Loading...
				
	
				
	
								
								
			Search for:
			
					    			amiri--m--m
					    	
		
							
	    		0.13 seconds
			
			
				Total 20798 records
			
		A simple method for pulse repetition interval estimation and tracking radar pulse trains with complex pulse repetition interval modulations
, Article Advanced Science Letters ; Volume 19, Issue 8 , 2013 , Pages 2262-2265 ; 19366612 (ISSN) ; Keshavarzi, M ; Amiri, K ; Sharif University of Technology
								
								
					2013
				
							
				
		
							Abstract
				
					
			
		
										
				In an electronic warfare environment, an electronic support system receives signals emitted by different radars. One of the key tasks in an electronic support system is PRI estimation tracking Pulse Trains using Pulse Repetition Interval (PRI) of these signals. In this paper we present a simple method for PRI estimation and tracking radar pulse trains with complex PRI Modulations. This method uses nonlinear least square, Pisarenko and innovative methods for PRI estimation and tracking pulse train. Simulation results show high robustness of the proposed method against noise (spurious and missing pulses)  
				
				
				
					Multi-facility location problems in the presence of a probabilistic line barrier: A mixed integer quadratic programming model
, Article International Journal of Production Research ; Volume 50, Issue 15 , Jul , 2012 , Pages 3988-4008 ; 00207543 (ISSN) ; Mahdavi, I ; Amiri Aref, M ; Mohammadnia Otaghsara, M ; Mahdavi Amiri, N ; Sharif University of Technology
								
					T&F 
				
								
								
					2012
				
							
				
		
							Abstract
				
					
			
		
										
				We consider a multi-facility location problem in the presence of a line barrier with the starting point of the barrier uniformly distributed. The objective is to locate n new facilities among m existing facilities minimising the summation of the weighted expected rectilinear barrier distances of the locations of new facilities and new and existing facilities. The proposed problem is designed as a mixed-integer nonlinear programming model, conveniently transformed into a mixed-integer quadratic programming model. The computational results show that the LINGO 9.0 software package is effective in solving problems with small sizes. For large problems, we propose two meta-heuristic algorithms,... 
				
				
				
					Formulation of a nonlinear mathematical model to simulate accelerations of an AAMV in take-off and landing phases
, Article Ships and Offshore Structures ; 2014 ; ISSN: 17445302 ; Dakhrabadi, M. T ; Seif, M. S ; Sharif University of Technology
								
								
					2014
				
							
				
		
							Abstract
				
					
			
		
										
				Aerodynamically alleviated marine vehicle (AAMV) is a high speed craft equipped with aerodynamic surfaces that operating in ground effect zone provides this craft with the ability to achieve much higher cruising speeds. Reducing the take-off mode of an AAMV is highly desirable. Additionally, it is seen where there is a considerable reserve thrust take-off can occur in the lower get-away speeds that shorten the take-off run and, therefore, is favourable. Accordingly, in this study an attempt has been made to develop a nonlinear mathematical model for an AAMV to simulate accelerations in take-off and landing phases, using semi-empirical equations mainly proposed for mono-hull high-speed craft,... 
				
				
				
					Iterative constrained weighted least squares solution for target localization in distributed MIMO radar
, Article 27th Iranian Conference on Electrical Engineering, ICEE 2019, 30 April 2019 through 2 May 2019 ; 2019 , Pages 1710-1714 ; 9781728115085 (ISBN) ; Nayebi, M. M ; Amiri, R ; Sharif University of Technology
								
					Institute of Electrical and Electronics Engineers Inc 
				
								
								
					2019
				
							
				
		
							Abstract
				
					
			
		
										
				This paper concentrates on the target localization problem in a distributed multiple-input multiple-output radar system using the bistatic range (BR) measurements. By linearizing the BR measurements and considering the relationship between the nuisance parameter and the target position, a constrained weighted least squares (CWLS) problem is formulated, which is an indefinite quadratically constrained quadratic programming problem. Since the constraint is non-convex, it is a nontrivial task to find the global solution. For this purpose, an improved Newton's method is applied to the CWLS problem to estimate the target position. Numerical simulations are included to examine the algorithm's... 
				
				
				
					Target localization in distributed MIMO radar from time delays, doppler shifts, azimuth and elevation angles of arrival
, Article 27th Iranian Conference on Electrical Engineering, ICEE 2019, 30 April 2019 through 2 May 2019 ; 2019 , Pages 1498-1503 ; 9781728115085 (ISBN) ; Navebi, M. M ; Amiri, R ; Sharif University of Technology
								
					Institute of Electrical and Electronics Engineers Inc 
				
								
								
					2019
				
							
				
		
							Abstract
				
					
			
		
										
				In this paper, we focus on the moving target localization problem in a multiple-input multiple-output radar with widely separated antennas. By exploiting jointly different types of information including time delay, Doppler shift and azimuth and elevation angles of arrival, we develop an algebraic closed-form two-stage weighted least squares solution for the problem. The proposed algorithm is shown analytically to attain the CramerRao lower bound accuracy under the small Gaussian noise assumption. Numerical simulations are included to examine the algorithm's performance and corroborate the theoretical developments  
				
				
				
					An algorithm for modeling print and scan operations used for watermarking
, Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10 November 2008 through 12 November 2008 ; Volume 5450 LNCS , 2009 , Pages 254-265 ; 03029743 (ISSN) ; 3642044379 (ISBN); 9783642044373 (ISBN) ; Jamzad, M ; Sharif University of Technology
								
								
					2009
				
							
				
		
							Abstract
				
					
			
		
										
				Watermarking is a suitable approach for digital image authentication. Robustness regarding attacks that aim to remove the watermark is one of the most important challenges in watermarking, in general. Several different attacks are reported that aim to make it difficult or impossible for the real owner of the digital watermarked image to extract the watermark. Some of such common attacks are noise addition, compression, scaling, rotation, clipping, cropping, etc. In this paper we address the issue of print and scan attack by introducing a method to model the scanner and printer. Then we will simulate the print and scan attack on the digital images to evaluate its robustness. In addition, we... 
				
				
				
					A robust image watermarking method in wavelet domain using genetic algorithm
, Article Proceedings - International Conference on Availability, Reliability and Security, ARES 2009, 16 March 2009 through 19 March 2009, Fukuoka, Fukuoka Prefecture ; 2009 , Pages 612-617 ; 9780769535647 (ISBN) ; Jamzad, M ; Sharif University of Technology
								
								
					2009
				
							
				
		
							Abstract
				
					
			
		
										
				Robustness against attacks is an important requirement in image watermarking. This paper presents a robust watermarking algorithm in wavelet transform domain. Firstly, original image is decomposed into its subbands using three level wavelet transform, then, significant coefficients with the same position in HL, LH and HH subbands of the last level are extracted to make a triplet. To embed a watermark bit into a triplet, the standard deviation of triplet coefficients magnitude is set to zero for zero bit or increased for a one bit. Three constant are used to increase the standard deviations of a triplet coefficients. The value of these constants affects the robustness of algorithm and the... 
				
				
				
					A fuzzy project buffer management algorithm: a case study in the construction of a renewable project
, Article International Journal of Construction Management ; 2022 ; 15623599 (ISSN) ; Vanhoucke, M ; Khalilzadeh, M ; Amiri, M ; Shadrokh, S ; Sharif University of Technology
								
					Taylor and Francis Ltd 
				
								
								
					2022
				
							
				
		
							Abstract
				
					
			
		
										
				One of the major problems with projects is that they are not completed according to schedule. Uncertainty always exists at the heart of real-world project scheduling problems. This paper introduces a fuzzy project buffer management (FPBM) algorithm which is a combination of the adaptive procedure with resource tightness (APRT) and fuzzy failure mode and effects analysis (FFMEA) methods. This paper aims to present an efficient model for project buffer sizing by taking FFMEA into account to reach a more realistic schedule. In this research, for increasing the efficiency of the APRT method, the FFMEA technique is simultaneously applied with them. This research was carried out as a case study in... 
				
				
				
					A fuzzy project buffer management algorithm: a case study in the construction of a renewable project
, Article International Journal of Construction Management ; Volume 23, Issue 12 , 2023 , Pages 2134-2143 ; 15623599 (ISSN) ; Vanhoucke, M ; Khalilzadeh, M ; Amiri, M ; Shadrokh, S ; Sharif University of Technology
								
					Taylor and Francis Ltd 
				
								
								
					2023
				
							
				
		
							Abstract
				
					
			
		
										
				One of the major problems with projects is that they are not completed according to schedule. Uncertainty always exists at the heart of real-world project scheduling problems. This paper introduces a fuzzy project buffer management (FPBM) algorithm which is a combination of the adaptive procedure with resource tightness (APRT) and fuzzy failure mode and effects analysis (FFMEA) methods. This paper aims to present an efficient model for project buffer sizing by taking FFMEA into account to reach a more realistic schedule. In this research, for increasing the efficiency of the APRT method, the FFMEA technique is simultaneously applied with them. This research was carried out as a case study in... 
				
				
				
					An integrated virtual environment for feasibility studies and implementation of aerial MonoSLAM
, Article Virtual Reality ; Volume 16, Issue 3 , September , 2012 , Pages 215-232 ; 13594338 (ISSN) ; Malaek, S. M. B ; Sharif University of Technology
								
								
					2012
				
							
				
		
							Abstract
				
					
			
		
										
				This work presents a complete framework of an integrated aerial virtual environment (IAVE), which could effectively help implementing MonoSLAM (single-camera simultaneous localization and mapping) on an aerial vehicle. The developed system allows investigating different flight conditions without using any preloaded maps or predefined features. A 3D graphical engine integrated with a full 6 DOF aircraft dynamic simulator together with its trajectory generator completes the package. The 3D engine generates and accumulates real-time images of a general camera installed on the aerial vehicle. We effectively exploit C++ to develop the 3D graphics engine (3DGE) and all its associated visual... 
				
				
				
					A simulation environment for path and image generation in an aerial single-camera vision system
, Article Proceedings of the Institution of Mechanical Engineers, Part G: Journal of Aerospace Engineering ; Volume 225, Issue 5 , 2011 , Pages 541-558 ; 09544100 (ISSN) ; Malaek, S. M. B ; Sharif University of Technology
								
								
					2011
				
							
				
		
							Abstract
				
					
			
		
										
				This work describes the essential tools and architecture of a simulation environment, which could help enhance general aviation training as well as safety issues, especially while dealing with flights over unfamiliar environments. It also describes how the authors could effectively generate any desired flight path and its associated surrounding images through implementing a virtual single camera with simultaneous localization and mapping (monocular simultaneous localization and mapping) techniques. The overall package enjoys an aerial three-dimensional (3D)/graphical engine integrated with a full six-degrees-of-freedom aircraft dynamics, which serves as its trajectory generator, together... 
				
				
				
					Project buffer sizing and dynamic buffer consumption algorithm in power generation construction
, Article Engineering, Construction and Architectural Management ; Volume 29, Issue 2 , 2022 , Pages 716-738 ; 09699988 (ISSN) ; Khalilzadeh, M ; Amiri, M ; Shadrokh, S ; Sharif University of Technology
								
					Emerald Group Holdings Ltd 
				
								
								
					2022
				
							
				
		
							Abstract
				
					
			
		
										
				Purpose: The aim of this research is to propose a buffer sizing and buffer controlling algorithm (BSCA) as a heuristic algorithm for calculating project buffer and feeding buffers as well as dynamic controlling of buffer consumption in different phases of a wind power plant project in order to achieve a more realistic project duration. Design/methodology/approach: The BSCA algorithm has two main phases of planning and buffer sizing and construction and buffer consumption. Project buffer and feeding buffers are determined in the planning and buffer sizing phase, and their consumption is controlled in the construction and buffer consumption phase. The heuristic algorithm was coded and run in... 
				
				
				
					Thermoplastic starch/ethylene vinyl alcohol/forsterite nanocomposite as a candidate material for bone tissue engineering
, Article Materials Science and Engineering C ; Volume 69 , 2016 , Pages 301-310 ; 09284931 (ISSN) ; Bagheri, R ; Eslami, M ; Amiri, M ; Shokrgozar, M. A ; Mehrjoo, M ; Sharif University of Technology
								
					Elsevier Ltd 
				
								
								
					2016
				
							
				
		
							Abstract
				
					
			
		
										
				Recently, biodegradable polymers such as starch based blends have been well renowned in the biomedical field. Studies have considered them suitable for bone scaffolds, bone cements, tissue engineering scaffolds, drug delivery systems and hydrogels. The aim of this study was to synthesize nanocomposite biomaterial consisting a blend of thermoplastic starch and ethylene vinyl alcohol as the polymer matrix, and nano-structured forsterite as the ceramic reinforcing phase for bone tissue engineering applications. Furthermore, vitamin E was applied as a thermal stabilizer during melt compounding. Extrusion and injection molding were incorporated for melt blending and shaping of samples,... 
				
				
				
					A quantization noise robust object's shape prediction algorithm
, Article 13th European Signal Processing Conference, EUSIPCO 2005, Antalya, 4 September 2005 through 8 September 2005 ; 2005 , Pages 1770-1773 ; 1604238216 (ISBN); 9781604238211 (ISBN) ; Rabiee, H. R ; Asadi, M ; Nosrati, M ; Amiri, M ; Ghanbari, M ; Sharif University of Technology
								
								
					2005
				
							
				
		
							Abstract
				
					
			
		
										
				This paper introduces a quantization noise robust algorithm for object's shape prediction in a video sequence. The algorithm is based on pixel representation in the undecimated wavelet domain for tracking of the user-defined shapes contaminated by the compression noise of video sequences. In the proposed algorithm, the amplitude of coefficients in the best basis tree expansion of the undecimated wavelet packet transform is used as feature vectors (FVs). FVs robustness against quantization noise has been achieved through inherent denoising and edge component separation in the best basis selection algorithm. The algorithm uses these FVs to track the pixels of small square blocks located at the... 
				
				
				
					Robust watermarking against print and scan attack through efficient modeling algorithm
, Article Signal Processing: Image Communication ; Vol. 29, issue. 10 , November , 2014 , p. 1181-1196 ; ISSN: 09235965 ; Jamzad, M ; Sharif University of Technology
								
								
					2014
				
							
				
		
							Abstract
				
					
			
		
										
				This article proposes a blind discrete wavelet transform-discrete cosine transform (DWT-DCT) composite watermarking scheme that is robust against print and scan distortions. First, two-dimensional DWT is applied to the original image to obtain the mid-frequency subbands. Then, a one-dimensional DCT is applied to the selected mid-frequency subbands to extract the final coefficients for embedding the watermark. To specify watermarking parameters, we utilize a Genetic Algorithm to achieve a predefined image quality after watermark insertion. Suitable locations for watermarking are determined by analyzing the effect of a modeling algorithm. This model simulates noise and nonlinear attacks in... 
				
				
				
					Automatic image annotation using semi-supervised generative modeling
, Article Pattern Recognition ; Volume 48, Issue 1 , January , 2015 , Pages 174-188 ; 00313203 (ISSN) ; Jamzad, M ; Sharif University of Technology
								
					Elsevier Ltd 
				
								
								
					2015
				
							
				
		
							Abstract
				
					
			
		
										
				Image annotation approaches need an annotated dataset to learn a model for the relation between images and words. Unfortunately, preparing a labeled dataset is highly time consuming and expensive. In this work, we describe the development of an annotation system in semi-supervised learning framework which by incorporating unlabeled images into training phase reduces the system demand to labeled images. Our approach constructs a generative model for each semantic class in two main steps. First, based on Gamma distribution, a generative model is constructed for each semantic class using labeled images in that class. The second step incorporates the unlabeled images by using a modified EM... 
				
				
				
					An adaptive competitive penalty method for nonsmooth constrained optimization
, Article Numerical Algorithms ; 2016 , Pages 1-32 ; 10171398 (ISSN) ; Shaeiri, M ; Sharif University of Technology
								
					Springer New York LLC 
				
								
								
					2016
				
							
				
		
							Abstract
				
					
			
		
										
				We present a competitive algorithm to minimize a locally Lipschitz function constrained with locally Lipschitz constraints. The approach is to use an ℓ1 nonsmooth penalty function. The method generates second order descent directions to minimize the ℓ1 penalty function. We introduce a new criterion to decide upon acceptability of a Goldstein subdifferential approximation. We show that the new criterion leads to an improvement of the Goldstein subdifferential approximation, as introduced by Mahdavi-Amiri and Yousefpour. Also, making use of our proposed line search strategy, the method always moves on differentiable points. Furthermore, the method has an adaptive behaviour in the sense that,... 
				
				
				
					Efficient multi-modal fusion on supergraph for scalable image annotation
, Article Pattern Recognition ; Volume 48, Issue 7 , July , 2015 , Pages 2241-2253 ; 00313203 (ISSN) ; Jamzad, M ; Sharif University of Technology
								
					Elsevier Ltd 
				
								
								
					2015
				
							
				
		
							Abstract
				
					
			
		
										
				Different types of visual features provide multi-modal representation for images in the annotation task. Conventional graph-based image annotation methods integrate various features into a single descriptor and consider one node for each descriptor on the learning graph. However, this graph does not capture the information of individual features, making it unsuitable for propagating the labels of annotated images. In this paper, we address this issue by proposing an approach for fusing the visual features such that a specific subgraph is constructed for each visual modality and then subgraphs are connected to form a supergraph. As the size of supergraph grows linearly with the number of... 
				
				
				
					An adaptive competitive penalty method for nonsmooth constrained optimization
, Article Numerical Algorithms ; Volume 75, Issue 1 , 2017 , Pages 305-336 ; 10171398 (ISSN) ; Shaeiri, M ; Sharif University of Technology
								
					Springer New York LLC 
				
								
								
					2017
				
							
				
		
							Abstract
				
					
			
		
										
				We present a competitive algorithm to minimize a locally Lipschitz function constrained with locally Lipschitz constraints. The approach is to use an ℓ1 nonsmooth penalty function. The method generates second order descent directions to minimize the ℓ1 penalty function. We introduce a new criterion to decide upon acceptability of a Goldstein subdifferential approximation. We show that the new criterion leads to an improvement of the Goldstein subdifferential approximation, as introduced by Mahdavi-Amiri and Yousefpour. Also, making use of our proposed line search strategy, the method always moves on differentiable points. Furthermore, the method has an adaptive behaviour in the sense that,... 
				
				
				
					A conjugate gradient sampling method for nonsmooth optimization
, Article 4OR ; Volume 18, Issue 1 , May , 2020 , Pages 73-90 ; Shaeiri, M ; Sharif University of Technology
								
					Springer 
				
								
								
					2020
				
							
				
		
							Abstract
				
					
			
		
										
				We present an algorithm for minimizing locally Lipschitz functions being continuously differentiable in an open dense subset of Rn. The function may be nonsmooth and/or nonconvex. The method makes use of a gradient sampling method along with a conjugate gradient scheme. To find search directions, we make use of a sequence of positive definite approximate Hessians based on conjugate gradient matrices. The algorithm benefits from a restart procedure to improve upon poor search directions or to make sure that the approximate Hessians remain bounded. The global convergence of the algorithm is established. An implementation of the algorithm is executed on a collection of well-known test problems....