Search Results - "Raahemi, Bijan"

Refine Results
  1. 1

    Intelligent Fraud Detection in Financial Statements Using Machine Learning and Data Mining: A Systematic Literature Review by Ashtiani, Matin N., Raahemi, Bijan

    Published in IEEE access (01-01-2022)
    “…Fraudulent financial statements (FFS) are the results of manipulating financial elements by overvaluing incomes, assets, sales, and profits while underrating…”
    Get full text
    Journal Article
  2. 2

    Bio-Inspired Feature Selection Algorithms With Their Applications: A Systematic Literature Review by Pham, Tin H., Raahemi, Bijan

    Published in IEEE access (2023)
    “…Based on the principles of the biological evolution of nature, bio-inspired algorithms are gaining popularity in developing robust techniques for optimization…”
    Get full text
    Journal Article
  3. 3

    Multi-Layer Web Services Discovery Using Word Embedding and Clustering Techniques by J. Obidallah, Waeal, Raahemi, Bijan, Rashideh, Waleed

    Published in Data (Basel) (01-05-2022)
    “…We propose a multi-layer data mining architecture for web services discovery using word embedding and clustering techniques to improve the web service…”
    Get full text
    Journal Article
  4. 4

    Financial fraud detection using graph neural networks: A systematic review by Motie, Soroor, Raahemi, Bijan

    Published in Expert systems with applications (15-04-2024)
    “…Financial fraud is a persistent problem in the finance industry that may have severe consequences for individuals, businesses, and economies. Graph Neural…”
    Get full text
    Journal Article
  5. 5

    News-based intelligent prediction of financial markets using text mining and machine learning: A systematic literature review by Ashtiani, Matin N., Raahemi, Bijan

    Published in Expert systems with applications (01-05-2023)
    “…Researchers and practitioners have attempted to predict the financial market by analyzing textual (e.g., news articles and social media) and numeric data…”
    Get full text
    Journal Article
  6. 6

    Detecting financial restatements using data mining techniques by Dutta, Ila, Dutta, Shantanu, Raahemi, Bijan

    Published in Expert systems with applications (30-12-2017)
    “…•Both intentional and unintentional restatements may destroy shareholders value.•Financial restatements (intentional/unintentional) detection models are…”
    Get full text
    Journal Article
  7. 7

    A dynamic feature selection and intelligent model serving for hybrid batch-stream processing by Pishgoo, Boshra, Azirani, Ahmad Akbari, Raahemi, Bijan

    Published in Knowledge-based systems (28-11-2022)
    “…The increasing complexity of real-world applications, especially those related to the Internet of Things and cloud computing, highlights the importance of…”
    Get full text
    Journal Article
  8. 8

    A hybrid distributed batch-stream processing approach for anomaly detection by Pishgoo, Boshra, Akbari Azirani, Ahmad, Raahemi, Bijan

    Published in Information sciences (08-01-2021)
    “…Batch and stream processing are separately and efficiently applied in many applications. However, some newer data-driven applications such as the Internet of…”
    Get full text
    Journal Article
  9. 9

    Incremental anomaly detection using two-layer cluster-based structure by Bigdeli, Elnaz, Mohammadi, Mahdi, Raahemi, Bijan, Matwin, Stan

    Published in Information sciences (01-03-2018)
    “…Anomaly detection algorithms face several challenges, including processing speed, adapting to changes in dynamic environments, and dealing with noise in data…”
    Get full text
    Journal Article
  10. 10

    Modeling the speed-based vessel schedule recovery problem using evolutionary multiobjective optimization by Cheraghchi, Fatemeh, Abualhaol, Ibrahim, Falcon, Rafael, Abielmona, Rami, Raahemi, Bijan, Petriu, Emil

    Published in Information sciences (01-06-2018)
    “…•Model a speed-based VSRP (S-VSRP) as an MOO problem with two conflicting objectives: total delay and total financial loss.•Synthetically generate a set of…”
    Get full text
    Journal Article
  11. 11

    A new density-based subspace selection method using mutual information for high dimensional outlier detection by Riahi-Madvar, Mahboobeh, Akbari Azirani, Ahmad, Nasersharif, Babak, Raahemi, Bijan

    Published in Knowledge-based systems (15-03-2021)
    “…Outlier detection in high dimensional data faces the challenge of curse of dimensionality, where irrelevant features may prevent detection of outliers. In this…”
    Get full text
    Journal Article
  12. 12

    Subspace-based outlier detection using linear programming and heuristic techniques by Riahi-Madvar, Mahboobeh, Akbari Azirani, Ahmad, Nasersharif, Babak, Raahemi, Bijan

    Published in Expert systems with applications (30-11-2022)
    “…A useful strategy to perform outlier detection (OD) in highdimensional data, especially in the presence of multiple classes of outliers, is to decompose the…”
    Get full text
    Journal Article
  13. 13

    Knowledge sharing in dynamic virtual enterprises: A socio-technological perspective by Liu, Pingfeng, Raahemi, Bijan, Benyoucef, Morad

    Published in Knowledge-based systems (01-04-2011)
    “…The success of a virtual enterprise depends largely on the effective collaboration of its members in orchestrating their knowledge, skills, core competences…”
    Get full text
    Journal Article
  14. 14

    Data mining EEG signals in depression for their diagnostic value by Mohammadi, Mahdi, Al-Azab, Fadwa, Raahemi, Bijan, Richards, Gregory, Jaworska, Natalia, Smith, Dylan, de la Salle, Sara, Blier, Pierre, Knott, Verner

    “…Quantitative electroencephalogram (EEG) is one neuroimaging technique that has been shown to differentiate patients with major depressive disorder (MDD) and…”
    Get full text
    Journal Article
  15. 15

    A fast and noise resilient cluster-based anomaly detection by Bigdeli, Elnaz, Mohammadi, Mahdi, Raahemi, Bijan, Matwin, Stan

    Published in Pattern analysis and applications : PAA (01-02-2017)
    “…Clustering, while systematically applied in anomaly detection, has a direct impact on the accuracy of the detection methods. Existing cluster-based anomaly…”
    Get full text
    Journal Article
  16. 16

    Improving linear discriminant analysis with artificial immune system-based evolutionary algorithms by Mohammadi, Mehdi, Raahemi, Bijan, Akbari, Ahmad, Nassersharif, Babak, Moeinzadeh, Hossein

    Published in Information sciences (15-04-2012)
    “…Mapping techniques based on the linear discriminant analysis face challenges when the class distribution is not Gaussian. While using evolutionary algorithms…”
    Get full text
    Journal Article
  17. 17

    Analysis of Quality of Services in LTE and Mobile WiMAX by Roodaki, Maryam, Raahemifar, Kaamran, Raahemi, Bijan

    Published in Computers & electrical engineering (01-07-2014)
    “…Third Generation Partnership Project Long Term Evolution (3GPP LTE) and Worldwide Interoperability for Microwave Access (WiMAX) face challenges in providing…”
    Get full text
    Journal Article
  18. 18

    Classifying peer-to-peer applications using imbalanced concept-adapting very fast decision tree on IP data stream by Zhong, Weicai, Raahemi, Bijan, Liu, Jing

    Published in Peer-to-peer networking and applications (01-09-2013)
    “…Peer-to-Peer (P2P) applications generate streaming data in large volumes, where new communities of peers regularly attend and existing communities of peers…”
    Get full text
    Journal Article
  19. 19

    Genetic-based minimum classification error mapping for accurate identifying Peer-to-Peer applications in the internet traffic by Mohammadi, Mehdi, Raahemi, Bijan, Akbari, Ahmad, Moeinzadeh, Hossein, Nasersharif, Babak

    Published in Expert systems with applications (01-06-2011)
    “…► In this study, a hybrid approach using genetic algorithm and neural networks to classify Peer-to-Peer traffic is proposed. ► We first compute the minimum…”
    Get full text
    Journal Article
  20. 20

    Feature engineering for detection of Denial of Service attacks in session initiation protocol by Asgharian, Hassan, Akbari, Ahmad, Raahemi, Bijan

    Published in Security and communication networks (25-05-2015)
    “…The Session Initiation Protocol (SIP) is a text‐based protocol, which defines the messaging between the SIP entities to establish, maintain, and terminate a…”
    Get full text
    Journal Article