Loading...
Search for: basic--programming-language
0.011 seconds

    A time warping speech recognition system based on particle swarm optimization

    , Article 2nd Asia International Conference on Modelling and Simulation, AMS 2008, Kuala Lumpur, 13 May 2008 through 15 May 2008 ; 2008 , Pages 585-590 ; 9780769531366 (ISBN) Rategh, S ; Razzazi, F ; Rahmani, A. M ; Gharan, S. O ; Sharif University of Technology
    2008
    Abstract
    In this paper, dynamic programming alignment is replaced by a particle swarm optimization (PSO) procedure in time warping problem. The basic PSO is a very slow process to be applied to speech recognition application. In order to achieve a higher performance, by inspiring of PSO optimization methodology, we introduced a PSO Inspired Time warping Algorithm (PTW) that significantly increase the computational performance of time warping in alignments of long length massive data sets. As a main enhancement, a pruning strategy with an add-in controlling threshold is defined in PTW that causes a considerable reduction in recognition time, while maintaining the system accuracy comparing to DTW. ©... 

    Text steganography in SMS

    , Article 2nd International Conference on Convergent Information Technology, ICCIT 07, Gyongju, 21 November 2007 through 23 November 2007 ; 2007 , Pages 2260-2265 ; 0769530389 (ISBN); 9780769530383 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, M. H ; Sharif University of Technology
    2007
    Abstract
    One of the services used in mobile phone is the short message service (SMS) which is widely used by the public in all parts of the world especially in Asia and Europe. This service enables people to write and exchange short messages via mobile phone. Due to the limited size of SMS, lack of a proper keyboard on the mobile phone and to improve the speed of typing, new abbreviations have been invented for different words and phrases which has lead to the invention of a new language called SMS-Textlng. One of the main issues in communication is information security and privacy. There are many methods for secret communication and many researchers are working on steganography. In steganography the... 

    Text steganography in chat

    , Article 3rd IEEE/IFIP International Conference in Central Asia on Internet, ICI 2007, Tashkent, 26 September 2007 through 28 September 2007 ; 2007 ; 1424410061 (ISBN); 9781424410064 (ISBN) Shirali Shahreza, M. H ; Shirali Shahreza, M ; Sharif University of Technology
    2007
    Abstract
    Invention of the Internet and its spread in the world changes various aspects of human life. In addition, Internet changed human relations. Chat is one of the new aspects which invented after the Internet and is welcomed by users, especially by young people. In chat rooms, people talk with each other using text messages. Because of the need for quick typing of the word and also because of the high amount of sentences which is exchanged between users, new abbreviations are invented for various words and phrases in chat rooms. This new language is known as SMS-Texting. On the other hand, the issue of safety and security of information and especially secret relationships has led to the... 

    Steganography in MMS

    , Article 11th IEEE International Multitopic Conference, INMIC 2007, Lahore, 28 December 2007 through 30 December 2007 ; 2007 ; 1424415535 (ISBN); 9781424415533 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2007
    Abstract
    After rapid growth of the Internet, establishing hidden communication is an important subject of security that has gained increasing importance. One of the methods for establishing hidden communication is steganography. On the other hand with the expanding the use of mobile phones mobile telecommunication companies starting to add additional features to their mobile phones such as MMS (Multimedia Messaging Service) in order to attract more customers. Considering above statements, steganography in MMS messages is a good solution for establishing hidden communication. In this paper a new method for steganography in MMS messages using both text and image steganography methods is presented. This... 

    Involving computer science students in real-world problems

    , Article ITI 2008 30th International Conference on Information Technology Interfaces, Cavtat/Dubrovnik, 23 June 2008 through 26 June 2008 ; 2008 , Pages 569-573 ; 13301012 (ISSN) ; 9789537138127 (ISBN) Shirali Shahreza, S ; Shirali ShahrezaMohammad, M ; Sharif University of Technology
    2008
    Abstract
    Today, many students are study computer science. Although they study different courses, they rarely do homework or projects related to real world problems. In this paper, we design a project to show some of the problems which are occured during implementing a real word project to the students. In this project, the students are asked to implement the FFT (Fast Fourier Transform) algorithm on a personal computer and then port the program to a smartphone using J2ME (Java 2 Micro Edition) programming language. By doing this project, the undergraduate computer science students will become familiar with the limitations of small devices such as smartphones. They also learn the process of porting a...