Loading...
Search for: shakeri--m
0.147 seconds

    A robust zero-watermark copyright protection scheme based on DWT and image normalization

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 20 November 2011 through 23 November 2011 ; Volume 7088 LNCS, Issue PART 2 , November , 2011 , Pages 359-370 ; 03029743 (ISSN) ; 9783642253454 (ISBN) Shakeri, M ; Jamzad, M ; Sharif University of Technology
    2011
    Abstract
    Recently, protecting the copyright of digital media has become an imperative issue due to the growing illegal reproduction and modification of digital media. A large number of digital watermarking algorithms have been proposed to protect the integrity and copyright of images. Traditional watermarking schemes protect image copyright by embedding a watermark in the spatial or frequency domain of an image. However, these methods degrade the quality of the original image in some extend. In recent years, a new approach called zero-watermarking algorithms is introduced. In these methods, the watermark does not require to be embedded into the protected image but is used to generate a verification... 

    A robust copyright protection scheme based on discrete cosine transform and image normalization

    , Article 2011 7th Iranian Conference on Machine Vision and Image Processing, MVIP 2011 - Proceedings ; 2011 ; 9781457715358 (ISBN) Shakeri, M ; Jamzad, M ; Sharif University of Technology
    2011
    Abstract
    Watermarking is a way that is used to protect the copyright of images. As the existing watermarking methods are not robust enough a new novel scheme is needed. In this paper, we propose a zero-watermark discrete cosine transformation-based copyright protection scheme, in which a normalization procedure is applied in both watermark embedding and extraction to make our scheme more robust to geometric distortions. This method is resistant to malicious signal processing and geometric attacks such as blurring, JPEG compression, noise adding, sharpening, scaling, rotation and cropping. Experimental results on images with different complexity show that our proposed scheme outperforms related... 

    A robust zero-watermarking scheme using Canny edge detector

    , Article International Journal of Electronic Security and Digital Forensics ; Volume 5, Issue 1 , 2013 , Pages 25-44 ; 1751911X (ISSN) Shakeri, M ; Jamzad, M ; Sharif University of Technology
    2013
    Abstract
    By expansion of digital multimedia and networking technology, the problem of ownership protection has become increasingly important. Digital watermarking is an efficient way for copyright protection of digital images. Traditional watermarking techniques degrade the quality of host image by embedding a watermark logo. Facing this problem, a new watermarking approach called zero-watermarking has been proposed. In zero-watermarking methods, the watermark does not require to be embedded into the protected image but it uses both the watermark and the protected image to generate a verification map which is registered to a trusted authority for further protection. In this paper we propose a robust... 

    Using sensitivity analysis and gradual evaluation of ignition delay error to produce accurate low-cost skeletal mechanisms for oxidation of hydrocarbon fuels under high-temperature conditions

    , Article Energy and Fuels ; Volume 31, Issue 10 , 2017 , Pages 11234-11252 ; 08870624 (ISSN) Shakeri, A ; Mazaheri, K ; Owliya, M ; Sharif University of Technology
    2017
    Abstract
    Three-dimensional thermo-hydrodynamic analysis of gas turbine combustion chambers is of great importance in the power generation industry to achieve higher efficiency and reduced emissions. However, it is prohibitive to use a comprehensive full-detailed mechanism in their simulation algorithms because of the huge CPU time and memory space requirements. Many reduction approaches are available in the literature to remedy this problem. Here a new approach is presented to reduce large detailed or skeletal mechanisms of oxidation of hydrocarbon fuels to a low-cost skeletal mechanism. The method involves an integrated procedure including a Sensitivity Analysis (SA) and a procedure of Gradual... 

    Proactive admission control and dynamic resource management in SDN-based virtualized networks

    , Article 8th International Conference on the Network of the Future, NOF 2017, 22 November 2017 through 24 November 2017 ; Volume 2018-January , 2018 , Pages 46-51 ; 9781538605547 (ISBN) Shakeri, S ; Parsaeefard, S ; Derakhshani, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Network virtualization is a promising approach in which common physical resources are shared between service providers. Due to the substrate network limitations such as maximum available memory of each node of the substrate network as well as different service priorities and requirements, resource management in this setup is essential. On the other hand, SDN is bringing a considerable flexibility in resource management by introducing a centralized controller which can monitor all the substrate network states. In this paper, we propose a proactive admission control and dynamic resource management in SDN-based virtualized network in which the number of accepted high-priority virtual network... 

    Nonreciprocal behaviour between photon and phonon in coupled optomechanical systems

    , Article Journal of Modern Optics ; Volume 64, Issue 5 , 2017 , Pages 507-514 ; 09500340 (ISSN) Shakeri, S ; Zandi, M. H ; Bahrampour, A ; Sharif University of Technology
    Taylor and Francis Ltd  2017
    Abstract
    It is shown that the asymmetry coupling between two coupled optomechanical cavities leads to special class of PT-symmetric model for optomechanical structure. Under these conditions, Hamiltonian is considered in blue and red sideband regime. In these cases, the asymmetric coupling between two cavities has been transferred such that the asymmetric beam-splitter or squeezing interaction is generated between optical and mechanical modes. Then, the amount of entanglement between the different optical and mechanical modes is calculated. The results define that PT-symmetry can improve the entanglement in special conditions. The proposed system provides good condition to investigate the... 

    Tunable photon statistics in a non-Hermitian system

    , Article Journal of the Optical Society of America B: Optical Physics ; Volume 34, Issue 3 , 2017 , Pages 566-573 ; 07403224 (ISSN) Shakeri, S ; Zandi, M. H ; Bahrampour, A ; Sharif University of Technology
    OSA - The Optical Society  2017
    Abstract
    In the present study, the antibunching effect is considered in a parity time (PT)-symmetric system, using the recently proposed non-Hermitian model for resonant cavities. The model consists of a cavity coupled to an optomechanical system by a chiral mirror, with both cavities being driven coherently. The nonreciprocal coupling strength between the two cavities leads to the generation of the non-Hermitian but PT-symmetric model. The optimal conditions of strong antibunching are calculated in this system, and then the antibunching effect is considered using the two-photon correlation function and the Wigner function. The results showed that this model presented the best control over the strong... 

    Degrees of freedom in a three-user cognitive interference channel

    , Article 2013 Iran Workshop on Communication and Information Theory ; May , 2013 , Page(s): 1 - 6 ; 9781467350235 (ISBN) Shakeri, Z ; Chaghooshi, A. F ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    2013
    Abstract
    We study the degrees of freedom of the three-user Gaussian interference channel under the circumstance where one or more transmitters are non-causally cognitive, meaning they are aware of the messages of one or more transmitters in a non-causal manner. Our focus is on the total degrees of freedom of the three-user cognitive interference channel. Our first case is when only one of the transmitters is fully cognitive and knows the messages of the other users. We prove that using interference alignment and interference cancellation, the achievable total degrees of freedom is 11/6 and does not coincide with the calculated total degrees of freedom upper bound which is 2. In the second and third... 

    A parametric study using two design methodologies for pressure jet and swirl injectors

    , Article IEEE Aerospace Conference Proceedings ; 2012 ; 1095323X (ISSN) ; 9781457705564 (ISBN) Mazaheri, K ; Morad, M. R ; Shakeri, A. R ; Sharif University of Technology
    2012
    Abstract
    One of the most important subsystems in the air-breathing engines is the atomizers, which break the fuel into many droplets. It is well known that atomization quality has a significant influence on combustion characteristics such as stability limits, efficiency, and pollutant emission. Both jet and swirl injectors are applicable in gas turbine engines. The latter have been widely used for combustion chambers and the former are usually employed for fuel injection in the afterburner part. Since experimental and numerical study of atomizers could be complex and costly, a design methodology of atomizers based on empirical relations is still very advantageous and effective in reducing... 

    Towards tool support for situational engineering of agile methodologies

    , Article Proceedings - Asia-Pacific Software Engineering Conference, APSEC, 30 November 2010 through 3 December 2010, Sydney, NSW ; 2010 , Pages 326-335 ; 15301362 (ISSN) ; 9780769542669 (ISBN) Shakeri Hossein Abad, Z ; Hasani Sadi, M ; Ramsin, R ; Sharif University of Technology
    2010
    Abstract
    Various agile software development methodologies, practices, and techniques have been proposed in the last decade; some present novel ideas, while many are simply made up of tasks and techniques borrowed from prominent agile methodologies. Each of these methodologies prescribes a set of practices and techniques which are deemed appropriate for application in a specific context. However, there exists no single method which fits all project situations. This has resulted in the advent of Situational Method Engineering (SME) approaches, which are used for developing software methodologies that are tailored to fit the specific circumstances of the project situation at hand. Since tool support has... 

    Optimal Assignment of Patients from Emergency Department to Inpatient Hospital Wards

    , M.Sc. Thesis Sharif University of Technology Shakeri, Mahdi (Author) ; Haji, Babak (Supervisor)
    Abstract
    Emergency Department (ED) overcrowding is one the most problems and challenges that every Emergency Department all over the world is facing with. This problem leads to some problems like prolonged waiting times and Length of Stay in Emergency Department. “Boarding time” is one of the most important ones, which is the time a patient spend for being transferred from Emergency Department to one of the Hospital Inpatient Wards. One important solution to this problem is “overflowing”, and it means allocating patients to an alternative ward rather than their primary ward. In practice, the overflowing process usually controlled in a myopic manner. Limited number of researches that focus in this... 

    Chemical kinetics Optimization for a DLE Combustor Optimization Using Numerical Method

    , Ph.D. Dissertation Sharif University of Technology Shakeri, Alireza (Author) ; Mazaheri, Karim (Supervisor)
    Abstract
    Control and reduction of gas turbines pollutants emissions are increasingly of major concern. Here we introduce and apply new algorithms for derivation of accurate and low cost skeletal chemical kinetics, optimization of global multi-step chemical kinetics, and optimization of geometry of Lean Premixed (LPM) dry low emission (DLE) combustors.A new reduction algorithm called SA-GEIE, based on sensitivity analysis of reaction mechanisms respect to ignition delay, flame temperature and pollutants concentration (NO and CO), is introduced. This algorithm is implemented to GRI-3.0 to produce a low cost methane oxidation skeletal mechanism with 118 reactions and 39 specie. The accuracy is assessed... 

    Integrated procedure, using differential evolution optimization of rate parameters, for design of small and accurate multistep global chemical mechanisms

    , Article Industrial and Engineering Chemistry Research ; Volume 57, Issue 10 , March , 2018 , Pages 3530-3544 ; 08885885 (ISSN) Shakeri, A ; Mazaheri, K ; Sharif University of Technology
    American Chemical Society  2018
    Abstract
    Three-dimensional analysis of combustion chambers in industrial gas turbines suffers from lack of simple and accurate reduced mechanisms for oxidation of hydrocarbon fuels. Here, an integrated procedure is introduced based on a differential evolution optimization technique. The procedure is flexible and modular and allows optimization of many rate parameters of a multistep global mechanism based on many different combustion criteria and inlet or operational conditions. The procedure uses any selected chemical reactor model and any reference combustion mechanism provided. Sample design criteria used here are flame temperature, ignition delay time, and concentration of selected species,... 

    Transportation Problem of Hub Network with Direct Links

    , M.Sc. Thesis Sharif University of Technology Shakeri, Hamed (Author) ; Haji, Rasoul (Supervisor)
    Abstract
    Hub and Spoke networks come into play when considering direct link between all origins and destinations is either impossible or expensive in a transportation system. In this kind of problems, some nodes are chosen as hub from all origin and destination nodes to collect flows and then distribute them. Implementing hub network leads to minimizing transportation cost, sorting flows and conveying them in economies of scale. Otherwise, shipping flows directly may cause decreasing the travelling distance and the delivery time consequently. In this dissertation, combination of hub network and direct shipment is investigated. To obtain the optimal hub locations and direct links between non-hub nodes... 

    An efficient feature extraction methodology for blind image steganalysis using contourlet transform and zernike moments

    , Article 2013 10th International ISC Conference on Information Security and Cryptology, ISCISC 2013 ; Aug , 2013 , Page(s): 1 - 6 Shakeri, E ; Ghaemmaghami, S ; Sharif University of Technology
    IEEE Computer Society  2013
    Abstract
    We propose an effective blind image steganalysis based on contourlet transform and Zernike moments that improves the detection accuracy of universal image steganalysis methods. The proposed method examines randomness in the test image to distinguish between the stego and non-stego images. The suspicious image is decomposed by contourlet transform, and then the absolute Zernike moments of contourlet subbands coefficients of the image and linear prediction error of each contourlet subband are extracted as features for steganalysis. These features are fed to a nonlinear SVM classifier with an RBF kernel to distinguish between cover and stego images. Experimental results show that the proposed... 

    Analyzing Cost Engineering Along With Presenting A Model To Reduce Cost Of industrial Products

    , M.Sc. Thesis Sharif University of Technology Shakeri, Ehsan (Author) ; Mostafavi, Mostafa (Supervisor)
    Abstract
    Lack of financial sources for production and performing projects has been an effective issue in all governmental and non-governmental organizations. So, using a structure with capability of detecting and forecasting all expenses and costs, and being able to convert the mass of data into useful and instrumental reports for managerial decision such as estimating total cost, selecting the syntax of production and etc is obvious for recourse management of every organization. Among the various components of the cost engineering system, cost management system by recording and allocating cost is an important issue in efficiency of every cost engineering system.In this thesis, Automotive Industrial... 

    An experimental study on mechanical behavior of a calcite cemented gravelly sand

    , Article Geotechnical Testing Journal ; Volume 41, Issue 3 , May , 2018 , Pages 494-507 ; 01496115 (ISSN) Shakeri, M. R ; Haeri, S. M ; Shahrabi, M. M ; Khosravi, A ; Sajadi, A. A ; Sharif University of Technology
    ASTM International  2018
    Abstract
    In the study presented herein, a simple method for laboratory calcite cementation of a reconstituted gravelly sand was presented. This method was used to prepare cemented gravelly sand specimens, which have similar natural characteristics to alluvial deposit of the city of Tehran. The formation and distribution of calcite bonds, as well as the effectiveness of the presented calcite cementation method in increasing interparticle cohesion, as observed in weakly to moderately cemented soil in Tehran, were evaluated by means of chemical analysis, X-ray diffraction technique, and unconfined compressive strength tests. The cementation technique was used to prepare triaxial specimens with calcite... 

    Two mode mechanical non-Gaussian squeezed number state in a two-membrane optomechanical system

    , Article Optics Communications ; Volume 370 , 2016 , Pages 55-61 ; 00304018 (ISSN) Shakeri, S ; Mahmoudi, Z ; Zandi, M. H ; Bahrampour, A. R ; Sharif University of Technology
    Elsevier  2016
    Abstract
    We consider an optomechanical system with two membranes when a bichromatic laser field with red-sideband and blue-sideband frequencies is applied in the single photon strong coupling regime. It is shown that using the mode selecting method and under the Lamb-Dicke approximation, motion of membranes can evolve to single or two mode squeezed number states. By considering the environmental effect, a Wigner function is plotted for understanding the conditions that lead to the generation of non-Gaussian states. The results show that, in this system, initial states of membranes are important to generation of non-Gaussian mechanical squeezed number states. © 2016 Elsevier B.V. All rights reserved  

    Improving the Robustness of Image Watermarking for Publicly Copyright-Proving

    , M.Sc. Thesis Sharif University of Technology Shakeri, Mahsa (Author) ; Jamzad, Mansour (Supervisor)
    Abstract
    The advent of Internet and advancement of computer technologies have enabled convenient and fast exchange of multimedia so the illegal reproduction and modification of digital media has become increasingly serious. Hence, how to protect the intellectual property rights of digital multimedia is an imperative issue. Digital watermarking is one of the solutions to prevent unauthorized use of images. Traditional digital watermarking techniques embed a watermark such as logo, trademark, or copyright information into a host image so that it is not perceptible. These techniques, depending on the amount of embedded data, will distort the content of host image which results in quality degradation of... 

    Improve Performance of Higher Order Statistics in Spatial and Frequency Domains in Blind Image Steganalysis

    , M.Sc. Thesis Sharif University of Technology Shakeri, Ehsan (Author) ; Ghaemmaghami, Shahrokh (Supervisor)
    Abstract
    Blind image steganalysis is a technique used to, which require no prior information about the steganographic method applied to the stego im- age, determine whether the image contains an embedded message or not. The basic idea of blind steganalysis is to extract some features sensitive to information hiding, and then exploit classifiers for judging whether a given test image contains a secret message.The main focus of this research is to design an choose features sen-sitive to the embedding changes. In fact, we use high order moments in different domains, such as spatial, DCT and multi-resolution do-main, in order to improve the performance of existing steganalyzers.Accordingly, First, we...