Loading...
Search for: java-programming-language
0.007 seconds
Total 26 records

    Java applets copy protection by steganography

    , Article 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2006, Pasadena, CA, 18 December 2006 through 20 December 2006 ; 2006 , Pages 388-391 ; 0769527450 (ISBN); 9780769527451 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    Following the expansion of Internet, many software were produced that could launch through Internet without prior installation on computers. This included game software and software that deal with financial affairs. These softwares are mainly in Java language and can be found on web pages as Java Applets. Some software owners want that their products only able to execute through their own web pages so that no one could put them on other web pages. In this paper, a new method has been presented to protect Java Applets from copying by using "Steganography in HTML web pages" method. In this method, a special 8-character string is hidden in the HTML page by a secret key. The string and the... 

    Collage steganography

    , Article 5th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2006. In conjunction with 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse, COMSAR 2006, Honolulu, HI, 10 July 2006 through 12 July 2006 ; Volume 2006 , 2006 , Pages 316-321 ; 0769526136 (ISBN); 9780769526133 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2006
    Abstract
    Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. One of the methods introduced for establishing hidden communication is steganography. Methods of steganography have been mostly applied on images while the major characteristic of these methods is the change in the structure and features of the images so as not to be identifiable by human users. However, on the other hand, many methods have been proposed for breaking and extracting information (steganalysis) for these methods. This paper presents a method for hiding information in images by changing the appearance of the picture instead... 

    The impact of MOF feasibility to improve the desalination performance and antifouling properties of FO membranes

    , Article RSC Advances ; Volume 6, Issue 74 , 2016 , Pages 70174-70185 ; 20462069 (ISSN) Zirehpour, A ; Rahimpour, A ; Khoshhal, S ; Firouzjaei, M. D ; Ghoreyshi, A. A ; Sharif University of Technology
    Royal Society of Chemistry  2016
    Abstract
    In this study, a hydrophilic metal-organic framework (MOF) was applied to improve the performance of a cellulosic membrane for forward osmosis (FO) desalination application. The characterization results confirmed that the MOF particles existed within the matrix of the modified membrane. The MOF loading led to adjustment of the membranes in terms of overall porosity, pore inter-connectivity and hydrophilicity. These features caused an improvement in the pure water permeability (72%) and reduce the structural parameter of the modified membrane to 136 μm. The FO water flux of the modified membrane enhanced by about 180% compared to an unmodified membrane, without decreasing its selectivity. FO... 

    Dynamic FPGA-accelerator sharing among concurrently running virtual machines

    , Article Proceedings of 2016 IEEE East-West Design and Test Symposium, EWDTS 2016, 14 October 2016 through 17 October 2016 ; 2017 ; 9781509006939 (ISBN) Nasiri, H ; Goudarzi, M ; Sharif University of Technology
    Abstract
    Using an FPGA as a hardware accelerator has been prevalent, to speed up compute intensive workloads. However, employing an accelerator in virtualized environment enhances complexity, because accessing the accelerator from virtual machines has significant overhead and sharing it needs some considerations. We have implemented adequate infrastructure to share an FPGA-based accelerator between multiple virtual machines with negligible access overhead which dynamically implements virtual machines' accelerators. In our architecture each user process from a virtual machine can directly access the FPGA over PCIe link and reconfigure its accelerator in the specified part of FPGA at run-time. The... 

    Drawing CAPTCHA

    , Article ITI 2006: 28th International Conference on Information Technology Interfaces, Cavtat/Dubrovnik, 19 June 2006 through 22 June 2006 ; 2006 , Pages 475-480 ; 13301012 (ISSN); 9537138054 (ISBN); 9789537138059 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    University of Zagreb  2006
    Abstract
    Nowadays, many daily human activities such as education, commerce, talks, etc. are carried out through the Internet. In cases such as the registering in websites, some hackers write programs to make automatic false enrolments which waste the resources of the website while this may even stop the entire website from working. Therefore, it is necessary to tell apart human users from computer programs which is known as CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart). CAPTCHA methods are mainly based on the weak points of OCR (Optical Character Recognition) systems while using them are undesirable to human users and esp. difficult in tools such as PDA's or... 

    Emergency SMS

    , Article 2006 SICE-ICASE International Joint Conference, Busan, 18 October 2006 through 21 October 2006 ; 2006 , Pages 1139-1142 ; 8995003855 (ISBN); 9788995003855 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2006
    Abstract
    Delivering first aid before transferring patients to hospital is among keys to survival. Moreover, calling the emergency center as soon as possible and providing brief information about the patient are helpful for the emergency center to dispatch specialized medical team and equipments proportionate to the conditions of the patient. Mobile phone is a device which many people use and always carry with them. One more thing is that SMS (Short Message Service) stands as a favorite service in mobile network, used to exchange short messages and featuring low cost, non-stop lines of dispatch, possibilities for offline work and so forth. This paper puts forward procedures of calling an emergency... 

    A new approach to persian/arabic text steganography

    , Article 5th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2006. In conjunction with 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse, COMSAR 2006, Honolulu, HI, 10 July 2006 through 12 July 2006 ; Volume 2006 , 2006 , Pages 310-315 ; 0769526136 (ISBN); 9780769526133 (ISBN) Shirali Shahreza, M. H ; Shirali Shahreza, M ; Sharif University of Technology
    2006
    Abstract
    Conveying information secretly and establishing hidden relationship has been of interest since long past. Text documents have been widely used since very long time ago. Therefore, we have witnessed different method of hiding information in texts (text steganography) since past to the present. In this paper we introduce a new approach for steganography in Persian and Arabic texts. Considering the existence of too many points in Persian and Arabic phrases, in this approach, by vertical displacement of the points, we hide information in the texts. This approach can be categorized under feature coding methods. This method can be used for Persian/Arabic Watermarking. Our method has been... 

    ExceptionTracer: A Solution Recommender for Exceptions in an Integrated Development Environment

    , Article 23rd IEEE International Conference on Program Comprehension, ICPC 2015, 18 May 2015 through 19 May 2015 ; Volume 2015-August , May , 2015 , Pages 299-302 ; 9781467381598 (ISBN) Amintabar, V ; Heydarnoori, A ; Ghafari, M ; Sharif University of Technology
    IEEE Computer Society  2015
    Abstract
    Exceptions are an indispensable part of the software development process. However, developers usually rely on imprecise results from a web search to resolve exceptions. More specifically, they should personally take into account the context of an exception, then, choose and adapt a relevant solution to solve the problem. In this paper, we present Exception Tracer, an Eclipse plug in that helps developers to resolve exceptions with respect to the stack trace in Java programs. In particular, Exception Tracer automatically provides candidate solutions to an exception by mining software systems in the Source Forge, as well as listing relevant discussions about the problem from the Stack Overflow... 

    Nanoporous Ag2O photocatalysts based on copper terephthalate metal–organic frameworks

    , Article Journal of Materials Science ; Volume 50, Issue 13 , 2015 , Pages 4536-4546 ; 00222461 (ISSN) Mohaghegh, N ; Kamrani, S ; Tasviri, M ; Elahifard, M ; Gholami, M ; Sharif University of Technology
    Kluwer Academic Publishers  2015
    Abstract
    We report the nanoporous Ag2O based on the copper terephthalate metal–organic frameworks (Ag2O/MOF) photocatalyst. Ag2O/MOF nanostructure was formed via oxygen treatment of Ag/MOF nanoparticles. The resulting Ag2O/MOF photocatalysts were characterised by various techniques. Results showed that the synthesised Ag2O/MOF nanocomposite exhibited dramatic separation of photoinduced electron/hole and excellent photodegradation activity under visible light irradiation. The degradation rate of acid blue 92 using Ag2O/MOF nanocomposite is found to be higher than that using pure MOF and Ag/MOF. It was divulged that the photodegradation rate is increased by oxygen treatment of Ag in Ag/MOF structure.... 

    Structure-aware online virtual machine consolidation for datacenter energy improvement in cloud computing

    , Article Computers and Electrical Engineering ; Volume 42 , 2015 , Pages 74-89 ; 00457906 (ISSN) Esfandiarpoor, S ; Pahlavan, A ; Goudarzi, M ; Sharif University of Technology
    Abstract
    The necessity and significance of improving the energy efficiency of cloud implementations have increased due to the rapid growth and proliferation of cloud computing services around the world. Virtual machines (VMs) comprise the backend of most, if not all, cloud computing services. Several VMs are often consolidated on a physical machine to efficiently utilize its resources. In this paper, we take into account the cooling and network structure of the datacenter host ing the physical machines when consolidating the VMs so that fewer racks and routers are employed, without compromising the service-level agreements; consequently, idle routing and cooling equipment can be turned off in order... 

    Interactive educational tool for teaching a simple cipher

    , Article Proceedings - 2014 International Symposium on Biometrics and Security Technologies, ISBAST 2014, 26 August 2014 through 27 August 2014 ; 2015 , Pages 102-105 ; 9781479964444 (ISBN) El Farra, A. A. H ; Zahedi, E ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    In this paper, a practical educational tool based on Java programming is described. The approach is based on using a fully interactive graphical user interface for teaching cipher algorithms. As an example, a transposition cipher is covered, where students can try different keys and observe the effect of parameters such as key length, choice of letters for the key on the ciphertext. At the same time, the process of breaking the cipher algorithm (cryptanalysis) is rendered possible by students injecting known plaintext. The developed program offers an option where it tries systematically all keys (brute force) to break the cipher. Being extendable, the platform is thought to be able to play a... 

    EXAF: A search engine for sample applications of object-oriented framework-provided concepts

    , Article Information and Software Technology ; Volume 75 , 2016 , Pages 135-147 ; 09505849 (ISSN) Noei, E ; Heydarnoori, A ; Sharif University of Technology
    Elsevier 
    Abstract
    Object-oriented application frameworks, such as Java Swing, provide reusable code and design for implementing domain-specific concepts, such as Context Menu, in software applications. Hence, use of such frameworks not only can decrease the time and the cost of developing new software applications, but also can increase their maintainability. However, the main problems of using object-oriented application frameworks are their large and complex APIs, and often incomplete user manuals. To mitigate these problems, developers often try to learn how to implement their desired concepts from available sample applications. Nonetheless, this introduces another hard and time-consuming challenge which... 

    Crowdsummarizer: automated generation of code summaries for java programs through crowdsourcing

    , Article IEEE Software ; Volume 34, Issue 2 , 2017 , Pages 71-80 ; 07407459 (ISSN) Badihi, S ; Heydarnoori, A ; Sharif University of Technology
    Abstract
    To perform software maintenance, developers must have a relatively good understanding of the program's source code, which is often written by other developers. Code summaries, which describe a program's entities (for example, its methods), help developers better comprehend code more quickly. However, generating code summaries can be challenging. To mitigate this problem, CrowdSummarizer exploits crowdsourcing, gamification, and natural-language processing to automatically generate high-level summaries of Java program methods. Researchers have implemented it as an Eclipse plug-in together with a Web-based code summarization game that can be played by the crowd. Two empirical studies... 

    Synthesis of metal-organic framework hybrid nanocomposites based on GO and CNT with high adsorption capacity for dye removal

    , Article Chemical Engineering Journal ; Volume 326 , 2017 , Pages 1145-1158 ; 13858947 (ISSN) Abdi, J ; Vossoughi, M ; Mahmoodi, N. M ; Alemzadeh, I ; Sharif University of Technology
    Abstract
    In this study, zeolitic imidazolate framework (ZIF-8) as a metal-organic framework (MOF) and its hybrid nanocomposites based on graphene oxide (GO) and carbon nanotubes (CNTs) were synthesized by facile method at an ambient temperature. The sufficiency of GO and CNT substrates as the main components of the composites to grow nanoscale MOFs and increase dispersive forces were investigated. The characteristics of the MOF and hybrid nanocomposites were studied using FTIR, SEM, XRD, BET and TGA techniques. The prepared nanomaterials applied as adsorbents to remove malachite green (MG) as a cationic dye from colored wastewater. The removal rates of the hybrid nanocomposites were greater than that... 

    Steganography in wireless application protocol

    , Article IASTED International Conference on Internet and Multimedia Systems and Applications, Innsbruck, 13 February 2006 through 15 February 2006 ; Volume 2006 , 2006 , Pages 91-95 ; 0889865663 (ISBN); 9780889865662 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2006
    Abstract
    Mobile phone and Internet technologies have progressed along each other. The importance of both these technologies has resulted in the creation of a new technology for establishing wireless Internet connection through mobile phone, known as Wireless Application Protocol (WAP). However, considering the importance of the issue of data security and especially establishing hidden communications, many methods have been presented. In the meanwhile, steganography is a relatively new method. In this paper, a method for hidden exchange of data has been presented by using steganography on WML pages (WML stands for Wireless Markup Language, which is a language for creating web pages for the WAP). The... 

    Multilingual highlighting CAPTCHA

    , Article Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011, 11 April 2011 through 13 April 2011, Las Vegas, NV ; 2010 , Pages 447-452 ; 9780769543673 (ISBN) Shirali Shahreza, S ; Shirali Shahreza, M ; Sharif University of Technology
    2010
    Abstract
    There are many websites specially designed for mobile phones. Some hackers write automated programs to abuse these website services and waste the website resources. Therefore, it is necessary to distinguish between human users and computer programs. Methods known for achieving this are known as CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart). CAPTCHA methods are mainly based on the weaknesses of OCR (Optical Character Recognition) systems and ask the user to type a word. So using them is difficult in tools such as PDAs (Personal Digital Assistant) or mobile phones that lack a complete keyboard. In this paper, a new CAPTCHA system is proposed for... 

    An approach for refining JML specification to object oriented code

    , Article 2009 14th International CSI Computer Conference, 20 October 2009 through 21 October 2009 ; 2009 , Pages 1-9 ; 9781424442621 (ISBN) Piri, R ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
    Abstract
    JML is a behavioral interface specification language which has Java as its target implementation language. It combines the idea of using Java expressions from Eiffel language with the model-based approach to specify a program. Refinement calculus is a framework to produce executable code from a specification by preserving the correctness of programs. In this paper some constructs of JML concerning object creation, feature call, exceptional behavior and concurrency constructs are studied and some refinement rules are proposed to obtain an object oriented code in Java from a JML specification containig these constructs. The correctness of these rules is proved by weakest precondition predicate... 

    Text steganography in SMS

    , Article 2nd International Conference on Convergent Information Technology, ICCIT 07, Gyongju, 21 November 2007 through 23 November 2007 ; 2007 , Pages 2260-2265 ; 0769530389 (ISBN); 9780769530383 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, M. H ; Sharif University of Technology
    2007
    Abstract
    One of the services used in mobile phone is the short message service (SMS) which is widely used by the public in all parts of the world especially in Asia and Europe. This service enables people to write and exchange short messages via mobile phone. Due to the limited size of SMS, lack of a proper keyboard on the mobile phone and to improve the speed of typing, new abbreviations have been invented for different words and phrases which has lead to the invention of a new language called SMS-Textlng. One of the main issues in communication is information security and privacy. There are many methods for secret communication and many researchers are working on steganography. In steganography the... 

    Text steganography in chat

    , Article 3rd IEEE/IFIP International Conference in Central Asia on Internet, ICI 2007, Tashkent, 26 September 2007 through 28 September 2007 ; 2007 ; 1424410061 (ISBN); 9781424410064 (ISBN) Shirali Shahreza, M. H ; Shirali Shahreza, M ; Sharif University of Technology
    2007
    Abstract
    Invention of the Internet and its spread in the world changes various aspects of human life. In addition, Internet changed human relations. Chat is one of the new aspects which invented after the Internet and is welcomed by users, especially by young people. In chat rooms, people talk with each other using text messages. Because of the need for quick typing of the word and also because of the high amount of sentences which is exchanged between users, new abbreviations are invented for various words and phrases in chat rooms. This new language is known as SMS-Texting. On the other hand, the issue of safety and security of information and especially secret relationships has led to the... 

    Steganography in MMS

    , Article 11th IEEE International Multitopic Conference, INMIC 2007, Lahore, 28 December 2007 through 30 December 2007 ; 2007 ; 1424415535 (ISBN); 9781424415533 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2007
    Abstract
    After rapid growth of the Internet, establishing hidden communication is an important subject of security that has gained increasing importance. One of the methods for establishing hidden communication is steganography. On the other hand with the expanding the use of mobile phones mobile telecommunication companies starting to add additional features to their mobile phones such as MMS (Multimedia Messaging Service) in order to attract more customers. Considering above statements, steganography in MMS messages is a good solution for establishing hidden communication. In this paper a new method for steganography in MMS messages using both text and image steganography methods is presented. This...