﻿<?xml version="1.0" encoding="utf-8"?><ArticleSet><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>12</Volume><Issue>46</Issue><PubDate PubStatus="epublish"><Year>2024</Year><Month>6</Month><Day>24</Day></PubDate></Journal><ArticleTitle>FLHB-AC: Federated Learning History-Based Access Control Using Deep Neural Networks in Healthcare System</ArticleTitle><VernacularTitle>FLHB-AC: Federated Learning History-Based Access Control Using Deep Neural Networks in Healthcare System</VernacularTitle><FirstPage>90</FirstPage><LastPage>104</LastPage><ELocationID EIdType="doi">10.61186/jist.44500.12.46.90</ELocationID><Language>en</Language><AuthorList><Author><FirstName>Nasibeh</FirstName><LastName>Mohammadi</LastName><Affiliation>Department of Computer Engineering, Borujerd Branch, Islamic Azad University, Borujerd, Iran</Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Afshin</FirstName><LastName>Rezakhani</LastName><Affiliation>Department of Computer Engineering, Faculty of Engineering, Ayatollah Boroujerdi University, Boroujerd, Iran</Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Hamid</FirstName><LastName>Haj Seyyed Javadi</LastName><Affiliation>Department of Computer engineering, Shahed University, Tehran, Iran</Affiliation><Identifier Source="ORCID">0000-0003-0082-036X</Identifier></Author><Author><FirstName>Parvaneh</FirstName><LastName>asghari</LastName><Affiliation>Department of Computer Engineering, Central Tehran Branch, Islamic Azad University, Tehran, Iran</Affiliation><Identifier Source="ORCID" /></Author></AuthorList><History PubStatus="received"><Year>2023</Year><Month>10</Month><Day>22</Day></History><Abstract>&lt;p&gt;Giving access permission based on histories of access is now one of the security needs in healthcare systems. However, current access control systems are unable to review all access histories online to provide access permission. As a result, this study first proposes a method to perform access control in healthcare systems in real time based on access histories and the decision of the suggested intelligent module. The data is used to train the intelligent module using the LSTM time series machine learning model. Medical data, on the other hand, cannot be obtained from separate systems and trained using different machine-learning models due to the sensitivity and privacy of medical records. As a result, the suggested solution employs the federated learning architecture, which remotely performs machine learning algorithms on healthcare systems and aggregates the knowledge gathered in the servers in the second phase. Based on the experiences of all healthcare systems, the servers communicate the learning aggregation back to the systems to control access to resources. The experimental results reveal that the accuracy of history-based access control in local healthcare systems before the application of the suggested method is lower than the accuracy of the access control in these systems after aggregating training with federated learning architecture.&lt;/p&gt;</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">Healthcare System</Param></Object><Object Type="Keyword"><Param Name="Value"> History-based Access control</Param></Object><Object Type="Keyword"><Param Name="Value"> Intelligent Module</Param></Object><Object Type="Keyword"><Param Name="Value"> Deep Recurrent Networks</Param></Object><Object Type="Keyword"><Param Name="Value"> Federated Learning </Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/fa/Article/Download/44500</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>12</Volume><Issue>46</Issue><PubDate PubStatus="epublish"><Year>2024</Year><Month>6</Month><Day>24</Day></PubDate></Journal><ArticleTitle>An Acoustic Echo Canceller using Moving Window to Track Energy Variations of Double-Talk-Detector</ArticleTitle><VernacularTitle>An Acoustic Echo Canceller using Moving Window to Track Energy Variations of Double-Talk-Detector</VernacularTitle><FirstPage>105</FirstPage><LastPage>116</LastPage><ELocationID EIdType="doi">10.61186/jist.40125.12.46.105</ELocationID><Language>en</Language><AuthorList><Author><FirstName>Mouldi </FirstName><LastName>MAKDIR</LastName><Affiliation>Department of Electronics, Faculty of Technology, University of M’sila, M’sila, 28000, Algeria</Affiliation><Identifier Source="ORCID">I don't have an account in ORCID</Identifier></Author><Author><FirstName>Mohamed </FirstName><LastName>BOUAMAR</LastName><Affiliation>Department of Electronics, Faculty of Technology, University of M’sila, M’sila, 28000, Algeria</Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Mourad</FirstName><LastName>BENZIANE</LastName><Affiliation>Laboratory of Analysis of Signals and Systems, M’sila, 28000, Algeria</Affiliation><Identifier Source="ORCID" /></Author></AuthorList><History PubStatus="received"><Year>2022</Year><Month>11</Month><Day>20</Day></History><Abstract>&lt;p&gt;As a fundamental device in acoustic echo cancellation (AEC) systems, the echo canceller based on adaptive filters relies on the adaptive approximation of the echo-path. However, the adaptive filter must face the risk of divergence during the double-talk periods when the near-end is present. To solve this problem, the double-talk-detector (DTD) is often used to detect the double-talk periods and prevent the echo canceller from being disturbed by the other end of the speaker&amp;rsquo;s signal. In this paper, we propose a DTD based on a new method that can detect quickly and track accurately double-talk periods. It is based on the sum of energies of the estimated echo and the microphone signals which is continuously compared to the error energy. A window that moves with time and tracks energy variations of the different input signals of the DTD represents a fundamental feature of the proposed method compared to several other methods based on correlation. The goal is to outperform conventional normalized cross-correlation (NCC) methods which are well-known in terms of small steady-state misalignment and stability of decision variable. In this work, the normalized least mean squares (NLMS) algorithm is used to update the filter coefficients along speech signals which are taken from the NOIZEUS database. Efficiency of the proposed method is particularly compared to the conventional Geigel algorithm and normalized cross-correlation method (NCC) that depends on the cross-correlation between the microphone signal and the error signal of AEC. Performance evaluation is confirmed by computer simulation.&lt;/p&gt;</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">AEC</Param></Object><Object Type="Keyword"><Param Name="Value"> DTD</Param></Object><Object Type="Keyword"><Param Name="Value"> NLMS</Param></Object><Object Type="Keyword"><Param Name="Value"> NCC</Param></Object><Object Type="Keyword"><Param Name="Value"> Moving Window</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/fa/Article/Download/40125</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>12</Volume><Issue>46</Issue><PubDate PubStatus="epublish"><Year>2024</Year><Month>6</Month><Day>24</Day></PubDate></Journal><ArticleTitle /><VernacularTitle>An Aspect-Level Sentiment Analysis Based on LDA Topic Modeling</VernacularTitle><FirstPage>117</FirstPage><LastPage>126</LastPage><ELocationID EIdType="doi">10.61186/jist.38104.12.46.117</ELocationID><Language>en</Language><AuthorList><Author><FirstName>Sina</FirstName><LastName>Dami</LastName><Affiliation>West Tehran Branch, Islamic Azad University</Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Ramin</FirstName><LastName>Alimardani</LastName><Affiliation>West Tehran Branch, Islamic Azad University</Affiliation><Identifier Source="ORCID" /></Author></AuthorList><History PubStatus="received"><Year>2022</Year><Month>6</Month><Day>15</Day></History><Abstract>Sentiment analysis is a process through which the beliefs, sentiments, allusions, behaviors, and tendencies in a written language are analyzed using Natural Language Processing (NLP) techniques. This process essentially comprises of discovering and understanding people's positive or negative sentiments regarding a product or entity in the text. The increased significance of sentiments analysis has coincided with the growth in social media such as surveys, blogs, Twitter, etc. The present study takes advantage of the topic modeling approach based on latent Dirichlet allocation (LDA) to extract and represent the thematic features as well as a support vector machine (SVM) to classify and analyze sentiments at the aspect level. LDA seeks to extract latent topics by observing all the texts, which is accomplished by assigning the probability of each word being attributed to each topic. The important features that represent the thematic aspect of the text are extracted and fed to a support vector machine for classification through this approach. SVM is an extremely powerful classification algorithm that provides the possibility to separate complex data from one another accurately by mapping the data to a space with much larger aspects and creating an optimal hyperplane. Empirical data on real datasets indicate that the proposed model is promising and performs better compared to the baseline methods in terms of precision (with 89.78% on average), recall (with 78.92% on average), and F-measure (with 83.50% on average).</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">Natural Language Processing</Param></Object><Object Type="Keyword"><Param Name="Value"> Sentiment Analysis</Param></Object><Object Type="Keyword"><Param Name="Value"> Aspect-Level</Param></Object><Object Type="Keyword"><Param Name="Value"> Topic Modeling</Param></Object><Object Type="Keyword"><Param Name="Value"> LDA</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/fa/Article/Download/38104</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>12</Volume><Issue>46</Issue><PubDate PubStatus="epublish"><Year>2024</Year><Month>6</Month><Day>24</Day></PubDate></Journal><ArticleTitle>A Comparison Analysis of Conventional Classifiers and Deep Learning Model for Activity Recognition in Smart Homes based on Multi-label Classification</ArticleTitle><VernacularTitle>A Comparison Analysis of Conventional Classifiers and Deep Learning Model for Activity Recognition in Smart Homes based on Multi-label Classification</VernacularTitle><FirstPage>127</FirstPage><LastPage>137</LastPage><ELocationID EIdType="doi">10.61186/jist.36294.12.46.127</ELocationID><Language>en</Language><AuthorList><Author><FirstName>John</FirstName><LastName>Kasubi</LastName><Affiliation>The Local Government Training Institute, Dodoma, Tanzania</Affiliation><Identifier Source="ORCID">0000000184461653 </Identifier></Author><Author><FirstName>Manjaiah D. </FirstName><LastName>Huchaiah </LastName><Affiliation>Mangalore University</Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Ibrahim</FirstName><LastName>Gad</LastName><Affiliation>Tanta Univeristy</Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Mohammad Kazim </FirstName><LastName>Hooshmand</LastName><Affiliation>Mangalore University</Affiliation><Identifier Source="ORCID" /></Author></AuthorList><History PubStatus="received"><Year>2022</Year><Month>3</Month><Day>15</Day></History><Abstract>Activity Recognition is essential for exploring the various activities that humans engage in within Smart Homes in the presence of multiple sensors as residents interact with household appliances. Smart homes use intelligent IoT devices linked to residents' homes to track changes in human behavior as the humans interact with the home's equipment, which may improve healthcare and security issues for the residents. This study presents a research work that compares conventional classifiers such as DT, LDA, Adaboost, GB, XGBoost, MPL, KNN, and DL, focusing on recognizing human activities in Smart Homes using Activity Recognizing Ambient Sensing (ARAS). The experimental results demonstrated that DL Model outperformed with excellent accuracy compared to conventional classifiers in recognizing human activities in Smart Homes. This work proves that DL Models perform best in analyzing ARAS datasets compared to traditional machine learning algorithms.</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">Conventional Classifiers</Param></Object><Object Type="Keyword"><Param Name="Value"> Deep Learning Model</Param></Object><Object Type="Keyword"><Param Name="Value"> Activity Recognition</Param></Object><Object Type="Keyword"><Param Name="Value"> Smart Homes</Param></Object><Object Type="Keyword"><Param Name="Value"> Multi-label classification</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/fa/Article/Download/36294</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>12</Volume><Issue>46</Issue><PubDate PubStatus="epublish"><Year>2024</Year><Month>6</Month><Day>24</Day></PubDate></Journal><ArticleTitle /><VernacularTitle>Designing a Semi-Intelligent Crawler for Creating a Persian Question Answering Corpus Called Popfa</VernacularTitle><FirstPage>138</FirstPage><LastPage>151</LastPage><ELocationID EIdType="doi">10.61186/jist.40961.12.46.138</ELocationID><Language>en</Language><AuthorList><Author><FirstName>Hadi</FirstName><LastName>Sharifian</LastName><Affiliation>K.N. Toosi University of Technology, Faculty of Computer Engineering</Affiliation><Identifier Source="ORCID">0000000234413650</Identifier></Author><Author><FirstName>Nasim</FirstName><LastName>Tohidi</LastName><Affiliation>K.N. Toosi University of Technology, Faculty of Computer Engineering</Affiliation><Identifier Source="ORCID">0000-0003-4499-9947</Identifier></Author><Author><FirstName>Chitra</FirstName><LastName>Dadkhah</LastName><Affiliation>K.N. Toosi University of Technology, Faculty of Computer Engineering</Affiliation><Identifier Source="ORCID" /></Author></AuthorList><History PubStatus="received"><Year>2023</Year><Month>1</Month><Day>28</Day></History><Abstract>Question answering in natural language processing is an interesting field for researchers to examine their ability in solving the tough Alan Turing test. Every day computer scientists are trying hard to develop and promote question answering systems in various natural languages, especially English. However, in Persian, it is not easy to advance these systems. The main problem is related to low resources and not enough corpora in this language. Thus, in this paper, a Persian question answering text corpus is created, which covers a wide range of religious, midwifery, and issues related to youth marriage topics and question types commonly encountered in Persian language usage. In this regard, the most important challenge was introducing a method for data gathering in Persian as well as facilitating and expanding the data gathering process. Though, SIC (Semi-Intelligent Crawler) is proposed as a solution that can overcome the challenge and find a way to crawl the Persian websites, gather text and finally import it to a database. The outcome of this research is a corpus called Popfa, which stands for POrsesh Pasokh (question answering) in FArsi. This corpus contains more than 53,000 standard questions and answers. Besides, it has been evaluated with standard approaches. All the questions in Popfa are answered by specialists in two general topics: religious and medical questions. Therefore, researchers can now use this corpus for doing research on Persian question answering.</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">Question Answering</Param></Object><Object Type="Keyword"><Param Name="Value"> Persian Corpus</Param></Object><Object Type="Keyword"><Param Name="Value"> Religious Questions</Param></Object><Object Type="Keyword"><Param Name="Value"> Medical Questions</Param></Object><Object Type="Keyword"><Param Name="Value"> Natural Language Processing</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/fa/Article/Download/40961</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>12</Volume><Issue>46</Issue><PubDate PubStatus="epublish"><Year>2024</Year><Month>6</Month><Day>24</Day></PubDate></Journal><ArticleTitle /><VernacularTitle>Whispered Speech Emotion Recognition with Gender Detection using BiLSTM and DCNN</VernacularTitle><FirstPage>152</FirstPage><LastPage>161</LastPage><ELocationID EIdType="doi">10.61186/jist.43703.12.46.152</ELocationID><Language>en</Language><AuthorList><Author><FirstName>Aniruddha</FirstName><LastName>Mohanty</LastName><Affiliation>CHRIST (DEEMED TO BE UNIVERSITY)</Affiliation><Identifier Source="ORCID">https://orcid.org/0000-0001-9799-4088</Identifier></Author><Author><FirstName>Ravindranath C.</FirstName><LastName>Cherukuri</LastName><Affiliation>CHRIST (DEEMED TO BE UNIVERSITY)</Affiliation><Identifier Source="ORCID">https://orcid.org/0000-0002-7064-443X</Identifier></Author></AuthorList><History PubStatus="received"><Year>2023</Year><Month>8</Month><Day>22</Day></History><Abstract>Emotions are human mental states at a particular instance in time concerning one’s circumstances, mood, and relationships with others. Identifying emotions from the whispered speech is complicated as the conversation might be confidential. The representation of the speech relies on the magnitude of its information. Whispered speech is intelligible, a low-intensity signal, and varies from normal speech. Emotion identification is quite tricky from whispered speech. Both prosodic and spectral speech features help to identify emotions. The emotion identification in a whispered speech happens using prosodic speech features such as zero-crossing rate (ZCR), pitch, and spectral features that include spectral centroid, chroma STFT, Mel scale spectrogram, Mel-frequency cepstral coefficient (MFCC), Shifted Delta Cepstrum (SDC), and Spectral Flux. There are two parts to the proposed implementation. Bidirectional Long Short-Term Memory (BiLSTM) helps to identify the gender from the speech sample in the first step with SDC and pitch. The Deep Convolutional Neural Network (DCNN) model helps to identify the emotions in the second step. This implementation is evaluated with the help of wTIMIT data corpus and gives 98.54% accuracy. Emotions have a dynamic effect on genders, so this implementation performs better than traditional approaches. This approach helps to design online learning management systems, different applications for mobile devices, checking cyber-criminal activities, emotion detection for older people,  automatic speaker identification and authentication, forensics, and surveillance.</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">Whispered Speech</Param></Object><Object Type="Keyword"><Param Name="Value"> Emotion Recognition</Param></Object><Object Type="Keyword"><Param Name="Value"> Speech Features</Param></Object><Object Type="Keyword"><Param Name="Value"> Data Corpus</Param></Object><Object Type="Keyword"><Param Name="Value"> BiLSTM</Param></Object><Object Type="Keyword"><Param Name="Value"> DCNN.</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/fa/Article/Download/43703</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>12</Volume><Issue>46</Issue><PubDate PubStatus="epublish"><Year>2024</Year><Month>6</Month><Day>24</Day></PubDate></Journal><ArticleTitle /><VernacularTitle>Ensemble learning of daboosting based on deep weighting for classification of hand-written numbers in Persian</VernacularTitle><FirstPage>162</FirstPage><LastPage>169</LastPage><ELocationID EIdType="doi">10.61186/jist.41053.12.46.162</ELocationID><Language>en</Language><AuthorList><Author><FirstName>amir</FirstName><LastName>asil</LastName><Affiliation>Department of Electrical Engineering, Faculty of Electrical and Computer Engineering, Islamic Azad University, Azarshahr Branch</Affiliation><Identifier Source="ORCID">https://orcid.org/my-orcid?orcid=0009-0004-1944-950X</Identifier></Author><Author><FirstName>hamed</FirstName><LastName>Alipour</LastName><Affiliation> Department of Electrical Engineering, Faculty of Electrical and Computer Engineering, Islamic Azad University, Tabriz Branch</Affiliation><Identifier Source="ORCID">https://orcid.org/0000-0002-1300-8111</Identifier></Author><Author><FirstName>Shahram</FirstName><LastName>mojtahedzadeh</LastName><Affiliation>Department of Electrical Engineering, Faculty of Electrical and Computer Engineering, Islamic Azad University, Azarshahr Branch</Affiliation><Identifier Source="ORCID">https://orcid.org/0000-0002-5644-2954</Identifier></Author><Author><FirstName>hasan</FirstName><LastName>Asil</LastName><Affiliation>Department of Electrical Engineering, Faculty of Electrical and Computer Engineering, Islamic Azad University, Azarshahr Branch</Affiliation><Identifier Source="ORCID">https://orcid.org/0000-0002-8151-7153</Identifier></Author></AuthorList><History PubStatus="received"><Year>2023</Year><Month>2</Month><Day>3</Day></History><Abstract>Today, the hand-written data volume is huge, which prohibits these data from being manually converted into electronic files. During the past years, different types of solutions were developed to convert machine learning-based handwritten data. Each method classifies or clusters the data according to the data type and application. In the present paper, a new approach is presented based on compound methods and deep learning for the classification of Persian handwritten data, where a deeper investigation is made of the data in basic learning by combining the Ada boosting and convolution. The present study aims at providing a new technique for classification of the images of handwritten Persian numbers. The structure of this technique is founded on Ada Boosting, which in turn, is based on weak learning. This technique improves learning by iteration of the weak learning processes and updating weights. In the meantime, the proposed method tried to employ stronger learners and present a stronger algorithm by combining these strong learners. The method was assessed on the standard Hoda dataset containing 60000 training data. The results show that the proposed method has a lower error rate than the previous methods by more than 1%. In the future, by developing basic learner, new mechanisms can be provided to improve the results by new types of learning.
– Today, the hand-written data volume is huge, which prohibits these data from being manually converted into electronic files. During the past years, different types of solutions were developed to convert machine learning-based handwritten data. Each method classifies or clusters the data according to the data type and application. In the present paper, a new approach is presented based on compound methods and deep learning for the classification of Persian handwritten data, where a deeper investigation is made of the data in basic learning by combining the Ada boosting and convolution. The method was assessed on the standard Hoda dataset containing 60000 training data. The results showed that the error rate of the method has decreased by more than 1% compared to the previous methods.</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">Deep learning</Param></Object><Object Type="Keyword"><Param Name="Value"> adaboosting</Param></Object><Object Type="Keyword"><Param Name="Value"> handwritten data</Param></Object><Object Type="Keyword"><Param Name="Value"> convolution</Param></Object><Object Type="Keyword"><Param Name="Value"> classification</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/fa/Article/Download/41053</ArchiveCopySource></ARTICLE></ArticleSet>