Loading...
Search for: encoding--symbols
0.011 seconds
Total 58 records

    Zamin, an agent based artificial life model

    , Article Proceedings - HIS'04: 4th International Conference on Hybrid Intelligent Systems, Kitakyushu, 5 December 2004 through 8 December 2004 ; 2005 , Pages 160-165 ; 0769522912 (ISBN) Halavati, R ; Shouraki, S. B ; Zadeh, S. H ; Ziaie, P ; Lucas, C ; Ishikawa M ; Hashimoto S ; Paprzycki M ; Barakova E ; Yoshida K ; Koppen M ; Corne D.M ; Abraham A ; Sharif University of Technology
    2005
    Abstract
    Zamin artificial life model is designed to be a general purpose environment for researches on evolution of learning methods, living strategies and complex behaviors and is used in several studies thus far. As a main target for Zamin's design has been its expandability and ease of problem definition, a new agent based structure for this artificial world is introduced in this paper, which is believed to be much easier to use and extend. In this new model, all control and world running processes are done by agents. Therefore, any change in world processes does not require recoding the main engine and can be done just by altering the behavior of one or some agents. To have an easier interface... 

    Weighted two-valued digit-set encodings: Unifying efficient hardware representation schemes for redundant number systems

    , Article IEEE Transactions on Circuits and Systems I: Regular Papers ; Volume 52, Issue 7 , 2005 , Pages 1348-1357 ; 10577122 (ISSN) Jaberipur, G ; Parhami, B ; Ghodsi, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2005
    Abstract
    We introduce the notion of two-valued digit (twit) as a binary variable that can assume one of two different integer values. Posibits, or simply bits, in {0, 1} and negabits in {-1, 0}, commonly used in two's-complement representations and (n, p) encoding of binary signed digits, are special cases of twits. A weighted bit-set (WBS) encoding, which generalizes the two's-complement encoding by allowing one or more posibits and/or negabits in each radix-2 position, has been shown to unify many efficient implementations of redundant number systems. A collection of equally weighted twits, including ones with non-contiguous values (e.g., {-1, 1} or {0, 2}), can lead to wider representation range... 

    Video-tampering detection and content reconstruction via self-embedding

    , Article IEEE Transactions on Instrumentation and Measurement ; 2017 ; 00189456 (ISSN) Amanipour, V ; Ghaemmaghami, S ; Sharif University of Technology
    Abstract
    Rapidly improving video-editing software tools and algorithms have made video content manipulation and modification feasible even by inexpert users. Detecting video tampering and recovering the original content of the tampered videos is, thus, a major need in many applications. Although detection and localization of the tampering in certain types of video editing have successfully been addressed in the literature, attempts for recovering the tampered videos are bound to methods using watermarks. In this paper, a scheme for the reconstruction of the tampered video through watermarking is proposed. The watermark payload, which consists of highly compressed versions of keyframes of the video... 

    Video-tampering detection and content reconstruction via self-embedding

    , Article IEEE Transactions on Instrumentation and Measurement ; Volume 67, Issue 3 , March , 2018 , Pages 505-515 ; 00189456 (ISSN) Amanipour, V ; Ghaemmaghami, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Rapidly improving video-editing software tools and algorithms have made video content manipulation and modification feasible even by inexpert users. Detecting video tampering and recovering the original content of the tampered videos is, thus, a major need in many applications. Although detection and localization of the tampering in certain types of video editing have successfully been addressed in the literature, attempts for recovering the tampered videos are bound to methods using watermarks. In this paper, a scheme for the reconstruction of the tampered video through watermarking is proposed. The watermark payload, which consists of highly compressed versions of keyframes of the video... 

    Using satisfiability for non-optimal temporal planning

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 7519 Lnai , 2012 , Pages 176-188 ; 03029743 (ISSN) ; 9783642333521 (ISBN) Rankooh, M. F ; Mahjoob, A ; Ghassem-Sani, G ; Sharif University of Technology
    Springer  2012
    Abstract
    AI planning is one of the research fields that has benefited from employing satisfiability checking methods. These methods have been proved to be very effective in finding optimal plans for both classical and temporal planning. It is also known that by using planning-based heuristic information in solving SAT formulae, one can develop SAT-based planners that are competitive with state-of-the-art non-optimal planners in classical planning domains. However, using satisfiability for non-optimal temporal planning has not been investigated so far. The main difficulty in using satisfiability in temporal planning is the representation of time, which is a continuous concept. Previously introduced... 

    Towards a reliable modulation and encoding scheme for internet of things communications

    , Article 13th IEEE International Conference on Application of Information and Communication Technologies, AICT 2019, 23 October 2019 through 25 October 2019 ; 2019 ; 9781728139005 (ISBN) Sadeghi, P ; Safaei, B ; Talaei, K ; Hosseini Monazzah, A. M ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    As the emergence of Internet of Things (IoT) brings the realization of ubiquitous connectivity ever closer, our reliance on these applications gets more important. Nowadays, such connected devices could be found everywhere, from home appliances to industrial control systems and environmental monitoring applications. One of the main challenges in IoT infrastructures is that of reliability, which emboldens itself in the context of Low-power and Lossy Networks (LLN) as they are inherently prone to packet loss as a result of their environmental and design constraints. Therefore, reliability of IoT devices becomes crucially important. With communication, the most important consideration in these... 

    Strong continuous non-malleable encoding schemes with tamper-detection

    , Article Information Sciences ; Volume 451-452 , 2018 , Pages 253-270 ; 00200255 (ISSN) Mortazavi, A. S ; Salmasizadeh, M ; Daneshgar, A ; Sharif University of Technology
    Elsevier Inc  2018
    Abstract
    A non-malleable encoding scheme is a keyless encoding scheme which is resilient to tampering attacks. Such a scheme is said to be continuously secure if the scheme is resilient to attacks containing more than one tampering procedure. Moreover, such a scheme is said to have the T-tamper-detection property if any kind of tampering attack by an adversary chosen from a predetermined class of algorithms T is detected. Faust et al. have introduced a continuous non-malleable encoding scheme based on non-interactive zero-knowledge (NIZK) which is secure in a strong model for which the adversary receives the tampered codeword as a response to its tampering query if the tampered codeword is not... 

    Steganography in wireless application protocol

    , Article IASTED International Conference on Internet and Multimedia Systems and Applications, Innsbruck, 13 February 2006 through 15 February 2006 ; Volume 2006 , 2006 , Pages 91-95 ; 0889865663 (ISBN); 9780889865662 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2006
    Abstract
    Mobile phone and Internet technologies have progressed along each other. The importance of both these technologies has resulted in the creation of a new technology for establishing wireless Internet connection through mobile phone, known as Wireless Application Protocol (WAP). However, considering the importance of the issue of data security and especially establishing hidden communications, many methods have been presented. In the meanwhile, steganography is a relatively new method. In this paper, a method for hidden exchange of data has been presented by using steganography on WML pages (WML stands for Wireless Markup Language, which is a language for creating web pages for the WAP). The... 

    Spiking neuro-fuzzy clustering system and its memristor crossbar based implementation

    , Article Microelectronics Journal ; Vol. 45, issue. 11 , 2014 , pp. 1450-1462 ; ISSN: 00262692 Bavandpour, M ; Bagheri-Shouraki, S ; Soleimani, H ; Ahmadi, A ; Linares-Barranco, B ; Sharif University of Technology
    Abstract
    This study proposes a spiking neuro-fuzzy clustering system based on a novel spike encoding scheme and a compatible learning algorithm. In this system, we utilize an analog to binary encoding scheme that properly maps the concept of "distance" in multi-dimensional analog spaces to the concept of "dissimilarity " of binary bits in the equivalent binary spaces. When this scheme is combined with a novel binary to spike encoding scheme and a proper learning algorithm is applied, a powerful clustering algorithm is produced. This algorithm creates flexible fuzzy clusters in its analog input space and modifies their shapes to different convex shapes during the learning process. This system has... 

    Spatio-temporal VLAD encoding of visual events using temporal ordering of the mid-level deep semantics

    , Article IEEE Transactions on Multimedia ; Volume 22, Issue 7 , 2020 , Pages 1769-1784 Soltanian, M ; Amini, S ; Ghaemmaghami, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Classification of video events based on frame-level descriptors is a common approach to video recognition. In the meanwhile, proper encoding of the frame-level descriptors is vital to the whole event classification procedure. While there are some pretty efficient video descriptor encoding methods, temporal ordering of the descriptors is often ignored in these encoding algorithms. In this paper, we show that by taking into account the temporal inter-frame dependencies and tracking the chronological order of video sub-events, accuracy of event recognition is further improved. First, the frame-level descriptors are extracted using convolutional neural networks (CNNs) pre-trained on ImageNet,... 

    Sequential nonlinear encoding: A low dimensional regression algorithm with application to EEG-based driving fatigue detection

    , Article Scientia Iranica ; Volume 29, Issue 3 , 2022 , Pages 1486-1505 ; 10263098 (ISSN) Tabejamaat, M ; Mohammadzade, H ; Sharif University of Technology
    Sharif University of Technology  2022
    Abstract
    Regression analysis of real-world data has not always been an easy task, especially when input vectors are presented in a very low dimensional space. EEG-based fatigue detection deals with low dimensional problems and plays a major role in reducing the risk of fatal accidents. We propose a kernel projection pursuit regression algorithm which is a two-step nonlinearity encoding algorithm tailored for such low dimensional problems such as fatigue detection. In this way, data nonlinearity can be investigated from two different perspectives: by first transforming the data into a high dimensional intermediate space and then, applying their spline estimations to the output variables allowing for... 

    Sending pictures by SMS

    , Article 11th International Conference on Advanced Communication Technology, ICACT 2009, Phoenix Park, 15 February 2009 through 18 February 2009 ; Volume 1 , 2009 , Pages 222-223 ; 17389445 (ISSN); 9788955191387 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; IEEE Communications Society, IEEE ComSoc ; Sharif University of Technology
    2009
    Abstract
    SMS (Short Message Service) is a popular service for transferring and exchange of short text messages between mobile phones. MMS (Multimedia Messaging Service) is another technology in mobile phones for creating, sending, receiving and storing messages that include text, images, audio and video clips. But MMS is not available in some countries. So, we cannot send images in those countries by mobile phones. In this paper, we present a method for solving this problem. In this method, the image is converted to a text file by using Base64 encoding and it is sent through several SMS messages  

    Sending a laplacian source using hybrid digital-analog codes

    , Article IEEE Transactions on Communications ; Vol. 62, issue. 7 , 2014 , p. 2544-2557 Abbasi, F ; Aghagolzadeh, A ; Behroozi, H ; Sharif University of Technology
    Abstract
    In this paper, we study transmission of a memoryless Laplacian source over three types of channels: additive white Laplacian noise (AWLN), additive white Gaussian noise (AWGN), and slow flat-fading Rayleigh channels under both bandwidth compression and bandwidth expansion. For this purpose, we analyze two well-known hybrid digital-analog (HDA) joint source-channel coding schemes for bandwidth compression and one for bandwidth expansion. Then we obtain achievable (absolute-error) distortion regions of the HDA schemes for the matched signal-to-noise ratio (SNR) case as well as the mismatched SNR scenario. Using numerical examples, it is shown that these schemes can achieve a distortion very... 

    Realizability of choreographies using Process algebra encodings

    , Article IEEE Transactions on Services Computing ; Volume 5, Issue 3 , 2012 , Pages 290-304 ; 19391374 (ISSN) Salaün, G ; Bultan, T ; Roohi, N ; Sharif University of Technology
    IEEE  2012
    Abstract
    Service-oriented computing has emerged as a new software development paradigm that enables implementation of Web accessible software systems that are composed of distributed services which interact with each other via exchanging messages. Modeling and analysis of interactions among services is a crucial problem in this domain. Interactions among a set of services that participate in a service composition can be described from a global point of view as a choreography. Choreographies can be specified using specification languages such as Web Services Choreography Description Language (WS-CDL) and visualized using graphical formalisms such as collaboration diagrams. In this paper, we present an... 

    Quantum CDMA communication systems

    , Article IEEE Transactions on Information Theory ; Volume 67, Issue 8 , 2021 , Pages 5526-5547 ; 00189448 (ISSN) Rezai, M ; Salehi, J. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Barcoding photons, atoms, and any quantum states can provide a host of functionalities that could benefit future quantum communication systems and networks beyond today's imagination. As a significant application of barcoding photons, we introduce code division multiple-access (CDMA) communication systems for various applications. In this context, we introduce and discuss the fundamental principles of a novel quantum CDMA (QCDMA) technique based on spectrally encoding and decoding of continuous-mode quantum light pulses. In particular, we present the mathematical models of various QCDMA modules that are fundamental in describing an ideal and typical QCDMA system, such as quantum signal... 

    Optimum transmission delay for function computation in NFV-based networks: the role of network coding and redundant computing

    , Article IEEE Journal on Selected Areas in Communications ; 2018 ; 07338716 (ISSN) Tahmasebi, B ; Maddah Ali, M. A ; Parsaeefard, S ; Hossein Khalaj, B ; Sharif University of Technology
    Abstract
    In this paper, we study the problem of delay minimization in NFV-based networks. In such systems, the ultimate goal of any request is to compute a sequence of functions in the network, where each function can be computed at only a specific subset of network nodes. In conventional approaches, for each function, we choose one node from the corresponding subset of the nodes to compute that function. In contrast, in this work, we allow each function to be computed in more than one node, redundantly in parallel, to respond to a given request. We argue that such redundancy in computation not only improves the reliability of the network, but would also, perhaps surprisingly, reduce the overall... 

    Optimal exploitation of the resource in remote state preparation

    , Article Physical Review A ; Volume 102, Issue 1 , 15 July , 2020 Nikaeen, M ; Ramezani, M ; Bahrampour, A ; Sharif University of Technology
    American Physical Society  2020
    Abstract
    Transmission efficiency (TE) of remote state preparation (RSP) with a shared quantum state and one bit of classical communication is considered. Following Dakić et al. [Nat. Phys. 8, 666 (2012)10.1038/nphys2377], the encoding and decoding operators of the protocol are restricted to the physically relevant classes of projective measurements and unitary operators, respectively. It is shown that contrary to the previous arguments, the quadratic fidelity as well as the linear fidelity could be a valid figure of merit to quantify the TE of RSP. Then, the TE of the protocol in terms of both linear and quadratic fidelities is evaluated in a fully optimized scenario which includes the maximization... 

    Object-based video coding for distance learning using stereo cameras

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 176-185 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Khalili, A. H ; Bagheri, M ; Kasaei, S ; Sharif University of Technology
    2008
    Abstract
    This paper presents a novel video encoding method for cooperative educational dissemination systems. Taking into consideration the inherent characteristics of stereo cameras framework in our educational videos and the ability of determining objects in different depths in a scene, we have proposed a novel object-based video encoding based on "sprite coding" that supports the MPEG-4 Version 1 Main profile in order to transfer distance learning videos across narrow-band transmission links such as the Internet. This paper proposes a multi-layer video object layer generation scheme with foreground moving object extraction and background sprite generation using stereo camera property. The... 

    New rectangular partitioning methods for lossless binary image compression

    , Article International Conference on Signal Processing Proceedings, ICSP, 24 October 2010 through 28 October 2010 ; 2010 , Pages 694-697 ; 9781424458981 (ISBN) Kafashan, M ; Hosseini, H ; Beygiharchegani, S ; Pad, P ; Marvasti, F ; Sharif University of Technology
    Abstract
    In this paper, we propose two lossless compression techniques that represent a two dimensional Run-length Coding which can achieve high compression ratio. This method works by partitioning the block regions of the input image into rectangles instead of working by runs of adjacent pixels, so it is found to be more efficient than 1D RLE Run-length Coding for transmitting texts and image. In the first method, length and width of consecutive black and white rectangles are transmitted. The idea of this method is new and it can be very effective for some images which have large blocks of black or white pixels. But in the second method only black rectangles are considered in order to transmit and... 

    New encoding methods for SAT-based temporal planning

    , Article ICAPS 2013 - Proceedings of the 23rd International Conference on Automated Planning and Scheduling ; June , 2013 , Pages 73-81 ; 9781577356097 (ISBN) Rankooh, M. F ; Ghassem Sani, G ; Feyzbakhsh Rankooh, M ; Sharif University of Technology
    2013
    Abstract
    Although satisfiability checking is known to be an effective approach in classical planning, it has scarcely been investigated in the field of temporal planning. Most notably, the usage of ∃-step semantics for encoding the problem into a SAT formula, while being demonstrably quite efficient for decreasing the size of the encodings in classical planning, has not yet been employed to tackle temporal planning problems. In this paper, we define temporal versions of classical ∀-step and ∃-step plans. We show that when the casual and temporal reasoning phases of a SAT-based temporal planner are separated, these semantics can be used to translate a given temporal planning problem into a SAT...