Hossein Shirazi
Malek-Ashtar University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Hossein Shirazi.
ACM Computing Surveys | 2017
Ahmad Abdollahzadeh Barforoush; Hossein Shirazi; Hojjat Emami
Recently, we have witnessed entity profiling (EP) becoming increasingly one of the most important topics in information extraction, personalized applications, and web data analysis. EP aims to identify, extract, and represent a compact summary of valuable information about an entity based on the data related to it. To determine how EP systems have developed, during the last few years, this article reviews EP systems through a survey of the literature, from 2000 to 2015. To fulfill this aim, we introduce a comparison framework to compare and classify EP systems. Our comparison framework is composed of thirteen criteria that include: profiling source, the entity being modeled, the information that constitutes the profile, representation schema, profile construction technique, scale, scope/target domain, language, updating mechanism, enrichment technique, dynamicity, evaluation method, and application among others. Then, using the comparison framework, we discuss the recent development of the field and list some of the open problems and main trends that have emerged in EP to provide a proper guideline for researchers to develop or use robust profiling systems with suitable features according to their needs.
Journal of Information Science | 2018
Sina Dami; Ahmad Abdollahzadeh Barforoush; Hossein Shirazi
Predicting future events from text data has been a controversial and much disputed topic in the field of text analytics. However, far too little attention has been paid to efficient prediction in textual environments. This study has aimed to develop a novel and efficient method for news event prediction. The proposed method is based on Markov logic networks (MLNs) framework, which enables us to concisely represent complex events by full expressivity of first-order logic (FOL), as well as to reason uncertain event with probabilities. In our framework, we first extract text news events via an event representation model at a semantic level and then transform them into web ontology language (OWL) as a posteriori knowledge. A set of domain-specific causal rules in FOL associated with weights were also fed into the system as a priori (common-sense) knowledge. Additionally, several large-scale ontologies including DBpedia, VerbNet and WordNet were used to model common-sense logic rules as contextual knowledge. Finally, all types of such knowledge were integrated into OWL for performing causal inference. The resulted OWL knowledge base is augmented by MLN, which uses weighted first-order formulas to represent probabilistic knowledge. Empirical evaluation of real news showed that our method of news event prediction was better than the baselines in terms of precision, coverage and diversity.
Neural Computing and Applications | 2018
Afshin Rezakhani; Hossein Shirazi; Nasser Modiri
Nowadays, one of the problems in current authentication, authorization and accounting (AAA) model is lack of accurate roadmap of access management in integrated applications based on operational needs. In the current systems, attributes are used as effective parameters of AAA in static form. We want to present that, in order to have an efficient AAA model, we should consider AAA requirements via multilayers security policies. In this paper, a comprehensive approach is represented which defines designing AAA not only for operational and implementation level, but also in the enterprise level. In this regard, the proposed model provides all security requirements for the establishment of appropriate application-level AAA. Some of these requirements must be obtained from regulations and threat modeling, and some of other are calculated by business processes and also operational levels. According to proposed multilayer approach, the evaluation must be considered in several dimensions. So, we’ll evaluate several aspects of the proposed model. The results show that the proposed model covers many security requirements as well. It can also be useful to enhance the information security in integrated applications.
ieee international conference on advanced management science | 2010
Zhaleh Alimoradi; Hossein Shirazi; Samad Noorizad; Alireza Khatoni
Considering electronic service providing and extending it, main priorities of senior level information managers in big Enterprises in the recent years, designing and execution of portals is an efficient, known platform for substructure of service providing and combining operating system which assist in consolidation of available data and allows the further usage of them. The service oriented architecture is a school of software architecture that is built on the basis of weak connection of software components and is extending rapidly. It is an architectural model with the aim of free connection between software factors which are related to each other. Also a web service is one of the best solutions to execute service oriented architecture. The methodology of service oriented architecture meets the needs of the Enterprises that their projects are shaped on the basis of methods and steps and their products, guides and procedures shall be standard. This is due to the portals capability of consolidated informing and service providing which by itself provides the necessary background for service providing to public.
Expert Systems With Applications | 2011
Ali Shemshadi; Hossein Shirazi; Mehran Toreihi; Mohammad J. Tarokh
Majlesi Journal of Electrical Engineering | 2010
Hossein Shirazi; Y. Kalaji
Journal of Mathematics and Computer Science | 2011
Ali Shemshadi; Mehran Toreihi; Hossein Shirazi; Mohammad J. Tarokh; Malek Ashtar
Majlesi Journal of Electrical Engineering | 2011
Mansour Sheikhan; Maryam Sharifi Rad; Hossein Shirazi
International Journal of Enterprise Information Systems | 2015
Babak Darvish Rouhani; Mohd Naz’ri Mahrin; Hossein Shirazi; Fatemeh Nikpay; Bita Darvish Rouhani
Expert Systems With Applications | 2009
Rodrigo Martínez-Béjar; José Manuel Cadenas; Hossein Shirazi; Paul Compton