Loading...
Search for: database
0.013 seconds
Total 189 records

    Heteroscedastic multilinear discriminant analysis for face recognition

    , Article Proceedings - International Conference on Pattern Recognition, 23 August 2010 through 26 August 2010, Istanbul ; 2010 , Pages 4287-4290 ; 10514651 (ISSN) ; 9780769541099 (ISBN) Safayani, M ; Manzuri Shalmani, M. T ; Sharif University of Technology
    2010
    Abstract
    There is a growing attention in subspace learning using tensor-based approaches in high dimensional spaces. In this paper we first indicate that these methods suffer from the Heteroscedastic problem and then propose a new approach called Heteroscedastic Multilinear Discriminant Analysis (HMDA). Our method can solve this problem by utilizing the pairwise chernoff distance between every pair of clusters with the same index in different classes. We also show that our method is a general form of Multilinear Discriminant Analysis (MDA) approach. Experimental results on CMU-PIE, AR and AT&T face databases demonstrate that the proposed method always perform better than MDA in term of classification... 

    Automatic access control based on face and hand biometrics in a non-cooperative context

    , Article Proceedings - 2018 IEEE Winter Conference on Applications of Computer Vision Workshops, WACVW 2018 ; Volume 2018-January , 2018 , Pages 28-36 ; 9781538651889 (ISBN) Sabet Jahromi, M. N ; Bonderup, M. B ; Asadi Aghbolaghi, M ; Avots, E ; Nasrollahi, K ; Escalera, S ; Kasaei, S ; Moeslund, T. B ; Anbarjafari, G ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Automatic access control systems (ACS) based on the human biometrics or physical tokens are widely employed in public and private areas. Yet these systems, in their conventional forms, are restricted to active interaction from the users. In scenarios where users are not cooperating with the system, these systems are challenged. Failure in cooperation with the biometric systems might be intentional or because the users are incapable of handling the interaction procedure with the biometric system or simply forget to cooperate with it, due to for example, illness like dementia. This work introduces a challenging bimodal database, including face and hand information of the users when they... 

    Assessment of modal transportation sustainability: Application of data envelopment and concordance analyses

    , Article Iranian Journal of Science and Technology, Transaction B: Engineering ; Volume 31, Issue 2 , 2007 , Pages 179-193 ; 03601307 (ISSN) Rassafi, A. A ; Vaziri, M ; Sharif University of Technology
    2007
    Abstract
    This study tries to characterize national transportation modes to assess balancing and sustainability. Using a pioneer measure for sustainable development (SD), and based on the conformity of the growths of all sectors with transportation modes, the countries are comparatively studied. The proposed measure, elasticity, for each pair of variables indicates the extent to which the two variables have been changing consistently. Indeed the elasticity values are measures of "harmonic development" reflecting sustainability. The study database consisted of key aspects of transportation sustainability in the form of national variables including transportation, economic, social and environmental... 

    DotGrid: A.NET-based infrastructure for global Grid computing

    , Article 6th IEEE International Symposium on Cluster Computing and the Grid, 2006. CCGRID 06, 16 May 2006 through 19 May 2006 ; 2006 ; 0769525857 (ISBN); 9780769525853 (ISBN) Poshtkuhi, A ; Abutalebi, A. H ; Ayough, L. M ; Hessabi, S ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    Recently, Grid infrastructures have provided wide integrated use of resources. DotGrid intends to introduce required Grid services and toolkits that are implemented as a layer wrapped over the existing operating systems. Our DotGrid has been developed based on Microsoft .NET in Windows and MONO .NET in Linux and UNIX. Using DotGrid APIs, Grid middlewares and applications can be implemented easily. We evaluated our DotGrid capabilities by implementing some applications including a grid-based distributed cryptographic engine and also a typical computational problem. © 2006 IEEE  

    A new approach in object-oriented methodology for creating event-based simulator

    , Article 2006 Canadian Conference on Electrical and Computer Engineering, CCECE'06, Ottawa, ON, 7 May 2006 through 10 May 2006 ; 2006 , Pages 2424-2427 ; 08407789 (ISSN); 1424400384 (ISBN); 9781424400386 (ISBN) Aliakbarian, S ; Abdollahzadeh, A ; Jalali, L ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2006
    Abstract
    This paper explores software design methodologies in the context of creating a simulator and proposes a methodology to design and implement an event-based simulator namely Sim Met. SimMet is explored in the context of the development of a complex simulator for simulating real world conditions to use in science, technology and medicine and other simulations. In this paper we interested in event-based approach to create a real world with variety range of event possibilities. The paper first discusses the role of time concept as the cornerstone of a methodical analysis and design phase. In Sim Met we use an adaptation of object-oriented methodology to meet time and event concepts in creating a... 

    DBMSS: An event-based simulator for analyzing concurrency protocols in database systems

    , Article 2006 Canadian Conference on Electrical and Computer Engineering, CCECE'06, Ottawa, ON, 7 May 2006 through 10 May 2006 ; 2006 , Pages 1874-1877 ; 08407789 (ISSN); 1424400384 (ISBN); 9781424400386 (ISBN) Jalali, L ; Abdollahzadeh, A ; Aliakbarian, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2006
    Abstract
    This paper explores design and implementation of an event-based simulator namely DBMSS for analyzing concurrency protocols in database systems. In the design of DBMSS we interested in event-based approach to create a real world with variety range of event possibilities. DBMSS is explored in the context of the development of a complex simulator for simulating real world conditions and provide an event-based environment to test and evaluate concurrency protocols in database systems. First we discuss the architecture of DBMSS and use it to provide arrival transactions to test and evaluate concurrency protocols in database system. We present the comparison of 4 concurrency protocols in variety... 

    Security of multi-adjustable join schemes: separations and implications

    , Article IEEE Transactions on Dependable and Secure Computing ; 2021 ; 15455971 (ISSN) Rafiee, M ; Khazaei, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Database management systems (DBMS) are one of cloud services with major applications in industry and business. In the use of such services, since the cloud service provider cannot be entrusted with the plain data, the databases are typically encrypted prior to outsourcing. One of the most challenging issues in designing these services is supporting SQL join queries on the encrypted database. The multi-adjustable join scheme (M-Adjoin) [Khazaei-Rafiee 2020], an extension of Adjoin [Popa-Zeldovich 2012 and Mironov-Segev-Shahaf 2017], is a symmetric-key primitive that supports the join queries for a list of column labels on an encrypted database. In previous works, the following security... 

    A novel fuzzy approach to speech recognition

    , Article Proceedings - HIS'04: 4th International Conference on Hybrid Intelligent Systems, Kitakyushu, 5 December 2004 through 8 December 2004 ; 2005 , Pages 340-345 ; 0769522912 (ISBN) Halavati, R ; Shouraki, S.B ; Eshraghi, M ; Alemzadeh, M ; Ziaie, P ; Ishikawa M ; Hashimoto S ; Paprzycki M ; Barakova E ; Yoshida K ; Koppen M ; Corne D.M ; Abraham A ; Sharif University of Technology
    2005
    Abstract
    This paper presents a novel approach to speech recognition using fuzzy modeling. The task begins with conversion of speech spectrogram into a linguistic description based on arbitrary colors and lengths. While phonemes are also described using these fuzzy measures, and recognition is done by normal fuzzy reasoning, a genetic algorithm optimizes phoneme definitions so that to classify samples into correct phonemes. The method is tested over a standard speech data base and the results are presented. © 2005 IEEE  

    A novel fuzzy approach to recognition of online persian handwriting

    , Article 5th International Conference on Intelligent Systems Design and Applications, ISDA '05, Wroclaw, 8 September 2005 through 10 September 2005 ; Volume 2005 , 2005 , Pages 268-273 ; 0769522866 (ISBN); 9780769522869 (ISBN) Baghshah, M. S ; Shouraki, S. B ; Kasaei, S ; Sharif University of Technology
    2005
    Abstract
    Fuzzy logic has proved to be a powerful tool to represent imprecise and irregular patterns. This paper presents a novel fuzzy approach for recognizing online Persian (Farsi) handwriting which is also useful for multi-writer environments. In this approach, the representation of handwriting parameters is accomplished by fuzzy linguistic modeling. The representative features are selected to describe the shape of tokens. Fuzzy linguistic terms provide robustness against handwriting variations. The purposed method was run on a database of Persian isolated handwritten characters and achieved a relatively high recognition rate. © 2005 IEEE  

    Evolution of speech recognizer agents by artificial life

    , Article Wec 05: Fourth World Enformatika Conference, Istanbul, 24 June 2005 through 26 June 2005 ; Volume 6 , 2005 , Pages 237-240 ; 9759845857 (ISBN) Halavati, R ; Bagheri Shouraki, S ; Harati Zadeh, S ; Lucas, C ; Ardil C ; Sharif University of Technology
    2005
    Abstract
    Artificial Life can be used as an agent training approach in large state spaces. This paper presents an artificial life method to increase the training speed of some speech recognizer agents which where previously trained by genetic algorithms. Using this approach, vertical training (genetic mutations and selection) is combined with horizontal training (individual learning through reinforcement learning) and results in a much faster evolution than simple genetic algorithm. The approach is tested and a comparison with GA cases on a standard speech data base is presented. COPYRIGHT © ENFORMATIKA  

    Feature extraction from optimal time-frequency and time-scale transforms for the classification of the knee joint vibroarthrographic signals

    , Article 3rd IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2003, 14 December 2003 through 17 December 2003 ; 2003 , Pages 709-712 ; 0780382927 (ISBN); 9780780382923 (ISBN) Eskandari, H ; Shamsollahi, M. B ; Rahimi, A ; Behzad, M ; Afkari, P ; Zamani, E. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2003
    Abstract
    In this study knee joint vibroarthrographic (VAG) signals are recorded during active knee movements, which are essentially non-stationary. Because of this nature, common frequency methods are unable to represent the signals, accurately. Both time-frequency and time-scale transforms are used in this research which are good tools for studying non-stationary signals. By optimizing the utilized transforms, it was concluded that the wavelet packet, having the ability of multiresolutional analysis, is a more promising method to extract features from the VAG signals. The performance of different feature extraction techniques were compared by using three new recorded and extensive databases,... 

    ECG beat classification based on a cross-distance analysis

    , Article 6th International Symposium on Signal Processing and Its Applications, ISSPA 2001, Kuala Lumpur, 13 August 2001 through 16 August 2001 ; Volume 1 , 2001 , Pages 234-237 ; 0780367030 (ISBN); 9780780367036 (ISBN) Shahram, M ; Nayebi, K ; Sharif University of Technology
    IEEE Computer Society  2001
    Abstract
    This paper presents a multi-stage algorithm for QRS complex classification into normal and abnormal categories using an unsupervised sequential beat clustering and a cross-distance analysis algorithm. After the sequential beat clustering, a search algorithm based on relative similarity of created classes is used to detect the main normal class. Then other classes are labeled based on a distance measurement from the main normal class. Evaluated results on the MIT-BIH ECG database exhibits an error rate less than 1% for normal and abnormal discrimination and 0.2% for clustering of 15 types of arrhythmia existing on the MIT-BIH database. © 2001 IEEE  

    Translation of Z specifications to executable code: Application to the database domain

    , Article Information and Software Technology ; Volume 55, Issue 6 , June , 2013 , Pages 1017-1044 ; 09505849 (ISSN) Khalafinejad, S ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
    2013
    Abstract
    Context: It is well-known that the use of formal methods in the software development process results in high-quality software products. Having specified the software requirements in a formal notation, the question is how they can be transformed into an implementation. There is typically a mismatch between the specification and the implementation, known as the specification-implementation gap. Objective: This paper introduces a set of translation functions to fill the specification-implementation gap in the domain of database applications. We only present the formal definition, not the implementation, of the translation functions. Method: We chose Z, SQL and Delphi languages to illustrate our... 

    Rule-based translation of specifications to executable code

    , Article ICIME 2010 - 2010 2nd IEEE International Conference on Information Management and Engineering, 16 April 2010 through 18 April 2010, Chengdu ; Volume 1 , 2010 , Pages 1-4 ; 9781424452644 (ISBN) Khalafinejad, S ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
    2010
    Abstract
    It is well known that the use of formal methods in the software development process results in a high-quality software product. However, since formal approaches are just reasoning mechanisms, they do not offer defined ordered steps and guidance for moving between them. Refinement is a technique for moving between specifications but it bears very little resemblance to the real process of software design. An automatic translator from a specification language to an executable code would be highly useful in maximizing the benefits of formal methods. In the domain of database applications, we propose a rule-based algorithm to translate software requirements written in Z specifications to... 

    Speaker Adaptation in HMM-Based Persian Speech Synthesis

    , M.Sc. Thesis Sharif University of Technology Bahmaninezhad, Fahimeh (Author) ; Sameti, Hossein (Supervisor)
    Abstract
    Text-to-speech synthesis, one of the key technologies in speech processing, is a technique for generating speech signal from arbitrarily given text with target speaker’s voice characteristics and various speaking styles and emotional expressions. Statistical parametric speech synthesishasrecently been shown to be very effective in generating acceptable synthesized speech. Therefore, in this study,the main focus is on one of the instances of these techniquescalled hidden Markov model-based speech synthesis. In text-to-speech systems, it is desirable to synthesize high quality speech using a small amount of speech data; this goal would be achieved by employing speaker adaptation framework and... 

    Design and Implementation of a Face Model in Video-realistic Speech Animation for Farsi Language

    , M.Sc. Thesis Sharif University of Technology Ghasemi Naraghi, Zeinab (Author) ; Jamzad, Mansour (Supervisor)
    Abstract
    With increasing use of computers in everyday life, improved communication between machines and human is needed. To make a right communication and understand a humankind face which is made in a graphical environment, implementing the audio and visual projects like lip reading, audio and visual speech recognition and lip modelling needed. The main goal in this project is natural representation of strings of lip movements for Farsi language. Lack of a complete audio and visual database for this application in Farsi language made us provide a new complete Farsi database for this project that is called SFAVD. It is a unique audio and visual database which covers the most applicable words, all... 

    A Secrecy-Preserving Access Control in Data Outsourcing Scenario

    , M.Sc. Thesis Sharif University of Technology Karimi, Leila (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    One of the security issues in data outsourcing scenario is the enforcement of data owner’s access control policies. This includes three challenges; 1) the average number of keys needed to access authorized resources, 2) efficient update of policies, and 3) confidentiality of data owner’s access control policies. Most of the existing proposed solutions address only one of these challenges, while they impose high overhead on both the data owner and users. Such an overhead prevents the model to be implemented in practical applications. In this thesis, we propose an approach to address all the aforementioned challenges with acceptable overhead. In this approach, which is based on selective... 

    , M.Sc. Thesis Sharif University of Technology Esnaashari, Zoha (Author) ; Kianfar, Fereydoon (Supervisor)
    Abstract
    Nowadays, NGOs have a special roll in solving social problems in the world. In regards to the developing state of these organizations in Iran, the need of adopting a systematic approach in managing these organizations, is bold. Renewing of the old methods of work in these organizations, is an aid to removing the barriers of development faced by these organizations.
    In this regard, this thesis subjects the reengineering of business processes of Rayehe Charity Foundation which is an NGO dealing with empowerment of households women.
    After studding the literature of reengineering, the thesis continues on introducing the organization and its activities in more detail. It categorizes... 

    Query Correctness Assurance for Outsourced Databases

    , M.Sc. Thesis Sharif University of Technology Noferesti, Morteza (Author) ; Jalili, Rasoul (Supervisor)
    Abstract
    In the secure data outsourcing scenario, verification of the reply of an unreliable server includes assessing the authenticity, completeness and it’s integrity. In this thesis, an efficient method, with emphasis on freshness, has been introduced to evaluate the correctness of the replies from a server. It takes in hand different application needs, inherent differences in the data, and different update mechanisms. This method evaluates freshness by using timestamps alongside the data being out sourced. Due to the requirement of verifying not only the freshness of the response, but the correctness of the timestamps as well, two general methods for evaluating and verifying the responses were... 

    A Trust-based Approach for Correctness Verification of Query Results in Data Outsourcing Scenario

    , M.Sc. Thesis Sharif University of Technology Ghasemi, Simin (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    One of the security issues in database outsourcing scenario is the correctness of the query results. Correctness verification includes integrity, completeness and freshness of the results. Most of the proposed approaches for correctness verification impose high overhead on the components of the scenario which prevents the scenario to implemented in practical applications. In this thesis, we have proposed a probabilistic approach which imposes acceptable overhead for correctness verification of returned results of service provider. The approach uses the previous behavior of the service provider to calculate a trust value toward it which is used to adjust the imposed overhead. In other words,...