Asadollah Shahbahrami
YOU?
Author Swipe
View article: Suicide ideation detection based on documents dimensionality expansion
Suicide ideation detection based on documents dimensionality expansion Open
Accurate and secure classifying informal documents related to mental disorders is challenging due to factors such as informal language, noisy data, cultural differences, personal information and mixed emotions. Conventional deep learning m…
View article: Deep Learning Based Image Aesthetic Quality Assessment- A Review
Deep Learning Based Image Aesthetic Quality Assessment- A Review Open
Image Aesthetic Quality Assessment (IAQA) spans applications such as the fashion industry, AI-generated content, product design, and e-commerce. Recent deep learning advancements have been employed to evaluate image aesthetic quality. A fe…
View article: Persian/Arabic Scene Text Recognition With Convolutional Recurrent Neural Network
Persian/Arabic Scene Text Recognition With Convolutional Recurrent Neural Network Open
With advancements in technology, natural scene text recognition (STR) has become a critical yet challenging field due to variations in fonts, colours, textures, illumination, and complex backgrounds. This research study focuses on optical …
View article: Evaluating impact of different factors on electric vehicle charging demand
Evaluating impact of different factors on electric vehicle charging demand Open
Electric vehicles (EVs) are emerging as major energy consumers, offering numerous environmental and operational advantages such as reduced greenhouse gas emissions and lower reliance on fossil fuels. As the adoption of EVs accelerates glob…
View article: Pedestrian Detection in Low-Light Conditions: A Comprehensive Survey
Pedestrian Detection in Low-Light Conditions: A Comprehensive Survey Open
Pedestrian detection remains a critical problem in various domains, such as\ncomputer vision, surveillance, and autonomous driving. In particular, accurate\nand instant detection of pedestrians in low-light conditions and reduced\nvisibili…
View article: A Cost-Sensitive Machine Learning Model With Multitask Learning for Intrusion Detection in IoT
A Cost-Sensitive Machine Learning Model With Multitask Learning for Intrusion Detection in IoT Open
A problem with machine learning (ML) techniques for detecting intrusions in the Internet of Things (IoT) is that they are ineffective in the detection of low-frequency intrusions. In addition, as ML models are trained using specific attack…
View article: An edge-aided parallel evolutionary privacy-preserving algorithm for Internet of Things
An edge-aided parallel evolutionary privacy-preserving algorithm for Internet of Things Open
Data sanitization in the context of Internet of Things (IoT) privacy refers to the process of permanently and irreversibly hiding all sensitive information from vast amounts of streaming data. Taking into account the dynamic and real-time …
View article: Performance Evaluation of Matrix-Matrix Multiplication using Parallel Programming Models on CPU Platforms
Performance Evaluation of Matrix-Matrix Multiplication using Parallel Programming Models on CPU Platforms Open
Today’s hardware platforms have parallel processing capabilities and many parallel programming models have been developed. It is necessary to research an efficient implementation of compute-intensive applications using available platforms.…
View article: Matrix-matrix multiplication on graphics processing unit platform using tiling technique
Matrix-matrix multiplication on graphics processing unit platform using tiling technique Open
Today’s hardware platforms have parallel processing capabilities and many parallel programming models have been developed. It is necessary to research an efficient implementation of compute-intensive applications using available platforms.…
View article: Non-distortion-specific no-reference Image Quality Assessment using Statistical Features
Non-distortion-specific no-reference Image Quality Assessment using Statistical Features Open
Objective Image Quality Assessment (IQA) algorithms are divided into three categories according to the availability of the reference image and the amount of information available in the assessment, namely, algorithms with Full Reference (F…
View article: Iranis: A Large-scale Dataset of Iranian Vehicles License Plate Characters
Iranis: A Large-scale Dataset of Iranian Vehicles License Plate Characters Open
Providing huge amounts of data is a fundamental demand when dealing with Deep\nNeural Networks (DNNs). Employing these algorithms to solve computer vision\nproblems resulted in the advent of various image datasets to feed the most\ncommon …
View article: Remote Patient Monitoring and classifying Using the Internet of Things Platform Combined with Cloud Computing
Remote Patient Monitoring and classifying Using the Internet of Things Platform Combined with Cloud Computing Open
Patients' health and providing an optimal and appropriate solution have recently been considered by many researchers. With the advent of technologies such as cloud computing and 5G network, information can be exchanged faster and more secu…
View article: Copy-move forgery detection using convolutional neural network and K-mean clustering
Copy-move forgery detection using convolutional neural network and K-mean clustering Open
Copying and pasting a patch of an image to hide or exaggerate something in a digital image is known as a copy-move forgery. Copy-move forgery detection (CMFD) is hard to detect because the copied part image from a scene has similar propert…
View article: Facial expression recognition using a combination of enhanced local binary pattern and pyramid histogram of oriented gradients features extraction
Facial expression recognition using a combination of enhanced local binary pattern and pyramid histogram of oriented gradients features extraction Open
Automatic facial expression recognition, which has many applications such as drivers, patients, and criminals' emotions recognition, is a challenging task. This is due to the variety of individuals and facial expression variability in diff…
View article: An unsupervised approach for traffic motion patterns extraction
An unsupervised approach for traffic motion patterns extraction Open
Automatic analysis, understanding typical activities, and identifying vehicle behaviour in crowded traffic scenes are fundamental and challenging tasks for traffic video surveillance. Some recent researches have been using machine learning…
View article: Features' value range approach to enhance the throughput of texture classification
Features' value range approach to enhance the throughput of texture classification Open
The definition of an image's category from a database with huge texture categories needs massive computation and time cost. Existing texture classification works focus on texture representation to improve the accuracy and efficiency of cla…
View article: A Robust Deep Learning Approach for Automatic Iranian Vehicle License Plate Detection and Recognition for Surveillance Systems
A Robust Deep Learning Approach for Automatic Iranian Vehicle License Plate Detection and Recognition for Surveillance Systems Open
The process of detecting vehicles’ license plates, along with recognizing the characters inside them, has always been a challenging issue due to various conditions. These conditions include different weather and illumination, inevitable da…
View article: Parallel Implementation of a Video-based Vehicle Speed Measurement System for Municipal Roadways
Parallel Implementation of a Video-based Vehicle Speed Measurement System for Municipal Roadways Open
Nowadays, Intelligent Transportation Systems (ITS) are known as powerful solutions for handling traffic-related issues.ITS are used in various applications such as traffic signal control, vehicle counting, and automatic license plate detec…
View article: Development of a Data Mining System for Subscriber Classification (Case Study: Electricity Distribution Company)
Development of a Data Mining System for Subscriber Classification (Case Study: Electricity Distribution Company) Open
Currently, organizations and companies tend to provide customers with good and suitable services in accordance with their interests and behaviors. Thus, the better the customers are classified, the better the services provided will be. Dat…
View article: Motion-based Vehicle Speed Measurement for Intelligent Transportation Systems
Motion-based Vehicle Speed Measurement for Intelligent Transportation Systems Open
Video-based vehicle speed measurement systems are known as effective applications for Intelligent Transportation Systems (ITS) due to their great development capabilities and low costs.These systems utilize camera outputs to apply video pr…
View article: Target Tracking Based on Virtual Grid in Wireless Sensor Networks
Target Tracking Based on Virtual Grid in Wireless Sensor Networks Open
One of the most important and typical application of wireless sensor networks (WSNs) is target tracking. Although target tracking, can provide benefits for large-scale WSNs and organize them into clusters but tracking a moving target in cl…