Volume 12 (2024)
Volume 11 (2023)
Volume 10 (2022)
Volume 9 (2021)
Volume 8 (2020)
Volume 7 (2019)
Volume 6 (2018)
Volume 5 (2017)
Volume 4 (2016)
Volume 3 (2015)
Volume 2 (2014)
Volume 1 (2013)

B.3. Communication/Networking and Information Technology
Intrusion Detection for IoT Network Security with Deep learning

Roya Morshedi; S. Mojtaba Matinkhah; Mohammad Taghi Sadeghi

Volume 12, Issue 1 , January 2024, , Pages 37-55

https://doi.org/10.22044/jadm.2023.13539.2471

Abstract
  IoT devices has witnessed a substantial increase due to the growing demand for smart devices. Intrusion Detection Systems (IDS) are critical components for safeguarding IoT networks against cyber threats. This study presents an advanced approach to IoT network intrusion detection, leveraging deep learning ...  Read More

Feature Selection based on Particle Swarm Optimization and Mutual Information

Z. Shojaee; Seyed A. Shahzadeh Fazeli; E. Abbasi; F. Adibnia

Volume 9, Issue 1 , January 2021, , Pages 39-44

https://doi.org/10.22044/jadm.2020.8857.2020

Abstract
  Today, feature selection, as a technique to improve the performance of the classification methods, has been widely considered by computer scientists. As the dimensions of a matrix has a huge impact on the performance of processing on it, reducing the number of features by choosing the best subset of ...  Read More

FEEM: A Flexible Model based on Artificial Intelligence for Software Effort Estimation

Amin Moradbeiky

Volume 11, Issue 1 , January 2023, , Pages 39-51

https://doi.org/10.22044/jadm.2022.11161.2265

Abstract
  Managing software projects due to its intangible nature is full of challenges when predicting the effort needed for development. Accordingly, there exist many studies with the attempt to devise models to estimate efforts necessary in developing software. According to the literature, the accuracy of estimator ...  Read More

Reconstruction of 3D Stack of Stars in Cardiac MRI using a Combination of GRASP and TV

M. Tavakkoli; A. Ebrahimzadeh; A. Nasiraei Moghaddam; J. Kazemitabar

Volume 10, Issue 1 , January 2022, , Pages 43-51

https://doi.org/10.22044/jadm.2021.10232.2161

Abstract
  One of the most advanced non-invasive medical imaging methods is MRI that can make a good contrast between soft tissues. The main problem with this method is the time limitation in data acquisition, particularly in dynamic imaging. Radial sampling is an alternative for faster data acquisition and has ...  Read More

GroupRank: Ranking Online Social Groups Based on User Membership Records

A. Hashemi; M. A. Zare Chahooki

Volume 9, Issue 1 , January 2021, , Pages 45-57

https://doi.org/10.22044/jadm.2020.8337.1973

Abstract
  Social networks are valuable sources for marketers. Marketers can publish campaigns to reach target audiences according to their interest. Although Telegram was primarily designed as an instant messenger, it is used as a social network in Iran due to censorship of Facebook, Twitter, etc. Telegram neither ...  Read More

Automatic Shadow Direction Determination using Shadow Low Gradient Direction Feature in RGB VHR Remote Sensing Images

M. Kakooei; Y. Baleghi

Volume 10, Issue 1 , January 2022, , Pages 53-61

https://doi.org/10.22044/jadm.2021.10705.2205

Abstract
  Shadow detection provides worthwhile information for remote sensing applications, e.g. building height estimation. Shadow areas are formed in the opposite side of the sunlight radiation to tall objects, and thus, solar illumination angle is required to find probable shadow areas. In recent years, Very ...  Read More

Adaptive Pruning of Convolutional Neural Network

S. Ahmadluei; K. Faez; B. Masoumi

Volume 11, Issue 1 , January 2023, , Pages 53-67

https://doi.org/10.22044/jadm.2022.12337.2380

Abstract
  Deep convolutional neural networks (CNNs) have attained remarkable success in numerous visual recognition tasks. There are two challenges when adopting CNNs in real-world applications: a) Existing CNNs are computationally expensive and memory intensive, impeding their use in edge computing; b) there ...  Read More

H.3. Artificial Intelligence
X-SHAoLIM: Novel Feature Selection Framework for Credit Card Fraud Detection

Sajjad Alizadeh Fard; Hossein Rahmani

Volume 12, Issue 1 , January 2024, , Pages 57-66

https://doi.org/10.22044/jadm.2024.13630.2480

Abstract
  Fraud in financial data is a significant concern for both businesses and individuals. Credit card transactions involve numerous features, some of which may lack relevance for classifiers and could lead to overfitting. A pivotal step in the fraud detection process is feature selection, which profoundly ...  Read More

A Distributed Sailfish Optimizer Based on Multi-Agent Systems for Solving Non-Convex and Scalable Optimization Problems Implemented on GPU

S. Shadravan; H. Naji; V. Khatibi

Volume 9, Issue 1 , January 2021, , Pages 59-71

https://doi.org/10.22044/jadm.2020.9389.2075

Abstract
  The SailFish Optimizer (SFO) is a metaheuristic algorithm inspired by a group of hunting sailfish that alternates their attacks on group of prey. The SFO algorithm takes advantage of using a simple method for providing the dynamic balance between exploration and exploitation phases, creating the swarm ...  Read More

Deformable 3D Shape Matching to Try on Virtual Clothes via Laplacian-Beltrami Descriptor

H. Fathi; A.R. Ahmadyfard; H. Khosravi

Volume 10, Issue 1 , January 2022, , Pages 63-74

https://doi.org/10.22044/jadm.2021.10749.2212

Abstract
  Recently, significant attention has been paid to the development of virtual reality systems in several fields such as commerce. Trying on virtual clothes is becoming a solution for the online clothing industry. In this paper, we propose a method for the problem of virtual clothing using 3D point matching ...  Read More

H.3. Artificial Intelligence
Application of Stacked Ensemble Techniques in Head and Neck Squamous Cell Carcinoma Prognostic Feature Subsets

Damianus Kofi Owusu; Christiana Cynthia Nyarko; Joseph Acquah; Joel Yarney

Volume 12, Issue 1 , January 2024, , Pages 67-81

https://doi.org/10.22044/jadm.2023.12420.2388

Abstract
  Head and neck cancer (HNC) recurrence is ever increasing among Ghanaian men and women. Because not all machine learning classifiers are equally created, even if multiple of them suite very well for a given task, it may be very difficult to find one which performs optimally given different distributions. ...  Read More

Efficient Stance Ordering to Improve Rumor Veracity Detection

Z. MohammadHosseini; A. Jalaly Bidgoly

Volume 11, Issue 1 , January 2023, , Pages 69-76

https://doi.org/10.22044/jadm.2023.11978.2345

Abstract
  Social media is an inseparable part of human life, although published information through social media is not always true. Rumors may spread easily and quickly in the social media, hence, it is vital to have a tool for rumor veracity detection. Papers already proved that users’ stance is an important ...  Read More

Detecting Sinkhole Attack in RPL-based Internet of Things Routing Protocol

M. Yadollahzadeh Tabari; Z. Mataji

Volume 9, Issue 1 , January 2021, , Pages 73-85

https://doi.org/10.22044/jadm.2020.9253.2060

Abstract
  The Internet of Things (IoT) is a novel paradigm in computer networks which is capable to connect things to the internet via a wide range of technologies. Due to the features of the sensors used in IoT networks and the unsecured nature of the internet, IoT is vulnerable to many internal routing attacks. ...  Read More

A New Learning-based Spatiotemporal Descriptor for Online Symbol Recognition

M. Sepahvand; F. Abdali-Mohammadi

Volume 10, Issue 1 , January 2022, , Pages 75-86

https://doi.org/10.22044/jadm.2022.11150.2262

Abstract
  The success of handwriting recognition methods based on digitizer-pen signal processing is mostly dependent on the defined features. Strong and discriminating feature descriptors can play the main role in improving the accuracy of pattern recognition. Moreover, most recognition studies utilize local ...  Read More

Learning a Nonlinear Combination of Generalized Heterogeneous Classifiers

M. Rahimi; A. A. Taheri; H. Mashayekhi

Volume 11, Issue 1 , January 2023, , Pages 77-93

https://doi.org/10.22044/jadm.2022.12403.2387

Abstract
  Finding an effective way to combine the base learners is an essential part of constructing a heterogeneous ensemble of classifiers. In this paper, we propose a framework for heterogeneous ensembles, which investigates using an artificial neural network to learn a nonlinear combination of the base classifiers. ...  Read More

H.3.2.2. Computer vision
Enhancing Emotion Classification via EEG Signal Frame Selection

Masoumeh Esmaeiili; Kourosh Kiani

Volume 12, Issue 1 , January 2024, , Pages 83-93

https://doi.org/10.22044/jadm.2024.13861.2502

Abstract
  The classification of emotions using electroencephalography (EEG) signals is inherently challenging due to the intricate nature of brain activity. Overcoming inconsistencies in EEG signals and establishing a universally applicable sentiment analysis model are essential objectives. This study introduces ...  Read More

A Novel Hierarchical Attention-based Method for Aspect-level Sentiment Classification

A. Lakizadeh; Z. Zinaty

Volume 9, Issue 1 , January 2021, , Pages 87-97

https://doi.org/10.22044/jadm.2020.9579.2091

Abstract
  Aspect-level sentiment classification is an essential issue in sentiment analysis that intends to resolve the sentiment polarity of a specific aspect mentioned in the input text. Recent methods have discovered the role of aspects in sentiment polarity classification and developed various techniques to ...  Read More

Customer Behavior Analysis to Improve Detection of Fraudulent ‎Transactions using Deep Learning

F. Baratzadeh; Seyed M. H. Hasheminejad

Volume 10, Issue 1 , January 2022, , Pages 87-101

https://doi.org/10.22044/jadm.2022.10124.2151

Abstract
  With the advancement of technology, the daily use of bank credit cards has been increasing exponentially. Therefore, the fraudulent use of credit cards by others as one of the new crimes is also growing fast. For this reason, detecting and preventing these attacks has become an active area of study. ...  Read More

Automatic Post-editing of Hierarchical Attention Networks for Improved Context-aware Neural Machine Translation

M. M. Jaziriyan; F. Ghaderi

Volume 11, Issue 1 , January 2023, , Pages 95-102

https://doi.org/10.22044/jadm.2022.12152.2367

Abstract
  Most of the existing neural machine translation (NMT) methods translate sentences without considering the context. It is shown that exploiting inter and intra-sentential context can improve the NMT models and yield to better overall translation quality. However, providing document-level data is costly, ...  Read More

H.3.15.3. Evolutionary computing and genetic algorithms
A Hybrid Machine Learning Approach and Genetic Algorithm for Malware Detection

Mahdieh Maazalahi; Soodeh Hosseini

Volume 12, Issue 1 , January 2024, , Pages 95-104

https://doi.org/10.22044/jadm.2024.13895.2503

Abstract
  Detecting and preventing malware infections in systems is become a critical necessity. This paper presents a hybrid method for malware detection, utilizing data mining algorithms such as simulated annealing (SA), support vector machine (SVM), genetic algorithm (GA), and K-means. The proposed method combines ...  Read More

Probabilistic Reasoning and Markov Chains as Means to Improve Performance of Tuning Decisions under Uncertainty

A. Omondi; I. Lukandu; G. Wanyembi

Volume 9, Issue 1 , January 2021, , Pages 99-108

https://doi.org/10.22044/jadm.2020.8920.2027

Abstract
  Variable environmental conditions and runtime phenomena require developers of complex business information systems to expose configuration parameters to system administrators. This allows system administrators to intervene by tuning the bottleneck configuration parameters in response to current changes ...  Read More

A Clustering-Classification Recommender System based on Firefly Algorithm

H.R. Koosha; Z. Ghorbani; R. Nikfetrat

Volume 10, Issue 1 , January 2022, , Pages 103-116

https://doi.org/10.22044/jadm.2021.10782.2216

Abstract
  In the last decade, online shopping has played a vital role in customers' approach to purchasing different products, providing convenience to shop and many benefits for the economy. E-commerce is widely used for digital media products such as movies, images, and software. So, recommendation systems are ...  Read More

H.3. Artificial Intelligence
A Reinforcement Learning-based Encoder-Decoder Framework for Learning Stock Trading Rules

M. Taghian; A. Asadi; R. Safabakhsh

Volume 11, Issue 1 , January 2023, , Pages 103-118

https://doi.org/10.22044/jadm.2023.11979.2347

Abstract
  The quality of the extracted features from a long-term sequence of raw prices of the instruments greatly affects the performance of the trading rules learned by machine learning models. Employing a neural encoder-decoder structure to extract informative features from complex input time-series has proved ...  Read More

H.5. Image Processing and Computer Vision
A Novel Method for Fish Spoilage Detection based on Fish Eye Images using Deep Convolutional Inception-ResNet-v2

Sekine Asadi Amiri; Mahda Nasrolahzadeh; Zeynab Mohammadpoory; AbdolAli Movahedinia; Amirhossein Zare

Volume 12, Issue 1 , January 2024, , Pages 105-113

https://doi.org/10.22044/jadm.2024.14091.2519

Abstract
  Improving the quality of food industries and the safety and health of the people’s nutrition system is one of the important goals of governments. Fish is an excellent source of protein. Freshness is one of the most important quality criteria for fish that should be selected for consumption. It ...  Read More

Estimating Pier Scour Depth: Comparison of Empirical Formulations with ANNs, GMDH, MARS, and Kriging

M. Zarbazoo Siahkali; A.A. Ghaderi; Abdol H. Bahrpeyma; M. Rashki; N. Safaeian Hamzehkolaei

Volume 9, Issue 1 , January 2021, , Pages 109-128

https://doi.org/10.22044/jadm.2020.10085.2147

Abstract
  Scouring, occurring when the water flow erodes the bed materials around the bridge pier structure, is a serious safety assessment problem for which there are many equations and models in the literature to estimate the approximate scour depth. This research is aimed to study how surrogate models estimate ...  Read More