Ramiz Aliguliyev

Ramiz Aliguliyev
Institute of Information Technology | ICT · Data Analysis

World's Top 2% Scientists (2020, 2021, 2022). Professor of Computer Science
Text Mining, Data Science, Social Networks, Scientometrics, Swarm and Evolutionary Computation, E-government

About

175
Publications
78,767
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,785
Citations
Citations since 2017
74 Research Items
1990 Citations
20172018201920202021202220230100200300
20172018201920202021202220230100200300
20172018201920202021202220230100200300
20172018201920202021202220230100200300
Additional affiliations
January 2003 - present
Institute of Information Technology, Azerbaijan National Academy of Sciences
Position
  • Head of Department
March 1988 - December 2002
Institute of Mathematics and Mechanics, Azerbaijan National Academy of Sciences
Position
  • Researcher
November 1983 - February 1988
Institute of Cybernetics, Azerbaijan National Academy of Sciences
Position
  • Software Engineer
Education
September 1978 - May 1983
Baku State University
Field of study
  • Applied Mathematics

Publications

Publications (175)
Article
Recently, the number of multiple authorship and collaborative papers has been growing rapidly. This number differs significantly according to various scientific fields. Known that h-type indices (h-index, gindex, A-index, etc.) are used to evaluate the performance of researchers, which do not distinguish between single-author and multi-author paper...
Article
Finding compact and well-separated clusters in data sets is a challenging task. Most clustering algorithms try to minimize certain clustering objective functions. These functions usually reflect the intra-cluster similarity and inter-cluster dissimilarity. However, the use of such functions alone may not lead to the finding of well-separated and, i...
Article
This paper proposes a novel approach based on deep learning to improve oil reservoirs' history matching problem. Deep autoencoders are widely used to solve the oil industry problems. However, as the input data increases, the autoencoder parameters increase exponentially. Our model is based on a convolutional variational autoencoder using AlexNet an...
Chapter
Nowadays, improvement of governance, ensuring security and timely detection of propaganda against the government are major problems of e-government. The extraction of hidden social networks operating against the state in e-government is one of the key factors to ensure the security in e-government. In this article, a method has been proposed for ex...
Article
Full-text available
Məqalədə e-dövlət platformasında milli dillərin qorunması, mövcud vəziyyət və inkişaf perspektivləri araşdırılır. İnformasiya texnologiyalarının təsiri ilə sürətlə qloballaşan müasir dünyada dillərin qorunması aktual məsələlərdən birinə çevrilmişdir. Hazırda İnternet mühitində dilin qorunması və inkişafı ilə bağlı müxtəlif ideya və yanaşmalar vardı...
Article
Full-text available
E-dövlətin səmərəli idarə olunması, ölkədə sosial-iqtisadi inkişafın və sabitliyin təmini üçün cəmiyyətdə sosial münasibətlərin aşkarlanması və analizi vacib məsələlərdəndir. Sosial münasibətlərin analizi cəmiyyətdə baş verən prosesləri və mövcud sosial problemləri daha aydın şəkildə görməyə imkan yaradır. Videotəsvirlərin intellektual analizi nəti...
Article
Full-text available
The modelling is widely used in determining the best strategies for the mitigation of the impact of infectious diseases. Currently, the modelling of a complex system such as the spread of COVID-19 infection is among the topical issues. The aim of this article is graph-based modelling of the COVID-19 infection spread. The article investigates the st...
Article
Full-text available
The modelling is widely used in determining the best strategies for the mitigation of the impact of infectious diseases. Currently, the modelling of a complex system such as the spread of COVID-19 infection is among the topical issues. The aim of this article is graph-based modelling of the COVID-19 infection spread. The article investigates the st...
Article
Full-text available
The modelling is widely used in determining the best strategies for the mitigation of the impact of infectious diseases. Currently, the modelling of a complex system such as the spread of COVID-19 infection is among the topical issues. The aim of this article is graph-based modelling of the COVID-19 infection spread. The article investigates the st...
Chapter
Automatic identification of conversations related to DDoS events in social networking logs helps the organizations act proactively through early detection of negative and positive sentiments in cyberspace. In this article, the authors describe the novel application of a deep learning method to the automatic identification of negative and positive s...
Article
The application of clustering algorithms is expanding due to the rapid growth of data volumes. Nevertheless, existing algorithms are not always effective because of high computational complexity. A new parallel batch clustering algorithm based on the k-means algorithm is proposed. The proposed algorithm splits a dataset into equal partitions and re...
Article
Full-text available
The essence and different approaches to the national security are explored in the article. The article interprets the objectives and provision methods of the national security. Different areas and vital interests that are the objects of the national security are classified. According to this classification, the components of the national security,...
Article
The application of the fast-growing information and communications technologies (ICT) in the industry has led to an increase in the quality of industrial processes. Through the application of Internet of Things (IoT) considered as a new technological concept in the oil and gas industry, it is possible to provide a high level of security by detectin...
Article
The aim of this study is the development of a weighted consensus clustering that assigns weights to single clustering methods using the purity utility function. In the case of Big data that does not contain labels, the utility function based on the Davies-Bouldin index is proposed in this paper. The Banknote authentication, Phishing, Diabetic, Magi...
Article
Full-text available
Currently, globalization process significantly impacts not only technological, economical, but also social, political and cultural fields. Ongoing social, economic and political processes demonstrate their impacts, and countries are governed by different regimes and government forms. From this standpoint, there is a need for qualified, competent st...
Article
This paper is devoted to the analysis of the multidisciplinary problems of the big data technology in the oil and gas industry. Application capabilities of big data technologies in issues such as reducing the exploitation risks, crude oil price forecasting, optimal management of the oil wells, health and safety ensuring in an organisation, overcomi...
Chapter
E-government expresses the process of utilizing advanced information and communication technologies (ICT) to automate internal activities of government agencies and their external relations with citizens and businesses. All these interactions provide better, faster and more secure public services. In this article, a method for the detection of terr...
Article
Full-text available
The aim of the study is the application of multi-criteria evaluation methods for ranking of candidates in e-voting. Due to the potential to enhance the electoral efficiency in e-voting multiple criteria, such as personality traits, activity and reputation in social media, opinion followers on election area and so on for the selection of qualified p...
Article
Full-text available
Статья посвящена формированию электронной демографической (э-демографической) системы на основе единого государственного реестра для проведения демографических исследований. В эпоху цифровых технологий возникают новые источники данных для исследования демографического поведения. Данные реестра населения, используемые для демографических исследовани...
Article
Full-text available
Big data analysis requires the presence of large computing powers, which is not always feasible. And so, it became necessary to develop new clustering algorithms capable of such data processing. This study proposes a new parallel clustering algorithm based on the k-means algorithm. It significantly reduces the exponential growth of computations. Th...
Article
Full-text available
E-voting is one of the most important components of e-democracy and includes interesting research topics, such as the mechanisms of participation in elections, technological solutions to e-voting and the efficient application of those in e-voting. Currently, there are numerous voting systems adopted in many countries of the world and each of those...
Conference Paper
With fast increasing number of scientific publications, evaluation of the scientific performance of researchers has recently become an important issue. Nowadays, while the h-index and other Hirsh type indices take into consideration citation count of publications in the h-core, however, publication and citation count in the h-tail is omitted. This...
Article
Nowadays, improvement of governance, ensuring security and timely detection of propaganda against the government are major problems of e-government. The extraction of hidden social networks operating against the state in e-government is one of the key factors to ensure the security in e-government. In this article, a method has been proposed for ex...
Article
For privacy-preserving analysing of big data, a deep learning method is proposed. The method transforms the sensitive part of the personal information into non-sensitive data. To implement this process, two-stage architecture is proposed. The modified sparse denoising autoencoder and CNN models have been used in the architecture. Modified sparse de...
Article
Full-text available
The use of clustering methods in anomaly detection is considered as an effective approach. The choice of the cluster primary center and the finding of local optimum in the well-known k-means and other classic clustering algorithms are considered as one of the major problems and do not allow to get accurate results in anomaly detection. In this pape...
Article
Full-text available
E-voting is one of the most important components of e-democracy and forms the basis of a democratic governance system. Voting results always lead to a broad debate in terms of candidate selection and whether the candidate elected to a position is suitable for that position. At present, the selection of qualified personnel and their appointment to r...
Article
Full-text available
Recently, the expansion of information technologies and the exponential increase of the digital data have deepened more the security and confidentiality issues in computer networks. In the Big Data era information security has become the main direction of scientific research and Big Data analytics is considered being the main tool in the solution o...
Article
Full-text available
Recently, data collected from social media enable to analyze social events and make predictions about real events, based on the analysis of sentiments and opinions of users. Most cyber-attacks are carried out by hackers on the basis of discussions on social media. This paper proposes the method that predicts DDoS attacks occurrence by finding relev...
Article
Full-text available
Text summarization is a process of extracting salient information from a source text and presenting that information to the user in a condensed form while preserving its main content. In the text summarization, most of the difficult problems are providing wide topic coverage and diversity in a summary. Research based on clustering, optimization, an...
Article
Full-text available
Məqalə Azərbaycanda plagiatlıqla mübarizə problemlərinə həsr olunmuşdur. Bu problemlərin həlli üçün, ilk növbədə, milli elektron kontentin formalaşdırılması və milli antiplagiat sisteminin yaradılmasının zəruriliyi əsaslandırılmışdır. Müvafiq kontentin formalaşdırılması üçün vacib olan tədbirlər göstərilmişdir. Həmçinin milli antiplagiat sisteminin...
Article
Full-text available
The article explores the international practice regarding the assessment of dissertation works. A method is proposed for automated assessment of dissertation works. In this regard, algorithms are developed for the automation of pre-examination. This method allows to determine the similarity of essential parts of the dissertation (the goal of disser...
Article
Nowadays, the improvement of governance, ensurance the security and the timely detection of propaganda against the government are major problems of e-government. Extraction of hidden social networks is one of the most actual problems in the term of government security. The extraction of hidden social networks operating against the state in e-govern...
Article
Full-text available
Automatic identification of conversations related to DDoS events in social networking logs helps the organizations act proactively through early detection of negative and positive sentiments in cyberspace. In this article, the authors describe the novel application of a deep learning method to the automatic identification of negative and positive s...
Article
Full-text available
Context. The task of using the ensemble of classifiers to detect DoS attacks in large arrays of network traffic data is solved to withstand attacks on the network. Objective of this paper is to build an ensemble of classifiers that surpasses single classifiers in terms of accuracy. Method. To achieve the formulated goal an algorithm, that indicates...
Article
Full-text available
E-government expresses the process of utilizing advanced information and communication technologies (ICT) to automate internal activities of government agencies and their external relations with citizens and businesses. All these interactions provide better, faster and more secure public services. In this article, a method for the detection of terr...
Article
Full-text available
In this paper, a new method for anomaly detection based on weighted clustering is proposed. The weights that were obtained by summing the weights of each point from the data set are assigned to clusters. The comparison is made using seven datasets (of large dimensions) with the k-means algorithm. The proposed approach increases the reliability of d...
Chapter
Personnel evaluation process is aimed at choosing the best alternative to fill the defined vacancy in an organization. It determines the input quality of personnel and thus plays an important role in human resource management. The multi criteria nature and the presence of qualitative factors make it considerably more complex. This paper proposes a...
Article
Full-text available
This study aims to present a bibliometric analysis of the journal titled “Information Processing & Management (IP & M)” for the period from 1980 to 2015. The present study was conducted with an aim to provide a summary of research activity in current journal and characterize its most important aspects. The analysis covers mainly the year-wise distr...
Article
Sentiment analysis concerns the study of opinions expressed in a text. This paper presents the QMOS method, which employs a combination of sentiment analysis and summarization approaches. It is a lexicon-based method to query-based multi-documents summarization of opinion expressed in reviews. QMOS combines multiple sentiment dictionaries to improv...
Article
Full-text available
The paper suggests differential metrics for estimation of change dynamics of major ICT fields using the bibliometric indicators (publication and citation count). It refers to research areas such as big data, computational biology, cloud computing, cyber-physical systems, embedded systems, information security, internet of things, human-machine syst...
Chapter
Full-text available
Abstract. This article discusses the domains of information and communica-tion technologies such as Big Data, Computational Biology, Cloud Computing, Cyber-Physical Systems, Embedded Systems, Information Security, Internet of Things, Human-Machine Systems, Mobile Computing, Machine Learning, Ma-chine-to-Machine, Multi-Agent Systems, Neural Networks...
Article
Full-text available
At present, an anomaly detection is one of the important problems in many fields. The rapid growth of data volumes requires the availability of a tool for data processing and analysis of a wide variety of data types. The methods for anomaly detection are designed to detect object's deviations from normal behavior. However, it is difficult to select...
Conference Paper
Full-text available
Anomaly detection is one of the main issues in data analysis and used widely for detecting network threats. The article offers a more precise and simple multi-classifier model for anomaly detection in network traffic based on Big Data. Experiments have been performed on the NSL-KDD data set by using the Weka. The offered model has shown decent resu...
Conference Paper
Full-text available
Hazırda informasiya təhlükəsizliyi kompüter elmləri sahəsində aktual elmi istiqamətlərdən biridir. Məqalədə Web of Science elmi bazasında indeksləşən informasiya təhlükəsizliyi sahəsindəki əsərlərin bibliometrik analizi aparılmışdır. Analiz nəticələri göstərir ki, bu sahədə çap olunan əsərlərin və istinadların sayında, eləcə də, jurnalların İF qiym...
Article
Full-text available
Selection of the right tool for anomaly (outlier) detection in Big data is an urgent task. In this paper algorithms for data clustering and outlier detection that take into account the compactness and separation of clusters are provided. We consider the features of their use in this capacity. Numerical experiments on real data of different sizes de...
Article
Plagiarism is the unauthorized use of the ideas, presentation of someone else’s words or work as your own. This paper presents an External Plagiarism Detection System (EPDS), which employs a combination of the Semantic Role Labeling (SRL) technique, the semantic and syntactic information. Most of the available methods fail to capture the meaning in...
Article
Full-text available
Big Data technologies provide approaches and tools that are essential for the competitive development of the oil and gas industry. Interests of the oil and gas companies towards the Big Data are growing against the backdrop of the plummeting oil prices in the global energy market. An imperative prerequisite for the effective implementation on this...
Book
Full-text available
Ekspress-informasiyada texnika elmləri doktoru Ramiz Alıquliyevin elmi-nəzəri, elmi-praktiki və innovativ, elmi-təşkilati, elmi-pedaqoji, elmi-ekspertiza, beynəlxalq elmi əməkdaşlıq fəaliyyəti, həmçinin elmi əsərləri və onların təsnifatı haqqında məlumat verilmişdir.
Article
Full-text available
In this paper, a query-based summarization method, which uses a combination of semantic relations between words and their syntactic composition, to extract meaningful sentences from document sets is introduced. The problem with current statistical methods is that they fail to capture the meaning when comparing a sentence and a user query; hence the...
Article
Full-text available
Big data technologies provide important approaches and tools for the creation of data management systems in oil and gas industry. The paper proposes a conceptual architecture for a hybrid Big data platform for storing and analyzing large volumes of data gathered from oil and gas industry systems in real-time by deep analytics and machine learning m...
Article
Full-text available
Təbiət çox mürəkkəb problemləri özünəməxsus şəkildə həll etmək qabiliyyətinə malikdir. Ətrafımızdakı problemlər real zaman daxilində getdikcə daha mürəkkəb hala gəlməkdədir. Təbiət bizə bu problemləri həll etmək üçün məntiqli və effektiv üsullar təklif edir.Mürəkkəb məsələlərin həllində təbiət optimizator rolunda çıxış edir. Bunları nəzərə alaraq,...
Article
New versions of JCR IF are proposed for comparing them with JCR IF. They focus on the journal self-citation and the number of citing sources. The proposed versions are grouped into: 1) IFs penalized by self-citations, 3) IF encouraged by the number of citing sources and 3) IFs combining the penalized IFs and encouraged IF. This study evaluates the...
Article
New versions of journal impact factor are proposed for comparing them with JCR IF. They focus on the journal self-citation and the number of citing sources. The proposed versions are grouped into: 1) IFs penalized by self-citations, 2) IF encouraged by the number of citing sources and 3) IFs combining the penalized IFs and encouraged IF. This study...
Article
Text summarization is a process for creating a concise version of document(s) preserving its main content. In this paper, to cover all topics and reduce redundancy in summaries, a two-stage sentences selection method for text summarization is proposed. At the first stage, to discover all topics the sentences set is clustered by using k-means method...
Conference Paper
In recent years economic an social activity fields is based on data. Oil and gas industry leaders understand the value of big data and are interested in digital oil industry becoming a reality. Here is big data is analysed as a key component in based decision making in oil and gas industry during exploration, drilling and production. In oil and gas...
Article
Full-text available
Personnel evaluation process is aimed at choosing the best alternative to fill the defined vacancy in an organization. It determines the input quality of personnel and thus plays an important role in human resource management. The multi criteria nature and the presence of qualitative factors make it considerably more complex. This paper proposes a...
Conference Paper
Full-text available
The paper analyzes research performance on an area of big data during 2001-2015 years, using data from Scopus. Also was demonstrated geographical distribution of big data research, and predicted future of this area by means of received information.
Article
Full-text available
Social network analysis is a widely used technique to analyze relationships among wiki-users in Wikipedia. In this paper the method to identify hidden social networks participating in information conflicts in wiki-environment is proposed. In particular, we describe how text clustering techniques can be used for extraction of hidden social net...
Article
Full-text available
Background: Summarization is a process to select important information from a source text. Summarizing strategies are the core cognitive processes in summarization activity. Since summarization can be important as a tool to improve comprehension, it has attracted interest of teachers for teaching summary writing through direct instruction. To do t...
Data
Used to evaluate the proposed algorithm. (XML)
Book
Full-text available
Ekspress informasiyada e-dövlət anlayışı, onun inkişaf modelləri təhlil edilmişdir. E-dövlətin analizində text mining və sosial şəbəkə analizi texnologiyalarının rolu araşdırılmış, bu istiqamətdə aparılan elmi tədqiqat işlərinin müasir vəziyyəti analiz edilmişdir. Araşdırma nəticəsində bu sahədə mövcud olan problemlər identifikasiya edilmiş, gələcə...
Conference Paper
Full-text available
Impact factor is the most used indicator for journal ranking defined by cited frequency. Impact factor is the quotient of the number of citations in the current year to papers published in the previous two years to the number of substantive articles published within the same two years. Number of all citations to journal is used in in impact factor'...
Conference Paper
Impact factor is the most used indicator for journal ranking defined by cited frequency. Impact factor is the quotient of the number of citations in the current year to papers published in the previous two years to the number of substantive articles published within the same two years. Number of all citations to journal is used in in impact factor'...