Loading...
Search for: database
0.008 seconds
Total 196 records

    Genetic identification by NoorGIS software to identify martyrs in military accidents

    , Article Journal of Military Medicine ; Vol. 15, issue. 4 , 2014 , pp. 267-271 ; ISSN: 17351537 Miri, A ; Rabdost Motlagh, M ; Tavallaie, A ; Tavallaie, M ; Sharif University of Technology
    Abstract
    Aims: Due to large sized genetic database of population in a given society, researchers face serious problem to analyze genetic data and provide accurate genetic identification. Variation in molecular markers such as SNPs, mtDNAs, STRs and Y-chromosome are utilized for different purposes, including genetic identification. In our country due to natural disasters and imposed war, the use of this technology was considered and according to the requirements, an optimal database was designed that has the capability of analyzing genetic data. Methods: After obtaining individual genetic information, a software was designed for the analysis of genetic information as well as to serve as a common... 

    Disease diagnosis with a hybrid method SVR using NSGA-II

    , Article Neurocomputing ; Vol. 136 , 2014 , pp. 14-29 Zangooei, M. H ; Habibi, J ; Alizadehsani, R ; Sharif University of Technology
    Abstract
    Early diagnosis of any disease at a lower cost is preferable. Automatic medical diagnosis classification tools reduce financial burden on health care systems. In medical diagnosis, patterns consist of observable symptoms and the results of diagnostic tests, which have various associated costs and risks. In this paper, we have experimented and suggested an automated pattern classification method for classifying four diseases into two classes. In the literature on machine learning or data mining, regression and classification problems are typically viewed as two distinct problems differentiated by continuous or categorical dependent variables. There are endeavors to use regression methods to... 

    Formal process algebraic modeling, verification, and analysis of an abstract Fuzzy Inference Cloud Service

    , Article Journal of Supercomputing ; Vol. 67, issue. 2 , February , 2014 , pp. 345-383 ; Online ISSN: 1573-0484 Rezaee, A ; Rahmani, A. M ; Movaghar, A ; Teshnehlab, M
    Abstract
    In cloud computing, services play key roles. Services are well defined and autonomous components. Nowadays, the demand of using Fuzzy inference as a service is increasing in the domain of complex and critical systems. In such systems, along with the development of the software, the cost of detecting and fixing software defects increases. Therefore, using formal methods, which provide clear, concise, and mathematical interpretation of the system, is crucial for the design of these Fuzzy systems. To obtain this goal, we introduce the Fuzzy Inference Cloud Service (FICS) and propose a novel discipline for formal modeling of the FICS. The FICS provides the service of Fuzzy inference to the... 

    SFAVD: Sharif farsi audio visual database

    , Article IKT 2013 - 2013 5th Conference on Information and Knowledge Technology, Shiraz, Iran ; 2013 , Pages 417-421 ; 9781467364904 (ISBN) Naraghi, Z ; Jamzad, M ; Sharif University of Technology
    2013
    Abstract
    With increasing use of computers in everyday life, improved communication between machines and human is needed. To make a right communication and understand a humankind face which is made in a graphical environment, implementing the audio and visual projects like lip reading, audio and visual speech recognition and lip making are needed. Lack of a complete audio and visual database for this application in Farsi language made us provide a new complete Farsi database for this project that is called SFAVD. It is a unique audio and visual database which in addition to considering Farsi conceptual and speech structure, it considers influence of speech on lip changes. This database is created for... 

    A new framework based on recurrence quantification analysis for epileptic seizure detection

    , Article IEEE Journal of Biomedical and Health Informatics ; Volume 17, Issue 3 , 2013 , Pages 572-578 ; 21682194 (ISSN) Niknazar, M ; Mousavi, S. R ; Vosoughi Vahdat, B ; Sayyah, M ; Sharif University of Technology
    2013
    Abstract
    This study presents applying recurrence quantification analysis (RQA) on EEG recordings and their subbands: delta, theta, alpha, beta, and gamma for epileptic seizure detection. RQA is adopted since it does not require assumptions about stationarity, length of signal, and noise. The decomposition of the original EEG into its five constituent subbands helps better identification of the dynamical system of EEG signal. This leads to better classification of the database into three groups: Healthy subjects, epileptic subjects during a seizure-free interval (Interictal) and epileptic subjects during a seizure course (Ictal). The proposed algorithm is applied to an epileptic EEG dataset provided... 

    Discovering dominant pathways and signal-response relationships in signaling networks through nonparametric approaches

    , Article Genomics ; Volume 102, Issue 4 , October , 2013 , Pages 195-201 ; 08887543 (ISSN) Nassiri, I ; Masoudi Nejad, A ; Jalili, M ; Moeini, A ; Sharif University of Technology
    2013
    Abstract
    A signaling pathway is a sequence of proteins and passenger molecules that transmits information from the cell surface to target molecules. Understanding signal transduction process requires detailed description of the involved pathways. Several methods and tools resolved this problem by incorporating genomic and proteomic data. However, the difficulty of obtaining prior knowledge of complex signaling networks limited the applicability of these tools. In this study, based on the simulation of signal flow in signaling network, we introduce a method for determining dominant pathways and signal response to stimulations. The model uses topology-weighted transit compartment approach and comprises... 

    Integrated one-against-one classifiers as tools for virtual screening of compound databases: A case study with CNS inhibitors

    , Article Molecular Informatics ; Volume 32, Issue 8 , 2013 , Pages 742-753 ; 18681743 (ISSN) Jalali Heravi, M ; Mani-Varnosfaderani, A ; Valadkhani, A ; Sharif University of Technology
    2013
    Abstract
    A total of 21 833 inhibitors of the central nervous system (CNS) were collected from Binding-database and analyzed using discriminant analysis (DA) techniques. A combination of genetic algorithm and quadratic discriminant analysis (GA-QDA) was proposed as a tool for the classification of molecules based on their therapeutic targets and activities. The results indicated that the one-against-one (OAO) QDA classifiers correctly separate the molecules based on their therapeutic targets and are comparable with support vector machines. These classifiers help in charting the chemical space of the CNS inhibitors and finding specific subspaces occupied by particular classes of molecules. As a next... 

    A data mining approach for diagnosis of coronary artery disease

    , Article Computer Methods and Programs in Biomedicine ; Volume 111, Issue 1 , 2013 , Pages 52-61 ; 01692607 (ISSN) Alizadehsani, R ; Habibi, J ; Hosseini, M. J ; Mashayekhi, H ; Boghrati, R ; Ghandeharioun, A ; Bahadorian, B ; Sani, Z. A ; Sharif University of Technology
    2013
    Abstract
    Cardiovascular diseases are very common and are one of the main reasons of death. Being among the major types of these diseases, correct and in-time diagnosis of coronary artery disease (CAD) is very important. Angiography is the most accurate CAD diagnosis method; however, it has many side effects and is costly. Existing studies have used several features in collecting data from patients, while applying different data mining algorithms to achieve methods with high accuracy and less side effects and costs. In this paper, a dataset called Z-Alizadeh Sani with 303 patients and 54 features, is introduced which utilizes several effective features. Also, a feature creation method is proposed to... 

    Translation of Z specifications to executable code: Application to the database domain

    , Article Information and Software Technology ; Volume 55, Issue 6 , June , 2013 , Pages 1017-1044 ; 09505849 (ISSN) Khalafinejad, S ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
    2013
    Abstract
    Context: It is well-known that the use of formal methods in the software development process results in high-quality software products. Having specified the software requirements in a formal notation, the question is how they can be transformed into an implementation. There is typically a mismatch between the specification and the implementation, known as the specification-implementation gap. Objective: This paper introduces a set of translation functions to fill the specification-implementation gap in the domain of database applications. We only present the formal definition, not the implementation, of the translation functions. Method: We chose Z, SQL and Delphi languages to illustrate our... 

    Secure untraceable off-line electronic cash system

    , Article Scientia Iranica ; Volume 20, Issue 3 , 2013 , Pages 637-646 ; 10263098 (ISSN) Baseri, Y ; Takhtaei, B ; Mohajeri, J ; Sharif University of Technology
    2013
    Abstract
    Eslami and Talebi (2011) [25] proposed an untraceable electronic cash scheme and claimed that their scheme protects the anonymity of customers, detects the identity of double spenders and provides the date attachability of coins to manage the bank database. In this paper, illustrating Eslami and Talebi's scheme, as one of the latest untraceable electronic cash schemes, and showing its weaknesses (in fulfilling the properties of perceptibility of double spender, unforgeability and date attainability of coins) and its faults (related to exchange protocol), we propose a new untraceable electronic cash scheme which is immune to the weaknesses of the former. Our scheme contains anonymity,... 

    A unified approach for detection of induced epileptic seizures in rats using ECoG signals

    , Article Epilepsy and Behavior ; Volume 27, Issue 2 , 2013 , Pages 355-364 ; 15255050 (ISSN) Niknazar, M ; Mousavi, S. R ; Motaghi, S ; Dehghani, A ; Vosoughi Vahdat, B ; Shamsollahi, M. B ; Sayyah, M ; Noorbakhsh, S. M ; Sharif University of Technology
    2013
    Abstract
    Objective: Epileptic seizure detection is a key step for epilepsy assessment. In this work, using the pentylenetetrazole (PTZ) model, seizures were induced in rats, and ECoG signals in interictal, preictal, ictal, and postictal periods were recorded. The recorded ECoG signals were then analyzed to detect epileptic seizures in the epileptic rats. Methods: Two different approaches were considered in this work: thresholding and classification. In the thresholding approach, a feature is calculated in consecutive windows, and the resulted index is tracked over time and compared with a threshold. The moment the index crosses the threshold is considered as the moment of seizure onset. In the... 

    A content-based approach to medical images retrieval

    , Article International Journal of Healthcare Information Systems and Informatics ; Volume 8, Issue 2 , 2013 , Pages 15-27 ; 15553396 (ISSN) Tarjoman, M ; Fatemizadeh, E ; Badie, K ; Sharif University of Technology
    2013
    Abstract
    Content-based image retrieval (CBIR) makes use of image features, such as color, texture or shape, to index images with minimal human intervention. Content-based image retrieval can be used to locate medical images in large databases. In this paper, the fundamentals of the key components of content-based image retrieval systems are introduced first to give an overview of this area. Then, a case study which describes the methodology of a CBIR system for retrieving human brain magnetic resonance images, is presented. The proposed method is based on Adaptive Neuro-fuzzy Inference System (ANFIS) learning and could classify an image as normal and tumoral. This research uses the knowledge of CBIR... 

    AS5: A secure searchable secret sharing scheme for privacy preserving database outsourcing

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Pisa ; Volume 7731 LNCS , 2013 , Pages 201-216 ; 03029743 (ISSN) ; 9783642358890 (ISBN) Hadavi, M. A ; Damiani, E ; Jalili, R ; Cimato, S ; Ganjei, Z ; Sharif University of Technology
    2013
    Abstract
    Researchers have been studying security challenges of database outsourcing for almost a decade. Privacy of outsourced data is one of the main challenges when the "Database As a Service" model is adopted in the service oriented trend of the cloud computing paradigm. This is due to the insecurity of the network environment or even the untrustworthiness of the service providers. This paper proposes a method to preserve privacy of outsourced data based on Shamir's secret sharing scheme. We split attribute values into several parts and distribute them among untrusted servers. The problem of using secret sharing in data outsourcing scenario is how to search efficiently within the randomly... 

    A hybrid computational approach to estimate solar global radiation: An empirical evidence from Iran

    , Article Energy ; Volume 49, Issue 1 , 2013 , Pages 204-210 ; 03605442 (ISSN) Mostafavi, E. S ; Ramiyani, S. S ; Sarvar, R ; Moud, H. I ; Mousavi, S. M ; Sharif University of Technology
    2013
    Abstract
    This paper presents an innovative hybrid approach for the estimation of the solar global radiation. New prediction equations were developed for the global radiation using an integrated search method of genetic programming (GP) and simulated annealing (SA), called GP/SA. The solar radiation was formulated in terms of several climatological and meteorological parameters. Comprehensive databases containing monthly data collected for 6 years in two cities of Iran were used to develop GP/SA-based models. Separate models were established for each city. The generalization of the models was verified using a separate testing database. A sensitivity analysis was conducted to investigate the... 

    Formulation of soil angle of shearing resistance using a hybrid GP and OLS method

    , Article Engineering with Computers ; Volume 29, Issue 1 , September , 2013 , Pages 37-53 ; 01770667 (ISSN) Mousavi, S. M ; Alavi, A.H ; Mollahasani, A ; Gandomi, A. H ; Arab Esmaeili, M ; Sharif University of Technology
    2013
    Abstract
    In the present study, a prediction model was derived for the effective angle of shearing resistance (φ′) of soils using a novel hybrid method coupling genetic programming (GP) and orthogonal least squares algorithm (OLS). The proposed nonlinear model relates φ′ to the basic soil physical properties. A comprehensive experimental database of consolidated-drained triaxial tests was used to develop the model. Traditional GP and least square regression analyses were performed to benchmark the GP/OLS model against classical approaches. Validity of the model was verified using a part of laboratory data that were not involved in the calibration process. The statistical measures of correlation... 

    An implementation of a CBIR system based on SVM learning scheme

    , Article Journal of Medical Engineering and Technology ; Volume 37, Issue 1 , 2013 , Pages 43-47 ; 03091902 (ISSN) Tarjoman, M ; Fatemizadeh, E ; Badie, K ; Sharif University of Technology
    2013
    Abstract
    Content-based image retrieval (CBIR) has been one of the most active areas of research. The retrieval principle of CBIR systems is based on visual features such as colour, texture and shape or the semantic meaning of the images. A CBIR system can be used to locate medical images in large databases. This paper presents a CBIR system for retrieving digital human brain magnetic resonance images (MRI) based on textural features and the support vector machine (SVM) learning method. This system can retrieve similar images from the database in two groups: normal and tumoural. This research uses the knowledge of the CBIR approach to the application of medical decision support and discrimination... 

    Correctness verification in database outsourcing: A trust-based fake tuples approach

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 7671 LNCS , 2012 , Pages 343-351 ; 03029743 (ISSN) ; 9783642351297 (ISBN) Ghasemi, S ; Noferesti, M ; Hadavi, M. A ; Nogoorani, S. D ; Jalili, R ; Sharif University of Technology
    2012
    Abstract
    An important security challenge in database outsourcing scenarios is the correctness verification of query results. The proposed approaches in the literature, impose high overhead on both the service provider and specially the clients. In this paper, we propose the Trust-Based Fake Tuples approach to audit the correctness of query results. In this approach, some fake tuples are included among the real ones in order to verify the correctness of the results. The experience learnt from past results is used in this paper to evaluate the trust toward the service provider. This trust value is used to tune the number of fake tuples and subsequently the imposed overhead. As the trust value toward... 

    Database as a service: Towards a unified solution for security requirements

    , Article Proceedings - International Computer Software and Applications Conference ; 2012 , Pages 415-420 ; 07303157 (ISSN) ; 9780769547589 (ISBN) Hadavi, M. A ; Noferesti, M ; Jalili, R ; Damiani, E ; Sharif University of Technology
    2012
    Abstract
    Security of database outsourcing, due to the untrustworthiness of service provider, is a basic challenge to have Database As a Service in a cloud computing environment. Having disparate assumptions to solve different aspects of security such as confidentiality and integrity is an obstacle for an integrated secure solution through the combination of existing approaches. Concentrating on confidentiality and integrity aspects of database outsourcing, this paper proposes an approach in which each attribute value is split up between several data servers using a customized threshold secret sharing scheme. Our approach preserves data confidentiality and at the same time provides the correctness... 

    KNNDIST: A non-parametric distance measure for speaker segmentation

    , Article 13th Annual Conference of the International Speech Communication Association 2012, INTERSPEECH 2012 ; Volume 3 , 2012 , Pages 2279-2282 ; 9781622767595 (ISBN) Mohammadi, S. H ; Sameti, H ; Langarani, M. S. E ; Tavanaei, A ; Sharif University of Technology
    2012
    Abstract
    A novel distance measure for distance-based speaker segmentation is proposed. This distance measure is nonparametric, in contrast to common distance measures used in speaker segmentation systems, which often assume a Gaussian distribution when measuring the distance between two audio segments. This distance measure is essentially a k-nearest-neighbor distance measure. Non-vowel segment removal in preprocessing stage is also proposed. Speaker segmentation performance is tested on artificially created conversations from the TIMIT database and two AMI conversations. For short window lengths, Missed Detection Rated is decreased significantly. For moderate window lengths, a decrease in both... 

    Prediction of Paroxysmal Atrial Fibrillation using Empirical Mode Decomposition and RR intervals

    , Article 2012 IEEE-EMBS Conference on Biomedical Engineering and Sciences, IECBES 2012, 17 December 2012 through 19 December 2012 ; December , 2012 , Pages 750-754 ; 9781467316668 (ISBN) Sabeti, E ; Shamsollahi, M. B ; Afdideh, F ; Sharif University of Technology
    2012
    Abstract
    In this paper, we proposed a method based on time-frequency dependent features extracted from Intrinsic Mode Functions (IMFs) and physiological feature such as the number of premature beats (PBs) to predict the onset of Paroxysmal Atrial Fibrillation (PAF) by using electrocardiogram (ECG) signal. To extract IMFs, we used Empirical Mode Decomposition (EMD). In order to predict PAF, we used variance of IMFs of signals, the area under the absolute of IMF curves and the number of PBs, since increasing of all of these parameters are a clear sign of PAF occurrence. We used clinical database which was provided for the 2001 Computer in Cardiology Challenge (CinC). The test set of this database...