Mansour Sheikhan

Learn More
Emotion recognition from speech has noticeable applications in the speech-processing systems. In this paper, the effect of using a rich set of features including formant frequency related, pitch frequency related, energy, and the two first mel-frequency cepstral coefficients (MFCCs) on improving the performance of speech emotion recognition systems is(More)
Intrusion detection is well-known as an essential component to secure the systems in Information and Communication Technology (ICT). Based on the type of analyzing events, two kinds of Intrusion Detection Systems (IDS) have been proposed: anomaly-based and misuse-based. In this paper, three-layer Recurrent Neural Network (RNN) architecture with categorized(More)
Reliable high-speed networks are essential to provide quality services to ever growing Internet applications. A Network Intrusion Detection System (NIDS) is an important tool to protect computer networks from attacks. Traditional packet-based NIDSs are time-intensive as they analyze all network packets. A state-of-the-art NIDS should be able to handle a(More)
In order to control the pitch angle of blades in wind turbines, commonly the proportional and integral (PI) controller due to its simplicity and industrial usability is employed. The neural networks and evolutionary algorithms are tools that provide a suitable ground to determine the optimal PI gains. In this paper, a radial basis function (RBF) neural(More)
Steganography is the science of hiding information in a media such as video, image or audio files. On the other hand, the aim of steganalysis is to detect the presence of embedded data in a given media. In this paper, a steganalysis method is presented for the colored joint photographic experts group images in which the statistical moments of contourlet(More)
Steganography is a method for hiding information in a host signal. The host signal can be a still image, speech or video and the message signal that is hidden in the host signal can be a text, image or an audio signal. In this paper, a steganography method is proposed in which information hiding in the least significant bits (LSBs) of wavelet coefficients(More)
Due to deregulation of electricity industry, accurate load forecasting and predicting the future electricity demand play an important role in the regional and national power system strategy management. Electricity load forecasting is a challenging task because electric load has complex and nonlinear relationships with several factors. In this paper, two(More)
The speech signal consists of linguistic information and also paralinguistic one such as emotion. The modern automatic speech recognition systems have achieved high performance in neutral style speech recognition, but they cannot maintain their high recognition rate for spontaneous speech. So, emotion recognition is an important step toward emotional speech(More)
Intrusion Detection System (IDS) deals with a very large amount of data that includes redundant and irrelevant features. Therefore, feature selection is a necessary data pre-processing step to design IDSs that are lightweight. In this paper, a novel feature selection method based on data mining techniques is proposed, which uses fuzzy association rules to(More)
The maximum power point tracking (MPPT) technique is applied in the photovoltaic (PV) systems to achieve the maximum power from a PV panel in different atmospheric conditions and to optimize the efficiency of a panel. A proportional-integral-derivative (PID) controller was used in this study for tracking the maximum power point (MPP). A fuzzy gain(More)