Loading...
Search for: hemmat-yar--ali-mohammad-afshin
0.122 seconds

    Distributed Publisher-Subscriber Pattern for Content-Based Routing in Software Defined Networks

    , M.Sc. Thesis Sharif University of Technology Aghili, Shahrooz (Author) ; Hemmat Yar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Content-based routing, as provided by publisher/subscriber systems,has evolved as a key paradigm for interactions between loosely coupled application components (content publishers and subscribers). Content-based routing aims to increase the efficiency of forwarding by utilizing the diversity of information exchanged between application components. Using content-based forwarding rules (also called content filters) installed on content-based routers (also termed brokers), bandwidth-efficiency is increased by only forwarding content to the subset of subscribers who are actually interested in the published content. Many middle-ware implementations for content-based publish/subscribe have been... 

    Optimal Method in Cognitive Radio Networks Routing

    , M.Sc. Thesis Sharif University of Technology Kazemi, Mohsen (Author) ; Hemmat Yar, Afshin (Supervisor)
    Abstract
    Cognitive radio (CR) technology is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum opportunistically. CR networks, however, impose unique challenges due to the high fluctuation in the available spectrum as well as diverse quality-of-service (QoS) requirements. Specifically, in cognitive radio ad hoc networks (CRAHNs), the distributed multi-hop architecture, the dynamic network topology, and the time and location varying spectrum availability are some of the key distinguishing factors. In this literature, we propose a new routing algorithm that tries to... 

    Evaluation of Granularity of Reconfigurable Architectures for Wireless Communication Applications

    , M.Sc. Thesis Sharif University of Technology Nazarieh, Masoumeh (Author) ; Hemmat yar, Afshin (Supervisor)
    Abstract
    Wireless communication applications need high computing power, flexibility and scalability. Although ASICs have the ability of high computing power but they are not flexible to changing or completing of communication protocols. On the other hand, general purpose microprocessors or DSPs are flexible, but do not provide sufficient computing power. Thus devices with reconfigurable architecture have been proposed as a compromise between ASICs and microperocessors. One of the main features of reconfigurable devices is the granularity. The granularity of a reconfigurable devices shows the amount of computing power incorporate in a processing element. In this thesis we have evaluated different... 

    Network Security using Host-controller Application Codesign in SDN

    , M.Sc. Thesis Sharif University of Technology Tajzad, Mohammad Reza (Author) ; Afshin Hematyar, Ali Mohammad (Supervisor)
    Abstract
    Software Defined Networks provide programmability and centralized control for network’s administrator. Like other networks, security problems are important in these networks, but there is not enough research in this area. The problem being discussed here is to elevate the security level in software defined networks using centralized control and programmability of these networks. We will accomplish this purpose by using hosts and controller at the same time to prevent unwanted traffic from entering the network. By using this approach, we will be able to remove many short comings of these networks and implement security systems, like intrusion detection systems, more efficient. One of these... 

    Reduction of Energy Consumption in Wireless Sensor Networks Using Genetic Algorithm

    , M.Sc. Thesis Sharif University of Technology Karimi, Mojtaba (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Reducing energy consumption is one of the challenges facing wireless sensor networks with many solutions introduced for them with each having advantages and disadvantages. Some of the solutions introduced are based on using movable sinks. In this project, we attempt at proposing a place for the establishment of sinks using genetic algorithm that can reduce energy consumption in the net knots and increase the net life. This work should be done after reviewing the results of past researches and introduced methods. We will analyze the practicality of the proposed model using simulation and will show their advantages over the previous mentioned methods  

    Improving Securiry in VANETs

    , M.Sc. Thesis Sharif University of Technology Rezaei, Fatemeh (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    The Vehicular Ad hoc Network (VANET) have been presented to enhance the safety and comfort of driver and passengers. Thus, the functionality of VANET is related to the accuracy of disseminated messages about surrounding environment. Therefore, it is critical to detect the true reports among false reports which they have been reported by malicious nodes. However, in this research, the proposed scheme presents a centralized trust management assessment scheme named Detection of Best Report (DBR) in vehicular ad hoc environments. Each received message is evaluated individually according to its reporter interactions during event reporting. Based on this evaluation in RSU, the most reliable nodes... 

    Analysis and Modeling of RFID Positioning Accuracy

    , M.Sc. Thesis Sharif University of Technology Fami, Foroutan (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Indoor Positioning Systems (IPS) are commonly used in context-aware environments in order to determine the location of any desired object. In such environments location awareness is a key to adequate response. There are several positioning technologies available such as beacon-based positioning, camera-based positioning, Wi-Fi positioning, etc. Among these positioning systems Radio Frequency Identification (RFID) positioning has significant advantages over other technologies. Flexibility, ease of implementation, cost and accuracy are key advantages for RFID positioning technology. RFID positioning systems are classified in three categories: RF signal analysis-based, active RFID and passive... 

    Network Monitoring in Software Defined Networks

    , M.Sc. Thesis Sharif University of Technology Mahmoudi, Hamid (Author) ; Hematyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Network management includes a wide range of topics such as performance, security, monitoring, debugging and so on. The network monitoring plays a vital role and can cover a wide range of network management requirements. Monitoring is the only way to know the correct network performance in accordance with the network design. In order to understand what is happening on the network and how network performance over time, the network should have a reporting system. Today, the reporting is done using network monitoring tools. In traditional networks, network monitoring is done using additional hardware which imposes high costs, complexity and also additional traffic overheads to the network. But... 

    Energy Optimization in Roadside Unit in Vehicular Ad-hoc Networks

    , M.Sc. Thesis Sharif University of Technology Rashidi, Zahra (Author) ; Afshin Hemmatyar, Ali Mohammad (Supervisor)
    Abstract
    Optimization of energy consumption is generally important in mobile networks and in particular in automotive networks. One of the challenges of installing roadside units in automotive case networks is to provide energy to the equipment assigned to these units. In some cases, power is easily available, but in many places, the cost of energy is very high and does not have economic justification. Therefore, optimization of energy consumption in roadside unit is of great importance. Typically, vehicles limitations in terms of energy consumption for communications are far lower than that of a roadside unit. In this dissertation, part of roadside communication to vehicles is shifted to the... 

    Routing Off-chain Payments in Payment Channel Networks

    , M.Sc. Thesis Sharif University of Technology Dadjuy, Hadi (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    In 2008, a decentralized and distributed payment solution called Bitcoin was born. Since then, it has made the payment industry think about banks and companies on the one hand and government authorities on the other. By using mathematics and cryptography, Bitcoin was able to eliminate the need for trust and in this way it was able to eliminate intermediaries such as banks. In traditional financial affairs such as banks, the user must trust the bank and everything relies on the bank’s servers. While Bitcoin stores the history of transactions in a public and distributed ledger. This ledger is encrypted so that the state of the blockchain is always reliable. In Bitcoin’s decentralized and... 

    Energy Management in Smart Manufacturing Based on AI Methods

    , M.Sc. Thesis Sharif University of Technology Moshiri, Abdollah (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Focusing on developing the EEPS (Energy Electric and Power System) based on the SG (Smart Grid) infrastructure to achieve implementation of EI (Energy Internet) ultimately, in order to analyze and manage the energy/power consumption, requires a robust embedded EMS (Energy Management System) to implement real-time LF (Load Forecasting), prevent the power waste and realize consumption management which eventually leads toward the smart industries/buildings. STLF (Short Term Load Forecasting) is an essential component that an industrial plant requires to manage the power, regarding the load fluctuations during production, and compulsory requirement of cost mitigation. This thesis, in order to... 

    Enabling Open Rmote to Use Fog and Edge Computing

    , M.Sc. Thesis Sharif University of Technology Farahmand, Navid (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    The main idea of the upcoming research is to provide a way of benefiting from processing at the edge and processing in the fog for the open source platform openremote; In such a way that the central core of the platform can offload its processing tasks to the edge of the network. With this work, a large amount of the processes that used to be done by the core will be offloaded from the core. On the other hand, by applying processes at the edge of the network, it becomes possible to eliminate a large amount of overhead caused by raw data transmission, and as a result, the productivity of the network increases. In the current research, in addition to designing a model to add the mentioned... 

    Improving Privacy in IoV Using Fog Computing

    , M.Sc. Thesis Sharif University of Technology Yavari, Morteza (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Along with the emergence of the smart city concept and the increasing demand for a wide range of vehicles, the Internet of Vehicles (IoV) has attracted a lot of attention by providing numerous benefits including vehicle accident warning, reducing pollution levels and traffic congestion, as well as entertainment services. Furthermore, IoV offers various services combining Vehicular ad hoc networks (VANETs) and IoT in smart cities. However, these types of networks are exposed to a variety of security and privacy risks due to the wireless nature, because the sensitive message is transmitted through an insecure channel in the IoV-based smart city environment, therefore, it is necessary to... 

    Neighbor Discovery in Smartphone-Based Opportunistic Networks

    , M.Sc. Thesis Sharif University of Technology Hosseini, Mohammad Reza (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    In opportunistic networks, the nodes have ad-hoc communications that are formed directly between them, without any infrastructure, and not by any using any other intermediate node. In case that the destination node is not in the same region as the source during the sending of a message, the source will send the message to one or a few of its neighbors so that they can store and carry out the message to the original destination in cooperation known as Store-Carry-Forward Mechanism. Remarkably, in most cases, the devices involving in this type of network, e.g., smartphones, have limited source of energy or they use a battery, there is a need to minimize the energy consumption in the nodes.... 

    Futuristic Greedy Algorithm on some NP-complete Problems

    , Ph.D. Dissertation Sharif University of Technology Bakht Hemmat, Ali (Author) ; Izadi, Mohammad (Supervisor)
    Abstract
    Many problems in the field of 0-1 integer programming are NP-Complete. Execution time for exact solving these problems is very high due to many constraints and decision variables. Hence, scientists use Fast algorithms, for example, the Greedy algorithms, in the approximated solution of these problems.A classic greedy approach may not search the whole solution space for better choices. However, other methods with a greedy approach, such as meta heuristic and hyper heuristic, in addition to local search, consider the more search space. These methods search randomly, so it does not provide a good guarantee for finding the proper solutions. Finding suitable solutions in this category of... 

    Developing BIM Vision and BIM Strategic Plan for Municipalities

    , M.Sc. Thesis Sharif University of Technology Hemmat, Mohammad Amin (Author) ; Alvanchi, Amin (Supervisor)
    Abstract
    The municipality is an administrative, public and non-state institution that falls into the city district of the most countries’ administrative divisions. This institution has relatively autonomy and independent power. Municipalities are trying to apply the best approaches (Such as Building Information Modeling (BIM) as a procedure contributing the project management) to save time and money, as well as to satisfy the citizens in the implementation of civil projects. This study examines and evaluates the readiness of municipalities to modify the construction projects based on BIM. In addition, a pattern for identifying BIM applications, evaluating the organization readiness and the needs of... 

    Mobility Pattern Recognition in Mobile Ad-Hoc Networks

    , M.Sc. Thesis Sharif University of Technology Khaledi, Mojgan (Author) ; Afshin Hemmatyar, Ali Mohammad (Supervisor)
    Abstract
    Mobility is one of the most challenging issues in mobile Ad-Hoc networks which has a significant impact on performance of network protocols. To cope with this issue, the protocol designers should be able to analyze the movement of mobile nodes in a particular wireless network. In this thesis, a new framework called Mobility Analyzer has been proposed. At first, Mobility Analyzer categorizes mobility models based on their mobility characteristics; subsequently, it uses mobility metrics for evaluating mobility traces which are collected by GPS or generated by mobility simulators. Finally, Mobility Analyzer recognizes the mobility model of mobility traces based on mobility metrics and measures... 

    Improvement of Resource Management Algorithms in Cognitive Radio Networks

    , M.Sc. Thesis Sharif University of Technology Ramezani, Yosef (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Recent researches show inefficient use of frequency spectrum such that there is shortage of frequency in operation. In order to overcome this problem cognitive radio are introduced that opportunist usage of frequency band is their prominent characteristic. Problems and challenges caused by using these networks are wide and increasing. In this thesis we focus on improving resource management algorithms in cognitive radio. In this study in order to have a dynamic and efficient management in choosing reliable and quality channels, reinforcement learning algorithms are used based upon existing data and experiences. Since this tool has the learning capability and analysis in dynamic situation of... 

    Energy-Efficient Reliable Data Aggregation in Wireless Sensor Neworks

    , M.Sc. Thesis Sharif University of Technology Ashouri, Majid (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Data aggregation is an efficient method to conserve energy by reducing packet transmissions in Wireless Sensor Networks. However, providing end-to-end data reliability is a major challenge when the network uses data aggregation. In this case a packet loss can miss a complete subtree of values, so greatly affect final results. Data transmission in multiple paths can tolerate this problem, but it may incur some computational error for duplicate-sensitive aggregates when aggregating individual sensor values multiple times. In this thesis, we have proposed a reliable data Aggregation protocol which uses the available path redundancy to deliver a correct aggregate result to the sink with a high... 

    Congestion Control in VANETs

    , M.Sc. Thesis Sharif University of Technology Zarazvand, Farid (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Vehicular Ad hoc Network (VANET) is a subclass of Mobile Ad hoc Network (MANET), which provides us ability to communicate between moving vehicles. VANET has been developed as a standard means of communication for Intelligent Transport Systems (ITS) to improve traffic safety and efficiency while providing internet access on the move. Congestion control is a challenging subject in VANETs primarily due to the shared nature of the wireless channel and frequent changes of the network topology. Inefficient congestion control causes periodical safety messages to be lost and introduces latency in threat modelling at the application layer. There are two methods to overcome this problem. First, based...