Loading...
Search for: automation
0.008 seconds
Total 259 records

    Lightweight formalization and validation of ORM models

    , Article Journal of Logical and Algebraic Methods in Programming ; Volume 84, Issue 4 , July , 2015 , Pages 534-549 ; 23522216 (ISSN) Jahangard Rafsanjani, A ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
    Elsevier Inc  2015
    Abstract
    Abstract ORM (Object Role Modeling) is a rich and popular conceptual modeling method. ORM has been used for data modeling, ontology engineering, modeling business rules, XML-Schemes and data warehouses, requirements engineering and web forms. Automated reasoning like satisfiability testing allows developers to detect modeling mistakes in the early stages of development. In this paper we propose a lightweight formalization of the ORM meta-model in Alloy. Using this meta-model as a toolkit one can easily specify ORM models in Alloy and verify various properties on them using the Alloy Analyzer. In order to achieve scalability, we use the cardinality of concepts to model their population. This... 

    Mental model development using collaborative 3D virtual environments

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 17 July 2016 through 22 July 2016 ; Volume 9749 , 2016 , Pages 279-290 ; 03029743 (ISSN) ; 9783319398617 (ISBN) Nazari Shirehjini, A. A ; Soltani Nejad, F ; Saniee Monfared, G ; Semsar, A ; Shirmohammadi, S ; Sharif University of Technology
    Springer Verlag  2016
    Abstract
    Smart environments are complex systems encompassing multitude of devices with complex interconnections and interactions. User must not only be able to figure out the devices’ functionalities, but also understand the architectural and semantic relations between various components. Providing such information leads to better understanding and user satisfaction, if users get the appropriate mental models. One way to train users about such smart environments is Interactive Realistic Virtual Reality based Simulations (IRVRS): multimedia rich collaborative 3D virtual environments. IRVRS also facilitate easy and inexpensive access to population masses, thus they can be used for conducting large... 

    Morphological reconfiguration monitoring for homogeneous self-reconfigurable robots

    , Article 2017 14th International Conference on Electrical Engineering, Computing Science and Automatic Control, CCE 2017, 20 September 2017 through 22 September 2017 ; 2017 ; 9781538634059 (ISBN) Macktoobian, M ; Tehrani, A. K. N ; Khodayar, M ; Sharif University of Technology
    Abstract
    Morphological computation (MC) has revolutionized robotic systems employing morphological properties (MP). Thus far, morphology has been mostly used to analyze morphological functionalities qualitatively after design phase of robotic systems. Furthermore, morphology has verified qualitative requirements, not modeled quantitative specifications. To fill this gap, we present a distributed algorithm to monitor module reconfiguration for homogeneous self-reconfigurable robots (HSRs) considering the size of modules. In this method, neighboring modules of a particular module occupy a spatial region called adjacency configuration (AC), whose size depends on the module size; then, we monitor... 

    Towards interacting with smarter systems

    , Article Journal of Ambient Intelligence and Humanized Computing ; Volume 9, Issue 1 , February , 2018 , Pages 187-209 ; 18685137 (ISSN) Mostafazadeh Davani, A ; Nazari Shirehjini, A. A ; Daraei, S ; Sharif University of Technology
    Springer Verlag  2018
    Abstract
    The aim of this article is the requirement analysis, design, proof-of-concept implementation and user evaluation of a novel user interface that is specifically developed to support interaction with ambient intelligence systems. The focus of the user interface is rather on interacting with ambient intelligence, a meta system that comes into existence as the result of the coherent behavior and collective intelligence of interconnected smart devices and systems of a domain such as meeting rooms or smart homes. To design the user interface, we conducted an empirical user and task analysis and elaborated requirements, defining the scope of human interaction with ambient intelligence. The captured... 

    Control of planar motion of a magnetic microrobot using a novel electromagnetic actuation system

    , Article 4th International Conference on Manipulation, Automation, and Robotics at Small Scales, MARSS 2019, 1 July 2019 through 5 July 2019 ; 2019 ; 9781728109473 (ISBN) Yousefi, M ; Moradi, A ; Nejat Pishkenari, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    A magnetic actuation system is a promising tool for untethered manipulation at the microscale that medical treatment can benefit from. This paper proposes a new magnetic actuation system that comprises of two coaxial coils on a rotary table. A fixed workspace is placed between coils. The proposed system is able to generate magnetic force with desired direction and magnitude in a plane. The conducted simulation and experiment confirm the capability of the proposed system to control the position of the microrobot. © 2019 IEEE  

    Dynamic CAPTCHA

    , Article 2008 International Symposium on Communications and Information Technologies, ISCIT 2008, Vientiane, 21 October 2008 through 23 October 2008 ; December , 2008 , Pages 436-440 ; 9781424423361 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    Registration websites use CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart) systems to prevent the bot programs from wasting their resources. But sometimes the CAPTCHA test is difficult for human users to pass because the users have different ages, languages, etc. In this paper we propose a solution for this problem. The registration system can select a kind of CAPTCHA system among different available CAPTCHA systems regarding to the user's needs such as user language and disabilities. For example if the user has non-English language, the system chooses a CAPTCHA method which does not need English language knowledge. © 2008 IEEE  

    On the predicted errors of atmospheric guidance laws

    , Article Aircraft Engineering and Aerospace Technology ; Volume 80, Issue 3 , 2008 , Pages 262-273 ; 00022667 (ISSN) Jalali Naini, S. H ; Pourtakdoust, S. H ; Sharif University of Technology
    2008
    Abstract
    Purpose - The purpose of this paper is to develop a novel solution for the predicted error and introduces a systematic method to develop optimal and explicit guidance strategies for different missions. Design/methodology/approach - The predicted error is derived from its basic definition through analytic]al dynamics. The relations are developed for two classes of systems. First, for systems in which the acceleration commands are truncated at a specified time. Second, for systems in which the corrective maneuvers are cut off at a specified time. The predicted error differential equation is obtained in a way that allows for derivation of several optimal and explicit guidance schemes. Findings... 

    Model-based Bayesian filtering of cardiac contaminants from biomedical recordings

    , Article Physiological Measurement ; Volume 29, Issue 5 , 2008 , Pages 595-613 ; 09673334 (ISSN) Sameni, R ; Shamsollahi, M. B ; Jutten, C ; Sharif University of Technology
    2008
    Abstract
    Electrocardiogram (ECG) and magnetocardiogram (MCG) signals are among the most considerable sources of noise for other biomedical signals. In some recent works, a Bayesian filtering framework has been proposed for denoising the ECG signals. In this paper, it is shown that this framework may be effectively used for removing cardiac contaminants such as the ECG, MCG and ballistocardiographic artifacts from different biomedical recordings such as the electroencephalogram, electromyogram and also for canceling maternal cardiac signals from fetal ECG/MCG. The proposed method is evaluated on simulated and real signals. © 2008 Institute of Physics and Engineering in Medicine  

    Economic batch quantity with setup time for immediate and delayed rework

    , Article IIE Annual Conference and Expo 2007 - Industrial Engineering's Critical Role in a Flat World, Nashville, TN, 19 May 2007 through 23 May 2007 ; 2007 , Pages 1666-1671 Haji, B ; Haji, R ; Ghayoor, Z ; Sharif University of Technology
    2007
    Abstract
    This paper considers economic batch quantity (EBQ) in a single machine system in which defective items are produced and are all reworked in the same cycle. In the literature of inventory control, when the rework is done in the same cycle, the setup times are not considered; the rework process starts immediately after each production run, and the waiting of defectives for rework is ignored. Considering these points we assume non-zero setup times for rework, delayed rework in the same cycle, and the cost of waiting, to obtain the EBQ for two different cases  

    An assertion-based verification methodology for system-level design

    , Article Computers and Electrical Engineering ; Volume 33, Issue 4 , 2007 , Pages 269-284 ; 00457906 (ISSN) Gharehbaghi, A. M ; Hamdin Yaran, B ; Hessabi, S ; Goudarzi, M ; Sharif University of Technology
    2007
    Abstract
    In this paper, we integrate an assertion-based verification methodology with our object-oriented system-level synthesis methodology to address the problem of HW/SW co-verification. In this direction a system-level assertion language is defined. The system-level assertions can be used to monitor the current state of system or flow of transactions. These assertions are automatically converted to "monitor hardware" or "monitor software" during the system-level synthesis process depending on their type and also synthesis style of their corresponding functions. The synthesized assertions are functionally equivalent to their original system-level assertions, and hence, can be reused to verify the... 

    Reliability assessment of an automated distribution system

    , Article IET Generation, Transmission and Distribution ; Volume 1, Issue 2 , 2007 , Pages 223-233 ; 17518687 (ISSN) Kazemi, S ; Fotuhi Firuzabad, M ; Billinton, R ; Sharif University of Technology
    2007
    Abstract
    Automation can greatly enhance distribution-network reliability by speeding up service restoration and thus significantly reduce customer-outage time. The paper presents an approach to assess quantitatively the adequacy of a particular automated distribution scheme designated as the 'low interruption system' (LIS). Owing to the use of a high-speed communication system and line sensors, this automated scheme can reduce drastically the number of interruptions, the service interruption time and also the area affected by the fault. This scheme provides a simple and cost-effective way to automate distribution systems in which the remotely controlled switches speed up isolation of faulted sections... 

    Semantic composability measure for semantic web services

    , Article 1st Asia International Conference on Modelling and Simulation - Asia Modelling Symposium 2007, AMS 2007, 27 March 2007 through 30 March 2007 ; 2007 , Pages 88-93 ; 0769528457 (ISBN); 9780769528458 (ISBN) Paikari, E ; Habibi, J ; Yeganeh, S. H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2007
    Abstract
    Motivated by the problem of automatically composing network accessible services, such as those on the World Wide Web, this paper proposes an approach to exploit all semantic information available for semantic web services to complete this task. For semantic web services, we propose a prioritized and limited list of other web services, with composability measure value based on feasibility of being succeeding service in a composition to fulfill the request. Due to the fact that in semantic web services, semantic information- all description and signatures- is defined by ontology language, we use some of the mapping rules to estimate a correlation between services for composability. Then we... 

    Drawing CAPTCHA

    , Article ITI 2006: 28th International Conference on Information Technology Interfaces, Cavtat/Dubrovnik, 19 June 2006 through 22 June 2006 ; 2006 , Pages 475-480 ; 13301012 (ISSN); 9537138054 (ISBN); 9789537138059 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    University of Zagreb  2006
    Abstract
    Nowadays, many daily human activities such as education, commerce, talks, etc. are carried out through the Internet. In cases such as the registering in websites, some hackers write programs to make automatic false enrolments which waste the resources of the website while this may even stop the entire website from working. Therefore, it is necessary to tell apart human users from computer programs which is known as CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart). CAPTCHA methods are mainly based on the weak points of OCR (Optical Character Recognition) systems while using them are undesirable to human users and esp. difficult in tools such as PDA's or... 

    Fuzzy trust inference in trust graphs and its application in semantic web social networks

    , Article 2006 World Automation Congress, WAC'06, Budapest, 24 June 2006 through 26 June 2006 ; 2006 ; 1889335339 (ISBN); 9781889335339 (ISBN) Lesani, M ; Bagheri, S ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    People generate information or get it from the others. When one gets information from the others it is important to get it from trusted ones. Each individual in a society can get the information he needs form his trusted friends but there are also many other people in the society that he or she indirectly trusts and can benefit from their information. The idea of benefiting from the indirectly trusted people can well be employed in social networks where finding trusted people can be automated. There should be a feature for users to specify how much they trust a friend and a mechanism to infer the trust in the society trust graph from one user to another that is not directly a friend of the... 

    Multivariable Anesthesia control using reinforcement learning

    , Article 2006 IEEE International Conference on Systems, Man and Cybernetics, Taipei, 8 October 2006 through 11 October 2006 ; Volume 6 , 2006 , Pages 4563-4568 ; 1062922X (ISSN); 1424401003 (ISBN); 9781424401000 (ISBN) Sadati, N ; Aflaki, A ; Jahed, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2006
    Abstract
    The anesthesia community has recently witnessed numerous advances in monitoring of the anesthetic state. This development has spurred a renewed interest in the automation of the clinical anesthesia. The absence of a precise model in biomedical field has motivated the authors to propose a novel approach capable of handling the uncertainties present in the model and moreover, to design a new approach which is subjective and can be adopted to patient specific requirements. In this regard a study has been conducted in this paper, in order to fit the intelligence of fuzzy controllers based on reinforcement learning in this clinical application. This study suggests that the chosen approach fits... 

    Persian/Arabic baffletext CAPTCHA

    , Article Journal of Universal Computer Science ; Volume 12, Issue 12 , 2006 , Pages 1783-1796 ; 0958695X (ISSN) Shirali Shahreza, M. H ; Shirali Shahreza, M ; Sharif University of Technology
    2006
    Abstract
    Nowadays, many daily human activities such as education, trade, talks, etc are done by using the Internet. In such things as registration on Internet web sites, hackers write programs to make automatic false registration that waste the resources of the web sites while it may also stop it from functioning. Therefore, human users should be distinguished from computer programs. To this end, this paper presents a method for distinction of Persian and Arabic-language users from computer programs based on Persian and Arabic texts. Our proposed algorithm is based on adding a background to the image of a meaningless Persian/Arabic randomly generated word. This method relies on the difficulty of... 

    Polynomial reachability witnesses via stellensatze

    , Article 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, PLDI 2021, 20 June 2021 through 25 June 2021 ; 2021 , Pages 772-787 ; 9781450383912 (ISBN) Asadi, A ; Chatterjee, K ; Fu, H ; Kafshdar Goharshady, A ; Mahdavi, M ; Sharif University of Technology
    Association for Computing Machinery  2021
    Abstract
    We consider the fundamental problem of reachability analysis over imperative programs with real variables. Previous works that tackle reachability are either unable to handle programs consisting of general loops (e.g. symbolic execution), or lack completeness guarantees (e.g. abstract interpretation), or are not automated (e.g. incorrectness logic). In contrast, we propose a novel approach for reachability analysis that can handle general and complex loops, is complete, and can be entirely automated for a wide family of programs. Through the notion of Inductive Reachability Witnesses (IRWs), our approach extends ideas from both invariant generation and termination to reachability analysis.... 

    Efficient symmetry reduction for an actor-based model

    , Article 2nd International Conference on Distributed Computing and Internet Technology, ICDCIT 2005, Bhubaneswar, 22 December 2005 through 24 December 2005 ; Volume 3816 LNCS , 2005 , Pages 494-507 ; 03029743 (ISSN); 3540309993 (ISBN); 9783540309994 (ISBN) Jaghoori, M. M ; Sirjani, M ; Mousavi, M. R ; Movaghar, A ; Sharif University of Technology
    2005
    Abstract
    Symmetry reduction is a promising technique for combatting state space explosion in model checking. The problem of finding the equivalence classes, i.e., the so-called orbits, of states under symmetry is a difficult problem known to be as hard as graph isomorphism. In this paper, we show how we can automatically find the orbits in an actor-based model, called Rebeca, without enforcing any restriction on the modeler. The proposed algorithm solves the orbit problem for Rebeca models in polynomial time. As a result, the simple actor-based Rebeca language can be utilized efficiently for modeling and verification of systems, without involving the modeler with the details of the verification... 

    A robust page segmentation method for Persian/Arabic documents

    , Article WSEAS Transactions on Computers ; Volume 4, Issue 11 , 2005 , Pages 1692-1698 ; 11092750 (ISSN) Shirali Shahreza, M. H ; Shirali Shahreza, S ; Sharif University of Technology
    2005
    Abstract
    Optical Character Recognition (OCR) softwares are widely used in the office automation systems. One of the first steps in the recognition of the documents is to segment the input image. Various methods have been offered for the English language. For the Persian/Arabic Language, however, no complete method has been found yet. In this paper we present a new page segmentation method for Persian/Arabic printed texts. This method has been inspired by the effect of the spreading of ink on paper. One of the most important characteristics of this method is its non-sensitivity to rotation  

    H-adaptive mesh refinement for shear band localization in elasto-plasticity Cosserat continuum

    , Article Communications in Nonlinear Science and Numerical Simulation ; Volume 10, Issue 3 , 2005 , Pages 253-286 ; 10075704 (ISSN) Khoei, A. R ; Tabarraie, A. R ; Gharehbaghi, S. A ; Sharif University of Technology
    2005
    Abstract
    In this paper, an h-adaptive mesh refinement is presented based on the gradient of deformation in the modeling of localization due to material instability. As the classical continuum models suffer from pathological mesh dependence in the strain-softening models, the governing equations are regularized by adding rotational degrees-of-freedom to the conventional degrees-of-freedom. Adaptive strategy using element elongation is applied to compute the distribution of required element size using the estimated error distribution. Once the new element size and its alignment have been indicated, an automated procedure is used to construct the mesh according to a predetermined size and elongation...