Loading...
Search for: shirali-shahreza--s
0.094 seconds

    Surviving with SMS

    , Article Handbook of Research on E-Services in the Public Sector: E-Government Strategies and Advancements ; 2010 , Pages 326-335 ; 9781615207893 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2010
    Abstract
    The mobile phone is one of the technologies which are widely used these days. It is available in most countries and all people, even children and elderly people can use it. It seems that in the near future, each person will have at least one mobile phone. So it is a good choice for communication in emergency situations, such as a heart attack or after an earthquake. In this chapter, we will survey a number of systems which are designed for communication in emergency situations and then explain three systems which are developed by the authors. The first one is for locating and rescuing victims after an earthquake. The second system is for calling an emergency team by patients in emergency... 

    Examining the usage of feedback vibration in nintendo DS handheld game console

    , Article 11th International Conference on Advanced Communication Technology, ICACT 2009, Phoenix Park, 15 February 2009 through 18 February 2009 ; Volume 3 , 2009 , Pages 1997-2000 ; 17389445 (ISSN); 9788955191387 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2009
    Abstract
    Feedback vibration is a standard feature in almost every home video game console controller to vibrate in selected circumstances, such as when the user's character kick the ball or hit the opponent, to immerse the player in the game. In the handheld game consoles this feature causes the handheld game consoles to vibrate. But the handheld game consoles are different than home video game consoles. In this paper we examine the suitability of using feedback vibration in the handheld game consoles. We evaluated feedback vibration popularity among the users. We used Nintendo DS handheld game consoles for this evaluation  

    CAPTCHA for blind people

    , Article ISSPIT 2007 - 2007 IEEE International Symposium on Signal Processing and Information Technology, Cairo, 15 December 2007 through 18 December 2007 ; 2007 , Pages 995-998 ; 9781424418350 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2007
    Abstract
    Nowadays the Internet users are from different ages and groups. The disabled people also use the Internet. Some websites are especially created for disabled people. Many Internet sites offers services for human users, but unfortunately some computer programs are designed which abuse these services. As a result some systems named CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart) have been introduced to tell apart human users and computer software. In this paper, a new CAPTCHA method is introduced which can be used by blindpeople. In this method a simple mathematicalproblem is created according to predefined patterns and converted to speech using a... 

    Collage CAPTCHA

    , Article 2007 9th International Symposium on Signal Processing and its Applications, ISSPA 2007, Sharjah, 12 February 2007 through 15 February 2007 ; 2007 ; 1424407796 (ISBN); 9781424407798 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2007
    Abstract
    Nowadays, many daily human activities such as education, commerce, talks, etc. are carried out through the Internet. In cases such as the registering in websites, some hackers write programs to make automatic false enrolments which waste the resources of the website while this may even stop the entire website from working. Therefore, it is necessary to tell apart human users from computer programs which is known as CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart). CAPTCHA methods are mainly based on the weak points of OCR (Optical Character Recognition) systems while using them are undesirable to human users. In this paper a method has been presented for... 

    Persian/arabic unicode text steganography

    , Article 4th International Symposium on Information Assurance and Security, IAS 2008, Napoli, 8 September 2008 through 10 September 2008 ; 2008 , Pages 62-66 ; 9780769533247 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    Sending information secretly and communicating covertly have been of great interest for ages. On the other hand, text documents have been widely used and consequently various methods for hiding information in texts (Text Steganography) have been developed so far. In this paper a new method is proposed to hide information in digital Persian and Arabic Unicode texts. In Persian and Arabic, each letter can have four different shapes regarding to its position in the word. In this method by using this feature of Persian and Arabic languages and the way which documents are saved in the Unicode Standard, the information is hidden in Unicode text documents. This method has a good hiding capacity... 

    Question-based CAPTCHA

    , Article International Conference on Computational Intelligence and Multimedia Applications, ICCIMA 2007, Sivakasi, Tamil Nadu, 13 December 2007 through 15 December 2007 ; Volume 4 , 2008 , Pages 54-58 ; 0769530508 (ISBN); 9780769530505 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    Today there are many Internet sites which require only the entry by human users but unfortunately some computer softwares called bots are designed by some hackers to enter these sites and use their resources through false registration. As a result some systems named CAPTCHA have been introduced to tell apart human users and computer software. This paper introduces a new CAPTCHA method. In this method a simple mathematical problem is generated according to a predefined pattern but instead of some object's name, we put their images. Then the whole problem is saved and shown to the user inform of an image to be answered by him. But since answering this problem requires four abilities of... 

    Passwordless login system for mobile phones using CAPTCHA

    , Article 49th International Symposium ELMAR-2007 focused on Mobile Multimedia, Zadar, 12 September 2007 through 14 September 2007 ; September , 2007 , Pages 243-246 ; 13342630 (ISSN); 9789537044053 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2007
    Abstract
    In last 20 years, the Internet and mobile communication growth in parallel. There are many sites specially designed for mobile phones that users must enter username and password to enter them. In this paper we introduce a new method based on CAPTCHA which does not require entering any password. Instead of entering the password, an image of a number is shown to the user and he/she must type it. The user response is coded with his/her mobile phone IMEI and sent to the server. The server checks user's response according to user's IMEI and if it was correct, let the user to enter the site, so there is no need to enter any password. This method has been implemented in PHP and J2ME languages and... 

    Online collage CAPTCHA

    , Article 8th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2007, Santorini, 6 June 2007 through 8 June 2007 ; July , 2007 ; 076952818X (ISBN); 9780769528182 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2007
    Abstract
    In some websites it is necessary to tell apart human users from computer programs which is known as CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart). CAPTCHA methods are mainly based on the weak points of OCR systems while using them are undesirable to human users. In this paper a method has been presented for telling the human users and computer softwares apart on the basis of choice of an object shown on the screen. In this method some objects are chosen randomly and the pictures about these topics are downloaded from Internet. Then after effecting some changes such as rotating, all of the pictures are shown on the screen. Then we ask the user to choose a... 

    Motion CAPTCHA

    , Article 2008 Conference on Human System Interaction, HSI 2008, Krakow, 25 May 2008 through 27 May 2008 ; 2008 , Pages 1042-1044 ; 9781424415434 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    In some websites it is necessary to distinguish between human users and computer programs which is known as CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart). CAPTCHA methods are mainly based on the weaknesses of OCR systems while using them are undesirable to human users. In this paper a new CAPTCHA method is introduced on the basis of showing a movie of a person's action. Then we ask the user to describe the movement of that person. The user should select the sentence which describes the motion from a list of sentences. If the user chooses the right sentence we can guess that the user is a human and not a computer program. The main advantage of this method... 

    Encouraging persons with hearing problem to learn sign language by Internet websites

    , Article 8th IEEE International Conference on Advanced Learning Technologies, ICALT 2008, Santander, 1 July 2008 through 5 July 2008 ; 2008 , Pages 1036-1037 ; 9780769531670 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    Nowadays the Internet users are from different ages and groups. Disabled people are a group of the Internet users. Some websites are especially created for these people. One group of the disabled people are deaf persons. They have a special talking language which is named sign language. Here we present a method to encourage them, esp. children, to learn the sign language. In this method, when a deaf person wants to enter a website which is created for deaf persons, a word is shown as a movie using a sign language. The user should recognize the word and select it from a list. If the user understands the sign language and recognizes the word, he/she can enter the website. This project has been... 

    A captcha system for nintendo DS

    , Article Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games, NetGames'08, 21 October 2008 through 22 October 2008, Worcester, MA ; 2008 , Pages 104-105 ; 9781605581323 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    In some websites, it is necessary to distinguish between human users and computer programs which is known as CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart). CAPTCHA methods are mainly based on the weaknesses of OCR systems while using them are undesirable to human users and cannot be used in some devices such as devices without keyboard. Nintendo DS is a popular handheld game console which was released in 2004. Nowadays, facilities such as the Internet connection are added in new game consoles and they are not merely used for playing games. Nintendo DS is also capable of connecting to the Internet by using the Nintendo DS Browser. But Nintendo DS Browser... 

    Software watermarking by equation reordering

    , Article 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA, Damascus, 7 April 2008 through 11 April 2008 ; 2008 ; 1424417511 (ISBN); 9781424417513 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    Watermarking is the process of hiding information in a media and usually used to for copyright protection. In software watermarking, the information is added to the source code of program and can be extracted from compiled executable code. In this paper, a new software watermarking algorithm is proposed by equation reordering. In this method, the order of operands in an equation is changed according to the information we want to hide in a way that the result of the equation is unchanged. One of the main advantages of this method is that no code added to the program, so the size and speed of the program not changed  

    Dynamic CAPTCHA

    , Article 2008 International Symposium on Communications and Information Technologies, ISCIT 2008, Vientiane, 21 October 2008 through 23 October 2008 ; December , 2008 , Pages 436-440 ; 9781424423361 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    Registration websites use CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart) systems to prevent the bot programs from wasting their resources. But sometimes the CAPTCHA test is difficult for human users to pass because the users have different ages, languages, etc. In this paper we propose a solution for this problem. The registration system can select a kind of CAPTCHA system among different available CAPTCHA systems regarding to the user's needs such as user language and disabilities. For example if the user has non-English language, the system chooses a CAPTCHA method which does not need English language knowledge. © 2008 IEEE  

    CAPTCHA systems for disabled people

    , Article 2008 IEEE 4th International Conference on Intelligent Computer Communication and Processing, ICCP 2008, Cluj-Napoca, 28 August 2008 through 30 August 2008 ; October , 2008 , Pages 319-322 ; 9781424426737 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    Nowadays the Internet users are from different ages and groups. The disabled people also use the Internet. Some websites are especially created for disabled people. Many Internet sites offers services for human users, but unfortunately some computer programs are designed to abuse these services. To solve this problem, some systems named CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart) have been introduced to distinguish between human users and computer programs. CAPTCHA methods are mainly based on the weaknesses of OCR systems while using them is undesirable for human users, especially for disabled people. Therefore some CAPTCHA methods are designed... 

    Steganography in TeX documents

    , Article Proceedings of 2008 3rd International Conference on Intelligent System and Knowledge Engineering, ISKE 2008, Xiamen, 17 November 2008 through 19 November 2008 ; December , 2008 , Pages 1363-1366 ; 9781424421978 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    Steganography is a method for hidden exchange of information by hiding data in a cover media such as image or sound. Text Steganography is one of the most difficult methods because a text file is not a proper media to hide data in it. In this paper we propose a new text Steganography method. In this method, we hide data in TeX documents. This method hides the data in places where there is a ligature such as "fi". © 2008 IEEE  

    High capacity Persian/Arabic text steganography

    , Article Journal of Applied Sciences ; Volume 8, Issue 22 , 2008 , Pages 4173-4179 ; 18125654 (ISSN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    One of the methods introduced for establishing hidden communication is steganography. Steganography is the art of hiding information in a cover media without attracting attention. Text documents are one of the common cover media used for steganography in past. Steganography in text is more difficult than other media because there is a little redundant information in text documents. In this study, we propose a high capacity text steganography method. Our method can hide about 400 bits in each kilobyte of text. In Persian and Arabic, each letter can have four different shapes regarding to its position in the word. In this method this feature of Persian and Arabic languages is used for... 

    Drawing CAPTCHA

    , Article ITI 2006: 28th International Conference on Information Technology Interfaces, Cavtat/Dubrovnik, 19 June 2006 through 22 June 2006 ; 2006 , Pages 475-480 ; 13301012 (ISSN); 9537138054 (ISBN); 9789537138059 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    University of Zagreb  2006
    Abstract
    Nowadays, many daily human activities such as education, commerce, talks, etc. are carried out through the Internet. In cases such as the registering in websites, some hackers write programs to make automatic false enrolments which waste the resources of the website while this may even stop the entire website from working. Therefore, it is necessary to tell apart human users from computer programs which is known as CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart). CAPTCHA methods are mainly based on the weak points of OCR (Optical Character Recognition) systems while using them are undesirable to human users and esp. difficult in tools such as PDA's or... 

    Preventing mobile software cracking using CAPTCHA

    , Article 2006 Innovations in Information Technology, IIT, Dubai, 19 November 2006 through 21 November 2006 ; 2006 ; 1424406749 (ISBN); 9781424406746 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2006
    Abstract
    Now we are able to offer numerous softwares for mobile phones after the advances in mobile phone industry. Most of these softwares should be bought in order that we can use them. Some of these softwares are sharewares and after buying them you have to insert a serial number given by the manufacturing company in order to activate the software. But the crackers reproduce them illegally by cracking the software. One of the tactics used by crackers for finding the serial number of the softwares is brute force attacks. In this paper a method based on CAPTCHA (Completely Automated Public Turing Test to tell Computer and Humans Apart) is proposed for solving this problem. In this method while... 

    Rescue SMS

    , Article 2006 SICE-ICASE International Joint Conference, Busan, 18 October 2006 through 21 October 2006 ; 2006 , Pages 1300-1303 ; 8995003855 (ISBN); 9788995003855 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2006
    Abstract
    Earthquake is one of the natural disasters which have a lot of victims each year. If the rescue mission for saving victims be done in first hours after the earthquake, the number of earthquake victims can be lowered. Different methods had been proposed to find victims under devastated buildings which some of them are expensive and time consuming and aren't applicable in under developing countries. So, here we propose a method for rescuing earthquake victims using mobile phone and SMS (Short Message Service) service. In this method, the Earthquake Emergency Center send an SMS message to all people in place which earthquake was happen that asking about people condition. A special program which... 

    Collage steganography

    , Article 5th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2006. In conjunction with 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse, COMSAR 2006, Honolulu, HI, 10 July 2006 through 12 July 2006 ; Volume 2006 , 2006 , Pages 316-321 ; 0769526136 (ISBN); 9780769526133 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2006
    Abstract
    Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. One of the methods introduced for establishing hidden communication is steganography. Methods of steganography have been mostly applied on images while the major characteristic of these methods is the change in the structure and features of the images so as not to be identifiable by human users. However, on the other hand, many methods have been proposed for breaking and extracting information (steganalysis) for these methods. This paper presents a method for hiding information in images by changing the appearance of the picture instead...