Loading...
Search for: database
0.01 seconds
Total 198 records

    A Method for Querying on Encrypted XML Data

    , M.Sc. Thesis Sharif University of Technology Karimi, Maryam (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    When organizations prefer to outsource their data, security protection of data will be more important. Using cryptography in addition to access control techniques is a natural way for saving confidentiality of data against untrusted server. However, encryption and decryption of data result in database performance degradation. In such a situation all the information stored in encrypted form, one cannot make the selection on the database content any more. Data should be decrypted first, so an unwilling tradeoff between the security and performance is normally forced. The appropriate approaches to increase the performance are methods to deal directly with the encrypted data without firstly... 

    XML Query Processing Optimization

    , M.Sc. Thesis Sharif University of Technology Sadri, Mehdi (Author) ; Mirian Hosseinabadi, Hassan (Supervisor)
    Abstract
    XML has been emerged as a de facto standard for data exchange and information transition over computer networks including Web. On the other hand by the growing use of sensors and data streams over computer networks, the usage of XML data format for data streams between data and processing units like sensors and information centers is growing. In this thesis first we do a survey on XML query processing and optimization and after that we propose methods for optimizing query processing over XML data streams based on data stream unique attributes and incremental completeness of XML data trees for increasing the speed of processing and decreasing the amount of memory that processing needs. For... 

    A Confidentiality and Integrity Preserving Architecture for Secure Data Outsourcing

    , M.Sc. Thesis Sharif University of Technology Shahrokhi, Hesamoddin (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Infrastructural costs of data management, have led people and organizations to outsource their data. This approach is facing with some significant security challenges and risks. The goal of this research, is to present an architecture for secure outsourcing of data in a way that used methods, storage processes, query processing methods and access control mechanisms work together to preserve confidentiality and integrity of outsourced data. In this architecture, the main challenge is transparent placement of some components between client and server in order to prevent user from being aware of communication with a secured server. In order to create this degree of transparency, we need to pay... 

    Designing a Video Search System Using Topic Models

    , M.Sc. Thesis Sharif University of Technology Kianpisheh, Mohammad (Author) ; Gholampoor, Iman (Supervisor) ; Sharif Khani, Mohammad (Supervisor)
    Abstract
    In this work we present a surveillance video retrieval system based on Topic Models. We’ve shown that employing Dynamic Programming improve the effectiveness of Topic Model based retrival. In the other hand proposed method has the accuracy near to the low-level features based methods. Lightweight database is the major advantageous of propsed method over the low-level features based methods. In our work storage space occupied by database decreases from 42 MB to only 0.4 MB for the mit dataset. Moreover lightweight database strikingly speeded up the retrieval process, for example retrieval process in proposed method is about 24 times faster than low-level features based systems. Furthermore in... 

    Improvement of Software Quality Attributes based on the Properties of Relational and Non-relational data Models

    , M.Sc. Thesis Sharif University of Technology Moghimi, Hamed (Author) ; Habibi, Jafar (Supervisor)
    Abstract
    With the growing use of computer systems, especially in form of web applications, software development and customer requirements has become more complex. Modern computer systems are supposed to achieve non-functional requirements in addition to functional requirements. Non-functional requirements are also called software quality attributes. One of the most important quality attributes for today's software systems is performance. Today’s softwares due to the growing number of their users, need more efficiency than ever to properly meet the performance request.Storage components and databases are the most important factors in causing performance bottlenecks in web applications. Most of... 

    Vision-based Vehicle Detection in Intercity Roads for Intelligent Transportation Systems Applications

    , M.Sc. Thesis Sharif University of Technology Rostami, Peyman (Author) ; Marvasti, Farokh (Supervisor)
    Abstract
    This project aims to highlight vision related tasks centered around "car". First, we gathered a dataset of 4343 front view car images, captured from the streets of Iran and Syria during daylight, the images of which are all manually cropped around their corresponding accurately chosen bounding boxes. we also extracted seven parts (i.e. left and right front lights, left and right mirrors, bumper, plate, and air intake) from each car image in the dataset. Our dataset is suitable for developing and testing bounding box extraction algorithms, holistic and part based analyses, occlusion handling algorithms, etc. next, we utilized Viola-Jones Detector to develop a system for car detection, in... 

    Cooperative Search and Localization of Mobile RF Ground Targets, Using a Group of UAVs

    , M.Sc. Thesis Sharif University of Technology Effati, Meysam (Author) ; Nobahari, Hadi (Supervisor)
    Abstract
    In this project, a method for cooperative search and localization of RF ground moving targets by a group of UAVs is developed. It should be noted that UAVs are just equipped with GPS and directional sensors. Since there is fuel constraint for UAVs, they take fuel from a tanker whenever they require. Moreover, searching method enables the UAVs to see different parts of the desired area with almost uniform distribution. In addition, the proposed approach enables the UAVs to perform a local search with the aim of finding the targets having lost their signal during localization mode. Finally, based upon a fueling decision function the UAVs take turn, approach to the fuel tanker, and start... 

    Ontological Study of Metabolic Networks to Develop an Identification Software for Metabolic Networks

    , M.Sc. Thesis Sharif University of Technology Mohammadi Peyhani, Homa (Author) ; Bozorgmehry Boozarjomehry, Ramin (Supervisor)
    Abstract
    Simulation of biological behaviors as the pre requirement for control and optimization, especially for recognition and treating diseases, requires studying involved reactions which may or may not be accessible. In the other side, finding the correct network structures and related mathematical expressions to simulate biological behaviors is a complicated problem due to multi aspect interactions among biological reactions, which imply an approach that integrate the knowledge coming from multiple discipline including biological concepts, mathematical modelling, bioinformatics and advanced programming. In this study we aim to analyze this problem using ontological inference to develop a... 

    Geometrical Fracture Modeling Within Multiple-Point Statistics Framework

    , M.Sc. Thesis Sharif University of Technology Ahmadi, Rouhollah (Author) ; Masihi, Mohsen (Supervisor) ; Rasaei, Mohammad Reza (Supervisor) ; Eskandaridalvand, Kiomars (Supervisor) ; Shahalipour, Reza (Co-Advisor)
    Abstract
    Majority of the oil and gas reservoirs, in the main hydrocarbon production regions around the world, are naturally fractured reservoirs. Fractures play an important role in reservoir fluid flow either in the form of high permeable complex conduits or strong permeability anisotropies. Realistic characterization of naturally fractured reservoirs requires an exhaustive understanding of fracture connectivity and fracture pattern geometry. These subsequently demand description of many fracture parameters such as density (intensity), spacing, orientation, size and aperture. Therefore, a first step in fractured reservoirs characterization is the static geometric modeling of the subsurface fracture... 

    A Unified Approach to Modeling and Design of Semi-structured Databases

    , Ph.D. Dissertation Sharif University of Technology Jahangard Rafsanjani, Amir (Author) ; Mirian Hosseinabadi, Hassan (Supervisor)
    Abstract
    Recently XML has become a standard for data representation and the preferred method of encoding structured data for exchange over the Internet. Moreover it is frequently used as a logical format to store structured and semi-structured data in databases. In this research we focus on semantic modeling for XML data and we propose a model-driven approach for modeling and designing XML databases. In the approach data is modeled without considering representation and implementation details in a platform independent model.
    We use Object-Role Modeling as the platform independent model. We specify a formal meta-model of this model in Alloy and we validate instance models by checking... 

    Speech-Driven Talking Face Synthesis based on True Articulatory Gestures

    , M.Sc. Thesis Sharif University of Technology Peyghan, Mohammad Reza (Author) ; Ghaemmaghami, Shahrokh (Supervisor) ; Behroozi, Hamid (Co-Supervisor)
    Abstract
    Talking face synthesis is a process in which is made using audio-visual data or its features. Because the face is the first output, face animation plays a crucial role in this process. A high-quality face, a balance between different facial regions, natural movements of facial organs, and the like are basic requirements to synthesize a relatively realistic talking face. There are a wide variety of applications for the photo-realistic talking face. For instance, as a teaching assistant, or reading emails and e-books are only two simple ones to mention. To reach a realistic talking face with mentioned necessary requirements, we set a goal to consider all face regions and their movements. To... 

    A Secure and Effcient Approach for Processing Join Query on Encrypted Outsourced Data

    , M.Sc. Thesis Sharif University of Technology Hadian, Saman (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Data outsourcing As a cloud service, it is a solution to reduce the cost of data storage and management in small and medium organizations. One of the main concerns in this area is the privacy of data owners and the non-disclosure of information by curious (albeit trusted) public cloud service providers. Resolving this issue requires encrypting the data before sending it to the cloud server. Transferring all encrypted data to the cloud server and performing various queries after encryption imposes a lot of time, computational and storage overhead, which destroys the philosophy of outsourcing. One of the open research issues is the processing of join queries over encrypted data by the cloud... 

    Modeling of Genetic Mutations Associated with Protein Pathway Common in Alzheimer, Parkinson and Macular Degeneration Diseases

    , M.Sc. Thesis Sharif University of Technology Ghahremani, Amin (Author) ; Jahed, Mehran (Supervisor) ; Hossein Khalaj, Babak (Supervisor) ; Shahpasand, Kourosh (Co-Supervisor)
    Abstract
    Extensive studies have been performed on the genetic variations involved in common neurodegenerative diseases such as Alzheimer's, macular degeneration, and Parkinson's. In most cases, no specific gene has been identified pointing to a distinct pathogenic pathway, therefore, this study mainly aims to find common genes among aforementioned diseases according to determination of a specific pathogenic protein pathway.In this study, we reached a deep understanding of the function of nervous system and the discovery of causative agents of the diseases by applying the sources of information from genome datasets in bioinformatics analysis. The utilized database comprises the classification of... 

    Encryption Aware Query Processing for Data Outsourcing

    , Ph.D. Dissertation Sharif University of Technology Ghareh Chamani, Javad (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Data outsourcing provides cost-saving and availability guarantees. However, privacy and confidentiality issues, disappoint owners from outsourcing their data. Although solutions such as CryptDB and SDB tried to provide secure and practical systems, their enforced limitations, made them useless in practice. Inability in search on encrypted data, is one of the most important existing challenges in such systems. Furthermore, the overhead of mechanisms such as FHEs, removes them from considering for any practical system. Indeed, special purpose encryptions would be the only usable mechanisms for such purposes. However, their limited functionality does not support some important required... 

    Presentation and Modeling of a New Nanocomposite Shield Against Gamma Radiation Based on Simulation and Computational Tools

    , M.Sc. Thesis Sharif University of Technology Arvaneh, Ali (Author) ; Hosseini, Abolfazl (Supervisor)
    Abstract
    In this study, using the MCNPX computer code based on the Monte Carlo method, the properties of protection against gamma-rays of the glass system with the combination of (55-x)Bi2O3-15Pb3O4-20Al2O3-10ZnO-xTiO2 with certain concentrations (x= 0, 5, 10, 15, 20, 25, 30 and 35 mol percent) and in nano and micro dimensions by calculating several parameters related to photon attenuation such as half value layer (HVL), Tenth value layer (TVL), mean free range (MFP), mass attenuation coefficient (m), linear attenuation coefficient (l), effective atomic number (Zeff) and buildup factor (BF) for We investigated different energy levels in the range of 1500-100 keV. To verify the simulation results,... 

    Analysis of Blind Algorithms for Image and Video Quality Assessment

    , M.Sc. Thesis Sharif University of Technology Otroshi Shahreza, Hatef (Author) ; Behroozi, Hamid (Supervisor) ; Amini, Arash (Supervisor)
    Abstract
    The quality assessment of image and video data has became an important and challenging problem in the fields of image/video processing. Oftentimes, the images/videos files are designed to be viewed by a human observer. Further, the number and size of such files
    are growing everyday. Thus, computer-assisted monitoring of the quality has emerged as the only possible solution for this challenge. In this thesis, we shall first review the existing techniques for no-reference(blind) quality assessment of image and video data. Next, we propose some new approaches for the no-reference quality assessment of image and video data in-the-wild. In the case of images, our contributions consist of two... 

    An Approach for Secure Data Outsourcing

    , Ph.D. Dissertation Sharif University of Technology Hadavi, Mohammad Ali (Author) ; alili, Rasool (Supervisor)
    Abstract
    Data outsourcing is an approach to delegate the burden of data management to external servers. In spite of its clear advantages, data outsourcing requires security assurances including data confidentiality, query result correctness, and access control enforcement. Research proposals have identified solutions with disparate assumptions for different security requirements. It is a real obstacle towards having an integrated solution through the combination of existing approaches. The practicality of data outsourcing to the cloud is seriously affected by this challenge. In this thesis, a unified view based on secret sharing is proposed to simultaneously achieve confidentiality, correctness, and... 

    Local Personalized Differential Privacy in Statistical Databases

    , M.Sc. Thesis Sharif University of Technology Golgolnia, Milad (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Usually, developers analyze data in order to enhance the services they provide to users, but this data analysis may compromise the privacy of the users during this process. Alternatively, service providers may choose to share their data with a third party for the purpose of data analysis, but they may have a strong aversion to sharing the personal information of their users with them. In response to these concerns and considerations, some countries have enacted legislation in this area. The method of protecting privacy has been proposed in a variety of ways, however most of them lack a precise mathematical and formal definition. In the end, there is no guarantee that this will ensure that...