Loading...
Search for: dousti--s
0.087 seconds

    An efficient statistical zero-knowledge authentication protocol for smart cards

    , Article International Journal of Computer Mathematics ; Volume 93, Issue 3 , 2016 , Pages 453-481 ; 00207160 (ISSN) Dousti, M.S ; Jalili, R ; Sharif University of Technology
    Taylor and Francis Ltd  2016
    Abstract
    We construct an efficient statistical zero-knowledge authentication protocol for smart cards based on general assumptions. We show how it can be instantiated using lattice-based primitives, which are conjectured to be secure against quantum attacks. We illustrate the practicality of our protocol on smart cards in terms of storage, computation, communication, and round complexities. Furthermore, we compare it to other lattice-based authentication protocols, which are either zero-knowledge or have a similar structure. The comparison shows that our protocol improves the best previous protocol in several aspects  

    In-plane and transverse eigenmodes of high-speed rotating composite disks

    , Article Journal of Applied Mechanics, Transactions ASME ; Volume 80, Issue 1 , 2013 ; 00218936 (ISSN) Dousti, S ; Abbas Jalali, M ; Sharif University of Technology
    2013
    Abstract
    We apply Hamilton's principle and model the coupled in-plane and transverse vibrations of high-speed spinning disks, which are fiber-reinforced circumferentially. We search for eigenmodes in the linear regime using a collocation scheme, and compare the mode shapes of composite and isotropic disks. As the azimuthal wavenumber varies, the radial nodes of in-plane waves are remarkably displaced in isotropic disks while they resist such displacements in composite disks. The reverse of this phenomenon happens for transversal waves and the radial nodes move toward the outer disk edge as the azimuthal wavenumber is increased in composite disks. This result is in accordance with the predictions of... 

    Forsakes: A forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes

    , Article Advances in Mathematics of Communications ; Volume 9, Issue 4 , November , 2015 , Pages 471-514 ; 19305346 (ISSN) Dousti, M. S ; Jalili, R ; Sharif University of Technology
    American Institute of Mathematical Sciences  2015
    Abstract
    This paper suggests a model and a definition for forward-secure authenticated key exchange (AKE) protocols, which can be satisfied without depending on the Diffie–Hellman assumption. The basic idea is to use keyevolving schemes (KES), where the long-term keys of the system get updated regularly and irreversibly. Protocols conforming to our model can be highly efficient, since they do not require the resource-intensive modular exponentiations of the Diffie–Hellman protocol. We also introduce a protocol, called FORSAKES, and prove rigorously that it is a forward-secure AKE protocol in our model. FORSAKES is a very efficient protocol, and can be implemented by merely using hash functions  

    Minimal assumptions to achieve privacy in e-voting protocols

    , Article 2013 10th International ISC Conference on Information Security and Cryptology, ISCISC 2013 ; 29- 30 August , 2013 Haghighat, A. T ; Kargar, M. A ; Dousti, M. S ; Jalili, R ; Sharif University of Technology
    IEEE Computer Society  2013
    Abstract
    Chevallier-Mames et al, proved that in a specific condition (such as the lack of untappable channels and trusted-third parties), the universal verifiability and privacy-preserving properties of e-voting protocols are incompatible (WOTE'06 and TTE'10). In this paper, we first show a flaw in their proof. Then, we prove that even with more assumptions, such as the existence of TTPs and untappable channels between the authorities, an e-voting protocol is unable to preserve privacy, regardless of verifiability. Finally, we demonstrate that preserving privacy in e-voting protocols requires the provision of at least one of the following assumptions: limited computational power of adversary,... 

    Conceptual Analysis and Extension of Zero-Knowledge Models & Definitions

    , Ph.D. Dissertation Sharif University of Technology Dousti, Mohammad Sadeq (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Zero-knowledge proofs are one of the most useful constructions of modern cryptography. Their invention has greatly affected both cryptography and complexity theories. The seemingly paradoxical characteristic of zero-knowledge proofs is that they convince the verifier of the validity of the proposition being proved, yet they yield to further knowledge to him. Two primary applications of zero-knowledge proofs are authentication protocols, as well as sub-protocols which prove that parties involved in some main protocol have acted honestly. In this research, we will survey the models and definitions of zero-knowledge, and analyze their relationship. We then pertain to the interplay between... 

    The relationship between an EFL teacher's gender and students' willingness to communicate

    , Article International Journal of Communication and Linguistic Studies ; Volume 10, Issue 4 , 2013 , Pages 17-29 ; 23277882 (ISSN) Khosravizadeh, P ; Pakzadian, S. S
    Common Ground Publishing  2013
    Abstract
    Learning a foreign language encompasses a process of trial and error that can lead to the progression of the learner's interlanguage, meaning that the learners make use of their language knowledge that receives feedback and brings about progress through diagnosis of the problems and being corrected by the teacher. Therefore, there exists a need to analyze the underlying reasons causing the students to remain taciturn with a low willingness to communicate (WTC) during a language class. There has been much work done investigating the role of the learner's stable personal characteristics (traits) along with their situational changes at a specific time (states) that influence the student's... 

    An automated simple algorithm for realistic pore network extraction from micro-tomography images

    , Article Journal of Petroleum Science and Engineering ; Vol. 123, issue , 2014 , pp. 164-171 ; ISSN: 09204105 Rabbani, A ; Jamshidi, S ; Salehi, S
    2014
    Abstract
    Using 3-D scanned data to analyze and extract pore network plays a vital role in investigation of porous media's characteristics. In this paper, a new simple method is developed to detect pores and throats for analyzing the connectivity and permeability of the network. This automated method utilizes some of the common and well-known image processing functions which are widely accessible by researchers and this has led to an easy algorithm implementation. In this method, after polishing and quality control of images, using city-block distance function and watershed segmentation algorithm, pores and throats are detected and 3-D network is produced. This method can also be applied on 2-D images... 

    Discrimination of heart arrhythmias using novel features in heart rate phase space

    , Article Computing in Cardiology ; Volume 40 , Sept , 2013 , Pages 1035-1038 ; 23258861 (ISSN); 9781479908844 (ISBN) Moharreri, S ; Rezaei, S ; Salavatian, S
    2013
    Abstract
    In this paper, we try to recognize and distinguish different groups of arrhythmia using novel features which have been obtained from the heart rate's phase space in recent years. For this purpose, we used Triangular Phase Space Mapping (TPSM) and Parabolic Phase Space Mapping (PPSM). For recognition, we used three groups of 15 subjects using the Physionet database (Arrhythmia, Congestive Heart Failure (CHF), and Atrial Fibrillation (AF)) with Normal Sinus Rhythm (NSR). The obtained features discriminate arrhythmia from NSR by p

    An intelligent hybrid classification algorithm integrating fuzzy rule-based extraction and harmony search optimization: Medical diagnosis applications

    , Article Knowledge-Based Systems ; Volume 220 , 2021 ; 09507051 (ISSN) Mousavi, S. M ; Abdullah, S ; Akhavan Niaki, S. T ; Banihashemi, S ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    Uncertainty is a critical factor in medical datasets needed to be overcome for increasing diagnosis efficiency. This paper proposes an intelligent classification algorithm comprising a fuzzy rule-based approach, a harmony search (HS) algorithm, and a heuristic algorithm to classify medical datasets intelligently. Two fuzzy approaches, as well as orthogonal and triangular fuzzy sets, are first utilized to define the attributes of data. Then, an HS algorithm is integrated with a heuristic to generate fuzzy rules to select the best rules in the fuzzy rule-based systems. Moreover, to improve the performance of the proposed classification approach, a three-phase parameter tuning approach is... 

    Performance evaluation of shared hosting security methods

    , Article Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications ; 2012 , Pages 1310-1315 ; 9780769547459 (ISBN) Mirheidari, S. A ; Arshad, S ; Khoshkdahan, S ; Sharif University of Technology
    2012
    Abstract
    Shared hosting is a kind of web hosting in which multiple websites reside on one webserver. It is cost-effective and makes the administration easier for websites' owners. However, shared hosting has some performance and security issues. In default shared hosting configuration, all websites' scripts are executed under the webserver's user account regardless of their owners. Therefore, a website is able to access other websites' resources. This security problem arises from lack of proper isolation between different websites hosted on the same webserver. In this survey, we have examined different methods for handling mentioned security issue. Also we evaluated the performance of mentioned... 

    The behaviour of an artificially cemented sandy gravel

    , Article Geotechnical and Geological Engineering ; Volume 23, Issue 5 , 2005 , Pages 537-560 ; 09603182 (ISSN) Haeri, S. M ; Hosseini, S. M ; Toll, D. G ; Yasrebi, S. S ; Sharif University of Technology
    2005
    Abstract
    The major section of the city of Tehran, Iran has been developed on cemented coarse-grained alluvium. This deposit consists of gravely sand to sandy gravel with some cobbles and is dominantly cemented by carbonaceous materials. In order to understand the mechanical behaviour of this soil, a series of undrained triaxial compression tests and unconfined compression tests were performed on uncemented and artificially cemented samples. Portland cement type I was used as the cementation agent for preparing artificially cemented samples. Uncemented samples and lightly cemented samples (1.5% cement) tested at high confining pressure showed contractive behaviour accompanied with positive excess pore... 

    An imperialist competitive algorithm approach for multi-objective optimization of direct coupling photovoltaic-electrolyzer systems

    , Article International Journal of Hydrogen Energy ; Vol. 39, Issue 33 , 11 November , 2014 , pp. 18743-18757 ; ISSN: 03603199 Maroufmashat, A ; Sayedin, F ; Khavas, S. S
    2014
    Abstract
    In the context of sustainable clean hydrogen production pathways, photovoltaic-electrolyzer systems are one of the most promising alternatives for acquiring hydrogen from renewable energy sources. In fact, determining the optimal set of design and operating variables are always a key issue while coupling directly renewable electricity sources to PEM electrolyzers. Few previous studies have attempted to find the optimal size and operational condition of directly coupled photovoltaic-electrolyzer (PV/El) systems in order to maximize the hydrogen production or to minimize energy transfer loss between photovoltaic devices and the electrolyzer. Nevertheless an easy and efficient approach still... 

    Kalman filter based packet loss replacement in presence of additive noise

    , Article 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering: Vision for a Greener Future, CCECE 2012 ; 2012 ; 9781467314336 (ISBN) Miralavi, S. R ; Ghorshi, S ; Tahaei, A
    2012
    Abstract
    A major problem in real-time packet-based communication systems, is misrouted or delayed packets which results in degraded perceived voice quality. If packets are not available on time, the packets are considered as lost. The easiest solution in a network terminal receiver is to replace silence for the duration of lost speech segments. In a high quality communication system, to avoid degradation in speech quality due to packet loss, a suitable method or algorithm is needed to replace the missing segments of speech. In this paper, we introduce an adaptive filter for replacement of lost speech segment. In this method Kalman filter as a state-space based method will be used to predict the... 

    Investigation of Mesh Sensitivity Influence to Determine Crack Characteristic by Finite Element Methods

    , Article Journal of Failure Analysis and Prevention ; Volume 16, Issue 3 , 2016 , Pages 506-512 ; 15477029 (ISSN) Azimi, M ; Mirjavadi, S. S ; Asli, S. A ; Sharif University of Technology
    Springer New York LLC  2016
    Abstract
    In this research, an extended finite element model has been investigated. Investigation of opening and closure stress always has been one of the difficult parameters to analysis of results; therefore, the utilization of finite element methods would be a good and logical alternative for this purpose. In addition, linear elastic fracture criteria are used for validation of numerical results from the simulation. In this work, a detailed analysis of the influence of different parameters in the results of a specific specimen with a semi-elliptical tooling groove in terms of closure and opening stress is presented, and the impact of optimum element size in fracture characteristic in various load... 

    Investigation of the effect of nanosilica on rheological, thermal, mechanical, structural, and piezoelectric properties of poly(vinylidene fluoride) nanofibers fabricated using an electrospinning technique

    , Article Industrial and Engineering Chemistry Research ; Volume 56, Issue 44 , 2017 , Pages 12596-12607 ; 08885885 (ISSN) Haddadi, S. A ; Ahmad Ramazani, S. A ; Talebi, S ; Fattahpour, S ; Hasany, M ; Sharif University of Technology
    2017
    Abstract
    The effects of different nano-SiO2 contents on the rheological properties of poly(vinylidene fluoride) (PVDF) solution and mechanical, thermal, structural, and piezoelectric properties of composite nanofibers were investigated. Results showed an increase in fiber diameter (∼125 to 350 nm) and ∼450% increase in tensile strength as the content of nano-SiO2 particles increased. The degree of crystallinity decreased by 19% as the nano-SiO2 content increased by 2% (w/w). Further investigation demonstrated that silica could significantly improve the piezoelectric properties of PVDF nanofibers as the output voltage showed an increase in the presence of silica attributed to change in the crystalline... 

    A method for real-time safe navigation in noisy environments

    , Article 2013 18th International Conference on Methods and Models in Automation and Robotics, MMAR 2013, Miedzyzdroje ; 2013 , Pages 329-333 ; 9781467355063 (ISBN) Neyshabouri, S. A. S ; Kamali, E ; Niknezhad, M. R ; Monfared, S. S. M. S ; Sharif University of Technology
    2013
    Abstract
    The challenge of finding an optimized and reliable path dates back to emersion of mobile robots. Several approaches have been developed that have partially answered this need. Satisfying results in previous implementations has led to an increased utilization of sampling-based motion planning algorithms in recent years, especially in high degrees of freedom (DOF), fast evolving environments. Another advantage of these algorithms is their probabilistic completeness that guarantees delivery of a path in sufficient time, if one exists. On the other hand, sampling based motion planners leave no comment on safety of the planned path. This paper suggests biasing the Rapidly-exploring Random Trees... 

    A generalization of the swartz equality

    , Article Glasgow Mathematical Journal ; Vol. 56, issue. 2 , May , 2014 , pp. 381-386 ; ISSN: 00170895 Pournaki, M. R ; Fakhari, S. A. S ; Yassemi, S ; Sharif University of Technology
    2014
    Abstract
    For a given (d-1)-dimensional simplicial complex Γ, we denote its h-vector by h(Γ)=(h 0(Γ),h 1(Γ),...,hd (Γ)) and set h -1(Γ)=0. The known Swartz equality implies that if Δ is a (d-1)-dimensional Buchsbaum simplicial complex over a field, then for every 0 ≤ i ≤ d, the inequality ihi (Δ)+(d-i+1)h i-1(Δ) ≥ 0 holds true. In this paper, by using these inequalities, we give a simple proof for a result of Terai (N. Terai, On h-vectors of Buchsbaum Stanley-Reisner rings, Hokkaido Math. J. 25(1) (1996), 137-148) on the h-vectors of Buchsbaum simplicial complexes. We then generalize the Swartz equality (E. Swartz, Lower bounds for h-vectors of k-CM, independence, and broken circuit complexes, SIAM J.... 

    Hardware-in-the-loop optimization of an active vibration controller in a flexible beam structure using evolutionary algorithms

    , Article Journal of Intelligent Material Systems and Structures ; Vol. 25, issue. 10 , 2014 , p. 1211-1223 Nobahari, H ; Hosseini Kordkheili, S. A ; Afshari, S. S ; Sharif University of Technology
    2014
    Abstract
    In this study, active vibration control of a cantilevered flexible beam structure equipped with bonded piezoelectric sensor/actuators is investigated. The linear quadratic regulator technique together with an observer is adopted to design the controller as well as to provide the full-state feedback. Two different approaches are subsequently used for simultaneously integrated optimization of the controller and observer parameters. In the first approach, a linear experimental model of the system is obtained using identification techniques, and the optimization is then performed based on a computer simulation of the system. However, in the second approach, a hardware-in-the-loop optimization... 

    An efficient inference in meanfield approximation by adaptive manifold filtering: (Machine learning & data mining)

    , Article Proceedings of the 4th International Conference on Computer and Knowledge Engineering, ICCKE 2014 ; 2014 , p. 581-585 Nasab, S. E ; Ramezanpur, S ; Kasaei, S ; Sanaei, E ; Sharif University of Technology
    2014
    Abstract
    A new method for speeding up the approximate maximum posterior marginal (MPM) inference in meanfield approximation of a fully connected graph is introduced. Weight of graph edges is measured by mixture of Gaussian kernels. This fully connected graph is used for segmentation of image data. The bottleneck of the inference in meanfield approximation is where the similar bilateral filtering is needed for updating the marginal in the message passing step. To speed up the inference, the adaptive manifold high dimensional Gaussian filter is used. As its time complexity is 0(ND), it leads to accelerating the marginal update in the message passing step. Its time complexity is linear and relative to... 

    Dominating coloring number of claw-free graphs

    , Article Electronic Notes in Discrete Mathematics ; Vol. 45, issue , January , 2014 , pp. 91-97 ; ISSN: 15710653 Abdolghafurian, A ; Akbari, S ; Hossein Ghorban, S ; Qajar, S ; Sharif University of Technology
    2014
    Abstract
    Let G be a graph. It is well-known that G contains a proper vertex-coloring with χ(G) colors with the property that at least one color class of the coloring is a dominating set in G. Among all such proper vertex-coloring of the vertices of G, a coloring with the maximum number of color classes that are dominating sets in G is called a dominating-χ-coloring of G. The number of color classes that are dominating sets in a dominating-χ-coloring of G is defined to be the dominating-χ-color number of G and is denoted by dχ(G). In this paper, we prove that if G is a claw-free graph with minimum degree at least two, then dχ(G)≥2