Loading...
Search for:
ramin--shirali-hossein-zadeh
0.146 seconds
Total 1842 records
Performance Improvement of Machine Learning based Intrusion Detection Systems
, M.Sc. Thesis Sharif University of Technology ; Jafari Siavoshani, Mahdi (Supervisor)
Abstract
The rapid growth of computer networks has increased the importance of analytics and traffic analysis tools for these networks, and the increasing importance of these networks has increased the importance of security of these networks and the intrusion detection in these networks. Many studies aimed at providing a powerful way to quickly and accurately detect computer network intrusions, each of which has addressed this issue.The common point of all these methods is their reliance on the features extracted from network traffic by an expert. This strong dependence has prevented these methods from being flexible against new attacks and methods of intrusion or changes in the current normal...
On the isoperimetric spectrum of graphs and its approximations [electronic resource]
, Article Journal of Combinatorial Theory, Series B ; Volume 100, Issue 4, July 2010, Pages 390–412 ; Hajiabolhassan, Hossein ; Javadi, Ramin ; Sharif University of Technology
Abstract
In this paper1 we consider higher isoperimetric numbers of a (finite directed) graph. In this regard we focus on the nth mean isoperimetric constant of a directed graph as the minimum of the mean outgoing normalized flows from a given set of n disjoint subsets of the vertex set of the graph. We show that the second mean isoperimetric constant in this general setting, coincides with (the mean version of) the classical Cheeger constant of the graph, while for the rest of the spectrum we show that there is a fundamental difference between the nth isoperimetric constant and the number obtained by taking the minimum over all n-partitions. In this direction, we show that our definition is the...
Recovery of Gallium from Sodium Aluminate Solution in Bayer Process
, M.Sc. Thesis Sharif University of Technology ; Yoozbashi Zadeh, Hossein (Supervisor)
Abstract
Gallium is a rare and precious metal that is of particular importance in the electronics industry due to its use in semiconductors. This metal is partially present in bauxite ore. Around 70% of gallium go into sodium aluminate solution during the leaching of bauxite in the Bayer process. Gallium can be extracted from this solution, which is also called bayer solution, by several methods. Solvent extraction is one of the most common methods for recovery of gallium from Bayer's solution. Capabilities of this method for metals separation and concentrating of polymetallic solution, makes it suitable for many commercial and operational application. In present work, different substances used to...
MR artifact reduction in the simultaneous acquisition of EEG and fMRI of epileptic patients
, Article 16th European Signal Processing Conference, EUSIPCO 2008, Lausanne, 25 August 2008 through 29 August 2008 ; 2008 ; 22195491 (ISSN) ; Sameni, R ; Jutten, C ; Hossein Zadeh, G. A ; Soltanian Zadeh, H ; Sharif University of Technology
2008
Abstract
Integrating high spatial resolution of functional magnetic resonance imaging (fMRI) and high temporal resolution of electroencephalogram (EEG) is promising in simultaneous EEG and fMRI analysis, especially for epileptic patients. The EEG recorded inside an MR scanner is interfered with MR artifacts. In this article, we propose new artifact reduction approaches and compare them with the conventional artifact reduction methods. Our proposed approaches are based on generalized eigenvalue decomposition (GEVD) and median filtering. The proposed methods are applied on experimental simultaneous EEG and fMRI recordings of an epileptic patient. The results show significant improvement over...
Deep packet: a novel approach for encrypted traffic classification using deep learning
, Article Soft Computing ; Volume 24, Issue 3 , May , 2020 , Pages 1999-2012 ; Jafari Siavoshani, M ; Shirali Hossein Zade, R ; Saberian, M ; Sharif University of Technology
Springer
2020
Abstract
Network traffic classification has become more important with the rapid growth of Internet and online applications. Numerous studies have been done on this topic which have led to many different approaches. Most of these approaches use predefined features extracted by an expert in order to classify network traffic. In contrast, in this study, we propose a deep learning-based approach which integrates both feature extraction and classification phases into one system. Our proposed scheme, called “Deep Packet,” can handle both traffic characterization in which the network traffic is categorized into major classes (e.g., FTP and P2P) and application identification in which identifying end-user...
Effect of Cu2+ on Leaching of Chalcopyrite in Chloride Media and Investigation of Thermodynamic and Kinetics of Process and Comparison with Sulfate Media
, M.Sc. Thesis Sharif University of Technology ; Yoozbashi Zadeh, Hossein (Supervisor)
Abstract
High advantages of hydrometallurgy have led to its recent development in metal extraction. Many investigations have been carried out on applying hydrometallurgy processes on copper extraction. In this study, Chalcopyrite concentrate produced in Sarcheshmeh copper plant was subjected to oxidative leaching investigation by cupric ion to determine the effect of several parameters on the copper and iron dissolution, included temperature of leaching, time of holding and cupric concentration as oxidant agent in a range of 38-97°C, 1.5-8.5 hours and 0.2-0.8 M respectively. The leaching media was chloride providing with 3M HCl 37% and CuCl2. The experiments were designed by central composite...
An iterative approach for reconstruction of arbitrary sparsely sampled magnetic resonance images
, Article 18th IEEE Symposium on Computer-Based Medical Systems, Dublin, Ireland, 23 June 2005 through 24 June 2005 ; 2005 , Pages 27-32 ; 10637125 (ISSN) ; Soleymani, M ; Hossein Zadeh, G. A ; Sharif University of Technology
2005
Abstract
In many fast MR imaging techniques, K-space is sampled sparsely in order to gain a fast traverse of K-space. These techniques use non-Cartesian sampling trajectories like radial, zigzag, and spiral. In the reconstruction procedure, usually interpolation methods are used to obtain missing samples on a regular grid. In this paper, we propose an iterative method for image reconstruction which uses the black marginal area of the image. The proposed iterative solution offers a great enhancement in the quality of the reconstructed image in comparison with conventional algorithms like zero filling and neural network. This method is applied on MRI data and its improved performance over other methods...
Modeling and Numerical Simulation of Inertial Two-Phase Flow in Heterogeneous Porous Media
, M.Sc. Thesis Sharif University of Technology ; Ghazanfari, Mohammad Hossein (Supervisor) ; Bozorgmehri, Ramin (Supervisor)
Abstract
In this study, single-phase and two-phase, incompressible flow in a non-deformable porous media was modeled and also simulated. The Reynolds numbers have been considered high enough to justify the use of the model including inertial terms. Afterwards, the mass conservative equations were discretized. Then, the numerical model has been developed for heterogeneous porous media. The heterogeneous porous media was comprised by several specified homogeneous regions, each having isotropic transport properties or permeability distribution with applying stochastic methods. The developed numerical model was used for predicting of saturation profile in water flooding process in one, two and...
Determination of strain field and heterogeneity in radial forging of tube using finite element method and microhardness test
, Article Materials and Design ; Volume 38 , June , 2012 , Pages 147-153 ; 02641275 (ISSN) ; Saidi, P ; Karimi Taheri, A ; Hossein Zadeh, M ; Sharif University of Technology
2012
Abstract
Utilizing the Finite Element Method (FEM), the strain field in the radial forging process of tube is calculated at different process conditions and compared with the experimental results achieved using the microhardness test. The effect of various process parameters such as friction, axial feed, back push and front pull forces and die angles on the strain field are investigated. Using the results of the analysis, it is shown that the deformation inhomogeneity, introduced by an Inhomogeneity Factor (IF), is maximum in the inner zone of tube, while the minimum and the maximum effective strains are appeared at the inner zone of tube and about the core of the tube thickness, respectively. Also,...
Parental control based on speaker class verification
, Article IEEE Transactions on Consumer Electronics ; Volume 54, Issue 3 , 2008 , Pages 1244-1251 ; 00983063 (ISSN) ; Sameti, H ; Shirali Shahreza, M ; Sharif University of Technology
2008
Abstract
Restricting children access to materials unsuitable for them such as violence scenes is very important for parents. So there is a feature named Parental Control in devices such as televisions and computers to define the contents children can access. The parental control setting must be protected from children and is usually done by a password. In this paper, we propose a new method for distinguishing between adult users and child users based on human speech. In our proposed method, the user must say a word and the adult users are identified by processing the speech. Our current implementation has 92.5% accuracy for distinguishing adult users from children. © 2008 IEEE
Fast and scalable system for automatic artist identification
, Article IEEE Transactions on Consumer Electronics ; Volume 55, Issue 3 , 2009 , Pages 1731-1737 ; 00983063 (ISSN) ; Abolhassani, H ; Shirali Shahreza, M. H ; Sharif University of Technology
2009
Abstract
Digital music technologies enable users to create and use large collections of music. One of the desirable features for users is the ability to automatically organize the collection and search in it. One of the operations that they need is automatic identification of tracks' artists. This operation can be used to automatically classify new added tracks to a collection. Additionally, the user can use this operation to identify the artist of an unknown track. The artist name of a track can help the user find similar music. In this paper, we introduce a fast and scalable system that can automatically identify the artist of music tracks. This system is creating a signature for each track that is...
AntAngioCOOL: computational detection of anti-angiogenic peptides
, Article Journal of Translational Medicine ; Volume 17, Issue 1 , 2019 ; 14795876 (ISSN) ; Khorsand, B ; Yousefi, A. A ; Kargar, M. J ; Shirali Hossein Zade, R ; Mahdevar, G ; Sharif University of Technology
BioMed Central Ltd
2019
Abstract
Background: Angiogenesis inhibition research is a cutting edge area in angiogenesis-dependent disease therapy, especially in cancer therapy. Recently, studies on anti-angiogenic peptides have provided promising results in the field of cancer treatment. Methods: A non-redundant dataset of 135 anti-angiogenic peptides (positive instances) and 135 non anti-angiogenic peptides (negative instances) was used in this study. Also, 20% of each class were selected to construct an independent test dataset (see Additional files 1, 2). We proposed an effective machine learning based R package (AntAngioCOOL) to predict anti-angiogenic peptides. We have examined more than 200 different classifiers to build...
Compact representation of multimedia files for indexing, classification and retrieval
, Article Proceedings of the International Conference on Management of Emergent Digital EcoSystems, MEDES '09, 27 October 2009 through 30 October 2009, Lyon ; 2009 , Pages 489-492 ; 9781605588292 (ISBN) ; Sharif University of Technology
2009
Abstract
Multimedia files including audio, music and movies are important part of resources available on the Internet. With the expansion of personal computers and other digital devices such as digital cameras, ordinary people are also creating different multimedia files. Hence, there are huge amount of multimedia files in the Internet. Considering the volume of files available, we need automatic methods for indexing, classification and retrieval of multimedia files. But, there are a number of problems in processing multimedia files. Two important issues are the large size of multimedia files and different lengths of different files. In this PhD project, we want to develop a solution for these two...
Use speech for user's group identification
, Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 24 June 2009 through 26 June 2009, Saarbrucken ; Volume 5723 LNCS , 2009 , Pages 313-316 ; 03029743 (ISSN) ; 3642125492 (ISBN) ; Sharif University of Technology
2009
Abstract
Speech is one of the main communication methods used by humans. So designing speech based interfaces for computer applications can ease the use of them for different users, especially disabled and elderly people. In this project, we want to design and implement a system that can identify user's group from his/her speech. We are working on two main applications: Parental Control and Completely Automated Public Turing test to tell Computers and Human Apart (CAPTCHA). In the Parental Control application, we want to distinguish between child users and adults based on human speech. This can be used to restrict child user access to adult materials such as adult websites. In the CAPTCHA...
Improving mobile banking security using steganography
, Article 4th International Conference on Information Technology-New Generations, ITNG 2007, Las Vegas, NV, 2 April 2007 through 4 April 2007 ; 2007 , Pages 885-887 ; 0769527760 (ISBN); 9780769527765 (ISBN) ; Sharif University of Technology
2007
Abstract
Upon development of m-commerce as one of the new branches of e-commerce, m-banking has emerged as one of the main divisions of m-commerce. As the m-banking was received very well, it has embarked upon supply of various services based on different systems and with the aid of various services such as the Short Messaging Service (SMS). However, in spite of its advantages, m-banking is facing some challenges as well. One of these challenges is the issue of security of this system. This paper presents a method for increasing security of the information requested by users with the use of steganography method. In this method, instead of direct sending of the information, it is hidden in a picture...
A new method for real-time steganography
, Article 8th International Conference on Signal Processing, ICSP 2006, Guilin, 16 November 2006 through 20 November 2006 ; Volume 4 , 2006 ; 0780397371 (ISBN); 9780780397378 (ISBN) ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2006
Abstract
The hidden, real-time sending and display of information, esp. in public places, has since long received attention and faced many challenges. Therefore, different methods have been proposed so far for hiding information in different cover media. In this paper I propose a new method for the real-time hiding of information without need to any storage cover media. This method is based on the real-time hiding of information in output screens of the instrument (such as screens shown by the monitor). This method of steganography is very similar to the two discussions of image steganography and video steganography. The idea suggested in this paper was simulated on a PC computer by using the Pascal...
Text steganography by changing words spelling
, Article 2008 10th International Conference on Advanced Communication Technology, Phoenix Park, 17 February 2008 through 20 February 2008 ; Volume 3 , 2008 , Pages 1912-1913 ; 17389445 (ISSN); 9788955191356 (ISBN) ; Sharif University of Technology
2008
Abstract
One of the important issues in security fields is hidden exchange of information. There are different methods for this purpose such as cryptography and steganography. Steganography is a method of hiding data within a cover media so that other individuals fail to realize their existence. In this paper a new method for steganography in English texts is proposed. In this method the US and UK spellings of words substituted in order to hide data in an English text. For example "color" has different spelling in UK (colour) and US (color). Therefore the data can be hidden in the text by substituting these words
Steganography in MMS
, Article 11th IEEE International Multitopic Conference, INMIC 2007, Lahore, 28 December 2007 through 30 December 2007 ; 2007 ; 1424415535 (ISBN); 9781424415533 (ISBN) ; Sharif University of Technology
2007
Abstract
After rapid growth of the Internet, establishing hidden communication is an important subject of security that has gained increasing importance. One of the methods for establishing hidden communication is steganography. On the other hand with the expanding the use of mobile phones mobile telecommunication companies starting to add additional features to their mobile phones such as MMS (Multimedia Messaging Service) in order to attract more customers. Considering above statements, steganography in MMS messages is a good solution for establishing hidden communication. In this paper a new method for steganography in MMS messages using both text and image steganography methods is presented. This...
Pseudo-space Persian/Arabic text steganography
, Article 13th IEEE Symposium on Computers and Communications, ISCC 2008, Marrakech, 6 July 2008 through 9 July 2008 ; 2008 , Pages 864-868 ; 15301346 (ISSN) ; 9781424427031 (ISBN) ; Sharif University of Technology
2008
Abstract
In recent years by growing computer applications, new technologies are also invented. Meanwhile new issues are faced such as security. One of the security areas is hidden exchange of information which contains methods such as cryptography and steganography. Steganography is the art of hiding data in a cover media such as image or sound. In this paper a new method for Steganography in Persian and Arabic texts is presented. In this method pseudo-space character is used for hiding the data. This character prevents the Persian and Arabic letters from joining but without adding a space between the two and keeps the words closer together. Its code is 200C in Unicode hex notation. This character...
Design and implementation of three different methods for announcing exam grades on the web
, Article 8th IEEE International Conference on Advanced Learning Technologies, ICALT 2008, Santander, 1 July 2008 through 5 July 2008 ; 2008 , Pages 335-337 ; 9780769531670 (ISBN) ; Sharif University of Technology
2008
Abstract
After the emergence of modern technologies in the field of information technologies (IT), virtual learning has attained a new form. The way of announcing exams' grades is an important topic in e-learning. For announcing exams' grades on the web, various methods have been proposed. In this paper, first some common methods for announcing students' grades are reviewed, then three new methods which are named "Virtual Grade", "Steganography Grades", and "Grade HIP" are introduced and the result of implementing these methods for announcing the grades of some courses at the some Iranian universities are provided. Also these methods and their results are analyzed. Finally these three new methods are...