Loading...
Search for: complexation
0.02 seconds
Total 1204 records

    An approximation algorithm for computing the visibility region of a point on a terrain and visibility testing

    , Article VISAPP 2014 - Proceedings of the 9th International Conference on Computer Vision Theory and Applications ; Vol. 3, issue , January , 2014 , p. 699-704 Alipour, S ; Ghodsi, M ; Gudukbay, U ; Golkari, M ; Sharif University of Technology
    Abstract
    Given a terrain and a query point p on or above it, we want to count the number of triangles of terrain that are visible from p. We present an approximation algorithm to solve this problem. We implement the algorithm and then we run it on the real data sets. The experimental results show that our approximation solution is very close to the real solution and compare to the other similar works, the running time of our algorithm is better than their algorithm. The analysis of time complexity of algorithm is also presented. Also, we consider visibility testing problem, where the goal is to test whether p and a given triangle of train are visible or not. We propose an algorithm for this problem... 

    An architectural view to computer integrated manufacturing systems based onaxiomatic design theory

    , Article Computers in Industry ; Volume 100 , 2018 , Pages 96-114 ; 01663615 (ISSN) Delaram, J ; Fatahi Valilai, O ; Sharif University of Technology
    Abstract
    The emergence of the globalization paradigm in manufacturing industry has changed the markets’ circumstances, and accordingly manufacturing systems need to be compatibilized with these situations. There are many solutions to assist manufacturing systems for this purpose. Computerized systems and their related solutions were being the most attractive ones for manufacturing systems in recent decade. Developing such systems and exploiting from the advantages of such solutions requires a consistent foundation. Computer Integrated Manufacturing (CIM) emerged as a philosophy to provide such foundation, and to assist the computerized manufacturing solutions. Despite of the high potentials of the... 

    An aspect enhanced method of NFR modeling in software architecture

    , Article 10th International Conference on Information Technology, ICIT 2007, Rourkela, 17 December 2007 through 20 December 2007 ; 2007 , Pages 240-242 ; 0769530680 (ISBN); 9780769530680 (ISBN) Bagheri, H ; Mirian Hosseinabadi, H ; Chiniforooshan Esfahani, H ; Sharif University of Technology
    2007
    Abstract
    Existence of crosscutting concerns in software requirements often intensifies complexity of software development process. Modeling and analyzing of these concerns in the software architecture decrease possibility of finding tangled and complex components in the ultimate design. Aspect oriented ADLs have emerged to overcome this problem; however, imposing radical changes to existing architectural modeling methods is not easily acceptable by architects. In this paper, we present a method to enhance conventional software architecture description languages through utilization of aspect features with special focuses on non-functional requirements (NFRs). © 2007 IEEE  

    An asynchronous dynamic Bayesian network for activity recognition in an ambient intelligent environment

    , Article ICPCA10 - 5th International Conference on Pervasive Computing and Applications, 1 December 2010 through 3 December 2010 ; December , 2010 , Pages 20-25 ; 9781424491421 (ISBN) Mirarmandehi, N ; Rabiee, H. R ; Sharif University of Technology
    2010
    Abstract
    Ambient Intelligence is the future of computing where devices predict what users need and help them carry out their everyday life activities easier. To make this prediction possible these environments should be aware of the context. Activity recognition is one of the most complex problems in context-aware environments. In this paper we propose a layered Dynamic Bayesian Network (DBN) to recognize activities in an oral presentation. The layered architecture gives us the opportunity to recognize complex activities using the classification results of sensory data in the first layer regardless of the physical environment. Our model is event-driven meaning the classification takes place only when... 

    An effective approach for dynamic analysis of rovers

    , Article Robotica ; Volume 23, Issue 6 , 2005 , Pages 771-780 ; 02635747 (ISSN) Meghdari, A ; Karimi, R ; Pishkenari, H. N ; Gaskarimahalle, A. L ; Mahboobi, S. H ; Sharif University of Technology
    2005
    Abstract
    In this paper a novel approach to dynamic formulation of rovers has been presented. The complexity of these multi-body systems especially on rough terrain, challenged us to use the Kane's method which has been preferred to others in these cases. As an example, symbolic equations of a six-wheeled rover, named CEDRA Rescue Robot which uses a shrimp like mechanism, have been derived and a simulation of forward and inverse dynamics has been presented. Due to the clear form of equations, each term defines a physical meaning which represents the effect of each parameter, resulting in a frame-work for performance comparison of rovers. Although the method has been described for a 2-D non-slipping... 

    An efficient algorithm for the multi-state two separate minimal paths reliability problem with budget constraint

    , Article Reliability Engineering and System Safety ; Volume 142 , October , 2015 , Pages 472-481 ; 09518320 (ISSN) Forghani Elahabad, M ; Mahdavi Amiri, N ; Sharif University of Technology
    Elsevier Ltd  2015
    Abstract
    Abstract Several researchers have worked on transmitting a given amount of flow through a network flow within fastest possible time, allowing flow to be transmitted through one or more paths. Extending this problem to the system reliability problem, the quickest path reliability problem has been introduced. The problem evaluates the probability of transmitting some given amount of flow from a source node to a sink node through a single minimal path in a stochastic-flow network within some specified units of time. Later, the problem has been extended to allow flow to be transmitted through two or more separate minimal paths (SMPs). Here, we consider the problem of sending flow through two... 

    An efficient and provably-secure coercion-resistant e-voting protocol

    , Article 2013 11th Annual Conference on Privacy, Security and Trust, PST 2013 ; 2013 , Pages 161-168 ; 9781467358392 (ISBN) Haghighat, A. T ; Dousti, M. S ; Jalili, R ; Sharif University of Technology
    2013
    Abstract
    We present an efficient and provably-secure e-voting protocol, which is a variant of the JCJ e-votingprotocol (Juels et al., 2010). It decreases the total number of JCJ's operations from O(n2) to O(n), where n is the number of votes or voters (whichever is the maximum). Note that since the operations under consideration are time-consuming (e.g., public-key encryption), the improvement is quite substantial. As a rough comparison, consider a nation-wide election with around ten million voters/votes. Assuming each operation takes one microsecond, and no parallelization is used, one can see a huge difference: our protocol tallies the votes in 10 seconds, while the JCJ protocol requires over 3... 

    An efficient down-sampling method for multiresolution image completion

    , Article 2011 7th Iranian Conference on Machine Vision and Image Processing, MVIP 2011 - Proceedings ; 2011 ; 9781457715358 (ISBN) Shariatzadeh, S. M ; Kasaei, S ; Mahdavi Amiri, N ; Sharif University of Technology
    Abstract
    Image completion is an active subject in image and video processing, which deals with recovering the missing or removed parts of a given 2-D or 3-D data. Here, we present a method to efficiently build the multiresolution pyramid for a partially-missing image, by which, multiresolution image completion can be efficiently initialized and performed. Using this approach, we improve our previous algorithm for multiresolution image completion, especially when the inputs suffer spread missing areas. In comparison with the overall process of image completion, the computational and space complexity of the proposed method for building multiresolution pyramid is eligible. The obtained results of our... 

    An efficient intra prediction mode decision algorithm for H.263 to H.264 transcoding

    , Article IEEE International Conference on Computer Systems and Applications, 2006, Sharjah, 8 March 2006 through 8 March 2006 ; Volume 2006 , 2006 , Pages 1082-1089 ; 1424402123 (ISBN); 9781424402120 (ISBN) Jafari, M ; Kasaei, S ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    Video transcoding comprises the necessary operations for the conversion of a compressed video stream from one syntax to another one for inter-network communications, without the need of any further decoding and re-encoding process. The two most recent and popular standard video coders are H.263 and H.264. In this paper, we present tools to enable low complexity intra transcoding from H.263 to H.264 using a novel fast intra prediction mode decision algorithm that does not require extra computation. It is shown that due to basic similarities of H.263 and H.264 it is possible to reuse predictor side information, so this side information is used to simplify the mode and direction decision for... 

    An efficient Jacobi-like Deflationary ICA algorithm: Application to EEG denoising

    , Article IEEE Signal Processing Letters ; Volume 22, Issue 8 , December , 2015 , Pages 1198-1202 ; 10709908 (ISSN) Sardouie, S. H ; Albera, L ; Shamsollahi, M. B ; Merlet, I ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    In this paper, we propose a Jacobi-like Deflationary ICA algorithm, named JDICA. More particularly, while a projection-based deflation scheme inspired by Delfosse and Loubaton's ICA technique (DelLR) is used, a Jacobi-like optimization strategy is proposed in order to maximize a fourth order cumulant-based contrast built from whitened observations. Experimental results obtained from simulated epileptic EEG data mixed with a real muscular activity and from the comparison in terms of performance and numerical complexity with the FastICA, RobustICA and DelLR algorithms, show that the proposed algorithm offers the best trade-off between performance and numerical complexity when a low number (∼... 

    An efficient lossless medical image transformation method by improving prediction model

    , Article International Conference on Signal Processing Proceedings, ICSP, 24 October 2010 through 28 October 2010 ; 2010 , Pages 728-731 ; 9781424458981 (ISBN) Sepehrband, F ; Mortazavi, M ; Ghorshi, S ; IEEE Beijing Section; The Chinese Institute of Electronics (CIE); The Institution of Engineering and Technology (IET); Union Radio Scientifique Internationale (URSI); National Natural Science Foundation of China ; Sharif University of Technology
    Abstract
    Medical images include human body picture and it is used in diagnosis purpose [1]. Lossless compression of medical image is an application of medical imaging. During lossless compression task, transformation algorithm can be used to increase compression ratio. In Real time applications such as telemedicine and online diagnosis, hardware implementation accelerates the process. Hence, for such purposes medical compression is better to be simple. Lossless JPEG and JPEG2000 are some compression method. JPEG2000 gives better compression ratio. However, it is complex. In this paper an efficient method of lossless image transformation has been introduced by improving prediction model. Simulation... 

    An efficient power-aware VM allocation mechanism in cloud data centers: a micro genetic-based approach

    , Article Cluster Computing ; 2020 Tarahomi, M ; Izadi, M ; Ghobaei Arani, M ; Sharif University of Technology
    Springer  2020
    Abstract
    Efficiency in cloud servers’ power consumption is of paramount importance. Power efficiency makes the reduction in greenhouse gases establishing the concept of green computing. One of the beneficial ways is to apply power-aware methods to decide where to allocate virtual machines (VMs) in data center physical resources. Virtualization is utilized as a promising technology for power-aware VM allocation methods. Since the VM allocation is an NP-complete problem, we use of evolutionary algorithms to solve it. This paper presents an effective micro-genetic algorithm in order to choose suitable destinations between physical hosts for VMs. Our evaluations in simulation environment show that... 

    An efficient statistical zero-knowledge authentication protocol for smart cards

    , Article International Journal of Computer Mathematics ; Volume 93, Issue 3 , 2016 , Pages 453-481 ; 00207160 (ISSN) Dousti, M.S ; Jalili, R ; Sharif University of Technology
    Taylor and Francis Ltd  2016
    Abstract
    We construct an efficient statistical zero-knowledge authentication protocol for smart cards based on general assumptions. We show how it can be instantiated using lattice-based primitives, which are conjectured to be secure against quantum attacks. We illustrate the practicality of our protocol on smart cards in terms of storage, computation, communication, and round complexities. Furthermore, we compare it to other lattice-based authentication protocols, which are either zero-knowledge or have a similar structure. The comparison shows that our protocol improves the best previous protocol in several aspects  

    An efficient VLSI architecture of QPP interleaver/deinterleaver for LTE turbo coding

    , Article Proceedings - IEEE International Symposium on Circuits and Systems ; 2013 , Pages 797-800 ; 02714310 (ISSN) ; 9781467357609 (ISBN) Ardakani, A ; Mahdavi, M ; Shabany, M ; Sharif University of Technology
    2013
    Abstract
    Long Term Evolution (LTE) supports peak data rates in excess of 300 Mb/s. A good approach to achieve such rates is by parallelizing the required processing in turbo decoders. An interleaver is an important part of a turbo decoder. LTE uses the Quadratic Permutation Polynomial (QPP) interleaver, which makes it suitable for parallel decoding. In this paper, we propose an efficient architecture for the QPP interleaver, called the Add-Compare-Select (ACS) permuting network. A unique feature of the proposed architecture is that it can be used both as the interleaver and deinterleaver leading to a high-speed low-complexity hardware interleaver/deinterleaver for turbo decoding. The proposed design... 

    An electrochemical study of Au-Ni alloy electrodeposition from cyanide-citrate electrolytes

    , Article Journal of Electroanalytical Chemistry ; Volume 577, Issue 1 , 2005 , Pages 1-8 ; 15726657 (ISSN) Dolati, A ; Ghorbani, M ; Ahmadi, M. R ; Sharif University of Technology
    Elsevier  2005
    Abstract
    Cyclic voltammetry, j-t transients and transient time measurements have been used to characterize the Au-Ni alloy deposition and to obtain the nucleation and growth mechanism. The electrodeposition of gold, nickel and gold-nickel alloys was studied in cyanide-citrate electrolytes. The analysis of the voltammograms and j-t transients clearly shows that deposition of the Au and hence, of Au-Ni alloys, is affected by adsorbed cyanide ligands mainly at low overpotentials and a direct reduction occurs at high overpotentials. In this case, the Au deposition is kinetically favored, while the Ni deposition is controlled by the cyanide-citrate adsorbed adlayer. In an alloy electrolyte, the Au and Ni... 

    An enhanced neural network model for predictive control of granule quality characteristics

    , Article Scientia Iranica ; Volume 18, Issue 3 E , 2011 , Pages 722-730 ; 10263098 (ISSN) Neshat, N ; Mahloojifl, H ; Kazemi, A ; Sharif University of Technology
    2011
    Abstract
    An integrated approach is presented for predicting granule particle size using Partial Correlation (PC) analysis and Artificial Neural Networks (ANNs). In this approach, the proposed model is an abstract form from the ANN model, which intends to reduce model complexity via reducing the dimension of the input set and consequently improving the generalization capability of the model. This study involves comparing the capability of the proposed model in predicting granule particle size with those obtained from ANN and Multi Linear Regression models, with respect to some indicators. The numerical results confirm the superiority of the proposed model over the others in the prediction of granule... 

    A network model for vehicular Ad hoc networks: an introduction to obligatory attachment rule

    , Article IEEE Transactions on Network Science and Engineering ; Volume 3, Issue 2 , 2016 , Pages 82-94 ; 23274697 (ISSN) Ghafourian Ghahramani, S. A. A ; Hemmatyar, A. M. A ; Kavousi, K ; Sharif University of Technology
    Abstract
    In the past few years, the study of complex networks has attracted the attention of researchers. Many real networks, ranging from technological networks such as the Internet to biological networks, have been considered as special types of complex networks. Through application of the network science, important structural properties of such networks have been analyzed and the mechanisms that form such characteristics have been introduced. In this paper, we address the structural characteristics of a technological network called Vehicular Ad hoc Networks (VANETs). Recent studies reveal that the communication graph of VANETs has some interesting characteristics including: the Gaussian degree... 

    A new algorithm for generating all minimal vectors for the q SMPs reliability problem with time and budget constraints

    , Article IEEE Transactions on Reliability ; Volume 65, Issue 2 , 2016 , Pages 828-842 ; 00189529 (ISSN) Forghani Elahabad, M ; Mahdavi Amiri, N ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    The quickest path reliability problem evaluates the probability of transmitting some given units of flow from a source node to a sink node through a single minimal path in a stochastic-flow network within some specified units of time. This problem has been recently extended to the case of transmitting flow through q separate minimal paths (SMPs) simultaneously within a budget constraint. Here, we propose a new algorithm to solve such problems. The algorithm finds all the minimal vectors for which a given demand level d units of flow can be transmitted through q SMPs from a source node to a sink node satisfying some given time and budget limits. In our proposed algorithm, a special... 

    A new and highly effective method for catalytic oxidation of alcohols to the corresponding carbonyl compounds using the tris[(2-oxazolinyl)phenolato] manganese(III)/Oxone®/n-Bu4NBr oxidation system

    , Article Tetrahedron Letters ; Volume 44, Issue 50 , 2003 , Pages 8943-8945 ; 00404039 (ISSN) Bagherzadeh, M ; Sharif University of Technology
    Elsevier Ltd  2003
    Abstract
    Oxone® (2KHSO5·KHSO4·K 2SO4) in the presence of mer-tris[(2-oxazolinyl)phenolato] manganese(III), Mn(phox)3, as catalyst under biphasic reaction conditions (CH2Cl2/H2O) and tetra-n-butylammonium bromide as phase transfer agent efficiently oxidises alcohols to their corresponding aldehydes and ketones at room temperature with very short reaction times (5 min) and good to quantitative yields. © 2003 Elsevier Ltd. All rights reserved  

    A new approach to fast decode quasi-orthogonal space-time block codes

    , Article IEEE Transactions on Wireless Communications ; Volume 14, Issue 1 , 2015 , Pages 165-176 ; 15361276 (ISSN) Ahmadi, A ; Talebi, S ; Shahabinejad, M ; Sharif University of Technology
    Abstract
    Motivated by the statistical correspondence between phases of the transmitted and received vectors, we present a fast decoding method for quasi-orthogonal space-time block codes (QOSTBCs) in this paper. The proposed decoder selects proper candidates from precomputed and sorted sets by focusing on the phase of a specific entry of the combined and decoupled vector. The ML metric of the most probable candidates is first evaluated, and then, the remaining candidates are assessed based on the similarity between the phases. The new algorithm can work with any type of constellation such as QAM and PSK and supports generalized block-diagonal QOSTBCs. Theoretical results backed by simulation tests...