Search Results - "Zargham, Mehdi"
-
1
3D Face Reconstruction from Front and Profile Images for Low Computational Devices
Published in 2021 International Conference on Computational Science and Computational Intelligence (CSCI) (01-12-2021)“…This Face reconstruction in three dimension (3D) is a difficult and advanced problem for computer vision, and our goal is to accomplish it in an efficient way…”
Get full text
Conference Proceeding -
2
Vulnerability Scrying Method for Software Vulnerability Discovery Prediction Without a Vulnerability Database
Published in IEEE transactions on reliability (01-06-2013)“…Predicting software vulnerability discovery trends can help improve secure deployment of software applications and facilitate backup provisioning, disaster…”
Get full text
Journal Article -
3
A Perspective on the Future of Higher Education
Published in 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE) (24-07-2023)“…With the rapid advances in AI technology, it is becoming essential for higher education institutions to invest in significant reform over the next 10 to 20…”
Get full text
Conference Proceeding -
4
Analysis of the security of VPN configurations in industrial control environments
Published in International journal of critical infrastructure protection (01-03-2012)“…Virtual private networks (VPNs) are a popular approach for protecting otherwise insecure industrial control protocols. VPNs provide confidentiality, integrity…”
Get full text
Journal Article -
5
Real-Time Vector Quantization and Clustering Based on Ordinary Differential Equations
Published in IEEE transactions on neural networks (01-12-2011)“…This brief presents a dynamical system approach to vector quantization or clustering based on ordinary differential equations with the potential for real-time…”
Get full text
Journal Article -
6
-
7
Toward a paradigm for distributed intelligence
Published in Applied intelligence (Dordrecht, Netherlands) (01-05-1992)Get full text
Journal Article -
8
A self-organizing map and its modeling for discovering malignant network traffic
Published in 2009 IEEE Symposium on Computational Intelligence in Cyber Security (01-03-2009)“…Model-based intrusion detection and knowledge discovery are combined to cluster and classify P2P botnet traffic and other malignant network activity by using a…”
Get full text
Conference Proceeding -
9
Fast Fusion of Medical Images Based on Bayesian Risk Minimization and Pixon Map
Published in 2009 International Conference on Computational Science and Engineering (01-08-2009)“…Fast fusion of multiple registered out-of-focus images is of great interest in medical imaging; for example, the thoracic cavity is always too bumpy to be…”
Get full text
Conference Proceeding -
10
An Efficient Compression Method for Multiplanar Reformulated Biomedical Images
Published in 2007 IEEE 7th International Symposium on BioInformatics and BioEngineering (01-01-2007)“…Multiplanar reformatting (MPR) of 3D biomedical images is an important technique in visualizing, editing, and interacting with volumetric data. To obtain near…”
Get full text
Conference Proceeding Journal Article -
11
Parallel channel routing
Published in Proceedings of the 25th ACM/IEEE Design Automation Conference (01-06-1988)“…A parallel algorithm is proposed for solving the problem of channel and switchbox routing in the design of VLSI chips. The algorithm is suitable for…”
Get full text
Conference Proceeding -
12
Parallel channel routing
Published in Annual ACM IEEE Design Automation Conference: Proceedings of the 25th ACM/IEEE conference on Design automation; 12-15 June 1988 (01-06-1988)“…A parallel algorithm is proposed for solving the problem of channel and switchbox routing in the design of VLSI chips. The algorithm is suitable for…”
Get full text
Conference Proceeding -
13
A Web-based information system for stock selection and evaluation
Published in Proceedings of International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems. (Cat. No.PR00334) (1999)“…We have developed an expert system, called PORSEL (PORtfolio SELection system), which uses an effective set of rules to select and evaluate stocks on the…”
Get full text
Conference Proceeding -
14
A high-level tool for parallel program development
Published in [1991] Proceedings The Fifteenth Annual International Computer Software & Applications Conference (1991)“…A software tool is described for the design and implementation of parallel programs. The approach utilizes the STRAND concurrent programming language…”
Get full text
Conference Proceeding