Loading...
Search for: computational-costs
0.01 seconds
Total 95 records

    Designing a Lightweight Smart Health System with Identity Privacy Protection

    , M.Sc. Thesis Sharif University of Technology Zahedi, Hossein (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    The applications of Internet of Things technology are increasing day by day. In the Internet of Things, various devices are connected to each other with the help of the Internet and perform various operations automatically. Today, this technology has various applications in smart city, smart home, smart car, as well as military industries and industrial factories. One of the newest applications is its use in the field of health and hygiene, which is known as the Internet of Medical Things or Smart Health. With the emergence of new epidemic diseases, the importance of this application becomes more clear. Smart health helps the patient. without going to the hospital and doctor in person, to... 

    Online signature verification using I-vector representation

    , Article IET Biometrics ; Volume 7, Issue 5 , 2018 , Pages 405-414 ; 20474938 (ISSN) Zeinali, H ; BabaAli, B ; Hadian, H ; Sharif University of Technology
    Institution of Engineering and Technology  2018
    Abstract
    Signature verification (SV) is one of the common methods for identity verification in banking, where for security reasons, it is very important to have an accurate method for automatic SV (ASV). ASV is usually addressed by comparing the test signature with the enrolment signature(s) signed by the individual whose identity is claimed in two manners: online and offline. In this study, a new method based on the i-vector is proposed for online SV. In the proposed method, a fixed-length vector, called i-vector, is extracted from each signature and then this vector is used for template making. Several techniques such as nuisance attribute projection (NAP) and within-class covariance normalisation... 

    The control of a thermal system with large time delay using of LQG and lead-compensator

    , Article 2010 IEEE International Conference on Mechatronics and Automation, ICMA 2010, 4 August 2010 through 7 August 2010 ; August , 2010 , Pages 1842-1847 ; 9781424451418 (ISBN) Zareh, S. H ; Jahromi, A. F ; Abbasi, M ; Khayyat, A. A ; Sharif University of Technology
    2010
    Abstract
    This paper will first describe the Linear-Quadratic-Gaussian (LQG) and Lead-Compensator when the Proportional-Integral-Derivative (PID) controllers are inactive for procedures that have large delay time (LDT) in transfer stage. Therefore in those states, LQG and Lead Compensator perform better than the PID controllers. The constrained LQG is optimal and stabilizing. The solution algorithm is guaranteed to terminate in finite time with a computational cost that has a reasonable upper bound compared to the minimal cost for computing the optimal solution. In this work all actual working area condition for instance noises and disturbances are considered. Eventually, LQG and Lead Compensator have... 

    On the coupled continuous knapsack problems: projection onto the volume constrained Gibbs N-simplex

    , Article Optimization Letters ; Volume 10, Issue 1 , 2016 , Pages 137-158 ; 18624472 (ISSN) Tavakoli, R ; Sharif University of Technology
    Springer Verlag  2016
    Abstract
    Coupled continuous quadratic knapsack problems (CCK) are introduced in the present study. The solution of a CCK problem is equivalent to the projection of an arbitrary point onto the volume constrained Gibbs N-simplex, which has a wide range of applications in computational science and engineering. Three algorithms have been developed in the present study to solve large scale CCK problems. According to the numerical experiments of this study, the computational costs of presented algorithms scale linearly with the problem size, when it is sufficiently large. Moreover, they show competitive or even superior computational performance compared to the advanced QP solvers. The ease of... 

    Unconditionally stable fully explicit finite difference solution of solidification problems

    , Article Metallurgical and Materials Transactions B: Process Metallurgy and Materials Processing Science ; Volume 38, Issue 1 , 2007 , Pages 121-142 ; 10735615 (ISSN) Tavakoli, R ; Davami, P ; Sharif University of Technology
    2007
    Abstract
    An unconditionally stable fully explicit finite difference method for solution of conduction dominated phase-change problems is presented. This method is based on an asymmetric stable finite difference scheme for approximation of diffusion terms and application of the temperature recovery method as a phase-change modeling method. The computational cost of the presented method is the same as the explicit method per time-step, while it is free from time-step limitation due to stability criteria. It robustly handles isothermal and nonisothermal phase-change problems and is very efficient when the global temperature field is desirable (not accurate front position). The robustness, stability,... 

    Constraint multiproduct joint-replenishment inventory control problem using uncertain programming

    , Article Applied Soft Computing Journal ; Volume 11, Issue 8 , December , 2011 , Pages 5143-5154 ; 15684946 (ISSN) Taleizadeh, A. A ; Niaki, S. T. A ; Nikousokhan, R ; Sharif University of Technology
    Abstract
    An uncertain economic order quantity (UEOQ) model with payment in advance is developed to purchase high-price raw materials. A joint policy of replenishments and pre-payments is employed to supply the materials. The rate of demand is considered LR-fuzzy variables, lead-time is taken to be constant, and it is assumed that shortage does not occur in the cycles. The cycle is divided into three parts; the first part is the time between the previous replenishment-time to the next order-time (t0), the second part is the period between t0 to a payment-time (tk), and the third part is the period between tk to the next replenishment-time. At the start of the second part (t0), α% of the purchasing... 

    Landmark extraction from echocardiography sequence based on corner detection algorithms using product moment coefficient matcher

    , Article 2009 International Conference on Signal Processing Systems, ICSPS 2009, Singapore, 15 May 2009 through 17 May 2009 ; 2009 , Pages 91-97 ; 9780769536545 (ISBN) Siyah Mansoory, M ; Behnam, H ; Fatemi Zadeh, E ; Sharif University of Technology
    2009
    Abstract
    Landmark extraction is used as the first step of many vision tasks such as tracking, image registration, localization, image matching and recognition. Furthermore, landmarks are used to reduce the data flow and consequently the computational costs. In this paper we extracted landmarks from echocardiography sequence, our algorithm is based on corner extraction, and then we evaluate our algorithm with applying some test. For this purpose, we evaluated the detectors according to their repeatability, stability and landmark localization under changes in noise. © 2009 IEEE  

    Development of thermo-elastic tapered and spherical superelements

    , Article Applied Mathematics and Computation ; Volume 265 , 2015 , Pages 380-399 ; 00963003 (ISSN) Shamloofard, M ; Movahhedy, M. R ; Sharif University of Technology
    Elsevier Inc  2015
    Abstract
    Special superelements are often used to improve the computational efficiency and improve accuracy of finite element modeling. Structures with tapered and spherical geometry exist in many engineering problems. In this work, special tapered and spherical superelements are presented that can be used for modeling of tapered and spherical bodies in thermo mechanical analyses with computational efficiency. The performance of these superelements under thermal and structural loads is demonstrated by presenting several examples and comparing the results with those from conventional 3D brick elements, which shows high accuracy at reduced computational cost  

    Development of an inverse isogeometric methodology and its application in sheet metal forming process

    , Article Applied Mathematical Modelling ; Volume 73 , 2019 , Pages 266-284 ; 0307904X (ISSN) Shamloofard, M ; Assempour, A ; Sharif University of Technology
    Elsevier Inc  2019
    Abstract
    This paper proposes an inverse isogeometric analysis to estimate the blank and predict the strain distribution in sheet metal forming processes. In this study, the same NURBS basis functions are used for drawing a final part and analysis of the forming process. In other words, this approach requires only one modeling and analysis representation, in contrast to inverse FEM. This model deals with minimization of potential energy, deformation theory of plasticity, and infinitesimal deformation relations with considering a new non-uniform friction model. One advantage of the presented methodology is that the governing equations are solved in two-dimensional space without concerning about... 

    Using sensitivity analysis and gradual evaluation of ignition delay error to produce accurate low-cost skeletal mechanisms for oxidation of hydrocarbon fuels under high-temperature conditions

    , Article Energy and Fuels ; Volume 31, Issue 10 , 2017 , Pages 11234-11252 ; 08870624 (ISSN) Shakeri, A ; Mazaheri, K ; Owliya, M ; Sharif University of Technology
    Abstract
    Three-dimensional thermo-hydrodynamic analysis of gas turbine combustion chambers is of great importance in the power generation industry to achieve higher efficiency and reduced emissions. However, it is prohibitive to use a comprehensive full-detailed mechanism in their simulation algorithms because of the huge CPU time and memory space requirements. Many reduction approaches are available in the literature to remedy this problem. Here a new approach is presented to reduce large detailed or skeletal mechanisms of oxidation of hydrocarbon fuels to a low-cost skeletal mechanism. The method involves an integrated procedure including a Sensitivity Analysis (SA) and a procedure of Gradual... 

    GIM: GPU accelerated RIS-Based influence maximization algorithm

    , Article IEEE Transactions on Parallel and Distributed Systems ; Volume 32, Issue 10 , 2021 , Pages 2386-2399 ; 10459219 (ISSN) Shahrouz, S ; Salehkaleybar, S ; Hashemi, M ; Sharif University of Technology
    IEEE Computer Society  2021
    Abstract
    Given a social network modeled as a weighted graph GG, the influence maximization problem seeks kk vertices to become initially influenced, to maximize the expected number of influenced nodes under a particular diffusion model. The influence maximization problem has been proven to be NP-hard, and most proposed solutions to the problem are approximate greedy algorithms, which can guarantee a tunable approximation ratio for their results with respect to the optimal solution. The state-of-the-art algorithms are based on Reverse Influence Sampling (RIS) technique, which can offer both computational efficiency and non-trivial (1-1/e-ϵ)-approximation ratio guarantee for any epsilon >0ϵ>0.... 

    Analysis of well testing results for single phase flow in reservoirs with percolation structure

    , Article Oil and Gas Science and Technology ; Volume 76 , 2021 ; 12944475 (ISSN) Shahrian, E ; Masihi, M ; Sharif University of Technology
    Editions Technip  2021
    Abstract
    Constructing an accurate geological model of the reservoir is a preliminary to make any reliable prediction of a reservoir's performance. Afterward, one needs to simulate the flow to predict the reservoir's dynamic behaviour. This process usually is associated with high computational costs. Therefore, alternative methods such as the percolation approach for rapid estimation of reservoir efficiency are quite desirable. This study tries to address the Well Testing (WT) interpretation of heterogeneous reservoirs, constructed from two extreme permeabilities, 0 and K. In particular, we simulated a drawdown test on typical site percolation mediums, occupied to fraction "p"at a constant rate Q/h,... 

    Security enhancement for a low computation cost user authentication scheme

    , Article International Conference on Security and Cryptography, SECRYPT 2006, Setubal, 7 August 2006 through 10 August 2006 ; 2006 , Pages 5-8 ; 9728865635 (ISBN); 9789728865634 (ISBN) Sattarzadeh, B ; Asadpour, M ; Jalili, R ; Sharif University of Technology
    2006
    Abstract
    In 2003, Wu and Chieu proposed a user friendly remote authentication scheme using smart cards. Later, Yang and Wang pointed out that Wu and Chieu's scheme is vulnerable to the password guessing and forgery attacks. Recently, Lee et al. proposed an improved authentication scheme and claimed that their scheme is secure against forgery attack. However, in this paper, we illustrate that Lee et al.'s scheme is still vulnerable to the forgery attack. We also propose an enhancement of the scheme to resist such that attack. © 2010  

    An identity based authentication protocol for smart grid environment using physical uncloneable function

    , Article IEEE Transactions on Smart Grid ; Volume 12, Issue 5 , 2021 , Pages 4426-4434 ; 19493053 (ISSN) Sanaullah Badar, H. M ; Qadri, S ; Shamshad, S ; Faizan Ayub, M ; Mahmood, K ; Kumar, N ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Smart grid plays an important role in managing demand response management in modern smart city using Information and Communication Technologies (ICTs). In smart grid environment, sensors are widely used for surveillance. These are deployed on the high tension power supply lines which help to share the information to control center about line breakage or any other flaw. Besides the cyber-attacks, sensors may also experience physical attacks as they are deployed on high-tension power lines in an open environment. Moreover, an attacker can also impersonate the information exchanged between sensors, gateways and control centers. Therefore, the most indispensable requirement is to prevent these... 

    A meshless method to simulate interactions between large soft tissue and a surgical grasper

    , Article Scientia Iranica ; Volume 23, Issue 1 , 2016 , Pages 295-300 ; 10263098 (ISSN) Saghaei Nooshabadi, Z ; Abdi, E ; Farahmand, F ; Narimani, R ; Chizari, M ; Sharif University of Technology
    Sharif University of Technology  2016
    Abstract
    Realistic simulation of tool-tissue interactions can help to develop more effective surgical training systems and simulators. This study uses a finite element and meshless modeling approach to simulate the grasping procedure of a large intra-abdominal organ, i.e. a kidney, during laparoscopic surgery. Results indicate that the accuracy of the meshless method is comparable with that of the finite element method, with root mean square errors in the range of 0.8 to 2.3 mm in different directions. For the model presented in this study, the computational cost of the meshless method was much less than that of the finite element model  

    Finding sparse features for face detection using genetic algorithms

    , Article ICCC 2008 - IEEE 6th International Conference on Computational Cybernetics, Stara Lesna, 27 November 2008 through 29 November 2008 ; 2008 , Pages 179-182 ; 9781424428755 (ISBN) Sagha, H ; Dehghani, M ; Enayati, E ; Sharif University of Technology
    2008
    Abstract
    Although Face detection is not a recent activity in the field of image processing, it is still an open area for research. The greatest step in this field is the work reported by Viola and the recent analogous one is proposed by Huang et al. Both of them use similar features and also similar training process. The former is just for detecting upright faces, but the latter can detect multi-view faces in still grayscale images using new features called 'sparse feature'. Finding these features is very time consuming and inefficient by proposed methods. Here, we propose a new approach for finding sparse features using a genetic algorithm system. This method requires less computational cost and... 

    Mass flow rate scaling of the continuum-based equations using information preservation method

    , Article 41st AIAA Thermophysics Conference2009, Article number 2009-3746 ; 2009 ; 9781563479755 (ISBN) Roohi, E ; Darbandi, M ; Vakilipour, S ; Schneider, G. E ; Sharif University of Technology
    Abstract
    Kinetic theory based numerical scheme such as direct simulation Monte Carlo (DSMC) and information preservation (IP) schemes properly solve micro-nano flow problems in transition and free molecular regimes. However, the high computational cost of these methods encourages the researchers toward extending the applicability of the continuumbased equations beyond the slip flow regime. In addition to correct velocity profile, the continuum-based equations should predict accurate mass flow rate magnitude. The secondorder velocity slip models derived from the kinetic theory provide accurate velocity profiles up to Kn=0.5; however, they yield erroneous mass flow rate magnitudes because the basic... 

    Extending the Navier-stokes solutions to transition regime in two-dimensional micro- and nanochannel flows using information preservation scheme

    , Article Physics of Fluids ; Volume 21, Issue 8 , 2009 ; 10706631 (ISSN) Roohi, E ; Darbandi, M ; Sharif University of Technology
    2009
    Abstract
    The kinetic-theory-based numerical schemes, such as direct simulation Monte Carlo (DSMC) and information preservation (IP), can be readily used to solve transition flow regimes. However, their high computational cost still promotes the researchers to extend the Navier-Stokes (NS) equations beyond the slip flow and to the transition regime applications. Evidently, a suitable extension would accurately predict both the local velocity profiles and the mass flow rate magnitude as well as the streamwise pressure distribution. The second-order slip velocity model derived from kinetic theory can provide relatively accurate velocity profiles up to a Knudsen (Kn) number of around 0.5; however, its... 

    Porous media approach in thermohydraulic analysis of high temperature reactors in pressurized/depressurized cooldown: An improvement

    , Article Progress in Nuclear Energy ; Volume 80 , 2015 , Pages 119-127 ; 01491970 (ISSN) Nouri Borujerdi, A ; Tabatabai Ghomsheh, S. I ; Sharif University of Technology
    Elsevier Ltd  2015
    Abstract
    The current study aims at introducing a 2D and fast-running code for the issues pertinent to design, analysis and safety in modular high temperature reactors. While the porous media approach is only applied to pebble bed type, the analysis in this paper covers both pebble bed and prismatic reactor. A time-dependent mass equation along with energy conservation equation for the cooling gas and a time-dependent energy conservation equation for the solid was solved. Appropriate series of constitutive equations (e.g. heat transfer coefficient, effective heat conductivity of solid, heat transfer coefficient, pressure drop etc.) has been recruited as well. In addition a finite-volume method is... 

    TripletProt: Deep Representation Learning of Proteins Based On Siamese Networks

    , Article IEEE/ACM Transactions on Computational Biology and Bioinformatics ; Volume 19, Issue 6 , 2022 , Pages 3744-3753 ; 15455963 (ISSN) Nourani, E ; Asgari, E ; McHardy, A. C ; Mofrad, M. R. K ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    Pretrained representations have recently gained attention in various machine learning applications. Nonetheless, the high computational costs associated with training these models have motivated alternative approaches for representation learning. Herein we introduce TripletProt, a new approach for protein representation learning based on the Siamese neural networks. Representation learning of biological entities which capture essential features can alleviate many of the challenges associated with supervised learning in bioinformatics. The most important distinction of our proposed method is relying on the protein-protein interaction (PPI) network. The computational cost of the generated...