Search for: knowledge-engineering
0.006 seconds

    Steganography in TeX documents

    , Article Proceedings of 2008 3rd International Conference on Intelligent System and Knowledge Engineering, ISKE 2008, Xiamen, 17 November 2008 through 19 November 2008 ; December , 2008 , Pages 1363-1366 ; 9781424421978 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    Steganography is a method for hidden exchange of information by hiding data in a cover media such as image or sound. Text Steganography is one of the most difficult methods because a text file is not a proper media to hide data in it. In this paper we propose a new text Steganography method. In this method, we hide data in TeX documents. This method hides the data in places where there is a ligature such as "fi". © 2008 IEEE  

    Taxonomy construction using compound similarity measure

    , Article OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, 25 November 2007 through 30 November 2007 ; Volume 4803 LNCS, Issue PART 1 , 2007 , Pages 915-932 ; 03029743 (ISSN); 9783540768463 (ISBN) Neshati, M ; Hassanabadi, L. S ; Sharif University of Technology
    Springer Verlag  2007
    Taxonomy learning is one of the major steps in ontology learning process. Manual construction of taxonomies is a time-consuming and cumbersome task. Recently many researchers have focused on automatic taxonomy learning, but still quality of generated taxonomies is not satisfactory. In this paper we have proposed a new compound similarity measure. This measure is based on both knowledge poor and knowledge rich approaches to find word similarity. We also used Neural Network model for combination of several similarity methods. We have compared our method with simple syntactic similarity measure. Our measure considerably improves the precision and recall of automatic generated taxonomies. ©... 

    Modeling and control of cell cycle

    , Article 3rd International Conference on Bioinformatics and Biomedical Engineering, iCBBE 2009 ; 2009 ; 9781424429028 (ISBN) Azizi, A ; Seifipour, N ; Sharif University of Technology
    Applying engineering approaches to non-engineering systems such as biological systems has brought a new research filed to the surface. The sole purpose of this research is mathematical modeling the cell cycle control system in the fissionyeast cell using Ordinary Differential Equations (ODE).This paper, in fact, introduces the capabilities of engineering knowledge and engineering of control, in particular, in this field. ©2009 IEEE  

    A novel pre-processing method to reduce noise effects in a prototype-based clustering algorithm

    , Article 2008 International Conference on Information and Knowledge Engineering, IKE 2008, Las Vegas, NV, 14 July 2008 through 17 July 2008 ; July , 2008 , Pages 587-593 ; 1601320752 (ISBN); 9781601320759 (ISBN) Taghikhaki, Z ; Minaei, B ; Masoum, A ; Sharif University of Technology
    In this paper we introduce a preprocessing method to reduce noise effects in noise prone environments. Prototype based clustering algorithms are sensitive to noise because the effect of noisy data are as same as effect of true data and this affects on calculation of clusters center and then reduces accuracy. Therefore, these algorithms can not be applied in noise-prone environments and if this is applied there, we can not trust to the results. To overcome such problems we reduce and in some cases eliminate the noisy data. Also a part of our method is applied on the source of generated data in a network. Then noisy data that the number of them is high in noisy environments are eliminated and... 

    Simple and efficient method to measure vessel tortuosity

    , Article Proceedings of the 3rd International Conference on Computer and Knowledge Engineering, ICCKE 2013, Mashhad: Iran ; 2013 , Pages 219-222 ; 9781479920921 (ISBN) Pourreza, H. R ; Pourreza, M ; Banaee, T ; Sharif University of Technology
    Retinal vessels tortuosity is one of the important signs of cardiovascular diseases such as diabetic retinopathy and hypertension. In this paper we present a simple and efficient algorithm to measure the grade of tortuosity in retinal images. This algorithm consists of four main steps,vessel detection, extracting vascular skeleton via thinning, detection of vessel crossovers and bifurcations and finally calculating local and global tortuosity. The last stage is based on a circular mask that is put on every skeleton point of retinal vessels. While the skeleton of vessel splits the circle in each position, the local tortuosity is considered to be the bigger to smaller area ratio. The proposed... 

    New ensemble method for classification of data streams

    , Article 2011 1st International eConference on Computer and Knowledge Engineering, ICCKE 2011, Mashhad, 13 October 2011 through 14 October 2011 ; 2011 , Pages 264-269 ; 9781467357135 (ISBN) Sobhani, P ; Beigy, H ; Sharif University of Technology
    Classification of data streams has become an important area of data mining, as the number of applications facing these challenges increases. In this paper, we propose a new ensemble learning method for data stream classification in presence of concept drift. Our method is capable of detecting changes and adapting to new concepts which appears in the stream  

    Pseudo-triangulating a simple polygon from its visibility graph

    , Article 2015 5th International Conference on Computer and Knowledge Engineering, ICCKE 2015, 29 October 2015 ; October , 2015 , Pages 106-111 ; 9781467392808 (ISBN) Emamy, Z. S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Visibility graph of a simple polygon in a plain is a graph in which the number of its vertices corresponds with the number of vertices in the polygon and each of its edges corresponds with a pair of visible vertices in the polygon. Visibility graph reconstruction of a polygon is one of the old and important problems in computational geometry for which no algorithm has been offered yet. Considering that the problem of visibility graph reconstruction of a pseudo-triangle has been solved, we present an O(n2)-time algorithm for pseudo-triangulation of a simple polygon, using the visibility graph corresponding with the polygon (n is number of vertices of the polygon). To do so, first we present a... 

    Evaluation of test collection construction methods: A case study

    , Article 2008 International Conference on Information and Knowledge Engineering, IKE 2008, Las Vegas, NV, 14 July 2008 through 17 July 2008 ; January , 2008 , Pages 16-22 ; 1601320752 (ISBN); 9781601320759 (ISBN) Sheykh Esmaili, K ; Hosseini, M ; Rostami, A ; Abolhassani, H ; Sharif University of Technology
    Currently there is no standard test collection for evaluation of Farsi information retrieval systems. In this paper we introduce Mahak, the first complete test collection generally available for evaluating Farsi information retrieval systems. In addition, we have used different methods for constructing Mahak qrels and we have compared performance of these methods  

    Fuzzy learning in Zamin artificial world

    , Article Fuzzy Sets and Systems ; Volume 152, Issue 3 , 2005 , Pages 603-615 ; 01650114 (ISSN) Halavati, R ; Shouraki, S. B ; Sharif University of Technology
    Fuzzy logic is a suitable approach for linguistic knowledge representation and Artificial Life (A-Life) is a field of study dedicated to studying life and synthesis of creatures like those of real world. Thus, as our understanding about life is more in linguistic form than exact numbers, fuzzy logic seems to be a suitable logic for artificial creatures. In this paper, we have tried to apply fuzzy logic to an A-life environment and have studied the changes in capabilities of its creatures when using fuzzy minds. To do this, we have selected an A-life model called Zamin, which has creatures with case-based reasoner brains who must learn their environmental rules, search for food, avoid... 

    CFM: A file manager with multiple categorization support

    , Article SEKE 2010 - Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering, 1 July 2010 through 3 July 2010 ; 2010 , Pages 748-751 ; 1891706268 (ISBN); 9781891706264 (ISBN) Badashian, A. S ; Afzali, H ; Khalkhali, I ; Delcheh, M. A ; Shafiei, M. S ; Mahdavi, M ; Sharif University of Technology
    This paper introduces a new file manager to support multiple categorization. The proposed file manager is designed based on a subtle idea named Conceptual File Management (CFM). According to this approach, files are not contained by folders; nevertheless, each file can be a member of one or more folders (concepts). A prototype file manager is designed and implemented based on the new approach. Filtering by set operations and also manual concept selection improves retrieval of the files. CFM improves file system's clarity and avoids ambiguity and redundancy. As a result, it reduces the size of file system and enhances file access  

    Method engineering process patterns

    , Article 2nd India Software Engineering Conference, ISEC 2009, Pune, 23 February 2009 through 26 February 2009 ; 2009 , Pages 143-144 ; 9781605584263 (ISBN) Asadi, M ; Ramsin, R ; Computer Society of India ; Sharif University of Technology
    Method Engineering (ME) is based on the notion that no two software development projects are identical, and hence, the same development process is never executed twice. The need therefore arises for custom-built software development methodologies that are tailored to fit the specific project situation at hand, thus giving rise to the various Situational Method Engineering (SME) approaches currently in use. A process pattern is a description of a recurring development process fragment that can be used as a building block for engineering development processes. Software development process patterns are extensively used in SME, mainly as process components assembled together to form bespoke... 

    Persian sentiment lexicon expansion using unsupervised learning methods

    , Article 9th International Conference on Computer and Knowledge Engineering, ICCKE 2019, 24 October 2019 through 25 October 2019 ; 2019 , Pages 461-465 ; 9781728150758 (ISBN) Akhoundzade, R ; Hashemi Devin, K ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Sentiment analysis, is a subfield of natural language processing that aims at opinion mining to analyze thoughts, orientation and, evaluation of users within some texts. The solution to this problem includes two main steps: extracting aspects and determining users' positive or negative sentiments with respect to the aspects. Two main challenges of sentiment analysis in the Persian language are lack of comprehensive tagged data sets and use of colloquial language in texts. In this paper we propose, a system to specify and extract sentiment words using unsupervised methods in the Persian language that also support colloquial words. Additionally, we also proposed and implemented a state-of-art... 

    Bibliography of works done on CAPTCHA

    , Article Proceedings of 2008 3rd International Conference on Intelligent System and Knowledge Engineering, ISKE 2008, Xiamen, 17 November 2008 through 19 November 2008 ; 2008 , Pages 205-210 ; 9781424421978 (ISBN) Shirali Shahreza, S ; Shirali-Shahreza, M. H ; Sharif University of Technology
    Nowadays, a great amount of information is circulated through the Internet. Some of them exclusively belongs to a special group of users and requires protection and safeguarding against unauthorized access. To this end, a category of systems called HIP (Human Interactive Proof) have been introduced to distinguish between various groups of users. CAPTCHA (Completely Automatic Public Turing Test to Tell Computer and Human Apart) methods are one of the important branches of HIP systems which are used to distinguish between human users and computer programs automatically. These methods are based on Artificial Intelligence (AI) topics. The goal of these systems is to ask questions which human... 

    An efficient model checking algorithm for a fragment of μ-calculus

    , Article 17th International Conference on Software Engineering and Knowledge Engineering, SEKE 2005, Taipei, 14 July 2005 through 16 July 2005 ; 2005 , Pages 392-395 ; 9781627486590 (ISBN) Izadi, M ; MOVAGHAR RAHIMABADI, A. M ; Sharif University of Technology
    Model checking is a formal method for verifying finite state systems properties. μ-calculus is a very expressive fix point logic capable of specifying a wide range of properties of finite state, reactive and concurrent systems. In this paper, we present a new model checking algorithm for linear and a fragment of indexed modal μ - calculus. This algorithm is based on the method of characterization of fixed point temporal logics formulae using automata. We use first recurrence automata for this purpose. Our algorithm is linear time on the size of the system model. The main contributions of this work are the efficiency of the algorithm and the first use of first recurrence automata for μ... 

    Energy-aware scheduling algorithm for precedence-constrained parallel tasks of network-intensive applications in a distributed homogeneous environment

    , Article Proceedings of the 3rd International Conference on Computer and Knowledge Engineering, ICCKE 2013 ; 2013 , Pages 368-375 ; 9781479920921 (ISBN) Ebrahimirad, V ; Rajabi, A ; Goudarzi, M ; Sharif University of Technology
    A wide range of scheduling algorithms used in the data centers have traditionally concentrated on enhancement of performance metrics. Recently, with the rapid growth of data centers in terms of both size and number, the power consumption has become a major challenge for both industry and society. At the software level, energy-aware task scheduling is an effective technique for power reduction in the data centers. However, most of the currently proposed energy-aware scheduling approaches are only paying attention to computation cost. In the other words, they ignore the energy consumed by the network equipment, namely communication cost. In this paper, the problem of scheduling... 

    Unilateral semi-supervised learning of extended hidden vector state for Persian language understanding

    , Article NLP-KE 2011 - Proceedings of the 7th International Conference on Natural Language Processing and Knowledge Engineering, 27 November 2011 through 29 November 2011, Tokushima ; 2011 , Pages 165-168 ; 9781612847283 (ISBN) Jabbari, F ; Sameti, H ; Bokaei, M. H ; Chinese Association for Artificial Intelligence; IEEE Signal Processing Society ; Sharif University of Technology
    The key element of a spoken dialogue system is Spoken Language Understanding (SLU) part. HVS and EHVS are two most popular statistical methods employed to implement the SLU part which need lightly annotated data. Since annotation is a time consuming, we present a novel semi-supervised learning for EHVS to reduce the human labeling effort using two different statistical classifiers, SVM and KNN. Experiments are done on a Persian corpus, the University Information Kiosk corpus. The experimental results show improvements in performance of semi-supervised EHVS, trained by both labeled and unlabeled data, compared to EHVS trained by just initially labeled data. The performance of EHVS improves... 

    Decision support system environment for software architecture style selection (DESAS v1.0)

    , Article Proceedings of the 21st International Conference on Software Engineering and Knowledge Engineering, SEKE 2009, 1 July 2009 through 3 July 2009, Boston, MA ; 2009 , Pages 147-151 ; 1891706241 (ISBN) ; 9781891706240 (ISBN) Moaven, S ; Ahmadi, H ; Habibi, J ; Kamandi, A ; Sharif University of Technology
    In software systems development lifecycle making use of software architecture, especially by taking advantage of architecture styles and patterns, is an essential part which increases product's quality. Nowadays, in order to cover complexity of systems, combination of different architecture styles should be used; therefore ambiguous behaviors might occur. Hence, due to the critical need for toolsets capable of selecting suitable styles and patterns, an environment is proposed in this paper which can perfectly cover different aspects of the implementation of decision support system (DSS). The designed environment obviates data implementation concepts and security considerations. Moreover, it... 

    Effect of average intersection per line on connectivity in fractured reservoir, using percolation theory

    , Article 71st European Association of Geoscientists and Engineers Conference and Exhibition 2009, Amsterdam, 8 June 2009 through 11 June 2009 ; Volume 1 , 2009 , Pages 350-355 ; 9781615672363 (ISBN) Ghorbani, S ; Masihi, M ; Hashemi, A ; Sharif University of Technology
    Society of Petroleum Engineers  2009
    The knowledge of the connectivity across the reservoir not only helps to find out the potential oil recovery within a particular well configuration but also affects on the other reservoir engineering decisions such as infill drilling. Connectivity also controls the swept fraction of the hydrocarbon in place in secondary displacement other than the recoverable rates of the hydrocarbon. Most of the time we need a fast estimation of connectivity for decision making during field development. Percolation theory is a very useful tool to get this goal. According to this fact that the results of this method are universal, they could be used widely. During this study a percolation model is developed...