Loading...
Search for: ali--m
0.012 seconds

    A two-layer attack-robust protocol for IoT healthcare security: Two-stage identification-authentication protocol for IoT

    , Article IET Communications ; Volume 15, Issue 19 , 2021 , Pages 2390-2406 ; 17518628 (ISSN) Afsaneh, S ; Sepideh, A ; Ali, M ; Salah, A. M ; Sharif University of Technology
    John Wiley and Sons Inc  2021
    Abstract
    The majority of studies in the field of developing identification and authentication protocols for Internet of Things (IoT) used cryptographic algorithms. Using brain signals is also a relatively new approach in this field. EEG signal-based authentication algorithms typically use feature extraction algorithms that require high processing time. On the other hand, the dynamic nature of the EEG signal makes its use for identification/authentication difficult without relying on feature extraction. This paper presents an EEG-and fingerprint-based two-stage identification-authentication protocol for remote healthcare, which is fast, robust, and multilayer-based. A modified Euclidean distance... 

    A synergistic program between engineering and business schools towards medical technology commercialization

    , Article IEEE TENSYMP 2014 - 2014 IEEE Region 10 Symposium ; 14- 16 April , 2014 , pp. 456-461 ; ISBN: 9781479920280 Zahedi, E ; Gan, K. B ; Chellappan, K ; Ali, M. A. M ; Mustafa, M. M ; Sharif University of Technology
    Abstract
    Governments in developing countries have invested in institutions of higher learning in order to develop homegrown, high technology products. Among these, the National University of Malaysia (Universiti Kebangsaan Malaysia), recognized as a Research University, is actively involved in projects related to medical technology through its various faculties. The net result of these activities is impressing from the point of view of patents and publications, but unfortunately not yet in terms of commercialization. This paper starts by presenting the main obstacles towards the objective of bringing a laboratory prototype to the market in the context of Malaysia. Then, a framework is presented... 

    Experimental feasibility study of estimation of the normalized central blood pressure waveform from radial photoplethysmogram

    , Article Journal of Healthcare Engineering ; Volume 6, Issue 1 , 2015 , Pages 121-144 ; 20402295 (ISSN) Zahedi, E ; Sohani, V ; Mohd. Ali, M. A ; Chellappan, K ; Beng, G. K ; Sharif University of Technology
    Multi-Science Publishing Co. Ltd  2015
    Abstract
    The feasibility of a novel system to reliably estimate the normalized central blood pressure (CBPN) from the radial photoplethysmogram (PPG) is investigated. Right-wrist radial blood pressure and left-wrist PPG were simultaneously recorded in five different days. An industry-standard applanation tonometer was employed for recording radial blood pressure. The CBP waveform was amplitude-normalized to determine CBPN. A total of fifteen second-order autoregressive models with exogenous input were investigated using system identification techniques. Among these 15 models, the model producing the lowest coefficient of variation (CV) of the fitness during the five days was... 

    Optimal capacity management of substation transformers over long-run

    , Article IEEE Transactions on Power Systems ; Volume 31, Issue 1 , 2016 , Pages 632-641 ; 08858950 (ISSN) Humayun, M ; Sousa, B. J. O ; Safdarian, A ; Ali, M ; Degefa, M. Z ; Lehtonen, M ; Fotuhi Firuzabad, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    The management of transformers' capacity is a vital task for planners and asset managers due to their high cost. This paper proposes an optimization model for capacity management of transformers in a substation over long-run. The model considers the present worth costs of investment, losses, maintenance, reliability, and the salvage value of transformers for providing the optimal selection and scheduling of multistage transformer installations and their refurbishments. In the optimization model, growing failure rate of transformers along with their age is incorporated and the cumulative loss-of-life (LOL) of transformers is also used in determining their salvage value. The developed model is... 

    Fast temporal path localization on graphs via multiscale viterbi decoding

    , Article IEEE Transactions on Signal Processing ; Volume 66, Issue 21 , 2018 , Pages 5588-5603 ; 1053587X (ISSN) Yang, Y ; Chen, S ; Maddah Ali, M. A ; Grover, P ; Kar, S ; Kovacevic, J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    We consider a problem of localizing a temporal path signal that evolves over time on a graph. A path signal represents the trajectory of a moving agent on a graph in a series of consecutive time stamps. Through combining dynamic programing and graph partitioning, we propose a path-localization algorithm with significantly reduced computational complexity. To analyze the localization performance, we use two evaluation metrics to quantify the localization error: The Hamming distance and the destination's distance between the ground-truth path and the estimated path. In random geometric graphs, we provide a closed-form expression for the localization error bound, and a tradeoff between... 

    VSPACE: VNF simultaneous placement, admission control and embedding

    , Article IEEE Journal on Selected Areas in Communications ; Volume 36, Issue 3 , 2018 , Pages 542-557 ; 07338716 (ISSN) Tahmasbi Nejad, M. A ; Parsaeefard, S ; Maddah Ali, M. A ; Mahmoodi, T ; Khalaj, B. H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    In future wireless networks, network functions virtualization lays the foundations for establishing a new dynamic resource management framework to efficiently utilize network resources. In this paper, a network service can be viewed as a chain of virtual network functions (VNFs), called a service function chain (SFC), served via placement, admission control (AC), and embedding into network infrastructure, based on the resource management objectives and the state of network. To fully exploit such a potential and reach higher network performance, resource management stages should be jointly performed. To this end, two main challenges are: how to present a system model that formulates the... 

    Controller-switch assignment in 5G networks

    , Article 2nd IEEE 5G World Forum, 5GWF 2019, 30 September 2019 through 2 October 2019 ; 2019 , Pages 40-45 ; 9781728136271 (ISBN) Tohidi, E ; Parsaeefard, S ; Maddah Ali, M. A ; Khalaj, B. H ; Leon Garcia, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    Explosive growth in both quantity and quality of services and the development trends in 5G networks indicates that multiple distributed software defined network (SDN) controllers are of increasing importance from both network performance and reliability perspectives. Although SDN was first considered with a logically centralized controller approach, due to delay, reliability, and scalability challenges, moving towards multiple distributed controllers is inevitable. In the distributed controlling scheme, an assignment that associates a controller to each switch is required. Moreover, the number of required SDN controllers and even their locations have to be determined. In this paper, two... 

    Cloud-Aided interference management with cache-enabled edge nodes and users

    , Article 2019 IEEE International Symposium on Information Theory, ISIT 2019, 7 July 2019 through 12 July 2019 ; Volume 2019-July , 2019 , Pages 737-741 ; 21578095 (ISSN); 9781538692912 (ISBN) Shariatpanahi, S. P ; Zhang, J ; Simeone, O ; Khalaj, B. H ; Maddah Ali, M. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    This paper considers a cloud-RAN architecture with cache-enabled multi-antenna Edge Nodes (ENs) that deliver content to cache-enabled end-users. The ENs are connected to a central server via limited-capacity fronthaul links, and, based on the information received from the central server and the cached contents, they transmit on the shared wireless medium to satisfy users' requests. By leveraging cooperative transmission as enabled by ENs' caches and fronthaul links, as well as multicasting opportunities provided by users' caches, a close-to-optimal caching and delivery scheme is proposed. As a result, the minimum Normalized Delivery Time (NDT), a high-SNR measure of delivery latency, is... 

    Information theory of mixed population genome-wide association studies

    , Article 2018 IEEE Information Theory Workshop, ITW 2018, 25 November 2018 through 29 November 2018 ; 2019 ; 9781538635995 (ISBN) Tahmasebi, B ; Maddah Ali, M. A ; Motahari, S. A ; Sun Yat-Sen University ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    Genome-Wide Association Study (GWAS) addresses the problem of associating subsequences of individuals' genomes to the observable characteristics called phenotypes. In a genome of length G, it is observed that each characteristic is only related to a specific subsequence of it with length L, called the causal subsequence. The objective is to recover the causal subsequence, using a dataset of N individuals' genomes and their observed characteristics. Recently, the problem has been investigated from an information theoretic point of view in [1]. It has been shown that there is a threshold effect for reliable learning of the causal subsequence at Gh ( N L/G ) by characterizing the capacity of... 

    Fundamental limits of distributed encoding

    , Article 2020 IEEE International Symposium on Information Theory, ISIT 2020, 21 July 2020 through 26 July 2020 ; Volume 2020-June , August , 2020 , Pages 798-803 Abadi Khooshemehr, N ; Maddah Ali, M. A ; IEEE Information Theory Society; The Institute of Electrical and Electronics Engineers ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    In general coding theory, we often assume that error is observed in transferring or storing encoded symbols, while the process of encoding itself is error-free. Motivated by recent applications of coding theory, we introduce the problem of distributed encoding which is comprised of a set of K ϵ isolated source nodes and N ϵ encoding nodes. Each source node has one symbol from a finite field, which is sent to each of the encoding nodes. Each encoding node stores an encoded symbol from the same field, as a function of the received symbols. However, some of the source nodes are controlled by the adversary and may send different symbols to different encoding nodes. Depending on the number of... 

    Private function computation

    , Article 2020 IEEE International Symposium on Information Theory, ISIT 2020, 21 July 2020 through 26 July 2020 ; Volume 2020-June , 2020 , Pages 1118-1123 Tahmasebi, B ; Maddah Ali, M. A ; IEEE Information Theory Society; The Institute of Electrical and Electronics Engineers ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    In this paper, we study the problem of private function computation, where a user wants to compute a function of some inputs, using N in mathbb{N} servers, where the function is a private combination/composition of some K in mathbb{N} public basic functions {f 1 , f 2 ,., f K }. More precisely, for some inputs W m , m [1 : M], the user's goal is to calculate hleft( {{W-m}} ight) = sumolimits-{j = 1}^J {{alpha -j}} {h-j}left( {{W-m}} ight), for some J in mathbb{N}, some scalers α j , j [1 : J], and some functions h j (.), j [1 : J], where each is an arbitrary compositions of the basic functions {f 1 , f 2 ,., f K }. The computation is done through a sequence of queries to N servers. In each... 

    Finger photoplethysmogram pulse amplitude changes induced by flow-mediated dilation

    , Article Physiological Measurement ; Volume 29, Issue 5 , 2008 , Pages 625-637 ; 09673334 (ISSN) Zahedi, E ; Jaafar, R ; Mohd Ali, M. A ; Mohamed, A. L ; Maskon, O ; Sharif University of Technology
    2008
    Abstract
    This study was conducted to investigate the utility and efficacy of finger photoplethysmogram pulse amplitude (PPG-AC) in comparison with the standard Doppler ultrasound in assessing an endothelial function via flow-mediated dilation (FMD). High-resolution B-mode scanning of the right brachial artery (BA) of 31 healthy subjects aged 39.7 ± 11.3 (range 22-64) years and 52 risk subjects aged 47.7 ± 10.8 (range 30-65) years were performed before and after 4 min of upper arm occlusion. Concurrent with the ultrasound measurement (where color Doppler imaging was used to enhance arterial boundary detection), PPG signals were recorded from both index fingers for cross evaluation and comparison. Our... 

    The discrepancy attack on polyshard-ed blockchains

    , Article 2021 IEEE International Symposium on Information Theory, ISIT 2021, 12 July 2021 through 20 July 2021 ; Volume 2021-July , 2021 , Pages 2672-2677 ; 21578095 (ISSN); 9781538682098 (ISBN) Abadi Khooshemehr, N ; Maddah Ali, M. A ; IEEE Information Theory Society; The Institute of Electrical and Electronics Engineers ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Sharding, i.e. splitting the miners or validators to form and run several subchains in parallel, is known as one of the main solutions to the scalability problems of blockchains. The drawback is that as the number of miners expanding each subchain becomes small, it becomes vulnerable to security attacks. To solve this problem, a framework, named as Ployshard, has been proposed in which each validator verifies a coded combination of the blocks introduced by different subchains, thus helping to protect the security of all subchains. In this paper, we introduce an attack on Ployshard, called the discrepancy attack, which is the result of malicious nodes controlling a few subchains and... 

    Energy efficiency through joint routing and function placement in different modes of SDN/NFV networks

    , Article Computer Networks ; Volume 200 , 2021 ; 13891286 (ISSN) Moosavi, R ; Parsaeefard, S ; Maddah Ali, M. A ; Shah-Mansouri, V ; Khalaj, B. H ; Bennis, M ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    Network function virtualization (NFV) and software-defined networking (SDN) are two promising technologies to enable 5G and 6G services and achieve cost reduction, network scalability, and deployment flexibility. However, migration to full SDN/NFV networks in order to serve these services is a time-consuming process and costly for mobile operators. This paper focuses on energy efficiency during the transition of mobile core networks (MCN) to full SDN/NFV networks and explores how energy efficiency can be addressed during such migration. We propose a general system model containing a combination of legacy nodes and links, in addition to newly introduced NFV and SDN nodes. We refer to this... 

    Pressure induced structural, electronic, optical and thermal properties of CsYbBr3, a theoretical investigation

    , Article Journal of Materials Research and Technology ; Volume 10 , 2021 , Pages 687-696 ; 22387854 (ISSN) Saeed, M ; Ali, M. A ; Murad, S ; Ullah, R ; Alshahrani, T ; Laref, A ; Murtaza, G ; Sharif University of Technology
    Elsevier Editora Ltda  2021
    Abstract
    This article presents the variation of structural, electronic, thermal and optical properties of a halide perovskite CsYbBr3with increasing pressure, employing density functional theory. The pressure effect was determined in range of 0-15 GPa. In which stability of CsYbBr3remains valid, as, verified from negative values of enthalpy of formation and phonon dispersion curves. A significant change was observed in lattice constant, bond lengths, bulk modulus and its pressure derivative, volume and ground state energy, with increasing pressure. The calculated electronic properties presented CsYbBr3as a semiconductor with direct band gap of 3.61 eV. However, pressure rise shift the Yb-d states... 

    Mechanism of surfactant in trichloroethene degradation in aqueous solution by sodium persulfate activated with chelated-Fe(II)

    , Article Journal of Hazardous Materials ; Volume 407 , 2021 ; 03043894 (ISSN) Sun, Y ; Li, M ; Gu, X ; Danish, M ; Shan, A ; Ali, M ; Qiu, Z ; Sui, Q ; Lyu, S ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    The mechanism of surfactants in surfactant-in situ chemical oxidation (S-ISCO) coupled process for trichloroethene (TCE) degradation was firstly reported. The performance of TCE solubilization and inhibition of TCE degradation in three nonionic surfactants (TW-80, Brij-35, TX-100) in PS/Fe(II)/citric acid (CA) system was compared and TW-80 was evaluated to be the optimal surfactant in S-ISCO coupled process due to the best TCE solubilizing ability and minimal inhibition for TCE degradation (only 31.8% TCE inhibition in the presence of 1 g L−1 TW-80 surfactant). The inhibition mechanism in TCE degradation was also demonstrated by comparing the strength of ROSs and PS utilization. In the... 

    Efficient post-plasma catalytic degradation of toluene via series of Co–Cu/TiO2 catalysts

    , Article Research on Chemical Intermediates ; Volume 48, Issue 10 , 2022 , Pages 4227-4248 ; 09226168 (ISSN) Ayub, K. S ; Zaman, W. Q ; Miran, W ; Ali, M ; Abbas, Z ; Mushtaq, U ; Shahzad, A ; Yang, J ; Sharif University of Technology
    Springer Science and Business Media B.V  2022
    Abstract
    Volatile organic compounds (VOCs) represent a very important class of pollutants that causes serious health effects. There is an urgent requirement to establish efficient technologies that can reduce and control VOCs. Non-thermal plasma (NTP) is an emerging technology that can decompose low concentration VOCs. However, the low efficiency and high power cost are major hindrances in its commercialization. In this work, Co–Cu with TiO2 support catalysts are prepared by using the deposition precipitation method and utilized in post-plasma catalysis for the efficient degradation of toluene selected as a model VOC. The synergistic effect of Co–Cu/TiO2 with different Co/Cu molar ratios along with... 

    Enhanced trichloroethene degradation performance in innovative nanoscale CaO2 coupled with bisulfite system and mechanism investigation

    , Article Separation and Purification Technology ; Volume 278 , 2022 ; 13835866 (ISSN) Sun, Y ; Sun, X ; Ali, M ; Shan, A ; Idrees, A ; Yang, C ; Lyu, S ; Sharif University of Technology
    Elsevier B.V  2022
    Abstract
    The effect of bisulfite (HSO3–) in nCaO2/Fe(III)/HSO3– system on improving HO• generation and trichloroethene (TCE) removal was innovatively reported. The enhancement mechanism of HSO3– for TCE removal in nCaO2/Fe(III)/HSO3– system was caused not only by the complexing and reducing effects on promoting the conversion of Fe(III) to Fe(II), but also due to the reaction with O2 in water to produce SO4–• for accelerating TCE degradation. A double effect of nCaO2 as an oxidant source to generate HO• and as a O2 source to promote SO4–• generation was revealed. A pseudo-second-order kinetic model of TCE removal was determined and 94.6% TCE degradation was achieved within 60 min at the... 

    A novel omega shaped microwave absorber with wideband negative refractive index for C-band applications

    , Article Optik ; Volume 242 , 2021 ; 00304026 (ISSN) Bilal, R. M. H ; Baqir, M. A ; Iftikhar, A ; Ali, M. M ; Rahim, A. A ; Niaz Akhtar, M ; Mughal, M. J ; Naqvi, S. A ; Sharif University of Technology
    Elsevier GmbH  2021
    Abstract
    This paper reports a polarization controllable and angle-insensitive perfect metamaterial absorber (PMA). The proposed PMA consists of periodically arranged asymmetric omega-shaped resonators made of metallic copper. The absorptivity was analyzed considering the microwave C-band from 4 GHz to 8 GHz. The proposed PMA shows an absorption peak with almost 100% absorptivity at 6.2 GHz. Also, wideband negative index of refraction is observed. Further, the absorber is inspected for the different rotation angles of the top metasurface (omega-shaped ring) along the optical axis, and obliquity of incidence angle for both TE and TM polarized waves. Moreover, surface electric field and surface current... 

    Enhancement in reactivity via sulfidation of FeNi@BC for efficient removal of trichloroethylene: Insight mechanism and the role of reactive oxygen species

    , Article Science of the Total Environment ; Volume 794 , 2021 ; 00489697 (ISSN) Shan, A ; Idrees, A ; Zaman, W. Q ; Abbas, Z ; Farooq, U ; Ali, M ; Yang, R ; Zeng, G ; Danish, M ; Gu, X ; Lyu, S ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    A novel catalyst of sulfidated iron-nickel supported on biochar (S-FeNi@BC) was synthesized to activate persulfate (PS) for the removal of trichloroethylene (TCE). A number of techniques including XRD, SEM, TEM, FTIR, BET and EDS were employed to characterize S-FeNi@BC. The influence of sulfur to iron ratio (S/F) on TCE removal was investigated by batch experiments and a higher TCE removal (98.4%) was achieved at 0.22/1 ratio of S/F in the PS/S-FeNi@BC oxidation system. A dominant role in iron species conversion was noticed by the addition of sulfur in FeNi@BC system. Significant enhancement in recycling of the dissolved and surface Fe(II) was confirmed which contributed to the generation of...