tag:blogger.com,1999:blog-76944032024-03-14T03:23:08.751-04:00THE DAWN OF THE DARKNESSNever Give Up Until VictoryCoolTeenhttp://www.blogger.com/profile/12994213757758024834noreply@blogger.comBlogger522125tag:blogger.com,1999:blog-7694403.post-33822269813885749152017-11-17T09:29:00.001-05:002017-11-21T10:02:22.118-05:00Your Facebook fundraiser refund receipt
Hi xxx,
We wanted to let you know that your donation of $xx.xx to the fundraiser Raise to support the victims of earthquake in Iran was refunded and will be deposited into PayPal xxx@xxx.xxx. Please note that it may take your bank a few business days to deposit this payment into your account.
We're providing this refund to you as a security measure. To raise money for a nonprofit on Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-36228867184156260152017-11-09T11:18:00.000-05:002017-11-14T11:10:40.252-05:00Latest research done by November 2017
CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment
Behavioral Analog Topology Synthesizer
Optical CDMA Network Simulator (OCNS)
Extended Authentication and Key Agreement Protocol
Secure Multipath Adaptive Routing Protocol
Authentication and Key Agreement Protocol in 4G
Risk of attack coefficient effect on availability of adhoc networks
Game-theoretic model to Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-35489539708227003832017-10-20T11:17:00.001-04:002017-10-20T11:17:25.402-04:00UICC-based secure communication
System and methods for UICC-based secure communication US 9461993 B2System and methods for uicc-based secure communication US 20150222631 A1ABSTRACTA system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-86689910760061290822017-08-14T11:26:00.001-04:002017-08-14T11:26:28.358-04:00Your iCloud storage is almost full.
Apple recently sends the following emails to make us upgrade! As you see in my screenshot I have nothing to backup, but my iPhone fills the space with something!!! It is very strange and weird that Apple wants to make us backup on the only option (5GB small space!).
Dear ... ...,
Your iCloud storage is almost full. You have 5 MB remaining of 5 GB total storage.
Upgrade to 50 GB for $0.99 per Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-36428771689214272042017-07-30T13:39:00.001-04:002017-07-30T13:39:33.108-04:00Smart Aesthetic Scoring for Better Photography
Image Aesthetics Scoring Engine
The developed engine gets the image and outputs a score showing the amount of the beauty inside the image! The code is working on Android/iOS platform,
The engine speed is about 100-200 ms which makes it suitable for a real-time engine. The core exploits GPU to compute aesthetic features from the image, and estimate the aesthetic score.
Android,&Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-82407561526057769742017-07-15T12:17:00.002-04:002017-07-15T12:20:35.789-04:00Mirzakhani, Maryam: The only women who won Fields Medal in math
Maryam Mirzakhani was first women to win maths' Fields Medal also a mother and professor at Stanford university. She would be in our mind forever.
RIP
#MaryamMirzakhani
in Farshid Farhat 's Twitter
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-74219726588653105242017-07-10T12:18:00.000-04:002017-07-10T12:19:24.977-04:00Deep Learning in Penn State
Integrating Deep-learned Models and Photography Idea Retrieval
Intelligent Portrait Composition Assistance (IPCA) – Integrating Deep-learned Models and Photography Idea Retrieval, Farshid Farhat, Mohammad Kamani, Sahil Mishra, James Wang, ACM Multimedia 2017, Mountain View, CA, USA.
ABSTRACT: Retrieving photography ideas corresponding to a given location facilitates the usage of Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-84097381074907174462017-06-28T17:51:00.000-04:002017-06-28T17:51:03.915-04:00A SPAM like wordpress
How WORDPRESS treats customers:
Hello,> I cannot verify the breach as I don't have access to the content.> But it is OK to empty the blog content and give me the permission.Upon further review, the offer to empty your sites no longer stands. You've continued to publish spam content across a large number of sites. As such, all of the blogs owned by your account have been suspended and willUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-35837054739980487442017-06-28T11:20:00.000-04:002017-06-28T11:52:24.873-04:00Networking, Security, Big Data, and Computer Vision Endeavors
Academic Endeavors at Pennsylvania State University
Leveraging big visual data to predict severe weather conditions
Discovering Triangles in Portraits for Supporting Photographic Creation
Skeleton Matching with Applications in Severe Weather Detection
Detecting Dominant Vanishing Points in Natural Scenes with Application to Composition-Sensitive Image Retrieval
Shape matching using skeleton Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-88961101968059447962017-06-28T00:23:00.001-04:002017-06-28T00:26:12.326-04:00FORK-JOIN QUEUE MODELING AND OPTIMAL SCHEDULING IN PARALLEL PROGRAMMING FRAMEWORKS
FORK-JOIN QUEUE MODELING AND OPTIMAL SCHEDULING IN PARALLEL PROGRAMMING FRAMEWORKS
ABSTRACT
MapReduce framework is widely used to parallelize batch jobs since it exploits a high degree of multi-tasking to process them. However, it has been observed that when the number of servers increases, the map phase can take much longer than expected. This thesis analytically shows that the stochastic Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-67485075548441354182017-06-21T22:07:00.002-04:002017-06-28T00:32:07.008-04:00Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup
Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup
Farshid Farhat, Somayeh Salimi, Ahmad Salahi
Abstract
Identification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and efficient bandwidth consumption. In this article we Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-53884533592851941052017-05-30T12:17:00.000-04:002017-06-28T00:29:56.195-04:00Farshid Farhat 's Google map photos
Farshid Farhat
Local Guide · Level 5
Google MAPs Photos
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-19711492791729135682017-05-10T10:14:00.000-04:002017-05-30T12:19:24.633-04:00Queueing theory based modeling and optimal scheduling in Map-Reduce-like Frameworks
FORK-JOIN QUEUE MODELING AND OPTIMAL SCHEDULING IN PARALLEL PROGRAMMING FRAMEWORKS
ABSTRACTMapReduce framework is widely used to parallelize batch jobs since it exploits a high degree of multi-tasking to process them. However, it has been observed that when the number of servers increases, the map phase can take much longer than expected. This thesis analytically shows that the stochastic Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-15001304780173415132017-04-27T11:19:00.000-04:002017-07-17T23:14:43.028-04:00Farshid Farhat 's Site @ PSU
Farshid Farhat 's Site @ PSU
Publications
Detecting Dominant Vanishing Points in Natural Scenes with Application to Composition-Sensitive Image Retrieval, Z Zhou, F Farhat, JZ Wang, IEEE Transactions on Multimedia, 2017. [code][dataset]
Shape matching using skeleton context for automated bow echo detection, MM Kamani, F Farhat, S Wistar, JZ Wang, Big Data (Big Data), 2016 IEEE Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-63637572182938538682017-03-08T16:22:00.000-05:002017-03-08T16:22:04.558-05:00MAX AMINI @ Penn State
ISA is proud to have the popular and super comedian Max Amini here at Penn State again on March 18th. Get your tickets at Max’s website at “www.maxamini.com” before they are sold out!
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-83196645449713071572016-08-25T17:44:00.001-04:002017-06-28T00:39:33.616-04:00Diman Zad Tootaghaj 's publications
1.D.
Z. Tootaghaj, N. Bartolini, H. Khamfroush and T. La Porta
“Controlling Cascading Failures in Interdependent Networks under
Uncertain Knowledge of Damages”. Submitted to SRDS 2017.
2.D.
Z. Tootaghaj, H. Khamfroush, N. Bartolini,
S. Ciavarella, S. Hayes and T. La Porta “Network Recovery from
Massive Failures under Uncertain Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-36085994187683169902016-06-13T12:18:00.000-04:002017-07-20T10:18:33.009-04:00Electrical Engineering PhD, System Communications, Sharif University of Technology
تحليل پنهان سازي تصوير با نرخ درج پايين در حوزه مكان
شماره پایان نامه:45945
کد دانشکده:05
پديدآور:فرحت، فرشيد
عنوان:تحليل پنهان سازي تصوير با نرخ درج پايين در حوزه مكان.
نام دانشگاه/پژوهشگاه:صنعتي شريف
سال اخذ مدرك:1392.
نام دانشکده:مهندسي برق
مقطع:دكتري
گرایش:مخابرات سيستم
توصیف ظاهری:89ص.: جدول، نمودار، كتابنامه؛ چكيده به فارسي و انگليسي
توصیفگر:نهان نگاري تصويرImage Watermarking
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-43395165821287013252016-06-13T12:11:00.000-04:002016-06-13T12:11:33.502-04:00ارتقاء امنيت پروتكل هاي مسيريابي در شبكه هاي اقتضايي (فرشيد فرحت)
ارتقاء امنيت پروتكل هاي مسيريابي در شبكه هاي اقتضايي
فرحت، فرشيد (Farshid Farhat)
شماره پایان نامه:37533
کد دانشکده:05
پديدآور:فرحت، فرشيد.
عنوان:ارتقاء امنيت پروتكل هاي مسيريابي در شبكه هاي اقتضايي.
نام دانشگاه/پژوهشگاه:صنعتي شريف
سال اخذ مدرك:1386
نام دانشکده:مهندسي برق
گرایش:كارشناسي ارشد (مخابرات رمز)
یادداشت:100ص0: جدول، نمودار، كتابنامه؛ چكيده به فارسي و انگليسي
توصیفگر:Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-52383750967320204632016-04-14T10:42:00.000-04:002016-04-14T10:42:07.806-04:00Shahrzad SeriesUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-68870500852695459222016-03-19T10:24:00.001-04:002016-03-19T10:24:12.554-04:00A Journey to IRAN [Musical Mix]
A Journey to IRAN by Iranian Student Association (ISA) at the Pennsylvania State Universityسفری به ایران زمین توسط انجمن دانشجویان ایرانی در دانشگاه ایالتی پنسیلوانیا
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-32429761493086009322016-02-25T14:39:00.001-05:002016-03-04T10:42:40.261-05:00frash fitbit
frash fitbit
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-3168631693802851702015-08-12T19:20:00.003-04:002015-08-12T19:20:19.183-04:00Evaluating the Combined Impact of Datacenter Architecture and Cloud Workload Characteristics on Performance, Network Traffic and Cost
Evaluating the Combined Impact of Datacenter Architecture and Cloud Workload Characteristics on Performance, Network Traffic and CostThe
combined impact of node architecture and workload characteristics on
off-chip network traffic with performance/cost analysis has not been
investigated before in the context of emerging cloud applications.
Motivated by this observation, this paper performs aUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-57961612225616183892015-06-03T19:24:00.000-04:002017-07-18T15:43:34.470-04:00Computer Vision Keywords
2D attacks
2D Face
2D Face Authentication
3D blood flow estimation
3D Face
3D Face Localisation
3D face model
3D face recognition
3D localization
3D Masks
3D model base indexing
3D object recognition
abnormality detection
accelerated exact k-means
Accent Identification
Accented speech
Accentual mismatch
accessible games
acoustic frequency
Acoustic model adaptation
acoustic modeling
Acoustic Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-33673822220315647052015-03-26T11:41:00.000-04:002015-03-26T11:41:02.150-04:00Old Sharif Students
62540818_BS | RUHANI .ARSALAN | RUHAANI@CE.SHARIF.AC.IR <mailto:RUHAANI@CE.SHARIF.AC.IR>65265109_BS | SANOORI .FARIDEH | SANOORIE@CE.SHARIF.AC.IR <mailto:SANOORIE@CE.SHARIF.AC.IR>72104772_BS | SHARIFI ANBARAN .ALI REZA | SHARIFIA@CE.SHARIF.AC.IR <mailto:SHARIFIA@CE.SHARIF.AC.IR>72106718_BS | GHANBARI SIRDANI .FERESHTEH | ANGEL_GH@CE.SHARIF.AC.IR <mailto:ANGEL_GH@Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7694403.post-90255288199522826752015-02-26T03:30:00.000-05:002015-02-26T11:48:04.371-05:00MapReduce: End to End Modeling and Optimization
MapReduce: End to End Modeling and Optimization
MapReduce optimization using regulated dynamic prioritization
Profiling, what-if analysis, and cost-based optimization of MapReduce programs
Towards automatic optimization of MapReduce programs
MapReduce/Bigtable for distributed optimization
MapReduce: simplified data processing on large clusters
Google's MapReduce programming model—Unknownnoreply@blogger.com0