Pattern mining derives from the need of discovering hidden knowledge in very large amounts of data, regardless of the form in which it is presented. When it comes to Natural Language Processing (NLP), it arose along the humans' necessity... more
The problem of sequential pattern mining is one of the several that has deserved particular attention on the general area of data mining. Despite the important developments in the last years, the best algorithm in the area (PrefixSpan)... more
We propose a new cost function for neural network classification: the error density at the origin. This method provides a simple objective function that can be easily plugged in the usual backpropagation algorithm, giving a simple and... more
Social media platforms have become an important part of our daily lives due to the widespread use of the Internet. They contains a great wealth of valuable information which provide opportunities for us to explore hidden patterns or... more
Feature extraction process plays an important role in classifying radar target. The extracted features will be fed as the input to the classifier. The incorrect choice of extracted features will cause poor performance of radar... more
Safety is of utmost essence in the aviation sector, both on-ground and in the air. Aviation Turbine kerosene (ATK) commonly referred to as Jet fuel is one of the major resources of the aviation sector, contributing significantly to the... more
Most studies about writer identification are based on English documents and to our knowledge no research has been reported on Farsi or Arabic documents. In this paper, we have proposed a new method for off-line writer identification which... more
Periodic pattern mining is an emerging technique for knowledge discovery. Most previous approaches have aimed to find only those patterns that exhibit full (or perfect) periodic behavior in databases. Consequently, the existing approaches... more
Association rules are one of the most researched areas of data mining. This is useful in the marketing and retailing strategies. Association mining is to retrieval of a set of attributes shared with a large number of objects in a given... more
Contemporary technologies afford us the opportunity to augment and substitute traditional in-person classes with computer-based resources commonly known as virtual labs. Before the global pandemic, physical classrooms offered a hands-on... more
In this paper, we delve into the public discourse surrounding COVID-19 on Twitter to unearth the collective sentiments, concerns, and spread of information during the pandemic. By leveraging a dataset of relevant tweets and corresponding... more
As a context of biometrics, significant advances have been made in face recognition during the recent decades. Face recognition is one of the most successful applications of image analysis. The accuracy of automated face recognition is... more
The recent research of facial expression recognition has made a lot of progress due to the development of deep learning technologies, but some typical challenging problems such as the variety of rich facial expressions and poses are still... more
Many video-on-demand (VoD) providers leverage the benefits of cloud computing despite the stemming various security threats. For instance, if the hosted multimedia contents are not encrypted, then the VoD providers must fully trust that... more
The global need for effective disease diagnosis remains substantial, given the complexities of various disease mechanisms and diverse patient symptoms. To tackle these challenges, researchers, physicians, and patients are turning to... more
Association rules are one of the most researched areas of data mining. This is useful in the marketing and retailing strategies. Association mining is to retrieval of a set of attributes shared with a large number of objects in a given... more
Context: Recent research has used data mining to develop techniques that can guide developers through source code changes. To the best of our knowledge, very few studies have investigated data mining techniques and-or compared their... more
Context: Recent research has used data mining to develop techniques that can guide developers through source code changes. To the best of our knowledge, very few studies have investigated data mining techniques and-or compared their... more
Biometric-based personal verification is a powerful security feature. Biometric systems are used the physiological and/or behavioural characteristics in each individual for verification. Palmprint is a reliable biometric that can be used... more
This thesis proposes new approaches to the development of efficient and reliab intrusion detection systems and describes the development of a continuous case-based intrusion detection tool, called AutoGuard. To deal with the uncertainty... more
Minimum support and confidence have been used as criteria for generating association rules in all association rule mining algorithms. These criteria have their natural appeals, such as simplicity; few researchers have suspected the... more
In this paper an intrusion detection algorithm based on GP ensembles is proposed. The algorithm runs on a distributed hybrid multiisland model-based environment to monitor security-related activity within a network. Each island contains a... more
In recent years, Crowd Monitoring techniques have attracted emerging interest in the field of computer vision due to their ability to monitor groups of people in crowded areas, where conventional image processing methods would not... more
Contract Driven Development formalizes functional requirements within component contracts. The process aims to produce higher quality software, reduce quality assurance costs and improve reusability. However, the perceived complexity and... more
In his fascinating paper, "Comparing Timeline Rhythms in Pygmy and Bushmen Music," Adrian Poole offers a new perspective on an old debate regarding the historical significance of the many apparent affinities between African Bushmen and... more
In this paper, we propose a novel feature for palmprint recognition, called Discriminant Orientation Feature (DORIF) based on using Modified Finite Radon Transform (MFRAT) and Two Directional Two Dimensional Linear Discriminant Analysis... more
In today's world, data has become a valuable resource for businesses, governments, researchers, and individuals alike. However, to truly extract value from data, it is essential to provide the proper context. Simply collecting and... more
over the years, a variety of algorithms for finding frequent item sets in very large transaction databases have been developed. The problems of finding frequent item sets are basic in multi level association rule mining, fast algorithms... more
In this paper, we propose a novel feature for palmprint recognition, called Discriminant Orientation Feature (DORIF) based on using Modified Finite Radon Transform (MFRAT) and Two Directional Two Dimensional Linear Discriminant Analysis... more
The quick height in innovation has made information in plenty which has both required just as undesirable. So as to truncate the undesirable information and order, plentiful of data mining methods has been actualized. The primary... more
Facial affect analysis is perceived as one of themost complex and challenging areas for humanisation ofrobots. Several Facial Expression Recognition (FER)systems apply generic machine learning algorithms toextract facial features. This... more
• In this example, the minimum support is s min = 3 or σ min = 0.3 = 30%. • There are 2 5 = 32 possible item sets over B = {a, b, c, d, e}. • There are 16 frequent item sets (but only 10 transactions). Christian Borgelt Frequent Pattern... more
In this paper the usage of convolution neural networks has been considered for solving the problem of emotion recognition by images with facial expression. Emotion recognition is a complex task and the result of recognition is highly... more
Convolution Neural Network is one of the phenomenal formulations in the field of pattern recognition research, computer vision and image processing. It helped to facilitate many theories into real working models. One of them being Facial... more
Due to the voluminous amount of itemsets that are generated, the association rules extracted from these itemsets contain redundancy, and designing an effective approach to address this issue is of paramount importance. Although multiple... more
Facial expression recognition in a wild situation is a challenging problem in computer vision research due to different circumstances, such as pose dissimilarity, age, lighting conditions, occlusions, etc. Numerous methods, such as point... more
The paper includes research on discovering new methods for multilingual speech recognition and comparing the effectiveness of the existing solutions with the proposed novelty approaches. The audio and textual multilingual dataset contains... more
We describe an unsupervised host-based intrusion detection system based on system calls arguments and sequences. We define a set of anomaly detection models for the individual parameters of the call. We then describe a clustering process... more
In computer vision and image processing, object detection algorithms are used to detect semantic objects of certain classes of images and videos. Object detector algorithms use deep learning networks to classify detected regions.... more
An efficient reconfigurable cryptographic model for dynamic and secure unstructured data sharing in multi-cloud storage server,"
This paper proposes a kNN model-based feature selection method aimed at improving the efficiency and effectiveness of the ReliefF method by: (1) using a kNN model as the starter selection, aimed at choosing a set of more meaningful... more
This paper proposes a kNN model-based feature selection method aimed at improving the efficiency and effectiveness of the ReliefF method by: (1) using a kNN model as the starter selection, aimed at choosing a set of more meaningful... more
In this paper we address confidentiality issues in distributed data clustering, particularly the inference problem. We present KDEC-S algorithm for distributed data clustering, which is shown to provide mining results while preserving... more
Minimum support and confidence have been used as criteria for generating association rules in all association rule mining algorithms. These criteria have their natural appeals, such as simplicity; few researchers have suspected the... more
Mining generalized association rules among items in the presence of taxonomy and with nonuniform minimum support has been recognized as an important model in data mining. In our previous work, we have investigated this problem and... more
Safety is of utmost essence in the aviation sector, both on-ground and in the air. Aviation Turbine kerosene (ATK) commonly referred to as Jet fuel is one of the major resources of the aviation sector, contributing significantly to the... more
Digital libraries and intranets often include a wide mix of document types, ranging from cat- alog entries consisting entirely of metadata, to documents with both substantial text content and thorough metadata tagging, to documents with... more