
On Extending Neural Networks with Loss Ensembles for Text Classification
Ensemble techniques are powerful approaches that combine several weak le...
read it

Generalizing the Convolution Operator in Convolutional Neural Networks
Convolutional neural networks have become a main tool for solving many m...
read it

A dataset for ComputerAided Detection of Pulmonary Embolism in CTA images
Todays, researchers in the field of Pulmonary Embolism (PE) analysis nee...
read it

Parallel Stroked Multi Line: a modelbased method for compressing large fingerprint databases
With increasing usage of fingerprints as an important biometric data, th...
read it

RateDistortion Analysis of Multiview Coding in a DIBR Framework
Depth image based rendering techniques for multiview applications have b...
read it

TRLF: An Effective Semifragile Watermarking Method for Tamper Detection and Recovery based on LWT and FNN
This paper proposes a novel method for tamper detection and recovery usi...
read it

Measuring quantum discord using the most distinguishable steered states
Any twoqubit state can be represented, geometrically, as an ellipsoid w...
read it

TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with quality optimized using LWT and GA
In this paper, an efficient fragile blind quad watermarking scheme for i...
read it

High Capacity Image Data Hiding of Scanned Text Documents Using Improved Quadtree
In this paper, an effective method was introduced to steganography of te...
read it

Semifragile Tamper Detection and Recovery based on Region Categorization and TwoSided Circular Block Dependency
This paper presents a new semifragile algorithm for image tamper detect...
read it

Computational Approaches for Stochastic Shortest Path on Succinct MDPs
We consider the stochastic shortest path (SSP) problem for succinct Mark...
read it

A blind robust watermarking method based on Arnold Cat map and amplified pseudonoise strings with weak correlation
In this paper, a robust and blind watermarking method is proposed, which...
read it

Sentimental Content Analysis and Knowledge Extraction from News Articles
In web era, since technology has revolutionized mankind life, plenty of ...
read it

Salient Object Detection in Video using Deep NonLocal Neural Networks
Detection of salient objects in image and video is of great importance i...
read it

RELF: Robust Regression Extended with Ensemble Loss Function
Ensemble techniques are powerful approaches that combine several weak le...
read it

An Analysis of the Semantic Annotation Task on the Linked Data Cloud
Semantic annotation, the process of identifying keyphrases in texts and...
read it

Consistency models in distributed systems: A survey on definitions, disciplines, challenges and applications
The replication mechanism resolves some challenges with big data such as...
read it

Fast path planning algorithms for Unmanned Aerial Vehicles
Path planning is a major problem in autonomous vehicles. In recent years...
read it

Noncommutative versions of inequalities in quantum information theory
In this paper, we aim to replace in the definitions of covariance and co...
read it

Cryptanalysis of Khatoon et al.'s ECCbased Authentication Protocol for Healthcare Systems
Telecare medical information systems are gaining rapid popularity in ter...
read it

ComputerSimulation Model Theory (P= NP is not provable)
The simulation hypothesis says that all the materials and events in the ...
read it

A Formal Axiomatization of Computation
We introduce a set of axioms for the notion of computation, and show tha...
read it

An Efficient Mechanism for Computation Offloading in MobileEdge Computing
Mobile edge computing (MEC) is a promising technology that provides clou...
read it

Weibull analysis with sequential order statistics under a power trend model for hazard rates
In engineering systems, it is usually assumed that lifetimes of componen...
read it

A General Class of Weighted Rank Correlation Measures
In this paper we propose a class of weighted rank correlation coefficien...
read it

Improving the Backpropagation Algorithm with Consequentialism Weight Updates over MiniBatches
Least mean squares (LMS) is a particular case of the backpropagation (BP...
read it

A Pedagogically Sound yet Efficient Deletion algorithm for RedBlack Trees: The ParitySeeking Delete Algorithm
Redblack (RB) trees are one of the most efficient variants of balanced ...
read it

A class of multiplicative splitting iterations for solving the continuous Sylvester equation
For solving the continuous Sylvester equation, a class of the multiplica...
read it

Minimal residual Hermitian and skewHermitian splitting iteration method for the continuous Sylvester equation
By applying the minimal residual technique to the Hermitian and skewHer...
read it

PowerLinear Activation Functions with application to the first layer of CNNs
Convolutional neural networks (CNNs) have become the stateoftheart to...
read it
Ferdowsi University of Mashhad
Ferdowsi University of Mashhad as the third university in terms of dating since the universities of Tehran and Tabriz is currently serving its seventeenth year.