Skip to main content

Research Repository

Advanced Search

Outputs (187)

An unsupervised aspect detection model for sentiment analysis of reviews (2013)
Journal Article
Bagheri, A., Saraee, M., & Jong, F. (2013). An unsupervised aspect detection model for sentiment analysis of reviews. Lecture notes in computer science, 7934, 140-151. https://doi.org/10.1007/978-3-642-38824-8_12

With the rapid growth of user-generated content on the internet, sentiment analysis of online reviews has become a hot research topic recently, but due to variety and wide range of products and services, the supervised and domain-specific models are... Read More about An unsupervised aspect detection model for sentiment analysis of reviews.

A multi-armed bandit approach to cost-sensitive decision tree learning (2012)
Presentation / Conference
Lomax, S., Vadera, S., & Saraee, M. (2012, December). A multi-armed bandit approach to cost-sensitive decision tree learning. Presented at 2012 IEEE 12th International Conference on Data Mining Workshops, Brussels, Belgium

Several authors have studied the problem of inducing decision trees that aim to minimize costs of misclassification and take account of costs of tests. The approaches adopted vary from modifying the information theoretic attribute selection measure u... Read More about A multi-armed bandit approach to cost-sensitive decision tree learning.

Privacy preserving mining of association rules on horizontally distributed databases (2012)
Presentation / Conference
distributed databases. Presented at International Conference on Software and Computer Applications ICSCA 2012, Singapore

These protocols are based on two main approaches named as: the Randomization approach and the Cryptographic approach. The first one is based on perturbation of the valuable information while the second one uses cryptographic techniques. The randomiza... Read More about Privacy preserving mining of association rules on horizontally distributed databases.

A new method for compressing massive RFID data to achieve efficient mining (2012)
Journal Article
Hafezi, L., Saraee, M., & Montazeri, M. (2012). A new method for compressing massive RFID data to achieve efficient mining. International journal of computer theory and engineering (Print), 4(5), 694-696. https://doi.org/10.7763/IJCTE.2012.V4.559

Radio Frequency Identification (RFID) technology has been used for many purposes and has had effective results. This technology eases and accelerates many applications, but it has proposed a challenge, and that is the production of such a volume of d... Read More about A new method for compressing massive RFID data to achieve efficient mining.

Robust and cost-effective approach for discovering action rules (2011)
Journal Article
Kalanat, N., Shamsinejad, P., & Saraee, M. (2011). Robust and cost-effective approach for discovering action rules. International journal of machine learning and computing (Online), 1(4), 325-331. https://doi.org/10.7763/IJMLC.2011.V1.48

The main goal of Knowledge Discovery in
Databases is to find interesting and usable patterns, meaningful
in their domain. Actionable Knowledge Discovery came to
existence as a direct respond to the need of finding more usable
patterns called acti... Read More about Robust and cost-effective approach for discovering action rules.

Hybrid rule threshold adjustment system for intrusion detection (2011)
Presentation / Conference
Moghimi, M., & Saraee, M. (2011, September). Hybrid rule threshold adjustment system for intrusion detection. Presented at The 8th International ISC Conference on Information Security and Cryptology (ISCISC 2011), September 14-15, 2011 - Ferdowsi University of Mashhad,, Mashhad, Iran

Generally, multiple IDSs generates huge volume of alerts every minute and to manage these alerts, rule-based alert management systems are very important. It is critical to keep the rules inside these systems updated, based on the ever changing networ... Read More about Hybrid rule threshold adjustment system for intrusion detection.

Hybrid rule threshold adjustment system for intrusion detection (2011)
Presentation / Conference
Moghimi, M., & Saraee, M. (2011, September). Hybrid rule threshold adjustment system for intrusion detection. Presented at The 8th International ISC Conference on Information Security and Cryptology (ISCISC 2011), September 14-15, 2011 - Ferdowsi University of Mashhad,, Mashhad, Iran

Generally, multiple IDSs generates huge volume of alerts every minute and to manage these alerts, rule-based alert management systems are very important. It is critical to keep the rules inside these systems updated, based on the ever changing networ... Read More about Hybrid rule threshold adjustment system for intrusion detection.

Modeling batch annealing process using data mining techniques for cold rolled steel sheets (2011)
Presentation / Conference
Saraee, M., Moghimi, M., & Bagheri, A. (2011, August). Modeling batch annealing process using data mining techniques for cold rolled steel sheets. Presented at The 17th Annual ACM SIGKDD Conference on Knowledge Discovery and Data Mining, San Diego

The annealing process is one of the important operations in production of cold rolled steel sheets, which significantly influences the final product quality of cold rolling mills. In this process, cold rolled coils are heated slowly to a desired temp... Read More about Modeling batch annealing process using data mining techniques for cold rolled steel sheets.

Examination of the online reputation systems problems and provide solution (2011)
Presentation / Conference
Ehghaghi Kakoli, Z., Nematbakhsh, M., & Saraee, M. (2011, August). Examination of the online reputation systems problems and provide solution. Presented at 13th IEEE Joint International Computer Science and Information Technology Conference (JICSIT 2011), Chongqing, China

Electronic commerce communities are considered to
be communities that provide opportunities for the sellers on
the one hand and include threats for the purchasers on the
other hand. One of the ways to reduce such threats in these
open communities... Read More about Examination of the online reputation systems problems and provide solution.