default search action
27th CSICC 2022: Tehran, Iran
- 27th International Computer Conference, Computer Society of Iran, CSICC 2022, Tehran, Iran, Islamic Republic of, February 23-24, 2022. IEEE 2022, ISBN 978-1-6654-8027-7
- Majid Abolghasemi, Chitra Dadkhah, Nasim Tohidi
:
HTS-DL: Hybrid Text Summarization System using Deep Learning. 1-5 - Fatemeh Abdoni, Amir Mousavinia, Fatemeh Pazoki:
A Restricted 4PCS Algorithm for Registering Low Overlap Point Cloud. 1-5 - Mohammad Sadegh Barkhordari
, Leonardo M. Massone
:
Efficiency of deep neural networks for reinforced concrete shear walls failure mode detection. 1-4 - Moein Atari, Nayereh Majd:
2D HP protein folding using quantum genetic algorithm. 1-8 - Homa Nasiri, Morteza Analoui:
Persian Stance Detection with Transfer Learning and Data Augmentation. 1-5 - Maedeh Mosharraf:
Enriching Educational Content through Subgraph Semantic Annotation. 1-5 - Mohammad-Sajad Kasaei
, Mohammadreza Sharbaf, Bahman Zamani:
Towards a Formalism for Specifying N-way Model Merging Rules. 1-7 - Mehrshad Khosraviani
, Arash Ebrahim Pourzandi, Mohammad Reza Abbassian:
A Flexible Cyclic Redundancy Codes' Selection to Increase Fault-Tolerance in Smart Buildings. 1-6 - Narges Mohebbi, Meysam Alavi, Mehrdad Kargari:
Determining COVID-19 Severity with Fuzzy Inference System. 1-5 - Shima Kamyab, Hamed Taghadosi, Zohreh Azimifar:
A Deep Learning Embedded System for 3D Human Face Shape Reconstruction From a Single Image. 1-6 - Saeideh Kabirirad
, Ziba Eslami:
Forgery Attack on An Outsourced Attribute-Based Signature Scheme. 1-4 - Arefeh Dalvand, Mohammad Bagher Dowlatshahi, Amin Hashemi:
SGFS: A semi-supervised graph-based feature selection algorithm based on the PageRank algorithm. 1-6 - Mohammadreza Bakhtyari, Saeedeh Davoudi, Sayeh Mirzaei:
Evaluating Various Feature Extraction Methods and Classification Algorithms for Music Genres Classification. 1-6 - S. A. Shahrokhi, Ali Ahmadi:
TEMPPO: Twin Entropy Maximized Proximal Policy Optimization. 1-6 - Ghazaleh Zehtab, Alireza Basiri
:
Employees Turnover Rate with Pivoted Length Normalization. 1-4 - Mahdi Banisharif, Arman Mazloumzadeh, Mohammadreza Sharbaf, Bahman Zamani:
Automatic Generation of Business Intelligence Chatbot for Organizations. 1-5 - Bita Noori, Pedram Salehpoor, Hadi S. Aghdasi:
RGB image Encryption and Decryption with Neural Chaotic Functions. 1-8 - Mahta Darvish, Jamshid Shanbehzadeh, Azadeh Mansouri
:
Towards the Efficiency of the Fusion Step in Language-Based Fashion Image Editing. 1-5 - Jafar Abdollahi
:
Identification of Medicinal Plants in Ardabil Using Deep learning : Identification of Medicinal Plants using Deep learning. 1-6 - Arman Yekkehkhani, Mohammadjalal Pouromid, Mohammad Bahrani:
Attention-based Persian Language Modeling. 1-5 - Motahareh Mohammad Rezai, Mohammad Ali Zare Chahooki:
Content-Based Telegram Group Recommender System. 1-6 - Armin Tavakoli Dinani, Meqdad Mirabi, Maryam Khademi:
Presenting method to schedule tasks in the cloud computing environment using the whale optimization algorithm. 1-6 - SayedAli Rad, Alireza Basiri
:
Brain Drain Optimization: a Novel Approach for Task Scheduling in the Cloud Computing. 1-6 - Mostafa Pourasadollah, Maryam Taajobian, Ali Jahanian:
Flexible and Automatable Microfluidic-based Architecture and CAD Algorithm for Implementation of Large DNA Digital Storage. 1-7 - Mohammad Vazirpanah, Seyed-Hosein Attarzadeh-Niaki, Armin Salimi-Badr:
ROS-Based Co-Simulation for Formal Cyber-Physical Robotic System Design. 1-5 - Farnaz Sabahi:
Distributed Constraint Programming based on Fuzzy Probability Applied to Aphasia Diagnosis. 1-7 - Javad Rahimi
, Leila Taheran, Ali Dabbagh:
Improving the method of detecting Influenza outbreak in a location by analyzing Twitter data and comparing it with official statistics. 1-5 - Niloofar Ranjbar, Reza Safabakhsh:
Using Decision Tree as Local Interpretable Model in Autoencoder-based LIME. 1-7 - Masoumeh Moeini, Hadi Shahriar Shahhoseini:
Improved Rabin-Karp Algorithm Using Bloom Filter. 1-5 - Mansoureh Yari Eili
, Jalal Rezaeenour:
C-MIFS: Cellucci's Mutual Information For Feature Selection. 1-5 - Shavbo Salehi, Behdis Eslamnour:
Single- and Multi-UAV Trajectory Design Inspired by Head of Disk Scheduling. 1-6 - Daria Golnarian, Kimia Saedi, Behnam Bahrak:
A decentralized and trustless e-voting system based on blockchain technology. 1-7 - Soodeh Asgari, Behzad Akbari
:
DDoS Attack Detection in OpenFlow Based Networks. 1-7 - Nazanin Sabri, Mohammad Saleh Mahdizadeh, Reyhaneh Akhavan Khantazi, Behnam Bahrak:
Exploring the Similarities of Iranian Influencers with Regards to Content, Relationships and Interactions with Users. 1-5 - Mina Khoshbazm Farimani, Soroush Karimian Aliabadi, Reza Entezari-Maleki
:
Computation Offloading Strategy for Autonomous Vehicles. 1-6 - Seyed Amir Hossein Ahmadi, Naser Yazdani:
Locality and priority in Auction-based resource allocation in blockchain network. 1-6 - Ali Shamsadini, Reza Entezari-Maleki
:
Time-aware MDP-based Service Migration in 5G Mobile Edge Computing. 1-5 - Sara Mirzaie, Omid Bushehrian:
Fault-Localization in Water Distribution Networks using Hierarchical Anomaly Analysis. 1-5 - Ali Irfan, Arif Ur Rahman, Noor Ul-Ain:
PASR: Process-Aware Middleware Framework for Dynamic Service Replacement in SOA. 1-6 - Neda Mohammadi
, Abbas Rasoolzadegan:
A Pattern-aware Design and Implementation Guideline for Microservice-based Systems. 1-6 - Nasim Tohidi
, Seyed Mohammad Hossein Hasheminejad
:
A Practice of Human-Machine Collaboration for Persian Text Summarization. 1-5 - Atefeh Nirumand, Bahman Zamani, Behrouz Tork Ladani:
A Model-Based Approach for Representing Data Sharing Mechanism in Android Applications. 1-7 - Negin Samadi
, Jafar Tanha, Sahar Hassanzadeh Mostafaei
, Nazila Razzaghi-Asl, Soodabeh Imanzadeh:
Spreader node detection based on the Perron-Frobenius theorem in complex networks. 1-5 - Mohsen Meamarian, Naser Yazdani:
A Robust, Lightweight Deep Learning Approach for Detection and Mitigation of DDoS Attacks in SDN. 1-7 - Mohammad Zolfaghari, Hedieh Sajedi:
Unsupervised Anomaly Detection with an Enhanced Teacher for Student-Teacher Feature Pyramid Matching. 1-4 - Jafar Abdollahi
, Laya Mahmoudi:
An Artificial Intelligence System for Detecting the Types of the Epidemic from X-rays : Artificial Intelligence System for Detecting the Types of the Epidemic from X-rays. 1-6 - Ali Soleymani
, Seyed Hossein Ghoreishi:
Controlling the Pandemic of COVID-19 based on Telecommunication Data. 1-7 - Zahra Boreiri
, Alireza Norouzi Azad
, Amin Ghodousian:
A Convolutional Neuro-Fuzzy Network Using Fuzzy Image Segmentation for Acute Leukemia Classification. 1-7 - Amin Najafgholizadeh, Arman Nasirkhani, Hamid Reza Mazandarani
, Hamid Reza Soltanalizadeh, Mohammad Sabokrou:
Imaging Time Series for Deep Embedded Clustering: a Cryptocurrency Regime Detection Use Case. 1-6 - Motahareh Mohammad Rezai, Mohammad Ali Zare Chahooki:
Group recommendation in Telegram by membership graph analyzing. 1-7 - Peyman Hosseini, Alireza Basiri
:
GRACER: Improving the Accuracy of RACER Classifier Using A Greedy Approach. 1-6 - Fatemeh Pazoki, Amir Mousavinia, Fatemeh Abdoni:
Accelerated 4PCS Algorithm for Point Cloud Registration. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.