Loading...
Search for: computer-science
0.015 seconds
Total 125 records

    Effective page recommendation algorithms based on distributed learning automata

    , Article 4th International Multi-Conference on Computing in the Global Information Technology, ICCGI 2009, 23 August 2009 through 29 August 2009, Cannes, La Bocca ; 2009 , Pages 41-46 ; 9780769537511 (ISBN) Forsati, R ; Rahbar, A ; Mahdavi, M ; Sharif University of Technology
    Abstract
    Different efforts have been done to address the problem of information overload on the Internet. Recommender systems aim at directing users through this information space, toward the resources that best meet their needs and interests by extracting knowledge from the previous users' interactions. In this paper, we propose an algorithm to solve the web page recommendation problem. In our algorithm, we use distributed learning automata to learn the behavior of previous users' and recommend pages to the current user based on learned pattern. Our experiments on real data set show that the proposed algorithm performs better than the other algorithms that we compared to and, at the same time, it is... 

    DotGrid: A .NET-based cross-platform grid computing infrastructure

    , Article 2006 International Conference on Computing and Informatics, ICOCI '06, Kuala Lumpur, 6 June 2006 through 8 June 2006 ; 2006 ; 1424402204 (ISBN); 9781424402205 (ISBN) Haj Abutalebi, A ; Poshtkuhi, A ; Ayough, L. M ; Hessabi, S ; Sharif University of Technology
    2006
    Abstract
    Recently, Grid infrastructures have provided wide integrated use of resources. DotGrid intends to introduce required Grid services and toolkits that are implemented as a layer wrapped over the existing operating systems. Our DotGrid has been developed based on Microsoft .NET in Windows and MONO .NET in Linux and UNIX. Using DotGrid APls, Grid middlewares and applications can be implemented easily. We evaluated DotGrid capabilities by implementing some applications including a high throughput file transfer and solving a typical computational problem. ©2006 IEEE  

    Distributed Primary and secondary power sharing in a droop-controlled lvdc microgrid with merged AC and DC characteristics

    , Article IEEE Transactions on Smart Grid ; Volume 9, Issue 3 , 2018 , Pages 2284-2294 ; 19493053 (ISSN) Peyghami, S ; Mokhtari, H ; Loh, P. C ; Davari, P ; Blaabjerg, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    In an ac microgrid, a common frequency exists for coordinating active power sharing among droop-controlled sources. A common frequency is absent in a dc microgrid, leaving only the dc source voltages for coordinating active power sharing. That causes sharing error and poorer voltage regulation in dc microgrids, which in most cases, are solved by a secondary control layer reinforced by an extensive communication network. To avoid such an infrastructure and its accompanied complications, this paper proposes an alternative droop scheme for low-voltage dc microgrid with both primary power sharing and secondary voltage regulation merged. The main idea is to introduce a non-zero unifying frequency... 

    Directing the search in the fast forward planning

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 857-861 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Akramifar, A ; Ghassem Sani, G. R ; Sharif University of Technology
    2008
    Abstract
    In this paper, we introduce DiFF, a novel extension of the Fast Forward (FF) planning system. FF is a domain independent planner that employs a forward heuristic search. Its search strategy is an enforced form of hill climbing. In order to move to a more promising state, FF evaluates successor states without any particular order. In this paper, we introduce a new form of the enforced hill climbing, which we call directed enforced hill climbing, to enhance the efficiency of Fast Forward planning. This strategy evaluates successor states in the order recommended by an adaptive heuristic function. Our experimental results in several planning domains show a significant improvement in the... 

    Defining interval for threshold in new thinning scheme

    , Article Proceedings - 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010, 9 July 2010 through 11 July 2010 ; Volume 6 , July , 2010 , Pages 108-112 ; 9781424455386 (ISBN) Firouzi, Z ; Mortazavi Far, L ; Sharif University of Technology
    2010
    Abstract
    Call admission control schemes are crucially Important concepts ID researches on cellular mobile networks. One of them is the new thinning scheme. In this study we define a confidence interval for threshold and the numerical results show the performance of the scheme in defined interval. Also we discuss the sensitivity of the scheme (in sample-based sensitivity method) at different thresholds. The results show the better performance in confidence thresholds and sensitivity of scheme into variations of thresholds  

    Control of vibration suppression of a smart beam by pizoelectric elements

    , Article 2nd International Conference on Environmental and Computer Science, ICECS 2009, 28 December 2009 through 30 December 2009, Dubai ; 2009 , Pages 165-169 ; 9780769539379 (ISBN) Azizi, A ; Durali, L ; Rad, F. P ; Zareie, S ; Sharif University of Technology
    Abstract
    Vibration control is an essential problem in different structure. Smart material can make a structure smart, adaptive and self-controlling so they are effective in active vibration control. Piezoelectric elements can be used as sensors and actuators in flexible structures for sensing and actuating purposes. In this paper we use PZT elements as sensors and actuator to control the vibration of a cantilever beam. Also we study the effect of different types of controller on vibration. © 2009 IEEE  

    Challenges in using peer-to-peer structures in order to design a large-scale web search engine

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 461-468 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Mousavi, H ; Movaghar, A ; Sharif University of Technology
    2008
    Abstract
    One of the distributed solutions for scaling Web Search Engines (WSEs) may be peer-to-peer (P2P) structures. P2P structures are successfully being used in many systems with lower cost than ordinary distributed solutions. However, the fact that they can also be beneficial for large-scale WSEs is still a controversial subject. In this paper, we introduce challenges in using P2P structures to design a large-scale WSE. Considering different types of P2P systems, we introduce possible P2P models for this purpose. Using some quantitative evaluation, we compare these models from different aspects to find out which one is the best in order to construct a large-scale WSE. Our studies indicate that... 

    CEBAC: A decentralized cooperation enforcement based access control framework in MANETs

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 427-434 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Saremi, F ; Mashayekhi, H ; Movaghar, A ; Jalili, R ; Sharif University of Technology
    2008
    Abstract
    Prevention of unauthorized access to services in mobile ad hoc networks is a more sophisticated problem than access control in other networks, due to interconnection facilities and lack of any fixed network infrastructure in such networks. Therefore regarding the nature of these networks, controlling access to services should be in a decentralized manner providing good performance and preserving network security. In this paper, we propose a decentralized Cooperation Enforcement Based Access Control (CEBAC) framework for mobile ad hoc networks. CEBAC comprises several groups of Service Authorizers, each issuing Credentials for access to a specific kind of services. The User Authorization for... 

    Caspian: A tunable performance model for multi-core systems

    , Article 14th International Euro-Par Conference, Euro-Par 2008, Las Palmas de Gran Canaria, 26 August 2008 through 29 August 2008 ; Volume 5168 LNCS , 2008 , Pages 100-109 ; 03029743 (ISSN) ; 3540854509 (ISBN); 9783540854500 (ISBN) Kiasari, A. E ; Sarbazi Azad, H ; Hessabi, S ; Sharif University of Technology
    2008
    Abstract
    Performance evaluation is an important engineering tool that provides valuable feedback on design choices in the implementation of multi-core systems such as parallel systems, multicomputers, and Systems-on-Chip (SoCs). The significant advantage of analytical models over simulation is that they can be used to obtain performance results for large systems under different configurations and working conditions which may not be feasible to study using simulation on conventional computers due to the excessive computation demands. We present Caspian, a novel analytic performance model, aimed to minimize prediction cost, while providing prediction accuracy. This is accomplished by using a G/G/1... 

    Bandwidth-delay constrained least cost multicast routing for multimedia communication

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 737-740 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Mahdavi, M ; Forsati, R ; Movaghar, A ; Sharif University of Technology
    2008
    Abstract
    A new meta-heuristic algorithm is proposed for constructing multicast trees in real-time multimedia applications such that satisfies two important Quality of Service (QoS) constraints. The QoS based multicast routing problem is a known NP-complete problem that depends on (1) bounded end-to-end delay and link bandwidth along the paths from the source to each destination, and (2) minimum cost of the multicast tree. We evaluate the performance and efficiency of the proposed method with a modified version of the BSMA algorithm which is the best known deterministic heuristic algorithm to delay-constrained multicast problem. Simulation results reveal that the proposed algorithm can achieve a... 

    A voronoi-based reactive approach for mobile robot navigation

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 901-904 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Mohammadi, S ; Hazar, N ; Sharif University of Technology
    2008
    Abstract
    Robot navigation is a challenging problem in robotics, which involves determining of robot positioning relative to objects in the environment, and also the mobility of robot through obstacles without colliding into them. The former is known as localization, while the latter is called motion planning. This paper introduces a roadmap method for solving motion planning problem in a dynamic environment based on Generalized Voronoi Diagram (GVD). The efficiency of the proceeding work is verified by examining it in a sample home environment. © 2008 Springer-Verlag  

    Automatic noise recognition based on neural network using LPC and MFCC feature parameters

    , Article 2012 Federated Conference on Computer Science and Information Systems, FedCSIS 2012, 9 September 2012 through 12 September 2012 ; 2012 , Pages 69-73 ; 9781467307086 (ISBN) Haghmaram, R ; Aroudi, A ; Ghezel, M. H ; Veisi, H ; Sharif University of Technology
    2012
    Abstract
    This paper studies the automatic noise recognition problem based on RBF and MLP neural networks classifiers using linear predictive and Mel-frequency cepstral coefficients (LPC and MFCC). We first briefly review the architecture of each network as automatic noise recognition (ANR) approach, then, compare them to each other and investigate factors and criteria that influence final recognition performance. The proposed networks are evaluated on 15 stationary and non-stationary types of noises with frame length of 20 ms in term of correct classification rate. The results demonstrate that the MLP network using LPCs is a precise ANR with accuracy rate of 99.9%, while the RBF network with MFCCs... 

    Automatic checking of eligibility in electronic voting protocolsusing mCRL2

    , Article 2011 CSI International Symposium on Computer Science and Software Engineering, CSSE 2011, 15 June 2011 through 16 June 2011 ; June , 2011 , Pages 62-68 ; 9781612842073 (ISBN) Haghighat, M. H ; Mahrooghi, H. R ; Jalili, R ; Sharif University of Technology
    2011
    Abstract
    Eligibility is one of the important security properties which must be satisfied in electronic voting systems. This property refers to legitimacy of voters and their right to vote only once. Due to insufficiency of an observational analysis to guarantee this property, formal methods are recently used to build trust on sensitive systems such as e-voting for all the involved parties. This paper reports our attempt to automatically check the eligibility property in electronic voting systems using the model checking approach. ThemCRL2 language and its toolset are also used to achieve such a checking. Two protocols, FOO92 and Lee&Kim, are modeled as case studies  

    A UC-secure authenticated contributory group key exchange protocol based on discrete logarithm

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 8303 LNCS , December , 2013 , Pages 390-401 ; 03029743 (ISSN); 9783642452031 (ISBN) Sobhdel, Y ; Jalili, R ; Sharif University of Technology
    2013
    Abstract
    Authenticated key exchange protocols allow parties to establish a common session key which in turn is fundamental to building secure channels. Authenticated group key exchange protocols allow parties to interact with each other and establish a common group session key and avoid peer to peer key exchange; in other words they pave the way to build a broadcast channel. We construct an authenticated group key exchange protocol over UC framework which has the contributiveness property; i.e., the output is not biased by inputs of any party. Our protocol uses CRS model and discrete logarithm. Other protocols over UC framework either are defined over RO model [19] or benefit from a non-standard... 

    A temporal semantic-based access control model

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 559-568 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Noorollahi Ravari, A ; Amini, M ; Jalili, R ; Sharif University of Technology
    2008
    Abstract
    With the advent of semantic technology, access control cannot be done in a safe way unless the access decision takes into account the semantic relationships between entities in a semantic-aware environment. SBAC model considers this issue in the decision making process. However, time plays a crucial role in new computing environments which is not supported in this model. In this paper we introduce temporal semantic based access control model (TSBAC), as an extension of SBAC model, which enhances the specification of user-defined authorization rules by constraining time interval and temporal expression over users' history of accesses. A formal semantics for temporal authorizations is provided... 

    A survey of syntax and semantics frameworks of modeling languages

    , Article Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009 ; 2009 ; 9781424449460 (ISBN) Kamandi, A ; Habibi, J ; Sharif University of Technology
    Abstract
    Modeling languages as programming languages need precise and unambiguous semantics to be used appropriately, the formal semantics is significant for designing CASE tools and model verification. Several approaches have been used throughout these years to describe the semantics of modeling languages, but in spite of programming languages, these semantics frameworks are not used in large scale for modeling languages. This paper reviews the history of developments on semantics frameworks for modeling languages. © 2009 IEEE  

    A semantic aware access control model with real time constraints on history of accesses

    , Article Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT 2008, 20 October 2008 through 22 October 2008, Wisla ; Volume 3 , 2008 , Pages 827-836 ; 9788360810149 (ISBN); 9788360810149 (ISBN) Noorollahi Ravari, A ; Amini, M ; Jalili, R ; Sharif University of Technology
    2008
    Abstract
    With the advent of semantic technology, access control cannot be done in a safe way unless the access decision takes into account the semantic relationships among the entities in a semantic-aware environment. SBAC model considers this issue in its decision making process. However, time plays a crucial role in new computing environments which is not supported in the model. In this paper we introduce the Temporal Semantic Based Access Control model (TSBAC), as an extension of SBAC, which enhances the specification of user-defined authorization rules by constraining time interval and temporal expression over users' history of accesses. A formal semantics for temporal authorizations is provided... 

    A robust and efficient SIP authentication scheme

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 551-558 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Mohammadi Nodooshan, A ; Darmani, Y ; Jalili, R ; Nourani, M ; Sharif University of Technology
    2008
    Abstract
    Apart from its security, an SIP (Session Initiation Protocol) authentication protocol shall be efficient; because in order to replace traditional telephony, VoIP services have to offer enough security and QoS compared to PSTN services. Recently, Srinivasan et al. proposed an efficient SIP authentication scheme. The low delay overhead introduced by their scheme, causes the total call setup time to be well within the acceptable limit recommended by ITU-T. Based on their work, this paper proposes an SIP authentication scheme. In both schemes, the end users are authenticated with the proxy server in their domain using the registrar server. Comparing with the Srinivasan et al.'s scheme, our... 

    Architectural styles as a guide for software architecture reconstruction

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 985-989 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Khodamoradi, K ; Habibi, J ; Kamandi, A ; Sharif University of Technology
    2008
    Abstract
    Much effort has been put in defining methods, techniques, and tools for software architecture reconstruction (SAR) Software Architecture Transformation (SAT), and Software Architecture-based Development, but much less attention has been paid to what lies at the heart of architecture-based development, software architectural styles. We argue that architecture-based software development could be much more productive if centered around the concept of software architecture styles, hence the need for style recovery in the process of software architecture reconstruction. The reason behind this is generally. Furthermore, with the coherence architectural styles can bring to the process of automated... 

    Approximation behavior of Van der Pol equation: Large and small nonlinearity parameter

    , Article IMECS 2011 - International MultiConference of Engineers and Computer Scientists 2011, 16 March 2011 through 18 March 2011 ; Volume 2 , March , 2011 , Pages 1539-1544 ; 9789881925121 (ISBN) Azarkhalili, B ; Moghadas, P ; Rasouli, M ; Sharif University of Technology
    2011
    Abstract
    The labels mathematician, engineer, and physicist have all been used in reference to Balthazar van der Pol. The van der Pol oscillator, which we study in this paper, is a model developed by him to describe the behavior of nonlinear vacuum tube circuits in the relatively early days of the development of electronics technology. Our study in this paper will be based entirely on numerical solutions. The rigorous foundations for the analysis (e.g., the proof that the equation has a limit cycle solution which is a global attractor) date back to the work of Lienard in 1928, with later more general analysis by Levinson and others