tag:blogger.com,1999:blog-29151689345496161062024-02-19T10:01:05.264-05:00Forgotten DreamCoolTeenhttp://www.blogger.com/profile/12994213757758024834noreply@blogger.comBlogger126125tag:blogger.com,1999:blog-2915168934549616106.post-11745628397697572602020-03-26T21:38:00.000-04:002020-03-26T21:38:07.812-04:00System and methods for UICC-based secure communication
ABSTRACT
A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the management server an authentication management function and an encryption key generator for execution by a secure element and an encryption engineUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-9831786199225375812017-07-30T13:39:00.000-04:002017-07-30T13:39:45.319-04:00Automatic Aesthetic Scoring
Image Aesthetics Scoring Engine
The developed engine gets the image and outputs a score showing the amount of the beauty inside the image! The code is working on Android/iOS platform,
The engine speed is about 100-200 ms which makes it suitable for a real-time engine. The core exploits GPU to compute aesthetic features from the image, and estimate the aesthetic score.
Android,&Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-2942265801341196822017-07-15T12:13:00.000-04:002017-07-15T12:13:08.375-04:00Maryam Mirzakhani, the only women to win Math Fields Medal
Maryam Mirzakhani was first women to win maths' Fields Medal. She would be in our mind forever.
RIP
#MaryamMirzakhani
in Farshid Farhat 's Twitter
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-52642757971237444792017-07-10T12:19:00.001-04:002017-07-10T12:19:47.606-04:00Photography Idea Retrieval
Integrating Deep-learned Models and Photography Idea Retrieval
Intelligent Portrait Composition Assistance (IPCA) – Integrating Deep-learned Models and Photography Idea Retrieval, Farshid Farhat, Mohammad Kamani, Sahil Mishra, James Wang, ACM Multimedia 2017, Mountain View, CA, USA.
ABSTRACT: Retrieving photography ideas corresponding to a given location facilitates the usage of Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-76432890331484283932017-06-28T17:38:00.000-04:002017-06-28T19:17:23.783-04:00That's why BLOGSPOT trumps versus wordpress
Hello,
> I cannot verify the breach as I don't have access to the content.
> But it is OK to empty the blog content and give me the permission.
Upon further review, the offer to empty your sites no longer stands. You've continued to publish spam content across a large number of sites. As such, all of the blogs owned by your account have been suspended and will not be returned.
Regards,
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-78432883852775523552017-06-28T11:19:00.002-04:002017-06-28T11:51:16.141-04:00Vision Endeavors
Academic Endeavors at Pennsylvania State University
Leveraging big visual data to predict severe weather conditions
Discovering Triangles in Portraits for Supporting Photographic Creation
Skeleton Matching with Applications in Severe Weather Detection
Detecting Dominant Vanishing Points in Natural Scenes with Application to Composition-Sensitive Image Retrieval
Shape matching using skeleton Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-61389284530527292282017-06-21T22:07:00.001-04:002017-06-26T16:13:16.143-04:00Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup
Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup, Farshid Farhat, Somayeh Salimi, Ahmad Salahi, IACR Cryptology ePrint Archive, 2011.
Abstract
Identification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and efficient Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-36880705033726485782017-06-03T19:22:00.000-04:002017-07-18T15:43:07.201-04:00Computer Vision Keywords
2D attacks
2D Face
2D Face Authentication
3D blood flow estimation
3D Face
3D Face Localisation
3D face model
3D face recognition
3D localization
3D Masks
3D model base indexing
3D object recognition
abnormality detection
accelerated exact k-means
Accent Identification
Accented speech
Accentual mismatch
accessible games
acoustic frequency
Acoustic model adaptation
acoustic modeling
Acoustic Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-36178352727677279442017-05-30T12:19:00.000-04:002017-05-30T12:19:13.944-04:00Farshid Farhat 's Google map images
Farshid Farhat
Local Guide · Level 5
Google MAPs Photos
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-19711492791729135682017-05-10T10:14:00.000-04:002017-05-30T12:18:56.701-04:00Queueing theory based modeling and optimal scheduling in Map-Reduce-like Frameworks
FORK-JOIN QUEUE MODELING AND OPTIMAL SCHEDULING IN PARALLEL PROGRAMMING FRAMEWORKS
ABSTRACTMapReduce framework is widely used to parallelize batch jobs since it exploits a high degree of multi-tasking to process them. However, it has been observed that when the number of servers increases, the map phase can take much longer than expected. This thesis analytically shows that the stochastic Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-31311979045292642292017-05-09T01:17:00.001-04:002017-05-09T01:17:12.687-04:00FORK-JOIN QUEUE MODELING AND OPTIMAL SCHEDULING IN PARALLEL PROGRAMMING FRAMEWORKS
FORK-JOIN QUEUE MODELING AND OPTIMAL SCHEDULING IN PARALLEL PROGRAMMING FRAMEWORKS
ABSTRACT
MapReduce framework is widely used to parallelize batch jobs since it exploits a high degree of multi-tasking to process them. However, it has been observed that when the number of servers increases, the map phase can take much longer than expected. This thesis analytically shows that the stochastic Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-87188733713490196462016-08-25T17:47:00.001-04:002016-08-25T17:47:14.833-04:00Diman Zad Tootaghaj 's publications
Diman Zad Tootaghaj 's publications
1.D. Z. Tootaghaj, F. Farhat. Optimal placement of Cores, Caches and Memory controllers in NoC. arXiv, 2016. [link] [pdf]
2.F. Farhat, D. Z. Tootaghaj, M. Arjomand. Towards optimizing data computing in the cloud. arXiv, 2016. [link] [pdf]
3. F. Farhat, D. Z. Tootaghaj, Y. He, A. Sivasubramaniam, M. T. Kandemir, C. R. Das. Stochastic Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-56906596343773918012016-08-25T16:39:00.001-04:002016-08-25T16:39:06.016-04:00Towards Stochastically Optimizing Data Computing Flows
Towards Stochastically Optimizing Data Computing Flows
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-35338747313263229982016-08-25T16:34:00.001-04:002016-08-25T16:34:38.579-04:00Optimal Placement of Cores Caches and MemoryControllers in NoC
Optimal Placement of Cores, Caches and MemoryControllers in NoC
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-68506825268994598372016-06-13T12:18:00.000-04:002016-06-13T12:18:51.993-04:00تحليل پنهان سازي تصوير با نرخ درج پايين در حوزه مكان فرحت، فرشيد Farhat, Farshid
تحليل پنهان سازي تصوير با نرخ درج پايين در حوزه مكان
فرحت، فرشيد Farhat, Farshid
شماره پایان نامه:45945
کد دانشکده:05
پديدآور:فرحت، فرشيد
عنوان:تحليل پنهان سازي تصوير با نرخ درج پايين در حوزه مكان.
نام دانشگاه/پژوهشگاه:صنعتي شريف
سال اخذ مدرك:1392.
نام دانشکده:مهندسي برق
مقطع:دكتري
گرایش:مخابرات سيستم
توصیف ظاهری:89ص.: جدول، نمودار، كتابنامه؛ چكيده به فارسي و انگليسي
توصیفگر:نهان Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-43175586535687934992016-06-13T12:11:00.000-04:002016-06-13T12:11:49.794-04:00ارتقاء امنيت پروتكل هاي مسيريابي در شبكه هاي اقتضايي (فرشيد فرحت)
ارتقاء امنيت پروتكل هاي مسيريابي در شبكه هاي اقتضايي
فرحت، فرشيد (Farshid Farhat).
شماره پایان نامه:37533
کد دانشکده:05
پديدآور:فرحت، فرشيد.
عنوان:ارتقاء امنيت پروتكل هاي مسيريابي در شبكه هاي اقتضايي.
نام دانشگاه/پژوهشگاه:صنعتي شريف
سال اخذ مدرك:1386
نام دانشکده:مهندسي برق
گرایش:كارشناسي ارشد (مخابرات رمز)
یادداشت:100ص0: جدول، نمودار، كتابنامه؛ چكيده به فارسي و انگليسي
توصیفگر:Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-44529820562342397012016-04-14T11:06:00.001-04:002016-04-14T11:06:47.849-04:00Shahrzad SeriesUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-52438253272168342782015-02-26T11:50:00.000-05:002017-07-17T14:39:43.999-04:00MapReduce Framework Optimization
Modeling and Optimization of Straggling Mappers
ABSTRACT
MapReduce framework is widely used to parallelize batch jobs since it exploits a high degree of multi-tasking to process them. However, it has been observed that when the number of mappers increases, the map phase can take much longer than expected. This paper analytically shows that stochastic behavior of mapper nodes has a negative Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-2810817860425791322014-11-18T10:52:00.001-05:002014-11-18T10:52:31.142-05:00Persian Boy NamesA B C D E F G H I J K L M N O P Q R S T U V W X Y Z A Top آبان AbAn 8th month of the Iranian calendar; Name of a certain angel آبید Abid Spark, fire عبّاس abbAs (A) Frowning, looking austere; Lion; Name of Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-9964171475115905322014-11-18T10:47:00.001-05:002014-11-18T10:47:57.354-05:00Persian Girl NamesA B C D E F G H I J K L M N O P Q R S T U V W X Y Z A Top اعظم aazam/ azam Greatest; supreme آبان AbAn 8th month of the Iranian calendar; Name of an angel آبان بانو AbAnbanu (Z) Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-85285013774961509782014-11-07T16:03:00.001-05:002014-11-07T16:03:24.867-05:00Bad children and a box of beverage bottles! Bad children and a box of beverage bottles! D. and F. provided one beverage box with 32 bottles for the weekend party, but one of their four children changed the content of one of the bottles that cannot be detected easily! To punish the children, they decided to permute the bottles and ask the children to find it again until two days later! Unfortunately if one drinks from THAT bottleUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-4871160995827079392014-11-07T15:37:00.001-05:002014-11-07T15:37:18.188-05:00Bad children and a box of beverage! Bad children and a box of beverage! D. and F. provided one beverage box with 32 bottles for the weekend party, but one of their four children changed the content of one of the bottles that cannot be detected easily! To punish the children, they decided to permute the bottles and ask the children to find it again until two days later! Unfortunately if one drinks from THAT bottle, he/sheUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-21664121089057552152014-11-06T23:30:00.001-05:002014-11-06T23:30:39.915-05:00آهنگی که شهرام شب پره با اون معافیت گرفتUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-40543142380986662112014-09-06T13:04:00.001-04:002014-09-06T13:04:37.519-04:00Farshid Farhat LinkedinUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-2915168934549616106.post-89349495776347132272014-03-15T21:57:00.001-04:002014-03-15T21:57:46.664-04:00آنارشیسم اجتماعیآنارشیسم اجتماعی آنارشیسم اجتماعی چنان فراگیر شده که واریانس بردارهای خلاقیت به گرانیگاه در حال میل کردن است. شاید به این دلیل که نوآنارشیست ها هرگز الفبای ازلیت نیاموخته با حضیض تعقل پا به عرصه ظهور تا ابدیت نهاده اند و یا آنارشیست نماهایی که اعوجاج رفتاری آنها هرگز قابل فیلتر نیست و گشتاور مومنتوم عملشان بر بازوی حرفشان عمود است! Unknownnoreply@blogger.com0