Loading...
Search for: database
0.014 seconds
Total 198 records

    An implementation of a CBIR system based on SVM learning scheme

    , Article Journal of Medical Engineering and Technology ; Volume 37, Issue 1 , 2013 , Pages 43-47 ; 03091902 (ISSN) Tarjoman, M ; Fatemizadeh, E ; Badie, K ; Sharif University of Technology
    2013
    Abstract
    Content-based image retrieval (CBIR) has been one of the most active areas of research. The retrieval principle of CBIR systems is based on visual features such as colour, texture and shape or the semantic meaning of the images. A CBIR system can be used to locate medical images in large databases. This paper presents a CBIR system for retrieving digital human brain magnetic resonance images (MRI) based on textural features and the support vector machine (SVM) learning method. This system can retrieve similar images from the database in two groups: normal and tumoural. This research uses the knowledge of the CBIR approach to the application of medical decision support and discrimination... 

    An interactive cbir system based on anfis learning scheme for human brain magnetic resonance images retrieval

    , Article Biomedical Engineering - Applications, Basis and Communications ; Volume 24, Issue 1 , 2012 , Pages 27-36 ; 10162372 (ISSN) Tarjoman, M ; Fatemizadeh, E ; Badie, K ; Sharif University of Technology
    2012
    Abstract
    Content-based image retrieval (CBIR) has turned into an important and active potential research field with the advance of multimedia and imaging technology. It makes use of image features, such as color, texture and shape, to index images with minimal human intervention. A CBIR system can be used to locate medical images in large databases. In this paper we propose a CBIR system which describes the methodology for retrieving digital human brain magnetic resonance images (MRI) based on textural features and the Adaptive neuro-fuzzy inference system (ANFIS) learning to retrieve similar images from database in two categories: normal and tumoral. A fuzzy classifier has been used, because of the... 

    A novel fuzzy approach to recognition of online persian handwriting

    , Article 5th International Conference on Intelligent Systems Design and Applications, ISDA '05, Wroclaw, 8 September 2005 through 10 September 2005 ; Volume 2005 , 2005 , Pages 268-273 ; 0769522866 (ISBN); 9780769522869 (ISBN) Baghshah, M. S ; Shouraki, S. B ; Kasaei, S ; Sharif University of Technology
    2005
    Abstract
    Fuzzy logic has proved to be a powerful tool to represent imprecise and irregular patterns. This paper presents a novel fuzzy approach for recognizing online Persian (Farsi) handwriting which is also useful for multi-writer environments. In this approach, the representation of handwriting parameters is accomplished by fuzzy linguistic modeling. The representative features are selected to describe the shape of tokens. Fuzzy linguistic terms provide robustness against handwriting variations. The purposed method was run on a database of Persian isolated handwritten characters and achieved a relatively high recognition rate. © 2005 IEEE  

    A novel fuzzy approach to speech recognition

    , Article Proceedings - HIS'04: 4th International Conference on Hybrid Intelligent Systems, Kitakyushu, 5 December 2004 through 8 December 2004 ; 2005 , Pages 340-345 ; 0769522912 (ISBN) Halavati, R ; Shouraki, S.B ; Eshraghi, M ; Alemzadeh, M ; Ziaie, P ; Ishikawa M ; Hashimoto S ; Paprzycki M ; Barakova E ; Yoshida K ; Koppen M ; Corne D.M ; Abraham A ; Sharif University of Technology
    2005
    Abstract
    This paper presents a novel approach to speech recognition using fuzzy modeling. The task begins with conversion of speech spectrogram into a linguistic description based on arbitrary colors and lengths. While phonemes are also described using these fuzzy measures, and recognition is done by normal fuzzy reasoning, a genetic algorithm optimizes phoneme definitions so that to classify samples into correct phonemes. The method is tested over a standard speech data base and the results are presented. © 2005 IEEE  

    A novel method to find appropriate ε for DBSCAN

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 24 March 2010 through 26 March 2010 ; Volume 5990 LNAI, Issue PART 1 , 2010 , Pages 93-102 ; 03029743 (ISSN) ; 3642121446 (ISBN) Esmaelnejad, J ; Habibi, J ; Hassas Yeganeh, S ; Sharif University of Technology
    2010
    Abstract
    Clustering is one of the most useful methods of data mining, in which a set of real or abstract objects are categorized into clusters. The DBSCAN clustering method, one of the most famous density based clustering methods, categorizes points in dense areas into same clusters. In DBSCAN a point is said to be dense if the ε-radius circular area around it contains at least MinPts points. To find such dense areas, region queries are fired. Two points are defined as density connected if the distance between them is less than ε and at least one of them is dense. Finally, density connected parts of the data set extracted as clusters. The significant issue of such a method is that its parameters (ε... 

    A robust free size OCR for omni-font persian/arabic printed document using combined MLP/SVM

    , Article 10th Iberoamerican Congress on Pattern Recognition, CIARP 2005, Havana, 15 November 2005 through 18 November 2005 ; Volume 3773 LNCS , 2005 , Pages 601-610 ; 03029743 (ISSN); 3540298509 (ISBN); 9783540298502 (ISBN) Pirsiavash, H ; Mehran, R ; Razzazi, F ; Sharif University of Technology
    2005
    Abstract
    Optical character recognition of cursive scripts present a number of challenging problems in both segmentation and recognition processes and this attracts many researches in the field of machine learning. This paper presents a novel approach based on a combination of MLP and SVM to design a trainable OCR for Persian/Arabic cursive documents. The implementation results on a comprehensive database show a high degree of accuracy which meets the requirements of commercial use. © Springer-Verlag Berlin Heidelberg 2005  

    AS5: A secure searchable secret sharing scheme for privacy preserving database outsourcing

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Pisa ; Volume 7731 LNCS , 2013 , Pages 201-216 ; 03029743 (ISSN) ; 9783642358890 (ISBN) Hadavi, M. A ; Damiani, E ; Jalili, R ; Cimato, S ; Ganjei, Z ; Sharif University of Technology
    2013
    Abstract
    Researchers have been studying security challenges of database outsourcing for almost a decade. Privacy of outsourced data is one of the main challenges when the "Database As a Service" model is adopted in the service oriented trend of the cloud computing paradigm. This is due to the insecurity of the network environment or even the untrustworthiness of the service providers. This paper proposes a method to preserve privacy of outsourced data based on Shamir's secret sharing scheme. We split attribute values into several parts and distribute them among untrusted servers. The problem of using secret sharing in data outsourcing scenario is how to search efficiently within the randomly... 

    A simplified fuzzy logic approach for materials selection in mechanical engineering design

    , Article Materials and Design ; Volume 30, Issue 3 , 2009 , Pages 687-697 ; 02641275 (ISSN) Sarfaraz Khabbaz, R ; Dehghan Manshadi, B ; Abedian, A ; Mahmudi, R ; Sharif University of Technology
    2009
    Abstract
    Material selection for mechanical designs is an important task. Different approaches have been proposed to fulfill this job, so far. However, most of them work well with only quantitatively measurable properties of materials. Also, due to a wide range of materials available, the selection space finds a fuzzy characteristic. Therefore, here a simplified fuzzy logic approach is introduced to provide a powerful tool for easy dealing with the qualitative properties of materials and the corresponding fuzzy space. With this approach the volume of mathematics involved with the conventional methods reduces, considerably. The results show an excellent match with the Manshadi's method. © 2008 Elsevier... 

    Assessment of modal transportation sustainability: Application of data envelopment and concordance analyses

    , Article Iranian Journal of Science and Technology, Transaction B: Engineering ; Volume 31, Issue 2 , 2007 , Pages 179-193 ; 03601307 (ISSN) Rassafi, A. A ; Vaziri, M ; Sharif University of Technology
    2007
    Abstract
    This study tries to characterize national transportation modes to assess balancing and sustainability. Using a pioneer measure for sustainable development (SD), and based on the conformity of the growths of all sectors with transportation modes, the countries are comparatively studied. The proposed measure, elasticity, for each pair of variables indicates the extent to which the two variables have been changing consistently. Indeed the elasticity values are measures of "harmonic development" reflecting sustainability. The study database consisted of key aspects of transportation sustainability in the form of national variables including transportation, economic, social and environmental... 

    A tale of two symmetrical tails: Structural and functional characteristics of palindromes in proteins

    , Article BMC Bioinformatics ; Volume 9 , 2008 ; 14712105 (ISSN) Sheari, A ; Kargar, M ; Katanforoush, A ; Arab, S ; Sadeghi, M ; Pezeshk, H ; Eslahchi, C ; Marashi, S. A ; Sharif University of Technology
    2008
    Abstract
    Background: It has been previously shown that palindromic sequences are frequently observed in proteins. However, our knowledge about their evolutionary origin and their possible importance is incomplete. Results: In this work, we tried to revisit this relatively neglected phenomenon. Several questions are addressed in this work. (1) It is known that there is a large chance of finding a palindrome in low complexity sequences (i.e. sequences with extreme amino acid usage bias). What is the role of sequence complexity in the evolution of palindromic sequences in proteins? (2) Do palindromes coincide with conserved protein sequences? If yes, what are the functions of these conserved segments?... 

    A unified approach for detection of induced epileptic seizures in rats using ECoG signals

    , Article Epilepsy and Behavior ; Volume 27, Issue 2 , 2013 , Pages 355-364 ; 15255050 (ISSN) Niknazar, M ; Mousavi, S. R ; Motaghi, S ; Dehghani, A ; Vosoughi Vahdat, B ; Shamsollahi, M. B ; Sayyah, M ; Noorbakhsh, S. M ; Sharif University of Technology
    2013
    Abstract
    Objective: Epileptic seizure detection is a key step for epilepsy assessment. In this work, using the pentylenetetrazole (PTZ) model, seizures were induced in rats, and ECoG signals in interictal, preictal, ictal, and postictal periods were recorded. The recorded ECoG signals were then analyzed to detect epileptic seizures in the epileptic rats. Methods: Two different approaches were considered in this work: thresholding and classification. In the thresholding approach, a feature is calculated in consecutive windows, and the resulted index is tracked over time and compared with a threshold. The moment the index crosses the threshold is considered as the moment of seizure onset. In the... 

    Automatic access control based on face and hand biometrics in a non-cooperative context

    , Article Proceedings - 2018 IEEE Winter Conference on Applications of Computer Vision Workshops, WACVW 2018 ; Volume 2018-January , 2018 , Pages 28-36 ; 9781538651889 (ISBN) Sabet Jahromi, M. N ; Bonderup, M. B ; Asadi Aghbolaghi, M ; Avots, E ; Nasrollahi, K ; Escalera, S ; Kasaei, S ; Moeslund, T. B ; Anbarjafari, G ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Automatic access control systems (ACS) based on the human biometrics or physical tokens are widely employed in public and private areas. Yet these systems, in their conventional forms, are restricted to active interaction from the users. In scenarios where users are not cooperating with the system, these systems are challenged. Failure in cooperation with the biometric systems might be intentional or because the users are incapable of handling the interaction procedure with the biometric system or simply forget to cooperate with it, due to for example, illness like dementia. This work introduces a challenging bimodal database, including face and hand information of the users when they... 

    BIM and machine learning in seismic damage prediction for non-structural exterior infill walls

    , Article Automation in Construction ; Volume 139 , 2022 ; 09265805 (ISSN) Mousavi, M ; TohidiFar, A ; Alvanchi, A ; Sharif University of Technology
    Elsevier B.V  2022
    Abstract
    Despite the seismic vulnerability of non-structural Exterior Infill Walls (EIWs), their resilient design has received minimal attention. This study addresses the issue by proposing a novel framework for predicting possible damage states of EIWs. The framework benefits from an automated combination of Building Information Modeling as a visualized 3D database of the building's components and the Machine Learning classification as the prediction engine. The framework's applicability is studied in a Proof of Concept example of the exterior walls of the buildings damaged in the 2017 earthquake in Kermanshah, Iran. The Extremely Randomized Trees classifier produced the best results for predicting... 

    CANCERSIGN: a user-friendly and robust tool for identification and classification of mutational signatures and patterns in cancer genomes

    , Article Scientific Reports ; Volume 10, Issue 1 , 2020 Bayati, M ; Rabiee, H. R ; Mehrbod, M ; Vafaee, F ; Ebrahimi, D ; Forrest, A. R. R ; Alinejad Rokny, H ; Sharif University of Technology
    Nature Research  2020
    Abstract
    Analysis of cancer mutational signatures have been instrumental in identification of responsible endogenous and exogenous molecular processes in cancer. The quantitative approach used to deconvolute mutational signatures is becoming an integral part of cancer research. Therefore, development of a stand-alone tool with a user-friendly interface for analysis of cancer mutational signatures is necessary. In this manuscript we introduce CANCERSIGN, which enables users to identify 3-mer and 5-mer mutational signatures within whole genome, whole exome or pooled samples. Additionally, this tool enables users to perform clustering on tumor samples based on the proportion of mutational signatures in... 

    Characterization of essential oil components of Iranian geranium oil using gas chromatography-mass spectrometry combined with chemometric resolution techniques

    , Article Journal of Chromatography A ; Volume 1114, Issue 1 , 2006 , Pages 154-163 ; 00219673 (ISSN) Jalali Heravi, M ; Zekavat, B ; Sereshti, H ; Sharif University of Technology
    2006
    Abstract
    The essential oil components of geranium oil cultivated in center of Iran were identified and determined using gas chromatography-mass spectrometry data combined with the chemometric resolution techniques. A total of 61 components accounting for 91.51% were identified using similarity searches between the mass spectra and MS database. This number was extended to 85 components using chemometric techniques. Various chemometric methods such as morphological scores, simplified Borgen method (SBM) and fixed size moving window evolving factor analysis (FSMWEFA) were used for determining the number of components, pure variables, zero concentration and selective regions. Then the overlapping peak... 

    Characterizing the rate-memory tradeoff in cache networks within a factor of 2

    , Article IEEE Transactions on Information Theory ; 2018 ; 00189448 (ISSN) Yu, Q ; Maddah Ali, M. A ; Avestimehr, A. S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    We consider a basic caching system, where a single server with a database of N files (e.g. movies) is connected to a set of K users through a shared bottleneck link. Each user has a local cache memory with a size of M files. The system operates in two phases. a placement phase, where each cache memory is populated up to its size from the database, and a following delivery phase, where each user requests a file from the database, and the server is responsible for delivering the requested contents. The objective is to design the two phases to minimize the load (peak or average) of the bottleneck link. We characterize the rate-memory tradeoff of the above caching system within a factor of... 

    Characterizing the rate-memory tradeoff in cache networks within a factor of 2

    , Article IEEE Transactions on Information Theory ; Volume 65, Issue 1 , 2019 , Pages 647-663 ; 00189448 (ISSN) Yu, Q ; Maddah Ali, M. A ; Avestimehr, A. S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    We consider a basic caching system, where a single server with a database of N files (e.g., movies) is connected to a set of K users through a shared bottleneck link. Each user has a local cache memory with a size of M files. The system operates in two phases: A placement phase, where each cache memory is populated up to its size from the database, and a following delivery phase, where each user requests a file from the database, and the server is responsible for delivering the requested contents. The objective is to design the two phases to minimize the load (peak or average) of the bottleneck link. We characterize the rate-memory tradeoff of the above caching system within a factor of... 

    Combination of wavelet and PCA for face recognition

    , Article 2006 IEEE GCC Conference, GCC 2006, Manama, 20 March 2006 through 22 March 2006 ; 2006 ; 9780780395909 (ISBN) Mazloom, M ; Kasaei, S ; Sharif University of Technology
    2006
    Abstract
    This work presents a method to increase the face recognition accuracy using a combination of Wavelet, PCA, and Neural Networks. Preprocessing, feature extraction and classification rules are three crucial issues for face recognition. This paper presents a hybrid approach to employ these issues. For preprocessing and feature extraction steps, we apply a combination of wavelet transform and PCA. During the classification stage, the Neural Network (MLP) is explored to achieve a robust decision in presence of wide facial variations. The computational load of the proposed method is greatly reduced as comparing with the original PCA based method on the Yale and ORL face databases. Moreover, the... 

    Composition of MPEG-7 color and edge descriptors based-on human vision perception

    , Article Visual Communications and Image Processing 2005, Beijing, 12 July 2005 through 15 July 2005 ; Volume 5960, Issue 1 , 2005 , Pages 568-575 ; 0277786X (ISSN) Lakdashti, A ; Kialashaki, N ; Ghonoodi, A ; Soltani, M ; Sharif University of Technology
    2005
    Abstract
    In content based image retrieval similarity measurement is one of the most important aspects in a large image database for efficient search and retrieval to find the best answer for a user query. Color and texture are among the more expressive of the visual features. Considerable work has been done in designing efficient descriptors for these features for applications such as similarity retrieval. The MPEG-7 specifies a standard set of descriptors for color, texture and shape. In the Human Vision System (HVS), visual information is not perceived equally; some information may be more important than other information. The purpose of this paper is to show how the MPEG-7 descriptor based on... 

    Construction and application of SVM model and wavelet-PCA for face recognition

    , Article 2009 International Conference on Computer and Electrical Engineering, , 28 December 2009 through 30 December 2009, Dubai ; Volume 1 , 2009 , Pages 391-398 ; 9780769539256 (ISBN) Mazloom, M ; Kasaei, S ; Alemi, H ; Sharif University of Technology
    Abstract
    This work presents a method to increase the face recognition accuracy using a combination of Wavelet, PCA, and SVM. Pre-processing, feature extraction and classification rules are three crucial issues for face recognition. This paper presents a hybrid approach to employ these issues. For pre-processing and feature extraction steps, we apply a combination of wavelet transform and PCA. During the classification stage, SVMs incorporated with a binary tree recognition strategy are applied to tackle the multi-class face recognition problem to achieve a robust decision in presence of wide facial variations. The binary trees extend naturally, the pairwise discrimination capability of the SVMs to...