The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Location-based queries have brought challenging privacy issues for mobile users. Having access to data, anytime from anywhere, raises many security concerns. One of these concerns is user's location privacy, where a user must reveal her location to get the desired result. The question is how to benefit from such queries without endangering user's location privacy. This paper presents a new method...
A protein is a long one-dimensional amino acid sequence. Some subsequences of this sequence are given names and β-strand in one such subsequence. β-strands are very common and two or more such strands within one protein can form a β-sheet in the secondary structure of proteins. In its natural form, a protein is a three-dimensional entity composed of β-sheets, α-helices, and other types of substructures...
In this study, we investigated the effects of mastering multiple scripts in handwritten character recognition by means of computational simulations. In particular, we trained a set of deep neural networks on two different datasets of handwritten characters: the HODA dataset, which is a collection of images of handwritten Persian digits, and the MNIST dataset, which contains Latin handwritten digits...
Growing demands for mobile services in recent years has extraordinary increased the number of cellular operators and consequently the portion of energy that is consumed by cellular networks. Hence, green cellular network has been introduced, which suggests the use of energy optimization methods in cellular networks. One of the solutions to optimize the energy consumption of cellular networks is to...
In this paper, an adaptive error concealment method is proposed to recover the motion vectors of degraded macroblocks (MBs) in a frame, based on analyzing the behavior of the MBs in the frames. In this method, the behavior of the degraded MB is first estimated considering the obtained information from motion vectors of neighboring MBs in the current frame and collocated MBs in the previous frames...
The study of network features is an important analysis method for the social networks, and prediction of network features is a research problem with many applications, particularly in decision making. In this paper, we propose a novel feature prediction method for temporal social networks, which estimates network measurements in the future based on a small window of measurements in the past. We utilized...
In many applications such as music transcription, audio forensics, and speech source separation, it is needed to decompose a mono recording into its respective sources. These techniques are usually referred to as blind source separation (BSS). One of the methods recently used in BSS is non-negative matrix factorization (NMF) both in supervised and unsupervised learning cases. In this paper, we propose...
Wireless sensor network (WSN) is an inexpensive newfound technology with many applications in various fields (such as biology Environment, war and natural disasters). A network consisting of a large number of sensor nodes and collecting information from the environment in a distributed environment. The main limitations include limited energy, low communication capacity, low storage volume, and low...
Massive multiple-input multiple-output (MIMO) is a promising technology for next generation wireless communication systems (5G). In this technology, Base Station (BS) is equipped with a large number of antennas. Employing high resolution analog-to-digital converters (ADCs) for all antennas may cause high costs and high power consumption for the BS. By performing numerical results, we evaluate the...
The number of users and amount of data transfer are increasing per each minute with the rapid growth of social network platforms on the web while the users have no certain knowledge of each other. Thus, with the overwhelming spread of the internet and such bulk of data, people find it arduous to identify valid comments. Establishing a genuine and more accurate trust becomes harder if classical processing...
An efficient numeral-based coding mechanism, called SDT-free is proposed in this paper that avoids crosstalk faults. The SDT-free coding mechanism completely removes bit patterns ‘11111’ and ‘00000’ which impose the worst crosstalk effects considering inductance effects. In this way, the coding mechanism improves the reliability of chip channels and offers invariant delay for channels. To minimize...
An emotion recognition method from the face images is proposed in this paper, which can recognize seven emotions of human, i.e., six basic expressions in addition to neutral. The proposed method uses the GLCM approach for feature extraction and the nearest neighbor (NN) for classification. The fuzzy Euclidean distance is used. GLCM provides the texture characteristics of an input image through the...
In the last few decades, many opinion formation models have been proposed to describe how opinion interactions among individuals result in different distributions of opinions within social systems. Emotion plays a key role when people try to influence others' opinions, but applying emotion to opinion formation models has attracted little attention. In this paper, we discuss how emotion can affect...
Deep Denoising Autoencoder (DDAE) is an effective method for noise reduction and speech enhancement. However, a single DDAE with a fixed number of frames for neural network input cannot extract contextual information sufficiently. It has also less generalization in unknown SNRs (signal-to-noise-ratio) and the enhanced output has some residual noise. In this paper, we use a modular model in which three...
Software fault prediction is one of the significant stages in the software testing process. At this stage, the probability of fault occurrence is predicted based on the documented information of the software systems that are already tested. Using this prior knowledge, developers and testing teams can better manage the testing process. There are many efforts in the field of machine learning to solve...
Convolutional Neural Networks (CNNs) are multi-layer deep structures that have been very successful in visual recognition tasks. These networks basically consist of the convolution, pooling, and the nonlinearity layers, each of which operates on the representation produced by the preceding layer and generates a new representation. Convolution layers naturally compute some inner product between a plane...
Nowadays Ransomwares are not limited to personal computers. Increasing the number of people accessing cell phones, availability of mobile phone application markets along with lack of an effective way for identifying Ransomwares have accelerated their growth and expansion in the field of mobile phones and IOT. In the following article, an optimal approach is presented that transforms the sequence of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.