Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2023
Deep neural ranking model using distributed smoothing
Expert Systems with Applications: An International Journal (EXWA), Volume 224, Issue Chttps://doi.org/10.1016/j.eswa.2023.119913AbstractInformation Retrieval (IR) provides access to unstructured data to satisfy user information needs within an extensive collection. In probabilistic IR models, the probability of an N-gram query is estimated by increasing the background ...
Highlights- Providing a comprehensive study on ranking models in text information retrieval.
- research-articleJanuary 2023
Finding Hamiltonian cycles of truncated rectangular grid graphs in linear time
Applied Mathematics and Computation (APMC), Volume 436, Issue Chttps://doi.org/10.1016/j.amc.2022.127513Highlights- In this paper, we consider the problem of finding a Hamiltonian cycle for truncated rectangular grid graphs.
The Hamiltonian cycle problem is an important problem in graph theory. For solid grid graphs, an O ( n 4 )-time algorithm has been given. In this paper, we solve the problem for a special class of solid grid graphs, i.e. truncated ...
- research-articleMarch 2021
- research-articleMarch 2021
CFIN: A community-based algorithm for finding influential nodes in complex social networks
The Journal of Supercomputing (JSCO), Volume 77, Issue 3Pages 2207–2236https://doi.org/10.1007/s11227-020-03355-2AbstractInfluence maximization (IM) problem, a fundamental algorithmic problem, is the problem of selecting a set of k users (refer as seed set) from a social network to maximize the expected number of influenced users (also known as influence spread). ...
- research-articleFebruary 2020
Linear-time algorithms for finding Hamiltonian and longest ( s , t )-paths in C-shaped grid graphs
AbstractThe longest and Hamiltonian path problems are well-known NP-hard problems in graph theory. Despite many applications of these problems, they are still open for many classes of graphs, including solid grid graphs and grid graphs with ...
-
- articleApril 2019
Indoor navigation systems based on data mining techniques in internet of things: a survey
Wireless Networks (WIRE), Volume 25, Issue 3Pages 1385–1402https://doi.org/10.1007/s11276-018-1766-4Internet of Things (IoT) is turning into an essential part of daily life, and numerous IoT-based scenarios will be seen in future of modern cities ranging from small indoor situations to huge outdoor environments. In this era, navigation continues to be ...
- research-articleApril 2018
Training Probabilistic Spiking Neural Networks with First- To-Spike Decoding
2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)Pages 2986–2990https://doi.org/10.1109/ICASSP.2018.8462410Third-generation neural networks, or Spiking Neural Networks (SNNs), aim at harnessing the energy efficiency of spike-domain processing by building on computing elements that operate on, and exchange, spikes. In this paper, the problem of training a two-...
- articleSeptember 2017
A linear-time algorithm for finding Hamiltonian (s, t)-paths in odd-sized rectangular grid graphs with a rectangular hole
The Journal of Supercomputing (JSCO), Volume 73, Issue 9Pages 3821–3860https://doi.org/10.1007/s11227-017-1984-zA grid graph $$G_{\mathrm{g}}$$Gg is a finite vertex-induced subgraph of the two-dimensional integer grid $$G^\infty $$Gź. A rectangular grid graph R(m, n) is a grid graph with horizontal size m and vertical size n. A rectangular grid graph with a ...
- research-articleAugust 2017
Presenting novel application-based centrality measures for finding important users based on their activities and social behavior
Computers in Human Behavior (COHB), Volume 73, Issue CPages 64–79https://doi.org/10.1016/j.chb.2017.03.014There are more important relationships based on users' behavior and the done activities than those of friendship in online social networks. Study of social behavior of users in these networks has many applications. Analyzing online social networks' ...
- articleApril 2017
Embedding cycles and paths on solid grid graphs
The Journal of Supercomputing (JSCO), Volume 73, Issue 4Pages 1322–1336https://doi.org/10.1007/s11227-016-1811-yDespite many algorithms for embedding graphs on unbounded grids, only a few results on embedding graphs on restricted grids have been published. In this paper, we study the problem of embedding paths and cycles on solid grid graphs. We show that a cycle ...
- research-articleOctober 2016
Presenting new collaborative link prediction methods for activity recommendation in Facebook
Neurocomputing (NEUROC), Volume 210, Issue CPages 217–226https://doi.org/10.1016/j.neucom.2016.06.024One of the common methods used in recommender systems is collaborative filtering methods. In these methods, same-interest users' preferences are often recommended to each other based on examining their past interests. On the other hand, one of the ...
- articleOctober 2016
Biased sampling from facebook multilayer activity network using learning automata
Applied Intelligence (KLU-APIN), Volume 45, Issue 3Pages 829–849https://doi.org/10.1007/s10489-016-0784-0Although much research has been devoted to unbiased sampling of various networks, bias is not always disadvantageous, but sometimes useful. Especially for many real-world applications such as detecting influential nodes, spam users, and the most ...
- articleOctober 2016
An $$O(n^2)$$O(n2) Algorithm for the Limited-Capacity Many-to-Many Point Matching in One Dimension
Given two point sets S and T, in a many-to-many matching between S and T each point in S is assigned to one or more points in T and vice versa. A generalization of the many-to-many matching problem is the limited capacity many-to-many matching problem, ...
- research-articleSeptember 2016
A limited memory quasi-Newton trust-region method for box constrained optimization
Journal of Computational and Applied Mathematics (JCAM), Volume 303, Issue CPages 105–118https://doi.org/10.1016/j.cam.2016.02.026By means of Wolfe conditions strategy, we propose a quasi-Newton trust-region method to solve box constrained optimization problems. This method is an adequate combination of the compact limited memory BFGS and the trust-region direction while the ...
- research-articleMay 2016
An approximation algorithm for the longest cycle problem in solid grid graphs
Discrete Applied Mathematics (DAMA), Volume 204, Issue CPages 6–12https://doi.org/10.1016/j.dam.2015.10.022Although, the Hamiltonicity of solid grid graphs are polynomial-time decidable, the complexity of the longest cycle problem in these graphs is still open. In this paper, by presenting a linear-time constant-factor approximation algorithm, we show that ...
- articleMay 2016
An approximation algorithm for the longest path problem in solid grid graphs
The longest path problem is a well-known NP-hard problem which can be used to model and solve some optimization problems. There are only a few classes of graphs for which this problem can be solved polynomially. In addition, the results show that the ...
- research-articleApril 2016
Energy detection based spectrum sensing over enriched multipath fading channels
- Alireza Bagheri,
- Paschalis C. Sofotasios,
- Theodoros A. Tsiftsis,
- Khuong Ho-Van,
- Michael I. Loupis,
- Steven Freear,
- Mikko Valkama
2016 IEEE Wireless Communications and Networking ConferencePages 1–6https://doi.org/10.1109/WCNC.2016.7565141Energy detection has been for long constituting the most popular sensing method in RADAR and cognitive radio systems. The present paper investigates the sensing behaviour of an energy detector over Hoyt fading channels, which have been extensively shown ...
- research-articleMarch 2016
Hamiltonian paths in L-shaped grid graphs
Theoretical Computer Science (TCSC), Volume 621, Issue CPages 37–56https://doi.org/10.1016/j.tcs.2016.01.024Grid graphs are subgraphs of the infinite 2-dimensional integer grid. The Hamiltonian path problem for general grid graphs is a well-known NP-complete problem. In this paper, we present necessary and sufficient conditions for the existence of a ...
- research-articleAugust 2015
Area under ROC curve of energy detection over generalized fading channels
- Alireza Bagheri,
- Paschalis C. Sofotasios,
- Theodoros A. Tsiftsis,
- Ali Shahzadi,
- Steven Freear,
- Mikko Valkama
2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)Pages 656–661https://doi.org/10.1109/PIMRC.2015.7343380A fast and reliable detection scheme is essential in several wireless applications such as radar and cognitive radio systems. Energy detection is such a method as it does not require a priori information of the received signal while it exhibits low ...
- research-articleAugust 2015
An efficient distributed max-flow algorithm for Wireless Sensor Networks
Journal of Network and Computer Applications (JNCA), Volume 54, Issue CPages 20–32https://doi.org/10.1016/j.jnca.2015.04.004The max-flow problem (MFP) is one of the most explored problems in the area of combinatorial optimization and it has a wide variety of potential applications in computer networks, especially in Wireless Sensor Networks (WSNs). In this paper, we propose ...