Loading...
Search for: database
0.008 seconds
Total 196 records

    Towards an architecture for real-time data storage

    , Article Proceedings - 2nd International Conference on Computational Intelligence, Modelling and Simulation, CIMSim 2010, 28 September 2010 through 30 September 2010 ; 2010 , Pages 279-284 ; 9780769542621 (ISBN) Yektamanesh, O ; Habibi, J ; Ahmadi, H ; Vatanian Shanjani, G ; Sharif University of Technology
    Abstract
    Nowadays, due to the growing role that analytical, predictive and decision making activities perform in organizations, organizational data are very important. In order to utilizing organizational data, it should be transmitted from the operational and transactional environment to a dimensional or normal database. However, not only differences in platforms and data types are some issues that should be overcome, but also variety of data types such as non-structural and text format files should be considered. In this way, exploiting updated data storages is necessary for quick and accurate services and raising customers' satisfaction. Although real time data storages are frequently used in... 

    Heteroscedastic multilinear discriminant analysis for face recognition

    , Article Proceedings - International Conference on Pattern Recognition, 23 August 2010 through 26 August 2010, Istanbul ; 2010 , Pages 4287-4290 ; 10514651 (ISSN) ; 9780769541099 (ISBN) Safayani, M ; Manzuri Shalmani, M. T ; Sharif University of Technology
    2010
    Abstract
    There is a growing attention in subspace learning using tensor-based approaches in high dimensional spaces. In this paper we first indicate that these methods suffer from the Heteroscedastic problem and then propose a new approach called Heteroscedastic Multilinear Discriminant Analysis (HMDA). Our method can solve this problem by utilizing the pairwise chernoff distance between every pair of clusters with the same index in different classes. We also show that our method is a general form of Multilinear Discriminant Analysis (MDA) approach. Experimental results on CMU-PIE, AR and AT&T face databases demonstrate that the proposed method always perform better than MDA in term of classification... 

    User adaptive clustering for large image databases

    , Article Proceedings - International Conference on Pattern Recognition, 23 August 2010 through 26 August 2010, Istanbul ; 2010 , Pages 4271-4274 ; 10514651 (ISSN) ; 9780769541099 (ISBN) Saboorian, M. M ; Jamzad, M ; Rabiee, H. R ; Sharif University of Technology
    2010
    Abstract
    Searching large image databases is a time consuming process when done manually. Current CBIR methods mostly rely on training data in specific domains. When source and domain of images are unknown, unsupervised methods provide better solutions. In this work, we use a hierarchical clustering scheme to group images in an unknown and large image database. In addition, the user should provide the current class assignment of a small number of images as a feedback to the system. The proposed method uses this feedback to guess the number of required clusters, and optimizes the weight vector in an iterative manner. In each step, after modification of the weight vector, the images are reclustered. We... 

    A novel method to find appropriate ε for DBSCAN

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 24 March 2010 through 26 March 2010 ; Volume 5990 LNAI, Issue PART 1 , 2010 , Pages 93-102 ; 03029743 (ISSN) ; 3642121446 (ISBN) Esmaelnejad, J ; Habibi, J ; Hassas Yeganeh, S ; Sharif University of Technology
    2010
    Abstract
    Clustering is one of the most useful methods of data mining, in which a set of real or abstract objects are categorized into clusters. The DBSCAN clustering method, one of the most famous density based clustering methods, categorizes points in dense areas into same clusters. In DBSCAN a point is said to be dense if the ε-radius circular area around it contains at least MinPts points. To find such dense areas, region queries are fired. Two points are defined as density connected if the distance between them is less than ε and at least one of them is dense. Finally, density connected parts of the data set extracted as clusters. The significant issue of such a method is that its parameters (ε... 

    Evolutionary rule generation for signature-based cover selection steganography

    , Article Neural Network World ; Volume 20, Issue 3 , 2010 , Pages 297-316 ; 12100552 (ISSN) Sajedi, H ; Jamzad, M ; Sharif University of Technology
    2010
    Abstract
    A novel approach for selecting proper cover images in steganography is presented in this paper. The proposed approach consists of two stages. The first stage is an evolutionary algorithm that extracts the signature of cover images against stego images in the form of fuzzy if-then rules. This algorithm is based on an iterative rule learning approach to construct an accurate fuzzy rule base. The rule base is generated in an incremental way by optimizing one fuzzy rule at a time using an evolutionary algorithm. In the second stage of the proposed approach, the fuzzy rules generated in the first stage are used for selecting suitable cover images for steganography. We applied our approach to some... 

    Rule-based translation of specifications to executable code

    , Article ICIME 2010 - 2010 2nd IEEE International Conference on Information Management and Engineering, 16 April 2010 through 18 April 2010, Chengdu ; Volume 1 , 2010 , Pages 1-4 ; 9781424452644 (ISBN) Khalafinejad, S ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
    2010
    Abstract
    It is well known that the use of formal methods in the software development process results in a high-quality software product. However, since formal approaches are just reasoning mechanisms, they do not offer defined ordered steps and guidance for moving between them. Refinement is a technique for moving between specifications but it bears very little resemblance to the real process of software design. An automatic translator from a specification language to an executable code would be highly useful in maximizing the benefits of formal methods. In the domain of database applications, we propose a rule-based algorithm to translate software requirements written in Z specifications to... 

    Estimation of stress drop for some large shallow earthquakes using stochastic point source and finite fault modeling

    , Article Scientia Iranica ; Volume 17, Issue 3 A , JUNE , 2010 , Pages 217-235 ; 10263098 (ISSN) Moghaddam, H ; Fanaie, N ; Motazedian, D ; Sharif University of Technology
    2010
    Abstract
    Using stochastic point source and finite fault modeling, the stochastic stress drop is estimated for 52 large shallow earthquakes listed in the 'Pacific Earthquake Engineering Research Center (PEER) Next Generation Attenuation of Ground Motions (NGA)' database. The Pseudo Spectral Acceleration (PSA) of 541 accelerograms, recorded at National Earthquake Hazards Reduction Program (NEHRP) C-class sites from 52 earthquakes are simulated and compared with the PSA listed in the PEER NGA database. The magnitude of the analyzed earthquakes ranged from M4:4 to M7:6. The stress drop is calibrated by trial and error and based on the analysis of residuals where the residual is defined as the log of the... 

    Recognizing combinations of facial action units with different intensity using a mixture of hidden Markov models and neural network

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7 April 2010 through 9 April 2010 ; Volume 5997 LNCS , April , 2010 , Pages 304-313 ; 03029743 (ISSN) ; 9783642121265 (ISBN) Khademi, M ; Manzuri Shalmani, M. T ; Kiapour, M. H ; Kiaei, A. A ; Sharif University of Technology
    2010
    Abstract
    Facial Action Coding System consists of 44 action units (AUs) and more than 7000 combinations. Hidden Markov models (HMMs) classifier has been used successfully to recognize facial action units (AUs) and expressions due to its ability to deal with AU dynamics. However, a separate HMM is necessary for each single AU and each AU combination. Since combinations of AU numbering in thousands, a more efficient method will be needed. In this paper an accurate real-time sequence-based system for representation and recognition of facial AUs is presented. Our system has the following characteristics: 1) employing a mixture of HMMs and neural network, we develop a novel accurate classifier, which can... 

    Face recognition using boosted regularized linear discriminant analysis

    , Article ICCMS 2010 - 2010 International Conference on Computer Modeling and Simulation, 22 January 2010 through 24 January 2010, Sanya ; Volume 2 , 2010 , Pages 89-93 ; 9780769539416 (ISBN) Baseri Salehi, N ; Kasaei, S ; Alizadeh, S ; Sharif University of Technology
    2010
    Abstract
    Boosting is a general method for improving the accuracy of any given learning algorithm. In this paper, we have proposed the boosting method for face recognition (FR) that improves the linear discriminant analysis (LDA)-based technique. The improvement is achieved by incorporating the regularized LDA (R-LDA) technique into the boosting framework. R-LDA is based on a new regularized Fisher's discriminant criterion, which is particularly robust against the small sample size problem compared to the traditional one used in LDA. The AdaBoost technique is utilized within this framework to generalize a set of simple FR subproblems and their corresponding LDA solutions and combines the results from... 

    Robust detection of premature ventricular contractions using a wave-based Bayesian framework

    , Article IEEE transactions on bio-medical engineering ; Volume 57, Issue 2 , September , 2010 , Pages 353-362 ; 15582531 (ISSN) Sayadi, O ; Shamsollahi, M. B ; Clifford, G. D ; Sharif University of Technology
    2010
    Abstract
    Detection and classification of ventricular complexes from the ECG is of considerable importance in Holter and critical care patient monitoring, being essential for the timely diagnosis of dangerous heart conditions. Accurate detection of premature ventricular contractions (PVCs) is particularly important in relation to life-threatening arrhythmias. In this paper, we introduce a model-based dynamic algorithm for tracking the ECG characteristic waveforms using an extended Kalman filter. The algorithm can work on single or multiple leads. A "polargram"--a polar representation of the signal--is introduced, which is constructed using the Bayesian estimations of the state variables. The polargram... 

    Urban water resources sustainable development: A global comparative appraisal

    , Article Iranian Journal of Science and Technology, Transaction B: Engineering ; Volume 34, Issue 1 , 2010 , Pages 93-106 ; 10286284 (ISSN) Vaziri, M ; Tolouei, R ; Sharif University of Technology
    2010
    Abstract
    The challenges of water resources sustainable development are enormous. Around the globe, the increasing use of water coupled with environmental deterioration calls for sustainable development of the limited water resources. As a significant part of the world's population still lacks access to safe water and adequate sanitation, and as global urbanization continues to increase, continuous, comprehensive, coordinated and cooperative water resources management is required for the sustainable future of urban areas. The objective of this study was to assess water resources sustainable development for selected urban areas around the world. Using centralized databases of international agencies for... 

    ECG segmentation and fiducial point extraction using multi hidden Markov model

    , Article Computers in Biology and Medicine ; Volume 79 , 2016 , Pages 21-29 ; 00104825 (ISSN) Akhbari, M ; Shamsollahi, M. B ; Sayadi, O ; Armoundas, A. A ; Jutten, C ; Sharif University of Technology
    Elsevier Ltd 
    Abstract
    In this paper, we propose a novel method for extracting fiducial points (FPs) of electrocardiogram (ECG) signals. We propose the use of multi hidden Markov model (MultiHMM) as opposed to the traditional use of Classic HMM. In the MultiHMM method, each segment of an ECG beat is represented by a separate ergodic continuous density HMM. Each HMM has different state number and is trained separately. In the test step, the log-likelihood of two consecutive HMMs is compared and a path is estimated, which shows the correspondence of each part of the ECG signal to the HMM with the maximum log-likelihood. Fiducial points are estimated from the obtained path. For performance evaluation, the Physionet... 

    Towards a knowledge-based approach for creating software architecture patterns ontology

    , Article 2016 International Conference on Engineering and MIS, ICEMIS 2016, 22 September 2016 through 24 September 2016 ; 2016 ; 9781509055791 (ISBN) Rabinia, Z ; Moaven, S ; Habibi, J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Software architecture patterns present solutions for software architecture problems and help to document architectural design decisions. Complexity and variability of patterns, and the required expertise for selecting an appropriate pattern, would cause some difficulties in utilizing architectural patterns. Using an ontology for registering architectural patterns is an efficient step in solving those problems. However, the mentioned difficulties make the process of constructing the architectural patterns ontology even more complicated. This paper proposes an approach that considers the construction of the architectural patterns ontology from four perspectives in order to overcome this... 

    Preventing database schema extraction by error message handling

    , Article Information Systems ; Volume 56 , 2016 , Pages 135-156 ; 03064379 (ISSN) Naghdi, S ; Amini, M ; Sharif University of Technology
    Elsevier Ltd 
    Abstract
    Nowadays, a large volume of an organization's sensitive data is stored in databases making them attractive to attackers. The useful information attackers try to obtain in the preliminary steps, is the database structure or schema. One of the popular approaches to infer and extract the schema of a database is to analyze the returned error messages from its DBMS. In this paper, we propose a framework to handle and modify the error messages automatically in order to prevent schema revealing. To this aim, after identifying and introducing an appropriate set of categories of error messages, each error message that is returned from a DBMS is placed in a proper category. According to the policy... 

    Fuzzy dynamic thermal rating of transmission lines

    , Article IEEE Transactions on Power Delivery ; Volume 27, Issue 4 , 2012 , Pages 1885-1892 ; 08858977 (ISSN) Shaker, H ; Fotuhi Firuzabad, M ; Aminifar, F ; Sharif University of Technology
    Abstract
    Dynamic thermal rating (DTR) of transmission system facilities is a way to maximally realize the equipment capacities while not threatening their health. With regards to transmission lines, the allowable current of conductors is forecasted based on the environmental situations expected in some forthcoming time periods. Due to the fact that weather conditions continuously vary, sampling points are very limited against many line spans, and the measurements have an inherent error, uncertainties must be appropriately included in the DTR determination. This paper adopts the fuzzy theory as a strong and simple tool to model uncertainties in the DTR calculation. Since DTR intends to determine the... 

    Quantization-unaware double JPEG compression detection

    , Article Journal of Mathematical Imaging and Vision ; Volume 54, Issue 3 , 2016 , Pages 269-286 ; 09249907 (ISSN) Taimori, A ; Razzazi, F ; Behrad, A ; Ahmadi, A ; Babaie Zadeh, M ; Sharif University of Technology
    Springer New York LLC 
    Abstract
    The current double JPEG compression detection techniques identify whether or not an JPEG image file has undergone the compression twice, by knowing its embedded quantization table. This paper addresses another forensic scenario in which the quantization table of a JPEG file is not explicitly or reliably known, which may compel the forensic analyst to blindly reveal the recompression clues. To do this, we first statistically analyze the theory behind quantized alternating current (AC) modes in JPEG compression and show that the number of quantized AC modes required to detect double compression is a function of both the image’s block texture and the compression’s quality level in a fresh... 

    Finding an unknown object by using piezeoelectric material: A finite element approach

    , Article 2nd International Conference on Environmental and Computer Science, ICECS 2009, 28 December 2009 through 30 December 2009, Dubai ; 2009 , Pages 156-160 ; 9780769539379 (ISBN) Azizi, A ; Durali, L ; Zareie, S ; Parvari Rad, F ; Sharif University of Technology
    IEEE  2009
    Abstract
    This paper presents a method to determine material of an unknown sample object. The main objective of this study is to design a database for specifying material of an object. We produce the database for different materials which is subjected to different forces. For this purpose we use a Polyvinidilene Fluoride (PVDF) sensor which is a piezoelectric material. Also we study the effect of changing place of sensor on our study. The detailed design was performed using finite element method analysis. Furthermore, if we have an object which we do not know its material by use of this database we can find out what this object is and how much its Yanoung's modules is. This study will be suitable for... 

    Wavelet transform and fusion of linear and non linear method for face recognition

    , Article DICTA 2009 - Digital Image Computing: Techniques and Applications, 1 December 2009 through 3 December 2009, Melbourne ; 2009 , Pages 296-302 ; 9780769538662 (ISBN) Mazloom, M ; Kasaei, S ; Neissi, N. A ; Sharif University of Technology
    Abstract
    This work presents a method to increase the face recognition accuracy using a combination of Wavelet, PCA, KPCA, and RBF Neural Networks. Preprocessing, feature extraction and classification rules are three crucial issues for face recognition. This paper presents a hybrid approach to employ these issues. For preprocessing and feature extraction steps, we apply a combination of wavelet transform, PCA and KPCA. During the classification stage, the Neural Network (RBF) is explored to achieve a robust decision in presence of wide facial variations. At first derives a feature vector from a set of downsampled wavelet representation of face images, then the resulting PCA-based linear features and... 

    Noise reduction algorithm for robust speech recognition using MLP neural network

    , Article PACIIA 2009 - 2009 2nd Asia-Pacific Conference on Computational Intelligence and Industrial Applications, 28 November 2009 through 29 November 2009 ; Volume 1 , 2009 , Pages 377-380 ; 9781424446070 (ISBN) Ghaemmaghami, M. P ; Razzazi, F ; Sameti, H ; Dabbaghchian, S ; BabaAli, B ; Sharif University of Technology
    Abstract
    We propose an efficient and effective nonlinear feature domain noise suppression algorithm, motivated by the minimum mean square error (MMSE) optimization criterion. Multi Layer Perceptron (MLP) neural network in the log spectral domain minimizes the difference between noisy and clean speech. By using this method as a pre-processing stage of a speech recognition system, the recognition rate in noisy environments is improved. We can extend the application of the system to different environments with different noises without re-training it. We need only to train the preprocessing stage with a small portion ofnoisy data which is created by artificially adding different types of noises from the... 

    Robust speech recognition using MLP neural network in log-spectral domain

    , Article IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2009, 14 December 2009 through 16 December 2009, Ajman ; 2009 , Pages 467-472 ; 9781424459506 (ISBN) Ghaemmaghami, M. P ; Sametit, H ; Razzazi, F ; BabaAli, B ; Dabbaghchiarr, S ; Sharif University of Technology
    Abstract
    In this paper, we have proposed an efficient and effective nonlinear feature domain noise suppression algorithm, motivated by the minimum mean square error (MMSE) optimization criterion. A Multi Layer Perceptron (MLP) neural network in the log spectral domain has been employed to minimize the difference between noisy and clean speech. By using this method, as a pre-processing stage of a speech recognition system, the recognition rate in noisy environments has been improved. We extended the application ofthe system to different environments with different noises without retraining HMMmodel. We trained the feature extraction stage with a small portion of noisy data which was created by...