Loading...
Search for:
aghamohammadi-bonab--yeganeh
0.182 seconds
Total 94 records
Evaluating Effect of Number Representations on the Accuracy of Convolutional Neural Networks
, M.Sc. Thesis Sharif University of Technology ; Bayat Sarmadi, Siavash (Supervisor)
Abstract
Convolutional Neural Networks are a kind of neural network applicable in machine vision and image processing. The accuracy of these networks is dependent on different features such as network size network and input size. Today, researchers are improving the accuracy of neural networks by increasing their size. As a result, networks' computation will increase as well. The bigger the size of the neural network, the harder its hardware implementation. One of the proposed solutions to overcome this issue is to change the number representation while preserving the network accuracy. It's challenging to implement floating-point computation on hardware as it consumes a high amount of power and...
Slipping and rolling on an inclined plane
, Article European Journal of Physics ; Volume 32, Issue 4 , 2011 , Pages 1049-1057 ; 01430807 (ISSN) ; Aghamohammadi, A ; Sharif University of Technology
2011
Abstract
In the first part of the paper, using a direct calculation two-dimensional motion of a particle sliding on an inclined plane is investigated for general values of friction coefficient (μ). A parametric equation for the trajectory of the particle is also obtained. In the second part of the paper, the motion of a sphere on the inclined plane is studied. It is shown that the evolution equation for the contact point of a sliding sphere is similar to that of a point particle sliding on an inclined plane whose friction coefficient is 7/2 μ. If μ > 2/7 tanθ, for any arbitrary initial velocity and angular velocity, the sphere will roll on the inclined plane after some finite time. In other cases, it...
Code Summarization in Event-Driven Programs
, M.Sc. Thesis Sharif University of Technology ; Heydarnoori, Abbas (Supervisor)
Abstract
Developers have been spending a lot of time on program comprehension during software evolution. Program comprehension reduces the cost and the software development time and increases maintainability of a program. However, the lack of documentation makes this process exhausting. Source code summarization is one of the existing solutions to help developers understand a program. Source code summarization gives an opportunity for the developers to better understand the source code by spending less time. There are a lot of approaches for source code summarization. For instance, exploiting knowledge of the crowd, information retrieval, deep neural networks, or using eye tracking of developers...
Modeling Capacity and Delay for Arterial Work Zones
, M.Sc. Thesis Sharif University of Technology ; Nassiri, Habibollah (Supervisor)
Abstract
For any country, the road system is an important part of its infrastructure which can affect economic development. A good level of service for a road system requires implementation of work zone projects to maintain it which usually close one or more of the lanes available for traffic. Lane reductions could cause a disturbance to normal traffic flow and speed reductions, further resulting in a reduction of road capacity and an increase of traffic delay. In addition, work zone capacity and traffic delay are the two critical indices to determine whether the effectiveness of traffic control systems is acceptable or not. Hence, the accurate estimation of capacity and traffic delay in work zones is of...
Phonetic-Attributes Dependent Speaker Verification
, M.Sc. Thesis Sharif University of Technology ; Ghaemmaghami, Shahrokh (Supervisor)
Abstract
The purpose of this project is to improve current speaker verification techniques with short utterance using phonetic information extraction. I-vector technique is widely used in speaker verification systems. Different speakers span a subspace of universal acoustic space, which is usually modeled by “Universal Background model”. Speaker-specific subspace depends on the voice of speaker. In state-of-the-art speaker verification systems i-vectors are extracted by a factor analysis technique to represent speaker characteristics. Studies demonstrate that voiced phonemes contain more speaker-specific information than unvoiced. In this thesis we have classified voiced frames in order to exploit...
Decentralized Management of Multi-Microgrid Active Distribution Systems with the Aim of Increasing Reliability
, M.Sc. Thesis Sharif University of Technology ; Abbaspour, Ali (Supervisor)
Abstract
In recent years, the penetration of renewable energy sources (RESs) in the distribution networks has faced their operation with new problems. Therefore, many studies have been conducted in this field to effectively operate distribution networks by introducing multi-microgrid (MG) structures, decentralized management methods, and the concept of transactive energy. In this regard, in this thesis, a decentralized structure based on the transactive energy is presented for optimal management of the distribution network using the alternating direction method of multipliers (ADMM) with taking the technical limitations into account. As a result, MGs will be able to exchange energy directly with...
Effect of silicon carbide nanoparticles on hot deformation of ultrafine-grained aluminium nanocomposites prepared by hot powder extrusion process
, Article Powder Metallurgy ; Volume 59, Issue 4 , 2016 , Pages 262-270 ; 00325899 (ISSN) ; Simchi, A ; Sharif University of Technology
Taylor and Francis Ltd
2016
Abstract
The flow behaviour of Al–SiC nanocomposites prepared by mechanical milling and hot powder extrusion methods was studied at different temperatures (350–500°C) and strain rates (0.005–0.5 s−1). The flow of the Powder metallurgy nanocomposites exhibited a peak stress followed by a dynamic flow softening behaviour. It was shown that mechanical milling increased high-temperature strain rate sensitivity of ultrafine-grained (UFG) aluminium while decreasing its flow dependence to temperature. Constitutive analysis of the hot deformation process by Zener–Hollomon parameter (Z) also indicated a remarkable increase in the deformation activation energy (about 40%). Likewise, SiC nanoparticles (up to...
Event related potentials extraction using low-rank tensor decomposition
, Article 30th International Conference on Electrical Engineering, ICEE 2022, 17 May 2022 through 19 May 2022 ; 2022 , Pages 931-935 ; 9781665480871 (ISBN) ; Shamsollahi, M. B ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2022
Abstract
Event-related potential (ERP) extraction from ongoing electroencephalograph (EEG) and its enhancement is one of the long-established problems in EEG signal processing. Most of the previous studies have focused mainly on the ERP enhancement without considering the multi-dimentional structure of the signal. In order to take advantage of this property, we propose a tensor-based solution with trial-by-trial concatenated ERP data. Then we develop an algorithm based on low-rank Tucker decomposition to detect single trial ERP component with maximized signal to noise ratio (SNR). In other words, by using tensor algebra we consider both self-similarity in intratrials and global correlation in spatial...
LQG Controller Design for Hover Flight Based on Model Helicopter System Identification, Using X-Plane
, M.Sc. Thesis Sharif University of Technology ; Banazadeh, Afshin (Supervisor)
Abstract
The subject of this study is design of a linear quadratic Gaussian controller based on identification of dynamic behavior of unmanned model helicopter “Raptor” in its hover flight. To achieve this end, first, the helicopter linear transfer functions are identified with frequency response method by applying specific inputs to the model of Raptor in the X-Plane software and receiving system outputs via Simulink. Next, using the identified dynamic model of the helicopter, an optimum linear controller is designed for hover flight. As an optimum linear controller needs all the state variables, a Kalman filter is utilized to estimate them, using outputs of various sonsors such as GPS and gyro....
Permutation approach, high frequency trading and variety of micro patterns in financial time series
, Article Physica A: Statistical Mechanics and its Applications ; Vol. 413, issue , 2014 , pp. 25-30 ; ISSN: 03784371 ; Ebrahimian, M ; Tahmooresi H ; Sharif University of Technology
2014
Abstract
Permutation approach is suggested as a method to investigate financial time series in micro scales. The method is used to see how high frequency trading in recent years has affected the micro patterns which may be seen in financial time series. Tick to tick exchange rates are considered as examples. It is seen that variety of patterns evolve through time; and that the scale over which the target markets have no dominant patterns, have decreased steadily over time with the emergence of higher frequency trading
Externally driven one-dimensional Ising model
, Article Journal of Statistical Mechanics: Theory and Experiment ; Volume 2012, Issue 2 , Feb , 2012 ; 17425468 (ISSN) ; Aghamohammadi, C ; Khorrami, M ; Sharif University of Technology
2012
Abstract
A one-dimensional kinetic Ising model at a finite temperature on a semi-infinite lattice with time varying boundary spins is considered. Exact expressions for the expectation values of the spin at each site are obtained, in terms of the time dependent boundary condition and the initial conditions. The solution consists of a transient part which is due to the initial conditions, and a part driven by the boundary. The latter is an evanescent wave when the boundary spin is oscillating harmonically. Low-and high-frequency limits are investigated in greater detail. The total magnetization of the lattice is also obtained. It is seen that for any arbitrary rapidly varying boundary conditions, this...
Generating summaries for methods of event-driven programs: An Android case study
, Article Journal of Systems and Software ; Volume 170 , 2020 ; Izadi, M ; Heydarnoori, A ; Sharif University of Technology
Elsevier Inc
2020
Abstract
The lack of proper documentation makes program comprehension a cumbersome process for developers. Source code summarization is one of the existing solutions to this problem. Many approaches have been proposed to summarize source code in recent years. A prevalent weakness of these solutions is that they do not pay much attention to interactions among elements of software. An element is simply a callable code snippet such as a method or even a clickable button. As a result, these approaches cannot be applied to event-driven programs, such as Android applications, because they have specific features such as numerous interactions between their elements. To tackle this problem, we propose a novel...
An ensemble-based predictive mutation testing approach that considers impact of unreached mutants
, Article Software Testing Verification and Reliability ; Volume 31, Issue 7 , 2021 ; 09600833 (ISSN) ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
John Wiley and Sons Ltd
2021
Abstract
Predictive mutation testing (PMT) is a technique to predict whether a mutant is killed, using machine learning approaches. Researchers have proposed various methods for PMT over the years. However, the impact of unreached mutants on PMT is not fully addressed. A mutant is unreached if the statement on which the mutant is generated is not executed by any test cases. We aim at showing that unreached mutants can inflate PMT results. Moreover, we propose an alternative approach to PMT, suggesting a different interpretation for PMT. To this end, we replicated the previous PMT research. We empirically evaluated the suggested approach on 654 Java projects provided by prior literature. Our results...
An ensemble-based predictive mutation testing approach that considers impact of unreached mutants
, Article Software Testing Verification and Reliability ; Volume 31, Issue 7 , 2021 ; 09600833 (ISSN) ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
John Wiley and Sons Ltd
2021
Abstract
Predictive mutation testing (PMT) is a technique to predict whether a mutant is killed, using machine learning approaches. Researchers have proposed various methods for PMT over the years. However, the impact of unreached mutants on PMT is not fully addressed. A mutant is unreached if the statement on which the mutant is generated is not executed by any test cases. We aim at showing that unreached mutants can inflate PMT results. Moreover, we propose an alternative approach to PMT, suggesting a different interpretation for PMT. To this end, we replicated the previous PMT research. We empirically evaluated the suggested approach on 654 Java projects provided by prior literature. Our results...
Elasto-Plastic Design of Thick-Walled FG Vessels under Pressure or Temperature Gradient Loadings
, M.Sc. Thesis Sharif University of Technology ; Kargarnovin, Mohammad Hossein (Supervisor)
Abstract
Nowadays functionally graded materials have many applications in various industries. One of these applications can be the manufacturing of thick-walled vessels. Thick-walled vessels under internal pressure and high temperatures gradient require materials with higher strength, like Functionally Graded Materials (FGM) and can be reinforced by some mechanical processes like autofrettage. In this process under certain loading some part of vessels enters into plastic zone and upon unloading some residual stresses will be generated. Moreover it is very important to find out the depth of this plastic zone, In addition, minimizing the stress distribution vs. depth of plastic zone under applied...
Text Separation of Single-Channel Audio Sources Using Deep Neural Networks
, M.Sc. Thesis Sharif University of Technology ; Motahari, Abolfazl (Supervisor)
Abstract
The problem of separation of audio sources is one of the oldest issues raised in the field of audio processing, which has been studied for more than half a century. The main focus of recent research in this field has been on improving the sound quality resulting from the separation of sound sources with the help of deep neural networks. This is despite the fact that in most applications of audio source separation, such as the application of meeting transcription, we do not need the separated audio of people. Rather, we need a pipeline of converting overlapping speech to text, which, by receiving the audio in which several people have spoken, outputs the text spoken by the people present in...
Axial effects investigation in fixed-end circular bars under torsion with a finite deformation model based on logarithmic strain
, Article International Journal of Mechanical Sciences ; Volume 48, Issue 1 , 2006 , Pages 75-84 ; 00207403 (ISSN) ; Naghdabadi, R ; Sharif University of Technology
2006
Abstract
In this paper the torsion problem of a circular bar with fixed ends is solved using a finite deformation constitutive model based on the corotational rates of the logarithmic strain. The logarithmic, Green-Naghdi and Eulerian corotational rates of the logarithmic strain are used in the model. The solution is based on a von Mises type yield function that incorporates isotropic and kinematic hardenings. For the kinematic hardening, a modified Armstrong-Fredrick hardening model with the corotational rate of the logarithmic strain is used. Assuming incompressible behavior, the fixed-end torsion problem is simplified to the simple shear problem. Solving the problem, the stress components are...
On swimmer’s strategies in various currents
, Article European Journal of Physics ; Volume 44, Issue 5 , 2023 ; 01430807 (ISSN) ; Aghamohammadi, C ; Moghimi Araghi, S ; Sharif University of Technology
Institute of Physics
2023
Abstract
Finding an optimum strategy to reach a certain destination by swimming in a background flow is an interesting question that leads to non-trivial results and swimming paths. Here we consider different strategies for various types of surface currents, including parallel currents, and currents resulting from spring sources, and sinks. Swimmers may instinctively swim toward the destination point. It turns out that this idea may not lead to the desired result in the presence of the background current. We will show in some cases the best strategy is to swim towards a certain point other than the actual destination. A different strategy may be to obtain the path of the least time and then follow...
Analysis Of Privacy Challenges In RFID Authentication Protocols
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor)
Abstract
Radio Frequency IDentification (RFID) is an increasingly important area in automatic identification. Low cost RFID tags (labels) are considered as the next generation of barcodes and their purpose is to compensate for shortcomings in computer recognition of objects using cameras. Supply chain management, access control, animal identification,e-passports along with the possibility of having e-health, e-agriculture and smart homes are few examples of RFID application developments. Despite its low cost, ubiquity, and widespread usage, RFID tags suffer from several major drawbacks, particularly information leakage and traceability. In RFID authentication protocols, both information leakage and...
Identification and Modeling Of Factors Affecting The Waiting Time of Pedestrians to Cross at Signalized Intersections
, M.Sc. Thesis Sharif University of Technology ; Nasiri, Habibollah (Supervisor)
Abstract
Studies show that Pedestrians are at fault in 59% of the vehicle-pedestrian accidents. The traffic crash statistics show the importance of understanding factors of pedestrian errors. If pedestrians terminate their waiting behavior during the red light period and cross the street, they would put themselves in danger. Pedestrians’ red-light violation is a type of highly dangerous behavior occurring at intersections. A total of 1130 pedestrians approaching the intersections during red light periods were observed from the videotapes data collected at 6 intersections in Tehran, Iran. Pedestrian crossing behaviors are classified into immediate crossing behavior and waiting behavior. A logit model...