Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Mahmood Deypir"'
Publikováno v:
Frontiers in Plant Science, Vol 15 (2024)
This paper presents a robust deep learning method for fruit decay detection and plant identification. By addressing the limitations of previous studies that primarily focused on model accuracy, our approach aims to provide a more comprehensive soluti
Externí odkaz:
https://doaj.org/article/878de7c7df1a4bdd8c0f2062f6b16acb
Publikováno v:
مجله مدل سازی در مهندسی, Vol 21, Iss 75 (2023)
In this article, we presented a method to detect trust in social networks according to individual and personal characteristics with the help of the adaptive neuro-fuzzy inference system method. The current research required a dataset, for this purpos
Externí odkaz:
https://doaj.org/article/8d2a498753d943258c401e2af09af474
Publikováno v:
آیندهپژوهی دفاعی, Vol 5, Iss 18, Pp 37-62 (2020)
Data mining is a powerful technology that has the ability to discover knowledge hidden in a huge range of data. The purpose of this study is to analyze the portfolio of technical parts by data mining in order to improve the forecast and supply the ne
Externí odkaz:
https://doaj.org/article/27d2f37460bb4ec4b47a17b62cc1fbb1
Publikováno v:
مجله مدل سازی در مهندسی, Vol 18, Iss 62, Pp 13-29 (2020)
Today, with the expansion of communications and the high volume of data, the need for processing them at a low time and high speed has increased. On the other hand, conducting this high volume of computing operations requires systems with high proces
Externí odkaz:
https://doaj.org/article/331fc8e75e6d4fb5815412a0795ba594
Autor:
Mozhgan Ghasabi, Mahmood Deypir
Publikováno v:
Intelligent Data Analysis. 25:155-176
Software-defined networks (SDN) are an emerging architecture that provides promising amends to put an end to current infrastructure constraints by optimized bandwidth utilization, flexibility in network management and configuration, and pulling down
Autor:
Mahmood Deypir
Publikováno v:
Soft Computing. 23:7303-7319
Android as a widest used operating system for smartphones and mobile devices uses permissions to restrict malicious applications (apps). However, malware developers use various social engineering methods to entice users for installing malwares after
Autor:
Mahmood Deypir, A. Horri
Publikováno v:
Journal of Information Security and Applications. 40:20-30
Android has emerged as the widest-used operating system for smartphones and mobile devices. Security of this platform mainly relies on applications (apps) installed by the device owner since permissions and sandboxing have reduced the attack surface.
Autor:
Mahmood Deypir
Publikováno v:
Signal and Data Processing. 14:23-36
Publikováno v:
Expert Systems with Applications. 139:112840
The hybrid convolutional neural network and hidden Markov model (CNN-HMM) has recently achieved considerable performance in speech recognition because deep neural networks, model complex correlations between features. Automatic speech recognition (AS
Autor:
Farzad Gouya, Mahmood Deypir
Publikováno v:
AEU - International Journal of Electronics and Communications. 110:152863
Video service is one of the popular services among mobile users, which plays an important role in network traffic growth and owns the largest data traffic compared to other types of communications. Over the last few years, users’ considerable enthu