Loading...
Search for: show-through
0.01 seconds

    Using design patterns for refactoring real-world models

    , Article Conference Proceedings of the EUROMICRO, 27 August 2009 through 29 August 2009 ; 2009 , Pages 436-441 ; 10896503 (ISSN) ; 9780769537849 (ISBN) Yaghoubi Shahir, H ; Kouroshfar, E ; Ramsin, R ; Sharif University of Technology
    Abstract
    Many software development methodologies are based on modeling the real world. In some of these methodologies, real-world models are gradually transformed into software models, while in others, the real world is only considered as a preliminary source of insight into the physical business domain. Real-world modeling was pushed to the sidelines due to anomalies in real-world modeling approaches; however, with the advent of the Model-Driven Architecture (MDA), real-world conceptual modeling is likely to regain its importance. We propose a method for using Design Patterns in the context of model transformation, where real-world models are refactored through application of these patterns.... 

    SEAODV: Secure efficient AODV routing protocol for MANETs networks

    , Article ACM International Conference Proceeding Series, 24 November 2009 through 26 November 2009, Seoul ; Volume 403 , 2009 , Pages 940-944 ; 9781605587103 (ISBN) Mohammadizadeh, M ; Movaghar, A ; Safi, S. M ; Sharif University of Technology
    Abstract
    Secure routing is one of the most important topics in the wireless MANETs networks. MANETs networks don't have a central infrastructure for the management of routing in the networks. Each node independently routes and sends packets, so many attacks such as forging, modifying, and denial of service (DoS), Occur in these networks. In this paper, we present the new protocol, SEAODV; Secure Efficient Ad-hoc on Demand Routing Protocol for MANETs networks. SEAODV is based on the AODV algorithm and in comparison with existing secure AODV protocols such as SAODV, ARAN and SEAR have improved security and performances. SEAODV uses HEAP authentication Scheme with symmetric cryptography and one-way hash... 

    Linear-quadratic blind source separating structure for removing show-through in scanned documents

    , Article International Journal on Document Analysis and Recognition ; Volume 14, Issue 4 , 2011 , Pages 319-333 ; 14332833 (ISSN) Merrikh Bayat, F ; Babaie Zadeh, M ; Jutten, C ; Sharif University of Technology
    2011
    Abstract
    Digital documents are usually degraded during the scanning process due to the contents of the backside of the scanned manuscript. This is often caused by the show-through effect, i. e. the backside image that interferes with the main front side picture due to the intrinsic transparency of the paper. This phenomenon is one of the degradations that one would like to remove especially in the field of Optical Character Recognition (OCR) or document digitalization which require denoised texts as inputs. In this paper, we first propose a novel and general nonlinear model for canceling the show-through phenomenon. A nonlinear blind source separation algorithm is used for this purpose based on a new... 

    Using non-negative matrix factorization for removing show-through

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 27 September 2010 through 30 September 2010 ; Volume 6365 LNCS , September , 2010 , Pages 482-489 ; 03029743 (ISSN) ; 9783642159947 (ISBN) Merrikh Bayat, F ; Babaie Zadeh, M ; Jutten, C ; Sharif University of Technology
    2010
    Abstract
    Scanning process usually degrades digital documents due to the contents of the backside of the scanned manuscript. This is often because of the show-through effect, i.e. the backside image that interferes with the main front side picture mainly due to the intrinsic transparency of the paper used for printing or writing. In this paper, we first use one of Non-negative Matrix Factorization (NMF) methods for canceling show-through phenomenon. Then, non-linearity of show-through effect is included by changing the cost function used in this method. Simulation results show that this proposed algorithm can remove show-through effectively  

    A nonlinear blind source separation solution for removing the show-through effect in the scanned documents

    , Article 16th European Signal Processing Conference, EUSIPCO 2008, Lausanne, 25 August 2008 through 29 August 2008 ; 2008 ; 22195491 (ISSN) Merrikh Bayat, F ; Babaie Zadeh, M ; Jutten, C ; Sharif University of Technology
    2008
    Abstract
    Digital documents are usually degraded during the scanning process due to the printings existing on the backside of the scanning manuscript. This is often caused by the so called show-through effect, the image that interferes with the main picture due to the intrinsic opacity of the paper. This phenomenon is on type of degradation that one would like to remove. In this paper, we propose a novel and general nonlinear model for show-through phenomenon. A nonlinear blind source separation (BSS) algorithm is used for this particular application in a new recursive and extendible structure for compensating show-through. Finally, we introduce a new structure for removing the show-through and the... 

    Study of beam propagation in finite photonic crystals

    , Article Proceedings of SPIE - The International Society for Optical Engineering, 25 January 2010 through 28 January 2010 ; Volume 7597 , January , 2010 ; 0277786X (ISSN) ; 9780819479938 (ISBN) Khavasi, A ; Mehrany, K ; Miri, M ; Kazemi Jahromi, A ; Khorasani, S ; Sharif University of Technology
    2010
    Abstract
    Many authors simply use band structure of infinite photonic crystals to predict the beam's direction in a finite structure. The validity of this approximation for high frequencies has been questioned by Felbacq (PRL 92, 193902) and instead a dressed (by evanescent waves) transfer matrix has been suggested. In this work, we show through numerical examples that the direction obtained by conventional band structure is more accurate than that of dressed transfer matrix of Felbacq et. al. We also demonstrate that this approximation can be improved by taking the effect of evanescent Bloch modes into consideration. The effect of these modes leads to a constant shift of beam's center inside and far...