Loading...
Search for: database
0.007 seconds
Total 196 records

    Genetic identification by NoorGIS software to identify martyrs in military accidents

    , Article Journal of Military Medicine ; Vol. 15, issue. 4 , 2014 , pp. 267-271 ; ISSN: 17351537 Miri, A ; Rabdost Motlagh, M ; Tavallaie, A ; Tavallaie, M ; Sharif University of Technology
    Abstract
    Aims: Due to large sized genetic database of population in a given society, researchers face serious problem to analyze genetic data and provide accurate genetic identification. Variation in molecular markers such as SNPs, mtDNAs, STRs and Y-chromosome are utilized for different purposes, including genetic identification. In our country due to natural disasters and imposed war, the use of this technology was considered and according to the requirements, an optimal database was designed that has the capability of analyzing genetic data. Methods: After obtaining individual genetic information, a software was designed for the analysis of genetic information as well as to serve as a common... 

    Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network

    , Article ISeCure ; Volume 14, Issue 2 , 2022 , Pages 215-227 ; 20082045 (ISSN) Salami, Z ; Ahmadian Attari, M ; Aref, M. R ; Jannati, H ; Sharif University of Technology
    Iranian Society of Cryptology  2022
    Abstract
    Since their introduction, Cognitive Radio Networks (CRN), as a new solution to the problem of spectrum scarcity, have received great attention from the research society. An important field in database-driven CRN studies is pivoted on their security issues. A critical issue in this context is user’s location privacy, which is potentially under serious threat. The query process by secondary users (SU) from the database is one of the points where the problem rises. In this paper, we propose a Privacy-Preserving Query Process (PPQP), accordingly. This method lets SUs deal in the process of spectrum query without sacrificing their location information. Analytical assessment of PPQP’s privacy... 

    Preventing database schema extraction by error message handling

    , Article Information Systems ; Volume 56 , 2016 , Pages 135-156 ; 03064379 (ISSN) Naghdi, S ; Amini, M ; Sharif University of Technology
    Elsevier Ltd 
    Abstract
    Nowadays, a large volume of an organization's sensitive data is stored in databases making them attractive to attackers. The useful information attackers try to obtain in the preliminary steps, is the database structure or schema. One of the popular approaches to infer and extract the schema of a database is to analyze the returned error messages from its DBMS. In this paper, we propose a framework to handle and modify the error messages automatically in order to prevent schema revealing. To this aim, after identifying and introducing an appropriate set of categories of error messages, each error message that is returned from a DBMS is placed in a proper category. According to the policy... 

    SFAVD: Sharif farsi audio visual database

    , Article IKT 2013 - 2013 5th Conference on Information and Knowledge Technology, Shiraz, Iran ; 2013 , Pages 417-421 ; 9781467364904 (ISBN) Naraghi, Z ; Jamzad, M ; Sharif University of Technology
    2013
    Abstract
    With increasing use of computers in everyday life, improved communication between machines and human is needed. To make a right communication and understand a humankind face which is made in a graphical environment, implementing the audio and visual projects like lip reading, audio and visual speech recognition and lip making are needed. Lack of a complete audio and visual database for this application in Farsi language made us provide a new complete Farsi database for this project that is called SFAVD. It is a unique audio and visual database which in addition to considering Farsi conceptual and speech structure, it considers influence of speech on lip changes. This database is created for... 

    Semantic log based replication model for optimizing heterogeneous DBMS interaction

    , Article 2009 1st International Conference on Advances in Databases, Knowledge, and Data Applications, DBKDA 2009, Gosier, 1 March 2009 through 6 March 2009 ; 2009 , Pages 138-142 ; 9780769535500 (ISBN) Farahmand Nejad, A ; Kharazmi, S ; Bayati, S ; Golmohammadi, S. K ; Abolhassani, H ; IARIA ; Sharif University of Technology
    2009
    Abstract
    The growth of database application usage requires DataBase Management Systems (DBMS) that are accessible, reliable, and dependable. One approach to handle these requirements is replication mechanism. Replication mechanism can be divided into various categories. Some related works consider two categories for replication mechanisms: heterogeneous and homogenous however majority of them classify them in three groups: physical, trigger-based and log based schema. Log-based replication mechanisms are the most widely used category among DBMS vendors. Adapting such approach for heterogeneous systems is a complex task, because of lack of log understanding in the other end. Semantic technologies... 

    Generation of database schemas from Z specifications

    , Article IEEE International Conference on Electro Information Technology, 15 May 2011 through 17 May 2011, Mankato, MN ; 2011 ; 21540357 (ISSN) Khalafinejad, S ; Mirian Hosseinabadi, S. H ; IEEE Region 4 (R4) ; Sharif University of Technology
    2011
    Abstract
    Automatic translation of a high-level specification language to an executable implementation would be highly useful in maximizing the benefits of formal methods. We will introduce a set of translation functions to fill the specification-implementation gap in the domain of database applications. Because the mathematical foundation of Z has many properties in common with SQL, a direct mapping from Z to SQL structures can be found. We derive a set of translation functions from Z to SQL for the generation of a database. The proposed methodology results in reducing the expenses and duration of the software development, and also, prevents the errors originated from the manual translation of... 

    ShEMO: a large-scale validated database for persian speech emotion detection

    , Article Language Resources and Evaluation ; 2018 ; 1574020X (ISSN) Nezami, O. M ; Jamshid Lou, P ; Karami, M ; Sharif University of Technology
    Springer Netherlands  2018
    Abstract
    This paper introduces a large-scale, validated database for Persian called Sharif Emotional Speech Database (ShEMO). The database includes 3000 semi-natural utterances, equivalent to 3 h and 25 min of speech data extracted from online radio plays. The ShEMO covers speech samples of 87 native-Persian speakers for five basic emotions including anger, fear, happiness, sadness and surprise, as well as neutral state. Twelve annotators label the underlying emotional state of utterances and majority voting is used to decide on the final labels. According to the kappa measure, the inter-annotator agreement is 64% which is interpreted as “substantial agreement”. We also present benchmark results... 

    ShEMO: a large-scale validated database for Persian speech emotion detection

    , Article Language Resources and Evaluation ; Volume 53, Issue 1 , 2019 ; 1574020X (ISSN) Mohamad Nezami, O ; Jamshid Lou, P ; Karami, M ; Sharif University of Technology
    Springer Netherlands  2019
    Abstract
    This paper introduces a large-scale, validated database for Persian called Sharif Emotional Speech Database (ShEMO). The database includes 3000 semi-natural utterances, equivalent to 3 h and 25 min of speech data extracted from online radio plays. The ShEMO covers speech samples of 87 native-Persian speakers for five basic emotions including anger, fear, happiness, sadness and surprise, as well as neutral state. Twelve annotators label the underlying emotional state of utterances and majority voting is used to decide on the final labels. According to the kappa measure, the inter-annotator agreement is 64% which is interpreted as “substantial agreement”. We also present benchmark results... 

    Gelatin-based functional films integrated with grapefruit seed extract and TiO2 for active food packaging applications

    , Article Food Hydrocolloids ; Volume 112 , 2021 ; 0268005X (ISSN) Riahi, Z ; Priyadarshi, R ; Rhim, J. W ; Bagheri, R ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    Gelatin-based functional films were prepared by the addition of grapefruit seed extract (GSE, 5 wt% based on gelatin) and various amounts of TiO2 (0.5, 1.0, 3.0, and 5.0 wt% based on gelatin). TiO2 was evenly dispersed in the gelatin film, but the film surface roughness was increased as the concentration of TiO2 increased. The mechanical strength and water contact angle (WCA) of the composite film were the highest, while the water vapor permeability (WVP) was the lowest when 0.5 wt% TiO2 was used. The addition of GSE slightly reduced the UV light transmittance, but the addition of TiO2 almost completely prevented the UV light transmission. The addition of GSE and TiO2 did not significantly... 

    Processing Queries with Mathematical Expressions on Encrypted Outsourced Databases

    , M.Sc. Thesis Sharif University of Technology Naseri Boroujeni, Saeed (Author) ; Jalil, Rasool (Supervisor)
    Abstract
    The ever-increasing volume of data and the lack of computational and storage facilities have caused a managerial challenge to organizations. The existence of these challenges on the one hand and the increase of storage services on the other hand have compelled the organizations to delegate their storage and management of data to the server providers of cloud storage services. The outsourcing of data to servers obviates the need for purchasing exorbitant storage equipment and recruiting professional workforce in the organization. Since the organization’s data will be kept outside the organization’s ambience in case of using such services in form of outsourcing, and the data will not be under... 

    CANCERSIGN: a user-friendly and robust tool for identification and classification of mutational signatures and patterns in cancer genomes

    , Article Scientific Reports ; Volume 10, Issue 1 , 2020 Bayati, M ; Rabiee, H. R ; Mehrbod, M ; Vafaee, F ; Ebrahimi, D ; Forrest, A. R. R ; Alinejad Rokny, H ; Sharif University of Technology
    Nature Research  2020
    Abstract
    Analysis of cancer mutational signatures have been instrumental in identification of responsible endogenous and exogenous molecular processes in cancer. The quantitative approach used to deconvolute mutational signatures is becoming an integral part of cancer research. Therefore, development of a stand-alone tool with a user-friendly interface for analysis of cancer mutational signatures is necessary. In this manuscript we introduce CANCERSIGN, which enables users to identify 3-mer and 5-mer mutational signatures within whole genome, whole exome or pooled samples. Additionally, this tool enables users to perform clustering on tumor samples based on the proportion of mutational signatures in... 

    Content based image retrieval using the knowledge of texture, color and binary tree structure

    , Article 2009 Canadian Conference on Electrical and Computer Engineering, CCECE '09, St. Johns, NL, 3 May 2009 through 6 May 2009 ; 2009 , Pages 999-1003 ; 08407789 (ISSN); 9781424435081 (ISBN) Mansoori, Z ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    Content base image retrieval is an important research field with many applications. In this paper we presents a new approach for finding similar images to a given query, in a general-purpose image database using content-based image retrieval. Color and texture are used as basic features to describe images. In addition, a binary tree structure is used to describe higher level features of an image. It has been used to keep information about separate segments of the images. The performance of the proposed system has been compared with the SIMPLIcity system using COREL image database. Our experimental results showed that among 10 image categories available in COREL database, our system had a... 

    An access and inference control model for time series databases

    , Article Future Generation Computer Systems ; Volume 92 , 2019 , Pages 93-108 ; 0167739X (ISSN) Noury, A ; Amini, M ; Sharif University of Technology
    Elsevier B.V  2019
    Abstract
    Today, many applications produce and use time series data. The data of this type may contain sensitive information. So they should be protected against unauthorized accesses. In this paper, security issues of time series data are identified and an access and inference control model for satisfying the identified security requirements is proposed. Using this model, administrators can define authorization rules based on various time-based granularities (e.g. day or month) and apply value-based constraints over the accessed times series data. Furthermore, they can define policy rules over the composition of multiple time-series other than the base time-series data. Detecting and resolving... 

    A Method for Searching on Encrypted Data

    , M.Sc. Thesis Sharif University of Technology Mansoori, Fatemeh (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Using database encryption to protect data in some situations where access control is not soleley enough is inevitable. Database encryption provides an additional layer of protecton to conventional access control techniques. It prevents unauthorized users, including intruders breaking into a network, from viewing the sensitive data. As a result data remains protected even in the event that database is successfully attacked or stolen. However, encryption and decryption of data result in database performance degradation. In the situation where all the information is stored in encrypted form, one cannot make the selection on the database content any more. Data should be decrypted first, so an... 

    Database Schema Extraction Prevention Through DBMS Error Handling

    , M.Sc. Thesis Sharif University of Technology Naghdi, Sepideh (Author) ; Amini, Morteza (Supervisor)
    Abstract
    Nowadays large volume of sensitive data of organizations are stored in the databases. Thus, databases are attractive to the attackers to execute different types of attacks with different purposes. The useful information that attackers try to achieve in the preliminary steps of the attacks against the databases, is the database structure or schema. One of the popular approach to extract the schema of a database is to analyze the returned error messages from its DBMS. Hence, a solution to prevent schema disclosure via the error messages is customizing and modifying them. To achieve this goal, in this thesis, we propose a framework to handle and customize the error messages automatically and... 

    An Access Control System for Time Series Data in NoSQL Databases

    , M.Sc. Thesis Sharif University of Technology Noury, Amir (Author) ; Amini, Morteza (Supervisor)
    Abstract
    An important class of applications which have been rapidly growing recently is the one that create and use time series data. These types of data sets are ordered based on the timestamps associated to their data items. In practice, traditional relational databases are unable to satisfy the requirements of these data sets; however, NoSQL databases with column-wide data structure are appropriate infrastructure for them. These databases are very efficient in read and write operations (especially for time series data, which are ordered) and are able to store unstructured data. Time series data may contain valuable and sensitive information; hence, they should be protected from the information... 

    Correctness verification in database outsourcing: A trust-based fake tuples approach

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 7671 LNCS , 2012 , Pages 343-351 ; 03029743 (ISSN) ; 9783642351297 (ISBN) Ghasemi, S ; Noferesti, M ; Hadavi, M. A ; Nogoorani, S. D ; Jalili, R ; Sharif University of Technology
    2012
    Abstract
    An important security challenge in database outsourcing scenarios is the correctness verification of query results. The proposed approaches in the literature, impose high overhead on both the service provider and specially the clients. In this paper, we propose the Trust-Based Fake Tuples approach to audit the correctness of query results. In this approach, some fake tuples are included among the real ones in order to verify the correctness of the results. The experience learnt from past results is used in this paper to evaluate the trust toward the service provider. This trust value is used to tune the number of fake tuples and subsequently the imposed overhead. As the trust value toward... 

    Thirty-nine years of Iran's scientific products in the field of Geophysics

    , Article Journal of the Earth and Space Physics ; Volume 41, Issue 1 , 2015 , Pages 145-164 ; 03781046 (ISSN) Asadi, M ; Ghaderi Sohi, A ; Sharif University of Technology
    Institute of Geophysics  2015
    Abstract
    Identifying and measuring the impact and value of scientific output plays an important role in today's world of information overload. On one side, governments are trying to distribute research funds in ways that support research in strategically important fields, on the other side, researchers and scientists are seeking to access only relevant and quality information that have mainly worthy of their attention. Nowadays, countries are evaluated not only by their national products, military power, geographical area, etc., but also by such factors as the production and consumption of scientific information. Scientometric approaches are used to provide appropriate tools for evaluating scientific... 

    Parallel nonlinear analysis of weighted brain's gray and white matter images for Alzheimer's dementia diagnosis

    , Article Conference proceedings : ... Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Conference ; 2010 , Pages 5573-5576 ; 1557170X (ISSN) Razavian, S. M ; Torabi, M ; Kim, K ; Sharif University of Technology
    2010
    Abstract
    In this study, we are proposing a novel nonlinear classification approach to discriminate between Alzheimer's Disease (AD) and a control group using T1-weighted and T2-weighted Magnetic Resonance Images (MRI's) of brain. Since T1-weighted images and T2-weighted images have inherent physical differences, obviously each of them has its own particular medical data and hence, we extracted some specific features from each. Then the variations of the relevant eigenvalues of the extracted features were tracked to pick up the most informative ones. The final features were assigned to two parallel systems to be nonlinearly categorized. Considering the fact that AD defects the white and gray regions... 

    Towards an architecture for real-time data storage

    , Article Proceedings - 2nd International Conference on Computational Intelligence, Modelling and Simulation, CIMSim 2010, 28 September 2010 through 30 September 2010 ; 2010 , Pages 279-284 ; 9780769542621 (ISBN) Yektamanesh, O ; Habibi, J ; Ahmadi, H ; Vatanian Shanjani, G ; Sharif University of Technology
    Abstract
    Nowadays, due to the growing role that analytical, predictive and decision making activities perform in organizations, organizational data are very important. In order to utilizing organizational data, it should be transmitted from the operational and transactional environment to a dimensional or normal database. However, not only differences in platforms and data types are some issues that should be overcome, but also variety of data types such as non-structural and text format files should be considered. In this way, exploiting updated data storages is necessary for quick and accurate services and raising customers' satisfaction. Although real time data storages are frequently used in...