Loading...
Search for: database
0.01 seconds
Total 196 records

    Spectral subtraction in likelihood-maximizing framework for robust speech recognition

    , Article INTERSPEECH 2008 - 9th Annual Conference of the International Speech Communication Association, Brisbane, QLD, 22 September 2008 through 26 September 2008 ; December , 2008 , Pages 980-983 ; 19909772 (ISSN) Baba Ali, B ; Sameti, H ; Safayani, M ; Sharif University of Technology
    2008
    Abstract
    Spectral Subtraction (SS), as a speech enhancement technique, originally designed for improving quality of speech signal judged by human listeners. it usually improve the quality and intelligibility of speech signals, while the speech recognition systems need compensation techniques capable of reducing the mismatch between the noisy speech features and the clean models. This paper proposes a novel approach for solving this problem by considering the SS and the speech recognizer as two interconnected components, sharing the common goal of improved speech recognition accuracy. The experimental evaluations on a real recorded database and the TIMIT database show that the proposed method can... 

    SkipTree: A Scalable range-queryable distributed data structure for multidimensional data

    , Article 16th International Symposium on Algorithms and Computation, ISAAC 2005, Hainan, 19 December 2005 through 21 December 2005 ; Volume 3827 LNCS , 2005 , Pages 298-307 ; 03029743 (ISSN); 3540309357 (ISBN); 9783540309352 (ISBN) Alaei, S ; Toossi, M ; Ghodsi, M ; Sharif University of Technology
    2005
    Abstract
    This paper presents the SkipTree, a new balanced, distributed data structure for storing data with multidimensional keys in a peer-to-peer network. The SkipTree supports range queries as well as single point queries which are routed in O(log n) hops. SkipTree is fully decentralized with each node being connected to O(logn) other nodes. The memory usage for maintaining the links at each node is O(log n log log n) on average and O(log2 n) in the worst case. Load balance is also guaranteed to be within a constant factor. © Springer-Verlag Berlin Heidelberg 2005  

    ShEMO: a large-scale validated database for Persian speech emotion detection

    , Article Language Resources and Evaluation ; Volume 53, Issue 1 , 2019 ; 1574020X (ISSN) Mohamad Nezami, O ; Jamshid Lou, P ; Karami, M ; Sharif University of Technology
    Springer Netherlands  2019
    Abstract
    This paper introduces a large-scale, validated database for Persian called Sharif Emotional Speech Database (ShEMO). The database includes 3000 semi-natural utterances, equivalent to 3 h and 25 min of speech data extracted from online radio plays. The ShEMO covers speech samples of 87 native-Persian speakers for five basic emotions including anger, fear, happiness, sadness and surprise, as well as neutral state. Twelve annotators label the underlying emotional state of utterances and majority voting is used to decide on the final labels. According to the kappa measure, the inter-annotator agreement is 64% which is interpreted as “substantial agreement”. We also present benchmark results... 

    ShEMO: a large-scale validated database for persian speech emotion detection

    , Article Language Resources and Evaluation ; 2018 ; 1574020X (ISSN) Nezami, O. M ; Jamshid Lou, P ; Karami, M ; Sharif University of Technology
    Springer Netherlands  2018
    Abstract
    This paper introduces a large-scale, validated database for Persian called Sharif Emotional Speech Database (ShEMO). The database includes 3000 semi-natural utterances, equivalent to 3 h and 25 min of speech data extracted from online radio plays. The ShEMO covers speech samples of 87 native-Persian speakers for five basic emotions including anger, fear, happiness, sadness and surprise, as well as neutral state. Twelve annotators label the underlying emotional state of utterances and majority voting is used to decide on the final labels. According to the kappa measure, the inter-annotator agreement is 64% which is interpreted as “substantial agreement”. We also present benchmark results... 

    SFAVD: Sharif farsi audio visual database

    , Article IKT 2013 - 2013 5th Conference on Information and Knowledge Technology, Shiraz, Iran ; 2013 , Pages 417-421 ; 9781467364904 (ISBN) Naraghi, Z ; Jamzad, M ; Sharif University of Technology
    2013
    Abstract
    With increasing use of computers in everyday life, improved communication between machines and human is needed. To make a right communication and understand a humankind face which is made in a graphical environment, implementing the audio and visual projects like lip reading, audio and visual speech recognition and lip making are needed. Lack of a complete audio and visual database for this application in Farsi language made us provide a new complete Farsi database for this project that is called SFAVD. It is a unique audio and visual database which in addition to considering Farsi conceptual and speech structure, it considers influence of speech on lip changes. This database is created for... 

    Semi-supervised parallel shared encoders for speech emotion recognition

    , Article Digital Signal Processing: A Review Journal ; Volume 118 , 2021 ; 10512004 (ISSN) Pourebrahim, Y ; Razzazi, F ; Sameti, H ; Sharif University of Technology
    Elsevier Inc  2021
    Abstract
    Supervised speech emotion recognition requires a large number of labeled samples that limit its use in practice. Due to easy access to unlabeled samples, a new semi-supervised method based on auto-encoders is proposed in this paper for speech emotion recognition. The proposed method performed the classification operation by extracting the information contained in unlabeled samples and combining it with the information in labeled samples. In addition, it employed maximum mean discrepancy cost function to reduce the distribution difference when the labeled and unlabeled samples were gathered from different datasets. Experimental results obtained on different emotional speech datasets... 

    Semantic log based replication model for optimizing heterogeneous DBMS interaction

    , Article 2009 1st International Conference on Advances in Databases, Knowledge, and Data Applications, DBKDA 2009, Gosier, 1 March 2009 through 6 March 2009 ; 2009 , Pages 138-142 ; 9780769535500 (ISBN) Farahmand Nejad, A ; Kharazmi, S ; Bayati, S ; Golmohammadi, S. K ; Abolhassani, H ; IARIA ; Sharif University of Technology
    2009
    Abstract
    The growth of database application usage requires DataBase Management Systems (DBMS) that are accessible, reliable, and dependable. One approach to handle these requirements is replication mechanism. Replication mechanism can be divided into various categories. Some related works consider two categories for replication mechanisms: heterogeneous and homogenous however majority of them classify them in three groups: physical, trigger-based and log based schema. Log-based replication mechanisms are the most widely used category among DBMS vendors. Adapting such approach for heterogeneous systems is a complex task, because of lack of log understanding in the other end. Semantic technologies... 

    Seizure detection in EEG signals: a comparison of different approaches

    , Article 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS'06, New York, NY, 30 August 2006 through 3 September 2006 ; 2006 , Pages 6724-6727 ; 05891019 (ISSN); 1424400325 (ISBN); 9781424400324 (ISBN) Mohseni, H. R ; Maghsoudi, A ; Shamsollahi, M. B ; Sharif University of Technology
    2006
    Abstract
    In this paper, the performance of traditional variance-based method for detection of epileptic seizures in EEG signals are compared with various methods based on nonlinear time series analysis, entropies, logistic regression, discrete wavelet transform and time frequency distributions. We noted that variance-based method in compare to the mentioned methods had the best result (100%) applied on the same database. © 2006 IEEE  

    Security of multi-adjustable join schemes: separations and implications

    , Article IEEE Transactions on Dependable and Secure Computing ; 2021 ; 15455971 (ISSN) Rafiee, M ; Khazaei, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Database management systems (DBMS) are one of cloud services with major applications in industry and business. In the use of such services, since the cloud service provider cannot be entrusted with the plain data, the databases are typically encrypted prior to outsourcing. One of the most challenging issues in designing these services is supporting SQL join queries on the encrypted database. The multi-adjustable join scheme (M-Adjoin) [Khazaei-Rafiee 2020], an extension of Adjoin [Popa-Zeldovich 2012 and Mironov-Segev-Shahaf 2017], is a symmetric-key primitive that supports the join queries for a list of column labels on an encrypted database. In previous works, the following security... 

    Security of multi-adjustable join schemes: separations and implications

    , Article IEEE Transactions on Dependable and Secure Computing ; Volume 19, Issue 4 , 2022 , Pages 2535-2545 ; 15455971 (ISSN) Rafiee, M ; Khazaei, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    Database management systems (DBMS) are one of cloud services with major applications in industry and business. In the use of such services, since the cloud service provider cannot be entrusted with the plain data, the databases are typically encrypted prior to outsourcing. One of the most challenging issues in designing these services is supporting SQL join queries on the encrypted database. The multi-adjustable join scheme (M-Adjoin) [Khazaei-Rafiee 2020], an extension of Adjoin [Popa-Zeldovich 2012 and Mironov-Segev-Shahaf 2017], is a symmetric-key primitive that supports the join queries for a list of column labels on an encrypted database. In previous works, the following security... 

    Security and searchability in secret sharing-based data outsourcing

    , Article International Journal of Information Security ; Volume 14, Issue 6 , November , 2015 , Pages 513-529 ; 16155262 (ISSN) Hadavi, M. A ; Jalili, R ; Damiani, E ; Cimato, S ; Sharif University of Technology
    Springer Verlag  2015
    Abstract
    A major challenge organizations face when hosting or moving their data to the Cloud is how to support complex queries over outsourced data while preserving their confidentiality. In principle, encryption-based systems can support querying encrypted data, but their high complexity has severely limited their practical use. In this paper, we propose an efficient yet secure secret sharing-based approach for outsourcing relational data to honest-but-curious data servers. The problem with using secret sharing in a data outsourcing scenario is how to efficiently search within randomly generated shares. We present multiple partitioning methods that enable clients to efficiently search among shared... 

    Secure untraceable off-line electronic cash system

    , Article Scientia Iranica ; Volume 20, Issue 3 , 2013 , Pages 637-646 ; 10263098 (ISSN) Baseri, Y ; Takhtaei, B ; Mohajeri, J ; Sharif University of Technology
    2013
    Abstract
    Eslami and Talebi (2011) [25] proposed an untraceable electronic cash scheme and claimed that their scheme protects the anonymity of customers, detects the identity of double spenders and provides the date attachability of coins to manage the bank database. In this paper, illustrating Eslami and Talebi's scheme, as one of the latest untraceable electronic cash schemes, and showing its weaknesses (in fulfilling the properties of perceptibility of double spender, unforgeability and date attainability of coins) and its faults (related to exchange protocol), we propose a new untraceable electronic cash scheme which is immune to the weaknesses of the former. Our scheme contains anonymity,... 

    Secure steganography using Gabor filter and neural networks

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 4920 LNCS , 2008 , Pages 33-49 ; 03029743 (ISSN); 3540690166 (ISBN); 9783540690160 (ISBN) Jamzad, M ; Zahedi Kermani, Z ; Sharif University of Technology
    2008
    Abstract
    The main concern of steganography (image hiding) methods is to embed a secret image into a host image in such a way that it causes minimum distortion to the host; to make it possible to extract a version of secret image from the host in such a way that the extracted version of secret image be as similar as possible to its original version (this should be possible even after usual attacks on the host image), and to provide ways of embedding secret images with larger size into a given host image. In this paper we propose a method that covers all above mentioned concerns by suggesting the idea of finding from an image data base, the most suitable host for a given secret image. In our method,... 

    School trip attraction modeling using neural & fuzzy-neural approaches

    , Article 8th International IEEE Conference on Intelligent Transportation Systems, Vienna, 13 September 2005 through 16 September 2005 ; Volume 2005 , 2005 , Pages 1068-1073 ; 0780392159 (ISBN); 9780780392151 (ISBN) Shafahi, Y ; Abrishami, E. S ; Sharif University of Technology
    2005
    Abstract
    Trip attraction has long been considered as a major element in trip demand estimation. Many models have been presented for this purpose. Models use socio-economic variables in order to predict trip attraction. Neural networks and neuro-fuzzy systems are suitable approaches to establish proper models. This paper develops neural and fuzzy-neural models to predict school trip attraction. Neural networks are organized in different architectures and the results have been compared in order to determine the best fitting one. Then an adaptive neural fuzzy inference system (ANFIS) is used to estimate number of school trip attraction. Different models were trained, validated and tested with a real... 

    Rule-based translation of specifications to executable code

    , Article ICIME 2010 - 2010 2nd IEEE International Conference on Information Management and Engineering, 16 April 2010 through 18 April 2010, Chengdu ; Volume 1 , 2010 , Pages 1-4 ; 9781424452644 (ISBN) Khalafinejad, S ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
    2010
    Abstract
    It is well known that the use of formal methods in the software development process results in a high-quality software product. However, since formal approaches are just reasoning mechanisms, they do not offer defined ordered steps and guidance for moving between them. Refinement is a technique for moving between specifications but it bears very little resemblance to the real process of software design. An automatic translator from a specification language to an executable code would be highly useful in maximizing the benefits of formal methods. In the domain of database applications, we propose a rule-based algorithm to translate software requirements written in Z specifications to... 

    Robust speech recognition using MLP neural network in log-spectral domain

    , Article IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2009, 14 December 2009 through 16 December 2009, Ajman ; 2009 , Pages 467-472 ; 9781424459506 (ISBN) Ghaemmaghami, M. P ; Sametit, H ; Razzazi, F ; BabaAli, B ; Dabbaghchiarr, S ; Sharif University of Technology
    Abstract
    In this paper, we have proposed an efficient and effective nonlinear feature domain noise suppression algorithm, motivated by the minimum mean square error (MMSE) optimization criterion. A Multi Layer Perceptron (MLP) neural network in the log spectral domain has been employed to minimize the difference between noisy and clean speech. By using this method, as a pre-processing stage of a speech recognition system, the recognition rate in noisy environments has been improved. We extended the application ofthe system to different environments with different noises without retraining HMMmodel. We trained the feature extraction stage with a small portion of noisy data which was created by... 

    Robust detection of premature ventricular contractions using a wave-based Bayesian framework

    , Article IEEE transactions on bio-medical engineering ; Volume 57, Issue 2 , September , 2010 , Pages 353-362 ; 15582531 (ISSN) Sayadi, O ; Shamsollahi, M. B ; Clifford, G. D ; Sharif University of Technology
    2010
    Abstract
    Detection and classification of ventricular complexes from the ECG is of considerable importance in Holter and critical care patient monitoring, being essential for the timely diagnosis of dangerous heart conditions. Accurate detection of premature ventricular contractions (PVCs) is particularly important in relation to life-threatening arrhythmias. In this paper, we introduce a model-based dynamic algorithm for tracking the ECG characteristic waveforms using an extended Kalman filter. The algorithm can work on single or multiple leads. A "polargram"--a polar representation of the signal--is introduced, which is constructed using the Bayesian estimations of the state variables. The polargram... 

    RIAL: Redundancy reducing inlining algorithm to map XML DTD to relations

    , Article 2008 International Conference on Computational Intelligence for Modelling Control and Automation, CIMCA 2008, Vienna, 10 December 2008 through 12 December 2008 ; July , 2008 , Pages 25-30 ; 9780769535142 (ISBN) Rafsanjani, A. J ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
    2008
    Abstract
    XML has emerged as a common standard for data exchange over the World Wide Web. One way to manage XML data is to use the power of relational databases for storing and querying them. So the hierarchical XML data should be mapped into flat relational structure. In this paper we propose an algorithm which maps DTD to relational schema and as well as content and structure it preserves the functional dependencies during the mapping process in order to produce relations with less redundancy. This is done by categorizing functional dependencies and introducing four rules to be applied to the relations created by the hybrid inlining algorithm according to each category. These rules will reduce... 

    Re-construction of the shut-down PM10 monitoring stations for the reliable assessment of PM10 in Berlin using fuzzy modelling and data transformation

    , Article Environmental Monitoring and Assessment ; Volume 189, Issue 3 , 2017 ; 01676369 (ISSN) Taheri Shahraiyni, H ; Sodoudi, S ; Kerschbaumer, A ; Cubasch, U ; Sharif University of Technology
    Springer International Publishing  2017
    Abstract
    A dense monitoring network is vital for the reliable assessment of PM10 in different parts of an urban area. In this study, a new idea is employed for the re-construction of the 20 shut-down PM10 monitoring stations of Berlin. It endeavours to find the non-linear relationship between the hourly PM10 concentration of both the still operating and the shut-down PM10 monitoring stations by using a fuzzy modelling technique, called modified active learning method (MALM). In addition, the simulations were performed by using not only raw PM10 databases but also log-transformed PM10 databases for skewness reduction. According to the results of hourly PM10 simulation (root mean square error about... 

    Recognizing combinations of facial action units with different intensity using a mixture of hidden Markov models and neural network

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7 April 2010 through 9 April 2010 ; Volume 5997 LNCS , April , 2010 , Pages 304-313 ; 03029743 (ISSN) ; 9783642121265 (ISBN) Khademi, M ; Manzuri Shalmani, M. T ; Kiapour, M. H ; Kiaei, A. A ; Sharif University of Technology
    2010
    Abstract
    Facial Action Coding System consists of 44 action units (AUs) and more than 7000 combinations. Hidden Markov models (HMMs) classifier has been used successfully to recognize facial action units (AUs) and expressions due to its ability to deal with AU dynamics. However, a separate HMM is necessary for each single AU and each AU combination. Since combinations of AU numbering in thousands, a more efficient method will be needed. In this paper an accurate real-time sequence-based system for representation and recognition of facial AUs is presented. Our system has the following characteristics: 1) employing a mixture of HMMs and neural network, we develop a novel accurate classifier, which can...