Skip to main content

Showing 1–4 of 4 results for author: Pedram, M M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.13027  [pdf, other

    cs.HC math.NA

    Solving the decision-making differential equations from eye fixation data in Unity software by using Hermite Long-Short-Term Memory neural network

    Authors: Kourosh Parand, Saeed Setayeshi, Mir Mohsen Pedram, Ali Yoonesi, Aida Pakniyat

    Abstract: Cognitive decision-making processes are crucial aspects of human behavior, influencing various personal and professional domains. This research delves into the application of differential equations in analyzing decision-making accuracy by leveraging eye-tracking data within a virtual industrial town setting. The study unveils a systematic approach to transforming raw data into a differential equat… ▽ More

    Submitted 23 February, 2024; v1 submitted 20 February, 2024; originally announced February 2024.

  2. arXiv:2102.11651  [pdf

    cs.CL cs.AI

    A Novel Deep Learning Method for Textual Sentiment Analysis

    Authors: Hossein Sadr, Mozhdeh Nazari Solimandarabi, Mir Mohsen Pedram, Mohammad Teshnehlab

    Abstract: Sentiment analysis is known as one of the most crucial tasks in the field of natural language processing and Convolutional Neural Network (CNN) is one of those prominent models that is commonly used for this aim. Although convolutional neural networks have obtained remarkable results in recent years, they are still confronted with some limitations. Firstly, they consider that all words in a senten… ▽ More

    Submitted 23 February, 2021; originally announced February 2021.

  3. A robust image-based cryptology scheme based on cellular non-linear network and local image descriptors

    Authors: Mohammad Mahdi Dehshibi, Jamshid Shanbehzadeh, Mir Mohsen Pedram

    Abstract: Cellular nonlinear network (CNN) provides an infrastructure for Cellular Automata to have not only an initial state but an input which has a local memory in each cell with much more complexity. This property has many applications which we have investigated it in proposing a robust cryptology scheme. This scheme consists of a cryptography and steganography sub-module in which a 3D CNN is designed t… ▽ More

    Submitted 10 August, 2018; originally announced August 2018.

    Comments: This is an Accepted Manuscript of an article published by Taylor & Francis Group in the International Journal of Parallel, Emergent & Distributed Systems, available online: http://www.tandfonline.com/10.1080/17445760.2018.1510929

  4. arXiv:1207.4570  [pdf

    cs.DB

    Presentation an Approach for Optimization of Semantic Web Language Based on the Document Structure

    Authors: Farzad Parseh, Davood Karimzadgan Moghaddam, Mir Mohsen Pedram, Rohollah Esmaeli Manesh, Mohammad, Jamshidi

    Abstract: Pattern tree are based on integrated rules which are equal to a combination of some points connected to each other in a hierarchical structure, called Enquiry Hierarchical (EH). The main operation in pattern enquiry seeking is to locate the steps that match the given EH in the dataset. A point of algorithms has offered for EH matching; but the majority of this algorithms seeks all of the enquiry s… ▽ More

    Submitted 21 July, 2012; v1 submitted 19 July, 2012; originally announced July 2012.

    Comments: 7 pages, 8 figures, 2 Tables

    Journal ref: IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 3, No 1, May 2012 ISSN (Online): 1694-0814