Loading...
Search for: information-retrieval
0.011 seconds
Total 80 records

    Parsisanj: an automatic component-based approach toward search engine evaluation

    , Article Journal of Supercomputing ; Volume 78, Issue 8 , 2022 , Pages 10690-10711 ; 09208542 (ISSN) Alashti, A. H ; Rezaei, A. A ; Elahi, A ; Sayyaran, S ; Ghodsi, M ; Sharif University of Technology
    Springer  2022
    Abstract
    Web search engines play a significant role in answering users’ information needs based on the huge amount of data available on the internet. Although evaluating the performance of these systems is very important for their improvement, there is no comprehensive, unbiased, low-cost, and reusable method for this purpose. Previous works used a small and limited set of queries for their evaluation process that restricts the assessment domain. Moreover, these methods mainly rely on human evaluators for manual assessment of search engines which makes the results of the evaluation subjective to the opinion of human evaluators and also prone to error. In addition, repeating the evaluation would be a... 

    Suggesting an integration system for image annotation

    , Article Multimedia Tools and Applications ; 2022 ; 13807501 (ISSN) Ghostan Khatchatoorian, A ; Jamzad, M ; Sharif University of Technology
    Springer  2022
    Abstract
    The number of digital images uploaded in the virtual world is rapidly growing every day. Therefore, an automatic image annotation system that can retrieve information from these images seems to be in high demand. One of the challenges in this field is the imbalanced data sets and the difficulty of successfully learning tags from them. Even if a nearly balanced data set exists for image annotation, it is unlikely to find a single learner, which could learn all tags with the same accuracy. In this paper, we suggest a novel integration system that selects an elite group of models from all existing annotation models and then combines them to take the best advantage of each model’s learning... 

    Private Information Retrieval for a Multi-Message Scenario with Private Side Information

    , Article IEEE Transactions on Communications ; Volume 69, Issue 5 , 2021 , Pages 3235-3244 ; 00906778 (ISSN) Siavoshani, M. J ; Shariatpanahi, S. P ; Maddah Ali, M. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    We consider the problem of private information retrieval (PIR), where a single user with private side information (PSI) aims to retrieve multiple files from a library stored at some servers. We assume that the side information (SI) at the user includes a subset of files stored privately. Moreover, the identity of requests and side information at the user are not revealed to any of the servers. The problem involves finding the minimum load transmitted from the servers to the user such that the requested files can be decoded with the help of received data and side information. By providing matching lower and upper bounds for certain regimes, we characterize the minimum load imposed on all the... 

    Event classification from the Urdu language text on social media

    , Article PeerJ Computer Science ; Volume 7 , 2021 ; 23765992 (ISSN) Awan, M. D. A ; Kajla, N. I ; Firdous, A ; Husnain, M ; Missen, M. M. S ; Sharif University of Technology
    PeerJ Inc  2021
    Abstract
    The real-time availability of the Internet has engaged millions of users around the world. The usage of regional languages is being preferred for effective and ease of communication that is causing multilingual data on social networks and news channels. People share ideas, opinions, and events that are happening globally i.e., sports, inflation, protest, explosion, and sexual assault, etc. in regional (local) languages on social media. Extraction and classification of events from multilingual data have become bottlenecks because of resource lacking. In this research paper, we presented the event classification task for the Urdu language text existing on social media and the news channels by... 

    Fuzzy linear programming problems: models and solutions

    , Article Soft Computing ; Volume 24, Issue 13 , 2020 , Pages 10043-10073 Ghanbari, R ; Ghorbani Moghadam, K ; Mahdavi Amiri, N ; De Baets, B ; Sharif University of Technology
    Springer  2020
    Abstract
    We investigate various types of fuzzy linear programming problems based on models and solution methods. First, we review fuzzy linear programming problems with fuzzy decision variables and fuzzy linear programming problems with fuzzy parameters (fuzzy numbers in the definition of the objective function or constraints) along with the associated duality results. Then, we review the fully fuzzy linear programming problems with all variables and parameters being allowed to be fuzzy. Most methods used for solving such problems are based on ranking functions, α-cuts, using duality results or penalty functions. In these methods, authors deal with crisp formulations of the fuzzy problems. Recently,... 

    Private function computation

    , Article 2020 IEEE International Symposium on Information Theory, ISIT 2020, 21 July 2020 through 26 July 2020 ; Volume 2020-June , 2020 , Pages 1118-1123 Tahmasebi, B ; Maddah Ali, M. A ; IEEE Information Theory Society; The Institute of Electrical and Electronics Engineers ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    In this paper, we study the problem of private function computation, where a user wants to compute a function of some inputs, using N in mathbb{N} servers, where the function is a private combination/composition of some K in mathbb{N} public basic functions {f 1 , f 2 ,., f K }. More precisely, for some inputs W m , m [1 : M], the user's goal is to calculate hleft( {{W-m}} ight) = sumolimits-{j = 1}^J {{alpha -j}} {h-j}left( {{W-m}} ight), for some J in mathbb{N}, some scalers α j , j [1 : J], and some functions h j (.), j [1 : J], where each is an arbitrary compositions of the basic functions {f 1 , f 2 ,., f K }. The computation is done through a sequence of queries to N servers. In each... 

    Solving fuzzy quadratic programming problems based on ABS algorithm

    , Article Soft Computing ; Volume 23, Issue 22 , 2019 , Pages 11343-11349 ; 14327643 (ISSN) Ghanbari, R ; Ghorbani Moghadam, K ; Sharif University of Technology
    Springer Verlag  2019
    Abstract
    Recently, Ghanbari and Mahdavi-Amiri (Appl Math Model 34:3363–3375, 2010) gave the general compromised solution of an LR fuzzy linear system using ABS algorithm. Here, using this general solution, we solve quadratic programming problems with fuzzy LR variables. We convert fuzzy quadratic programming problem to a crisp quadratic problem by using general solution of fuzzy linear system. By using this method, the crisp optimization problem has fewer variables in comparison with other methods, specially when rank of the coefficient matrix is full. Thus, solving the fuzzy quadratic programming problem by using our proposed method is computationally easier than the solving fuzzy quadratic... 

    Private Inner product retrieval for distributed machine learning

    , Article 2019 IEEE International Symposium on Information Theory, ISIT 2019, 7 July 2019 through 12 July 2019 ; Volume 2019-July , 2019 , Pages 355-359 ; 21578095 (ISSN); 9781538692912 (ISBN) Mousavi, M. H ; Maddah Ali, M. A ; Mirmohseni, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we argue that in many basic algorithms for machine learning, including support vector machine (SVM) for classification, principal component analysis (PCA) for dimensionality reduction, and regression for dependency estimation, we need the inner products of the data samples, rather than the data samples themselves.Motivated by the above observation, we introduce the problem of private inner product retrieval for distributed machine learning, where we have a system including a database of some files, duplicated across some non-colluding servers. A user intends to retrieve a subset of specific size of the set of the inner product of every pair of data items in the database with... 

    Performance evaluation of epidemic content retrieval in DTNs with restricted mobility

    , Article IEEE Transactions on Network and Service Management ; Volume 16, Issue 2 , 2019 , Pages 701-714 ; 19324537 (ISSN) Rashidi, L ; Entezari Maleki, R ; Chatzopoulos, D ; Hui, P ; Trivedi, K. S ; Movaghar, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In some applicable scenarios, such as community patrolling, mobile nodes are restricted to move only in their own communities. Exploiting the meetings of the nodes within the same community and the nodes within the neighboring communities, a delay tolerant network (DTN) can provide communication between any two nodes. In this paper, two analytical models based on stochastic reward nets (SRNs) are proposed to evaluate the performance of the epidemic content retrieval in such multi-community DTNs. Performance measures computed by the proposed models are the average retrieval delay and the average number of transmissions. The monolithic SRN model proposed in the first step is not scalable, in... 

    Multi-message private information retrieval with private side information

    , Article 2018 IEEE Information Theory Workshop, ITW 2018, 25 November 2018 through 29 November 2018 ; 2019 ; 9781538635995 (ISBN) Shariatpanahi, S. P ; Jafari Siavoshani, M ; Maddah Ali, M. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    We consider the problem of private information retrieval (PIR) where a single user with private side information aims to retrieve multiple files from a library stored (uncoded) at a number of servers. We assume the side information at the user includes a subset of files stored privately (i.e., the server does not know the indices of these files). In addition, we require that the identity of requests and side information at the user are not revealed to any of the servers. The problem involves finding the minimum load to be transmitted from the servers to the user such that the requested files can be decoded with the help of received and side information. By providing matching lower and upper... 

    Cluster-based sparse topical coding for topic mining and document clustering

    , Article Advances in Data Analysis and Classification ; Volume 12, Issue 3 , 2018 , Pages 537-558 ; 18625347 (ISSN) Ahmadi, P ; Gholampour, I ; Tabandeh, M ; Sharif University of Technology
    Springer Verlag  2018
    Abstract
    In this paper, we introduce a document clustering method based on Sparse Topical Coding, called Cluster-based Sparse Topical Coding. Topic modeling is capable of improving textual document clustering by describing documents via bag-of-words models and projecting them into a topic space. The latent semantic descriptions derived by the topic model can be utilized as features in a clustering process. In our proposed method, document clustering and topic modeling are integrated in a unified framework in order to achieve the highest performance. This framework includes Sparse Topical Coding, which is responsible for topic mining, and K-means that discovers the latent clusters in documents... 

    Towards side channel secure cyber-physical systems

    , Article CSI International Symposium on Real-Time and Embedded Systems and Technologies, RTEST 2018, 9 May 2018 through 10 May 2018 ; 9-10 May , 2018 , Pages 31-38 ; 9781538614754 (ISBN) Ashrafiamiri, M ; Afandizadeh Zargari, A. H ; Farzam, S. M. H ; Bayat Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Cyber-physical systems contain networked embedded systems. Such systems may implement cryptographic algorithms for processing and/or communication. Therefore, they can be prone to side-channel attacks. Differential power analysis is one of such attacks, which is considered among the most serious threats against cryptographic devices. Various metrics have been proposed to evaluate the resistance of different implementations against these attacks. Some of these metrics need side-channel attacks to be conducted and depend on the considered power model. Due to the vast variety of proposed side-channel attacks and power models, comprehensively evaluating a design under these metrics is commonly... 

    Duality in bipolar triangular fuzzy number quadratic programming problems

    , Article Proceedings of the International Conference on Intelligent Sustainable Systems, ICISS 2017, 7 December 2017 through 8 December 2017 ; 19 June , 2018 , Pages 1236-1238 ; 9781538619599 (ISBN) Ghorbani Moghadam, K ; Ghanbari, R ; Mahdavi Amiri, N ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    We discuss how to solve bipolar fuzzy quadratic programming problems, where the parameters are bipolar triangular fuzzy numbers, making use of linear ranking functions. Also, we explore some duality properties of bipolar triangular fuzzy number quadratic programming problem (BTFNQPP). © 2017 IEEE  

    -

    , Article 2018 Iran Workshop on Communication and Information Theory, IWCIT 2018, 25 April 2018 through 26 April 2018 ; 2018 , Pages 1-6 ; 9781538641491 (ISBN) Mirmohseni, M ; Maddah Ali, M. A ; Sharif University of Technology
    Institute of electrical and electronics engineers Inc  2018
    Abstract
    The widespread use of cloud computing services raises the question of how one can delegate the processing tasks to the untrusted distributed parties without breaching the privacy of its data and algorithms. Motivated by the algorithm privacy concerns in a distributed computing system, in this paper, we introduce the private function retrieval (PFR) problem, where a user wishes to efficiently retrieve a linear function of K messages from N non-communicating replicated servers while keeping the function hidden from each individual server. The goal is to find a scheme with minimum communication cost. To characterize the fundamental limits of the communication cost, we define the capacity of PFR... 

    RedQueen: an online algorithm for smart broadcasting in social networks

    , Article WSDM 2017 - Proceedings of the 10th ACM International Conference on Web Search and Data Mining, 2 February 2017 ; 2017 , Pages 51-60 ; 9781450346757 (ISBN) Zarezade, A ; Upadhyay, U ; Rabiee, H. R ; Gomez Rodriguez, M ; Sharif University of Technology
    Association for Computing Machinery, Inc  2017
    Abstract
    Users in social networks whose posts stay at the top of their followers' feeds the longest time are more likely to be noticed. Can we design an online algorithm to help them decide when to post to stay at the top? In this paper, we address this question as a novel optimal control problem for jump stochastic differential equations. For a wide variety of feed dynamics, we show that the optimal broadcasting intensity for any user is surprisingly simple - it is given by the position of her most recent post on each of her follower's feeds. As a consequence, we are able to develop a simple and highly efficient online algorithm, RedQueen, to sample the optimal times for the user to post.... 

    Persian text classification based on topic models

    , Article 24th Iranian Conference on Electrical Engineering, ICEE 2016, 10 May 2016 through 12 May 2016 ; 2016 , Pages 86-91 ; 9781467387897 (ISBN) Ahmadi, P ; Tabandeh, M ; Gholampour, I ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    With the extensive growth in information, text classification as one of the text mining methods, plays a vital role in organizing and management information. Most text classification methods represent a documents collection as a Bag of Words (BOW) model and then use the histogram of words as the classification features. But in this way, the number of features is very large; therefore performing text classification faces serious computational cost problems. Moreover, the BOW representation is unable to recognize semantic relations between words. Recently, topic-model approaches have been successfully applied for text classification to overcome the problems of BOW. Our main goal in this paper... 

    Revisiting optimal rank aggregation: A dynamic programming approach

    , Article ICTIR 2015 - Proceedings of the 2015 ACM SIGIR International Conference on the Theory of Information Retrieval, 27 September 2015 through 30 September 2015 ; 2015 , Pages 353-356 ; 9781450338332 (ISBN) Tabrizi, S. A ; Dadashkarimi, J ; Dehghani, M ; Esfahani, H. N ; Shakery, A ; Sharif University of Technology
    Association for Computing Machinery, Inc  2015
    Abstract
    Rank aggregation, that is merging multiple ranked lists, is a pivotal challenge in many information retrieval (IR) systems, especially in distributed IR and multilingual IR. From the evaluation point of view, being able to calculate the upper-bound of performance of the final aggregated list lays the ground for evaluating different aggregation strategies, independently. In this paper, we propose an algorithm based on dynamic programming which, using relevancy information, obtains the aggregated list with the maximum performance that could be possibly achieved by any aggregation strategy. We also provide a detailed proof for the optimality of the result of the algorithm. Furthermore, we... 

    A joint classification method to integrate scientific and social networks

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 7814 LNCS , March , 2013 , Pages 122-133 ; 03029743 (ISSN) ; 9783642369728 (ISBN) Neshati, M ; Asgari, E ; Hiemstra, D ; Beigy, H ; Sharif University of Technology
    2013
    Abstract
    In this paper, we address the problem of scientific-social network integration to find a matching relationship between members of these networks. Utilizing several name similarity patterns and contextual properties of these networks, we design a focused crawler to find high probable matching pairs, then the problem of name disambiguation is reduced to predict the label of each candidate pair as either true or false matching. By defining matching dependency graph, we propose a joint label prediction model to determine the label of all candidate pairs simultaneously. An extensive set of experiments have been conducted on six test collections obtained from the DBLP and the Twitter networks to... 

    Efficient stochastic algorithms for document clustering

    , Article Information Sciences ; Volume 220 , 2013 , Pages 269-291 ; 00200255 (ISSN) Forsati, R ; Mahdavi, M ; Shamsfard, M ; Meybodi, M. R ; Sharif University of Technology
    2013
    Abstract
    Clustering has become an increasingly important and highly complicated research area for targeting useful and relevant information in modern application domains such as the World Wide Web. Recent studies have shown that the most commonly used partitioning-based clustering algorithm, the K-means algorithm, is more suitable for large datasets. However, the K-means algorithm may generate a local optimal clustering. In this paper, we present novel document clustering algorithms based on the Harmony Search (HS) optimization method. By modeling clustering as an optimization problem, we first propose a pure HS based clustering algorithm that finds near-optimal clusters within a reasonable time.... 

    ISO-TimeML event extraction in persian text

    , Article 24th International Conference on Computational Linguistics - Proceedings of COLING 2012: Technical Papers, 8 December 2012 through 15 December 2012 ; December , 2012 , Pages 2931-2944 Yaghoobzadeh, Y ; Ghassem-Sani, G ; Mirroshandel, S. A ; Eshaghzadeh, M ; Sharif University of Technology
    2012
    Abstract
    Recognizing TimeML events and identifying their attributes, are important tasks in natural language processing (NLP). Several NLP applications like question answering, information retrieval, summarization, and temporal information extraction need to have some knowledge about events of the input documents. Existing methods developed for this task are restricted to limited number of languages, and for many other languages including Persian, there has not been any effort yet. In this paper, we introduce two different approaches for automatic event recognition and classification in Persian. For this purpose, a corpus of events has been built based on a specific version of ISO-TimeML for Persian....