Loading...
Search for: programming-languages
0.009 seconds
Total 98 records

    Fundamentals of Java programming

    , Book Ogihara, Mitsunori
    Springer International Publishing AG  2018

    Special issue on network-based high performance computing

    , Article Journal of Supercomputing ; 2010 , p. 1-4 ; ISSN: 09208542 Sarbazi-Azad, H ; Shahrabi, A ; Beigy, H ; Sharif University of Technology
    Abstract
    [No abstract available]  

    A survey of syntax and semantics frameworks of modeling languages

    , Article Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009 ; 2009 ; 9781424449460 (ISBN) Kamandi, A ; Habibi, J ; Sharif University of Technology
    Abstract
    Modeling languages as programming languages need precise and unambiguous semantics to be used appropriately, the formal semantics is significant for designing CASE tools and model verification. Several approaches have been used throughout these years to describe the semantics of modeling languages, but in spite of programming languages, these semantics frameworks are not used in large scale for modeling languages. This paper reviews the history of developments on semantics frameworks for modeling languages. © 2009 IEEE  

    Text steganography in SMS

    , Article 2nd International Conference on Convergent Information Technology, ICCIT 07, Gyongju, 21 November 2007 through 23 November 2007 ; 2007 , Pages 2260-2265 ; 0769530389 (ISBN); 9780769530383 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, M. H ; Sharif University of Technology
    2007
    Abstract
    One of the services used in mobile phone is the short message service (SMS) which is widely used by the public in all parts of the world especially in Asia and Europe. This service enables people to write and exchange short messages via mobile phone. Due to the limited size of SMS, lack of a proper keyboard on the mobile phone and to improve the speed of typing, new abbreviations have been invented for different words and phrases which has lead to the invention of a new language called SMS-Textlng. One of the main issues in communication is information security and privacy. There are many methods for secret communication and many researchers are working on steganography. In steganography the... 

    Steganography in MMS

    , Article 11th IEEE International Multitopic Conference, INMIC 2007, Lahore, 28 December 2007 through 30 December 2007 ; 2007 ; 1424415535 (ISBN); 9781424415533 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2007
    Abstract
    After rapid growth of the Internet, establishing hidden communication is an important subject of security that has gained increasing importance. One of the methods for establishing hidden communication is steganography. On the other hand with the expanding the use of mobile phones mobile telecommunication companies starting to add additional features to their mobile phones such as MMS (Multimedia Messaging Service) in order to attract more customers. Considering above statements, steganography in MMS messages is a good solution for establishing hidden communication. In this paper a new method for steganography in MMS messages using both text and image steganography methods is presented. This... 

    A procedure for obtaining a behavioral description for the control logic of a non-linear pipeline

    , Article Proceedings of the ASP - DAC 2004 Asia and South Pacific Design Automation Conference - 2004, Yokohama, 27 January 2004 through 30 January 2004 ; 2004 , Pages 86-91 Najaf Abadi, H. H ; Sharif University of Technology
    2004
    Abstract
    Much attention has been directed to different aspects of the design of pipelines. Design of the control logic of non-linear pipelines has however, been considered as a subsidiary issue in that an RTL description for such logic can easily be obtained from a behavioral description, with the use of widely available synthesis tools. But, as the complexity of a non-linear pipeline increases, so does the complexity of the control logic. The complexity may be to an extent that obtaining even a behavioral description for the control logic is rendered difficult. This paper focuses on further automating the development of systems consisting of non-linear or multi-function pipelines by proposing an... 

    Middle sized soccer robots: ARVAND

    , Article 3rd Robot World Cup Soccer Games and Conferences, RoboCup 1999, 27 July 1999 through 6 August 1999 ; Volume 1856 , 2000 , Pages 61-73 ; 03029743 (ISSN); 9783540410430 (ISBN) Jamzad, M ; Foroughnassiraei, A ; Chiniforooshan, E ; Ghorbani, R ; Kazemi, M ; Chitsaz, H ; Mobasser, F ; Sadjad, S. B ; Sony Corporation ; Sharif University of Technology
    Springer Verlag  2000
    Abstract
    Arvand is the name of robots specially designed and con-structed by sharif CE team for playing soccer according to RoboCup rules and regulations for the middle size robots. Two different types of robots are made, players and the goal keeper. A player robot consists of three main parts: mechanics (motion mechanism and kicker), hard-ware (image acquisition, processing unit and control unit) and software (image processing, wireless communication, motion control and decision making). The motion mechanism is based on two drive unit, two steer units and a castor wheel. We designed a special control board which uses two microcontrollers to carry out the software system decisions and transfers them... 

    Involving computer science students in real-world problems

    , Article ITI 2008 30th International Conference on Information Technology Interfaces, Cavtat/Dubrovnik, 23 June 2008 through 26 June 2008 ; 2008 , Pages 569-573 ; 13301012 (ISSN) ; 9789537138127 (ISBN) Shirali Shahreza, S ; Shirali ShahrezaMohammad, M ; Sharif University of Technology
    2008
    Abstract
    Today, many students are study computer science. Although they study different courses, they rarely do homework or projects related to real world problems. In this paper, we design a project to show some of the problems which are occured during implementing a real word project to the students. In this project, the students are asked to implement the FFT (Fast Fourier Transform) algorithm on a personal computer and then port the program to a smartphone using J2ME (Java 2 Micro Edition) programming language. By doing this project, the undergraduate computer science students will become familiar with the limitations of small devices such as smartphones. They also learn the process of porting a... 

    Java applets copy protection by steganography

    , Article 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2006, Pasadena, CA, 18 December 2006 through 20 December 2006 ; 2006 , Pages 388-391 ; 0769527450 (ISBN); 9780769527451 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    Following the expansion of Internet, many software were produced that could launch through Internet without prior installation on computers. This included game software and software that deal with financial affairs. These softwares are mainly in Java language and can be found on web pages as Java Applets. Some software owners want that their products only able to execute through their own web pages so that no one could put them on other web pages. In this paper, a new method has been presented to protect Java Applets from copying by using "Steganography in HTML web pages" method. In this method, a special 8-character string is hidden in the HTML page by a secret key. The string and the... 

    A new approach in object-oriented methodology for creating event-based simulator

    , Article 2006 Canadian Conference on Electrical and Computer Engineering, CCECE'06, Ottawa, ON, 7 May 2006 through 10 May 2006 ; 2006 , Pages 2424-2427 ; 08407789 (ISSN); 1424400384 (ISBN); 9781424400386 (ISBN) Aliakbarian, S ; Abdollahzadeh, A ; Jalali, L ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2006
    Abstract
    This paper explores software design methodologies in the context of creating a simulator and proposes a methodology to design and implement an event-based simulator namely Sim Met. SimMet is explored in the context of the development of a complex simulator for simulating real world conditions to use in science, technology and medicine and other simulations. In this paper we interested in event-based approach to create a real world with variety range of event possibilities. The paper first discusses the role of time concept as the cornerstone of a methodical analysis and design phase. In Sim Met we use an adaptation of object-oriented methodology to meet time and event concepts in creating a... 

    A computational fluid dynamics (CFD) approach to modeling of pervaporation in thin membrane channels

    , Article CHISA 2006 - 17th International Congress of Chemical and Process Engineering, Prague, 27 August 2006 through 31 August 2006 ; 2006 ; 8086059456 (ISBN); 9788086059457 (ISBN) Soltanieh, M ; Shayegh, M ; Azad, R. R ; Sharif University of Technology
    2006
    Abstract
    A comprehensive model for pervaporation in thin membrane channels was developed to study the effect of changing temperature and concentration on mass flux. This model consists of momentum, energy and species mass balances along and across the membrane in the flow channel. A computational fluid dynamics (CFD) code was written in C++ programming language to solve the coupled non-linear transport equations in the channel by finite volume method. The Semi-Implicit Pressure Link Equation (SIMPLE) CFD algorithm is used to modify the dependent variables in each of the iterations. The effect of variation of temperature and concentration on transport and thermodynamic properties were considered by... 

    Collage steganography

    , Article 5th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2006. In conjunction with 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse, COMSAR 2006, Honolulu, HI, 10 July 2006 through 12 July 2006 ; Volume 2006 , 2006 , Pages 316-321 ; 0769526136 (ISBN); 9780769526133 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2006
    Abstract
    Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. One of the methods introduced for establishing hidden communication is steganography. Methods of steganography have been mostly applied on images while the major characteristic of these methods is the change in the structure and features of the images so as not to be identifiable by human users. However, on the other hand, many methods have been proposed for breaking and extracting information (steganalysis) for these methods. This paper presents a method for hiding information in images by changing the appearance of the picture instead... 

    Integrating model checking and deduction for Rebeca

    , Article Scientia Iranica ; Volume 12, Issue 1 , 2005 , Pages 55-65 ; 10263098 (ISSN) Sirjani, M ; Movaghar, A ; Sharif University of Technology
    Sharif University of Technology  2005
    Abstract
    Rebeca is an actor-based language for modeling concurrent and distributed systems. Its Java-like syntax makes it easy-to-use for practitioners and its formal foundation is a basis to make different formal verification approaches applicable. Compositional verification and abstraction techniques are used in formal verification of Rebeca models to overcome state explosion problems. The main contribution of this paper is to show how model checking and deduction are integrated for verifying certain properties of these models. Deduction is used to prove that abstraction techniques preserve a set of behavioral specifications in temporal logic and is also used in applying the compositional... 

    Extended Rebeca: A component-based actor language with synchronous message passing

    , Article 5th International Conference on Application of Concurrency to System Design, ACSD 2005, St. Malo, 7 June 2005 through 9 June 2005 ; Volume 2005 , 2005 , Pages 212-220 ; 15504808 (ISSN); 0769523633 (ISBN); 9780769523637 (ISBN) Sirjani, M ; De Boer, F ; Movaghar, A ; Shali, A ; Sharif University of Technology
    2005
    Abstract
    In this paper, we propose extended Rebeca as a tool-supported actor-based language for modeling and verifying concurrent and distributed systems. We enrich Rebeca with a formal concept of components which integrates the message-driven computational model of actor-based languages with synchronous message passing. Components are used to encapsulate a set of internal active objects which react asynchronously to messages by means of methods and which additionally interact via a synchronous message passing mechanism. Components themselves interact only via asynchronous and anonymous messages. We present our compositional verification approach and abstraction techniques, and the theory... 

    Efficient polynomial root finding using SIMD extensions

    , Article 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005, Fukuoka, 20 July 2005 through 22 July 2005 ; Volume 2 , 2005 , Pages 529-533 ; 15219097 (ISSN); 0769522815 (ISBN) Moslemi, M ; Ahmadi, H ; Sarbazi Azad, H ; Ma J ; Yang L. T ; Sharif University of Technology
    2005
    Abstract
    In this paper, the parallel implementations of different iterative polynomial root finding methods on a processor with SIMD processing capability are reported. These methods are based on the construction of a sequence of approximations that converge to the set of roots. We have chosen four widely used methods namely Newton's, Durand-Kerner's, Aberth-Ehrlich's, and QD and implemented them using the SIMD instruction set of the Pentium processor with C++ and assembly language. Experiments show that a speedup of 3 or higher can be achieved, depending on the order of polynomial, required accuracy, and the method employed. © 2005 IEEE  

    Text steganography in chat

    , Article 3rd IEEE/IFIP International Conference in Central Asia on Internet, ICI 2007, Tashkent, 26 September 2007 through 28 September 2007 ; 2007 ; 1424410061 (ISBN); 9781424410064 (ISBN) Shirali Shahreza, M. H ; Shirali Shahreza, M ; Sharif University of Technology
    2007
    Abstract
    Invention of the Internet and its spread in the world changes various aspects of human life. In addition, Internet changed human relations. Chat is one of the new aspects which invented after the Internet and is welcomed by users, especially by young people. In chat rooms, people talk with each other using text messages. Because of the need for quick typing of the word and also because of the high amount of sentences which is exchanged between users, new abbreviations are invented for various words and phrases in chat rooms. This new language is known as SMS-Texting. On the other hand, the issue of safety and security of information and especially secret relationships has led to the... 

    A SystemC Transaction Level Modeling of an ARM Processor

    , M.Sc. Thesis Sharif University of Technology Kouchaki, Mohammad Reza (Author) ; Vosughi Vahdat, Bijan (Supervisor) ; Ghorshi, Mohammad Ali (Supervisor)
    Abstract
    Advanced RISC Machines (ARM) are an example of a simple processor used to accomplish simple processing tasks in many applications. They can be found in PDA’s, mp3 players, and other portable electronic devices. ARM processors have small instruction sets and basic processor architecture, and they can be modeled in transaction level by SystemC. SystemC is one of many high level programming languages used to write hardware descriptive codes. We have chosen TLM in SystemC so that abstract data types can be used for higher level modeling and faster simulation. System architects and embedded software developers are accepting transaction level modeling into their design flow because it addresses... 

    Verification of mobile ad hoc networks: An algebraic approach

    , Article Theoretical Computer Science ; Volume 412, Issue 28 , June , 2011 , Pages 3262-3282 ; 03043975 (ISSN) Ghassemi, F ; Fokkink, W ; Movaghar, A ; Sharif University of Technology
    2011
    Abstract
    We introduced Computed Network Process Theory to reason about protocols for mobile ad hoc networks (MANETs). Here we explore the applicability of our framework in two regards: model checking and equational reasoning. The operational semantics of our framework is based on constrained labeled transition systems (CLTSs), in which each transition label is parameterized with the set of topologies for which this transition is enabled. We illustrate how through model checking on CLTSs one can analyze mobility scenarios of MANET protocols. Furthermore, we show how by equational theory one can reason about MANETs consisting of a finite but unbounded set of nodes, in which all nodes deploy the same... 

    The impact of MOF feasibility to improve the desalination performance and antifouling properties of FO membranes

    , Article RSC Advances ; Volume 6, Issue 74 , 2016 , Pages 70174-70185 ; 20462069 (ISSN) Zirehpour, A ; Rahimpour, A ; Khoshhal, S ; Firouzjaei, M. D ; Ghoreyshi, A. A ; Sharif University of Technology
    Royal Society of Chemistry  2016
    Abstract
    In this study, a hydrophilic metal-organic framework (MOF) was applied to improve the performance of a cellulosic membrane for forward osmosis (FO) desalination application. The characterization results confirmed that the MOF particles existed within the matrix of the modified membrane. The MOF loading led to adjustment of the membranes in terms of overall porosity, pore inter-connectivity and hydrophilicity. These features caused an improvement in the pure water permeability (72%) and reduce the structural parameter of the modified membrane to 136 μm. The FO water flux of the modified membrane enhanced by about 180% compared to an unmodified membrane, without decreasing its selectivity. FO...