Loading...
Search for: ghaem-maghami--shahrokh
0.119 seconds

    Steganography Based on Sparse Decomposition

    , Ph.D. Dissertation Sharif University of Technology Ahani, Soodeh (Author) ; Ghaem Maghami, Shahrokh (Supervisor)
    Abstract
    The goal of this thesis is using sparse decomposition to design secure steganography algorithms to insert secret data into the different cover signals. We propose data embedding in higher semantic levels of the cover signal to reach this goal. Sparse decomposition represents a signal as a linear combination of its structural elements. Data insertion into the sparse coefficients slightly changes the effect of structural elements in the signal representation. So, quality of the stego signal is preserved and such a steganography method leads to higher imperceptibility. In addition, data insertion into the higher semantic levels leads to the higher undetectability. Steganalyzers use statistical... 

    Speech Enhancement Using Deep Neural Networks in Non-stationary Noise Environment

    , M.Sc. Thesis Sharif University of Technology Hosseini, Ehsan (Author) ; Ghaem Maghami, Shahrokh (Supervisor)
    Abstract
    Before performing any operation on a speech signal, it is necessary to properly remove the environmental noise existing on it. Noise Canceling Operation on Speech Signal is called speech enhancement. Up to now, many studies have been conducted on various ways to enhance the speech signal. Among the existing methods, statistical methods have proven to be superior to others. In all noise removal methods, the main challenge is that most noises are non-stationary. Since most of the noises in the environment are non-stationary, we are still looking for the better ways to remove them. With the advent of deep neural networks and their successful results in areas such as machine learning, a method... 

    Audio-visual Speaker Verification Using Identity Based Articulatory Features

    , M.Sc. Thesis Sharif University of Technology Keshavarz Chafjiri, Amir Hossein (Author) ; Ghaem Maghami, Shahrokh (Supervisor)
    Abstract
    Many companies feel the need of automatic person identification for tracking entrance and exit of their employers. This system will help the company in reducing security costs, waste of time and increasing security. In this thesis a novel idea for 3d convolutional neural network text independent speaker verification system will introduced. Since many scenarios visionary data like lip motion, besides speech data, is available, in this thesis both of these data streams are used for developing designed speaker verification system. Multimodalily helps the verification system to be more robust to the noise and attacks. One of the main challenges in designing multimodal neural network speaker... 

    Design Optimization of Linear Variable-Reluctance Resolver for Higher Accuracy and Smaller Size

    , Article IEEE Sensors Journal ; Volume 23, Issue 15 , 2023 , Pages 16764-16771 ; 1530437X (ISSN) Ghaem Maghami, M ; Nasiri Gheidari, Z ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2023
    Abstract
    Linear variable reluctance (VR) resolvers offer robustness and affordability in comparison with wound mover sensors. However, the accuracy of linear sensors is influenced by geometrical dimensions and the longitudinal end effect. In this article, the end effect was compensated by altering the teeth's shape using the tooth-pairing method. This altered shape could achieve much better accuracy. Furthermore, the influence of many different geometrical dimensions and shapes of teeth and yoke were examined using finite-element analysis (FEA). In addition, the results of this analysis show a trade-off between the accuracy and weight of the resolver in some cases. To verify the correctness of the... 

    Development of a Control Algorithm for Functional Electrical Stimulation to Achieve Smooth Motion

    , M.Sc. Thesis Sharif University of Technology Ghaem Maghami, Horieh (Author) ; Behzadipour, Saeed (Supervisor)
    Abstract
    The use of functional electrical stimulation after spinal cord injury is one of the most effective ways to prevent muscle atrophy.” Enzymes construction set, torque output increases and improved fatigue resistance”.
    Functional electrical stimulation devices help in the operation of a muscle by applying a weak electrical current. This stimulation causes muscle contraction. In other words, it replaces the neural signals required to move the limb that cannot be produced due to causes such as spinal cord injury (SCI) orsecondary problems that arise after SCI.
    One of the drawbacks of using FES is jerky motions in the muscles and limps. Such movements are not only harmful, but results in... 

    Provide a Model for the Sitting of Hydroelectric Power Plants Using GIS and Multiple Criteria Decision FTOPSIS: A Case From Kelas Basin

    , M.Sc. Thesis Sharif University of Technology Darban Maghami, Alireza (Author) ; Shamsai, Abolfazl (Supervisor)
    Abstract
    Nowadays due to increasing environmental considerations and effort to reducing of the fossil fuels consumption, the necessity of hydroelectric power plants development is emerged. The purpose of this study is to suggest a method of spatial analysis for finding sites with appropriate potential for construction of these power plants, using TOPSIS and GIS. In this research, using the Python programming language, in software environment of Arc GIS version 9.3, local hydrological model was generated using the DEM layer and using of streams ordering methods, the overall situation along the river were processed. In the next step, with using of fuzzy TOPSIS algorithm implementation in software... 

    Manipulability analysis for gimbal driven robotic arms

    , Article 2009 IEEE International Conference on Robotics and Biomimetics, ROBIO 2009, 19 December 2009 through 23 December 2009 ; 2009 , Pages 1039-1044 ; 9781424447756 (ISBN) Mohammadi, F ; Hemmatian, I ; Ghaem Osgouie, K ; Sharif University of Technology
    2009
    Abstract
    Gimbal transmissions are non-linear direct transmissions and can be used in robotic arms replacing the traditional revolute joints. To investigate manipulability of robotic manipulators, the classical criterion of Manipulability Ellipsoid has been formulated. Thus by keeping a constant norm for robot joint torques vector, the effects of replacing some traditional revolute joints in robotic arms with Gimbal transmissions, have been analyzed. The results show that the magnitude of the maximum force applicable when employing Gimbal transmission can be considerably larger. Also, the joint angles in which this maximum occurs, can be adjusted, thanks to the behavior of Gimbal transmission. Two... 

    Modeling the acoustic effects on droplet vaporization in a laboratory pulse combustor

    , Article American Society of Mechanical Engineers, Fluids Engineering Division (Publication) FED ; Volume 253 , 2000 , Pages 1077-1084 ; 08888116 (ISSN) Maghami, E. G ; Akbari, P ; Ghafourian, A ; Sharif University of Technology
    2000
    Abstract
    Both theoretical and experimental analysis of acoustics fields effects on droplet vaporization are presented. Theoretical investigation is based on droplet vaporization without combustion in both steady and longitudinal acoustic fields with variable properties in one dimension. An axisymmetric pulse combustor is developed for simulating the longitudinal acoustic field. A spray system is used for producing water droplets. Controllable parameters of the system are the hot air and liquid injection velocities, direction of injection and frequency of acoustic oscillation. The theoretical results indicate that the evaporation time decreases up to 30 percent in an acoustic field in comparison to... 

    Organizational secure knowledge flow model

    , Article 2015 7th Conference on Information and Knowledge Technology, IKT 2015, 26 May 2015 through 28 May 2015 ; May , 2015 , Page(s): 1 - 6 ; 9781467374859 (ISBN) Ghaem Tajgardoon, M ; Shalmani, M. T. M ; Habibi, J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    With the advance and growth of knowledge management in the past two decades, currently knowledge is regarded as one of the most significant organizational assets. Today the success of businesses is dependent on the value that they give to knowledge and how they attempt to manage it. Hence, in such conditions, knowledge as a valuable asset of the organization must be well-protected. What is managed in knowledge management in organizations is actually not knowledge. What are managed are the knowledge-related processes thru which knowledge workers interact with each other. Hence, organizational knowledge protection does not mean protecting knowledge, but securing the management of knowledge and... 

    Deep Learning Based on Sparse Coding for Data Classification

    , Ph.D. Dissertation Sharif University of Technology Amini, Sajjad (Author) ; Ghaemmaghami, Shahrokh (Supervisor)
    Abstract
    Deep neural networks have not progresses comparative until last decade due to computational complexity and principal challenges as gradient vanishing. Thanks to newly designed hardware architecture and great breakthroughs in 2000s leading to the solution of principal challenges, we currently face a tsunami of deep architecture utilization in various machine learning applications. Sparsity of a representation as a feature to make it more descriptive has been considered in different deep learning architectures leading to different formulations where sparsity is impose on specific representations. Due to the gradient based optimization methods for training deep architecture, smooth regularizers... 

    A catalyzed method to remove polychlorinated biphenyls from contaminated transformer oil

    , Article Environmental Science and Pollution Research ; 2021 ; 09441344 (ISSN) Maghami, A ; Gholipour Zanjani, N ; Khorasheh, F ; Arjmand, M ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2021
    Abstract
    The disposal of polychlorinated biphenyls (PCBs) as persistent organic pollutants from the environment has been normally performed by isolation from soil or water because of their biological activity and toxic potential. In the present investigation, catalytic hydrodehalogenation was used to detoxify PCBs-contaminated transformer oil. All reactions were directed on an oil containing 11.09 wt% of PCBs utilizing palladium supported on multi-walled carbon nanotubes (Pd/MWCNTs). The amount of hexa-chlorine homologues reduced considerably from 5.07% to less than 800 ppm utilizing HDC at the atmosphere of argon. Moreover, the amounts of long half-lives and bioaccumulative congener of PCB 153... 

    A catalyzed method to remove polychlorinated biphenyls from contaminated transformer oil

    , Article Environmental Science and Pollution Research ; Volume 29, Issue 9 , 2022 , Pages 13253-13267 ; 09441344 (ISSN) Maghami, A ; Gholipour Zanjani, N ; Khorasheh, F ; Arjmand, M ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2022
    Abstract
    The disposal of polychlorinated biphenyls (PCBs) as persistent organic pollutants from the environment has been normally performed by isolation from soil or water because of their biological activity and toxic potential. In the present investigation, catalytic hydrodehalogenation was used to detoxify PCBs-contaminated transformer oil. All reactions were directed on an oil containing 11.09 wt% of PCBs utilizing palladium supported on multi-walled carbon nanotubes (Pd/MWCNTs). The amount of hexa-chlorine homologues reduced considerably from 5.07% to less than 800 ppm utilizing HDC at the atmosphere of argon. Moreover, the amounts of long half-lives and bioaccumulative congener of PCB 153... 

    Observable Effects of Chern-Simons Gravity

    , M.Sc. Thesis Sharif University of Technology Zeynizadeh, Sarang (Author) ; Parvizi, Shahrokh (Supervisor)
    Abstract
    In low energy limit, some string theory models are described with an effective lagrangian which consist of two term. first is Eistein-Hilbert term and second is chern-simons. Adding the chern-simons term to Eistein-Hilbert lagrangian leads to the new modified field equations which schuwarzshild, Reissner-Nordstrom and FRW metrics satisfy these new modified equations while kerr metric is not a solution for these new fields. Since the gravitational field of spinning objects are similar to electromagnetic field, we expect to observe the chern-simons effects in gravitomagnetic component of the gravitational field. Here, in order to better understanding of subject, we investigate the Maxwell... 

    Improve Performance of Higher Order Statistics in Spatial and Frequency Domains in Blind Image Steganalysis

    , M.Sc. Thesis Sharif University of Technology Shakeri, Ehsan (Author) ; Ghaemmaghami, Shahrokh (Supervisor)
    Abstract
    Blind image steganalysis is a technique used to, which require no prior information about the steganographic method applied to the stego im- age, determine whether the image contains an embedded message or not. The basic idea of blind steganalysis is to extract some features sensitive to information hiding, and then exploit classifiers for judging whether a given test image contains a secret message.The main focus of this research is to design an choose features sen-sitive to the embedding changes. In fact, we use high order moments in different domains, such as spatial, DCT and multi-resolution do-main, in order to improve the performance of existing steganalyzers.Accordingly, First, we... 

    Information Hiding of Visual Multimedia Signals Based on an Entropic Transcript

    , M.Sc. Thesis Sharif University of Technology Diyanat, Abolfazl (Author) ; Ghaemmaghami, Shahrokh (Supervisor)
    Abstract
    Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. In this thesis, we focus on entropic issue of multimedia signal in the two branches of Information hiding namely Steganography and Watermarking. How to choose the block and noise estimation in the watermarking, and analysis of the singular values decomposition in steganography are examples of using entopic issue which we use in our thesis. The two new designs for video signals AVI are presented in Watermarking. For the both proposed method ,first AVI video signal will be divided... 

    Analysis of Sensitivity of Features to Data Embedding in Blind Image Steganalysis

    , M.Sc. Thesis Sharif University of Technology Heidari, Mortaza (Author) ; Ghaemmaghami, Shahrokh (Supervisor)
    Abstract
    Steganalysis is the science of detecting covert communication. It is called blind (universal) if designed to detect stego images steganographied by a wide range of embedding methods. In this method, statistical properties of the image are explored, regardless the embedding procedure employed. The main problem for image steganalysis is to find sensitive features and characteristics of the image which make a statistically significant difference between the clean and stego images. In this thesis we propose a blind image steganalysis method based on the singular value decomposition (SVD) of the discrete cosine transform (DCT) coefficients that are revisited in this work in order to enhance the... 

    Image Steganalysis Based on Sparse Representation

    , M.Sc. Thesis Sharif University of Technology Jalali, Arash (Author) ; Ghaemmaghami, Shahrokh (Supervisor)
    Abstract
    This thesis explored and described a new steganalysis system modeling. Image steganalysis systems are divided into two parts: feature extraction from images and classification of images. Many researches have been done in both parts and satisfactory results have also been reported. There are acceptable steganalysis methods which work accurately in high rates of steganography; however steganography in low rates is still undetectable. By lowering the rate of steganography in images, the difference between stego images and clean images would be reduced which accordingly led to the reduction of the difference between the corresponding extracted features. Thus, the ability of classification... 

    Structural and Algorithmic Analysis of Machine Learning for Steganalysis Based on Diversity and Size of Feature Space

    , M.Sc. Thesis Sharif University of Technology Karimi, Saeed (Author) ; Ghaemmaghami, Shahrokh (Supervisor)
    Abstract
    In this project we proposed a new method for improving the detection abality of a steganalyser with a pre-processing on contents of an image. Steganalysis, using machine learning, is designing a classifier with two classes: Stego or Cover. This classifier should be trained with extracted features from signal. The result of the training procedure is a machine that decides a signal belongs to stego or cover class. The first step of steganalysis process is extraction of proper features from signal. Proper feature is a variable that represents all of the useful properties of signal. Second step of this process is classifying data to two class of stego and cover. Many algorithms are proposed for... 

    Automatic Music Signal Classification Through Hierarchical Clustering

    , M.Sc. Thesis Sharif University of Technology Delfani, Erfan (Author) ; Ghaemmaghami, Shahrokh (Supervisor)
    Abstract
    The rapid increase in the size of digital multimedia data collections has resulted in wide availability of multimedia contents to the general users. Effective and efficient management of these collections is an important task that has become a focus in the research of multimedia signal processing and pattern recognition. In this thesis, we address the problem of automatic classification of music, as one of the main multimedia signals. In this context, music genres are crucial descriptors that are widely used to organize the large music collections. The two main components of automatic music genre classification systems are feature extraction and classification. While features are a compact... 

    Detection of Forgeries in Moving Objects in Digital Video

    , M.Sc. Thesis Sharif University of Technology Bidokhti, Amir (Author) ; Ghaemmaghami, Shahrokh (Supervisor)
    Abstract
    This project aims at forgery detection in digital videos. Most of existing methods are based on similar methods for image forgery detection. Therefore, they do not have sufficient accuracy in case of video forgery detection. In this project, we focus on local copy/move attacks in digital videos and propose 3 solutions for 3 problems in this field: 1) detection of copy/move along time axis (temporal copy/move), 2) detection of copy/move along x and y axes (spatial copy/move) and 3) detection of original and fake part in case of finding a duplication. For each of these 3 problems a feature extraction algorithm and a forgery detection algorithm are proposed. Feature extraction algorithms are...