Loading...
Search for: personal-computers
0.011 seconds

    Multilingual highlighting CAPTCHA

    , Article Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011, 11 April 2011 through 13 April 2011, Las Vegas, NV ; 2010 , Pages 447-452 ; 9780769543673 (ISBN) Shirali Shahreza, S ; Shirali Shahreza, M ; Sharif University of Technology
    2010
    Abstract
    There are many websites specially designed for mobile phones. Some hackers write automated programs to abuse these website services and waste the website resources. Therefore, it is necessary to distinguish between human users and computer programs. Methods known for achieving this are known as CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart). CAPTCHA methods are mainly based on the weaknesses of OCR (Optical Character Recognition) systems and ask the user to type a word. So using them is difficult in tools such as PDAs (Personal Digital Assistant) or mobile phones that lack a complete keyboard. In this paper, a new CAPTCHA system is proposed for... 

    Design, construction and simulation of a multipurpose system for precision movement of control rods in nuclear reactors

    , Article Annals of Nuclear Energy ; Volume 37, Issue 12 , 2010 , Pages 1659-1665 ; 03064549 (ISSN) Musavi Shirazi, S. A ; Aghanajafi, C ; Sadoughi, S ; Sharifloo, N ; Sharif University of Technology
    Abstract
    This article presents the design and implementation of a microcontroller-based system for the automatic movement of control rods in nuclear reactors of either power or research types. This system is controlled automatically, is linked to a personal computer system, and has manual controlling ability as well. The important features of this system are: automatic scram of the control rods, activation of alarm in emergency situations, and the ability to tune the control rod movement course both upwards and downwards. In this system, a small tank has been improvised as a coolant reservoir for pool type reactors such as Tehran Research Reactor and its water level is continuously adjusted by... 

    A survey of human interactive proof systems

    , Article International Journal of Innovative Computing, Information and Control ; Volume 6, Issue 3 , 2010 , Pages 855-874 ; 13494198 (ISSN) Shirali Shahreza, S ; Shirali Shahreza, M ; Sharif University of Technology
    2010
    Abstract
    Nowadays, a great amount of information is circulated through the Internet. Some of them exclusively belong to a special group of users and require protection and safeguarding against unauthorized access. To this end, a category of systems called HIP (Human Interactive Proof) are designed to distinguish between various groups of users. An important task on the Internet websites is registration. Some hackers write programs to make fake registration that waste the resources of the web sites or even stop them from providing services. Therefore, human users should be distinguished from computer programs. CAPTCHA (Completely Automatic Public Turing Test to Tell Computer and Human Apart) methods... 

    Compact representation of multimedia files for indexing, classification and retrieval

    , Article Proceedings of the International Conference on Management of Emergent Digital EcoSystems, MEDES '09, 27 October 2009 through 30 October 2009, Lyon ; 2009 , Pages 489-492 ; 9781605588292 (ISBN) Shirali Shahreza, S ; Sharif University of Technology
    Abstract
    Multimedia files including audio, music and movies are important part of resources available on the Internet. With the expansion of personal computers and other digital devices such as digital cameras, ordinary people are also creating different multimedia files. Hence, there are huge amount of multimedia files in the Internet. Considering the volume of files available, we need automatic methods for indexing, classification and retrieval of multimedia files. But, there are a number of problems in processing multimedia files. Two important issues are the large size of multimedia files and different lengths of different files. In this PhD project, we want to develop a solution for these two... 

    Breaking anonymity of some recent lightweight RFID authentication protocols

    , Article Wireless Networks ; Volume 25, Issue 3 , 2018 , Pages 1-18 ; 10220038 (ISSN) Baghery, K ; Abdolmaleki, B ; Khazaei, S ; Aref, M. R ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    Due to their impressive advantages, Radio Frequency IDentification (RFID) systems are ubiquitously found in various novel applications. These applications are usually in need of quick and accurate authentication or identification. In many cases, it has been shown that if such systems are not properly designed, an adversary can cause security and privacy concerns for end-users. In order to deal with these concerns, impressive endeavors have been made which have resulted in various RFID authentications being proposed. In this study, we analyze three lightweight RFID authentication protocols proposed in Wireless Personal Communications (2014), Computers & Security (2015) and Wireless Networks... 

    Breaking anonymity of some recent lightweight RFID authentication protocols

    , Article Wireless Networks ; Volume 25, Issue 3 , 2019 , Pages 1235-1252 ; 10220038 (ISSN) Baghery, K ; Abdolmaleki, B ; Khazaei, S ; Aref, M. R ; Sharif University of Technology
    Springer New York LLC  2019
    Abstract
    Due to their impressive advantages, Radio Frequency IDentification (RFID) systems are ubiquitously found in various novel applications. These applications are usually in need of quick and accurate authentication or identification. In many cases, it has been shown that if such systems are not properly designed, an adversary can cause security and privacy concerns for end-users. In order to deal with these concerns, impressive endeavors have been made which have resulted in various RFID authentications being proposed. In this study, we analyze three lightweight RFID authentication protocols proposed in Wireless Personal Communications (2014), Computers & Security (2015) and Wireless Networks... 

    Highlighting CAPTCHA

    , Article 2008 Conference on Human System Interaction, HSI 2008, Krakow, 25 May 2008 through 27 May 2008 ; 2008 , Pages 247-250 ; 1424415438 (ISBN); 9781424415434 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    There are many sites specially designed for mobile phones. In cases such as the registering in websites, some hackers write programs to make automatic false enrolments which waste the resources of the website. Therefore, it is necessary to distinguish between human users and computer programs. These systems are known as CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart). CAPTCHA methods are mainly based on the weak points of OCR (Optical Character Recognition) systems while using them difficult in tools such as PDAs (Personal Digital Assistant) or mobile phones that lack a big keyboard. So the Non-OCR-Based CAPTCHA methods are proposed which are do not need... 

    Involving computer science students in real-world problems

    , Article ITI 2008 30th International Conference on Information Technology Interfaces, Cavtat/Dubrovnik, 23 June 2008 through 26 June 2008 ; 2008 , Pages 569-573 ; 13301012 (ISSN) ; 9789537138127 (ISBN) Shirali Shahreza, S ; Shirali ShahrezaMohammad, M ; Sharif University of Technology
    2008
    Abstract
    Today, many students are study computer science. Although they study different courses, they rarely do homework or projects related to real world problems. In this paper, we design a project to show some of the problems which are occured during implementing a real word project to the students. In this project, the students are asked to implement the FFT (Fast Fourier Transform) algorithm on a personal computer and then port the program to a smartphone using J2ME (Java 2 Micro Edition) programming language. By doing this project, the undergraduate computer science students will become familiar with the limitations of small devices such as smartphones. They also learn the process of porting a... 

    Collage CAPTCHA

    , Article 2007 9th International Symposium on Signal Processing and its Applications, ISSPA 2007, Sharjah, 12 February 2007 through 15 February 2007 ; 2007 ; 1424407796 (ISBN); 9781424407798 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2007
    Abstract
    Nowadays, many daily human activities such as education, commerce, talks, etc. are carried out through the Internet. In cases such as the registering in websites, some hackers write programs to make automatic false enrolments which waste the resources of the website while this may even stop the entire website from working. Therefore, it is necessary to tell apart human users from computer programs which is known as CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart). CAPTCHA methods are mainly based on the weak points of OCR (Optical Character Recognition) systems while using them are undesirable to human users. In this paper a method has been presented for... 

    Localized CAPTCHA for illiterate people

    , Article 2007 International Conference on Intelligent and Advanced Systems, ICIAS 2007, Kuala Lumpur, 25 November 2007 through 28 November 2007 ; 2007 , Pages 675-679 ; 1424413559 (ISBN); 9781424413553 (ISBN) Shirali Shahreza, M. H ; Shirali Shahreza, M ; Sharif University of Technology
    2007
    Abstract
    Nowadays, many daily human activities such as education, commerce, talks, etc. are carried out through the Internet. In cases such as the registering in websites, some hackers write programs to make automatic false enrolments which waste the resources of the website while this may even stop the entire website from working. Therefore, it is necessary to tell apart human users from computer programs which is known as CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart). CAPTCHA methods are mainly based on the weak points of OCR (Optical Character Recognition) systems while using them are undesirable to human users. So the Non-OCR-Based CAPTCHA methods are... 

    Accelerating 3-D capacitance extraction in deep sub-micron VLSI design using vector/parallel computing

    , Article 13th International Conference on Parallel and Distributed Systems, ICPADS, Hsinchu, 5 December 2007 through 7 December 2007 ; Volume 2 , December , 2007 ; 15219097 (ISSN); 9781424418909 (ISBN) Shahbazi, N ; Sarbazi Azad, H ; Sharif University of Technology
    2007
    Abstract
    The widespread application of deep sub-micron and multilayer routing techniques makes the interconnection parasitic influence become the main factor to limit the performance of VLSI circuits. Therefore, fast and accurate 3D capacitance extraction is essential for ultra deep sub-micron design (UDSM) of integrated circuits. Parallel processing provides an approach to reducing the simulation turn-around time. In this paper, we present parallel formulations for 3D capacitance extraction based on P-FFT algorithm, on a personal computer (PC) or on a network of PCs. We implement both vector and parallel versions of 3D capacitance extraction algorithm simultaneously and evaluate our implementation... 

    Multilingual CAPTCHA

    , Article ICCC 2007 - 5th IEEE International Conference on Computational Cybernetics, Gammarth, 19 October 2007 through 21 October 2007 ; 2007 , Pages 135-139 ; 1424411467 (ISBN); 9781424411467 (ISBN) Shirali Shahreza, M. H ; Shirali Shahreza, M ; Sharif University of Technology
    2007
    Abstract
    Currently, many daily human activities such as education, commerce and talks are carried out through the Internet. In cases such as the registering in websites, some hackers write programs to make automatic false enrolments which waste the resources of the website while this may even stop the entire website from working. Therefore, it is necessary to tell apart human users from computer programs which is known as CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart). CAPTCHA methods are mainly based on the weak points of OCR (Optical Character Recognition) systems while using them are undesirable to human users. In this paper a method has been presented for... 

    DotGrid: A.NET-based cross-platform software for desktop grids

    , Article International Journal of Web and Grid Services ; Volume 3, Issue 3 , 2007 , Pages 313-332 ; 17411106 (ISSN) Poshtkohi, A ; Haj Abutalebi, A ; Hessabi, S ; Sharif University of Technology
    Inderscience Publishers  2007
    Abstract
    Grid infrastructures that have provided wide integrated use of resources are becoming the de facto computing platform for solving large-scale problems in science, engineering and commerce. In this evolution, desktop grid technologies allow the grid communities to exploit the idle cycles of pervasive desktop PC systems to increase the available computing power. In this paper we present DotGrid, a cross-platform grid software. DotGrid is the first comprehensive desktop grid software utilising Microsoft's .NET Framework in Windows-based environments and MONO .NET in Unix-class operating systems to operate. Using DotGrid services and APIs, grid desktop middleware and applications can be... 

    Efficient SIMD numerical interpolation

    , Article 1st International Conference on High Performance Computing and Communcations, HPCC 2005, Sorrento, 21 September 2005 through 23 September 2005 ; Volume 3726 LNCS , 2005 , Pages 156-165 ; 03029743 (ISSN); 3540290311 (ISBN); 9783540290315 (ISBN) Ahmadi, H ; Naeini, M. M ; Sarbazi Azad, H ; Sharif University of Technology
    Springer Verlag  2005
    Abstract
    This paper reports the results of SIMD implementation of a number of interpolation algorithms on common personal computers. These methods fit a curve on some given input points for which a mathematical function form is not known. We have implemented four widely used methods using vector processing capabilities embedded in Pentium processors. By using SSE (streaming SIMD extension) we could perform all operations on four packed single-precision (32-bit) floating point values simultaneously. Therefore, the running time decreases three times or even more depending on the number of points and the interpolation method. We have implemented four interpolation methods using SSE technology then... 

    Computation of three-dimensional supersonic turbulent flows over wrap-around fin projectiles using personal computers

    , Article Scientia Iranica ; Volume 12, Issue 2 , 2005 , Pages 217-228 ; 10263098 (ISSN) Fazeli, H ; Azimi, A ; Farhanieh, B ; Sharif University of Technology
    Sharif University of Technology  2005
    Abstract
    The three-dimensional supersonic turbulent flows over wrap-around fin missiles have been computed using the Thin Layer Navier-Stokes (TLNS) equations to reduce the computational efforts compared to those of the Full Navier-Stokes (FNS) equations. In this research, the missile configuration is divided into multi regions to enable fluid flow simulation using Personal Computers (PC). It also makes it possible to use a different number of nodes and distribution of grids in each region to enhance the accuracy. The Thin Layer Navier-Stokes equations in the generalized coordinate system were solved using an efficient, implicit, finite-difference factored algorithm of the Beam and Warming. For the... 

    Practical prediction of supersonic viscous flows over complex configurations using personal computers

    , Article Journal of Spacecraft and Rockets ; Volume 38, Issue 5 , 2001 , Pages 795-798 ; 00224650 (ISSN) Esfahanian, V ; Azimi, A ; Hejranfar, K ; Sharif University of Technology
    2001