Loading...
Search for: database
0.007 seconds
Total 189 records

    A fundamental tradeoff between computation and communication in distributed computing

    , Article IEEE Transactions on Information Theory ; 2017 ; 00189448 (ISSN) Li, S ; Maddah Ali, M. A ; Yu, Q ; Avestimehr, A. S ; Sharif University of Technology
    Abstract
    How can we optimally trade extra computing power to reduce the communication load in distributed computing? We answer this question by characterizing a fundamental tradeoff between computation and communication in distributed computing, i.e., the two are inversely proportional to each other. More specifically, a general distributed computing framework, motivated by commonly used structures like MapReduce, is considered, where the overall computation is decomposed into computing a set of “Map” and “Reduce” functions distributedly across multiple computing nodes. A coded scheme, named “Coded Distributed Computing” (CDC), is proposed to demonstrate that increasing the computation load of the... 

    A location privacy-preserving method for spectrum sharing in database-driven cognitive radio networks

    , Article Wireless Personal Communications ; Volume 95, Issue 4 , 2017 , Pages 3687-3711 ; 09296212 (ISSN) Salami, Z ; Ahmadian Attari, M ; Jannati, H ; Aref, M. R ; Sharif University of Technology
    Springer New York LLC  2017
    Abstract
    The great attention to cognitive radio networks (CRNs) in recent years, as a revolutionary communication paradigm that aims to solve the problem of spectrum scarcity, prompts serious investigation on security issues of these networks. One important security concern in CRNs is the preservation of users location privacy, which is under the shadow of threat, especially in database-driven CRNs. To this end, in this paper, we propose a Location Privacy Preserving Database-Driven Spectrum-Sharing (L-PDS 2) protocol for sharing the spectrum between PUs and SUs in a database-driven CRN, while protecting location privacy of both primary and secondary users, simultaneously. We also present two... 

    Re-construction of the shut-down PM10 monitoring stations for the reliable assessment of PM10 in Berlin using fuzzy modelling and data transformation

    , Article Environmental Monitoring and Assessment ; Volume 189, Issue 3 , 2017 ; 01676369 (ISSN) Taheri Shahraiyni, H ; Sodoudi, S ; Kerschbaumer, A ; Cubasch, U ; Sharif University of Technology
    Springer International Publishing  2017
    Abstract
    A dense monitoring network is vital for the reliable assessment of PM10 in different parts of an urban area. In this study, a new idea is employed for the re-construction of the 20 shut-down PM10 monitoring stations of Berlin. It endeavours to find the non-linear relationship between the hourly PM10 concentration of both the still operating and the shut-down PM10 monitoring stations by using a fuzzy modelling technique, called modified active learning method (MALM). In addition, the simulations were performed by using not only raw PM10 databases but also log-transformed PM10 databases for skewness reduction. According to the results of hourly PM10 simulation (root mean square error about... 

    Processing Queries with Mathematical Expressions on Encrypted Outsourced Databases

    , M.Sc. Thesis Sharif University of Technology Naseri Boroujeni, Saeed (Author) ; Jalil, Rasool (Supervisor)
    Abstract
    The ever-increasing volume of data and the lack of computational and storage facilities have caused a managerial challenge to organizations. The existence of these challenges on the one hand and the increase of storage services on the other hand have compelled the organizations to delegate their storage and management of data to the server providers of cloud storage services. The outsourcing of data to servers obviates the need for purchasing exorbitant storage equipment and recruiting professional workforce in the organization. Since the organization’s data will be kept outside the organization’s ambience in case of using such services in form of outsourcing, and the data will not be under... 

    Flat-Start single-stage discriminatively trained hmm-based models for asr

    , Article IEEE/ACM Transactions on Audio Speech and Language Processing ; Volume 26, Issue 11 , 2018 , Pages 1949-1961 ; 23299290 (ISSN) Hadian, H ; Sameti, H ; Povey, D ; Khudanpur, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    In recent years, end-to-end approaches to automatic speech recognition have received considerable attention as they are much faster in terms of preparing resources. However, conventional multistage approaches, which rely on a pipeline of training hidden Markov models (HMM)-GMM models and tree-building steps still give the state-of-the-art results on most databases. In this study, we investigate flat-start one-stage training of neural networks using lattice-free maximum mutual information (LF-MMI) objective function with HMM for large vocabulary continuous speech recognition. We thoroughly look into different issues that arise in such a setup and propose a standalone system, which achieves... 

    Characterizing the rate-memory tradeoff in cache networks within a factor of 2

    , Article IEEE Transactions on Information Theory ; 2018 ; 00189448 (ISSN) Yu, Q ; Maddah Ali, M. A ; Avestimehr, A. S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    We consider a basic caching system, where a single server with a database of N files (e.g. movies) is connected to a set of K users through a shared bottleneck link. Each user has a local cache memory with a size of M files. The system operates in two phases. a placement phase, where each cache memory is populated up to its size from the database, and a following delivery phase, where each user requests a file from the database, and the server is responsible for delivering the requested contents. The objective is to design the two phases to minimize the load (peak or average) of the bottleneck link. We characterize the rate-memory tradeoff of the above caching system within a factor of... 

    Network and application-aware cloud service selection in peer-assisted environments

    , Article IEEE Transactions on Cloud Computing ; 2018 ; 21687161 (ISSN) Askarnejad, S ; Malekimajd, M ; Movaghar, A ; Sharif University of Technology
    Abstract
    There are a vast number of cloud service providers, which offer virtual machines (VMs) with different configurations. From the companies perspective, an appropriate selection of VMs is an important issue, as the proper service selection leads to improved productivity, higher efficiency, and lower cost. An effective service selection cannot be done without a systematic approach due to the modularity of requests, the conflicts between requirements, and the impact of network parameters. In this paper, we introduce an innovative framework, called PCA, to solve service selection problem in the hybrid environment of peer-assisted, public, and private clouds. PCA detects the conflicts between the... 

    A fundamental tradeoff between computation and communication in distributed computing

    , Article IEEE Transactions on Information Theory ; Volume 64, Issue 1 , 2018 , Pages 109-128 ; 00189448 (ISSN) Li, S ; Maddah Ali, M. A ; Yu, Q ; Salman Avestimehr, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    How can we optimally trade extra computing power to reduce the communication load in distributed computing? We answer this question by characterizing a fundamental tradeoff between computation and communication in distributed computing, i.e., the two are inversely proportional to each other. More specifically, a general distributed computing framework, motivated by commonly used structures like MapReduce, is considered, where the overall computation is decomposed into computing a set of “Map” and “Reduce” functions distributedly across multiple computing nodes. A coded scheme, named “coded distributed computing” (CDC), is proposed to demonstrate that increasing the computation load of the... 

    Improvements on the k-center problem for uncertain data extended abstract

    , Article Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems ; 27 May , 2018 , Pages 425-433 ; 9781450347068 (ISBN) Alipour, S ; Jafari, A ; Sharif University of Technology
    Association for Computing Machinery  2018
    Abstract
    In real applications, there are situations where we need to model some problems based on uncertain data. This leads us to define an uncertain model for some classical geometric optimization problems and propose algorithms to solve them. The assigned version of the k-center problem for n uncertain points in a metric space is studied in this paper. The main approach is to replace each uncertain point with a clever choice of a certain point. We argue that the k-center solution for these certain replacements of our uncertain points, is a good constant approximation factor for the original uncertain k-center problem. This approach enables us to present fast and simple algorithms that give... 

    Evaluation of a novel fuzzy sequential pattern recognition tool (fuzzy elastic matching machine) and its applications in speech and handwriting recognition

    , Article Applied Soft Computing Journal ; Volume 62 , January , 2018 , Pages 315-327 ; 15684946 (ISSN) Shahmoradi, S ; Bagheri Shouraki, S ; Sharif University of Technology
    Elsevier Ltd  2018
    Abstract
    Sequential pattern recognition has long been an important topic of soft computing research with a wide area of applications including speech and handwriting recognition. In this paper, the performance of a novel fuzzy sequential pattern recognition tool named “Fuzzy Elastic Matching Machine” has been investigated. This tool overcomes the shortcomings of the HMM including its inflexible mathematical structure and inconsistent mathematical assumptions with imprecise input data. To do so, “Fuzzy Elastic Pattern” was introduced as the basic element of FEMM. It models the elasticity property of input data using fuzzy vectors. A sequential pattern such as a word in speech or a piece of writing is... 

    Multi-join query optimization in bucket-based encrypted databases using an enhanced ant colony optimization algorithm

    , Article Distributed and Parallel Databases ; Volume 36, Issue 2 , 2018 , Pages 399-441 ; 09268782 (ISSN) Jafarinejad, M ; Amini, M ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    One of the organizations’ main concerns is to protect sensitive data in database systems, especially the ones outsourced to untrusted service providers. An effective solution for this issue is to employ database encryption methods. Among different encryption approaches, Bucket-based method has the advantage of balancing security and performance of database operations. However, generating false-positive results in executing queries is the main drawback of this method. On the other hand, multi-join queries are one of the most critical operations executed on these stored sensitive data. Hence, acceptable processing and response time in executing multi-join queries is required. In this paper, we... 

    Numerical modeling and simulation of drilling cutting transport in horizontal wells

    , Article Journal of Petroleum Exploration and Production Technology ; Volume 8, Issue 2 , 2018 , Pages 455-474 ; 21900558 (ISSN) Zakerian, A ; Sarafraz, S ; Tabzar, A ; Hemmati, N ; Shadizadeh, S. R ; Sharif University of Technology
    Springer Verlag  2018
    Abstract
    Cutting transport is an important goal in drilling operation especially in horizontal and deviated wells since it can cause problems such as stuck pipe, circulation loss and high torque and drag. To this end, this article focused on the affecting parameters on the cutting transport by computational fluid dynamic (CFD) modeling and real operational data. The effect of drilling fluid and cutting density on the pressure drop, deposit ratio and string stress on the cutting transport has been investigated. A systematic validation study is presented by comparing the simulation results against published experimental database. The results showed that by increasing two times of drilling fluid... 

    Automatic access control based on face and hand biometrics in a non-cooperative context

    , Article Proceedings - 2018 IEEE Winter Conference on Applications of Computer Vision Workshops, WACVW 2018 ; Volume 2018-January , 2018 , Pages 28-36 ; 9781538651889 (ISBN) Sabet Jahromi, M. N ; Bonderup, M. B ; Asadi Aghbolaghi, M ; Avots, E ; Nasrollahi, K ; Escalera, S ; Kasaei, S ; Moeslund, T. B ; Anbarjafari, G ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Automatic access control systems (ACS) based on the human biometrics or physical tokens are widely employed in public and private areas. Yet these systems, in their conventional forms, are restricted to active interaction from the users. In scenarios where users are not cooperating with the system, these systems are challenged. Failure in cooperation with the biometric systems might be intentional or because the users are incapable of handling the interaction procedure with the biometric system or simply forget to cooperate with it, due to for example, illness like dementia. This work introduces a challenging bimodal database, including face and hand information of the users when they... 

    The exact rate-memory tradeoff for caching with uncoded prefetching

    , Article IEEE Transactions on Information Theory ; Volume 64, Issue 2 , 2018 , Pages 1281-1296 ; 00189448 (ISSN) Yu, Q ; Maddah Ali, M. A ; Avestimehr, A. S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    We consider a basic cache network, in which a single server is connected to multiple users via a shared bottleneck link. The server has a database of files (content). Each user has an isolated memory that can be used to cache content in a prefetching phase. In a following delivery phase, each user requests a file from the database, and the server needs to deliver users' demands as efficiently as possible by taking into account their cache contents. We focus on an important and commonly used class of prefetching schemes, where the caches are filled with uncoded data. We provide the exact characterization of the rate-memory tradeoff for this problem, by deriving both the minimum average rate... 

    Using Web-GIS technology as a smart tool for resiliency management to monitor wind farms performances (Ganjeh site, Iran)

    , Article International Journal of Environmental Science and Technology ; 2018 ; 17351472 (ISSN) Aghajani, D ; Abbaspour, M ; Radfar, R ; Mohammadi, A ; Sharif University of Technology
    Center for Environmental and Energy Research and Studies  2018
    Abstract
    Considering the wide spread locations of wind farms in Iran, it is important to develop a suitable decision support system (DSS) to fulfill proper management of wind farms. Extensive literature survey indicates that there are no integrated forms of DSS to manage a set of wind farms. The existing wind farms are performing independently, and there is no practical method for exchanging the online data. DSS can contribute to optimal operation of wind farms, operation and maintenance scheduling, pricing policy, etc. In this study, a geographic information system and RETSCREEN software were linked to the designed DSS to achieve a more suitable result. Also, a huge number of data are constantly... 

    Multi-Query Optimization in Distributed Databases Using an Ants Colony-Based Algorithm

    , M.Sc. Thesis Sharif University of Technology Abazari Torghabeh, Reza (Author) ; Mirian Hosseinabadi, Hassan (Supervisor)
    Abstract
    One important problem in query optimization in centralized and decentralized databases is optimizing queries containing common sub-expressions, known as multi-query optimization. In processing these queries, the goal is to process a group of queries together and find a global execution plan with minimum cost for the query set. In most of researches which have approached this problem the focus were on exhaustive algorithms. Since size of the problem space for these algorithms grows exponential with query set size, these approaches are impractical. In this research we have presented six algorithms based on Ant Colony Optimization metaheuristic. We have compared the efficiency of these methods... 

    ShEMO: a large-scale validated database for persian speech emotion detection

    , Article Language Resources and Evaluation ; 2018 ; 1574020X (ISSN) Nezami, O. M ; Jamshid Lou, P ; Karami, M ; Sharif University of Technology
    Springer Netherlands  2018
    Abstract
    This paper introduces a large-scale, validated database for Persian called Sharif Emotional Speech Database (ShEMO). The database includes 3000 semi-natural utterances, equivalent to 3 h and 25 min of speech data extracted from online radio plays. The ShEMO covers speech samples of 87 native-Persian speakers for five basic emotions including anger, fear, happiness, sadness and surprise, as well as neutral state. Twelve annotators label the underlying emotional state of utterances and majority voting is used to decide on the final labels. According to the kappa measure, the inter-annotator agreement is 64% which is interpreted as “substantial agreement”. We also present benchmark results... 

    Learning of tree-structured Gaussian graphical models on distributed data under communication constraints

    , Article IEEE Transactions on Signal Processing ; Volume 67, Issue 1 , 2019 , Pages 17-28 ; 1053587X (ISSN) Tavassolipour, M ; Motahari, S. A ; Manzuri Shalmani, M. T ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, learning of tree-structured Gaussian graphical models from distributed data is addressed. In our model, samples are stored in a set of distributed machines where each machine has access to only a subset of features. A central machine is then responsible for learning the structure based on received messages from the other nodes. We present a set of communication-efficient strategies, which are theoretically proved to convey sufficient information for reliable learning of the structure. In particular, our analyses show that even if each machine sends only the signs of its local data samples to the central node, the tree structure can still be recovered with high accuracy. Our... 

    ECG fiducial point extraction using switching Kalman filter

    , Article Computer Methods and Programs in Biomedicine ; Volume 157 , 2018 , Pages 129-136 ; 01692607 (ISSN) Akhbari, M ; Montazeri Ghahjaverestan, N ; Shamsollahi, M. B ; Jutten, C ; Sharif University of Technology
    Elsevier Ireland Ltd  2018
    Abstract
    In this paper, we propose a novel method for extracting fiducial points (FPs) of the beats in electrocardiogram (ECG) signals using switching Kalman filter (SKF). In this method, according to McSharry's model, ECG waveforms (P-wave, QRS complex and T-wave) are modeled with Gaussian functions and ECG baselines are modeled with first order auto regressive models. In the proposed method, a discrete state variable called “switch” is considered that affects only the observation equations. We denote a mode as a specific observation equation and switch changes between 7 modes and corresponds to different segments of an ECG beat. At each time instant, the probability of each mode is calculated and... 

    A simplified fuzzy logic approach for materials selection in mechanical engineering design

    , Article Materials and Design ; Volume 30, Issue 3 , 2009 , Pages 687-697 ; 02641275 (ISSN) Sarfaraz Khabbaz, R ; Dehghan Manshadi, B ; Abedian, A ; Mahmudi, R ; Sharif University of Technology
    2009
    Abstract
    Material selection for mechanical designs is an important task. Different approaches have been proposed to fulfill this job, so far. However, most of them work well with only quantitatively measurable properties of materials. Also, due to a wide range of materials available, the selection space finds a fuzzy characteristic. Therefore, here a simplified fuzzy logic approach is introduced to provide a powerful tool for easy dealing with the qualitative properties of materials and the corresponding fuzzy space. With this approach the volume of mathematics involved with the conventional methods reduces, considerably. The results show an excellent match with the Manshadi's method. © 2008 Elsevier...