Loading...
Search for: database
0.008 seconds
Total 198 records

    Toward a framework for evaluating heterogeneous architecture styles

    , Article Proceedings - 2009 1st Asian Conference on Intelligent Information and Database Systems, ACIIDS 2009, 1 April 2009 through 3 April 2009, Dong Hoi ; 2009 , Pages 155-160 ; 9780769535807 (ISBN) Moaven, S ; Kamandi, A ; Habibi, J ; Ahmadi, H ; Sharif University of Technology
    2009
    Abstract
    Evaluating architectures and choosing the correct one is a critical issue in software engineering domain, in accordance with extremely extension of architecturedriven designs. In the first years of defining architecture styles, some special quality attributes were introduced as their basic attributes. After a moment, by utilizing them in practice, some results were obtained confirming some of attributes; some others meanwhile were not witnessed. As software architecture construction process is dependent on and addressed by both usage conditions and quality attributes, in this paper a framework has been proposed to provide an environment and a platform that can cover evaluation of... 

    Knowledge discovery using a new interpretable simulated annealing based fuzzy classification system

    , Article Proceedings - 2009 1st Asian Conference on Intelligent Information and Database Systems, ACIIDS 2009, 1 April 2009 through 3 April 2009, Dong Hoi ; 2009 , Pages 271-276 ; 9780769535807 (ISBN) Mohamadia, H ; Habibib, J ; Moavena, S ; Sharif University of Technology
    2009
    Abstract
    This paper presents a new interpretable fuzzy classification system. Simulated annealing heuristic is employed to effectively investigate the large search space usually associated with classification problem. Here, two criteria are used to evaluate the proposed method. The first criterion is accuracy of extracted fuzzy if-then rules, and the other is comprehensibility of obtained rules. Experiments are performed with some data sets from UCI machine learning repository. Results are compared with several well-known classification algorithms, and show that the proposed approach provides more accurate and interpretable classification system. © 2009 IEEE  

    Content based image retrieval using the knowledge of texture, color and binary tree structure

    , Article 2009 Canadian Conference on Electrical and Computer Engineering, CCECE '09, St. Johns, NL, 3 May 2009 through 6 May 2009 ; 2009 , Pages 999-1003 ; 08407789 (ISSN); 9781424435081 (ISBN) Mansoori, Z ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    Content base image retrieval is an important research field with many applications. In this paper we presents a new approach for finding similar images to a given query, in a general-purpose image database using content-based image retrieval. Color and texture are used as basic features to describe images. In addition, a binary tree structure is used to describe higher level features of an image. It has been used to keep information about separate segments of the images. The performance of the proposed system has been compared with the SIMPLIcity system using COREL image database. Our experimental results showed that among 10 image categories available in COREL database, our system had a... 

    Semantic log based replication model for optimizing heterogeneous DBMS interaction

    , Article 2009 1st International Conference on Advances in Databases, Knowledge, and Data Applications, DBKDA 2009, Gosier, 1 March 2009 through 6 March 2009 ; 2009 , Pages 138-142 ; 9780769535500 (ISBN) Farahmand Nejad, A ; Kharazmi, S ; Bayati, S ; Golmohammadi, S. K ; Abolhassani, H ; IARIA ; Sharif University of Technology
    2009
    Abstract
    The growth of database application usage requires DataBase Management Systems (DBMS) that are accessible, reliable, and dependable. One approach to handle these requirements is replication mechanism. Replication mechanism can be divided into various categories. Some related works consider two categories for replication mechanisms: heterogeneous and homogenous however majority of them classify them in three groups: physical, trigger-based and log based schema. Log-based replication mechanisms are the most widely used category among DBMS vendors. Adapting such approach for heterogeneous systems is a complex task, because of lack of log understanding in the other end. Semantic technologies... 

    Mobile positioning using enhanced signature database method and error reduction in location grid

    , Article Proceedings - 2009 WRI International Conference on Communications and Mobile Computing, CMC 2009, 6 January 2009 through 8 January 2009, Kunming, Yunnan ; Volume 2 , 2009 , Pages 175-179 ; 9780769535012 (ISBN) Manzuri, M. T ; Naderi, A. M ; Sharif University of Technology
    2009
    Abstract
    Today, communication science is advancing very rapidly; one of these advances is mobile location determination which means finding position of a mobile station. There are some methods to location determination; one of these methods is Signal Strength (Power of Arrivals). In this research, Mobile Location Determination using enhanced signature database method in a Location grid will be introduced; several ways for positioning error reduction will also be described. © 2009 IEEE  

    A new category of relations: combinationally constrained relations

    , Article Scientia Iranica ; Volume 16, Issue 1 D , 2009 , Pages 34-52 ; 10263098 (ISSN) Rohani Rankoohi, M. T ; Mirian Hosseinabadi, H ; Sharif University of Technology
    2009
    Abstract
    The normalization theory in relational database design is a classical subject investigated in different papers. The results of these research works are the stronger normal forms such as 5NF, DKNF and 6NF. In these normal forms, there are less anomalies and redundancies, but it does not mean that these stronger normal forms are free of anomalies and redundancies. Each normal form discussion is based on a particular constraint. In this paper, we introduce relations which contain a new kind of constraint called "combinational constraint". We. distinguish two important kinds of this constraints, namely Strong and Weak. Also we classify the. Combinationally Constrained Relations as Single and... 

    Speech accent profiles: Modeling and synthesis

    , Article IEEE Signal Processing Magazine ; Volume 26, Issue 3 , 2009 , Pages 69-74 ; 10535888 (ISSN) Vaseghi, S ; Yan, Q ; Ghorshi, A ; Sharif University of Technology
    2009
    Abstract
    A discussion regarding speech accents will be given while describing a set of statistical signal processing methods for the modeling, analysis, synthesis, and morphing of English language accents. Accent morphing deals with the changing of the accent of a speech to a different accent. Accent itself is a distinctive pattern of pronunciation of speech within a community of people who belong to a national, geographic, or socioeconomic grouping. Then, the signal processing methodology for speech accent processing will be reviewed while the concept of an accent profile has been presented  

    A new word clustering method for building n-gram language models in continuous speech recognition systems

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 18 June 2008 through 20 June 2008, Wroclaw ; Volume 5027 LNAI , 2008 , Pages 286-293 ; 03029743 (ISSN) ; 354069045X (ISBN); 9783540690450 (ISBN) Bahrani, M ; Sameti, H ; Hafezi, N ; Momtazi, S ; Sharif University of Technology
    2008
    Abstract
    In this paper a new method for automatic word clustering is presented. We used this method for building n-gram language models for Persian continuous speech recognition (CSR) systems. In this method, each word is specified by a feature vector that represents the statistics of parts of speech (POS) of that word. The feature vectors are clustered by k-means algorithm. Using this method causes a reduction in time complexity which is a defect in other automatic clustering methods. Also, the problem of high perplexity in manual clustering methods is abated. The experimental results are based on "Persian Text Corpus" which contains about 9 million words. The extracted language models are evaluated... 

    RIAL: Redundancy reducing inlining algorithm to map XML DTD to relations

    , Article 2008 International Conference on Computational Intelligence for Modelling Control and Automation, CIMCA 2008, Vienna, 10 December 2008 through 12 December 2008 ; July , 2008 , Pages 25-30 ; 9780769535142 (ISBN) Rafsanjani, A. J ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
    2008
    Abstract
    XML has emerged as a common standard for data exchange over the World Wide Web. One way to manage XML data is to use the power of relational databases for storing and querying them. So the hierarchical XML data should be mapped into flat relational structure. In this paper we propose an algorithm which maps DTD to relational schema and as well as content and structure it preserves the functional dependencies during the mapping process in order to produce relations with less redundancy. This is done by categorizing functional dependencies and introducing four rules to be applied to the relations created by the hybrid inlining algorithm according to each category. These rules will reduce... 

    Extended two-dimensional PCA for efficient face representation and recognition

    , Article 2008 IEEE 4th International Conference on Intelligent Computer Communication and Processing, ICCP 2008, Cluj-Napoca, 28 August 2008 through 30 August 2008 ; October , 2008 , Pages 295-298 ; 9781424426737 (ISBN) Safayani, M ; Manzuri Shalmani, M. T ; Khademi, M ; Sharif University of Technology
    2008
    Abstract
    In this paper a novel method called Extended Two-Dimensional PCA (E2DPCA) is proposed which is an extension to the original 2DPCA. We state that the covariance matrix of 2DPCA is equivalent to the average of the main diagonal of the covariance matrix of PCA. This implies that 2DPCA eliminates some covariance information that can be useful for recognition. E2DPCA instead of just using the main diagonal considers a radius of r diagonals around it and expands the averaging so as to include the covariance information within those diagonals. The parameter r unifies PCA and 2DPCA. r=1 produces the covariance of 2DPCA, r=n that of PCA. Hence, by controlling r it is possible to control the... 

    Spectral subtraction in likelihood-maximizing framework for robust speech recognition

    , Article INTERSPEECH 2008 - 9th Annual Conference of the International Speech Communication Association, Brisbane, QLD, 22 September 2008 through 26 September 2008 ; December , 2008 , Pages 980-983 ; 19909772 (ISSN) Baba Ali, B ; Sameti, H ; Safayani, M ; Sharif University of Technology
    2008
    Abstract
    Spectral Subtraction (SS), as a speech enhancement technique, originally designed for improving quality of speech signal judged by human listeners. it usually improve the quality and intelligibility of speech signals, while the speech recognition systems need compensation techniques capable of reducing the mismatch between the noisy speech features and the clean models. This paper proposes a novel approach for solving this problem by considering the SS and the speech recognizer as two interconnected components, sharing the common goal of improved speech recognition accuracy. The experimental evaluations on a real recorded database and the TIMIT database show that the proposed method can... 

    Advanced nastaliq CAPTCHA

    , Article 2008 7th IEEE International Conference on Cybernetic Intelligent Systems, CIS 2008, London, 9 September 2008 through 10 September 2008 ; 2008 ; 9781424429141 (ISBN) Shirali Shahreza, M. H ; Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    Many websites on the Internet offer services to people. They usually ask the users to fill the registration forms for using their services. Unfortunately, some vandalistic persons write programs which make automatic fake registration. For solving this problem, CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart) systems are invented. These systems distinguish human users from computer programs. One of the CAPTCHA methods which is designed for Persian and Arabic users is Nastaliq CAPTCHA. In this method, the image of a Persian or Arabic word which is written in Nastaliq font is chosen from a dictionary, and it is shown to the users, then they are asked to type... 

    A new Bayesian classifier for skin detection

    , Article 3rd International Conference on Innovative Computing Information and Control, ICICIC'08, Dalian, Liaoning, 18 June 2008 through 20 June 2008 ; 2008 ; 9780769531618 (ISBN) Shirali Shahreza, S ; Mousavi, M. E ; Sharif University of Technology
    2008
    Abstract
    Skin detection has different applications in computer vision such as face detection, human tracking and adult content filtering. One of the major approaches in pixel based skin detection is using Bayesian classifiers. Bayesian classifiers performance is highly related to their training set. In this paper, we introduce a new Bayesian classifier skin detection method. The main contribution of this paper is creating a huge database to create color probability tables and new method for creating skin pixels data set. Our database consists of about 80000 images containing more than 5 billions pixels. Our tests shows that the performance of Bayesian classifier trained on our data set is better than... 

    Secure steganography using Gabor filter and neural networks

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 4920 LNCS , 2008 , Pages 33-49 ; 03029743 (ISSN); 3540690166 (ISBN); 9783540690160 (ISBN) Jamzad, M ; Zahedi Kermani, Z ; Sharif University of Technology
    2008
    Abstract
    The main concern of steganography (image hiding) methods is to embed a secret image into a host image in such a way that it causes minimum distortion to the host; to make it possible to extract a version of secret image from the host in such a way that the extracted version of secret image be as similar as possible to its original version (this should be possible even after usual attacks on the host image), and to provide ways of embedding secret images with larger size into a given host image. In this paper we propose a method that covers all above mentioned concerns by suggesting the idea of finding from an image data base, the most suitable host for a given secret image. In our method,... 

    A tale of two symmetrical tails: Structural and functional characteristics of palindromes in proteins

    , Article BMC Bioinformatics ; Volume 9 , 2008 ; 14712105 (ISSN) Sheari, A ; Kargar, M ; Katanforoush, A ; Arab, S ; Sadeghi, M ; Pezeshk, H ; Eslahchi, C ; Marashi, S. A ; Sharif University of Technology
    2008
    Abstract
    Background: It has been previously shown that palindromic sequences are frequently observed in proteins. However, our knowledge about their evolutionary origin and their possible importance is incomplete. Results: In this work, we tried to revisit this relatively neglected phenomenon. Several questions are addressed in this work. (1) It is known that there is a large chance of finding a palindrome in low complexity sequences (i.e. sequences with extreme amino acid usage bias). What is the role of sequence complexity in the evolution of palindromic sequences in proteins? (2) Do palindromes coincide with conserved protein sequences? If yes, what are the functions of these conserved segments?... 

    A new incremental face recognition system

    , Article 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS, Dortmund, 6 September 2007 through 8 September 2007 ; 2007 , Pages 335-340 ; 1424413486 (ISBN); 9781424413485 (ISBN) Aliyari Ghassabeh, Y ; Ghavami, A ; Abrishami Moghaddam, H ; Sharif University of Technology
    2007
    Abstract
    In this paper, we present new adaptive linear discriminant analysis (LDA) algorithm and apply them for adaptive facial feature extraction. Adaptive nature of the proposed algorithm is advantageous for real world applications in which one confronts with a sequence of data such as online face recognition and mobile robotics. Application of the new algorithm on feature extraction from facial image sequences is given in three steps: i) adaptive image preprocessing, ii) adaptive dimension reduction and iii) adaptive LDA feature estimation. Steps 1 and 2 are done simultaneously and outputs of stage 2 are used as a sequence of inputs for stage3. The proposed system was tested on Yale and PIE face... 

    Introducing a framework to create telephony speech databases from direct ones

    , Article 14th International Conference on Systems Signals and Image Processing, IWSSIP 2007 and 6th EURASIP Conference Focused on Speech and Image Processing, Multimedia Communications and Services, EC-SIPMCS 2007, Maribor, 27 June 2007 through 30 June 2007 ; November , 2007 , Pages 327-330 ; 9789612480295 (ISBN) Momtazi, S ; Sameti, H ; Vaisipour, S ; Tefagh, M ; Sharif University of Technology
    2007
    Abstract
    A Comprehensive speech database is one of the important tools for developing speech recognition systems; these tools are necessary for telephony recognition, too. Although adequate databases for direct speech recognizers exist, there is not an appropriate database for telephony speech recognizers. Most methods suggested for solving this problem are based on building new databases which tends to consume much time and many resources; or they used a filter which simulates circuit switch behavior to transform direct databases to telephony ones, in this case resulted databases have many differences with real telephony databases. In this paper we introduce a framework for creating telephony speech... 

    Assessment of modal transportation sustainability: Application of data envelopment and concordance analyses

    , Article Iranian Journal of Science and Technology, Transaction B: Engineering ; Volume 31, Issue 2 , 2007 , Pages 179-193 ; 03601307 (ISSN) Rassafi, A. A ; Vaziri, M ; Sharif University of Technology
    2007
    Abstract
    This study tries to characterize national transportation modes to assess balancing and sustainability. Using a pioneer measure for sustainable development (SD), and based on the conformity of the growths of all sectors with transportation modes, the countries are comparatively studied. The proposed measure, elasticity, for each pair of variables indicates the extent to which the two variables have been changing consistently. Indeed the elasticity values are measures of "harmonic development" reflecting sustainability. The study database consisted of key aspects of transportation sustainability in the form of national variables including transportation, economic, social and environmental... 

    Neural network and neuro-fuzzy assessments for scour depth around bridge piers

    , Article Engineering Applications of Artificial Intelligence ; Volume 20, Issue 3 , 2007 , Pages 401-414 ; 09521976 (ISSN) Bateni, S. M ; Borghei, S. M ; Jeng, D. S ; Sharif University of Technology
    2007
    Abstract
    The mechanism of flow around a pier structure is so complicated that it is difficult to establish a general empirical model to provide accurate estimation for scour. Interestingly, each of the proposed empirical formula yields good results for a particular data set. Hence, in this study, alternative approaches, artificial neural networks (ANNs) and adaptive neuro-fuzzy inference system (ANFIS), are proposed to estimate the equilibrium and time-dependent scour depth with numerous reliable data base. Two ANN models, multi-layer perception using back-propagation algorithm (MLP/BP) and radial basis using orthogonal least-squares algorithm (RBF/OLS), were used. The equilibrium scour depth was... 

    Intrusion detection using a fuzzy genetics-based learning algorithm

    , Article Journal of Network and Computer Applications ; Volume 30, Issue 1 , 2007 , Pages 414-428 ; 10848045 (ISSN) Saniee Abadeh, M ; Habibi, J ; Lucas, C ; Sharif University of Technology
    2007
    Abstract
    Fuzzy systems have demonstrated their ability to solve different kinds of problems in various applications domains. Currently, there is an increasing interest to augment fuzzy systems with learning and adaptation capabilities. Two of the most successful approaches to hybridize fuzzy systems with learning and adaptation methods have been made in the realm of soft computing. Neural fuzzy systems and genetic fuzzy systems hybridize the approximate reasoning method of fuzzy systems with the learning capabilities of neural networks and evolutionary algorithms. The objective of this paper is to describe a fuzzy genetics-based learning algorithm and discuss its usage to detect intrusion in a...