Loading...
Search for: svm
0.007 seconds
Total 97 records

    Monitoring image-based processes using a pca-based control chart and a classification technique

    , Article Decision Science Letters ; Volume 10, Issue 1 , 2020 , Pages 39-52 Kazemi, S ; Akhavan Niaki, S. T ; Sharif University of Technology
    Growing Science  2020
    Abstract
    Machine vision systems are among the novel tools proven to be useful in different applications, among which monitoring and controlling manufacturing processes is one of the most important ones. However, due to the complexity resulted from high-dimensional image data and their inherent correlations, the acquisition of traditional statistical process control tools seems inapplicable. To overcome the shortcomings of the traditional methods in this regard, a statistical model is proposed in this paper which utilizes the concepts of both the PCA-based T2 control chart and the classification methods to develop a tool capable of controlling an image-based process. By defining the warning zones,... 

    Active and reactive power control of a DFIG using a combination of VSC with PSO

    , Article World Applied Sciences Journal ; Volume 13, Issue 2 , 2011 , Pages 316-323 ; 18184952 (ISSN) Abdi, H ; Hashemnia, N ; Kashiha, A ; Sharif University of Technology
    Abstract
    Nowadays, application of renewable energies has taken a rapid trend. Wind energy is among those mostly used for this purpose. Doubly Fed Induction Generators (DFIG) are widely used in wind power plants due to several advantages such as partial rating converter, capability of decoupled active and reactive power control, etc. Application of a suitable control strategy is of great importance in wind power plants. In this paper, the parameters of a hybrid controller are calculated using Particle Swarm Optimization (PSO) subjected to satisfying the required criteria in output active and reactive powers of a DFIG. In the proposed system Direct Power Controller (DPC), Variable Structure Controller... 

    A new method for shot classification in soccer sports video based on SVM classifier

    , Article Proceedings of the IEEE Southwest Symposium on Image Analysis and Interpretation ; 2012 , Pages 109-112 ; 9781467318303 (ISBN) Bagheri Khaligh, A ; Raziperchikolaei, R ; Moghaddam, M. E ; Sharif University of Technology
    2012
    Abstract
    Sport video shot classification is a basic step in the sport video processing. For many purposes such as event detection and summarization, shot classification is needed for content filtering. In this paper, we present a new method for soccer video shot classification. At first, in-field and out-of-field frames are separated. In in-field frames three features based on number of connected components and shirt color percent in vertical and horizontal strips are extracted. The features are all new and showed excellent discrimination in the feature space. These features are given to SVM for classifying long, medium and close-up shots. One of the advantages of our method is that, close-ups can be... 

    Rigorous modeling of gypsum solubility in Na-Ca-Mg-Fe-Al-H-Cl-H2O system at elevated temperatures

    , Article Neural Computing and Applications ; Volume 25, Issue 3 , September , 2014 , pp 955-965 ; ISSN: 09410643 Safari, H ; Gharagheizi, F ; Lemraski, A. S ; Jamialahmadi, M ; Mohammadi, A. H ; Ebrahimi, M ; Sharif University of Technology
    Abstract
    Precipitation and scaling of calcium sulfate have been known as major problems facing process industries and oilfield operations. Most scale prediction models are based on aqueous thermodynamics and solubility behavior of salts in aqueous electrolyte solutions. There is yet a huge interest in developing reliable, simple, and accurate solubility prediction models. In this study, a comprehensive model based on least-squares support vector machine (LS-SVM) is presented, which is mainly devoted to calcium sulfate dihydrate (or gypsum) solubility in aqueous solutions of mixed electrolytes covering wide temperature ranges. In this respect, an aggregate of 880 experimental data were gathered from... 

    AIDSLK: an anomaly based intrusion detection system in linux kernel

    , Article Communications in Computer and Information Science ; Volume 31 , 2009 , Pages 232-243 ; 18650929 (ISSN); 9783642004049 (ISBN) Almassian, N ; Azmi, R ; Berenji, S ; Sharif University of Technology
    2009
    Abstract
    The growth of intelligent attacks has prompted the designers to envision the intrusion detection as a built-in process in operating systems. This paper investigates a novel anomaly-based intrusion detection mechanism which utilizes the manner of interactions between users and kernel processes. An adequate feature list has been prepared for distinction between normal and anomalous behavior. The method used is introducing a new component to Linux kernel as a wrapper module with necessary hook function to log initial data for preparing desired features list. SVM neural network was applied to classify and recognize input vectors. The sequence of delayed input vectors of features was appended to... 

    Automated Plant Species Identification Using Leaf Shape-Based Classification Techniques: A Case Study on Iranian Maples

    , Article Iranian Journal of Science and Technology - Transactions of Electrical Engineering ; Volume 45, Issue 3 , 2021 , Pages 1051-1061 ; 22286179 (ISSN) Mohtashamian, M ; Karimian, M ; Moola, F ; Kavousi, K ; Masoudi Nejad, A ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2021
    Abstract
    Foliar characteristics, especially the overall leaf shape, are useful features for the taxonomic identification of plants. Computer-aided plant species identification systems make it possible to investigate a large number of leaves in a short period of time. In this study, a fully automatic system was developed to accurately classify eight species of maples (Acer L.) in Iran using the leaf shape characteristics of harvested leaves. Maples show a broad range of leaf morphology, and the provided dataset is a diverse collection of simple leaves which can be a good representative of woody plant leaves with any overall shape and margin pattern. The applied method consisted of preprocessing,... 

    Malignant tumor detection using linear support vector machine in breast cancer based on new optimization algorithms

    , Article Proceedings - 2012 International Symposium on Instrumentation and Measurement, Sensor Network and Automation, IMSNA 2012 ; Volume 1 , 2012 , Pages 80-84 ; 9781467324670 (ISBN) Naeemabadi, M ; Saleh, M.A ; Zabihi, M ; Mohseni, G ; Chomachar, N. A ; Sharif University of Technology
    2012
    Abstract
    Breast cancer is one of the most common fatal diseases in women. Early detection of malignant breast cancer could be a great help in treating this cancer. Many studies have been performed in order to detect the malignant of cancer tumor till now. It has been tried to contribute more in accurate diagnosis of breast cancer by Support Vector Machine, in this paper. LS and SMO methods have been utilized instead of conventional learning method of QP in SVM in this probe. The feasibility of 100 percent in sensitivity for LS-SVM, and 100 percent in specificity for SMO-SVM has been achieved in this assay by the proposed method, which this percentage has not been achieved so far in the previous... 

    EEG based Analysis and Classification of Children with Learning Disability Compared to Normal Children

    , M.Sc. Thesis Sharif University of Technology Mirmohammad Sadeghi, Delaram Alsadat (Author) ; Jahed, Mehran (Supervisor)
    Abstract
    Learning disability (LD) is a neurological condition that interferes with an individual’s ability to store, process, or produce information. There are different types of learning disabilities affecting reading, writing, speaking, spelling, etc. Based on a study conducted by National Center for Learning Disabilities, 2.4 million American public school students are diagnosed with learning disability. They attend school in order to learn and be successful while they do not know their learning process is different from their peers. LD diagnosis in children is especially important as such cases must be identified early enough in order to provide them with proper education.This project targets LD... 

    Intelligent Anomaly-Based Intrusion Detection in Linux Kernel

    , M.Sc. Thesis Sharif University of Technology Almasian, Negar (Author) ; Azmi, Reza (Supervisor)
    Abstract
    The growth of intelligent attacks has prompted the designers to envision the intrusion detection as a built-in process in operating systems. This thesis investigates a novel anomaly-based intrusion detection mechanism which utilizes the manner of interactions between users and kernel processes to bring functionality to this notion. In fact, this mechanism is inspired by homeostatic behavior of an organism. Homeostatic is the property of an open system or a closed system, particularly a living organism, which regulates its internal environment to maintain a stable, constant condition. Such a developed mechanism can provide the computer system with a high level of protection from artificial... 

    Selection of efficient features for discrimination of hand movements from MEG using a BCI competition IV data set

    , Article Frontiers in Neuroscience ; Issue APR , 2012 ; 16624548 (ISSN) Sardouie, S. H ; Shamsollahi, M. B ; Sharif University of Technology
    2012
    Abstract
    The aim of a brain-computer interface (BCI) system is to establish a new communication system that translates human intentions, reflected by measures of brain signals such as magnetoencephalogram (MEG), into a control signal for an output device. In this paper, an algorithm is proposed for discriminating MEG signals, which were recorded during hand movements in four directions. These signals were presented as data set 3 of BCI competition IV. The proposed algorithm has four main stages: pre-processing, primary feature extraction, the selection of efficient features, and classification. The classification stage was a combination of linear SVM and linear discriminant analysis classifiers. The... 

    Parental control based on speaker class verification

    , Article IEEE Transactions on Consumer Electronics ; Volume 54, Issue 3 , 2008 , Pages 1244-1251 ; 00983063 (ISSN) Shirali-Shahreza, S ; Sameti, H ; Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    Restricting children access to materials unsuitable for them such as violence scenes is very important for parents. So there is a feature named Parental Control in devices such as televisions and computers to define the contents children can access. The parental control setting must be protected from children and is usually done by a password. In this paper, we propose a new method for distinguishing between adult users and child users based on human speech. In our proposed method, the user must say a word and the adult users are identified by processing the speech. Our current implementation has 92.5% accuracy for distinguishing adult users from children. © 2008 IEEE  

    An Intrusion Detection System for the Grid Environment

    , M.Sc. Thesis Sharif University of Technology Movahed, Amirvala (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Existing Intrusion Detection Systems (IDSs) are not designed to deal with all categories of processing environments. This thesis focuses on IDSs for the Grid computing environment, and concentrates on feature selection and performance. An existing framework, Globus, is used as the basis for the consideration and development of the research issue in Grid computing. The system is based on two engine designs: (a) Signature and (b) Support Vector Machine; SVM has been selected for pattern discovery in traffic analysis. We found that the performance of the system greatly depends on the efficiency of the underlying framework and the number of Intrusion Detection System instances. We demonstrate... 

    Face Detection in Color Images

    , M.Sc. Thesis Sharif University of Technology Arjomand Inalou, Sania (Author) ; Kasaei, Shohreh (Supervisor)
    Abstract
    Human face detection is an important research area with several applications such as human computer interface (HCI), face recognition, surveillance systems, security systems, and content-based image retrieval (CBIR). Face detection problem can be stated as “determining whether there are human faces in the image” and if there are “returning the location of each human face in the image” regardless of its position, size, scale, orientation, and lighting condition. In this thesis, we have proposed a new face detection method which combines the AdaBoost algorithm with skin color information and support vector machine (SVM). First, a cascade classifier based on AdaBoost is used to detect faces in... 

    Real Time Car Model and Color Recognition Using SVM

    , M.Sc. Thesis Sharif University of Technology Arzan, Mohammad Mahdi (Author) ; Jamzad, Mansour (Supervisor)
    Abstract
    Recently many works has been focused on Automatic Security Systems. Car type and color recognition systems are needed in vehicle based access control systems in buildings, outdoor sites and even housing estates. Another usage of car type and color recognition is when a certain model of car is being investigated in highways and streets. In this thesis two independent systems are designed; one for car type recognition and another for car color recognition. They both require to know the license plate location, so we proposed a license plate detection system. In the license plate detection system, first the plate candidates are extracted from image by gradient and morphological operations, then... 

    Genome-Wide Association Study via Machine Learning Techniques

    , M.Sc. Thesis Sharif University of Technology Najafi, Amir (Author) ; Fatemizadeh, Emad (Supervisor) ; Motahari, Abolfazl (Co-Advisor)
    Abstract
    Development of DNA sequencing technologies in the recent years magnifies the need for computational tools in genomic data processing, and thus has attracted inten- sive research interest to this area. Among them, Genome-Wide Association Study (GWAS) refers to discovering of causal relationships among genetic sequences of living organisms and the macroscopic phenotypes present in their physiological structure. Chosen phenotypes for genomic association studies are mostly vulnerability or im- munity to common genetic diseases. Conventional methods in GWAS consists of statistical hypothesis testing algorithms in case/control approaches; Most of which are based upon single-locus analysis and... 

    Hybrid Multiscale Modeling of Cancer Cell Behavior

    , Ph.D. Dissertation Sharif University of Technology Zangooei, Mohammad Hossein (Author) ; Habibi, Jafar (Supervisor)
    Abstract
    Cancer is a class of diseases characterized by out-of-control cell growth. Cancer is among the leading causes of death worldwide.Cancer modeling is increasingly being recognized as a powerful tool to refine hypotheses, focus experiments, and enable predictions that are more accurate.We investigate a three-dimensional multiscale model of vascular tumour growth, which couples blood flow, angiogenesis, vascular remodelling, nutrient/growth factor transport, movement of, and interactions between, normal and tumour cells. We constructed a hybrid multi- scale agent-based model that combines continuous and discrete methods.Each cell is represented as an agent. The agents have rules that they must... 

    Steganalysis of Digital Images Based on Optimization in Feature Space

    , M.Sc. Thesis Sharif University of Technology Seyedhosseini Tarzjani, Mojtaba (Author) ; Ghaemmaghami, Shahrokh (Supervisor)
    Abstract
    Nowadays, steganography is one of the secure communication methods. Exploitation of modern technologies has increased transmission bandwidth to a considerable scale. As a result of this, the multimedia signals such as Audio and Image have been used in communications widely. This application has led to the prevalent use of these signals as cover signals for carrying hidden messages. Given the proliferation of digital images, especially on the Internet, and given the large amount of redundant bits present in the digital representation of an image, images are the most popular cover objects for steganography. Simultaneously, steganalysis tries to defeat the very purpose of steganography by... 

    Vibration-Based Fault-Diagnosis of Rotating Machinery Relying on Frequency Transforms Time -

    , M.Sc. Thesis Sharif University of Technology Moradi, Davood (Author) ; Manzuri, Mohammad Taghi (Supervisor)
    Abstract
    This thesis presents several methods time-frequency based approach for classifying the vibration signals of rotatery machine. It uses the features extracted from the time-frequency distribution (TFD) of the vibration signal segments. Results of applying the method to a database of real signals reveal that, for the given classification task, the selected features consistently exhibit a high degree of discrimination between the vibration signals collected from healthy and fault machine. A comparison between the performances of the features extracted from several TFDs shows that the STFT slightly outperforms other reduced interference TFDs.


     

    Monotonic Change Point Estimation in Multistage Profiles

    , M.Sc. Thesis Sharif University of Technology Sepasi, Shabnam (Author) ; Khedmati, Majid (Supervisor)
    Abstract
    In this thesis, a hybrid method is proposed to estimate the change point in the parameters of simple linear profiles in multistage processes under monotonic changes. In monotonic changes, the type of change is not known a priori, and the only assumption is the changes are of non-decreasing (isotonic) or non-increasing (monotonic) type. In the proposed method, at first, the stages and the parameters experiencing the change are identified and then, the changes occurred in these stages and parameters are identified and examined based on the moving window approach and support vector machine (SVM) algorithm. Finally, the maximum likelihood estimator of the change point is proposed. The... 

    Machine Learning in 2D Compressed Sensing Datasets

    , M.Sc. Thesis Sharif University of Technology Keshvari, Fatemeh (Author) ; Babaiezadeh, Massoud (Supervisor)
    Abstract
    Compressed Sensing (CS) technique refers to the digitalization process that efficiently reduces the number of measurements below the Nyquist rate while preserving signal structure. This technique was originally developed for the analysis of vector datasets. An x ∈R^n vector is transformed into an y ∈R^m vector so that n≪m. For a sufficient number of measurements, this transformation has been shown to preserve the signal structure. Therefore, the technique has been applied to machine learning applications.2D-CS was further developed for matrices (image datasets) so that they could be directly applied to matrices without flattening. X ∈R^(n×n) is transformed into Y ∈R^(m×m) via 2D-CD such...