Loading...
Search for: database
0.007 seconds
Total 196 records

    Image steganalysis based on SVD and noise estimation: Improve sensitivity to spatial LSB embedding families

    , Article IEEE Region 10 Annual International Conference, Proceedings/TENCON, 21 November 2011 through 24 November 2011, Bali ; 2011 , Pages 1266-1270 ; 9781457702556 (ISBN) Diyanat, A ; Farhat, F ; Ghaemmaghami, S ; Sharif University of Technology
    2011
    Abstract
    We propose a novel image steganalysis method, based on singular value decomposition and noise estimation, for the spatial domain LSB embedding families. We first define a content independence parameter, DS, that is calculated for each LSB embedding rate. Next, we estimate the DS curve and use noise estimation to improve the curve approximation accuracy. It is shown that the proposed approach gives an estimate of the LSB embedding rate, as well as information about the existence of the embedded message (if any). The proposed method can effectively be applied to a wide range of the image LSB steganography families in spatial domain. To evaluate the proposed scheme, we applied the method to a... 

    Randomized algorithms for comparison-based search

    , Article Advances in Neural Information Processing Systems 24: 25th Annual Conference on Neural Information Processing Systems 2011, NIPS 2011, 12 December 2011 through 14 December 2011 ; December , 2011 ; 9781618395993 (ISBN) Tschopp, D ; Diggavi, S ; Delgosha, P ; Mohajer, S ; Sharif University of Technology
    Abstract
    This paper addresses the problem of finding the nearest neighbor (or one of the R-nearest neighbors) of a query object q in a database of n objects, when we can only use a comparison oracle. The comparison oracle, given two reference objects and a query object, returns the reference object most similar to the query object. The main problem we study is how to search the database for the nearest neighbor (NN) of a query, while minimizing the questions. The difficulty of this problem depends on properties of the underlying database. We show the importance of a characterization: combinatorial disorder D which defines approximate triangle inequalities on ranks. We present a lower bound of Ω(Dlog... 

    ECG based human identification using wavelet distance measurement

    , Article Proceedings - 2011 4th International Conference on Biomedical Engineering and Informatics, BMEI 2011, 15 October 2011 through 17 October 2011 ; Volume 2 , October , 2011 , Pages 717-720 ; 9781424493524 (ISBN) Naraghi, M. E ; Shamsollahi, M. B ; Sharif University of Technology
    2011
    Abstract
    In this Paper a new approach is proposed for electrocardiogram (ECG) based human identification using wavelet distance measurement. The main advantage of this method is that it guarantees high accuracy even in abnormal cases. Furthermore, it possesses low sensitivity to noise. The algorithm was applied on 11 normal subjects and 10 abnormal subjects of MIT-BIH Database using single lead data, and a 100% human identification rate was on both normal and abnormal subjects. Adding artificial white noise to signals shows that the method is nearly accurate in SNR level above 5dB in normal subjects and 20dB in abnormal subjects  

    A new image segmentation algorithm: A community detection approach

    , Article Proceedings of the 5th Indian International Conference on Artificial Intelligence, IICAI 2011, 14 December 2011 through 16 December 2011 ; December , 2011 , Pages 1047-1059 ; 9780972741286 (ISBN) Abin, A. A ; Mahdisoltani, F ; Beigy, H ; Sharif University of Technology
    2011
    Abstract
    The goal of image segmentation is to find regions that represent objects or meaningful parts of objects. In this paper a new method is presented for color image segmentation which involves the ideas used for community detection in social networks. In the proposed method an initial segmentation is applied to partition input image into small homogeneous regions. Then a weighted network is constructed from the regions, and a community detection algorithm is applied to it. The detected communities represent segments of the image. A remarkable feature of the method is the ability to segments the image automatically by optimizing the modularity value in the constructed network. The performance of... 

    Generation of database schemas from Z specifications

    , Article IEEE International Conference on Electro Information Technology, 15 May 2011 through 17 May 2011, Mankato, MN ; 2011 ; 21540357 (ISSN) Khalafinejad, S ; Mirian Hosseinabadi, S. H ; IEEE Region 4 (R4) ; Sharif University of Technology
    2011
    Abstract
    Automatic translation of a high-level specification language to an executable implementation would be highly useful in maximizing the benefits of formal methods. We will introduce a set of translation functions to fill the specification-implementation gap in the domain of database applications. Because the mathematical foundation of Z has many properties in common with SQL, a direct mapping from Z to SQL structures can be found. We derive a set of translation functions from Z to SQL for the generation of a database. The proposed methodology results in reducing the expenses and duration of the software development, and also, prevents the errors originated from the manual translation of... 

    Improve the classification and sales management of products using multi-relational data mining

    , Article 2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011, Xi'an, 27 May 2011 through 29 May 2011 ; 2011 , Pages 329-337 ; 9781612844855 (ISBN) Houshmand, M ; Alishahi, M ; Sharif University of Technology
    2011
    Abstract
    There are some elements such as competition among companies and changes in demands which result in changes of customers' behaviors. Therefore, paying no attention to these changes may lead to a reduction in company benefits and loss of customers. Since data and their analyses determine the activities and decision makings of companies, data quality is of paramount in analyzing them because misinformation leads to wrong decision making. Since data mining has been designed to find out multi repetition patterns, it can be used to improve the product sales violations by sales people and increase the quality of data. Most of data mining models available try to find patterns in one table, but the... 

    Three-dimensional modular discriminant analysis (3DMDA): A new feature extraction approach for face recognition

    , Article Computers and Electrical Engineering ; Volume 37, Issue 5 , 2011 , Pages 811-823 ; 00457906 (ISSN) Safayani, M ; Manzuri Shalmani, M. T ; Sharif University of Technology
    Abstract
    In this paper, we present a novel multilinear algebra based feature extraction approach for face recognition which preserves some implicit structural or locally-spatial information among elements of the original images. We call this method three-dimensional modular discriminant analysis (3DMDA). Our approach uses a new data model called third-order tensor model (3TM) for representing the face images. In this model, each image is partitioned into the several equal size local blocks, and the local blocks are combined to represent the image as a third-order tensor. Then, a new optimization algorithm called direct mode (d-mode) is introduced for learning three optimal projection axes. Extensive... 

    Unsupervised estimation of conceptual classes for semantic image annotation

    , Article 2011 19th Iranian Conference on Electrical Engineering, ICEE 2011, 17 May 2011 through 19 May 2011 ; May , 2011 ; 9789644634284 (ISBN) Teimoori, F ; Esmaili, H ; Shirazi, A. A. B ; Sharif University of Technology
    2011
    Abstract
    A probabilistic formulation for semantic image annotation and retrieval is proposed. Annotation and retrieval are posed as classification problems where each class is defined as the group of database images labeled with a common semantic label. It is shown that, by establishing this one-to-one correspondence between semantic labels and semantic classes, a minimum probability of error annotation and retrieval are feasible with algorithms that are 1) conceptually simple and 2) computationally efficient. In this article, a content-based image retrieval and annotation architecture is proposed. Its attitude is decreasing the semantic gap by partitioning the image to its semantic regions and using... 

    Utilizing intelligent segmentation in isolated word recognition using a hybrid HTD-HMM

    , Article International Conference on Circuits, Systems, Signal and Telecommunications - Proceedings, 21 October 2010 through 23 October 2010 ; October , 2011 , Pages 42-49 ; 9789604742714 (ISBN) Kazemi, R ; Sereshkeh, A. R ; Ehsandoust, B ; ; Sharif University of Technology
    2011
    Abstract
    Isolated Word Recognition (IWR) is becoming increasingly attractive due to the improvement of speech recognition techniques. However, the accuracy of IWR suffers when large databases or words with similar pronunciation are used. The criterion for accurate speech recognition is suitable segmentation. However, the traditional method of segmentation equal segmentation does not produce the most accurate result. Furthermore, utilizing manual segmentation based on events is not possible in large databases. In this paper, we introduce an intelligent segmentation based on Hierarchical Temporal Decomposition (HTD). Based on this method, a temporal decomposition (TD) algorithm can be used to... 

    Isolatedword recognition based on intelligent segmentation by using hybrid HTD-HMM

    , Article International Conference on Circuits, Systems, Signal and Telecommunications - Proceedings, 21 October 2010 through 23 October 2010 ; October , 2011 , Pages 38-41 ; 9789604742714 (ISBN) Kazemi, A. R ; Ehsandoust, B. B ; Rezazadeh, C. A ; Ghaemmaghami, D. S ; Sharif University of Technology
    2011
    Abstract
    In recent years, IWR (Isolated Word Recognition) was one of the main concerns of speech processing. The challenging problems in this field appear when the database become so large or when we have a lot of word with similarly pronounce in the database. This paper introduces a general solution for a traditional problem in isolated similarly pronounced word recognition, especially in large databases. One the important problem of traditional IWR is referred to their segmentation algorithm, their methods were lacking in efficiency due to the following reasons: First, using equal segmentation is not at all intelligent at all and as a result, cannot produce accurate results; besides, utilizing... 

    Iran atlas of offshore renewable energies

    , Article Renewable Energy ; Volume 36, Issue 1 , January , 2011 , Pages 388-398 ; 09601481 (ISSN) Abbaspour, M ; Rahimi, R ; Sharif University of Technology
    2011
    Abstract
    The aim of the present study is to provide an Atlas of IRAN Offshore Renewable Energy Resources (hereafter called 'the Atlas') to map out wave and tidal resources at a national scale, extending over the area of the Persian Gulf and Sea of Oman. Such an Atlas can provide necessary tools to identify the areas with greatest resource potential and within reach of present technology development. To estimate available tidal energy resources at the site, a two-dimensional tidally driven hydrodynamic numerical model of Persian Gulf was developed using the hydrodynamic model in the MIKE 21 Flow Model (MIKE 21HD), with validation using tidal elevation measurements and tidal stream diamonds from... 

    GMWASC: Graph matching with weighted affine and sparse constraints

    , Article CSSE 2015 - 20th International Symposium on Computer Science and Software Engineering, 18 August 2015 ; 2015 ; 9781467391818 (ISBN) Taheri Dezaki , F ; Ghaffari, A ; Fatemizadeh, E ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Graph Matching (GM) plays an essential role in computer vision and machine learning. The ability of using pairwise agreement in GM makes it a powerful approach in feature matching. In this paper, a new formulation is proposed which is more robust when it faces with outlier points. We add weights to the one-to-one constraints, and modify them in the process of optimization in order to diminish the effect of outlier points in the matching procedure. We execute our proposed method on different real and synthetic databases to show both robustness and accuracy in contrast to several conventional GM methods  

    Switching kalman filter based methods for apnea bradycardia detection from ECG signals

    , Article Physiological Measurement ; Volume 36, Issue 9 , 2015 , Pages 1763-1783 ; 09673334 (ISSN) Ghahjaverestan, N. M ; Shamsollahi, M. B ; Ge, D ; Hernandez, A. I ; Sharif University of Technology
    Abstract
    Apnea bradycardia (AB) is an outcome of apnea occurrence in preterm infants and is an observable phenomenon in cardiovascular signals. Early detection of apnea in infants under monitoring is a critical challenge for the early intervention of nurses. In this paper, we introduce two switching Kalman filter (SKF) based methods for AB detection using electrocardiogram (ECG) signal. The first SKF model uses McSharry's ECG dynamical model integrated in two Kalman filter (KF) models trained for normal and AB intervals. Whereas the second SKF model is established by using only the RR sequence extracted from ECG and two AR models to be fitted in normal and AB intervals. In both SKF approaches, a... 

    Security and searchability in secret sharing-based data outsourcing

    , Article International Journal of Information Security ; Volume 14, Issue 6 , November , 2015 , Pages 513-529 ; 16155262 (ISSN) Hadavi, M. A ; Jalili, R ; Damiani, E ; Cimato, S ; Sharif University of Technology
    Springer Verlag  2015
    Abstract
    A major challenge organizations face when hosting or moving their data to the Cloud is how to support complex queries over outsourced data while preserving their confidentiality. In principle, encryption-based systems can support querying encrypted data, but their high complexity has severely limited their practical use. In this paper, we propose an efficient yet secure secret sharing-based approach for outsourcing relational data to honest-but-curious data servers. The problem with using secret sharing in a data outsourcing scenario is how to efficiently search within randomly generated shares. We present multiple partitioning methods that enable clients to efficiently search among shared... 

    Speech driven lips animation for the Farsi language

    , Article Proceedings of the International Symposium on Artificial Intelligence and Signal Processing, AISP 2015, 3 March 2015 through 5 March 2015 ; 2015 , Pages 201-205 ; 9781479988174 (ISBN) Naraghi, Z ; Jamzad, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    With the growing presence of computers in everyday life, communication improvement between human and machines is inevitable. Talking faces are the faces whose movements are synchronized to speech. They have an effective role in many applications. Lip is the most important part of a talking face. The main goal of this project is implementing a natural and human-like lip movement synthesis system for the Farsi language. For this purpose, a comprehensive audio visual database called SFAVD1 was designed and used. After extracting the sufficient features and designing a parallel Hidden Markov Model, the speech driven lip movement sequence generator system for Farsi input speech was implemented.... 

    A model-driven approach to semi-structured database design

    , Article Frontiers of Computer Science ; Volume 9, Issue 2 , 2015 , Pages 237-252 ; 20952228 (ISSN) Jahangard Rafsanjani, A ; Mirian Hosseinabadi, S ; Sharif University of Technology
    Higher Education Press  2015
    Abstract
    Recently XML has become a standard for data representation and the preferred method of encoding structured data for exchange over the Internet. Moreover it is frequently used as a logical format to store structured and semi-structured data in databases. We propose a model-driven and configurable approach for modeling hierarchical XML data using object role modeling (ORM) as a flat conceptual model. First a non-hierarchical conceptual schema of the problem domain is built using ORM and then different hierarchical views of the conceptual schema or parts of it are specified by the designer using transformation rules. A hierarchical modeling notation called H-ORM is proposed to show these... 

    Thirty-nine years of Iran's scientific products in the field of Geophysics

    , Article Journal of the Earth and Space Physics ; Volume 41, Issue 1 , 2015 , Pages 145-164 ; 03781046 (ISSN) Asadi, M ; Ghaderi Sohi, A ; Sharif University of Technology
    Institute of Geophysics  2015
    Abstract
    Identifying and measuring the impact and value of scientific output plays an important role in today's world of information overload. On one side, governments are trying to distribute research funds in ways that support research in strategically important fields, on the other side, researchers and scientists are seeking to access only relevant and quality information that have mainly worthy of their attention. Nowadays, countries are evaluated not only by their national products, military power, geographical area, etc., but also by such factors as the production and consumption of scientific information. Scientometric approaches are used to provide appropriate tools for evaluating scientific... 

    Knowledge-based design of space-time transmit code and receive filter for a multiple-input-multiple-output radar in signal-dependent interference

    , Article IET Radar, Sonar and Navigation ; Volume 9, Issue 8 , 2015 , Pages 1124-1135 ; 17518784 (ISSN) Karbasi, S. M ; Aubry, A ; Carotenuto, V ; Naghsh, M. M ; Bastani, M. H ; Sharif University of Technology
    Institution of Engineering and Technology  2015
    Abstract
    The authors deal with the robust design of multiple-input-multiple-output (MIMO) space-time transmit code (STTC) and space-time receive filter (STRF) for a point-like target embedded in signal-dependent interference. Specifically, they assume that the radar exploits knowledge provided by dynamic environmental database, to roughly predict the actual scattering scenario. Then, they devise an iterative method to optimise the (constrained) STTC and the (constrained) STRF which sequentially improves the worst-case (over interfering scatterers statistics) signal-to-interference-plus-noise ratio (SINR). Each iteration of the algorithm is handled via solving two (hidden) convex optimisation... 

    Parallel nonlinear analysis of weighted brain's gray and white matter images for Alzheimer's dementia diagnosis

    , Article Conference proceedings : ... Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Conference ; 2010 , Pages 5573-5576 ; 1557170X (ISSN) Razavian, S. M ; Torabi, M ; Kim, K ; Sharif University of Technology
    2010
    Abstract
    In this study, we are proposing a novel nonlinear classification approach to discriminate between Alzheimer's Disease (AD) and a control group using T1-weighted and T2-weighted Magnetic Resonance Images (MRI's) of brain. Since T1-weighted images and T2-weighted images have inherent physical differences, obviously each of them has its own particular medical data and hence, we extracted some specific features from each. Then the variations of the relevant eigenvalues of the extracted features were tracked to pick up the most informative ones. The final features were assigned to two parallel systems to be nonlinearly categorized. Considering the fact that AD defects the white and gray regions... 

    Analyzing the supply chain using SCOR model in a steel producing company

    , Article 40th International Conference on Computers and Industrial Engineering, 25 July 2010 through 28 July 2010 ; 2010 ; 9781424472956 (ISBN) Seifbarghy, M ; Akbari, M. R ; Ssheikh Sajadieh, M ; Sharif University of Technology
    Abstract
    Supply Chain Operations Reference (SCOR) model is developed and maintained by the Supply Chain Council (SCC). The model is a reference model which can be used to map, benchmark and improve the supply chain operations. SCOR model provides companies with a basic process modeling tool, an extensive benchmark database and defines a set of supply chain metrics. Mobarakeh Steel Company (located in Isfahan, Iran) initiated the project of studying and analyzing its supply chain performance based on the SCOR model. This paper explains the steps and the results of the project. Interviews with the managers and considering the documents on the four major subjects of planning, logistics, information flow...