Papers by mohammad mosleh
Arabian journal for science and engineering, Apr 24, 2019

one of the important challenges in grid is quality of service (QoS) for all the accepted users or... more one of the important challenges in grid is quality of service (QoS) for all the accepted users or applications, while increasing the utilization of resources through resource sharing. An effective resource management approach must guarantee the QoS and balance the load among grid nodes which are frequently highly dynamic and heterogeneous. Grid resources are commonly varied regarding their software and hardware formations. Collecting and supervision of these resources, and discovering appropriate resources is an important topic. So semantic can be very useful for resource discovery and resource selection. Fuzzy theory is another intelligent approach which shows uncertainty in Phenomena. In this paper, a novel approach, which is using semantic and fuzzy theory, is proposed to discover grid resource in Grid environment. Search expressiveness, efficiency and scalability, precision and also discover more related resources are the characteristics of the proposed framework.

Connected Word Recognition (CWR) is used in many applications such as voice-dialing telephone, au... more Connected Word Recognition (CWR) is used in many applications such as voice-dialing telephone, automatic data entry, automated banking systems and, etc. This paper presents a novel architecture for CWR based on synergic Hidden Markov Model (HMM) and Dynamic Time Warping (DTW). At first, the proposed architecture eliminates obvious silent times from inputted speech utterance by preprocessing operations. Then, in order to determine boundaries of the existing words in the compressed utterance, a set of candidates for boundary of each word is computed by using the existing capability of the HMM model. Finally, recognition operation is performed by using the synergic between HMM and DTW methods. The architecture has been compared with TLDP method from recognition accuracy and time complexity viewpoints. The evaluation results show that the proposed method significantly improves recognition accuracy and recognition time in comparison with the TLDP method.
Arabian Journal for Science and Engineering, 2019

Journal of Advances in Computer Research, Nov 1, 2014
Speaker verification is the process of accepting or rejecting claimed identity in terms of its so... more Speaker verification is the process of accepting or rejecting claimed identity in terms of its sound features. A speaker verification system can be used for numerous security systems, including bank account accessing, getting to security points, criminology and etc. When a speaker verification system wants to check the identity of individuals remotely, it confronts problems such as noise effect on speech signal and also identity falsification with speech synthesis. In this system, we have proposed a new speaker verification system based on Multi Model GMM, called SV-MMGMM, in which all speakers are divided into seven different age groups, and then an isolated GMM model for each group is created; instead of one model for all speakers. In order to evaluate, the proposed method has been compared with several speaker verification systems based on Naïve, SVM, Random Forest, Ensemble and basic GMM. Experimental results show that the proposed method has so better efficiency than others.
Journal of Software, 2014
Large-scale social networks emerged rapidly in recent years. Social networks have become complex ... more Large-scale social networks emerged rapidly in recent years. Social networks have become complex networks. The structure of social networks is an important research area and has attracted much scientific interest. Community is an important structure in social networks. In this paper, we propose a community detection algorithm based on influential nodes. First, we introduce how to find influential nodes based on random walk. Then we combine the algorithm with order statistics theory to find community structure. We apply our algorithm in three classical data sets and compare to other algorithms. Our community detection algorithm is proved to be effective in the experiments. Our algorithm also has applications in data mining and recommendations.
Physical Review E, 2013
Discovering overlapping community structures is a crucial step to understanding the structure and... more Discovering overlapping community structures is a crucial step to understanding the structure and dynamics of many networks. In this paper we develop a symmetric binary matrix factorization model (SBMF) to identify overlapping communities. Our model allows us not only to assign community memberships explicitly to nodes, but also to distinguish outliers from overlapping nodes. In addition, we propose a modified partition density to evaluate the quality of community structures. We use this to determine the most appropriate number of communities. We evaluate our methods using both synthetic benchmarks and real world networks, demonstrating the effectiveness of our approach.

The rapid growth and increasing of information technology and computer network have caused that d... more The rapid growth and increasing of information technology and computer network have caused that data transition in digital form is considered more and more. The main disturbance of owners and producers of digital products is to protect distribution and unauthorized copying. An effective solution for this problem is digital watermarking techniques. The purpose of audio digital watermarking is to insert a series of hidden information into audio file so that it is not heard and robust against signal processing attacks. This paper proposes a new audio watermarking method that is able to embed watermark sequence into host signal based on remaining numbers. The extraction process is carried out blindly without any knowledge about original audio signal. For comprehensive evaluation of the proposed method, several experiments including subjective and objective tests (MOS, SNR and SNRseg measures), robustness and performance (BER, NC, TP and FP measures) against Stirmark attacks as well as c...

Journal of Advances in Computer Engineering and Technology, May 15, 2015
With the explosive growth in amount of information, it is highly required to utilize tools and me... more With the explosive growth in amount of information, it is highly required to utilize tools and methods in order to search, filter and manage resources. One of the major problems in text classification relates to the high dimensional feature spaces. Therefore, the main goal of text classification is to reduce the dimensionality of features space. There are many feature selection methods. However, only a few methods are utilized for huge text classification problems. In this paper, we propose a new wrapper method based on Particle Swarm Optimization (PSO) algorithm and Support Vector Machine (SVM). We combine it with Learning Automata in order to make it more efficient. To evaluate the efficiency of the proposed method, we compare it with a method which selects features based on Genetic Algorithm over the Reuters-21578 dataset. The simulation results show that our proposed algorithm works more efficiently.

Journal of information systems and telecommunication, Apr 21, 2022
Digital watermarking is one of the best solutions for copyright infringement, copying, data verif... more Digital watermarking is one of the best solutions for copyright infringement, copying, data verification, and illegal distribution of digital media. Recently, the protection of digital audio signals has received much attention as one of the fascinating topics for researchers and scholars. In this paper, we presented a new high-capacity, clear, and robust audio signaling scheme based on the DWT conversion synergy and golden ratio advantages using the TLBO algorithm. We used the TLBO algorithm to determine the effective frame length and embedded range, and the golden ratio to determine the appropriate embedded locations for each frame. First, the main audio signal was broken down into several sub-bands using a DWT in a specific frequency range. Since the human auditory system is not sensitive to changes in high-frequency bands, to increase the clarity and capacity of these sub-bands to embed bits we used the watermark signal. Moreover, to increase the resistance to common attacks, we framed the high-frequency bandwidth and then used the average of the frames as a key value. Our main idea was to embed an 8-bit signal simultaneously in the host signal. Experimental results showed that the proposed method is free from significant noticeable distortion (SNR about 29.68dB) and increases the resistance to common signal processing attacks such as high pass filter, echo, resampling, MPEG (MP3), etc.

international journal of nano dimension, Feb 1, 2018
Physical limitations of Complementary Metal-Oxide-Semiconductors (CMOS) technology at nanoscale a... more Physical limitations of Complementary Metal-Oxide-Semiconductors (CMOS) technology at nanoscale and high cost of lithography have provided the platform for creating Quantum-dot Cellular Automata (QCA)based hardware. The QCA is a new technology that promises smaller, cheaper and faster electronic circuits, and has been regarded as an effective solution for scalability problems in CMOS technology. Therefore, it is possible to generalize QCA to all digital components. Multipliers are considered as one of the most important building blocks of computational circuits in digital processing systems. The traditional design of multipliers results in wasting the resources and increasing computational time. This paper presents an effective implementation of QCA parallel multiplier based on Wallace tree. It is able to significantly reduce the occupied area by reducing the number of QCA cells and therefore increases the speed of multiplying operation. The proposed QCA multiplier is simulated by QCADesigner2.0.3 software. The simulation results confirm that the proposed QCA multiplier works well and can be used in high performance circuits in QCA technology. Moreover, the proposed QCA multiplier has less complexity and occupied area compared to other QCA multiplier designs.

Global journal of computer science and technology, Apr 21, 2012
The cryptography is known as one of most essential ways for protecting information against threat... more The cryptography is known as one of most essential ways for protecting information against threats. Among all encryption algorithms, stream ciphering can be indicated as a sample of swift ways for this purpose, in which, a generator is applied to produce a sequence of bits as the key stream. Although this sequence is seems to be random, severely, it contains a pattern that repeats periodically. Linear Feedback Shift Registers and cellular automata have been used as pseudo-random number generator. Some challenges such as error propagation and pattern dependability have motivated the designers to use CA for this purpose. The most important issue in using cellular automata includes determining an optimal set of rules for cells. This paper focuses on selecting optimal rules set for such this generator with using an open cellular learning automata, which is a cellular automata with learning capability and interacts with local and global environments.

Digital watermarking is one of the best solutions again the copyright infringement, duplicates, v... more Digital watermarking is one of the best solutions again the copyright infringement, duplicates, verifies data and illegal distribution of digital media. Recently, the protection of digital audio signals is one of the attracting and interesting topics for scientific and researchers. In this paper we propose a blind audio watermarking mechanism in which it has high capacity, transparency and resistance simultaneously based on digital wavelet transform (DWT) algorithm. The key principle of this work is that in the DWT procedure, using two filters; break down the original audio signal into several sub-bands and transform them on a specific frequency range. It should be noted that the 8 bits of watermarked signal is selected and transform to the original signal. In order to increase the watermarking resistance, framing the high frequency coefficients of the third level of the wavelet and calculate the frames average and place them in the frame memory prime. Moreover, TLBO algorithm used ...

Moving towards nanometer scales, Quantum-dot Cellular Automata (QCA) technology emerged as a nove... more Moving towards nanometer scales, Quantum-dot Cellular Automata (QCA) technology emerged as a novel solution, which can be a suitable replacement for complementary metal-oxide-semiconductor (CMOS) technology. The 3-input majority function and inverter gate are fundamental gates in the QCA technology, which all logical functions are produced based on them. Like CMOS technology, making the basic computational element such as an adder with QCA technology, is considered as one of the most important issues that extensive research have been done about it. In this paper, a new QCA full-adder based on coupled majority-minority and 5-input majority gates is introduced which its novel structure, appropriate design technique selection and its arrangement make it very suitable. The experimental results showed that the proposed QCA full-adder makes only 48 cells and the first output is obtained in the 0.05clock. Therefore, the presented QCA full-adder improves the number of cells and gains a spee...

The Journal of Supercomputing, 2021
In this manuscript, we first suggest a single-layer 2:1 QCA MUX with an ultralow number of cells ... more In this manuscript, we first suggest a single-layer 2:1 QCA MUX with an ultralow number of cells and high speed. Unlike existing designs, the output of the proposed design does not comply with the Boolean regulation and is produced using the essential characteristics of quantum technology. Single-layer 4:1 and 8:1 QCA multiplexers have also been implemented. Moreover, using the proposed 2:1 QCA MUX, a novel and efficient QCA RAM memory cell with the set and reset abilities has been proposed. Forasmuch as the most significant challenge in quantum-dot cellular automata circuit design is the number of cell counts and occupied area. The proposed 2:1 QCA MUX includes 10 cells and an occupied area of 0.03. The unique advantage of the proposed design over all previous output generation tasks is based on cellular interactions. Our findings showed that the proposed 2:1 QCA MUX has a 16.66% and 60% improvement in terms of cell count and occupied area, respectively. In order to confirm the function of the proposed design, some physical proofs are presented. The software for implement of the circuits and their power analysis are QCADesigner 2.0.3 and QCAPro, respectively. The results of the comparisons indicate that the proposed structures are more efficient than the existing ones. The QCAPro power analysis tool has been used for analyzing the power consumption of the proposed designs.

international journal of nano dimension, 2018
Physical limitations of Complementary Metal-Oxide-Semiconductors (CMOS) technology at nanoscale a... more Physical limitations of Complementary Metal-Oxide-Semiconductors (CMOS) technology at nanoscale and high cost of lithography have provided the platform for creating Quantum-dot Cellular Automata (QCA)-based hardware. The QCA is a new technology that promises smaller, cheaper and faster electronic circuits, and has been regarded as an effective solution for scalability problems in CMOS technology. Therefore, it is possible to generalize QCA to all digital components. Multipliers are considered as one of the most important building blocks of computational circuits in digital processing systems. The traditional design of multipliers results in wasting the resources and increasing computational time. This paper presents an effective implementation of QCA parallel multiplier based on Wallace tree. It is able to significantly reduce the occupied area by reducing the number of QCA cells and therefore increases the speed of multiplying operation. The proposed QCA multiplier is simulated by ...

Grid computing is the next generation of distributed system. Its goal is to create a huge, indepe... more Grid computing is the next generation of distributed system. Its goal is to create a huge, independent and powerful virtual machine, and it has been created by gathering different machines with the aim of sharing them. Resource discovery is the most fundamental phase of resource management which has been considered in our work. Considering the advantages and disadvantages of P2P and grid and their architectural similarity; using some of P2P approaches as a solution in Grid can improve the performance of Grid. Semantic technology and fuzzy logic are the two intelligent approaches, which recently apply on P2P network and Grid environment. In P2P networks, nodes are grouping based on their interests. Moreover semantic can be very useful for grouping nodes. This paper follows the identification of resource discovery in grid environment with the help of semantic and fuzzy theory and seeking to present a resource discovery algorithm with respect to exiting obstacles. The proposed approach...
Optical and Quantum Electronics, 2021
Quantum-dot Cellular Automata (QCA) technology is believed to be a good alternative to CMOS techn... more Quantum-dot Cellular Automata (QCA) technology is believed to be a good alternative to CMOS technology. This nanoscale technology can provide a platform for design and implementation of high performance and power e cient logic circuits. However, the fabrication of QCA circuits is susceptible to faults appearing in this form of missing cells, additional cells, rotated cells, and displaced cells. Over the years, several solutions have been proposed to address these problems. This paper presents a new solution for improving the fault tolerance of three input majority gate. The proposed majority gate is then used to design 2-1 multiplexer and 4-1 multiplexer. The proposed designs are implemented in QCA Designer. Simulation results demonstrate signi cant improvements in terms of fault tolerance and area requirement.

A Review on Cellular Automata Based Bit Error Correcting Codes
International Journal of Computer Science and Network Solutions, 2014
In recent years, large volumes of data are transferred between a computer system and various subs... more In recent years, large volumes of data are transferred between a computer system and various subsystems through digital logic circuits and interconnected wires. And there always exist potential errors when data are transferred due to electrical noise, device malfunction, or even timing errors. In general, parity checking circuits are usually employed for detection of single-bit errors. However, it is not sufficient to enhance system reliability and availability for efficient error detection and necessary to detect and further correct errors up to a certain level within the affordable cost. To handle a large number of information bits, the associated circuits become quite complex and irregular on the other the CA’s circuit structure having simple, regular and modular propertiesis amenable for VLSI implementation.The purpose of this paper is investigateen coding and decodingof bit error correction methods using the properties of CA. The results show that these schemesarepossible to correct errors by the easy and fast analysis of syndrome.

The cryptography is known as one of most essential ways for protecting information against threat... more The cryptography is known as one of most essential ways for protecting information against threats. Among all encryption algorithms, stream ciphering can be indicated as a sample of swift ways for this purpose, in which, a generator is applied to produce a sequence of bits as the key stream. Although this sequence is seems to be random, severely, it contains a pattern that repeats periodically. Linear Feedback Shift Registers and cellular automata have been used as pseudo-random number generator. Some challenges such as error propagation and pattern dependability have motivated the designers to use CA for this purpose. The most important issue in using cellular automata includes determining an optimal set of rules for cells. This paper focuses on selecting optimal rules set for such this generator with using an open cellular learning automata, which is a cellular automata with learning capability and interacts with local and global environments.
Uploads
Papers by mohammad mosleh