Vol.35, No.6, 2020-Table of Contents
  • A Discovery Method for New Words From Mobile Product Comments
  • Abstract A large number of new words in product reviews generated by mobile terminals are valuable indicators of the privacy preferences of customers. By clustering these privacy preferences, sufficient information can be collected to characterize users and provide a data basis for the research issues of privacy protection. The widespread use of mobile clients shortens the string length of the comment corpus generated by product reviews, resulting in a high repetition rate. Therefore, the effective and accurate recognition of new words is a problem that requires an urgent solution. Hence, in this paper, we propose a method for discovering new words… More
  •   Views:718       Downloads:464        Download PDF
  • Internet of Things in Healthcare: Architecture, Applications, Challenges, and Solutions
  • Abstract Healthcare, the largest global industry, is undergoing significant transformations with the genesis of a new technology known as the Internet of Things (IoT). Many healthcare leaders are investing more money for transforming their services to harness the benefits provided by IoT, thereby paving the way for the Internet of Medical Things (IoMT), an extensive collection of medical sensors and associated infrastructure. IoMT has many benefits like providing remote healthcare by monitoring health vitals of patients at a distant place, providing healthcare services to elderly people, and monitoring a large group of people in a region or country for detection and… More
  •   Views:2017       Downloads:3924        Download PDF
  • An Accurate Persian Part-of-Speech Tagger
  • Abstract The processing of any natural language requires that the grammatical properties of every word in that language are tagged by a part of speech (POS) tagger. To present a more accurate POS tagger for the Persian language, we propose an improved and accurate tagger called IAoM that supports properties of text to speech systems such as Lexical Stress Search, Homograph words Disambiguation, Break Phrase Detection, and main aspects of Persian morphology. IAoM uses Maximum Likelihood Estimation (MLE) to determine the tags of unknown words. In addition, it uses a few defined rules for the sake of achieving high accuracy. For… More
  •   Views:608       Downloads:617        Download PDF
  • B-Spline Curve Approximation by Utilizing Big Bang-Big Crunch Method
  • Abstract The location of knot points and estimation of the number of knots are undoubtedly known as one of the most difficult problems in B-Spline curve approximation. In the literature, different researchers have been seen to use more than one optimization algorithm in order to solve this problem. In this paper, Big Bang-Big Crunch method (BB-BC) which is one of the evolutionary based optimization algorithms was introduced and then the approximation of B-Spline curve knots was conducted by this method. The technique of reverse engineering was implemented for the curve knot approximation. The detection of knot locations and the number of… More
  •   Views:559       Downloads:439        Download PDF
  • Human Activity Recognition Based on Parallel Approximation Kernel K-Means Algorithm
  • Abstract Recently, owing to the capability of mobile and wearable devices to sense daily human activity, human activity recognition (HAR) datasets have become a large-scale data resource. Due to the heterogeneity and nonlinearly separable nature of the data recorded by these sensors, the datasets generated require special techniques to accurately predict human activity and mitigate the considerable heterogeneity. Consequently, classic clustering algorithms do not work well with these data. Hence, kernelization, which converts the data into a new feature vector representation, is performed on nonlinearly separable data. This study aims to present a robust method to perform HAR data clustering to… More
  •   Views:645       Downloads:497        Download PDF
  • Multiparty Quantum Key Agreement With Strong Fairness Property
  • Abstract Multiparty Key Agreement (MKA) is the backbone for secure multiparty communication. Although numerous efficient MKA-cryptosystems are available in the classical field, their security relies on the assumption that some computational issues are infeasible. To overcome this dependency, a new area, quantum cryptography, evolves to support key agreement among two or more participants securely. In this paper, first, we present a two-part quantum key agreement with Strong Fairness Property (SFP) and extends it to a Multiparty Quantum Key Agreement (MQKA) protocol. In the first round of proposed MQKA, a participant will act as a group controller (GC) and establishes two-party groups… More
  •   Views:611       Downloads:485        Download PDF
  • Text Classification for Azerbaijani Language Using Machine Learning
  • Abstract Text classification systems will help to solve the text clustering problem in the Azerbaijani language. There are some text-classification applications for foreign languages, but we tried to build a newly developed system to solve this problem for the Azerbaijani language. Firstly, we tried to find out potential practice areas. The system will be useful in a lot of areas. It will be mostly used in news feed categorization. News websites can automatically categorize news into classes such as sports, business, education, science, etc. The system is also used in sentiment analysis for product reviews. For example, the company shares a… More
  •   Views:567       Downloads:506        Download PDF
  • Semantic Analysis Techniques using Twitter Datasets on Big Data: Comparative Analysis Study
  • Abstract This paper conducts a comprehensive review of various word and sentence semantic similarity techniques proposed in the literature. Corpus-based, Knowledge-based, and Feature-based are categorized under word semantic similarity techniques. String and set-based, Word Order-based Similarity, POSbased, Syntactic dependency-based are categorized as sentence semantic similarity techniques. Using these techniques, we propose a model for computing the overall accuracy of the twitter dataset. The proposed model has been tested on the following four measures: Atish’s measure, Li’s measure, Mihalcea’s measure with path similarity, and Mihalcea’s measure with Wu and Palmer’s (WuP) similarity. Finally, we evaluate the proposed method on three real-world twitter… More
  •   Views:2332       Downloads:1665        Download PDF
  • Video Source Identification Algorithm Based on 3D Geometric Transformation
  • Abstract Digital video has become one of the most preferred ways for people to share information. Considering people tend to release illegal information in anonymous way, the problem of video source identification attracts more and more attention as an important part of multimedia forensics. The Photo-Response Non-Uniformity (PRNU) based algorithm shows to be a promising solution for the problem of video source identification. However, it is necessary to make a geometric transformation for testing PRNU noise to align it with the reference noise, due to the effect of video stabilization. This paper analyzes the three-dimensional (3D) characteristics of camera jitters and… More
  •   Views:605       Downloads:493        Download PDF
  • A Data-Aware Remote Procedure Call Method for Big Data Systems
  • Abstract In recent years, big data has been one of the hottest development directions in the information field. With the development of artificial intelligence technology, mobile smart terminals and high-bandwidth wireless Internet, various types of data are increasing exponentially. Huge amounts of data contain a lot of potential value, therefore how to effectively store and process data efficiently becomes very important. Hadoop Distributed File System (HDFS) has emerged as a typical representative of dataintensive distributed big data file systems, and it has features such as high fault tolerance, high throughput, and can be deployed on low-cost hardwares. HDFS nodes communicate with… More
  •   Views:611       Downloads:479        Download PDF