Loading...
Search for: ahmadian-shahreza--hamid-reza
0.113 seconds

    Regularization Methods for Improving Data Efficiency in Reinforcement Learning

    , M.Sc. Thesis Sharif University of Technology Ahmadian Shahreza, Hamid Reza (Author) ; Alishahi, Kasra (Supervisor)
    Abstract
    Reinforcement learning is a successful model of learning that has received a lot of attention in recent years and has had significant achievements. However, methods based on reinforcement require a lot of data. Therefore, it is important to find ideas to keep learning at a high level despite the lack of data. Many of these ideas are known as statistical regularity. In this thesis, we study methods to enhance the learning rate, including methods for sharing neural network weights between value function and policy networks. In this thesis we will try to gain a more general understanding of the regularization in reinforcement learning and increase the learning rate by implementing these methods... 

    Optimization of Load Distribution at the Bone-Implant Interface in Porous Coated Implants ''A Micromechanical Study Using FEM'

    , M.Sc. Thesis Sharif University of Technology Tahani, Masoud (Author) ; Katoozian, Hamid Reza (Supervisor) ; Ahmadian, Mohammad Reza (Supervisor) ; Zohoor, Hassan (Supervisor)
    Abstract
    Loosening and gap opening at the bone-implant interface depends on several physiological and mechanical factors such as bone remodeling, stress concentration, and variation in load transfer pathway. Since fracture of orthopedic material at the interface is one of the major failure mode of total joint implants, this study focused on the micromechanical behavior of the interface. Using a two-dimensional FE model, with pure compressive, tensile, and shearing forces applied on bone or cement, ratio of the stress at the interface to the applied stress has been calculated. Stress distribution was considered as a function of porosity,angle of bead contact to surface, as well as size of bead for two... 

    Analysis of Blind Algorithms for Image and Video Quality Assessment

    , M.Sc. Thesis Sharif University of Technology Otroshi Shahreza, Hatef (Author) ; Behroozi, Hamid (Supervisor) ; Amini, Arash (Supervisor)
    Abstract
    The quality assessment of image and video data has became an important and challenging problem in the fields of image/video processing. Oftentimes, the images/videos files are designed to be viewed by a human observer. Further, the number and size of such files
    are growing everyday. Thus, computer-assisted monitoring of the quality has emerged as the only possible solution for this challenge. In this thesis, we shall first review the existing techniques for no-reference(blind) quality assessment of image and video data. Next, we propose some new approaches for the no-reference quality assessment of image and video data in-the-wild. In the case of images, our contributions consist of two... 

    Identification of the Set of Single Nucleotide Variants in Genome Responsible for the Differentiation of Expression of Genes

    , M.Sc. Thesis Sharif University of Technology Khatami, Mahshid (Author) ; Rabiee, Hamid Reza (Supervisor) ; Beigi, Hamid (Supervisor)
    Abstract
    Single nucleotide polymorphs, There are changes caused by a mutation in a nucleotide in the Dena sequence. Mononucleotide polymorphisms are the most common type of genetic variation. Some of these changes have little or no effect on cells, while others cause significant changes in the expression of cell genes that can lead to disease or resistance to certain diseases. Because of the importance of these changes and their effect on cell function, the relationships between these changes are also important. Over the past decade, thousands of single disease-related mononucleotide polymorphisms have been identified in genome-related studies. Studies in this field have shown that the expression of... 

    Synthesis & Characterization of Au-HKUST-1 Nanocomposite and Evaluation of Plasmonic Properties of Gold Nanoparticles in this Nanocomposite

    , M.Sc. Thesis Sharif University of Technology Moazzeni, Hamid Reza (Author) ; Madaah Hosseini, Hamid Reza (Supervisor)
    Abstract
    In the past few years, many research works on the controllable integration of metal nanoparticles and metal-organic frameworks were done, since the obtained composite material shows a synergism effect in catalysis and photocatalysis, drug delivery applications, gas, and energy storage, as well as sensing. For the first time, in this study, we employed template-assisted growth to synthesize Au-HKUST-1 Nanocomposite. XRD analysis entirely confirms that employing this strategy in synthesizing Au-HKUST-1 was wholly successful, and the plasmonic properties of this nanostructure were studied via UV-visible spectroscopy. In the course of synthesis, gold nanoparticles with 70nm diameter were... 

    DNA Chains Entanglement in Confined Geometries

    , M.Sc. Thesis Sharif University of Technology Ahmadian, Zahra (Author) ; Ejtehadi, Mohammad Reza (Supervisor)
    Abstract
    Our bodies are made from billions of individual cells and DNA is the control central of each cell. In addition to linear DNAs, there are circular DNAs in nature. Circular DNAs cause new topological structures such as knots and catenanes. These topological structures form during biological proccesses such as replication. For example during replication, two daughter circular DNAs may link together and form catenanes. Anzymes named topoisomerases can simplify the topology of circular DNAs. Type 2 topoisomerases is used for simplification of catenanes. These anzymes do it with breaking a double-strand DNA and passing through another one. In comparison with DNAs, topoisomerases are very small and... 

    Live Layered Video Streaming over Multichannel P2P Networks

    , M.Sc. Thesis Sharif University of Technology Ghalebi, Elahe (Author) ; Rabiee, Hamid Reza (Supervisor)
    Abstract
    Nowadays, video streaming over peer-to-peer networks has become an interesting field to deliver video in large scale networks. As multi-channel live video streaming networks increase,distributing video with high quality among channels faces many challenges. The most significant challenges cause from frequent channel churns, unbalanced channel resources, network heterogeneity and diversity of users’ bandwidths. They include: nodes’ unstability, low users participations, large startup and playback delays, low video quality received by users and lack of resources in unpopular channels.In order to solve the above problems, we have proposed several solutions such as: 1- using distribution groups... 

    Local Community Detection in Social

    , M.Sc. Thesis Sharif University of Technology Rajabi, Arezoo (Author) ; Rabiee, Hamid Reza (Supervisor)
    Abstract
    The fast growth of social networks and their wide range of applications have made the anal-ysis of them an interesting field of research. The growth of concern in modeling large social networksand investigation of their structural features leads studies towards community detec-tion in such networks. In recent years, a great amount of effort has been done for introducing community detection algorithms, many of which are based on optimization of a global cri-terion which needs network’s topology. However, because of big size of most of the social networks , accessing their global information tends to be impossible. Hence, local commu-nity detection algorithms have been introduced. In this... 

    Improving Graph Construction for Semi-supervised Learning in Computer Vision Applications

    , M.Sc. Thesis Sharif University of Technology Mahdieh, Mostafa (Author) ; Rabiee, Hamid Reza (Supervisor)
    Abstract
    Semi-supervised Learning (SSL) is an extremely useful approach in many applications where unlabeled data can be easily obtained. Graph based methods are among the most studied branches in SSL. Since neighborhood graph is a key component in these methods, we focus on methods of graph construction in this project. Graph construction methods based on Euclidean distance have the common problem of creating shortcut edges. Shortcut edges refer to the edges which connect two nearby points that are far apart on the manifold. Specifically, we show both in theory and practice that using geodesic distance for selecting and weighting edges results in more appropriate neighborhood graphs. We propose an... 

    Investigating Conformal Vector Field on Riemannian Manifolds

    , M.Sc. Thesis Sharif University of Technology Hessam, Hamed (Author) ; Fanai, Hamid Reza (Supervisor)
    Abstract
    At first the killing vector fields will be investigated. Conditions are introduced for the hypersurface of a Riemannian manifold with a killing vector field to be equipped with the same killing vector field. Then 2-killing vector field is studied and its relation with killing vector fields and monotone vector fields is presented. After that conformal vector fields are discussed and conditions are introduced in order that the Riemannian manifold equipped with a conformal vector field, isisometric to n-dimensional sphere with constant curvature. Finally we will present the conditions which conformal vector field is a 2-killing vector field. Then we will present the results in which the... 

    Network Topology Inference from Incomplete Data

    , M.Sc. Thesis Sharif University of Technology Siyari, Payam (Author) ; Rabiee, Hamid Reza (Supervisor)
    Abstract
    During the last decade, there have been a great number of researches on complex networks.Data aggregation is the first step in the analysis of these networks. However, due to the large scale of them, almost never is there complete information about a network’s different aspects. Therefore, analysis of a complex network is usually done based on the incomplete data. Al-though a good sampling approach in a way that the achieved sample is a good representative of the whole network has its own challenges, analysis of incomplete data causes a significant alternation in the estimation results. Consequently, one of the first problems emerging after sampling is the possibility of predicting the... 

    Continuous Time Modeling of Marked Events

    , Ph.D. Dissertation Sharif University of Technology Hosseini, Abbas (Author) ; Rabiee, Hamid Reza (Supervisor)
    Abstract
    A great deal of information are continuously generated by users in different contexts such as social networks and online service providers in terms of temporal marked events. These events indicate that what happened to who by when and where.Modeling such events and predicting future ones has interesting applications in different domains such as item recommendation in online service providers and trending topic prediction in online social networks. However, complex longitudinal dependencies among such events makes the prediction task challenging. Moreover, nonstationarity of generative model of events and large size of events, makes the modeling and learning the models challenging.In this... 

    Analysis and Modeling of User Behavior over Social Media

    , Ph.D. Dissertation Sharif University of Technology Khodadadi, Ali (Author) ; Rabiee, Hamid Reza (Supervisor)
    Abstract
    Nowadays many of us spend a big part of our daily times on social media.One of the most important research problems in social media analysis is how to engage users. The trace of user activity over these websites is a valuable resource for user understanding and engagement, but this data is very huge and unstructured. An approach to deal with this problem is user behavior modeling. In this process, first a behavioral model is considered for users, then using the activity data and the behavioral model, some parameters are learned. Finally, using the learned parameters, a user profile is constructed for each user. This profile can be used for user engagement and many other applications.... 

    Using formal methods in component based software development

    , Article 2008 International Conference on Systems, Computing Sciences and Software Engineering, SCSS 2008, Part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, CISSE 2008, 5 December 2013 through 13 December 2013 ; 2010 , Pages 429-432 ; 9789048136575 (ISBN) Shirali Shahreza, S ; Shirali Shahreza, M ; Sharif University of Technology
    2010
    Abstract
    Reusing the programs which have already been developed can shorten the production time and reduce costs and expenses. One of the important issues in software reuse is finding a program or a program component in a program library which has been already developed and using it in the new program. In view of precision and automation that formal methods can provide, we can use formal methods in retrieval appropriate components from the software libraries. In this paper, some of the works done in the field of retrieval of the components from the libraries by the help of formal methods have been surveyed and reviewed  

    Surviving with SMS

    , Article Handbook of Research on E-Services in the Public Sector: E-Government Strategies and Advancements ; 2010 , Pages 326-335 ; 9781615207893 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2010
    Abstract
    The mobile phone is one of the technologies which are widely used these days. It is available in most countries and all people, even children and elderly people can use it. It seems that in the near future, each person will have at least one mobile phone. So it is a good choice for communication in emergency situations, such as a heart attack or after an earthquake. In this chapter, we will survey a number of systems which are designed for communication in emergency situations and then explain three systems which are developed by the authors. The first one is for locating and rescuing victims after an earthquake. The second system is for calling an emergency team by patients in emergency... 

    Multilingual highlighting CAPTCHA

    , Article Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011, 11 April 2011 through 13 April 2011, Las Vegas, NV ; 2010 , Pages 447-452 ; 9780769543673 (ISBN) Shirali Shahreza, S ; Shirali Shahreza, M ; Sharif University of Technology
    2010
    Abstract
    There are many websites specially designed for mobile phones. Some hackers write automated programs to abuse these website services and waste the website resources. Therefore, it is necessary to distinguish between human users and computer programs. Methods known for achieving this are known as CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart). CAPTCHA methods are mainly based on the weaknesses of OCR (Optical Character Recognition) systems and ask the user to type a word. So using them is difficult in tools such as PDAs (Personal Digital Assistant) or mobile phones that lack a complete keyboard. In this paper, a new CAPTCHA system is proposed for... 

    A survey of human interactive proof systems

    , Article International Journal of Innovative Computing, Information and Control ; Volume 6, Issue 3 , 2010 , Pages 855-874 ; 13494198 (ISSN) Shirali Shahreza, S ; Shirali Shahreza, M ; Sharif University of Technology
    2010
    Abstract
    Nowadays, a great amount of information is circulated through the Internet. Some of them exclusively belong to a special group of users and require protection and safeguarding against unauthorized access. To this end, a category of systems called HIP (Human Interactive Proof) are designed to distinguish between various groups of users. An important task on the Internet websites is registration. Some hackers write programs to make fake registration that waste the resources of the web sites or even stop them from providing services. Therefore, human users should be distinguished from computer programs. CAPTCHA (Completely Automatic Public Turing Test to Tell Computer and Human Apart) methods... 

    Examining the usage of feedback vibration in nintendo DS handheld game console

    , Article 11th International Conference on Advanced Communication Technology, ICACT 2009, Phoenix Park, 15 February 2009 through 18 February 2009 ; Volume 3 , 2009 , Pages 1997-2000 ; 17389445 (ISSN); 9788955191387 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2009
    Abstract
    Feedback vibration is a standard feature in almost every home video game console controller to vibrate in selected circumstances, such as when the user's character kick the ball or hit the opponent, to immerse the player in the game. In the handheld game consoles this feature causes the handheld game consoles to vibrate. But the handheld game consoles are different than home video game consoles. In this paper we examine the suitability of using feedback vibration in the handheld game consoles. We evaluated feedback vibration popularity among the users. We used Nintendo DS handheld game consoles for this evaluation  

    CAPTCHA for children

    , Article 2008 IEEE International Conference on System of Systems Engineering, SoSE 2008, Monterey, CA, 2 June 2008 through 4 June 2008 ; 2008 ; 9781424421732 (ISBN) Shirali Shahreza, S ; Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    In some websites it is necessary to distinguishing between human users and computer programs which is known as CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart). CAPTCHA methods are mainly based on the weak points of OCR systems and using them are undesirable to human users. In this paper a method has been presented for distinguishing between human users and computer programs on the basis of choice of an object shown on the screen. In this method some objects are chosen randomly and the pictures of these topics are downloaded from the Internet. Then after applying some effects such as rotation, all of the pictures are shown on the screen. Then we ask the... 

    Steganography in silence intervals of speech

    , Article 2008 4th International Conference on Intelligent Information Hiding and Multiedia Signal Processing, IIH-MSP 2008, Harbin, 15 August 2008 through 17 August 2008 ; 2008 , Pages 605-607 ; 9780769532783 (ISBN) Shirali Shahreza, S ; Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    This paper presents a new approach for hiding information in speech signals. In this method, the silence intervals of speech are found and the length (number of samples) of these intervals is changed to hide information. This method can be used simultaneously with other methods. © 2008 IEEE