Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hossein Shirazi is active.

Publication


Featured researches published by Hossein Shirazi.


ACM Computing Surveys | 2017

A New Classification Framework to Evaluate the Entity Profiling on the Web: Past, Present and Future

Ahmad Abdollahzadeh Barforoush; Hossein Shirazi; Hojjat Emami

Recently, we have witnessed entity profiling (EP) becoming increasingly one of the most important topics in information extraction, personalized applications, and web data analysis. EP aims to identify, extract, and represent a compact summary of valuable information about an entity based on the data related to it. To determine how EP systems have developed, during the last few years, this article reviews EP systems through a survey of the literature, from 2000 to 2015. To fulfill this aim, we introduce a comparison framework to compare and classify EP systems. Our comparison framework is composed of thirteen criteria that include: profiling source, the entity being modeled, the information that constitutes the profile, representation schema, profile construction technique, scale, scope/target domain, language, updating mechanism, enrichment technique, dynamicity, evaluation method, and application among others. Then, using the comparison framework, we discuss the recent development of the field and list some of the open problems and main trends that have emerged in EP to provide a proper guideline for researchers to develop or use robust profiling systems with suitable features according to their needs.


Journal of Information Science | 2018

News events prediction using Markov logic networks

Sina Dami; Ahmad Abdollahzadeh Barforoush; Hossein Shirazi

Predicting future events from text data has been a controversial and much disputed topic in the field of text analytics. However, far too little attention has been paid to efficient prediction in textual environments. This study has aimed to develop a novel and efficient method for news event prediction. The proposed method is based on Markov logic networks (MLNs) framework, which enables us to concisely represent complex events by full expressivity of first-order logic (FOL), as well as to reason uncertain event with probabilities. In our framework, we first extract text news events via an event representation model at a semantic level and then transform them into web ontology language (OWL) as a posteriori knowledge. A set of domain-specific causal rules in FOL associated with weights were also fed into the system as a priori (common-sense) knowledge. Additionally, several large-scale ontologies including DBpedia, VerbNet and WordNet were used to model common-sense logic rules as contextual knowledge. Finally, all types of such knowledge were integrated into OWL for performing causal inference. The resulted OWL knowledge base is augmented by MLN, which uses weighted first-order formulas to represent probabilistic knowledge. Empirical evaluation of real news showed that our method of news event prediction was better than the baselines in terms of precision, coverage and diversity.


Neural Computing and Applications | 2018

A novel multilayer AAA model for integrated applications

Afshin Rezakhani; Hossein Shirazi; Nasser Modiri

Nowadays, one of the problems in current authentication, authorization and accounting (AAA) model is lack of accurate roadmap of access management in integrated applications based on operational needs. In the current systems, attributes are used as effective parameters of AAA in static form. We want to present that, in order to have an efficient AAA model, we should consider AAA requirements via multilayers security policies. In this paper, a comprehensive approach is represented which defines designing AAA not only for operational and implementation level, but also in the enterprise level. In this regard, the proposed model provides all security requirements for the establishment of appropriate application-level AAA. Some of these requirements must be obtained from regulations and threat modeling, and some of other are calculated by business processes and also operational levels. According to proposed multilayer approach, the evaluation must be considered in several dimensions. So, we’ll evaluate several aspects of the proposed model. The results show that the proposed model covers many security requirements as well. It can also be useful to enhance the information security in integrated applications.


ieee international conference on advanced management science | 2010

Notice of Retraction Design portal Enterprise services using Enterprise architecture methodology (case study : Portal Kermanshah University of Medical Sciences)

Zhaleh Alimoradi; Hossein Shirazi; Samad Noorizad; Alireza Khatoni

Considering electronic service providing and extending it, main priorities of senior level information managers in big Enterprises in the recent years, designing and execution of portals is an efficient, known platform for substructure of service providing and combining operating system which assist in consolidation of available data and allows the further usage of them. The service oriented architecture is a school of software architecture that is built on the basis of weak connection of software components and is extending rapidly. It is an architectural model with the aim of free connection between software factors which are related to each other. Also a web service is one of the best solutions to execute service oriented architecture. The methodology of service oriented architecture meets the needs of the Enterprises that their projects are shaped on the basis of methods and steps and their products, guides and procedures shall be standard. This is due to the portals capability of consolidated informing and service providing which by itself provides the necessary background for service providing to public.


Expert Systems With Applications | 2011

A fuzzy VIKOR method for supplier selection based on entropy measure for objective weighting

Ali Shemshadi; Hossein Shirazi; Mehran Toreihi; Mohammad J. Tarokh


Majlesi Journal of Electrical Engineering | 2010

An Intelligent Intrusion Detection System Using Genetic Algorithms and Features Selection

Hossein Shirazi; Y. Kalaji


Journal of Mathematics and Computer Science | 2011

Supplier selection based on supplier risk: An ANP and fuzzy TOPSIS approach

Ali Shemshadi; Mehran Toreihi; Hossein Shirazi; Mohammad J. Tarokh; Malek Ashtar


Majlesi Journal of Electrical Engineering | 2011

APPLICATION OF FUZZY ASSOCIATION RULES-BASED FEATURE SELECTION AND FUZZY ARTMAP TO INTRUSION DETECTION

Mansour Sheikhan; Maryam Sharifi Rad; Hossein Shirazi


International Journal of Enterprise Information Systems | 2015

An Effectiveness Model for Enterprise Architecture Methodologies

Babak Darvish Rouhani; Mohd Naz’ri Mahrin; Hossein Shirazi; Fatemeh Nikpay; Bita Darvish Rouhani


Expert Systems With Applications | 2009

A semantics-driven, fuzzy logic-based approach to knowledge representation and inference

Rodrigo Martínez-Béjar; José Manuel Cadenas; Hossein Shirazi; Paul Compton

Collaboration


Dive into the Hossein Shirazi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Paul Compton

University of New South Wales

View shared research outputs
Top Co-Authors

Avatar

Babak Darvish Rouhani

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mohd Naz’ri Mahrin

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge