Loading...
Search for:
amini--e
0.171 seconds
Total 2937 records
MRI-PET image fusion based on NSCT transform using local energy and local variance fusion rules
, Article Journal of Medical Engineering and Technology ; Vol. 38, issue. 4 , 2014 , p. 211-219 ; Fatemizadeh, E ; Behnam, H ; Sharif University of Technology
2014
Abstract
Image fusion means to integrate information from one image to another image. Medical images according to the nature of the images are divided into structural (such as CT and MRI) and functional (such as SPECT, PET). This article fused MRI and PET images and the purpose is adding structural information from MRI to functional information of PET images. The images decomposed with Nonsubsampled Contourlet Transform and then two images were fused with applying fusion rules. The coefficients of the low frequency band are combined by a maximal energy rule and coefficients of the high frequency bands are combined by a maximal variance rule. Finally, visual and quantitative criteria were used to...
Performance of high-speed planing hulls accelerating from rest under the action of a surface piercing propeller and an outboard engine
, Article Applied Ocean Research ; Volume 77 , 2018 , Pages 45-60 ; 01411187 (ISSN) ; Najafi, S ; Amini, E ; Dashtimanesh, A ; Sharif University of Technology
Elsevier Ltd
2018
Abstract
In this paper, a mathematical model for performance prediction of a high-speed planing hull in forward acceleration motion has been developed. Three degrees of freedom have been considered for solving the problem. Utilizing previous empirical equations of displacement ships, motion of the vessel in displacement regime has been simulated. In order to model pre-planing and planing regimes, 2D + T theory has been used. Equations for prediction of performance of a surface piercing propeller (SPP) and an engine have been presented. Validity of the proposed method has been assessed by comparing its results against previous experimental data, and good agreement between experimental and mathematical...
Ship acceleration motion under the action of a propulsion system: a combined empirical method for simulation and optimisation
, Article Journal of Marine Engineering and Technology ; 2020 ; Najafi, S ; Amini, E ; Dashtimansh, A ; Sharif University of Technology
Taylor and Francis Ltd
2020
Abstract
The current paper presents a simple mathematical model for replication of the transient acceleration motion of displacement hulls in calm water under the action of a propulsion system. Different empirical methods are coupled, and an operational speed problem is solved in the time domain. The resistance of the ship is calculated by using the Holtrop method. The values of thrust force, torque and propeller efficiency are computed by using B-Series empirical equations. The acceleration motion of the vessel, which is triggered as the engine starts to work, is simulated by solving a set of first-order differential equations, which are discretised in the time domain. It is shown that different...
Noninvasive estimation of tissue temperature via high-resolution spectral analysis techniques
, Article IEEE Transactions on Biomedical Engineering ; Volume 52, Issue 2 , 2005 , Pages 221-228 ; 00189294 (ISSN) ; Ebbini, E. S ; Georgiou, T. T ; Sharif University of Technology
2005
Abstract
We address the noninvasive temperature estimation from pulse-echo radio frequency signals from standard diagnostic ultrasound imaging equipment. In particular, we investigate the use of a high-resolution spectral estimation method for tracking frequency shifts at two or more harmonic frequencies associated with temperature change. The new approach, employing generalized second-order statistics, is shown to produce superior frequency shift estimates when compared to conventional high-resolution spectral estimation methods Seip and Ebbini (1995). Furthermore, temperature estimates from the new algorithm are compared with results from the more commonly used echo shift method described in Simon...
Assessing the shear behavior of oriented rock joints under constant normal loading conditions
, Article Geotechnical Special Publication ; February , 2014 , p. 553-562 ; Khosravi, M ; Sadaghiani, M. H ; Meehan, C. L ; Amini, E ; Sharif University of Technology
2014
Abstract
This paper presents results from a series of constant normal load direct shear tests on artificially created rock joints, in an attempt to quantify the effects of different factors that contribute to the shear strength along "ideal" rock joints. Particular focus is given to the effect of asperity orientation with respect to the direction of shearing. In many historical rock joint shear strength criteria, the effect of a joint's roughness on the joint shear strength is described based on analysis of only a single profile in the direction of shearing. More recent studies have observed that the distribution of sheared area on a joint surface during shear is significantly affected by the...
Evaluation of nutrient removal and biomass production through mixotrophic, heterotrophic, and photoautotrophic cultivation of chlorella in nitrate and ammonium wastewater
, Article International Journal of Environmental Research ; Volume 12, Issue 2 , 2018 , Pages 167-178 ; 17356865 (ISSN) ; Mehrnia, M. R ; Shayegan, J ; Sarrafzadeh, M. H ; Amini, E ; Sharif University of Technology
Springer International Publishing
2018
Abstract
In this study, the effect of mixotrophic, heterotrophic, photoautotrophic (CO2 of air source), and photoautotrophic (bicarbonate source) cultivation of Chlorella vulgaris was investigated on microalgae growth rate and nutrient removal under different kinds of nitrogen sources. The highest N–NH3 +, N–NO3 −, P–PO4 3− (in ammonium source), and P–PO4 3− (in nitrate source) removal efficiency (87.28 ± 0.89, 70.00 ± 1.20, 87.00 ± 3.10, and 78.10 ± 1.95%, respectively) was reached in the mixotrophic culture. In all cultivations, when nitrate was used as the nitrogen source, specific growth rate, biomass productivity, and specific oxygen production rate (SOPR) were higher than the one with ammonium...
Copper(II) acetate
, Article Synlett ; Volume 23, Issue 13 , 2012 , Pages 1995-1996 ; 09365214 (ISSN) ; Sharif University of Technology
2012
Abstract
(A) Chakraborty and co-workers have developed a green method for the bulk ring-opening polymerization of lactides in the presence of Cu(OAc)2 as a good catalyst to synthesize polymers with different end-terminal groups.3 These polymerizations are highly controlled leading to the formation of polymers with the expected number of average molecular weights and narrow molecular weight distribution. (B) Garden and co-workers have found that the oxidative addition of anilines with 1,4-naphthoquinone to give N-aryl-2-amino-1,4-naphthoquinones can be performed in the presence of catalytic amounts of copper(II) acetate.4 All the reactions are generally more efficient in that they are cleaner, higher...
Solving rank one revised linear systems by the scaled ABS method
, Article ANZIAM Journal ; Volume 46, Issue 2 , 2004 , Pages 225-236 ; 14461811 (ISSN) ; Sharif University of Technology
2004
Abstract
In mathematical programming, an important tool is the use of active set strategies to update the current solution of a linear system after a rank one change in the constraint matrix. We show how to update the general solution of a linear system obtained by use of the scaled ABS method when the matrix coefficient is subjected to a rank one change. © Australian Mathematical Society 2004
Dextran-graft-poly(hydroxyethyl methacrylate) gels: A new biosorbent for fluoride removal of water
, Article Designed Monomers and Polymers ; Volume 16, Issue 2 , 2013 , Pages 127-136 ; 1385772X (ISSN) ; Mousavi, S. A ; Amini Fazl, A ; Amini Fazl, M. S ; Ahmari, R ; Sharif University of Technology
2013
Abstract
Synthesis of dextran-graft-poly(hydroxyethyl methacrylate) gels as a new fluoride biosorbent was considered in this work. For this propose, the Taguchi experimental design method was used for optimizing the synthetic conditions of the gels to reach high level of fluoride absorbency. The effects of three main parameters including concentrations of monomer (hydroxyethyl methacrylate), crosslinking agent (ethylene glycol dimethacrylate), and initiator (ammonium persulfate) on the final properties of the prepared gels were investigated. The proposed mechanism for grafting and chemically crosslinking reactions was proved with equilibrium water absorption, Fourier-transformed infrared, scanning...
Optimization of synthetic conditions of a novel collagen-based superabsorbent hydrogel by Taguchi method and investigation of its metal ions adsorption
, Article Journal of Applied Polymer Science ; Volume 102, Issue 5 , 2006 , Pages 4878-4885 ; 00218995 (ISSN) ; Salimi, H ; Amini Fazl, M. S ; Kurdtabar, M ; Amini Fazl, A. R ; Sharif University of Technology
2006
Abstract
A novel biopolymer-based superabsorbent hydrogel was synthesized through chemical crosslinking by graft copolymerization of partially neutralized acrylic acid onto the hydrolyzed collagen, in the presence of a crosslinking agent and a free radical initiator. The Taguchi method, a robust experimental design, was employed for the optimization of the synthesis reaction based on the swelling capacity of the hydrogels. This method was applied for the experiments and standard L16 orthogonal array with three factors and four levels were chosen. The critical parameters that have been selected for this study are crosslinker (N,N′-methylene bisacrylamide), initiator (potassium persulfate), and monomer...
Sparsity and infinite divisibility
, Article IEEE Transactions on Information Theory ; Volume 60, Issue 4 , 2014 , Pages 2346-2358 ; ISSN: 00189448 ; Unser, M ; Sharif University of Technology
2014
Abstract
We adopt an innovation-driven framework and investigate the sparse/compressible distributions obtained by linearly measuring or expanding continuous-domain stochastic models. Starting from the first principles, we show that all such distributions are necessarily infinitely divisible. This property is satisfied by many distributions used in statistical learning, such as Gaussian, Laplace, and a wide range of fat-tailed distributions, such as student's-t and α-stable laws. However, it excludes some popular distributions used in compressed sensing, such as the Bernoulli-Gaussian distribution and distributions, that decay like exp (-O(|x|p)) for 1 < p < 2. We further explore the implications of...
Deterministic construction of binary, bipolar, and ternary compressed sensing matrices
, Article IEEE Transactions on Information Theory ; Volume 57, Issue 4 , April , 2011 , Pages 2360-2370 ; 00189448 (ISSN) ; Marvasti, F ; Sharif University of Technology
2011
Abstract
In this paper, we establish the connection between the Orthogonal Optical Codes (OOC) and binary compressed sensing matrices. We also introduce deterministic bipolar m × n RIP fulfilling ± 1 matrices of order k such that m ≤ script O sign (k(log2 n) log2 k/ln log2 k). The columns of these matrices are binary BCH code vectors where the zeros are replaced by -1. Since the RIP is established by means of coherence, the simple greedy algorithms such as Matching Pursuit are able to recover the sparse solution from the noiseless samples. Due to the cyclic property of the BCH codes, we show that the FFT algorithm can be employed in the reconstruction methods to considerably reduce the computational...
Multi-level authorisation model and framework for distributed semantic-aware environments
, Article IET Information Security ; Volume 4, Issue 4 , 2010 , Pages 301-321 ; 17518709 (ISSN) ; Jalili, R ; Sharif University of Technology
2010
Abstract
Semantic technology is widely used in distributed computational environments to increase interoperability and machine readability of information through giving semantics to the underlying information and resources. Semantic-awareness, distribution and interoperability of new generation of distributed systems demand an authorisation model and framework that satisfies essential authorisation requirements of such environments. In this study, the authors propose an authorisation model and framework based on multi-security-domain architecture for distributed semantic-aware environments. The proposed framework is founded based on the MA(DL)2 logic, which enables policy specification and inference...
A new framework to train autoencoders through non-smooth regularization
, Article IEEE Transactions on Signal Processing ; Volume 67, Issue 7 , 2019 , Pages 1860-1874 ; 1053587X (ISSN) ; Ghaemmaghami, S ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2019
Abstract
Deep structures consisting of many layers of nonlinearities have a high potential of expressing complex relations if properly initialized. Autoencoders play a complementary role in training a deep structure by initializing each layer in a greedy unsupervised manner. Due to the high capacity presented by autoencoders, these structures need to be regularized. While mathematical regularizers (based on weight decay, sparsity, etc.) and structural ones (by way of, e.g., denoising and dropout) have been well studied in the literature, quite a few papers have addressed the problem of training autoencoder with non-smooth regularization. In this paper, we address the problem of training autoencoder...
Lowering mutual coherence between receptive fields in convolutional neural networks
, Article Electronics Letters ; Volume 55, Issue 6 , 2019 , Pages 325-327 ; 00135194 (ISSN) ; Ghaemmaghami, S ; Sharif University of Technology
Institution of Engineering and Technology
2019
Abstract
It has been shown that more accurate signal recovery can be achieved with low-coherence dictionaries in sparse signal processing. In this Letter, the authors extend the low-coherence attribute to receptive fields in convolutional neural networks. A new constrained formulation to train low-coherence convolutional neural network is presented and an efficient algorithm is proposed to train the network. The resulting formulation produces a direct link between the receptive fields of a layer through training procedure that can be used to extract more informative representations from the subsequent layers. Simulation results over three benchmark datasets confirm superiority of the proposed...
Towards improving robustness of deep neural networks to adversarial perturbations
, Article IEEE Transactions on Multimedia ; Volume 22, Issue 7 , 2020 , Pages 1889-1903 ; Ghaemmaghami, S ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2020
Abstract
Deep neural networks have presented superlative performance in many machine learning based perception and recognition tasks, where they have even outperformed human precision in some applications. However, it has been found that human perception system is much more robust to adversarial perturbation, as compared to these artificial networks. It has been shown that a deep architecture with a lower Lipschitz constant can generalize better and tolerate higher level of adversarial perturbation. Smooth regularization has been proposed to control the Lipschitz constant of a deep architecture and in this work, we show how a deep convolutional neural network (CNN), based on non-smooth regularization...
Calculus for composite authorities' policy derivation in shared domains of pervasive computing environments
, Article 11th International Conference on Computer and Information Technology, ICCIT 2008, Khulna, 25 December 2008 through 27 December 2008 ; March , 2008 , Pages 21-28 ; 9781424421367 (ISBN) ; Jalili, R ; Sharif University of Technology
2008
Abstract
The decentralized security management in a pervasive computing environment' requires apportioning the environment into several security domains. In each security domain' an administrator (we call it authority) is responsible for specifying the security policies of the domain. Overlapping of security domains results in the requirement of cooperative security management in the shared/ overlapping domains. To satisfy this requirement' we propose an abstract security model' as well as its supplementary calculus of composite authorities. The security model is based on deontic logic and is independent of the domains' heterogeneity. The model's policy language (we call it MASL) enables multiple...
Convergence analysis of an iterative method for the reconstruction of multi-band signals from their uniform and periodic nonuniform samples
, Article Sampling Theory in Signal and Image Processing ; Volume 7, Issue 2 , 1 May , 2008 , Pages 113-129 ; 15306429 (ISSN) ; Marvasti, F ; Sharif University of Technology
2008
Abstract
One of the proposed methods for recovery of a band-limited signal from its samples, whether uniform or nonuniform, is the so-called Frame Method. In this method the original signal is reconstructed by iterative use of sampling-filtering blocks. Convergence of this method for linear invertible operators has been previously proved. In this paper we show that this method for non-invertible periodic nonuniform samplings as well as non-invertible uniform samples of bandpass (or multi-band) signals will lead to the pseudo-inverse solution. Convergence conditions in case of additive noise will also be discussed. © 2008 Sampling Publishing
Towards robust visual transformer networks via k-sparse attention
, Article 47th IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2022, 23 May 2022 through 27 May 2022 ; Volume 2022-May , 2022 , Pages 4053-4057 ; 15206149 (ISSN); 9781665405409 (ISBN) ; Ghaemmaghami, S ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2022
Abstract
Transformer networks, originally developed in the community of machine translation to eliminate sequential nature of recurrent neural networks, have shown impressive results in other natural language processing and machine vision tasks. Self-attention is the core module behind visual transformers which globally mixes the image information. This module drastically reduces the intrinsic inductive bias imposed by CNNs, such as locality, while encountering insufficient robustness against some adversarial attacks. In this paper we introduce K-sparse attention to preserve low inductive bias, while robustifying transformers against adversarial attacks. We show that standard transformers attend...
Deterministic Compressed Sensing
, Ph.D. Dissertation Sharif University of Technology ; Marvasti, Farrokh (Supervisor)
Abstract
The emerging field of compressed sensing deals with the techniques of combining the two blocks of sampling and compression into a single unit without compromising the performance. Clearly, this is not feasible for any general signal; however, if we restrict the signal to be sparse, it becomes possible. There are two main challenges in compressed sensing, namely the sampling process and the reconstruction methods. In this thesis, we will focus only on the deterministic sampling process as opposed to the random sampling. The sampling methods discussed in the literature are mainly linear, i.e., a matrix is used as the sampling operator. Here, we first consider linear sampling methods and...