
Convolutional Relational Machine for Group Activity Recognition
We present an endtoend deep Convolutional Neural Network called Convol...
read it

Pontogammarus Maeoticus Swarm Optimization: A Metaheuristic Optimization Algorithm
Nowadays, metaheuristic optimization algorithms are used to find the glo...
read it

Unsupervised Hypergraph Feature Selection via a Novel PointWeighting Framework and LowRank Representation
Feature selection methods are widely used in order to solve the 'curse o...
read it

A Deep Decoder Structure Based on WordEmbedding Regression for An EncoderDecoder Based Model for Image Captioning
Generating textual descriptions for images has been an attractive proble...
read it

Training Neural Networks Based on Imperialist Competitive Algorithm for Predicting Earthquake Intensity
In this study we determined neural network weights and biases by Imperia...
read it

Convolutional Neural Networks for Histopathology Image Classification: Training vs. Using PreTrained Networks
We explore the problem of classification within a medical image dataset...
read it

A Novel LowComplexity Framework in UltraWideband Imaging for Breast Cancer Detection
In this research work, a novel framework is pro posed as an efficient s...
read it

SourceSensitive Belief Change
The AGM model is the most remarkable framework for modeling belief revis...
read it

Deep Belief Networks for Image Denoising
Deep Belief Networks which are hierarchical generative models are effect...
read it

Distinction between features extracted using deep belief networks
Data representation is an important preprocessing step in many machine ...
read it

Sparse Estimation with Generalized Beta Mixture and the Horseshoe Prior
In this paper, the use of the Generalized Beta Mixture (GBM) and Horsesh...
read it

GraphBased SemiSupervised Conditional Random Fields For Spoken Language Understanding Using Unaligned Data
We experiment graphbased SemiSupervised Learning (SSL) of Conditional ...
read it

Largest and Smallest Area Triangles on a Given Set of Imprecise Points
In this paper we study the following problem: we are given a set of impr...
read it

Fast Fréchet Distance Between Curves With Long Edges
Computing Fréchet distance between two curves takes roughly quadratic ti...
read it

Multiphase Aluminum A356 Foam Formation Process Simulation Using Lattice Boltzmann Method
ShanChen model is a numerical scheme to simulate multiphase fluid flows...
read it

Guarding Path Polygons with Orthogonal Visibility
We are interested in the problem of guarding simple orthogonal polygons ...
read it

Minimum Hidden Guarding of Histogram Polygons
A hidden guard set G is a set of point guards in polygon P that all ...
read it

Characterization of Multiscale Invariant Random Fields
Applying certain flexible geometric sampling of a multiscale invariant ...
read it

A Lineartime Algorithm for Orthogonal Watchman Route Problem with Minimum Bends
Given an orthogonal polygon P with n vertices, the goal of the watch...
read it

Geometric Embedding of Path and Cycle Graphs in Pseudoconvex Polygons
Given a graph G with n vertices and a set S of n points in the p...
read it

Performance Analysis of Joint Pairing and Mode Selection in D2D Communications with FD Radios
In cellularD2D networks, users can select the communication mode either...
read it

Scalable and Robust Sparse Subspace Clustering Using Randomized Clustering and Multilayer Graphs
Sparse subspace clustering (SSC) is one of the current stateoftheart ...
read it

Markov Switch Smooth Transition HYGARCH Model: Stability and Estimation
HYGARCH model is basically used to model longrange dependence in volati...
read it

Continuoustime GARCH process driven by semiLévy process
In this paper we study the simple semiLévy driven continuoustime gener...
read it

wARPPath: Implications of adapting the Ethernetbased ARPPath bridging protocol to a wireless environment
The ARPPath protocol has flourished as a promise for wired networks, cr...
read it

On TimeVarying Amplitude HGARCH Mode
The HGARCH model allows longmemory impact in volatilities. A new HGARCH...
read it

Efficient Search of QCLDPC Codes with Girths 6 and 8 and Free of Elementary Trapping Sets with Small Size
One of the phenomena that influences significantly the performance of lo...
read it

An Optimal Algorithm for Computing the Visibility Area of a Polygon from a Point Using ConstantMemory
Given a simple polygon P of n vertices in the Plane. We study the prob...
read it

A New Optimal Algorithm for Computing the Visibility Area of a simple Polygon from a Viewpoint
Given a simple polygon P of n vertices in the Plane. We study the pr...
read it

Efficient Search of Compact QCLDPC and SCLDPC Convolutional Codes with Large Girth
We propose a lowcomplexity method to find quasicyclic lowdensity pari...
read it

A Neural Network Lattice Decoding Algorithm
Neural network decoding algorithms are recently introduced by Nachmani e...
read it

An upper bound for minmax angle of polygons
Let S be a set of points in the plane, CH be the convex hull of S, (S) b...
read it

UltraDense 5G Small Cell Deployment for Fiber and Wireless BackhaulAware Infrastructures
In this paper, we study the cell planning problem for a twotier cellula...
read it

Edge Coloring Technique to Remove Small Elementary Trapping Sets from Tanner Graph of QCLDPC Codes with Column Weight 4
One of the phenomena that causes high decoding failure rates is trapping...
read it

Secure transmission with covert requirement in untrusted relaying networks
In this paper, we study the problem of secure transmission with covert r...
read it

MobilityAware Resource Allocation in VLC Networks Using TStep LookAhead Policy
Visible light communication (VLC) uses huge licensefree spectral bandwi...
read it

Compact QCLDPC Block and SCLDPC Convolutional Codes for LowLatency Communications
Low decoding latency and complexity are two important requirements of ch...
read it

TreeBased Optimization: A MetaAlgorithm for Metaheuristic Optimization
Designing search algorithms for finding global optima is one of the most...
read it

alphastable: An R Package for Modelling Multivariate Stable and Mixture of Symmetric Stable Distributions
The family of stable distributions received extensive applications in ma...
read it

Classification Using Link Prediction
Link prediction in a graph is the problem of detecting the missing links...
read it

On the security of the hierarchical attribute based encryption scheme proposed by Wang et al
Ciphertextpolicy hierarchical attributebased encryption (CPHABE) is a...
read it

Statistical Inference for Stable Distribution Using EM algorithm
The class of αstable distributions with a wide range of applications in...
read it

On the Parameter Estimation of the Generalized Exponential Distribution Under Progressive TypeI Interval Censoring Scheme
Chen and Lio (Computational Statistics and Data Analysis 54: 15811591, ...
read it

ConsiDroid: A Concolicbased Tool for Detecting SQL Injection Vulnerability in Android Apps
Android is a famous OS among users. Existing vulnerabilities in Android ...
read it

DeepPos: Deep Supervised Autoencoder Network for CSI Based Indoor Localization
The widespread mobile devices facilitated the emergence of many new appl...
read it

Deep Neural Networks Meet CSIBased Authentication
The first step of a secure communication is authenticating legible users...
read it

Deep UL2DL: Channel Knowledge Transfer from Uplink to Downlink
Knowledge of the channel state information (CSI) at the transmitter side...
read it

A MultiStream Convolutional Neural Network Framework for Group Activity Recognition
In this work, we present a framework based on multistream convolutional...
read it

A Fuzzy CommunityBased Recommender System Using PageRank
Recommendation systems are widely used by different user service provide...
read it

Augmentation Scheme for Dealing with Imbalanced Network Traffic Classification Using Deep Learning
One of the most important tasks in network management is identifying dif...
read it
AUT
AUT was the first established technical university in Iran, and is referred to as the "Mother of Engineering Universities".