﻿<?xml version="1.0" encoding="utf-8"?><records><record><language>per</language><publisher>  Iranian Research Institute for Electrical Engineering</publisher><journalTitle>فصلنامه مهندسی برق و مهندسی کامپيوتر ايران</journalTitle><issn>16823745</issn><eissn>16823745</eissn><publicationDate>2023-07</publicationDate><volume>21</volume><issue>1</issue><startPage>1</startPage><endPage>17</endPage><documentType>article</documentType><title language="eng">Detection and Recovery of Corrupted Images After High Rate of Tampering Attacks</title><authors><author><name>Faranak Tohidi</name><email>ftohidi@stu.yazd.ac.ir</email><affiliationId>1</affiliationId></author><author><name>Mohammad Reza Hooshmandasl</name><email>hooshmandasl@uma.ac.ir</email><affiliationId>2</affiliationId></author></authors><affiliationsList><affiliationName affiliationId="1">Yazd University</affiliationName><affiliationName affiliationId="2" /></affiliationsList><abstract language="eng">In recent years, illegally copying digital images and even manipulating them, without great loss of quality and at a low cost has been made possible. Watermarking has recently been developed as one of the methods to detect that tampering has occurred and even enable some recovery of the original images. However, there are still many issues to resolve in providing an effective watermark that can detect and recover a wide range of manipulations. Furthermore, the accuracy of detecting and the capability of the recovery of the original images by existing methods are still not at an acceptable level. These problems are more critical when certain high-rate manipulation attacks occur. In this paper, a watermarking method will be introduced that not only is able to detect any tampering, but also can successfully recover the original images in high quality, even at high tampering rates. In this method, Singular Value Decomposition (SVD) is used to detect tampering and Optimal Iterative Block Truncation Coding (OIBTC) has also been applied to recover lost data. This paper proposes a powerful way to increase detection sensitivity while increasing watermark resistance for the effective recovery of corrupted images. The results prove the superiority of the proposed method over current methods.92% of tasks are executed successfully in the edge environment.</abstract><fullTextUrl>http://ijece.org/Article/29205</fullTextUrl><keywords><keyword>Watermarking</keyword><keyword> tamper detection</keyword><keyword> data recovery</keyword><keyword> image recovery</keyword></keywords></record><record><language>per</language><publisher>  Iranian Research Institute for Electrical Engineering</publisher><journalTitle>فصلنامه مهندسی برق و مهندسی کامپيوتر ايران</journalTitle><issn>16823745</issn><eissn>16823745</eissn><publicationDate>2023-07</publicationDate><volume>21</volume><issue>1</issue><startPage>18</startPage><endPage>26</endPage><documentType>article</documentType><title language="eng">Stock Price Movement Prediction Using Directed Graph Attention Network</title><authors><author><name>Alireza Jafari</name><email>alireza109977@gmail.com</email><affiliationId>1</affiliationId></author><author><name>Saman Haratizadeh</name><email>haratizadeh@ut.ac.ir</email><affiliationId>2</affiliationId></author></authors><affiliationsList><affiliationName affiliationId="1">University of Tehran</affiliationName><affiliationName affiliationId="2">University of Tehran</affiliationName></affiliationsList><abstract language="eng">Prediction of the future behavior of the stock market has always attracted researchers' attention as an important challenge in the field of machine learning. In recent years deep learning methods have been successfully applied in this domain to improve prediction performance. Previous studies have demonstrated that aggregating information from related stocks can improve the performance of prediction. However, the capacity of modeling the stocks relations as directed graphs and the power of sophisticated graph embedding techniques such as Graph Attention Networks have not been exploited so far for prediction in this domain. In this work, we introduce a framework called DeepNet that creates a directed graph representing how useful the data from each stock can be for improving the prediction accuracy of any other stocks.  DeepNet then applies Graph Attention Network to extract a useful representation for each node by aggregating information from its neighbors, while the optimal amount of each neighbor's contribution is learned during the training phase. We have developed a novel Graph Attention Network model called DGAT that is able to define unequal contribution values for each pair of adjacent nodes in a directed graph. Our evaluation experiments on the Tehran Stock Exchange data show that the introduced prediction model outperforms the state-of-the-art baseline algorithms in terms of accuracy and MCC measures.</abstract><fullTextUrl>http://ijece.org/Article/36319</fullTextUrl><keywords><keyword>Stock prediction</keyword><keyword> graph attention network</keyword><keyword> network-based model</keyword><keyword> graph neural network</keyword><keyword> deep learning</keyword></keywords></record><record><language>per</language><publisher>  Iranian Research Institute for Electrical Engineering</publisher><journalTitle>فصلنامه مهندسی برق و مهندسی کامپيوتر ايران</journalTitle><issn>16823745</issn><eissn>16823745</eissn><publicationDate>2023-07</publicationDate><volume>21</volume><issue>1</issue><startPage>27</startPage><endPage>38</endPage><documentType>article</documentType><title language="eng">Maintaining Confidentiality and Integrity of Data and Preventing Unauthorized Access to DICOM Medical Images</title><authors><author><name>Mohammad Soltani</name><email>mohammad.soltani@mshdiau.ac.ir</email><affiliationId>1</affiliationId></author><author><name> Hassan Shakeri</name><email>shakeri@mshdiau.ac.ir</email><affiliationId>2</affiliationId></author><author><name> Mahboobeh Houshmand</name><email>houshmand@mshdiau.ac.ir</email><affiliationId>3</affiliationId></author></authors><affiliationsList><affiliationName affiliationId="1">Department of Computer Engineering, Mashhad Branch, Islamic Azad University, Mashhad, Iran</affiliationName><affiliationName affiliationId="2">Department of Computer Engineering, Mashhad Branch, Islamic Azad University, Mashhad, Iran</affiliationName><affiliationName affiliationId="3">Department of Computer Engineering, Mashhad Branch, Islamic Azad University, Mashhad, Iran</affiliationName></affiliationsList><abstract language="eng">With the development of telecommunication and communication technologies, especially wireless communications, information cryptography is one of the communication necessities. Today, cryptographic algorithms are used to increase security and prevent DICOM medical images from unauthorized access. It should be noted that changes in DICOM medical images will cause the doctor to misdiagnose the patient's treatment process. In this paper, a type of hybrid cryptographic algorithms is designed. In the proposed algorithm, DNA encryption algorithm is used to encrypt DICOM images and patient biometric information such as fingerprint or iris image is used to make digital signature and validate DICOM medical images. The designed encryption algorithm is resistant to brute force attacks and the entropy of the encrypted DICOM images is above 7.99.</abstract><fullTextUrl>http://ijece.org/Article/33140</fullTextUrl><keywords><keyword>DICOM</keyword><keyword> cryptography</keyword><keyword> security</keyword><keyword> patient's biometric information</keyword><keyword> DNA encryption algorithm</keyword><keyword> digital signature</keyword></keywords></record><record><language>per</language><publisher>  Iranian Research Institute for Electrical Engineering</publisher><journalTitle>فصلنامه مهندسی برق و مهندسی کامپيوتر ايران</journalTitle><issn>16823745</issn><eissn>16823745</eissn><publicationDate>2023-07</publicationDate><volume>21</volume><issue>1</issue><startPage>39</startPage><endPage>48</endPage><documentType>article</documentType><title language="eng">Synthesis and Implementation of Reversible Circuits Using all-optical Switch of Mach-Zehnder Switch (MZI)</title><authors><author><name>yasser Sohrabi</name><email>yaser.sohrabi99@yahoo.com</email><affiliationId>1</affiliationId></author><author><name>M. hooshmand</name><email>m.hooshmand@imamreza.ac.ir</email><affiliationId>2</affiliationId></author><author><name>Mohammad boloukian</name><email>mohammad.bolokian@yahoo.com</email><affiliationId>3</affiliationId></author><author><name>Maryam Moosavi</name><email>m.m.engineer1396@gmail.com</email><affiliationId>4</affiliationId></author></authors><affiliationsList><affiliationName affiliationId="1" /><affiliationName affiliationId="2">دانشگاه بین المللی امام رضا(ع) مشهد</affiliationName><affiliationName affiliationId="3">PHD STUDENT</affiliationName><affiliationName affiliationId="4" /></affiliationsList><abstract language="eng">VLSI technology is currently dealing with a serious challenge, as the exponential growth of density in VLSI and CMOS chips has reached its limit. Power dissipation in VLSI chip refers to heat generation, which is a real barrier against traditional CMOS technology. Irreversible logic leads to problems such as energy dissipation, heat generation, information loss and slow computations. We need a new technology for solving these problems. Using reversible logic can help solve this problem. In next generation of optical computers, electrical circuits and wires will be replaced by several optical fibers and these systems will be more efficient because they will be cheaper, lighter, and more compact without interference. Based on optical computations, several optical switches have been proposed for future applications. One of these switches is the Mach-Zehnder switch. Its behavior and the reversible circuits, which can be made with this switch is studied in this article. Finally, we introduce and design three new all-optical reversible gates named NFT, SRK and MPG, which are effective in designing all-optical reversible logical circuits such as flip-flops and other all-optical reversible sequential circuits. We also simulate one all-optical reversible circuits implemented with Mach-Zehnder switch and provide simulation challenges and solutions to overcome these challenges. </abstract><fullTextUrl>http://ijece.org/Article/28801</fullTextUrl><keywords><keyword>Reversible computing</keyword><keyword> all-optical reversible circuits</keyword><keyword> Mach-Zehnder switch (MZI)</keyword></keywords></record><record><language>per</language><publisher>  Iranian Research Institute for Electrical Engineering</publisher><journalTitle>فصلنامه مهندسی برق و مهندسی کامپيوتر ايران</journalTitle><issn>16823745</issn><eissn>16823745</eissn><publicationDate>2023-07</publicationDate><volume>21</volume><issue>1</issue><startPage>49</startPage><endPage>57</endPage><documentType>article</documentType><title language="eng">Generation of Persian sentences By Generative Adversarial Network </title><authors><author><name>Nooshin riahi</name><email>nriahi@alzahra.ac.ir</email><affiliationId>1</affiliationId></author><author><name>Sahar Jandaghy</name><email>saharsfn2@gmail.com</email><affiliationId>2</affiliationId></author></authors><affiliationsList><affiliationName affiliationId="1">دانشگاه الزهرا (س)</affiliationName><affiliationName affiliationId="2" /></affiliationsList><abstract language="eng">Text generation is a field of natural language processing. Text generation enables the system to produce comprehensive, .grammatically correct texts like humans. Applications of text generation include image Captioning, poetry production, production of meteorological reports and environmental reports, production of business reports, automatic text summarization, .With the appearance of deep neural networks, research in the field of text generation has change to  use of these networks, but the most important challenge in the field of text generation using deep neural networks is the data is discrete, which has made gradient inability to transmit. Recently, the use of a new approach in the field of deep learning, called generative adversarial networks (GANs) for the generation of image, sound and text has been considered. The purpose of this research is to use this approach to generate Persian sentences. In this paper, three different algorithms of generative adversarial networks were used to generate Persian sentences. to evaluate our proposed methods we use BLEU and self-BLEU because They compare the sentences in terms of quality and variety.</abstract><fullTextUrl>http://ijece.org/Article/29260</fullTextUrl><keywords><keyword>Text generationGenerative Adversarial NetworksDeep learning</keyword></keywords></record><record><language>per</language><publisher>  Iranian Research Institute for Electrical Engineering</publisher><journalTitle>فصلنامه مهندسی برق و مهندسی کامپيوتر ايران</journalTitle><issn>16823745</issn><eissn>16823745</eissn><publicationDate>2023-07</publicationDate><volume>21</volume><issue>1</issue><startPage>58</startPage><endPage>66</endPage><documentType>article</documentType><title language="eng">Improving Precision of Recommender Systems using Time-, Location- and Context-aware Trust Estimation Based on Clustering and Beta Distribution</title><authors><author><name>Samaneh Sheibani</name><email>s.sheibani@mshdiau.ac.ir</email><affiliationId>1</affiliationId></author><author><name>Hassan Shakeri</name><email>Hassan.Shakeri@gmail.com</email><affiliationId>2</affiliationId></author><author><name>Reza Sheybani</name><email>sheibani1063@mshdiau.ac.ir</email><affiliationId>3</affiliationId></author></authors><affiliationsList><affiliationName affiliationId="1">Department of Computer Engineering,  Mashhad Branch, Islamic Azad University, Mashhad, Iran</affiliationName><affiliationName affiliationId="2">Department of Computer Engineering,  Mashhad Branch, Islamic Azad University, Mashhad, Iran</affiliationName><affiliationName affiliationId="3">Mashhad branch, Islamic Azad University, Mashhad, IRAN</affiliationName></affiliationsList><abstract language="eng">Calculation and applying trust among users has become popular in designing recommender systems in recent years. However, most of the trust-based recommender systems use only one factor for estimating the value of trust. In this paper, a multi-factor approach for estimating trust among users of recommender systems is introduced. In the proposed scheme, first, users of the system are clustered based on their similarities in demographics information and history of ratings. To predict the rating of the active user into a specific item, the value of trust between him and the other users in his cluster is calculated considering the factors i.e. time, location, and context of their rating. To this end, we propose an algorithm based on beta distribution. A novel tree-based measure for computing the semantic similarity between the contexts is utilized. Finally, the rating of the active user is predicted using weighted averaging where trust values are considered as weights. The proposed scheme was performed on three datasets, and the obtained results indicated that it outperforms existing methods in terms of accuracy and other efficiency metrics.</abstract><fullTextUrl>http://ijece.org/Article/38021</fullTextUrl><keywords><keyword>Recommender systems</keyword><keyword> Trust</keyword><keyword> Beta Distribution</keyword><keyword> Clustering</keyword><keyword> context-aware recommendation</keyword></keywords></record><record><language>per</language><publisher>  Iranian Research Institute for Electrical Engineering</publisher><journalTitle>فصلنامه مهندسی برق و مهندسی کامپيوتر ايران</journalTitle><issn>16823745</issn><eissn>16823745</eissn><publicationDate>2023-07</publicationDate><volume>21</volume><issue>1</issue><startPage>67</startPage><endPage>74</endPage><documentType>article</documentType><title language="eng">Distributed Target Tracking by Solving Average Consensus Problem on Sensor Network Measurements</title><authors><author><name>Iman  Maghsudlu</name><email>iman.maghsudlu@gmail.com</email><affiliationId>1</affiliationId></author><author><name>Meysam r. Danaee</name><email>mrdanaee@gmail.com</email><affiliationId>2</affiliationId></author><author><name>Hamid  Arezumand</name><email>h.AREZOMAND@ihu.ac.ir</email><affiliationId>3</affiliationId></author></authors><affiliationsList><affiliationName affiliationId="1">Imam Hossein Comprehensive University </affiliationName><affiliationName affiliationId="2">2Faculty of Electrical Engineering, Imam Hossein Comprehensive University</affiliationName><affiliationName affiliationId="3">Imam Hossein Comprehensive University </affiliationName></affiliationsList><abstract language="eng">In this paper, a new algorithm is presented to drastically reduce communication overhead in distributed (decentralized) single target tracking in a wireless sensor network. This algorithm is based on a new approach to solving the average consensus problem and the use of distributed particle filters. For the algorithm of this paper, unlike the common algorithms that solve an average consensus problem just to approximate the global likelihood function to calculate the particle importance weights in distributed tracking, a new model for observation is presented based on the Gaussian approximation, which only solves the problem Consensus is applied to the mean on the received observations of the nodes in the network (and not to approximate the global likelihood function). These innovations significantly reduce the exchange of information between network nodes and as a result uses much less energy resources. In different scenarios, the efficiency of the proposed algorithm has been compared with the centralized algorithm and the distributed algorithm based on the graph, and the simulation results show that the communication overhead of the network is greatly reduced in exchange for an acceptable drop in tracking accuracy by using our proposed algorithm.</abstract><fullTextUrl>http://ijece.org/Article/34225</fullTextUrl><keywords><keyword>Target tracking</keyword><keyword> sensor network</keyword><keyword> distributed particle filter</keyword><keyword> average consensus problem</keyword></keywords></record></records>