Loading...
Search for: memory-networks
0.01 seconds

    A fuzzy learning model for retrieving and learning information in visual working brain memory mechanism

    , Article 2017 25th Iranian Conference on Electrical Engineering, ICEE 2017, 2 May 2017 through 4 May 2017 ; 2017 , Pages 61-64 ; 9781509059638 (ISBN) Tajrobehkar, M ; Bagheri Shouraki, S ; Jahed, M ; Sharif University of Technology
    Abstract
    In this investigation, the idea of Visual Working Memory (VWM) mechanism modeling based on versatile fuzzy method; Active Learning method, is presented. Visual information process; retrieving and learning rely on the use of Ink Drop Spread (IDS) and Center of Gravity (COG) as spatial density convergence operators. IDS modeling is characterized by processing that uses intuitive pattern information instead of complex formulas, and it is capable of stable and fast convergence. Furthermore, because it approves that distortion in retrieving irrelative data is adaptive to avoid storing lots of repetitive external information in daily visualization. Subsequently, this distortion is analyzed via two... 

    A Persian Dialog System with Sequence to Sequence Learning

    , M.Sc. Thesis Sharif University of Technology Ghafourian, Mohammad (Author) ; Sameti, Hossein (Supervisor)
    Abstract
    Conversation modeling is one of the most important goals in the field of understanding natural language and machine intelligence. Recently, with the enormous growth of the Internet and social networks, the amount of available data on the Web has increased significantly.This makes it possible to use data-driven approaches to solve the modeling problem of conversation.One of the most recent data-driven methods is the sequence to sequence modeling. In this document, after providing the necessary prerequisites, we examined the various models that have used the sequence to sequence approach for conversation modeling. We further examined the ways of improving the efficiency of this modeling... 

    A content-based deep intrusion detection system

    , Article International Journal of Information Security ; 2021 ; 16155262 (ISSN) Soltani, M ; Siavoshani, M. J ; Jahangir, A. H ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2021
    Abstract
    The growing number of Internet users and the prevalence of web applications make it necessary to deal with very complex software and applications in the network. This results in an increasing number of new vulnerabilities in the systems, and leading to an increase in cyber threats and, in particular, zero-day attacks. The cost of generating appropriate signatures for these attacks is a potential motive for using machine learning-based methodologies. Although there are many studies on using learning-based methods for attack detection, they generally use extracted features and overlook raw contents. This approach can lessen the performance of detection systems against content-based attacks... 

    Deep long short-term memory (LSTM) networks for ultrasonic-based distributed damage assessment in concrete

    , Article Cement and Concrete Research ; Volume 162 , 2022 ; 00088846 (ISSN) Ranjbar, I ; Toufigh, V ; Sharif University of Technology
    Elsevier Ltd  2022
    Abstract
    This paper presented a comprehensive study on developing a deep learning approach for ultrasonic-based distributed damage assessment in concrete. In particular, two architectures of long short-term memory (LSTM) networks were proposed: (1) a classification model to evaluate the concrete's damage stage; (2) a regression model to predict the concrete's absorbed energy ratio. Two input configurations were considered and compared for both architectures: (1) the input was a single signal; (2) the inputs were four signals from four sides of the specimen. A comprehensive experimental study was designed and conducted on ground granulated blast furnace slag-based geopolymer concrete, providing a... 

    A content-based deep intrusion detection system

    , Article International Journal of Information Security ; Volume 21, Issue 3 , 2022 , Pages 547-562 ; 16155262 (ISSN) Soltani, M ; Siavoshani, M. J ; Jahangir, A. H ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2022
    Abstract
    The growing number of Internet users and the prevalence of web applications make it necessary to deal with very complex software and applications in the network. This results in an increasing number of new vulnerabilities in the systems, and leading to an increase in cyber threats and, in particular, zero-day attacks. The cost of generating appropriate signatures for these attacks is a potential motive for using machine learning-based methodologies. Although there are many studies on using learning-based methods for attack detection, they generally use extracted features and overlook raw contents. This approach can lessen the performance of detection systems against content-based attacks... 

    LSTM-Based ecg classification for continuous monitoring on personal wearable devices

    , Article IEEE Journal of Biomedical and Health Informatics ; Volume 24, Issue 2 , 2020 , Pages 515-523 Saadatnejad, S ; Oveisi, M ; Hashemi, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Objective: A novel electrocardiogram (ECG) classification algorithm is proposed for continuous cardiac monitoring on wearable devices with limited processing capacity. Methods: The proposed solution employs a novel architecture consisting of wavelet transform and multiple long short-term memory (LSTM) recurrent neural networks (see Fig. 1). Results: Experimental evaluations show superior ECG classification performance compared to previous works. Measurements on different hardware platforms show the proposed algorithm meets timing requirements for continuous and real-time execution on wearable devices. Conclusion: In contrast to many compute-intensive deep-learning based approaches, the...