Loading...
Search for: moinzadeh--p
0.099 seconds

    Detecting threats in star graphs

    , Article IEEE Transactions on Parallel and Distributed Systems ; Volume 20, Issue 4 , 2009 , Pages 474-483 ; 10459219 (ISSN) Imani, N ; Sarbazi-Azad, H ; Zomaya, A.Y ; Moinzadeh, P ; Sharif University of Technology
    2009
    Abstract
    In this paper, we consider the problem of searching a network for intruders. We propose a strategy for capturing the intruder in the popular interconnection topology, the star network. According to the proposed strategy, a team of collaborative software agents are responsible for capturing a hostile intruder (e.g. a virus). These agents asynchronously move along the network links and the intruder has the capability of escaping arbitrarily fast. © 2009 IEEE  

    Chromatic sets of power graphs and their application to resource placement in multicomputer networks

    , Article Computers and Mathematics with Applications ; Volume 58, Issue 3 , 2009 , Pages 403-413 ; 08981221 (ISSN) Imani, N ; Sarbazi Azad, H ; Akl, S. G ; Moinzadeh, P ; Sharif University of Technology
    2009
    Abstract
    In this paper, using the chromatic properties of power graphs we propose a new approach for placing resources in symmetric networks. Our novel placement scheme guarantees a perfect placement when such a solution is feasible in the topology, while in general it answers the question of k-resource placement at a distance d where each non-resource node is able to access k resource nodes within at most d hops away. We define a quasi-perfect graph as a graph whose clique number and chromatic number are equal. We derive important properties of quasi-perfect graphs and use them to find a solution for the resource placement problem. We have also applied the proposed method to find a distant resource... 

    Resource placement in the edge product of graphs

    , Article 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, Gino-wan, Okinawa, 25 March 2008 through 28 March 2008 ; 2008 , Pages 212-218 ; 1550445X (ISSN) ; 0769530958 (ISBN); 9780769530956 (ISBN) Moinzadeh, P ; Sarbazi Azad, H ; Sharif University of Technology
    2008
    Abstract
    In a large system, it is neither economical nor efficient to equip each node with a copy of the resource, and it is desirable to distribute the copies of the resource so that certain performance measure is obtained. In this paper we consider the problem of distributing resources in the edge product of networks. The algorithms presented in this paper make use of the known placements for the basic graphs composing the product graph. Therefore, in these placements we avoid the additional costs needed for deploying and rescaling the network. © 2008 IEEE  

    Resource placement in cube-connected cycles

    , Article Proceedings of the International Symposium on Parallel Architectures, Algorithms and Networks, I-SPAN, 7 May 2008 through 9 May 2008, Sydney, NSW ; 2008 , Pages 83-89 ; 9780769531250 (ISBN) Moinzadeh, P ; Sarbazi Azad, H ; Yazdani, N ; Sharif University of Technology
    2008
    Abstract
    In large systems, economical and efficiency concerns restrict the allocation of each resource to every node in the network. Therefore, it is desirable to distribute copies of resource in order to share them and achieve a certain performance measure. In this paper, we consider the problem of distributing resources in Cube-Connected Cycles. Both adjacency and distant placements are considered in this paper. In adjacency placements, dominating sets and perfect dominating sets are used. The proposed algorithms for distant placements use known placements for basic hypercube graphs. Therefore, in these placements we avoid the additional costs needed for deploying the network. We prove that the... 

    Secrecy capacity scaling in large cooperative wireless networks

    , Article IEEE Transactions on Information Theory ; Volume 63, Issue 3 , 2017 , Pages 1923-1939 ; 00189448 (ISSN) Mirmohseni, M ; Papadimitratos, P. P ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    We investigate large wireless networks subject to security constraints. In contrast to point-to-point, interferencelimited communications considered in prior works, we propose active cooperative relaying-based schemes. We consider a network with nl legitimate nodes, ne eavesdroppers, and path loss exponent α ≥ 2. As long as n2e (log(ne))γ = o(nl ), for some positive γ , we show that one can obtain unbounded secure aggregate rate. This means zero-cost secure communication, given fixed total power constraint for the entire network. We achieve this result through: 1) the source using Wyner randomized encoder and a serial (multi-stage) block Markov scheme, to cooperate with the relays and 2) the... 

    Fast estimation of connectivity in fractured reservoirs using percolation theory

    , Article SPE Journal ; Volume 12, Issue 2 , 2007 , Pages 167-178 ; 1086055X (ISSN) Masihi, M ; King, P. R ; Nuratza, P ; Sharif University of Technology
    Society of Petroleum Engineers (SPE)  2007
    Abstract
    Investigating the impact of geological uncertainty (i.e., spatial distribution of fractures) on reservoir performance may aid management decisions. The conventional approach to address this is to build a number of possible reservoir models, upscale them, and then run flow simulations. The problem with this approach is that it is computationally very expensive. In this study, we use another approach based on the permeability contrasts that control the flow, called percolation approach. This assumes that the permeability disorder of a rock can be simplified to either permeable or impermeable. The advantage is that by using some universal laws from percolation theory, the effect of the complex... 

    A new decoding scheme for errorless codes for overloaded CDMA with active user detection

    , Article 2011 18th International Conference on Telecommunications, ICT 2011, Ayia Napa, 8 May 2011 through 11 May 2011 ; 2011 , Pages 201-205 ; 9781457700248 (ISBN) Mousavi, A ; Pad, P ; Delgosha, P ; Marvasti, F ; Sharif University of Technology
    2011
    Abstract
    Recently, a new class of binary codes for overloaded CDMA systems are proposed that not only has the ability of errorless communication but also suitable for detecting active users. These codes are called COWDA. In [1], a Maximum Likelihood (ML) decoder is proposed for this class of codes. Although the proposed scheme for coding/decoding shows impressive performance, the decoder can be significantly improved. In this paper, by assuming practical conditions for the traffic in the system, we suggest and prove an algorithm that increases the performance of the decoder several orders of magnitude (the Bit-Error-Rate (BER) is divided by a factor of about 400 in some E b/N0's). The algorithm... 

    Estimation of the Effective Permeability of Heterogeneous Porous Media by Using Percolation Concepts

    , Article Transport in Porous Media ; Volume 114, Issue 1 , 2016 , Pages 169-199 ; 01693913 (ISSN) Masihi, M ; Gago, P. A ; King, P. R ; Sharif University of Technology
    Springer Netherlands  2016
    Abstract
    In this paper we present new methods to estimate the effective permeability (keff) of heterogeneous porous media with a wide distribution of permeabilities and various underlying structures, using percolation concepts. We first set a threshold permeability (kth) on the permeability density function and use standard algorithms from percolation theory to check whether the high permeable grid blocks (i.e., those with permeability higher than kth) with occupied fraction of “p” first forms a cluster connecting two opposite sides of the system in the direction of the flow (high permeability flow pathway). Then we estimate the effective permeability of the heterogeneous porous media in different... 

    Percolation-based effective permeability estimation in real heterogeneous porous media

    , Article 15th European Conference on the Mathematics of Oil Recovery, 29 August 2016 through 1 September 2016 ; 2016 ; 9462821933 (ISBN); 9789462821934 (ISBN) Masihi, M ; Gago, P ; King, P ; DCSE; Schlumberger; Shell ; Sharif University of Technology
    European Association of Geoscientists and Engineers  2016
    Abstract
    It has long been understood that flow behavior in heterogeneous porous media is largely controlled by the continuity of permeability contrasts. With this in mind, we are looking in new methods for a fast estimation of the effective permeability which concentrates on the properties of the percolating cluster. From percolation concepts we use a threshold permeability value (Kth) by which the gridblocks with the highest permeability values connect two opposite side of the system in the direction of the flow. Those methods can be applied to heterogeneous media of a range of permeabilities distribution and various underlying structures. We use power law relations and weighted power averages that... 

    Optimization of sputtering parameters for the deposition of low resistivity indium tin oxide thin films

    , Article Acta Metallurgica Sinica (English Letters) ; Vol. 27, issue. 2 , Apr , 2014 , p. 324-330 Yasrebi, N ; Bagheri, B ; Yazdanfar, P ; Rashidian, B ; Sasanpour, P ; Sharif University of Technology
    2014
    Abstract
    Indium tin oxide (ITO) thin films have been deposited using RF sputtering technique at different pressures, RF powers, and substrate temperatures. Variations in surface morphology, optical properties, and film resistances were measured and analyzed. It is shown that a very low value of sheet resistance (1.96 ω/sq.) can be achieved with suitable arrangement of the deposition experiments. First, at constant RF power, deposition at different pressure values is done, and the condition for achieving minimum sheet resistance (26.43 ω/sq.) is found. In the next step, different values of RF powers are tried, while keeping the pressure fixed on the previously found minimum point (1-2 Pa). Finally,... 

    Comparative assessment of gasification based coal power plants with various CO2 capture technologies producing electricity and hydrogen

    , Article Energy and Fuels ; Volume 28, Issue 2 , 20 February , 2014 , Pages 1028-1040 ; ISSN: 08870624 Mukherjee, S ; Kumar, P ; Hosseini, A ; Yang, A ; Fennell, P ; Sharif University of Technology
    2014
    Abstract
    Seven different types of gasification-based coal conversion processes for producing mainly electricity and in some cases hydrogen (H2), with and without carbon dioxide (CO2) capture, were compared on a consistent basis through simulation studies. The flowsheet for each process was developed in a chemical process simulation tool "Aspen Plus". The pressure swing adsorption (PSA), physical absorption (Selexol), and chemical looping combustion (CLC) technologies were separately analyzed for processes with CO2 capture. The performances of the above three capture technologies were compared with respect to energetic and exergetic efficiencies, and the level of CO2 emission. The effect of air... 

    Synthesis of nanosize single-crystal hydroxyapatite via mechanochemical method

    , Article Materials Letters ; Volume 63, Issue 5 , 2009 , Pages 543-546 ; 0167577X (ISSN) Nasiri Tabrizi, B ; Honarmandi, P ; Ebrahimi Kahrizsangi, R ; Honarmandi, P ; Sharif University of Technology
    2009
    Abstract
    Single-crystal hydroxyapatite (HAp) nanorods and nanogranules have been synthesized successfully by a mechanochemical process using two distinct experimental procedures. The experimental outcomes are characterized by transmission electron microscopy (TEM), and powder X-ray diffraction (XRD) techniques. In this work, the feasibility of using polymeric milling media to prepare hydroxyapatite nanoparticles is described. The resulting hydroxyapatite powder exhibits an average size of about 20 to 23 nm. Final results indicate that the proposed synthesis strategy provides a facile pathway to obtain single-crystal HAp with high quality and suitable morphology. © 2008 Elsevier B.V. All rights... 

    Migrating to Cloud-Native architectures using microservices: An experience report

    , Article Workshops on CLIoT, WAS4FI, SeaClouds, CloudWay, IDEA, FedCloudNet 2015 held in conjunction with European Conference on Service-Oriented and Cloud Computing, ESOCC 2015, 15 September 2015 through 17 September 2015 ; Volume 567 , 2016 , Pages 201-215 ; 18650929 (ISSN); 9783319333120 (ISBN) Balalaie, A ; Heydarnoori, A ; Jamshidi, P ; Celesti A ; Leitner P ; Sharif University of Technology
    Springer Verlag  2016
    Abstract
    Migration to the cloud has been a popular topic in industry and academia in recent years. Despite many benefits that the cloud presents, such as high availability and scalability, most of the on-premise application architectures are not ready to fully exploit the benefits of this environment, and adapting them to this environment is a non-trivial task. Microservices have appeared recently as novel architectural styles that are native to the cloud. These cloud-native architectures can facilitate migrating on-premise architectures to fully benefit from the cloud environments because non-functional attributes, like scalability, are inherent in this style. The existing approaches on cloud... 

    Study the effect of connectivity between two wells on secondary recovery efficiency using percolation approach

    , Article 15th European Conference on the Mathematics of Oil Recovery, ECMOR 2016, 29 August 2016 through 1 September 2016 ; 2016 ; 9462821933 (ISBN); 9789462821934 (ISBN) Sadeghnejad, S ; Masihi, M ; King, P. R ; Gago, P. A ; Sharif University of Technology
    European Association of Geoscientists and Engineers, EAGE  2016
    Abstract
    Estimating available hydrocarbon to be produced during secondary oil recovery is an ongoing activity in field development. The primary plan is normally scheduled during early stage of field's life through master development plan studies. During this period, due to the lake of certain data, estimation of the field efficiency is usually based on rules of thumb and not detailed field characterization. Hence, there is a great motivation to produce simpler physically-based methodologies. The minimum necessity inputs of percolation approach make it a useful tool for foration performance prediction. This approach enables us to attain a better assessment of the efficiency of secondary recovery... 

    Modeling of CO2-brine interfacial tension: Application to enhanced oil recovery

    , Article Petroleum Science and Technology ; Volume 35, Issue 23 , 2017 , Pages 2179-2186 ; 10916466 (ISSN) Madani, M ; Abbasi, P ; Baghban, A ; Zargar, G ; Abbasi, P ; Sharif University of Technology
    2017
    Abstract
    Development of reliable and accurate models to estimate carbon dioxide–brine interfacial tension (IFT) is necessary, since its experimental measurement is time-consuming and requires expensive experimental apparatus as well as complicated interpretation procedure. In the current study, feed forward artificial neural network is used for estimation of CO2–brine IFT based on data from published literature which consists of a number of carbon dioxide–brine interfacial tension data covering broad ranges of temperature, total salinity, mole fractions of impure components and pressure. Trial-and-error method is utilized to optimize the artificial neural network topology in order to enhance its... 

    Improved advection algorithm of computational modeling of free surface flow using structured grids

    , Article Computer Methods in Applied Mechanics and Engineering ; Volume 195, Issue 7-8 , 2006 , Pages 775-795 ; 00457825 (ISSN) Babaei, R ; Abdollahi, J ; Homayonifar, P ; Varahram, N ; Davami, P ; Sharif University of Technology
    2006
    Abstract
    In the present study a finite difference method has been developed to model the transient fluid flow and heat transfer. A single fluid has been selected for modeling of mold filling and The SOLA-VOF 3D technique was modified to increase the accuracy of simulation of filling phenomena for shape castings. The model was then evaluated with the experimental methods. Refereeing to the experimental and simulation results a good consistency and the accuracy of the suggested model are confirmed. © 2005 Published by Elsevier B.V  

    Modelling of air pressure effects in casting moulds

    , Article Modelling and Simulation in Materials Science and Engineering ; Volume 13, Issue 6 , 2005 , Pages 903-917 ; 09650393 (ISSN) Attar, E ; Homayonifar, P ; Babaei, R ; Asgari, K ; Davami, P ; Sharif University of Technology
    2005
    Abstract
    In the casting process, as a mould is filled with molten metal, air escapes through the vents. Air pressure in the mould cavity has serious effects upon the filling behaviour such as surface profile of the molten metal and filling time. In this project a computational model was developed for calculation of air pressure during the mould filling. A 3D single phase code based on the SOLA-VOF algorithm was used for the prediction of the fluid flow. The ideal gas assumption, conservation of mass equation and Bernoulli law were used for the calculation of air pressure. A new algorithm was developed to interpolate air pressure on the surface cells. The creation of air pressure was correlated with... 

    Random data and key generation evaluation of some commercial tokens and smart cards

    , Article 2014 11th International ISC Conference on Information Security and Cryptology, ISCISC 2014 ; 2014 , p. 49-54 Boorghany, A ; Sarmadi, S. B ; Yousefi, P ; Gorji, P ; Jalili, R ; Sharif University of Technology
    2014
    Abstract
    In this paper, we report our evaluation of the strength of random number generator and RSA key-pair generator of some commercially available constrained hardware modules, i.e., tokens and smart cards. That was motivated after recent related attacks to RSA public keys, which are generated by constrained network devices and smart cards, and turned out to be insecure due to low-quality randomness. Those attacks are mostly computing pair-wise GCD between the moduli in public keys, and resulted in breaking several thousands of these keys. Our results show that most of the tested hardware modules behave well. However, some have abnormal or weak random generators which seem to be unsuitable for... 

    Stability and size-dependency of temperature-related Cauchy-Born hypothesis

    , Article Computational Materials Science ; Volume 50, Issue 5 , March , 2011 , Pages 1731-1743 ; 09270256 (ISSN) Khoei, A. R ; Ghahremani, P ; Abdolhosseini Qomi, M. J ; Banihashemi, P ; Sharif University of Technology
    2011
    Abstract
    In continuum mechanics, the constitutive models are usually based on the Cauchy-Born (CB) hypothesis which seeks the intrinsic characteristics of the material via the atomistic information and it is valid in small deformation. The main purpose of this paper is to investigate the temperature effect on the stability and size-dependency of Cauchy-Born hypothesis. Three-dimensional temperature-related Cauchy-Born formulations are developed for crystalline structure and the stability and size-dependency of temperature-related Cauchy-Born hypothesis are investigated by means of direct comparison between atomistic and continuous mediums. In order to control the temperature effect, the Nose-Hoover... 

    A simplified model for the flow inside cascade impactor

    , Article ASME International Mechanical Engineering Congress and Exposition, Proceedings (IMECE) ; Volume 7 A , November , 2013 ; 9780791856314 (ISBN) Mehr, S. M. N ; Sohrabi, S ; Falsafi, P ; Gorji, P ; ASME ; Sharif University of Technology
    American Society of Mechanical Engineers (ASME)  2013
    Abstract
    In this paper we developed a new mathematical model for the flow inside cascade impactors and via this simplified model, we determined the particle size distribution by a fast and low cost computational method. Using cascade impactors for determining the particle size distribution, one can use comprehensive CFD methods to fully simulate the particle traces. Although the results from those CFD analyses can be very accurate, usually that is not a time and cost efficient routine. In contrast, we showed that by using our proposed calculation we can estimate the particle size distribution very fast and yet with the slight error -comparing to the results from CFD method. Cascade impactors are...