tag:blogger.com,1999:blog-70398124908157969092024-03-19T01:23:31.861-07:00Lost in the WindCoolTeenhttp://www.blogger.com/profile/12994213757758024834noreply@blogger.comBlogger117125tag:blogger.com,1999:blog-7039812490815796909.post-62310903705492654112018-11-21T10:07:00.001-08:002018-11-21T10:07:46.795-08:00MODELING, MONITORING AND SCHEDULING TECHNIQUES FOR NETWORK RECOVERY FROM MASSIVE FAILURESMODELING, MONITORING AND SCHEDULING TECHNIQUES FOR NETWORK RECOVERY FROM MASSIVE FAILURESAuthor: Zad Tootaghaj, Diman Graduate Program: Computer Science and Engineering Degree: Doctor of Philosophy Document Type: Dissertation Date of Defense: May 23, 2018 Committee Members: Thomas F Laporta, Dissertation AdvisorThomas F Laporta, Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-25489394857391748022018-11-15T13:06:00.001-08:002018-11-15T13:06:55.321-08:00New trend in Computational PhotographyCAPTAIN: Comprehensive Composition Assistance for Photo TakingAuction-based Resource Management in Computer ArchitectureProfessional portrait datasetEnhanced Signal Recovery via Sparsity Inducing Image Priors Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-29608225836722799832017-11-08T13:32:00.001-08:002017-11-08T13:32:51.652-08:00Sites.Google.ComBehavioral Analog Topology Synthesizerطراحی کننده توپولوژي مدارهاي آنالوگ درحوزه سيگنال كوچك و فركانس پايينhttps://sites.google.com/site/netlist2scheme/Cool Teen Buddyhttps://sites.google.com/site/coolteenbuddy/Diman Zad-Tootaghaj 's Academic WebsiteDiman Zad-Tootaghaj 's Academic Website سایت گوگل دیمن زاد توت آغاجhttps://sites.google.com/site/dimantootaghaj/Eigenvalues-based Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-34985819005656512142017-11-02T13:01:00.001-07:002017-11-02T13:01:31.086-07:00SITES.PSU.EDUBehavioral Analog Topology SynthesizerOptical CDMA Network Simulator (OCNS)Persian Boy NamesPersian Girl NamesExtended Authentication and Key Agreement ProtocolSecure Multipath Adaptive Routing ProtocolAuthentication and Key Agreement Protocol in 4GRisk of attack coefficient effect on availability of adhoc networksGame-theoretic model to mitigate packet droppingMulti-dimensional correlation Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-37382440962922541112017-10-20T08:14:00.001-07:002017-10-20T08:14:50.794-07:00System and methods for UICC-based secure communicationSystem and methods for UICC-based secure communication US 9461993 B2System and methods for uicc-based secure communication US 20150222631 A1ABSTRACTA system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-81166424451044871292017-10-16T11:19:00.001-07:002017-10-16T11:30:38.621-07:00Photo Aesthetics and Composition Rating
Aesthetic Rating for Photos
The developed engine gets the image and outputs a score showing the amount of the beauty inside the image! The code is also working on Android/iOS platform. The engine speed is good enough which makes it suitable for a real-time engine. The core computes aesthetic features from the image, and estimates the aesthetic score. Check out > Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-84444946276240105132017-10-10T12:46:00.001-07:002017-10-10T12:46:58.427-07:00Contention-Aware Game-theoretic Model for Heterogeneous Resource AssignmentCAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource AssignmentTraditional resource management systems rely on a centralized approach to manage users running on each resource. The centralized resource management system is not scalable for large-scale servers as the number of users running on shared resources is increasing dramatically and the centralized manager may not have Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-18525046714165598672017-09-30T10:49:00.001-07:002017-09-30T10:49:40.606-07:00Modeling and Optimization of MapReduceABSTRACTMapReduce framework is widely used to parallelize batch jobs since it exploits a high degree of multi-tasking to process them. However, it has been observed that when the number of mappers increases, the map phase can take much longer than expected. This paper analytically shows that stochastic behavior of mapper nodes has a negative effect on the completion time of a MapReduce job, and Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-63538825314725266992017-09-27T15:51:00.001-07:002017-09-27T15:51:21.116-07:00www.personal.psu.edu/fuf111PublicationsDiscovering Triangles in Portraits for Supporting Photographic Creation, S He, Z Zhou, F Farhat, JZ Wang, IEEE Transactions on Multimedia, Aug 2017.Intelligent Portrait Composition Assistance — Integrating Deep-learned Models and Photography Idea Retrieval, F Farhat, MM Kamani, S Mishra, JZ Wang, July 2017.Skeleton Matching with Applications in Severe Weather Detection, MM Kamani, F Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-3541571605202808372017-09-22T07:51:00.001-07:002017-09-22T07:51:34.967-07:00PIAKAPAuthentication and Key Agreement Protocol in 4GPrivate Identification, Authentication and Key Agreement Protocol with Security Mode Setup, Farshid Farhat, Somayeh Salimi, Ahmad Salahi.AbstractIdentification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and efficient Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-32652418641908396442017-08-23T09:19:00.001-07:002017-08-23T09:19:28.260-07:00Bid Data AnalyticsAdvanced_Identity_Management_System_in_4-1emc0qt BRP_final-zoyyb5 Enhanced-Public-Key-Encryption-Algorithm-for-Security-of-Network-1fx6bcq Patent-1juoapk 829-2424-1-PB-291udlo 1705.08464-1tbevxv 1705.09073-2bike8d 108262-267778-1-PB-23ehcaw 07175726-2c3bror 07943366-1cqh172 p55-shi-pcen16 Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-55817634628694916452017-08-17T08:04:00.001-07:002017-08-17T08:04:14.178-07:00Penn State SitesSmart Cropping, Aesthetic Scoring, Image Retrieval and Deep Learning, Big Data Computing, Portrait Photography, Computer Vision and Pattern Recognition, Distributed and Parallel frameworks, NetworkingBig Data ComputingImage Retrieval and Deep LearningDeep Learning at Penn StateSmart Cropping, Aesthetic ScoringComputer Vision and Pattern RecognitionDistributed and Parallel Systems, Network Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-18384590862517313182017-08-10T14:30:00.001-07:002017-08-10T14:30:01.523-07:00Professional Photography using Deep LearningABSTRACT: Retrieving photography ideas corresponding to a given location facilitates the usage of smart cameras, where there is a high interest among amateurs and enthusiasts to take astonishing photos at anytime and in any location. Existing research captures some aesthetic techniques such as the rule of thirds, triangle, and perspective-ness, and retrieves useful feedbacks based on one Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-32924392722650506302017-07-30T09:24:00.001-07:002017-07-30T09:24:16.082-07:00A Public Key Encryption Algorithm for Network SecurityEnhanced Public Key Encryption Algorithm for Security of Network Abstract -- Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet,security became a major concern and the history of security allows a better understanding of the emergence of security technology. The internetstructure itself allowed for many securityUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-25965196055119807882017-07-17T12:08:00.001-07:002017-07-17T12:08:31.779-07:00The children of the dreamفهرست نوشته ها▼ 2016 (1)▼ 12 (1)باخیال فراموشی▼ 2015 (2)▼ 05 (1)انتروپی پوچ▼ 03 (1)عاشقتم▼ 2014 (5)▼ 11 (1)What is the best strategy▼ 03 (2)آنارشیسم اجتماعیگیس کلاه بتول▼ 01 (2)بی وفای دوست داشتنیامید خیال▼ 2013 (1)▼ 10 (1)بشکن▼ 2012 (4)▼ 10 (1)وارونگی امواج▼ 07 (1)تکرار تاریخ▼ 05 (1)دور یا پایداری ابدیت▼ 02 (1)سیاه چاله سرگردان▼ 2011 (4)▼ 12 (1)خداوندا▼ 06 (1)سپاس از آمدنت▼ Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-28577751386297962622017-07-15T09:21:00.001-07:002017-07-15T09:21:19.578-07:00Mirzakhani, MaryamMaryam Mirzakhani was first women to win Fields Medal in math also professor at Stanford university.RIP #MaryamMirzakhaniin Farshid Farhat 's Twitter Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-35195450824755302642017-07-10T10:09:00.001-07:002017-07-10T10:09:03.656-07:00Deep Learning at Pennsylvania State UniversityIntegrating Deep-learned Models and Photography Idea RetrievalIntelligent Portrait Composition Assistance (IPCA) – Integrating Deep-learned Models and Photography Idea Retrieval, Farshid Farhat, Mohammad Kamani, Sahil Mishra, James Wang, ACM Multimedia 2017, Mountain View, CA, USA.ABSTRACT: Retrieving photography ideas corresponding to a given location facilitates the usage of smart cameras, Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-77092133911543209712013-06-11T08:46:00.000-07:002017-06-28T08:47:08.575-07:00Academic Endeavors at Pennsylvania State University
Academic Endeavors at Pennsylvania State University
Leveraging big visual data to predict severe weather conditions
Discovering Triangles in Portraits for Supporting Photographic Creation
Skeleton Matching with Applications in Severe Weather Detection
Detecting Dominant Vanishing Points in Natural Scenes with Application to Composition-Sensitive Image Retrieval
Shape matching using skeleton Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-49095946853750371192012-07-30T12:25:00.000-07:002012-07-30T12:25:47.794-07:00Feelings (احساسات)
Feelings
(احساسات)
روانشناسان بر آنند که احساسات بشری نشات گرفته از 4 حس بنیادی اند که 3 تای آنها بد و تنها یکی خوب است.
1-ترس 2-دلهره یا نگرانی 3-غم 4-شادی
fear stress grief happiness
برای مثال وقتی انسان عاشق می شود ممکن است هم شاد باشد و هم نگران. بیان این مطلب تا اندازه ای کلیشه ای به نظر می رسد. از این جهت که ما به دنبال آن هستیم که هر حسی را در هر لحظه و Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-19021357703300691202012-05-31T07:34:00.002-07:002012-05-31T07:34:32.401-07:00آرزویی بر بال ابرها
آرزویی بر بال ابرها
چشمان معصومت قلب خورشید را کند بیدار
لبخند سنگینت عقل سلیم را کند هوشیار
چهر خندانت در هر لحظه به خواب بینم
در وادی عشق بازان هردم به سراب بینم
آن لحظه که رخ یارم به ناگه آید در یاد
از خاطر شیرینش یکدم زلفم رود بر باد
هردم که پی عشق روم، آری که ... باشد
هر ره که به سویت جویم، آن خود ... باشد
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-25323781352063614042011-11-24T21:24:00.000-08:002012-01-22T07:11:37.552-08:00خدایا خدایاخدایا رهاندی مرا چون بار اولی هاخدایا پناه برم به تو از بدی هاخدایا همواره بودی بر بالای سر گم گشته امخدایا التماس خیر دارم برای همسر و خانواده امخدایا بعد از این همم مرا ارشاد کنخدایا لبه بد و خوب بر من نمایان کنخدایا سنگ بر مسیر کنجکاوی های آلوده بنهخدایا صبر در ره گرفتاری های ناآموخته بدهخدایا آگاه ساز مرا ز نیت پلید بدخواهانخدایا فرمان ده برهم زنم عادت روزمرگانخدایا به حکمت آزموده سازم Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-84440191754717808692011-06-13T09:03:00.000-07:002012-01-22T07:11:37.653-08:00سپاس از آمدنتبه نام بخشنده مهرباننقش خیال بر چشمان خورشیدانهآتش امیدی است بسی جاودانهامواج زندگی آرام گیرد در بیکران دلهایشانهنگام هم پایی ابر و باد تا نیل به آرمانشانUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-1701104253913473712011-01-31T11:09:00.000-08:002012-01-22T07:11:37.531-08:00نفسم گرفت ازاین شهرنفسم گرفت ازاین شهر در این حصار بشکندر این حصار جادویی روزگار بشکنچو شقایق از دل سنگ برآر رایت خونبه جنون صلابت صخره کوهسار بشکنتوکه ترجمان صبحی به ترنم و ترانهلب زخم دیده بگشا صف انتظار بشکنشب غارت تتاران همه سو فکنده سایهتو به آذرخشی این سایه ی دیوسار بشکنزبرون کسی نیاید جویباری تو اینجاتو ز خویشتن برون آ سپه تتار بشکنسر آن ندارد امشب که برآید آفتابیتو خود آفتاب خود باش و طلسم کار بشکنبسرای تا Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-7039812490815796909.post-32841268991311768892010-12-11T04:18:00.000-08:002012-01-22T07:11:37.571-08:00عکس های رویایی از طبیعتعکس های رویایی از طبیعتUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-7039812490815796909.post-65911718755690705912010-11-12T12:39:00.000-08:002012-01-22T07:11:37.630-08:00نظر کوته مندنیای ایرانی مملو از تنگ نظری و کوته بینیاز بدو تولد ایرانی چشم دیدن ایرانی ندارد!نابغه عالم که باشی اگر ایرانی هستی در ایران چیزی نیستی!!! نتیجتا کار گروهی = صفر!نهایتا اصلا نابغه و نخبه ای وجود نداریم و همه معیوبیم و عیبجویی میکنیم و آنقدر عیب هم را به رخ هم میکشیم تا ارزش یکدیگر را پایمال کنیم و خودمان باورمان شود که هیچ هستیم!این سرنوشتی است که باعث گسستگی ایرانیان و تزلزل انسجام ملی شده Unknownnoreply@blogger.com1