WiMAX
Published in Computers & electrical engineering (01-07-2014)“…Third Generation Partnership Project Long Term Evolution (3GPP LTE) and Worldwide Interoperability for Microwave Access (WiMAX) face challenges in providing…”
Get full text
Journal Article -
18
Classifying peer-to-peer applications using imbalanced concept-adapting very fast decision tree on IP data stream
Published in Peer-to-peer networking and applications (01-09-2013)“…Peer-to-Peer (P2P) applications generate streaming data in large volumes, where new communities of peers regularly attend and existing communities of peers…”
Get full text
Journal Article -
19
Genetic-based minimum classification error mapping for accurate identifying Peer-to-Peer applications in the internet traffic
Published in Expert systems with applications (01-06-2011)“…► In this study, a hybrid approach using genetic algorithm and neural networks to classify Peer-to-Peer traffic is proposed. ► We first compute the minimum…”
Get full text
Journal Article -
20
Feature engineering for detection of Denial of Service attacks in session initiation protocol
Published in Security and communication networks (25-05-2015)“…The Session Initiation Protocol (SIP) is a text‐based protocol, which defines the messaging between the SIP entities to establish, maintain, and terminate a…”
Get full text
Journal Article