9,972+ open-access research outputs.
Developing Question Answering systems (QA) is one of the main goals in Artificial Intelligence. With the advent of Deep Learning (DL) techniques, QA systems have witnessed significant advances. Althou…
Support Vector Machine (SVM) is a supervised machine learning algorithm, which is used for robust and accurate classification. Despite its advantages, its classification speed deteriorates due to its …
Data transformation is a laborious and time-consuming task for analysts. Programming by example (PBE) is a technique that can simplify this difficult task for data analysts by automatically generating…
Aircraft trajectory prediction is a challenging problem in air traffic control, especially for conflict detection. Traditional trajectory predictors require a variety of inputs such as flight-plans, a…
The naive Bayesian classification method has received significant attention in the field of supervised learning. This method has an unrealistic assumption in that it views all attributes as equally im…
Depth estimation from a single image is a challenging task, yet this field has a promising prospect in automatic driving and augmented reality. However, the prediction accuracy is degraded significant…
Network Intrusion Detection Systems (NIDSs) using pattern matching have a fatal weakness in that they cannot detect new attacks because they only learn existing patterns and use them to detect those a…
Visually impaired persons (VIPs) comprise a significant portion of the population, and they are present around the globe and in every part of the world. In recent times, technology proved its presence…
In this study, a framework for Android malware detection based on permissions is presented. This framework uses multiple linear regression methods. Application permissions, which are one of the most c…
In classification tasks, training labels are usually specified as one-hot targets which represent each class equally and exclusively. However, this labeling rule is not suitable in some situations. Fo…
A learning-based image relighting framework is proposed for automatically changing the lighting conditions of facial images from one lighting source to another. Given only a 2D unseen facial testing i…
The mild symptoms in Mild Cognitive Impairment (MCI), a precursor of dementia, often go unnoticed and are assumed as normal aging signs. Such negligence result in late visits which consequently, lead …
Physical servers are available as-a-service in bare-metal public and private cloud platforms, and their demand has been proliferating because of the high levels of privacy and security guarantees they…
Predicting heart disease is regarded as one of the most difficult challenges in the health-care profession. To predict cardiac disease, researchers employed a variety of algorithms including LDA, RF, …
In this paper, we present three methods to achieve reliable drillbit angular velocity control for deep drilling operations. We consider a multi-sectional drilling system with the bit off-bottom, which…
Building energy management has been recognized as of significant importance on improving the overall system efficiency and reducing the greenhouse gas emission. However, the building energy management…
The apparent tardiness cost (ATC) is a dispatching rule that demonstrates excellent performance in minimizing the total weighted tardiness (TWT) in single-machine scheduling. The ATC rule’s performanc…
Traditional denoising methods for seismic exploration data design a corresponding mathematical denoising model batch according to the different properties of different random noises, which is a tediou…
As the number of Internet of Things (IoT) devices and applications increases, the capacity of the IoT access networks is considerably stressed. This can create significant performance bottlenecks in v…
With an exponential increase in network traffic demands requiring quality of services, the need for routing optimization has become more prominent. Recently, the advent of software-defined networking …
Free open-access publishing with Google Scholar indexing.
Submission Guide →