Skip to main content

Showing 1–6 of 6 results for author: Asghari, P

.
  1. arXiv:2406.18568  [pdf

    cs.CV cs.AI cs.LG

    A Diagnostic Model for Acute Lymphoblastic Leukemia Using Metaheuristics and Deep Learning Methods

    Authors: M. Hosseinzadeh, P. Khoshaght, S. Sadeghi, P. Asghari, Z. Arabi, J. Lansky, P. Budinsky, A. Masoud Rahmani, S. W. Lee

    Abstract: Acute lymphoblastic leukemia (ALL) severity is determined by the presence and ratios of blast cells (abnormal white blood cells) in both bone marrow and peripheral blood. Manual diagnosis of this disease is a tedious and time-consuming operation, making it difficult for professionals to accurately examine blast cell characteristics. To address this difficulty, researchers use deep learning and mac… ▽ More

    Submitted 2 June, 2024; originally announced June 2024.

  2. arXiv:2111.04653   

    cs.MM math.OC

    Adaptive Steganography Based on bargain Game

    Authors: Behbod Keshavarzi, Hamidreza Navidi, Parvaneh Asghari, Seyyed Hamid Haji Seyyed Javadi

    Abstract: The capacity and security of the confidential message on the channel are two important challenges in steganography. In this paper, a new block steganography model is presented using the bargain method so that a competitive model is introduced. In this game, the blocks are the same players. The bargain is provided with the aim of embedding information without reducing capacity as well as increasing… ▽ More

    Submitted 10 May, 2022; v1 submitted 8 November, 2021; originally announced November 2021.

    Comments: This paper requires major changes and is being revised

  3. arXiv:2110.00917  [pdf

    cs.IT cs.CR

    Binary code optimization

    Authors: Parviz Gharehbagheri, Sayeed Hamid Haji Sayeed Javadi, Parvaneh Asghari, Naser Gharehbagheri

    Abstract: This article shows that any type of binary data can be defined as a collection from codewords of variable length. This feature helps us to define an Injective and surjective function from the suggested codewords to the required codewords. Therefore, by replacing the new codewords, the binary data becomes another binary data regarding the intended goals. One of these goals is to reduce data size. I… ▽ More

    Submitted 2 October, 2021; originally announced October 2021.

    Comments: in Persian language

  4. arXiv:2102.13340  [pdf

    cs.CR

    Lightweight Key-Dependent Dynamic S-Boxes based on Hyperelliptic Curve for IoT Devices

    Authors: Parvaneh Asghari, Seyyed Hamid Haj Seyyed Javadi

    Abstract: Security is one of the main issues in Internet of Things (IoT). Encryption plays a curtail role in making these systems secure. Substitution Box (S-Box) has an effective impact in block encryption methods. Due to the restricted resource capacities of IoT nodes, providing a lightweight S-Box is a challenging problem. This paper presents a key-dependent S-Box using Hyperelliptic curve. The proposed… ▽ More

    Submitted 26 February, 2021; originally announced February 2021.

    Comments: in Persian language

  5. arXiv:1903.04820  [pdf, other

    cs.LG stat.ML

    Online Human Activity Recognition Employing Hierarchical Hidden Markov Models

    Authors: Parviz Asghari, Elnaz Soelimani, Ehsan Nazerfard

    Abstract: In the last few years there has been a growing interest in Human Activity Recognition~(HAR) topic. Sensor-based HAR approaches, in particular, has been gaining more popularity owing to their privacy preserving nature. Furthermore, due to the widespread accessibility of the internet, a broad range of streaming-based applications such as online HAR, has emerged over the past decades. However, propos… ▽ More

    Submitted 12 March, 2019; originally announced March 2019.

    Comments: 9 pages, 9 figures, 7 tables

  6. Activity Recognition using Hierarchical Hidden Markov Models on Streaming Sensor Data

    Authors: Parviz Asghari, Ehsan Nazerfard

    Abstract: Activity recognition from sensor data deals with various challenges, such as overlap** activities, activity labeling, and activity detection. Although each challenge in the field of recognition has great importance, the most important one refers to online activity recognition. The present study tries to use online hierarchical hidden Markov model to detect an activity on the stream of sensor dat… ▽ More

    Submitted 4 October, 2018; originally announced October 2018.