Loading...
Search for: clustering-algorithms
0.009 seconds
Total 136 records

    A multi-objective model for optimizing the redundancy allocation, component supplier selection, and reliable activities for multi-state systems

    , Article Reliability Engineering and System Safety ; Volume 222 , 2022 ; 09518320 (ISSN) Zaretalab, A ; Sharifi, M ; Pourkarim Guilani, P ; Taghipour, S ; Akhavan Niaki, S. T ; Sharif University of Technology
    Elsevier Ltd  2022
    Abstract
    This paper presents a multi-objective availability-redundancy allocation optimization model for a hyper-system. The hyper-system consists of B systems with shared resources. The structure of the systems is series-parallel subsystems consisting of multi-failure and multi-state components. The components may be purchased from different suppliers based on their price and discounts. It is assumed that technical and organizational activities continuously affect the components' failure rates and the subsystems' working conditions before starting the system's mission horizon. The model aims to find the optimal number and the type of the subsystems' components for all systems from each supplier and... 

    The addition of data aggregation to non cluster based SPEED routing algorithm while keeping the functionality of available techniques inorder to increase QoS

    , Article ; Volume 2 , April , 2010 , Pages V2696-V2700 ; ICCET 2010 - 2010 International Conference on Computer Engineering and Technology, Proceedings, 16 April 2010 through 18 April 2010 ; 9781424463503 (ISBN) Yousefi Fakhr, F ; Roustaei, R ; Movaghar, A ; Sharif University of Technology
    2010
    Abstract
    Data aggregation is a technique that is used to decrease extra and repetitive data in cluster based routing protocols. As we know SPEED routing algorithm is based on service quality and dose not perform data aggregation. In this article, we try to add an data aggregation technique to the available techniques without interfering with the functions of previous ones. The idea involves virtual configuration of sensors and specification of an individual ID to the created data by the sensors in each region, then data aggregation in relay node is done by this ID, resulting in less energy consumption, lower traffic and repeated data, an increase in network lifetime and better quality of service  

    A Task-Based Greedy Scheduling Algorithm for Minimizing Energy of MapReduce Jobs

    , Article Journal of Grid Computing ; Volume 16, Issue 4 , 2018 , Pages 535-551 ; 15707873 (ISSN) Yousefi, M.H.N ; Goudarzi, M ; Sharif University of Technology
    Springer Netherlands  2018
    Abstract
    MapReduce and its open source implementation, Hadoop, have gained widespread adoption for parallel processing of big data jobs. Since the number of such big data jobs is also rapidly rising, reducing their energy consumption is increasingly more important to reduce environmental impact as well as operational costs. Prior work by Mashayekhy et al. (IEEE Trans. Parallel Distributed Syst. 26, 2720–2733, 2016), has tackled the problem of energy-aware scheduling of a single MapReduce job but we provide a far more efficient heuristic in this paper. We first model the problem as an Integer Linear Program to find the optimal solution using ILP solvers. Then we present a task-based greedy scheduling... 

    How to extend visibility polygons by mirrors to cover invisible segments

    , Article 11th International Conference and Workshops on Algorithms and Computation, WALCOM 2017, 29 March 2017 through 31 March 2017 ; Volume 10167 LNCS , 2017 , Pages 42-53 ; 03029743 (ISSN); 9783319539249 (ISBN) Vaezi, A ; Ghodsi, M ; Sharif University of Technology
    Springer Verlag  2017
    Abstract
    Given a simple polygon P with n vertices, the visibility polygon (V P) of a point q (V P(q)), or a segment (formula present) (V P(pq)) inside P can be computed in linear time. We propose a linear time algorithm to extend V P of a viewer (point or segment), by converting some edges of P into mirrors, such that a given non-visible segment (formula present) can also be seen from the viewer. Various definitions for the visibility of a segment, such as weak, strong, or complete visibility are considered. Our algorithm finds every edge such that, when converted to a mirror, makes (formula present) visible to our viewer. We find out exactly which interval of (formula present) becomes visible, by... 

    Visibility extension via mirror-edges to cover invisible segments

    , Article Theoretical Computer Science ; Volume 789 , 2019 , Pages 22-33 ; 03043975 (ISSN) Vaezi, A ; Ghodsi, M ; Sharif University of Technology
    Elsevier B.V  2019
    Abstract
    Given a simple polygon P with n vertices, the visibility polygon (VP) of a point q, or a segment pq‾ inside P can be computed in linear time. We propose a linear time algorithm to extend the VP of a viewer (point or segment), by converting some edges of P into mirrors, such that a given non-visible segment uw‾ can also be seen from the viewer. Various definitions for the visibility of a segment, such as weak, strong, or complete visibility are considered. Our algorithm finds every edge that, when converted to a mirror, makes uw‾ visible to our viewer. We find out exactly which interval of uw‾ becomes visible, by every edge middling as a mirror, all in linear time. In other words, in this... 

    An innovative implementation of Circular Hough Transform using eigenvalues of Covariance Matrix for detecting circles

    , Article Proceedings Elmar - International Symposium Electronics in Marine, 14 September 2011 through 16 September 2011, Zadar ; 2011 , Pages 397-400 ; 13342630 (ISSN) ; 9789537044121 (ISBN) Tooei, M. H. D. H ; Mianroodi, J. R ; Norouzi, N ; Khajooeizadeh, A ; Sharif University of Technology
    2011
    Abstract
    In this paper, a fast and accurate algorithm for identifying circular objects in images is proposed. The presented method is a robust, fast and optimized adaption of Circular Hough Transform (CHT), Eigenvalues of Covariance Matrix and K-means clustering techniques. Results are greatly improved by implementing iterative K-means clustering algorithm and establishing an exponential growth instead of updating values in the parameter space of CHT through summation, both in runtime and quality. In fact, using the Eigenvalues of Covariance Matrix as a validating method, a well balanced compromise between the speed and accuracy of results is achieved. This method is tested on several real world... 

    Stratification of admixture population:A bayesian approach

    , Article 7th Iranian Joint Congress on Fuzzy and Intelligent Systems, CFIS 2019, 29 January 2019 through 31 January 2019 ; 2019 ; 9781728106731 (ISBN) Tamiji, M ; Taheri, S. M ; Motahari, S. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    A statistical algorithm is introduced to improve the false inference of active loci, in the population in which members are admixture. The algorithm uses an advanced clustering algorithm based on a Bayesian approach. The proposed algorithm simultaneously infers the hidden structure of the population. In this regard, the Monte Carlo Markov Chain (MCMC) algorithm has been used to evaluate the posterior probability distribution of the model parameters. The proposed algorithm is implemented in a bundle, and then its performance is widely evaluated in a number of artificial databases. The accuracy of the clustering algorithm is compared with the STRUCTURE method based on certain criterion. © 2019... 

    A novel pre-processing method to reduce noise effects in a prototype-based clustering algorithm

    , Article 2008 International Conference on Information and Knowledge Engineering, IKE 2008, Las Vegas, NV, 14 July 2008 through 17 July 2008 ; July , 2008 , Pages 587-593 ; 1601320752 (ISBN); 9781601320759 (ISBN) Taghikhaki, Z ; Minaei, B ; Masoum, A ; Sharif University of Technology
    2008
    Abstract
    In this paper we introduce a preprocessing method to reduce noise effects in noise prone environments. Prototype based clustering algorithms are sensitive to noise because the effect of noisy data are as same as effect of true data and this affects on calculation of clusters center and then reduces accuracy. Therefore, these algorithms can not be applied in noise-prone environments and if this is applied there, we can not trust to the results. To overcome such problems we reduce and in some cases eliminate the noisy data. Also a part of our method is applied on the source of generated data in a network. Then noisy data that the number of them is high in noisy environments are eliminated and... 

    A fault tolerant scheduling algorithm for dag applications in cluster environments

    , Article Communications in Computer and Information Science, 7 July 2011 through 9 July 2011 ; Volume 188 CCIS, Issue PART 1 , July , 2011 , Pages 189-199 ; 18650929 (ISSN) ; 9783642223884 (ISBN) Tabbaa, N ; Entezari Maleki, R ; Movaghar, A ; Springer ; Sharif University of Technology
    2011
    Abstract
    Fault tolerance is an essential requirement in systems running applications which need a technique to continue execution where some system components are subject to failure. In this paper, a fault tolerant task scheduling algorithm is proposed for mapping task graphs to heterogeneous processing nodes in cluster computing systems. The starting point of the algorithm is a DAG representing an application with information about the tasks. This information consists of the execution time of the tasks on the target system processors, communication times between the tasks having data dependencies, and the number of the processor failures (ε) which should be tolerated by the scheduling algorithm. The... 

    Clustering method for fMRI activation detection using optimal number of clusters

    , Article 2009 4th International IEEE/EMBS Conference on Neural Engineering, NER '09, Antalya, 29 April 2009 through 2 May 2009 ; 2009 , Pages 171-174 ; 9781424420735 (ISBN) Taalimi, A ; Bayati, H ; Fatemizadeh, E ; National Institutes of Health, NIH; National Institute of Neurological Disorders and Stroke, NINDS; National Science Foundation, NSF ; Sharif University of Technology
    2009
    Abstract
    In this study, clustering based method for activation detection in functional magnetic resonance imaging (fMRI) is employed. Moreover, some features are obtained by fitting two models namely FIR filter and Gamma function, to hemodynamic response function (HRF). After applying clustering methods (that require number of clusters as an input) to feature space, our simulations show that number of clusters can affect activation detection significantly. Therefore a newly proposed clustering algorithm namely evolving neural gas (ENG) that gives optimal number of clusters is exploited. In addition to ENG, the result of four clustering algorithms namely k-means, fuzzy C-means, neural gas, and clara... 

    A content-based deep intrusion detection system

    , Article International Journal of Information Security ; 2021 ; 16155262 (ISSN) Soltani, M ; Siavoshani, M. J ; Jahangir, A. H ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2021
    Abstract
    The growing number of Internet users and the prevalence of web applications make it necessary to deal with very complex software and applications in the network. This results in an increasing number of new vulnerabilities in the systems, and leading to an increase in cyber threats and, in particular, zero-day attacks. The cost of generating appropriate signatures for these attacks is a potential motive for using machine learning-based methodologies. Although there are many studies on using learning-based methods for attack detection, they generally use extracted features and overlook raw contents. This approach can lessen the performance of detection systems against content-based attacks... 

    A content-based deep intrusion detection system

    , Article International Journal of Information Security ; Volume 21, Issue 3 , 2022 , Pages 547-562 ; 16155262 (ISSN) Soltani, M ; Siavoshani, M. J ; Jahangir, A. H ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2022
    Abstract
    The growing number of Internet users and the prevalence of web applications make it necessary to deal with very complex software and applications in the network. This results in an increasing number of new vulnerabilities in the systems, and leading to an increase in cyber threats and, in particular, zero-day attacks. The cost of generating appropriate signatures for these attacks is a potential motive for using machine learning-based methodologies. Although there are many studies on using learning-based methods for attack detection, they generally use extracted features and overlook raw contents. This approach can lessen the performance of detection systems against content-based attacks... 

    Scalable semi-supervised clustering by spectral kernel learning

    , Article Pattern Recognition Letters ; Vol. 45, issue. 1 , August , 2014 , p. 161-171 ; ISSN: 01678655 Soleymani Baghshah, M ; Afsari, F ; Bagheri Shouraki, S ; Eslami, E ; Sharif University of Technology
    Abstract
    Kernel learning is one of the most important and recent approaches to constrained clustering. Until now many kernel learning methods have been introduced for clustering when side information in the form of pairwise constraints is available. However, almost all of the existing methods either learn a whole kernel matrix or learn a limited number of parameters. Although the non-parametric methods that learn whole kernel matrix can provide capability of finding clusters of arbitrary structures, they are very computationally expensive and these methods are feasible only on small data sets. In this paper, we propose a kernel learning method that shows flexibility in the number of variables between... 

    An FPCA-based color morphological filter for noise removal

    , Article Scientia Iranica ; Volume 16, Issue 1 D , 2009 , Pages 8-18 ; 10263098 (ISSN) Soleymani Baghshah, M ; Kasaei, S ; Sharif University of Technology
    2009
    Abstract
    Morphological filtering is a useful technique for the processing and analysis of binary and gray scale images. The extension of morphological techniques to color images is not a straightforward task because this extension stems from the multivariate ordering problem. Since multivariate ordering is ambiguous, existing approaches have used known vector ordering schemes for the color ordering purpose. In the. last decade, many different color morphological operators have been introduced in the literature. Some of them have focused on noise suppression purposes. However, none has shown good performance, especially on edgy regions. In this paper, new color morphological operators, based on a... 

    A fuzzy clustering algorithm for finding arbitrary shaped clusters

    , Article 6th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2008, Doha, 31 March 2008 through 4 April 2008 ; 2008 , Pages 559-566 ; 9781424419685 (ISBN) Soleymani Baghshah, M ; Bagheri Shouraki, S ; Sharif University of Technology
    2008
    Abstract
    Until now, many algorithms have been introduced for finding arbitrary shaped clusters, but none of these algorithms is able to identify all sorts of cluster shapes and structures that are encountered in practice. Furthermore, the time complexity of the existing algorithms is usually high and applying them on large dataseis is time-consuming. In this paper, a novel fast clustering algorithm is proposed. This algorithm distinguishes clusters of different shapes using a twostage clustering approach. In the first stage, the data points are grouped into a relatively large number of fuzzy ellipsoidal sub-clusters. Then, connections between sub-clusters are established according to the Bhatiacharya... 

    An agent-based clustering algorithm using potential fields

    , Article 6th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2008, Doha, 31 March 2008 through 4 April 2008 ; 2008 , Pages 551-558 ; 9781424419685 (ISBN) Soleymani Baghshah, M ; Bagheri Shouraki, S ; Lucas, C ; Sharif University of Technology
    2008
    Abstract
    In this paper, a novel clustering algorithm using an agent-based architecture along with a force-based clustering algorithm is proposed. To this end, a set of simple mobile agents thai have limited processing power is used. These agents communicate in a pairwise manner to exchange their position information. As opposed to the bio-inspired clustering algorithms that need a set of local rules to specify the agent movements, in this paper the agent motions are driven from attractive and repulsive potential fields that are created by the data points and the other agents respectively. Each agent moves according to the resulted force from applying the potential fields and announces its next... 

    A novel semi-supervised clustering algorithm for finding clusters of arbitrary shapes

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 876-879 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Soleymani Baghshah, M ; Bagheri Shouraki, S ; Sharif University of Technology
    2008
    Abstract
    Recently, several algorithms have been introduced for enhancing clustering quality by using supervision in the form of constraints. These algorithms typically utilize the pair wise constraints to either modify the clustering objective function or to learn the clustering distance measure. Very few of these algorithms show the ability of discovering clusters of different shapes along with satisfying the provided constraints. In this paper, a novel semi-supervised clustering algorithm is introduced that uses the side information and finds clusters of arbitrary shapes. This algorithm uses a two-stage clustering approach satisfying the pair wise constraints. In the first stage, the data points... 

    Finding arbitrary shaped clusters and color image segmentation

    , Article 1st International Congress on Image and Signal Processing, CISP 2008, Sanya, Hainan, 27 May 2008 through 30 May 2008 ; Volume 1 , 2008 , Pages 593-597 ; 9780769531199 (ISBN) Soleymani Baghshah, M ; Bagheri Shouraki, S ; Sharif University of Technology
    2008
    Abstract
    One of the most famous approaches for the segmentation of color images is finding clusters in the color space. Shapes of these clusters are often complex and the time complexity of the existing algorithms for finding clusters of different shapes is usually high. In this paper, a novel clustering algorithm is proposed and used for the image segmentation purpose. This algorithm distinguishes clusters of different shapes using a two-stage clustering approach in a reasonable time. In the first stage, the mean-shift clustering algorithm is used and the data points are grouped into some sub-clusters. In the second stage, connections between sub-clusters are established according to a dissimilarity... 

    Using minimum matching for clustering with balancing constraints

    , Article 2009 Second ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM 2009, Sanya, 8 August 2009 through 9 August 2009 ; Volume 1 , 2009 , Pages 225-228 ; 9781424442461 (ISBN) Shirali Shahreza, S ; Abolhassani, H ; Shirali Shahreza, M. H ; Yangzhou University; Guangdong University of Business Studies; Wuhan Institute of Technology; IEEE SMC TC on Education Technology and Training; IEEE Technology Management Council ; Sharif University of Technology
    2009
    Abstract
    Clustering is a major task in data mining which is used in many applications. However, general clustering is inappropriate for many applications where some constraints should be applied. One category of these constraints is the cluster size constraint. In this paper, we propose a new algorithm for solving the clustering with balancing constraints by using the minimum matching. We compare our algorithm with the method proposed by Banerjee and Ghosh that uses stable matching and show that our algorithm converge to the final solution in fewer iterations. ©2009 IEEE  

    A clustering algorithm to improve routing stability in mobile ad-hoc networks

    , Article 2009 14th International CSI Computer Conference, CSICC 2009, 20 October 2009 through 21 October 2009 ; 2009 , Pages 83-88 ; 9781424442621 (ISBN) Shakarami, M ; Movaghar, A ; Sharif University of Technology
    Abstract
    The dynamic nature of mobile nodes in mobile adhoc networks (MANETs), causes their association and disassociation to and from clusters perturb the stability of network and problem becomes worse if nodes are clusterheads (CH). Therefore cluster maintenance schemes are needed to handle new admissions and releases of node in the clusters. In this paper, we introduce a novel cluster maintenance algorithm which selects a new clusterhead from a trusty area that is defined previously based on some maintenance optimization rules. The election process is done before the current clusterhead leaves the cluster. So the routes which include this clusterhead as a middle node are less probable to break and...