Loading...
Search for: computer-software
0.006 seconds
Total 233 records

    PCS_SUT: A finite element software for simulation of powder forming processes

    , Article Journal of Materials Processing Technology ; Volume 125-126 , 2002 , Pages 602-607 ; 09240136 (ISSN) Khoei, A. R ; Sharif University of Technology
    2002
    Abstract
    As product complexity increases and economic constraints result in a demand for greater efficiency, industry must invest in new innovative ways to assist design and manufacture. As a first step in the long-term development of such a system, a computer software environment has been developed for pre- and post-processing for unstructured grid-based computational simulation. This paper describes the powder compaction software (PCS_SUT), which is designed for pre- and post-processing for computational simulation of the compaction of powder. Pre-processing software is used to create the model, generate an appropriate finite element grid, apply the appropriate boundary conditions, and view the... 

    Sharif repository-A threatened-based software security evaluation method

    , Article International ISC Conference on Information Security and Cryptology, ISCISC(11th: 2014:) ; Sept , 2014 , p. 120-125 Razian, M. R ; Sangchi, H. M ; Sharif University of Technology
    Abstract
    Nowadays, security evaluation of software is a substantial matter in software world. Security level of software will be determined by wealth of data and operation which it provides for us. The security level is usually evaluated by a third party, named Software Security Certification Issuance Centers. It is important for software security evaluators to perform a sound and complete evaluation, which is a complicated process considering the increasing number of emerging threats. In this paper we propose a Threatened-based Software Security Evaluation method to improve the security evaluation process of software. In this method, we focus on existing threatened entities of software which in turn... 

    Analytical model for sight distance analysis on three-dimensional highway alignments

    , Article Transportation Research Record ; Issue 1523 , 1996 , Pages 1-10 ; 03611981 Hassan, Y ; Easa, S. M ; Abd El Halim, A. O ; Sharif University of Technology
    Abstract
    Existing sight distance models are applicable only to two-dimensional (2-D) separate horizontal and vertical alignments or simple elements of these separate alignments (vertical curve, horizontal curve). A new model is presented for determining the available sight distance on 3-D combined horizontal and vertical alignments. The model is based on the curved parametric elements that have been used in the finite element method. The elements presented are rectangular (4-node, 6-node, and 8-node elements) and triangular. These elements are used to represent various features of the highway surface and sight obstructions, including tangents (grades), horizontal curves, vertical curves, traveled... 

    Question-based CAPTCHA

    , Article International Conference on Computational Intelligence and Multimedia Applications, ICCIMA 2007, Sivakasi, Tamil Nadu, 13 December 2007 through 15 December 2007 ; Volume 4 , 2008 , Pages 54-58 ; 0769530508 (ISBN); 9780769530505 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    Today there are many Internet sites which require only the entry by human users but unfortunately some computer softwares called bots are designed by some hackers to enter these sites and use their resources through false registration. As a result some systems named CAPTCHA have been introduced to tell apart human users and computer software. This paper introduces a new CAPTCHA method. In this method a simple mathematical problem is generated according to a predefined pattern but instead of some object's name, we put their images. Then the whole problem is saved and shown to the user inform of an image to be answered by him. But since answering this problem requires four abilities of... 

    Vulnerability analysis in VGBPS using prolog

    , Article 2nd IPM International Symposium on Fundamentals of Software Engineering, FSEN 2007, Tehran, 17 April 2007 through 19 April 2007 ; Volume 4767 LNCS , 2007 , Pages 404-411 ; 03029743 (ISSN); 9783540756972 (ISBN) Rafiei, M. E ; Taherian, M ; Mousavi, H ; Movaghar, A ; Jalili, R ; Sharif University of Technology
    Springer Verlag  2007
    Abstract
    Vulnerabilities are now part of all software systems. To handle vulnerabilities, many approaches have been proposed till now. Many of these approaches try to analyze vulnerabilities based on model checking techniques. However, the models used in these approaches handle authorized and unauthorized rules separately. This basically cause in weaker modeling abilities and consequently weaker vulnerability analysis. From authorized and unauthorized rules, we mean those emanated from access control model and those originated from vulnerabilities respectively. Currently, a new general graph-based protection system concentrating on vulnerabilities called VGBPS is proposed to overcome the mentioned... 

    A framework to support run-time assured dynamic reconfiguration for pervasive computing environments

    , Article 2006 1st International Symposium on Wireless Pervasive Computing, Phuket, 16 January 2006 through 18 January 2006 ; Volume 2006 , 2006 , Pages 1-6 ; 0780394100 (ISBN); 9780780394100 (ISBN) Hemmati, H ; Niamanesh, M ; Jalili, R ; Sharif University of Technology
    2006
    Abstract
    With the increasing use of pervasive computing environments (PCEs), developing dynamic reconfigurable software in such environments becomes an important issue. The ability to change software components in running systems has advantages such as building adaptive, long-life, and self-reconfigurable software as well as increasing invisibility in PCEs. As dynamic reconfiguration is performed in error-prone wireless mobile systems frequently, it can threaten system safety. Therefore, a mechanism to support assured dynamic reconfiguration at run-time for PCEs is required. In this paper, we propose an Assured Dynamic Reconfiguration Framework (ADRF) with emphasis on assurance analysis. The... 

    Design and simulation of a life detection system based on detection of the heart beat using doppler frequency

    , Article 6th IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2006, Vancouver, BC, 27 August 2006 through 30 August 2006 ; 2006 , Pages 685-690 ; 0780397541 (ISBN); 9780780397545 (ISBN) Izadi, A ; Ghatan, Z ; Vosoughi Vahdat, B ; Farzaneh, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2006
    Abstract
    The ability and how to use a microwave life-detection system to search for the humans buried under earthquake rubble or laid behind various barriers has been investigated. Based on the behavior of a human under multiple layers of barriers and the detection capability of the microwave tools a system has been proposed. This system operating at 1150 MHz can remotely detect the movement of the heart of the trapped alive people. The operation principle is based on detection of the Doppler frequency shift of the electromagnetic wave reflected from the periodic moving part of a living human body such as the heart. In this paper, various parts of a microwave life-detection system such as patch... 

    A software-based error detection technique using encoded signatures

    , Article 2006 21st IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, Arlington, VA, 4 October 2006 through 6 October 2006 ; 2006 , Pages 389-397 ; 15505774 (ISSN); 076952706X (ISBN); 9780769527062 (ISBN) Sedaghat, Y ; Miremadi, S. G ; Fazeli, M ; Sharif University of Technology
    2006
    Abstract
    In this Paper, a software-based control flow checking technique called SWTES (Software-based error detection Technique using Encoded Signatures) is presented and evaluated. This technique is processor independent and can be applied to any kind of processors and microcontrollers. To implement this technique, the program is partitioned to a set of blocks and the encoded signatures are assigned during the compile time. In the run-time, the signatures are compared with the expected ones by a monitoring routine. The proposed technique is experimentally evaluated on an ATMEL MCS51 microcontroller using Software Implemented Fault Injection (SWIFI). The results show that this technique detects about... 

    Selecting dryer type using fuzzy logic

    , Article CHISA 2006 - 17th International Congress of Chemical and Process Engineering, Prague, 27 August 2006 through 31 August 2006 ; 2006 ; 8086059456 (ISBN); 9788086059457 (ISBN) Shariati, R. P ; Sharif University of Technology
    2006
    Abstract
    Due to variety of industrial dryers and also importance of selecting appropriate dryer to achieve the required quality of product as well as considering economical aspects, using methods and algorithms which take all effective factors into account and present the best selection is regarded by engineers and researchers. In this paper selection of dryer applying fuzzy logic is presented and the advantages of this method are investigated. For this a program is written using MATLAB programming software and its result compared with real cases. It has been found that there is a good agreement between the prepared program results and industrial experiences. Selection of dryer for a specific... 

    Passive cooling effects of courtyards

    , Article Building and Environment ; Volume 40, Issue 1 , 2005 , Pages 89-104 ; 03601323 (ISSN) Safarzadeh, H ; Bahadori, M. N ; Sharif University of Technology
    2005
    Abstract
    The passive cooling effects of a courtyard of a small building were determined numerically, employing an energy-analysis software developed for that purpose. The passive cooling features considered were the shading effects of courtyard walls and two large trees (of various shapes) planted immediately next to the south wall of the building, the presence of a pool, a lawn and flowers in the yard, and the wind shading effects of the walls and trees. It was found that these features alone cannot maintain thermal comfort during the hot summer hours in Tehran, but reduce the cooling energy requirements of the building to some extent. They have an adverse effect of increasing the heating energy... 

    Software implementation of MPEG2 decoder on an ASIP JPEG processor

    , Article 17th 2005 International Conference on Microelectronics, ICM 2005, Islamabad, 13 December 2005 through 15 December 2005 ; Volume 2005 , 2005 , Pages 310-317 ; 0780392620 (ISBN); 9780780392625 (ISBN) Mohammadzadeh, N ; Hessabi, S ; Goudarzi, M ; Sharif University of Technology
    2005
    Abstract
    In this paper, we present an MPEG-2 video decoder implemented in our ODYSSEY design methodology. We start with an ASIP tailored to the JPEG decompression algorithm. We extend that ASIP by required software routines such that the extended ASIP can now perform MPEG2 decoding while still benefiting from hardware units common between JPEG and MPEG2. This demonstrates the ability of our approach in extending an already manufactured ASIP, which was tailored to a given application, such that it implements new, yet related applications. The implementation platform is a VirtexII-Pro FPGA. The hardware part is implemented in VHDL, and the software runs on a PowerPC processor. Experimental results show... 

    New image-based system for vibration measurment, specially developed for forced human vibration analysis

    , Article 2004 ASME International Mechanical Engineering Congress and Exposition, IMECE, Anaheim, CA, 13 November 2004 through 19 November 2004 ; 2004 , Pages 203-204 ; 03609960 (ISSN) Hoviattalab, M ; Yadolahi, A ; Narimani, R ; Abadpour, A ; Sharif University of Technology
    American Society of Mechanical Engineers (ASME)  2004
    Abstract
    The human being in the environments of modern technology has to endure stresses of many and varied kinds of vibrations. Measuring vibration is an important tool in rehabilitation and biomechanical fields of research. We have proposed image processing as a new method to record and determine the frequency response of human body. The subjects were exposed to whole body periodical vibration while standing on a shaking table. Two digital camcorders were used to capture the motion of colored pencil-dot markers on the skin of human body (forehead) and on the edge of the shaking table. After color spotting each frame, the binary image results were processed using new circle factor criteria proposed... 

    Middle sized soccer robots: ARVAND

    , Article 3rd Robot World Cup Soccer Games and Conferences, RoboCup 1999, 27 July 1999 through 6 August 1999 ; Volume 1856 , 2000 , Pages 61-73 ; 03029743 (ISSN); 9783540410430 (ISBN) Jamzad, M ; Foroughnassiraei, A ; Chiniforooshan, E ; Ghorbani, R ; Kazemi, M ; Chitsaz, H ; Mobasser, F ; Sadjad, S. B ; Sony Corporation ; Sharif University of Technology
    Springer Verlag  2000
    Abstract
    Arvand is the name of robots specially designed and con-structed by sharif CE team for playing soccer according to RoboCup rules and regulations for the middle size robots. Two different types of robots are made, players and the goal keeper. A player robot consists of three main parts: mechanics (motion mechanism and kicker), hard-ware (image acquisition, processing unit and control unit) and software (image processing, wireless communication, motion control and decision making). The motion mechanism is based on two drive unit, two steer units and a castor wheel. We designed a special control board which uses two microcontrollers to carry out the software system decisions and transfers them... 

    EXAF: A search engine for sample applications of object-oriented framework-provided concepts

    , Article Information and Software Technology ; Volume 75 , 2016 , Pages 135-147 ; 09505849 (ISSN) Noei, E ; Heydarnoori, A ; Sharif University of Technology
    Elsevier 
    Abstract
    Object-oriented application frameworks, such as Java Swing, provide reusable code and design for implementing domain-specific concepts, such as Context Menu, in software applications. Hence, use of such frameworks not only can decrease the time and the cost of developing new software applications, but also can increase their maintainability. However, the main problems of using object-oriented application frameworks are their large and complex APIs, and often incomplete user manuals. To mitigate these problems, developers often try to learn how to implement their desired concepts from available sample applications. Nonetheless, this introduces another hard and time-consuming challenge which... 

    Improving self-care and health literacy in hemodialysis patients: Using software engineering

    , Article Proceedings - 2012 7th International Conference on Computing and Convergence Technology (ICCIT, ICEI and ICACT), ICCCT 2012, 3 December 2012 through 5 December 2012 ; December , 2012 , Pages 317-320 ; 9788994364216 (ISBN) Shahbazi, B ; Edalat-Nejad, M ; Edalat-Nejad, N ; Sharif University of Technology
    2012
    Abstract
    The use of Computer Science in order to categorize and store information, improve diagnostic and therapeutic procedures, patient education and the training of a skilled labor force, has taken important steps and there are constantly new developments in this area  

    Various aspects of open source software development

    , Article International Symposium on Information Technology 2008, ITSim, Kuala Lumpur, 26 August 2008 through 29 August 2008 ; Volume 3 , 2008 ; 9781424423286 (ISBN) Shirali Shahreza, S ; Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    In recent years Open Source Software programs have caused great changes in software world. Open Source software development is something beyond a method of software development or technology. As a result, using open source software development has diverse aspects. In this article the open source software development has been studied and investigated through reviewing some of the carried out works. © 2008 IEEE  

    Process-centered review of object oriented software development methodologies

    , Article ACM Computing Surveys ; Volume 40, Issue 1 , 2008 ; 03600300 (ISSN) Ramsin, R ; Paige, R. F ; Sharif University of Technology
    2008
    Abstract
    We provide a detailed review of existing object-oriented software development methodologies, focusing on their development processes. The review aims at laying bare their core philosophies, processes, and internal activities. This is done by using a process-centered template for summarizing the methodologies, highlighting the activities prescribed in the methodology while describing the modeling languages used (mainly diagrams and tables) as secondary to the activities. The descriptions produced using this template aim not to offer a critique on the methodologies and processes, but instead provide an abstract and structured description in a way that facilitates their elaborate analysis for... 

    Evaluation complexity problem in agent based software development methodology

    , Article ICIIS 2007 - 2nd International Conference on Industrial and Information Systems 2007, Peradeniya, 9 August 2007 through 11 August 2007 ; 2007 , Pages 577-584 ; 1424411521 (ISBN); 9781424411528 (ISBN) Saremi, A ; Esmaeili, M ; Rahnama, M ; Sharif University of Technology
    2007
    Abstract
    Several methodologies with their own characteristics have been proposed in the area of agent-oriented software engineering. Consequently, deciding which methodology to select in a specific case is an important issue and it can lead to decrease software development cost and effort. Thus, importance of evaluation of methodologies will be highlighted in choosing the appropriate methodology in the development process of an application. It can also help in developing new methodologies and improving existing ones. In this paper, we are going to provide an evaluation framework of agent oriented methodologies. To demonstrate the usage of the suggested framework, it is applied to evaluate two... 

    DotGrid: A.NET-based cross-platform software for desktop grids

    , Article International Journal of Web and Grid Services ; Volume 3, Issue 3 , 2007 , Pages 313-332 ; 17411106 (ISSN) Poshtkohi, A ; Haj Abutalebi, A ; Hessabi, S ; Sharif University of Technology
    Inderscience Publishers  2007
    Abstract
    Grid infrastructures that have provided wide integrated use of resources are becoming the de facto computing platform for solving large-scale problems in science, engineering and commerce. In this evolution, desktop grid technologies allow the grid communities to exploit the idle cycles of pervasive desktop PC systems to increase the available computing power. In this paper we present DotGrid, a cross-platform grid software. DotGrid is the first comprehensive desktop grid software utilising Microsoft's .NET Framework in Windows-based environments and MONO .NET in Unix-class operating systems to operate. Using DotGrid services and APIs, grid desktop middleware and applications can be... 

    Collision avoidance maneuver for an autonomous vehicle

    , Article 9th IEEE International Workshop on Advanced Motion Control, 2006, Istanbul, 27 March 2006 through 29 March 2006 ; Volume 2006 , 2006 , Pages 249-254 Durali, M ; Amini Javid, G ; Kasaiezadeh, A ; Sharif University of Technology
    2006
    Abstract
    One of the most important capabilities expected from an autonomous vehicle is avoiding collision with obstacles in its path. For this purpose, autonomous vehicle must be able to perform an emergency maneuver as soon as the obstacle is detected. This paper presents a method for designing and performing an emergency maneuver in order to avoid collision with a fixed or moving obstacle in the path. A sinusoidal or exponential trajectory, which is a function of the relative distance between vehicle and obstacle, is designed as the desired trajectory for lateral motion of the vehicle. A sliding mode controller is designed in order to guarantee that the vehicle tracks that desired trajectory. The...