tag:blogger.com,1999:blog-38687714341936303922024-03-14T01:12:41.392-07:00Apple iPhone .irایران اپل آی-فون آیفون آي-فون آيفون ایفون ايفون ای-فون اي-فونCoolTeenhttp://www.blogger.com/profile/12994213757758024834noreply@blogger.comBlogger148125tag:blogger.com,1999:blog-3868771434193630392.post-62310903705492654112018-11-21T10:07:00.001-08:002018-11-21T10:07:46.485-08:00MODELING, MONITORING AND SCHEDULING TECHNIQUES FOR NETWORK RECOVERY FROM MASSIVE FAILURESMODELING, MONITORING AND SCHEDULING TECHNIQUES FOR NETWORK RECOVERY FROM MASSIVE FAILURESAuthor: Zad Tootaghaj, Diman Graduate Program: Computer Science and Engineering Degree: Doctor of Philosophy Document Type: Dissertation Date of Defense: May 23, 2018 Committee Members: Thomas F Laporta, Dissertation AdvisorThomas F Laporta, Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-25489394857391748022018-11-15T13:06:00.001-08:002018-11-15T13:06:55.070-08:00New trend in Computational PhotographyCAPTAIN: Comprehensive Composition Assistance for Photo TakingAuction-based Resource Management in Computer ArchitectureProfessional portrait datasetEnhanced Signal Recovery via Sparsity Inducing Image Priors Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-29608225836722799832017-11-08T13:32:00.001-08:002017-11-08T13:32:51.701-08:00Sites.Google.ComBehavioral Analog Topology Synthesizerطراحی کننده توپولوژي مدارهاي آنالوگ درحوزه سيگنال كوچك و فركانس پايينhttps://sites.google.com/site/netlist2scheme/Cool Teen Buddyhttps://sites.google.com/site/coolteenbuddy/Diman Zad-Tootaghaj 's Academic WebsiteDiman Zad-Tootaghaj 's Academic Website سایت گوگل دیمن زاد توت آغاجhttps://sites.google.com/site/dimantootaghaj/Eigenvalues-based Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-34985819005656512142017-11-02T13:01:00.001-07:002017-11-02T13:01:31.115-07:00SITES.PSU.EDUBehavioral Analog Topology SynthesizerOptical CDMA Network Simulator (OCNS)Persian Boy NamesPersian Girl NamesExtended Authentication and Key Agreement ProtocolSecure Multipath Adaptive Routing ProtocolAuthentication and Key Agreement Protocol in 4GRisk of attack coefficient effect on availability of adhoc networksGame-theoretic model to mitigate packet droppingMulti-dimensional correlation Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-37382440962922541112017-10-20T08:14:00.001-07:002017-10-20T08:14:50.804-07:00System and methods for UICC-based secure communicationSystem and methods for UICC-based secure communication US 9461993 B2System and methods for uicc-based secure communication US 20150222631 A1ABSTRACTA system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-81166424451044871292017-10-16T11:19:00.001-07:002017-10-16T11:28:05.378-07:00Rate Aesthetics and Composition of an Image
Aesthetic Rating for Photos
The developed engine gets the image and outputs a score showing the amount of the beauty inside the image! The code is also working on Android/iOS platform. The engine speed is good enough which makes it suitable for a real-time engine. The core computes aesthetic features from the image, and estimates the aesthetic score. Check out > Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-84444946276240105132017-10-10T12:46:00.001-07:002017-10-10T12:46:58.477-07:00Contention-Aware Game-theoretic Model for Heterogeneous Resource AssignmentCAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource AssignmentTraditional resource management systems rely on a centralized approach to manage users running on each resource. The centralized resource management system is not scalable for large-scale servers as the number of users running on shared resources is increasing dramatically and the centralized manager may not have Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-18525046714165598672017-09-30T10:49:00.001-07:002017-09-30T10:49:40.584-07:00Modeling and Optimization of MapReduceABSTRACTMapReduce framework is widely used to parallelize batch jobs since it exploits a high degree of multi-tasking to process them. However, it has been observed that when the number of mappers increases, the map phase can take much longer than expected. This paper analytically shows that stochastic behavior of mapper nodes has a negative effect on the completion time of a MapReduce job, and Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-63538825314725266992017-09-27T15:51:00.001-07:002017-09-27T15:51:21.136-07:00www.personal.psu.edu/fuf111PublicationsDiscovering Triangles in Portraits for Supporting Photographic Creation, S He, Z Zhou, F Farhat, JZ Wang, IEEE Transactions on Multimedia, Aug 2017.Intelligent Portrait Composition Assistance — Integrating Deep-learned Models and Photography Idea Retrieval, F Farhat, MM Kamani, S Mishra, JZ Wang, July 2017.Skeleton Matching with Applications in Severe Weather Detection, MM Kamani, F Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-3541571605202808372017-09-22T07:51:00.001-07:002017-09-22T07:51:35.071-07:00PIAKAPAuthentication and Key Agreement Protocol in 4GPrivate Identification, Authentication and Key Agreement Protocol with Security Mode Setup, Farshid Farhat, Somayeh Salimi, Ahmad Salahi.AbstractIdentification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and efficient Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-32652418641908396442017-08-23T09:19:00.001-07:002017-08-23T09:19:28.330-07:00Bid Data AnalyticsAdvanced_Identity_Management_System_in_4-1emc0qt BRP_final-zoyyb5 Enhanced-Public-Key-Encryption-Algorithm-for-Security-of-Network-1fx6bcq Patent-1juoapk 829-2424-1-PB-291udlo 1705.08464-1tbevxv 1705.09073-2bike8d 108262-267778-1-PB-23ehcaw 07175726-2c3bror 07943366-1cqh172 p55-shi-pcen16 Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-55817634628694916452017-08-17T08:04:00.001-07:002017-08-17T08:04:14.310-07:00Penn State SitesSmart Cropping, Aesthetic Scoring, Image Retrieval and Deep Learning, Big Data Computing, Portrait Photography, Computer Vision and Pattern Recognition, Distributed and Parallel frameworks, NetworkingBig Data ComputingImage Retrieval and Deep LearningDeep Learning at Penn StateSmart Cropping, Aesthetic ScoringComputer Vision and Pattern RecognitionDistributed and Parallel Systems, Network Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-18384590862517313182017-08-10T14:30:00.001-07:002017-08-10T14:30:01.474-07:00Professional Photography using Deep LearningABSTRACT: Retrieving photography ideas corresponding to a given location facilitates the usage of smart cameras, where there is a high interest among amateurs and enthusiasts to take astonishing photos at anytime and in any location. Existing research captures some aesthetic techniques such as the rule of thirds, triangle, and perspective-ness, and retrieves useful feedbacks based on one Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-32924392722650506302017-07-30T09:24:00.001-07:002017-07-30T09:24:16.086-07:00A Public Key Encryption Algorithm for Network SecurityEnhanced Public Key Encryption Algorithm for Security of Network Abstract -- Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet,security became a major concern and the history of security allows a better understanding of the emergence of security technology. The internetstructure itself allowed for many securityUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-25965196055119807882017-07-17T12:08:00.001-07:002017-07-17T12:08:31.762-07:00The children of the dreamفهرست نوشته ها▼ 2016 (1)▼ 12 (1)باخیال فراموشی▼ 2015 (2)▼ 05 (1)انتروپی پوچ▼ 03 (1)عاشقتم▼ 2014 (5)▼ 11 (1)What is the best strategy▼ 03 (2)آنارشیسم اجتماعیگیس کلاه بتول▼ 01 (2)بی وفای دوست داشتنیامید خیال▼ 2013 (1)▼ 10 (1)بشکن▼ 2012 (4)▼ 10 (1)وارونگی امواج▼ 07 (1)تکرار تاریخ▼ 05 (1)دور یا پایداری ابدیت▼ 02 (1)سیاه چاله سرگردان▼ 2011 (4)▼ 12 (1)خداوندا▼ 06 (1)سپاس از آمدنت▼ Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-28577751386297962622017-07-15T09:21:00.001-07:002017-07-15T09:21:19.560-07:00Mirzakhani, MaryamMaryam Mirzakhani was first women to win Fields Medal in math also professor at Stanford university.RIP #MaryamMirzakhaniin Farshid Farhat 's Twitter Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-35195450824755302642017-07-10T10:09:00.001-07:002017-07-10T10:09:03.625-07:00Deep Learning at Pennsylvania State UniversityIntegrating Deep-learned Models and Photography Idea RetrievalIntelligent Portrait Composition Assistance (IPCA) – Integrating Deep-learned Models and Photography Idea Retrieval, Farshid Farhat, Mohammad Kamani, Sahil Mishra, James Wang, ACM Multimedia 2017, Mountain View, CA, USA.ABSTRACT: Retrieving photography ideas corresponding to a given location facilitates the usage of smart cameras, Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-42163796464132795252017-06-28T08:57:00.001-07:002017-06-28T08:57:09.761-07:00Automatic Thumbnail Generation by Smart Cropping
Academic Endeavors at Pennsylvania State University
Leveraging big visual data to predict severe weather conditions
Discovering Triangles in Portraits for Supporting Photographic Creation
Skeleton Matching with Applications in Severe Weather Detection
Detecting Dominant Vanishing Points in Natural Scenes with Application to Composition-Sensitive Image Retrieval
Shape matching using skeleton Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-86421845519596983502016-08-25T14:44:00.001-07:002016-08-25T14:44:11.875-07:00Diman Zad Tootaghaj 's publications
Diman Zad Tootaghaj 's publications
1.D. Z. Tootaghaj, F. Farhat. Optimal placement of Cores, Caches and Memory controllers in NoC. arXiv, 2016. [link] [pdf]
2.F. Farhat, D. Z. Tootaghaj, M. Arjomand. Towards optimizing data computing in the cloud. arXiv, 2016. [link] [pdf]
3. F. Farhat, D. Z. Tootaghaj, Y. He, A. Sivasubramaniam, M. T. Kandemir, C. R. Das. Stochastic Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-73219781875138598302016-08-25T13:38:00.001-07:002016-08-25T13:38:39.176-07:00Towards Stochastically Optimizing Data Computing Flows
Towards Stochastically Optimizing Data Computing Flows
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-6366928679507682512016-08-25T13:34:00.001-07:002016-08-25T13:34:12.523-07:00Optimal Placement of Cores Caches and MemoryControllers in NoC
Optimal Placement of Cores, Caches and MemoryControllers in NoC
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-60864220695727558892016-06-13T09:19:00.000-07:002016-06-13T09:19:03.447-07:00تحليل پنهان سازي تصوير با نرخ درج پايين در حوزه مكان فرحت، فرشيد Farhat, Farshid
تحليل پنهان سازي تصوير با نرخ درج پايين در حوزه مكان
فرحت، فرشيد Farhat, Farshid
شماره پایان نامه:45945
کد دانشکده:05
پديدآور:فرحت، فرشيد
عنوان:تحليل پنهان سازي تصوير با نرخ درج پايين در حوزه مكان.
نام دانشگاه/پژوهشگاه:صنعتي شريف
سال اخذ مدرك:1392.
نام دانشکده:مهندسي برق
مقطع:دكتري
گرایش:مخابرات سيستم
توصیف ظاهری:89ص.: جدول، نمودار، كتابنامه؛ چكيده به فارسي و انگليسي
توصیفگر:نهان Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-5189785754159313262016-06-13T09:12:00.000-07:002016-06-13T09:12:02.931-07:00ارتقاء امنيت پروتكل هاي مسيريابي در شبكه هاي اقتضايي (فرشيد فرحت)
ارتقاء امنيت پروتكل هاي مسيريابي در شبكه هاي اقتضايي
فرحت، فرشيد (Farshid Farhat).
شماره پایان نامه:37533
کد دانشکده:05
پديدآور:فرحت، فرشيد.
عنوان:ارتقاء امنيت پروتكل هاي مسيريابي در شبكه هاي اقتضايي.
نام دانشگاه/پژوهشگاه:صنعتي شريف
سال اخذ مدرك:1386
نام دانشکده:مهندسي برق
گرایش:كارشناسي ارشد (مخابرات رمز)
یادداشت:100ص0: جدول، نمودار، كتابنامه؛ چكيده به فارسي و انگليسي
توصیفگر:Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-2810817860425791322014-11-18T07:52:00.001-08:002014-11-18T07:52:31.146-08:00Persian Boy NamesA B C D E F G H I J K L M N O P Q R S T U V W X Y Z A Top آبان AbAn 8th month of the Iranian calendar; Name of a certain angel آبید Abid Spark, fire عبّاس abbAs (A) Frowning, looking austere; Lion; Name of Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3868771434193630392.post-9964171475115905322014-11-18T07:47:00.001-08:002014-11-18T07:47:57.414-08:00Persian Girl NamesA B C D E F G H I J K L M N O P Q R S T U V W X Y Z A Top اعظم aazam/ azam Greatest; supreme آبان AbAn 8th month of the Iranian calendar; Name of an angel آبان بانو AbAnbanu (Z) Unknownnoreply@blogger.com0