


default search action
27th CSICC 2022: Tehran, Iran
- 27th International Computer Conference, Computer Society of Iran, CSICC 2022, Tehran, Iran, Islamic Republic of, February 23-24, 2022. IEEE 2022, ISBN 978-1-6654-8027-7

- Majid Abolghasemi, Chitra Dadkhah, Nasim Tohidi

:
HTS-DL: Hybrid Text Summarization System using Deep Learning. 1-5 - Fatemeh Abdoni, Amir Mousavinia, Fatemeh Pazoki:

A Restricted 4PCS Algorithm for Registering Low Overlap Point Cloud. 1-5 - Mohammad Sadegh Barkhordari

, Leonardo M. Massone
:
Efficiency of deep neural networks for reinforced concrete shear walls failure mode detection. 1-4 - Moein Atari, Nayereh Majd:

2D HP protein folding using quantum genetic algorithm. 1-8 - Homa Nasiri, Morteza Analoui:

Persian Stance Detection with Transfer Learning and Data Augmentation. 1-5 - Maedeh Mosharraf:

Enriching Educational Content through Subgraph Semantic Annotation. 1-5 - Mohammad-Sajad Kasaei

, Mohammadreza Sharbaf, Bahman Zamani:
Towards a Formalism for Specifying N-way Model Merging Rules. 1-7 - Mehrshad Khosraviani

, Arash Ebrahim Pourzandi, Mohammad Reza Abbassian:
A Flexible Cyclic Redundancy Codes' Selection to Increase Fault-Tolerance in Smart Buildings. 1-6 - Narges Mohebbi, Meysam Alavi

, Mehrdad Kargari:
Determining COVID-19 Severity with Fuzzy Inference System. 1-5 - Shima Kamyab, Hamed Taghadosi, Zohreh Azimifar:

A Deep Learning Embedded System for 3D Human Face Shape Reconstruction From a Single Image. 1-6 - Saeideh Kabirirad

, Ziba Eslami:
Forgery Attack on An Outsourced Attribute-Based Signature Scheme. 1-4 - Arefeh Dalvand, Mohammad Bagher Dowlatshahi, Amin Hashemi:

SGFS: A semi-supervised graph-based feature selection algorithm based on the PageRank algorithm. 1-6 - Mohammadreza Bakhtyari, Saeedeh Davoudi, Sayeh Mirzaei:

Evaluating Various Feature Extraction Methods and Classification Algorithms for Music Genres Classification. 1-6 - S. A. Shahrokhi, Ali Ahmadi:

TEMPPO: Twin Entropy Maximized Proximal Policy Optimization. 1-6 - Ghazaleh Zehtab, Alireza Basiri

:
Employees Turnover Rate with Pivoted Length Normalization. 1-4 - Mahdi Banisharif, Arman Mazloumzadeh, Mohammadreza Sharbaf, Bahman Zamani:

Automatic Generation of Business Intelligence Chatbot for Organizations. 1-5 - Bita Noori, Pedram Salehpoor, Hadi S. Aghdasi:

RGB image Encryption and Decryption with Neural Chaotic Functions. 1-8 - Mahta Darvish, Jamshid Shanbehzadeh, Azadeh Mansouri

:
Towards the Efficiency of the Fusion Step in Language-Based Fashion Image Editing. 1-5 - Jafar Abdollahi

:
Identification of Medicinal Plants in Ardabil Using Deep learning : Identification of Medicinal Plants using Deep learning. 1-6 - Arman Yekkehkhani, Mohammadjalal Pouromid, Mohammad Bahrani:

Attention-based Persian Language Modeling. 1-5 - Motahareh Mohammad Rezai, Mohammad Ali Zare Chahooki:

Content-Based Telegram Group Recommender System. 1-6 - Armin Tavakoli Dinani, Meqdad Mirabi, Maryam Khademi:

Presenting method to schedule tasks in the cloud computing environment using the whale optimization algorithm. 1-6 - SayedAli Rad, Alireza Basiri

:
Brain Drain Optimization: a Novel Approach for Task Scheduling in the Cloud Computing. 1-6 - Mostafa Pourasadollah, Maryam Taajobian, Ali Jahanian:

Flexible and Automatable Microfluidic-based Architecture and CAD Algorithm for Implementation of Large DNA Digital Storage. 1-7 - Mohammad Vazirpanah

, Seyed-Hosein Attarzadeh-Niaki, Armin Salimi-Badr:
ROS-Based Co-Simulation for Formal Cyber-Physical Robotic System Design. 1-5 - Farnaz Sabahi

:
Distributed Constraint Programming based on Fuzzy Probability Applied to Aphasia Diagnosis. 1-7 - Javad Rahimi

, Leila Taheran, Ali Dabbagh:
Improving the method of detecting Influenza outbreak in a location by analyzing Twitter data and comparing it with official statistics. 1-5 - Niloofar Ranjbar, Reza Safabakhsh:

Using Decision Tree as Local Interpretable Model in Autoencoder-based LIME. 1-7 - Masoumeh Moeini, Hadi Shahriar Shahhoseini:

Improved Rabin-Karp Algorithm Using Bloom Filter. 1-5 - Mansoureh Yari Eili

, Jalal Rezaeenour:
C-MIFS: Cellucci's Mutual Information For Feature Selection. 1-5 - Shavbo Salehi, Behdis Eslamnour:

Single- and Multi-UAV Trajectory Design Inspired by Head of Disk Scheduling. 1-6 - Daria Golnarian, Kimia Saedi, Behnam Bahrak:

A decentralized and trustless e-voting system based on blockchain technology. 1-7 - Soodeh Asgari, Behzad Akbari

:
DDoS Attack Detection in OpenFlow Based Networks. 1-7 - Nazanin Sabri, Mohammad Saleh Mahdizadeh, Reyhaneh Akhavan Khantazi, Behnam Bahrak:

Exploring the Similarities of Iranian Influencers with Regards to Content, Relationships and Interactions with Users. 1-5 - Mina Khoshbazm Farimani, Soroush Karimian Aliabadi, Reza Entezari-Maleki

:
Computation Offloading Strategy for Autonomous Vehicles. 1-6 - Seyed Amir Hossein Ahmadi, Naser Yazdani:

Locality and priority in Auction-based resource allocation in blockchain network. 1-6 - Ali Shamsadini, Reza Entezari-Maleki

:
Time-aware MDP-based Service Migration in 5G Mobile Edge Computing. 1-5 - Sara Mirzaie, Omid Bushehrian:

Fault-Localization in Water Distribution Networks using Hierarchical Anomaly Analysis. 1-5 - Ali Irfan, Arif Ur Rahman

, Noor Ul-Ain:
PASR: Process-Aware Middleware Framework for Dynamic Service Replacement in SOA. 1-6 - Neda Mohammadi

, Abbas Rasoolzadegan:
A Pattern-aware Design and Implementation Guideline for Microservice-based Systems. 1-6 - Nasim Tohidi

, Seyed Mohammad Hossein Hasheminejad
:
A Practice of Human-Machine Collaboration for Persian Text Summarization. 1-5 - Atefeh Nirumand, Bahman Zamani, Behrouz Tork Ladani:

A Model-Based Approach for Representing Data Sharing Mechanism in Android Applications. 1-7 - Negin Samadi

, Jafar Tanha, Sahar Hassanzadeh Mostafaei
, Nazila Razzaghi-Asl, Soodabeh Imanzadeh:
Spreader node detection based on the Perron-Frobenius theorem in complex networks. 1-5 - Mohsen Meamarian, Naser Yazdani:

A Robust, Lightweight Deep Learning Approach for Detection and Mitigation of DDoS Attacks in SDN. 1-7 - Mohammad Zolfaghari, Hedieh Sajedi:

Unsupervised Anomaly Detection with an Enhanced Teacher for Student-Teacher Feature Pyramid Matching. 1-4 - Jafar Abdollahi

, Laya Mahmoudi
:
An Artificial Intelligence System for Detecting the Types of the Epidemic from X-rays : Artificial Intelligence System for Detecting the Types of the Epidemic from X-rays. 1-6 - Ali Soleymani

, Seyed Hossein Ghoreishi:
Controlling the Pandemic of COVID-19 based on Telecommunication Data. 1-7 - Zahra Boreiri

, Alireza Norouzi Azad
, Amin Ghodousian:
A Convolutional Neuro-Fuzzy Network Using Fuzzy Image Segmentation for Acute Leukemia Classification. 1-7 - Amin Najafgholizadeh, Arman Nasirkhani, Hamid Reza Mazandarani

, Hamid Reza Soltanalizadeh, Mohammad Sabokrou:
Imaging Time Series for Deep Embedded Clustering: a Cryptocurrency Regime Detection Use Case. 1-6 - Motahareh Mohammad Rezai, Mohammad Ali Zare Chahooki:

Group recommendation in Telegram by membership graph analyzing. 1-7 - Peyman Hosseini, Alireza Basiri

:
GRACER: Improving the Accuracy of RACER Classifier Using A Greedy Approach. 1-6 - Fatemeh Pazoki, Amir Mousavinia, Fatemeh Abdoni:

Accelerated 4PCS Algorithm for Point Cloud Registration. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














