Loading...
Search for: source-modeling
0.006 seconds

    Analysis of the various elements of heat sources in silicon carbide polymers (6H-SiC and 3C-SiC) semiconductor laser

    , Article Asian Journal of Chemistry ; Volume 24, Issue 5 , 2012 , Pages 2333-2335 ; 09707077 (ISSN) Marjani, S ; Faez, R ; Marjani, H ; Sharif University of Technology
    2012
    Abstract
    In the present paper, we investigated the various elements of heat sources within a silicon carbide polymers (6H-SiC and 3C-SiC) semiconductor laser. The device employs 3C-SiC quantum well (QW) which is sandwiched between two layers of 6H-SiC as cladding regions that can be interpreted in terms of a type-II heterostructure character and a built-in electric field due to the pyroelectricity of 6H using a numerical simulator. The basic design goal was the study of the various elements of heat sources, including the Joule heat power, the Peltier-Thomson heat power and the recombination heat power  

    Secure channel simulation

    , Article 2012 IEEE Information Theory Workshop, ITW 2012 ; 2012 , Pages 406-410 ; 9781467302234 (ISBN) Gohari, A ; Yassaee, M. H ; Aref, M. R ; Sharif University of Technology
    2012
    Abstract
    In this paper the Output Statistics of Random Binning (OSRB) framework is used to prove a new inner bound for the problem of secure channel simulation. Our results subsume some recent results on the secure function computation. We also provide an achievability result for the problem of simultaneously simulating a channel and creating a shared secret key. A special case of this result generalizes the lower bound of Gohari and Anantharam on the source model to include constraints on the rates of the public discussion  

    A recursive estimator of worst-case burstiness

    , Article IEEE/ACM Transactions on Networking ; Volume 9, Issue 2 , 2001 , Pages 211-222 ; 10636692 (ISSN) Valaee, S ; Sharif University of Technology
    2001
    Abstract
    The leaky-bucket regulator has several potential roles in the operation of future transport networks; among them, the bounding of possible source trajectories in implementations of worst-case approaches to network design. It seems plausible that there will be applications whose specific traffic characteristics are known a priori neither to the user nor to the network; in such cases, a recursive algorithm for setting the leaky-bucket parameters may prove useful. We devise such an algorithm here. The leaky-bucket parameters are computed recursively over a limited period of observation of the source behavior. We provide an explicit characterization of the dynamics of the estimator, and the... 

    A new secret key agreement scheme in a four-terminal network

    , Article 12th Canadian Workshop on Information Theory, CWIT 2011, 17 May 2011 through 20 May 2011 ; May , 2011 , Pages 151-154 ; 9781457707438 (ISBN) Babaheidarian, P ; Salimi, S ; Aref, M. R ; IEEE; Canadian Society of Information Theory (CSIT); UBC; Faculty of Applied Science; RIM ; Sharif University of Technology
    2011
    Abstract
    A new scenario for simultaneously generating a secret key and two private keys among three Terminals in the presence of an external eavesdropper is considered. Terminals 1, 2 and 3 intend to share a common secret key concealed from the external eavesdropper (Terminal 4) and simultaneously, each of Terminals 1 and 2 intends to share a private key with Terminal 3 while keeping it concealed from each other and from Terminal 4. All four Terminals observe i.i.d. outputs of correlated sources and there is a public channel from Terminal 3 to Terminals 1 and 2. An inner bound of the secret key-private keys capacity region is derived and the single letter capacity regions are obtained for some... 

    Comments on 'Information-Theoretic Key Agreement of Multiple Terminals - Part I'

    , Article IEEE Transactions on Information Theory ; Volume 63, Issue 8 , 2017 , Pages 5440-5442 ; 00189448 (ISSN) Gohari, A ; Anantharam, V ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    Theorem 5 of A. Gohari, V. Anantharam, IEEE Transactions on Information Theory, vol. 56, no. 8, pp. 3973-3996, 2010, states an upper bound on the secrecy capacity for the source model problem. It has a three page proof given in Appendix B of the paper. Unfortunately, we show that this bound does not provide any improvement over the simpler bound given in Corollary 1 of the paper. We also provide an example of a family of two agent source model problems where the one-way secrecy rate in each direction is zero, but the secrecy rate is nonzero and can be determined exactly as a conditional mutual information. © 1963-2012 IEEE  

    Analysis of Key Agreement in Secure Networks from the View of Information Theory

    , M.Sc. Thesis Sharif University of Technology Babaheidarian, Parisa (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    In this thesis the problem of simultaneously generating multiple keys among multiple terminals is investigated. After providing a survey on the related works and exploiting the problem of sharing a common secret key and a private key among three terminals, we introduce a new source model which we call it the Four-Terminal model. We consider the problem of generating three kinds of keys among legitimate terminals and investigate the problem under two different scenarios, Backward and Forward scenarios, which depend on the kind of restrictions imposed on the usage of the public channel. We derive an achievable region for the backward scenario, using the combination of superposition coding and... 

    A comprehensive procedure for characterizing arbitrary azimuthally symmetric photon beams

    , Article Physica Medica ; Vol. 30, Issue. 2 , 2014 , Pages 191-201 ; ISSN: 11201797 Ezzati, A. O ; Sohrabpour, M ; Mahdavi, S. R ; Buzurovic, I ; Studenski, M. T ; Sharif University of Technology
    Abstract
    Purpose: A new Monte Carlo (MC) source model (SM) has been developed for azimuthally symmetric photon beams. Methods: The MC simulation tallied phase space file (PSF) is divided into two categories depending on the relationship of the particle track line to the beam central axis: multiple point source (MPS) and spatial mesh based surface source (SMBSS). To validate this SM, MCNPX2.6 was used to generate two PSFs for a 6MV photon beam from a Varian 2100C/D linear accelerator. Results: PDDs and profiles were calculated using the SM and original PSF for different field sizes from 5×5 to 40×40cm2. Agreement was within 2% of the maximum dose at 100cm SSD and 2.5% of the maximum dose at 200cm SSD... 

    From source model to quantum key distillation: An improved upper bound

    , Article IWCIT 2014 - Iran Workshop on Communication and Information Theory ; 2014 Keykhosravi, K ; Mahzoon, M ; Gohari, A ; Aref, M.R ; Sharif University of Technology
    Abstract
    In this paper we derive a new upper bound on the quantum key distillation capacity. This upper bound is an extension of the classical bound of Gohari and Anantharam on the source model problem. Our bound strictly improves the quantum extension of reduced intrinsic information bound of Christandl et al. Although this bound is proposed for quantum settings, it also serves as an upper bound for the special case of classical source model, and may improve the bound of Gohari and Anantharam. The problem of quantum key distillation is one in which two distant parties, Alice and Bob, and an adversary, Eve, have access to copies of quantum systems A, B, E respectively, prepared jointly according to... 

    UHF propagation prediction in smooth homogenous earth using split-step fourier algorithm

    , Article Progress in Electromagnetics Research Symposium, 27 March 2012 through 30 March 2012 ; March , 2012 , Pages 685-689 ; 15599450 (ISSN) ; 9781934142202 (ISBN) Hosseini, S. R ; Shirazi, R. S ; Kiaee, A ; Pahlavan, P ; Sharifi Sorkherizi, M ; Sharif University of Technology
    2012
    Abstract
    The electromagnetic wave propagation prediction in smooth homogenous earth is studied. This estimation employs Fourier Split-Step algorithm. The process of how parabolic equation and Fourier Split Step algorithm achieved, is investigated. Error resulted from this approximation is studied. Source modeling is analyzed. Simulations based on this method are illustrated on different values of frequency, range and antenna height  

    Simultaneously generating multiple keys in a four-terminal network

    , Article IET Information Security ; Volume 6, Issue 3 , 2012 , Pages 190-201 ; 17518709 (ISSN) Babaheidarian, P ; Salimi, S ; Aref, M. R ; Sharif University of Technology
    IET  2012
    Abstract
    A source model including four terminals is considered, where three simultaneously generating three types of keys are intended. Terminals 1, 2 and 3 wish to share a common key, the secret key, which should be kept secret from terminal 4 and simultaneously terminals 1 and 2 intend to share a private key with terminal 3, which should be kept secret from each other. Also, all the keys should be concealed from terminal 4 (the external wiretapper). The authors assume that all terminals including the external wiretapper have access to distinct correlated i.i.d. sources; there is also a noiseless public channel with unlimited capacity among the terminals. The authors have investigated the model on... 

    Rate regions of secret key sharing in a new source model

    , Article IET Communications ; Volume 5, Issue 4 , March , 2011 , Pages 443-455 ; 17518628 (ISSN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    A source model for secret key generation between terminals is considered. Two users, namely users 1 and 2, at one side communicate with another user, namely user 3, while at the other side via a public channel where three users can observe i.i.d. outputs of correlated sources. Each of users 1 and 2 intends to share a secret key with user 3 where user 1 acts as a wiretapper for user 2 and vice versa. In this model, two situations are considered: communication from users 1 and 2 to user 3 (the forward key strategy) and from user 3 to users 1 and 2 (the backward key strategy). In both situations, the goal is sharing a secret key between user 1 and user 3 while leaking no effective information... 

    New techniques for localization based information theoretic secret key agreement

    , Article 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, 6 September 2017 through 7 September 2017 ; 2018 , Pages 70-76 ; 9781538665602 (ISBN) Kazempour, N ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Abstract
    We consider a source model for information theoretic secret key agreement based on the distance among the nodes, in a basic system consisting of two legitimate users and an eavesdropper. The legitimate nodes try to agree on a reliable and secure key based on their noisy observation of distance between them. We propose two methods to enhance system utility: 1) Artificial Noise Forwarding (ANF), 2) transmission in different beam directions (multi-antenna transmission). In the first method artificial noise is used to worsen e a vesdropper's distance estimation and in the second method beacon signals are sent in different directions and the virtual distances in different beam directions are used... 

    Secret key sharing in a new source model: Rate regions

    , Article 2010 Australian Communications Theory Workshop, AusCTW 2010, Canberra, ACT, 3 February 2010 through 5 February 2010 ; 2010 , Pages 117-122 ; 9781424454334 (ISBN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; ANU - The Australian National University; ACoRN - ARC Communications Research Network; NICTA; UniSA; CSIRO ; Sharif University of Technology
    2010
    Abstract
    A source model for secret key generation between terminals is considered. Two users, namely users 1 and 2, at one side communicate with another user, namely user 3, at the other side via public channels where three users can observe i.i.d outputs of correlated sources. Each of users 1 and 2 intends to share a secret key with user 3 where user 1 acts as a wiretapper for user 2 and vice versa. In this model, two situations are considered: communication from users 1 and 2 to user 3 (forward key strategy) and from user 3 to users 1 and 2 (backward key strategy). This model is motivated by wireless communications when considering user 3 as a base station and users 1 and 2 as network users. In... 

    Optimization of multilateral well trajectories using pattern search and genetic algorithms

    , Article Results in Engineering ; Volume 16 , 2022 ; 25901230 (ISSN) Ghadami, S ; Biglarian, H ; Beyrami, H ; Salimi, M ; Sharif University of Technology
    Elsevier B.V  2022
    Abstract
    Multilateral well is a promising technology in developing oil reservoirs. Because this technology may increase the production rate per well and reduce the costs of field development, it is rapidly replacing the old methods. This study uses a three-dimensional line-source model with direct search methods, including pattern search and genetic algorithms to optimize the well trajectories. This method was applied to several cases, with different forms of wells and reservoirs. In all cases, significant improvement was observed in the production rate. Furthermore, the production enhancement using the optimized well trajectories which have curved-paths is compared to the case with linear well... 

    Exact Simulation of Varian Clinac 2100C/D with Use of Phase Space file and Representation of Appropriate Source Model for Clinical Applications

    , Ph.D. Dissertation Sharif University of Technology Ezzati, Ahadollah (Author) ; Sohrabpour, Mostafa (Supervisor) ; Rabi Mahdavi, Saeed (Co-Advisor)
    Abstract
    MC Simulation is considered to be one of the most accurate methods for transport of radiation in various media. Computational speed is the limiting factor to apply the MC method in clinical settings. One of the methods to increase the speed in MC simulations is the use of phase space file (PSF). PSF is generated by transporting the particles through the linear accelerator head. The characteristics of these particles crossing a reference plane are stored in the PSF file. The PSF can be used in subsequent simulations as a radiation source. The use of PSF is effective but has a drawback of having latent variance. Latent variance is a problem inherent in using phase space files. Latent variance... 

    Studying the Effect of Using Zeotropic Refrigerant Mixtures on the Performance of the Vertical Ground Coupled Heat Pump

    , M.Sc. Thesis Sharif University of Technology Moghanni, Reza (Author) ; Hakkaki Fard, Ali (Supervisor) ; Kazemzadeh Hannani, Siamak (Supervisor)
    Abstract
    Vertical ground-coupled heat pumps due to using a renewable energy stored in the ground and being away from ambient temperature fluctuations have a good coefficient of performance and very low pollution. Despite these advantages, these systems have not gained a pervasive position in the field of heating/cooling systems due to their high initial cost. Despite these advantages, these systems have not gained a pervasive position among communities due to their high initial cost. In the present project, a comprehensive study has been conducted to investigate the effect of using zeotropic refrigerant mixtures on the performance of vertical ground-coupled heat pumps and reducing its initial costs.... 

    Experimental and numerical investigation of fixture time on distortion of welded part

    , Article International Journal of Advanced Manufacturing Technology ; Volume 104, Issue 1-4 , 2019 , Pages 1121-1131 ; 02683768 (ISSN) Gharib, A. R ; Biglari, F. R ; Shafaie, M ; Kokabi, A. H ; Sharif University of Technology
    Springer London  2019
    Abstract
    In this paper, the effect of clamping time on welding distortion is studied. The welding process has been done in austenitic stainless steel 304L butt-welded joint by TIG welding method. The numerical thermo-mechanical analysis is performed using commercial finite element software ABAQUS. The welding simulation is performed using the birth and death of elements technique. The heat source model that used in this study is the Goldak double-ellipsoidal model. At last, for verifying numerical results, a set of experimental tests have been carried out and welding distortion has been measured. The experimental measured data are compared with numerical (FEM) results. The results showed that the... 

    Estimation of stress drop for some large shallow earthquakes using stochastic point source and finite fault modeling

    , Article Scientia Iranica ; Volume 17, Issue 3 A , JUNE , 2010 , Pages 217-235 ; 10263098 (ISSN) Moghaddam, H ; Fanaie, N ; Motazedian, D ; Sharif University of Technology
    2010
    Abstract
    Using stochastic point source and finite fault modeling, the stochastic stress drop is estimated for 52 large shallow earthquakes listed in the 'Pacific Earthquake Engineering Research Center (PEER) Next Generation Attenuation of Ground Motions (NGA)' database. The Pseudo Spectral Acceleration (PSA) of 541 accelerograms, recorded at National Earthquake Hazards Reduction Program (NEHRP) C-class sites from 52 earthquakes are simulated and compared with the PSA listed in the PEER NGA database. The magnitude of the analyzed earthquakes ranged from M4:4 to M7:6. The stress drop is calibrated by trial and error and based on the analysis of residuals where the residual is defined as the log of the...