tag:blogger.com,1999:blog-52489241878866862702024-03-19T14:31:55.878-07:00Android.irCoolTeenhttp://www.blogger.com/profile/12994213757758024834noreply@blogger.comBlogger30125tag:blogger.com,1999:blog-5248924187886686270.post-29608225836722799832020-04-17T22:10:00.000-07:002020-04-17T22:10:14.818-07:00Eigenvalues-based Steganalysis
Behavioral Analog Topology Synthesizerhttps://sites.google.com/site/netlist2scheme/
Cool Teen Buddyhttps://sites.google.com/site/coolteenbuddy/
Diman Zad-Tootaghaj 's Academic Websitehttps://sites.google.com/site/dimantootaghaj/
Eigenvalues-based Steganalysishttps://sites.google.com/site/eigenvaluesbasedsteganalysis/
FARHAThttps://sites.google.com/site/farhat83site/
Farsheed Farhathttps://Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-37382440962922541112020-03-25T10:53:00.000-07:002020-03-25T10:53:55.796-07:00System and methods for UICC-based secure communication
ABSTRACT
A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the management server an authentication management function and an encryption key generator for execution by a secure element and an encryption engineUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-62310903705492654112018-11-21T10:07:00.001-08:002018-11-21T10:07:46.781-08:00MODELING, MONITORING AND SCHEDULING TECHNIQUES FOR NETWORK RECOVERY FROM MASSIVE FAILURESMODELING, MONITORING AND SCHEDULING TECHNIQUES FOR NETWORK RECOVERY FROM MASSIVE FAILURESAuthor: Zad Tootaghaj, Diman Graduate Program: Computer Science and Engineering Degree: Doctor of Philosophy Document Type: Dissertation Date of Defense: May 23, 2018 Committee Members: Thomas F Laporta, Dissertation AdvisorThomas F Laporta, Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-25489394857391748022018-11-15T13:06:00.001-08:002018-11-15T13:06:55.408-08:00New trend in Computational PhotographyCAPTAIN: Comprehensive Composition Assistance for Photo TakingAuction-based Resource Management in Computer ArchitectureProfessional portrait datasetEnhanced Signal Recovery via Sparsity Inducing Image Priors Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-84444946276240105132017-10-10T12:46:00.001-07:002017-10-10T12:46:58.476-07:00Contention-Aware Game-theoretic Model for Heterogeneous Resource AssignmentCAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource AssignmentTraditional resource management systems rely on a centralized approach to manage users running on each resource. The centralized resource management system is not scalable for large-scale servers as the number of users running on shared resources is increasing dramatically and the centralized manager may not have Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-18525046714165598672017-09-30T10:49:00.001-07:002017-09-30T10:49:40.560-07:00Modeling and Optimization of MapReduceABSTRACTMapReduce framework is widely used to parallelize batch jobs since it exploits a high degree of multi-tasking to process them. However, it has been observed that when the number of mappers increases, the map phase can take much longer than expected. This paper analytically shows that stochastic behavior of mapper nodes has a negative effect on the completion time of a MapReduce job, and Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-3541571605202808372017-09-22T07:51:00.001-07:002017-09-22T07:51:34.984-07:00PIAKAPAuthentication and Key Agreement Protocol in 4GPrivate Identification, Authentication and Key Agreement Protocol with Security Mode Setup, Farshid Farhat, Somayeh Salimi, Ahmad Salahi.AbstractIdentification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and efficient Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-32652418641908396442017-08-23T09:19:00.001-07:002017-08-23T09:19:28.259-07:00Bid Data AnalyticsAdvanced_Identity_Management_System_in_4-1emc0qt BRP_final-zoyyb5 Enhanced-Public-Key-Encryption-Algorithm-for-Security-of-Network-1fx6bcq Patent-1juoapk 829-2424-1-PB-291udlo 1705.08464-1tbevxv 1705.09073-2bike8d 108262-267778-1-PB-23ehcaw 07175726-2c3bror 07943366-1cqh172 p55-shi-pcen16 Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-55817634628694916452017-08-17T08:04:00.001-07:002017-08-17T08:04:14.260-07:00Penn State SitesSmart Cropping, Aesthetic Scoring, Image Retrieval and Deep Learning, Big Data Computing, Portrait Photography, Computer Vision and Pattern Recognition, Distributed and Parallel frameworks, NetworkingBig Data ComputingImage Retrieval and Deep LearningDeep Learning at Penn StateSmart Cropping, Aesthetic ScoringComputer Vision and Pattern RecognitionDistributed and Parallel Systems, Network Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-18384590862517313182017-08-10T14:30:00.001-07:002017-08-10T14:30:01.507-07:00Professional Photography using Deep LearningABSTRACT: Retrieving photography ideas corresponding to a given location facilitates the usage of smart cameras, where there is a high interest among amateurs and enthusiasts to take astonishing photos at anytime and in any location. Existing research captures some aesthetic techniques such as the rule of thirds, triangle, and perspective-ness, and retrieves useful feedbacks based on one Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-32924392722650506302017-07-30T09:24:00.001-07:002017-07-30T09:24:16.087-07:00A Public Key Encryption Algorithm for Network SecurityEnhanced Public Key Encryption Algorithm for Security of Network Abstract -- Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet,security became a major concern and the history of security allows a better understanding of the emergence of security technology. The internetstructure itself allowed for many securityUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-28577751386297962622017-07-15T09:21:00.001-07:002017-07-15T09:21:19.546-07:00Mirzakhani, MaryamMaryam Mirzakhani was first women to win Fields Medal in math also professor at Stanford university.RIP #MaryamMirzakhaniin Farshid Farhat 's Twitter Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-35195450824755302642017-07-10T10:09:00.001-07:002017-07-10T10:09:03.636-07:00Deep Learning at Pennsylvania State UniversityIntegrating Deep-learned Models and Photography Idea RetrievalIntelligent Portrait Composition Assistance (IPCA) – Integrating Deep-learned Models and Photography Idea Retrieval, Farshid Farhat, Mohammad Kamani, Sahil Mishra, James Wang, ACM Multimedia 2017, Mountain View, CA, USA.ABSTRACT: Retrieving photography ideas corresponding to a given location facilitates the usage of smart cameras, Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-20726312150358988232017-06-28T08:57:00.001-07:002017-06-28T08:57:19.415-07:00Risk of attack coefficient effect on availability
Academic Endeavors at Pennsylvania State University
Leveraging big visual data to predict severe weather conditions
Discovering Triangles in Portraits for Supporting Photographic Creation
Skeleton Matching with Applications in Severe Weather Detection
Detecting Dominant Vanishing Points in Natural Scenes with Application to Composition-Sensitive Image Retrieval
Shape matching using skeleton Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-59045967427827393172016-08-25T14:44:00.001-07:002016-08-25T14:44:14.588-07:00Diman Zad Tootaghaj 's publications
Diman Zad Tootaghaj 's publications
1.D. Z. Tootaghaj, F. Farhat. Optimal placement of Cores, Caches and Memory controllers in NoC. arXiv, 2016. [link] [pdf]
2.F. Farhat, D. Z. Tootaghaj, M. Arjomand. Towards optimizing data computing in the cloud. arXiv, 2016. [link] [pdf]
3. F. Farhat, D. Z. Tootaghaj, Y. He, A. Sivasubramaniam, M. T. Kandemir, C. R. Das. Stochastic Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-47103308731618773492016-08-25T13:38:00.001-07:002016-08-25T13:38:48.304-07:00Towards Stochastically Optimizing Data Computing Flows
Towards Stochastically Optimizing Data Computing Flows
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-47292122054069224692016-08-25T13:34:00.001-07:002016-08-25T13:34:21.520-07:00Optimal Placement of Cores Caches and MemoryControllers in NoC
Optimal Placement of Cores, Caches and MemoryControllers in NoC
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-85285013774961509782014-11-07T13:03:00.001-08:002014-11-07T13:03:24.885-08:00Bad children and a box of beverage bottles! Bad children and a box of beverage bottles! D. and F. provided one beverage box with 32 bottles for the weekend party, but one of their four children changed the content of one of the bottles that cannot be detected easily! To punish the children, they decided to permute the bottles and ask the children to find it again until two days later! Unfortunately if one drinks from THAT bottleUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-4871160995827079392014-11-07T12:37:00.001-08:002014-11-07T12:37:18.193-08:00Bad children and a box of beverage! Bad children and a box of beverage! D. and F. provided one beverage box with 32 bottles for the weekend party, but one of their four children changed the content of one of the bottles that cannot be detected easily! To punish the children, they decided to permute the bottles and ask the children to find it again until two days later! Unfortunately if one drinks from THAT bottle, he/sheUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-40543142380986662112014-09-06T10:04:00.001-07:002014-09-06T10:04:37.613-07:00Farshid Farhat LinkedinUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-14576490320704953972013-04-23T17:33:00.000-07:002013-04-21T18:04:39.710-07:00Cultural Diversity in IRANUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-35035312658628955912013-04-21T17:57:00.001-07:002013-04-21T17:57:22.374-07:00History of IRAN (3200 BCE - 2013 CE)Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-62081736554364220052013-02-11T20:41:00.001-08:002013-02-11T20:41:55.782-08:00Farshid Farhat (fuf111 at cse psu edu)Farshid Farhat @ Computer Science and Engineering Dep. of Pennsylvania State UniversityFarshid Farhat CSEFarshid Farhat PSU Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-20655040548134447172012-11-26T19:35:00.001-08:002012-11-26T19:35:45.347-08:00Capitalism is based on water-filling algorithm!Capitalism is based on water-filling algorithm! Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5248924187886686270.post-15824567300284998462012-11-11T20:29:00.000-08:002012-11-11T20:29:21.016-08:00Delicious Iranian Foods
Delicious Iranian Foods
Unknownnoreply@blogger.com0