Loading...
Search for: complexation
0.022 seconds
Total 1203 records

    AFMAP: anonymous forward-secure mutual authentication protocols for RFID systems

    , Article Proceedings - 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18 June 2009 through 23 June 2009, Athens, Glyfada ; 2009 , Pages 31-36 ; 9780769536682 (ISBN) Sadighian, A. R ; Jalili, R ; IARIA ; Sharif University of Technology
    2009
    Abstract
    In this paper we propose two mutual authentication protocols for RFID systems. Generally, in RFID systems, a reader can authenticate tags in the real-time and batch modes. This paper proposes the first authentication protocol for the real-time mode. It also proposes an efficient robust mutual authentication protocol for the batch mode. Some significant characteristics of the protocols are forward security, tag anonymity, location privacy, low complexity on the back-end server, and scalability. To the best of our knowledge, our protocols offer the most enhanced security features in RFID mutual authentication protocols with respect to user privacy. In analyzing the protocols, we show how... 

    A four-phase algorithm to improve reliability in series-parallel systems with redundancy allocation

    , Article Scientia Iranica ; Vol. 21, issue. 3 , 2014 , p. 1072-1082 Ghafarian Salehi Nezhad, A ; Eshraghniaye Jahromi A ; Salmani, M. H ; Ghasemi, F ; Sharif University of Technology
    Abstract
    In general, reliability is the ability of a system to perform and maintain its functions in routine, as well as hostile or unexpected, circumstances. The Redundancy Allocation Problem (RAP) is a combinatorial problem which maximizes system reliability by discrete simultaneous selection from available components. The main purpose of this study is to develop an effective approach to solve RAP, expeditiously. In this study, the basic assumption is considering Erlang distribution density for component failure rates. Another assumption is that each subsystem can have one of cold-standby or active redundancy strategies. The RAP is a NP-Hard problem which cannot be solved in reasonable time using... 

    A fractional order model for steer-by-wire systems

    , Article IECON Proceedings (Industrial Electronics Conference) ; 2009 , Pages 4161-4166 Tahami, F ; Afshang, H ; Sharif University of Technology
    Abstract
    The steer by wire system for vehicles has attracted much attention in recent years. Steer by wire systems provide many benefits in terms of functionality and at the same time present significant challenges too. It is essential to investigate the stability of steer by wire systems using a more sophisticated model rather than common approximated models. Fractional order modeling offers a good modeling framework for complex dynamical systems involving flexible structures such as multi-mass drives. In this paper a nonlinear fractional order model for steer by wire systems is presented  

    A framework for protecting privacy on mobile social networks

    , Article Mobile Networks and Applications ; Volume 26, Issue 3 , 2021 , Pages 1281-1299 ; 1383469X (ISSN) Safi, S. M ; Movaghar, A ; Safikhani Mahmoodzadeh, K ; Sharif University of Technology
    Springer  2021
    Abstract
    In recent years, mobile social networks have largely been developed and gained considerable popularity. An approach to protecting privacy on mobile social networks is the use of encryption and access control. Good alternatives for use on mobile social networks are the Public Broadcast Encryption approach for appropriate concordance and consistency with the structure of social networks as well as the Attribute-Based Encryption owing to its capability and proper implementation of the access control policy. Accordingly, in this paper, a framework was presented based on the Public Broadcast Encryption and Attribute-Based Encryption. Using proxies, we outsourced some of these operations in the... 

    A fully implicit single phase T-H-M fracture model for modelling hydraulic fracturing in oil sands

    , Article Journal of Canadian Petroleum Technology ; Volume 43, Issue 6 , 2004 , Pages 35-44 ; 00219487 (ISSN) Pak, A ; Chan, D. H ; Sharif University of Technology
    Society of Petroleum Engineers (SPE)  2004
    Abstract
    Enhancing oil extraction from oil sands with a hydraulic fracturing technique has been widely used in practice. Due to the complexity of the actual process, modelling of hydraulic fracturing is far behind its application. Reproducing the effects of high pore pressure and high temperature, combined with, complex stress changes in the oil sand reservoir, requires a comprehensive numerical model which is capable of simulating the fracturing phenomenon. To capture all of these aspects in the problem, three partial differential equations, i.e., equilibrium, flow, and heat transfer, should be solved simultaneously in a fully implicit (coupled) manner. A fully coupled thermo-hydro-mechanical... 

    A fuzzy clustering algorithm for finding arbitrary shaped clusters

    , Article 6th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2008, Doha, 31 March 2008 through 4 April 2008 ; 2008 , Pages 559-566 ; 9781424419685 (ISBN) Soleymani Baghshah, M ; Bagheri Shouraki, S ; Sharif University of Technology
    2008
    Abstract
    Until now, many algorithms have been introduced for finding arbitrary shaped clusters, but none of these algorithms is able to identify all sorts of cluster shapes and structures that are encountered in practice. Furthermore, the time complexity of the existing algorithms is usually high and applying them on large dataseis is time-consuming. In this paper, a novel fast clustering algorithm is proposed. This algorithm distinguishes clusters of different shapes using a twostage clustering approach. In the first stage, the data points are grouped into a relatively large number of fuzzy ellipsoidal sub-clusters. Then, connections between sub-clusters are established according to the Bhatiacharya... 

    A fuzzy fully distributed trust management system in wireless sensor networks

    , Article AEU - International Journal of Electronics and Communications ; Volume 70, Issue 1 , 2016 , Pages 40-49 ; 14348411 (ISSN) Jadidoleslamy, H ; Aref, M.R ; Bahramgiri, H ; Sharif University of Technology
    Elsevier GmbH  2016
    Abstract
    Wireless sensor networks (WSNs) usually consist of many tiny sensor nodes and a Sink. Problems like nodes' misbehavior due to malicious, compromised or selfishness intentions, and WSNs' security vulnerabilities against different attacks due to free and unprotected communications, untrusted and broadcasted transmissions, hostile environments and limited resources, degrade the security and overall performance of WSNs. In another direction, most of the traditional security mechanisms are unsuitable for WSNs. One significant security solution against these problems is Trust Management System (TMS); TMS enhances the security by detecting the nodes' abnormal behaviors; it improves the cooperation... 

    A fuzzy model for solving architecture styles selection multi-criteria problem

    , Article EMS 2008, European Modelling Symposium, 2nd UKSim European Symposium on Computer Modelling and Simulation, Liverpool, 8 September 2008 through 10 September 2008 ; 2008 , Pages 388-393 ; 9780769533254 (ISBN) Moaven, S ; Ahmadi, H ; Habibi, J ; Kamandi, A ; Sharif University of Technology
    2008
    Abstract
    The continuing process of software systems enlargement in size and complexity becomes system design extremely important for software production. In this way, the role of software architecture is significantly important in software development. It serves as an evaluation and implementation plan for software development and software evaluation. Consequently, choosing the correct architecture is a critical issue in software engineering domain. Moreover, software architecture selection is a multicriteria decision-making problem in which different goals and objectives must be taken into consideration. In this paper, more precise and suitable decisions in selection of architecture styles have been... 

    Ag3PO4/BiPO4 p-n heterojunction nanocomposite prepared in room-temperature ionic liquid medium with improved photocatalytic activity

    , Article Materials Science in Semiconductor Processing ; Volume 39 , 2015 , Pages 506-514 ; 13698001 (ISSN) Mohaghegh, N ; Rahimi, E ; Gholami, M. R ; Sharif University of Technology
    Elsevier Ltd  2015
    Abstract
    Abstract A visible-light-active Ag3PO4/BiPO4 nanocomposite with a p-n heterojunction structure was fabricated via a co-precipitation hydrothermal process using 2-hydroxylethylammonium formate (RTIL) as a room-temperature ionic liquid. The resulting catalysts were characterized by various techniques. The photocatalytic activity of the photocatalysts was evaluated by the photodegradation of phthalocyanine Reactive Blue 21 (RB21) under both visible and UV light irradiations. The results reveal that the heterojunction composite prepared in RTIL noticeably exhibited an improvement in both efficiency and rate of RB21 photodegradation in comparison with pure Ag3PO4 and BiPO4. The enhanced... 

    A game-theoretic approach for joint channel and power allocation in downlink of cellular cognitive radio networks

    , Article IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC ; 2012 , Pages 1198-1202 ; 9781467325691 (ISBN) Omidvar, N ; Khalaj, B. H ; Sharif University of Technology
    2012
    Abstract
    In this paper, we consider a cellular cognitive radio network that uses opportunistic spectrum access for its transmission in the downlink direction from base stations toward cognitive radio users. Since the spectrum is licensed to a primary network, proper resource management should be employed in the secondary network to protect primary users against excessive interference while providing acceptable utilization for secondary users. We use game theory to propose a distributed method for joint frequency and power allocation in the downlink of cognitive radio networks. Earlier works in this area were based on centralized optimization-based approaches, whereas our proposed method solves the... 

    A generic method for remote sensing satellites conceptual design and rapid sizing based on »design for performance» strategy

    , Article IEEE Aerospace and Electronic Systems Magazine ; Volume 33, Issue 2 , 2018 , Pages 34-51 ; 08858985 (ISSN) Ahmadi, A ; Kosari, A ; Malaek, M. B ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Some fundamental and unique characteristics of space are (1) global perspective, (2) above the atmosphere, (3) gravity-free environment, (4) abundant resources, and (5) exploration of space itself. If the mission doesn't rely on some fundamental and unique characteristics of space, it will likely cost more to do in space than in air or on Earth [1]. On the other hand, design of complex systems like satellites involves selecting design parameters (DPs) to satisfy the required constraints while meeting desired performance objectives. These parameters are often coupled, and their relationships not easily understood, and it makes the design an iterative process with high complexity [2]. But in... 

    A genetic approach in relay-jammer selection and power allocation for physical layer security

    , Article 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 374-379 ; 9781509034345 (ISBN) Okati, N ; Mosavi, M. R ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    Node cooperation approaches improve physical layer security in wireless networks without applying data encryption. Selecting the appropriate nodes to cooperate as relays or friendly jammers, to degrade eavesdropper's link, is a challenging problem which has attracted a lot of attention in recent years. Various approaches, based on conventional exhaustive search, have been suggested for optimal relay-jammer selection and power allocation in the literature. The complexity of these methods is proportional to the number of intermediate nodes. As the number of intermediate nodes exceeds a specific bound, conventional exhaustive search appears infeasible due to high computational complexity. In... 

    A GIS-google earth based approach to estimating the flood damage function in large river basins

    , Article World Environmental and Water Resources Congress 2011: Bearing Knowledge for Sustainability - Proceedings of the 2011 World Environmental and Water Resources Congress, 22 May 2011 through 26 May 2011 ; May , 2011 , Pages 3811-3821 ; 9780784411735 (ISBN) Abrishamchi, A ; Dashti, M ; Alamdari, N ; Salavitabar, A ; Sharif University of Technology
    2011
    Abstract
    Flood as a natural disaster causes heavy human and economic losses and social unrests in most areas of the world. As flood control cost and flood damage compensation is a heavy burden over countries' budget, traditional flood design methods are being replaced by more reliable risk-based methods employing comprehensive risk analysis. In this respect, flood damage estimation is an important step in flood control systems design and analysis. In large river basins with complex reservoir systems and various land uses, flood damage estimation is complex, data-intensive, time demanding, and uncertain task requiring an intensive hydrologic and hydraulic analysis. In this study a simple approach is... 

    A glimpse to most of the old and new results on very well-covered graphs from the viewpoint of commutative algebra

    , Article Research in Mathematical Sciences ; Volume 9, Issue 2 , 2022 ; 25220144 (ISSN) Kimura, K ; Pournaki, M. R ; Seyed Fakhari, S. A ; Terai, N ; Yassemi, S ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2022
    Abstract
    A very well-covered graph is a well-covered graph without isolated vertices such that the height of its edge ideal is half of the number of vertices. In this survey article, we gather together most of the old and new results on the edge and cover ideals of these graphs. © 2022, The Author(s), under exclusive licence to Springer Nature Switzerland AG  

    A graph-based performance analysis of the 802.11p MAC protocol for safety communications in highway vehicular ad hoc networks

    , Article Computer Journal ; Volume 60, Issue 2 , 2017 , Pages 185-209 ; 00104620 (ISSN) Ghafourian Ghahramani, S. A. A ; Hemmatyar, A. M. A ; Sharif University of Technology
    Oxford University Press  2017
    Abstract
    We address the performance of the 802.11p protocol in terms of the packet delivery ratio (PDR) and the packet reception ratio (PRR) for broadcasting safety messages in highway environments. Regarding the semi-sparse and intermediate traffic, we try to answer to questions such as what are the upper, dominant and lower bounds of PDR and PRR in each traffic condition? How they may deviate from their average values? and What fraction of vehicles may experience such bounds? To answer to such questions, we propose to consider the communication graph formed among vehicles as a special type of the complex networks and we apply the recently proposed obligatory attachment ruleto synthesize such... 

    A heuristic complexity-based method for cost estimation of aerospace systems

    , Article Proceedings of the Institution of Mechanical Engineers, Part G: Journal of Aerospace Engineering ; Volume 227, Issue 11 , 2013 , Pages 1685-1700 ; 09544100 (ISSN) Banazadeh, A ; Jafari, M. H ; Sharif University of Technology
    2013
    Abstract
    Cost estimation plays an essential role in the development of aerospace systems that are perhaps the most complex, time- and labor-consuming ones. Regarding this matter, it is unavoidable to take a systematic approach to build a realistic model through a deliberative, heuristical and easy-to-do process in the early stages of design. In the current study, complexity index theory is utilized to develop a heuristic complexity-based method to estimate various costs of aerospace systems. This method promises to be logically and practically more reliable and accurate than classical parametric methods. Logically, manipulating a group of parameters, instead of only one or two, reduces the... 

    A heuristic scheduling method for the pipe-spool fabrication process

    , Article Journal of Ambient Intelligence and Humanized Computing ; Volume 9, Issue 6 , 2018 , Pages 1901-1918 ; 18685137 (ISSN) Safarzadeh, S ; Shadrokh, S ; Salehian, A ; Sharif University of Technology
    Springer Verlag  2018
    Abstract
    The pipe-spool fabrication process is a critical operational section in the piping projects that usually used to accelerate and discipline the installation process, especially, when we have a particular deadline for the project. For this reason, the fast and optimal scheduling of the fabrication activities with considering the real conditions and using manual or traditional methods is a significant problem for the decision-makers. In this paper, we use a novel linear programming model to schedule the spool fabrication activities based on the flexible job shop scheduling problem (FJSP). Because FJSP is a challengeable NP-hard problem, we solve the proposed mathematical model with a heuristic... 

    A hierarchical approach to SVD-based fragile watermarking for image authentication

    , Article 2005 Fifth International Conference on Information, Communications and Signal Processing, Bangkok, 6 December 2005 through 9 December 2005 ; Volume 2005 , 2005 , Pages 870-876 ; 0780392833 (ISBN); 9780780392830 (ISBN) Taheri, S ; Ghaemmaghami, S ; Sharif University of Technology
    2005
    Abstract
    One of the main properties of fragile watermarking schemes is to indicate the location of changes made to the image, i.e. tamper localization, In addition to detection of watermarked image modifications. In this paper, the localization property Is added to the SVD(Singular Value Decomposition) based fragile watermarking scheme proposed by Byun et al. To do this, a hierarchical watermarking structure is used, where the Image is partitioned into blocks In a multilevel hierarchy, and then the SVD-based algorithm Is employed at each level to Insert authenticating data In sub-blocks. In the verification process, blocks at the lowest hierarchical level can detect modifications made to the... 

    A high-order accurate unstructured spectral difference lattice Boltzmann method for computing inviscid and viscous compressible flows

    , Article Aerospace Science and Technology ; Volume 98 , 2020 Hejranfar, K ; Ghaffarian, A ; Sharif University of Technology
    Elsevier Masson SAS  2020
    Abstract
    In the present work, the spectral difference lattice Boltzmann method (SDLBM) is implemented on unstructured meshes for the solution methodology to be capable of accurately simulating the compressible flows over complex geometries. Both the inviscid and viscous compressible flows are computed by applying the unstructured SDLBM. The compressible form of the discrete Boltzmann–BGK equation with the Watari model is considered and the solution of the resulting system of equations is obtained by applying the spectral difference method on arbitrary quadrilateral meshes. The accuracy and robustness of the unstructured SDLBM for simulating the compressible flows are demonstrated by simulating four... 

    A high performance parallel IP lookup technique based on multiprocessor organization and CREW PRAM

    , Article 2nd Asia International Conference on Modelling and Simulation, AMS 2008, Kuala Lumpur, 13 May 2008 through 15 May 2008 ; 2008 , Pages 89-94 ; 9780769531366 (ISBN) Hasanloo, M ; Amiri, A ; Fathy, M ; Sharif University of Technology
    2008
    Abstract
    The IP Lookup Process is a key bottleneck in routing due to the increase in routing table size, increasing traffic and migration to IPv6 addresses. The IP routing lookup involves computation of the Longest Prefix Matching for which existing solutions, such as BSD Radix Tries, scale poorly when traffic in the router increases or when employed for IPv6 address lookups. In this paper, we describe a CREW PRAM multiprocessor organization lookup that uses P processor for solving LPM problem. By this technique P-1 IP addresses can be looked up simultaneously thus the performance of processors increase in linear manner. First we categorize all prefixes in some groups based on their first two bytes...