Loading...
Search for: database
0.01 seconds
Total 196 records

    Randomized algorithms for comparison-based search

    , Article Advances in Neural Information Processing Systems 24: 25th Annual Conference on Neural Information Processing Systems 2011, NIPS 2011, 12 December 2011 through 14 December 2011 ; December , 2011 ; 9781618395993 (ISBN) Tschopp, D ; Diggavi, S ; Delgosha, P ; Mohajer, S ; Sharif University of Technology
    Abstract
    This paper addresses the problem of finding the nearest neighbor (or one of the R-nearest neighbors) of a query object q in a database of n objects, when we can only use a comparison oracle. The comparison oracle, given two reference objects and a query object, returns the reference object most similar to the query object. The main problem we study is how to search the database for the nearest neighbor (NN) of a query, while minimizing the questions. The difficulty of this problem depends on properties of the underlying database. We show the importance of a characterization: combinatorial disorder D which defines approximate triangle inequalities on ranks. We present a lower bound of Ω(Dlog... 

    Quantization-unaware double JPEG compression detection

    , Article Journal of Mathematical Imaging and Vision ; Volume 54, Issue 3 , 2016 , Pages 269-286 ; 09249907 (ISSN) Taimori, A ; Razzazi, F ; Behrad, A ; Ahmadi, A ; Babaie Zadeh, M ; Sharif University of Technology
    Springer New York LLC 
    Abstract
    The current double JPEG compression detection techniques identify whether or not an JPEG image file has undergone the compression twice, by knowing its embedded quantization table. This paper addresses another forensic scenario in which the quantization table of a JPEG file is not explicitly or reliably known, which may compel the forensic analyst to blindly reveal the recompression clues. To do this, we first statistically analyze the theory behind quantized alternating current (AC) modes in JPEG compression and show that the number of quantized AC modes required to detect double compression is a function of both the image’s block texture and the compression’s quality level in a fresh... 

    Private set operations over encrypted cloud dataset and applications

    , Article Computer Journal ; Volume 64, Issue 8 , 2021 , Pages 1145-1162 ; 00104620 (ISSN) Rafiee, M ; Khazaei, S ; Sharif University of Technology
    Oxford University Press  2021
    Abstract
    We introduce the notion of private set operations (PSO) as a symmetric-key primitive in the cloud scenario, where a client securely outsources his dataset to a cloud service provider and later privately issues queries in the form of common set operations. We define a syntax and security notion for PSO and propose a general construction that satisfies it. There are two main ingredients to our PSO scheme: an adjustable join (Adjoin) scheme (MIT-CSAIL-TR-2012-006 (2012) Cryptographic treatment of CryptDB's adjustable join. http://people.csail.mit.edu/nickolai/papers/popa-join-tr.pdf) and a tuple set (TSet) scheme (Cash, D., Jarecki, S., Jutla, C. S., Krawczyk, H., Rosu, M.-C., and Steiner, M.... 

    Private Inner product retrieval for distributed machine learning

    , Article 2019 IEEE International Symposium on Information Theory, ISIT 2019, 7 July 2019 through 12 July 2019 ; Volume 2019-July , 2019 , Pages 355-359 ; 21578095 (ISSN); 9781538692912 (ISBN) Mousavi, M. H ; Maddah Ali, M. A ; Mirmohseni, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we argue that in many basic algorithms for machine learning, including support vector machine (SVM) for classification, principal component analysis (PCA) for dimensionality reduction, and regression for dependency estimation, we need the inner products of the data samples, rather than the data samples themselves.Motivated by the above observation, we introduce the problem of private inner product retrieval for distributed machine learning, where we have a system including a database of some files, duplicated across some non-colluding servers. A user intends to retrieve a subset of specific size of the set of the inner product of every pair of data items in the database with... 

    Preventing database schema extraction by error message handling

    , Article Information Systems ; Volume 56 , 2016 , Pages 135-156 ; 03064379 (ISSN) Naghdi, S ; Amini, M ; Sharif University of Technology
    Elsevier Ltd 
    Abstract
    Nowadays, a large volume of an organization's sensitive data is stored in databases making them attractive to attackers. The useful information attackers try to obtain in the preliminary steps, is the database structure or schema. One of the popular approaches to infer and extract the schema of a database is to analyze the returned error messages from its DBMS. In this paper, we propose a framework to handle and modify the error messages automatically in order to prevent schema revealing. To this aim, after identifying and introducing an appropriate set of categories of error messages, each error message that is returned from a DBMS is placed in a proper category. According to the policy... 

    Predictive equations for drift ratio and damage assessment of RC shear walls using surface crack patterns

    , Article Engineering Structures ; Volume 190 , 2019 , Pages 410-421 ; 01410296 (ISSN) Momeni, H ; Dolatshahi, K. M ; Sharif University of Technology
    Elsevier Ltd  2019
    Abstract
    The purpose of this paper is to quantify the extent of damage of rectangular reinforced concrete shear walls after an earthquake using surface crack patterns. One of the most important tasks after an earthquake is to assess the safety and classify the performance level of buildings. This assessment is usually performed by visual inspection that is prone to significant errors. In this research, an extensive database on the images of damaged rectangular reinforced concrete shear walls is collected from the literature. This database includes more than 200 images from experimental quasi-static cyclic tests. Using the concept of fractal geometry, several probabilistic models are developed by... 

    Prediction of Paroxysmal Atrial Fibrillation using Empirical Mode Decomposition and RR intervals

    , Article 2012 IEEE-EMBS Conference on Biomedical Engineering and Sciences, IECBES 2012, 17 December 2012 through 19 December 2012 ; December , 2012 , Pages 750-754 ; 9781467316668 (ISBN) Sabeti, E ; Shamsollahi, M. B ; Afdideh, F ; Sharif University of Technology
    2012
    Abstract
    In this paper, we proposed a method based on time-frequency dependent features extracted from Intrinsic Mode Functions (IMFs) and physiological feature such as the number of premature beats (PBs) to predict the onset of Paroxysmal Atrial Fibrillation (PAF) by using electrocardiogram (ECG) signal. To extract IMFs, we used Empirical Mode Decomposition (EMD). In order to predict PAF, we used variance of IMFs of signals, the area under the absolute of IMF curves and the number of PBs, since increasing of all of these parameters are a clear sign of PAF occurrence. We used clinical database which was provided for the 2001 Computer in Cardiology Challenge (CinC). The test set of this database... 

    Parallel nonlinear analysis of weighted brain's gray and white matter images for Alzheimer's dementia diagnosis

    , Article Conference proceedings : ... Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Conference ; 2010 , Pages 5573-5576 ; 1557170X (ISSN) Razavian, S. M ; Torabi, M ; Kim, K ; Sharif University of Technology
    2010
    Abstract
    In this study, we are proposing a novel nonlinear classification approach to discriminate between Alzheimer's Disease (AD) and a control group using T1-weighted and T2-weighted Magnetic Resonance Images (MRI's) of brain. Since T1-weighted images and T2-weighted images have inherent physical differences, obviously each of them has its own particular medical data and hence, we extracted some specific features from each. Then the variations of the relevant eigenvalues of the extracted features were tracked to pick up the most informative ones. The final features were assigned to two parallel systems to be nonlinearly categorized. Considering the fact that AD defects the white and gray regions... 

    Pan-cancer analysis of microRNA expression profiles highlights microRNAs enriched in normal body cells as effective suppressors of multiple tumor types: A study based on TCGA database

    , Article PLoS ONE ; Volume 17, Issue 4 April , 2022 ; 19326203 (ISSN) Moradi, S ; Kamal, A ; Es, H. A ; Farhadi, F ; Ebrahimi, M ; Chitsaz, H ; Sharifi Zarchi, A ; Baharvand, H ; Sharif University of Technology
    Public Library of Science  2022
    Abstract
    Background MicroRNAs (miRNAs) are frequently deregulated in various types of cancer. While antisense oligonucleotides are used to block oncomiRs, delivery of tumour-suppressive miRNAs holds great potential as a potent anti-cancer strategy. Here, we aim to determine, and functionally analyse, miRNAs that are lowly expressed in various types of tumour but abundantly expressed in multiple normal tissues. Methods The miRNA sequencing data of 14 cancer types were downloaded from the TCGA dataset. Significant differences in miRNA expression between tumor and normal samples were calculated using limma package (R programming). An adjusted p value < 0.05 was used to compare normal versus tumor miRNA... 

    Optimal sensors layout design based on reference-free damage localization with lamb wave propagation

    , Article Structural Control and Health Monitoring ; Volume 27, Issue 4 , 10 January , 2020 Keshavarz Motamed, P ; Abedian, A ; Nasiri, M ; Sharif University of Technology
    John Wiley and Sons Ltd  2020
    Abstract
    This study presents a new approach for designing optimal sensors layout based on accuracy of defect mapping. It is obtained from combination of the reference-free damage detection technique and the probability-based diagnostic imaging method. Considering damage indices based on continuous wavelet transform of sensors signals, the core of this study involves with development of a database of continuous wavelet transform features of a crack. In fact, the database contains the data from 594 different states in crack positions, orientations, and the considered sensing path lengths. Eventually, this database is used for localization of damage by interpolating the stored data collected from the... 

    Numerical-probabilistic modeling of the liquefaction-induced free fields settlement

    , Article Soil Dynamics and Earthquake Engineering ; Volume 149 , 2021 ; 02677261 (ISSN) Sadeghi, H ; Pak, A ; Pakzad, A ; Ayoubi, P ; Sharif University of Technology
    Elsevier Ltd  2021
    Abstract
    Liquefaction is a phenomenon through which saturated sandy soil loses its shear strength and turns into a liquefied state. One of the most detrimental consequences of liquefaction is the reconsolidation volumetric settlements after the earthquakes, which is due to the dissipation of excess pore pressure caused by earthquakes. Severe floods can follow these settlements in free fields such as grounds close to the sea or rivers. Several researchers studied this phenomenon using data obtained from experiments in the lab or observations in the fields. Previous works were mainly based on a limited number of experimental observations and considered loadings and boundary conditions that were... 

    Numerical modeling and simulation of drilling cutting transport in horizontal wells

    , Article Journal of Petroleum Exploration and Production Technology ; Volume 8, Issue 2 , 2018 , Pages 455-474 ; 21900558 (ISSN) Zakerian, A ; Sarafraz, S ; Tabzar, A ; Hemmati, N ; Shadizadeh, S. R ; Sharif University of Technology
    Springer Verlag  2018
    Abstract
    Cutting transport is an important goal in drilling operation especially in horizontal and deviated wells since it can cause problems such as stuck pipe, circulation loss and high torque and drag. To this end, this article focused on the affecting parameters on the cutting transport by computational fluid dynamic (CFD) modeling and real operational data. The effect of drilling fluid and cutting density on the pressure drop, deposit ratio and string stress on the cutting transport has been investigated. A systematic validation study is presented by comparing the simulation results against published experimental database. The results showed that by increasing two times of drilling fluid... 

    Noise reduction algorithm for robust speech recognition using MLP neural network

    , Article PACIIA 2009 - 2009 2nd Asia-Pacific Conference on Computational Intelligence and Industrial Applications, 28 November 2009 through 29 November 2009 ; Volume 1 , 2009 , Pages 377-380 ; 9781424446070 (ISBN) Ghaemmaghami, M. P ; Razzazi, F ; Sameti, H ; Dabbaghchian, S ; BabaAli, B ; Sharif University of Technology
    Abstract
    We propose an efficient and effective nonlinear feature domain noise suppression algorithm, motivated by the minimum mean square error (MMSE) optimization criterion. Multi Layer Perceptron (MLP) neural network in the log spectral domain minimizes the difference between noisy and clean speech. By using this method as a pre-processing stage of a speech recognition system, the recognition rate in noisy environments is improved. We can extend the application of the system to different environments with different noises without re-training it. We need only to train the preprocessing stage with a small portion ofnoisy data which is created by artificially adding different types of noises from the... 

    Neural network and neuro-fuzzy assessments for scour depth around bridge piers

    , Article Engineering Applications of Artificial Intelligence ; Volume 20, Issue 3 , 2007 , Pages 401-414 ; 09521976 (ISSN) Bateni, S. M ; Borghei, S. M ; Jeng, D. S ; Sharif University of Technology
    2007
    Abstract
    The mechanism of flow around a pier structure is so complicated that it is difficult to establish a general empirical model to provide accurate estimation for scour. Interestingly, each of the proposed empirical formula yields good results for a particular data set. Hence, in this study, alternative approaches, artificial neural networks (ANNs) and adaptive neuro-fuzzy inference system (ANFIS), are proposed to estimate the equilibrium and time-dependent scour depth with numerous reliable data base. Two ANN models, multi-layer perception using back-propagation algorithm (MLP/BP) and radial basis using orthogonal least-squares algorithm (RBF/OLS), were used. The equilibrium scour depth was... 

    Network and application-aware cloud service selection in peer-assisted environments

    , Article IEEE Transactions on Cloud Computing ; 2018 ; 21687161 (ISSN) Askarnejad, S ; Malekimajd, M ; Movaghar, A ; Sharif University of Technology
    Abstract
    There are a vast number of cloud service providers, which offer virtual machines (VMs) with different configurations. From the companies perspective, an appropriate selection of VMs is an important issue, as the proper service selection leads to improved productivity, higher efficiency, and lower cost. An effective service selection cannot be done without a systematic approach due to the modularity of requests, the conflicts between requirements, and the impact of network parameters. In this paper, we introduce an innovative framework, called PCA, to solve service selection problem in the hybrid environment of peer-assisted, public, and private clouds. PCA detects the conflicts between the... 

    Multi-join query optimization in bucket-based encrypted databases using an enhanced ant colony optimization algorithm

    , Article Distributed and Parallel Databases ; Volume 36, Issue 2 , 2018 , Pages 399-441 ; 09268782 (ISSN) Jafarinejad, M ; Amini, M ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    One of the organizations’ main concerns is to protect sensitive data in database systems, especially the ones outsourced to untrusted service providers. An effective solution for this issue is to employ database encryption methods. Among different encryption approaches, Bucket-based method has the advantage of balancing security and performance of database operations. However, generating false-positive results in executing queries is the main drawback of this method. On the other hand, multi-join queries are one of the most critical operations executed on these stored sensitive data. Hence, acceptable processing and response time in executing multi-join queries is required. In this paper, we... 

    Mobile positioning using enhanced signature database method and error reduction in location grid

    , Article Proceedings - 2009 WRI International Conference on Communications and Mobile Computing, CMC 2009, 6 January 2009 through 8 January 2009, Kunming, Yunnan ; Volume 2 , 2009 , Pages 175-179 ; 9780769535012 (ISBN) Manzuri, M. T ; Naderi, A. M ; Sharif University of Technology
    2009
    Abstract
    Today, communication science is advancing very rapidly; one of these advances is mobile location determination which means finding position of a mobile station. There are some methods to location determination; one of these methods is Signal Strength (Power of Arrivals). In this research, Mobile Location Determination using enhanced signature database method in a Location grid will be introduced; several ways for positioning error reduction will also be described. © 2009 IEEE  

    Mental arousal level recognition competition on the shared database

    , Article 27th Iranian Conference on Electrical Engineering, ICEE 2019, 30 April 2019 through 2 May 2019 ; 2019 , Pages 1730-1736 ; 9781728115085 (ISBN) Saidi, M ; Rezania, S ; Khazaei, E ; Taghibeyglou, B ; Hashemi, S. S ; Kaveh, R ; Abootalebi, V ; Bagheri, S ; Homayounfar, M ; Asadi, M ; Mohammadian, A ; Mozafari, M ; Hasanzadeh, N ; DIni, H ; Sarvi, H. M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    This paper presents the results of the shared task with the aim of arousal level recognition for the competition held in conjunction with the 27th Iranian Conference on Electrical Engineering (ICEE 2019). A database annotated with arousal level labels released by Research Center for Development of Advanced Technologies. The contest was held on arousal database according to a defined protocol. Three teams were able to enter into the final stage of the competition according to compare their performance measure with the baseline method. The baseline method is proposed by the data owner. The aim of this paper is outlining the database, protocol design, and providing an overview of top-ranked... 

    MaxHiC: A robust background correction model to identify biologically relevant chromatin interactions in Hi-C and capture Hi-C experiments

    , Article PLoS Computational Biology ; Volume 18, Issue 6 , 2022 ; 1553734X (ISSN) Alinejad Rokny, H ; Modegh, R. G ; Rabiee, H. R ; Sarbandi, E. R ; Rezaie, N ; Tam, K. T ; Forrest, A. R. R ; Sharif University of Technology
    Public Library of Science  2022
    Abstract
    Hi-C is a genome-wide chromosome conformation capture technology that detects interactions between pairs of genomic regions and exploits higher order chromatin structures. Conceptually Hi-C data counts interaction frequencies between every position in the genome and every other position. Biologically functional interactions are expected to occur more frequently than transient background and artefactual interactions. To identify biologically relevant interactions, several background models that take biases such as distance, GC content and mappability into account have been proposed. Here we introduce MaxHiC, a background correction tool that deals with these complex biases and robustly... 

    Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network

    , Article ISeCure ; Volume 14, Issue 2 , 2022 , Pages 215-227 ; 20082045 (ISSN) Salami, Z ; Ahmadian Attari, M ; Aref, M. R ; Jannati, H ; Sharif University of Technology
    Iranian Society of Cryptology  2022
    Abstract
    Since their introduction, Cognitive Radio Networks (CRN), as a new solution to the problem of spectrum scarcity, have received great attention from the research society. An important field in database-driven CRN studies is pivoted on their security issues. A critical issue in this context is user’s location privacy, which is potentially under serious threat. The query process by secondary users (SU) from the database is one of the points where the problem rises. In this paper, we propose a Privacy-Preserving Query Process (PPQP), accordingly. This method lets SUs deal in the process of spectrum query without sacrificing their location information. Analytical assessment of PPQP’s privacy...