Loading...
Search for: correctness
0.006 seconds
Total 303 records

    Query Correctness Assurance for Outsourced Databases

    , M.Sc. Thesis Sharif University of Technology Noferesti, Morteza (Author) ; Jalili, Rasoul (Supervisor)
    Abstract
    In the secure data outsourcing scenario, verification of the reply of an unreliable server includes assessing the authenticity, completeness and it’s integrity. In this thesis, an efficient method, with emphasis on freshness, has been introduced to evaluate the correctness of the replies from a server. It takes in hand different application needs, inherent differences in the data, and different update mechanisms. This method evaluates freshness by using timestamps alongside the data being out sourced. Due to the requirement of verifying not only the freshness of the response, but the correctness of the timestamps as well, two general methods for evaluating and verifying the responses were... 

    A Trust-based Approach for Correctness Verification of Query Results in Data Outsourcing Scenario

    , M.Sc. Thesis Sharif University of Technology Ghasemi, Simin (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    One of the security issues in database outsourcing scenario is the correctness of the query results. Correctness verification includes integrity, completeness and freshness of the results. Most of the proposed approaches for correctness verification impose high overhead on the components of the scenario which prevents the scenario to implemented in practical applications. In this thesis, we have proposed a probabilistic approach which imposes acceptable overhead for correctness verification of returned results of service provider. The approach uses the previous behavior of the service provider to calculate a trust value toward it which is used to adjust the imposed overhead. In other words,... 

    Cosmological Observables in Past Light-Cone

    , M.Sc. Thesis Sharif University of Technology Aliei, Saeid (Author) ; Rahvar, Sohrab (Supervisor)
    Abstract
    One of the important concepts in cosmology is that all of the observations is done on the past light-cone. In general, cosmological linear perturbation theory is done in a particular gauge and often on spacelike hyperplanes. Then in order to link quantities calculated in perturbation theory with observables, we have to take into account effects coming from projecting these quantities onto past light-cone. We aim in this thesis to study these effects and to calculate corrections over observable quantities such as, two point correlation function and power spectrum of matter perturbations in cosmos. For a particular observational example, in the end we study clustering of structures in... 

    Design of Adaptive Interleaver in Wireless Communication

    , M.Sc. Thesis Sharif University of Technology Alidadi, Afsoon (Author) ; Golestani, Jamaloddin (Supervisor)
    Abstract
    Generally to deal with errors in communication systems, two methods have been proposed: FEC and ARQ. In FEC, redundancy bits are added to the data that causes detection and correction of certain error patterns. ARQ method is based on retransmission of information if there is an error in the information. Another method, which is called Hybrid-ARQ, is the combination of these two methods; there are two types of TypeI and TypeII for this category. In typeI, number of redundancy bits in consecutive transmissions of one codeword is constant but in typeII, number of redundancy bits of a codeword increases in subsequent retransmissions.
    To deal with burst errors, we can use interleaving along... 

    Improvement in Distributed Storage by Using Network Coding

    , M.Sc. Thesis Sharif University of Technology Garshasbi, Javad (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    Cloud and distributed storage systems can provide large-scale data storage and high data reliability by adding redundancy to data. Redundant data may get lost due to the instability of distributed systems such as hardware failures. In order to maintain data availability, it is necessary to regenerate new redundant data in another node, referred to as a newcomer and this process reffered to repair process. Repair process is expected to be finished as soon as possible, because the regeneration time can influence the data reliability and availability of distributed storage systems. In this context, the general objective is to minimize the volume of actual network traffic caused by such... 

    Efficiency Improvement of a Three-Phase Telecom Rectifier with Single-Stage Structure and Power Factor Correction

    , M.Sc. Thesis Sharif University of Technology Noroozi, Negar (Author) ; Zolghadri, Mohammad Reza (Supervisor)
    Abstract
    The objective of this project is to design and control and optimize a single-stage three-phase three-switch unity power factor telecom rectifier. For this purpose, the topology of three-phase three-switch converter has been investigated for both isolated and un-isolated converters. Following a comprehensive investigation on the converter structure, the power dissipation factors have been detected and the quantity of the power dissipation has been calculated by analytical methods and it confirmed by simulation results. To avoid extra power losses some novel soft-switched structures for three-phase three-switched converters have been introduced. the proper operation of the soft-switched... 

    Radiative Mass Correction in Supersymmetric Field Theories and its Implications for Supersymmetry Phenomenology

    , M.Sc. Thesis Sharif University of Technology Mohseni, Amineh (Author) ; Torabian, Mahdi (Supervisor)
    Abstract
    During years, supersymmetry has been a candidate for resolution of Higgs mass fine-tuning problem that is quadratic dependence of scalar mass radiative correction to UV-physics. So, supersymmetry phenomenology is of great importance. As accelerators have reached energy of 13 TeV in recent years and sparticles have not yet been observed, it is important to have a theory in hand, describing SUSY breaking dynamics with scale of SUSY breaking above the energies currently accessible to accelerators. As a result of mass-sum-rule constraint which holds in theories with spontaneous SUSY breaking at tree level and leads to light sparticles and even tachyonic directions, there are currently no... 

    The Spatial and Temporal Diffusion of House Prices in Tehran’s Municipality Zones

    , M.Sc. Thesis Sharif University of Technology Mehrabani, Ali (Author) ; Barakchian, Mehdi (Supervisor) ; Fatemi Ardestani, Farshad (Supervisor)
    Abstract
    The spatial diffusion of house prices has been the subject of research for many years. Most of these studies have found a strong relationship between neighboring regions and a weaker relation between nonneighbors. This study uses changes in real house prices within Tehran at the level of municipality zones to illustrate the ripple effect by using quarterly house price data of Tehran’s twenty municipality zones since 1371 to 1391. It also aims to illustrate the heterogeneity in spatial spillovers of house prices development across space and time. We found that a positive shock in house prices diffuse more rapidly that a negative shock; the time shock will diffuse also have a heavier level... 

    A Recomputation-based Algorithm for Error Correction in Scratchpad Memory

    , M.Sc. Thesis Sharif University of Technology Sayadi, Hossein (Author) ; Miremadi, Ghassem (Supervisor)
    Abstract
    Scratchpad memory (SPM) is extensively used as the on-chip memory in modern embedded processors alongside of the cache memory or as its alternative. Soft errors in SPM are one of the major contributors to system failures, due to ever-increasing susceptibility of SPM cells to energetic particle strikes. Since a large fraction of soft errors occurs in the shape of Multiple-Bit Upsets (MBUs), traditional memory protection techniques, i.e., Error Correcting Code (ECCs), are not affordable for SPM protection; mainly because of their limited error coverage and/or their high overheads. This thesis proposes a novel recomputation-based algorithm that efficiently protects SPM with high error... 

    Holography and Quantum Information Theory: Complexity and T T Deformation

    , M.Sc. Thesis Sharif University of Technology Zolfi, Hamed (Author) ; Karimipour, Vahid (Supervisor) ; Naseh, Ali (Supervisor)
    Abstract
    In this thesis we are going to show various relations between AdS/CFT correspondence and quantum information theory. For this aim we have a brief review about this correspondence and describe how one can derive linearized Einstein's equations using holographic prescription of entanglement entropy. It is explained how the quantum error correction concept can help us to solve the paradoxes due to extrapolate dictionary. After introducing $ T\overline{T} $ deformation and complexity, we use the path integral optimization approach of Takayanagi and collaborators to find the time slice of geometries dual to states in the $ T\overline{T} $-deformed two dimensional conformal field theories... 

    High Efficiency, Low Distortion Boundary Conduction Mode Boost PFCs for Different Power Ranges

    , Ph.D. Dissertation Sharif University of Technology Marvi, Mohammad (Author) ; Fotowat-Ahmadi, Ali (Supervisor)
    Abstract
    In this thesis, new boundary conduction mode boost PFCs are proposed and implemented for different power levels according to the characteristics and requirements of each power level. For medium power applications, we have proposed a new zero voltage switching PFC based on a synchronous boost converter which is controllable with conventional boundary conduction mode PFC control ICs without requiring any additional timing adjustment control circuits other than a special high side driver that consists of only low voltage components. Based on mathematical calculations, we have proposed two sipmle circuit solutions to reduce the high level of line current zero crossing distortion in the proposed... 

    Design and Implementation of High Efficient Charger for Plug-in Hybrid Vehicles with Power Factor Correction Feature

    , M.Sc. Thesis Sharif University of Technology Yazdani, Farzad (Author) ; Tahami, Farzad (Supervisor)
    Abstract
    In this project the novel zero-voltage-switching topology for power factor correction bridgeless boost rectifier is proposed. By employing an improved ZVS pulse-width-modulation (PWM) switch cell, ZVS of all the main switches is achieved without additional current or voltage stress of main switches. Also for the auxiliary switch the zero-current-switching is provided. In all modes of opretion of this converter, the power path is provided by maximum two semiconductor so the conduction loss of converter is low as in conventional converter. With this features the efficiency of proposed converter is very high  

    Application of Adversarial Training in Medical Signals

    , M.Sc. Thesis Sharif University of Technology Yousefi Moghaddam, Hossein (Author) ; Rabiee, Hamid Reza (Supervisor) ; Rohban, Mohammad Hossein (Supervisor)
    Abstract
    Recent success of Deep Learning models, resulted in their evergrowing application in many fields. However these models usually require huge datasets, which can sometimes be hard to collect. One of the challenges related to medical data, is the Batch Effect; Medical data is usually gathered through multiple experiments. Each experiment might have a slightly different conditions than the other, resulting a shift in the data related to that batch. Batch effects can have more severe impact during testing time, as the shift in the data distribution could be bigger. Many methods have been proposed to reduce or remove the effect of external conditions on data distribution.Deep Learning models have... 

    A simple correlation to estimate natural gas thermal conductivity

    , Article Journal of Natural Gas Science and Engineering ; Volume 18 , May , 2014 , Pages 446-450 ; ISSN: 18755100 Jarrahian, A ; Heidaryan, E ; Sharif University of Technology
    Abstract
    A general investigation of the thermal conductivity of natural gas as a function of temperature, pressure and composition was carried out to develop a generalized correlation. The model obtained was based on 731 data points of 42 binary mixtures in wide ranges of pressures (0.1-300MPa), temperatures (220-425K) and specific gravities (0.626-1.434). Correction terms for non-hydrocarbons of carbon dioxide and nitrogen were up to 87.8 and 82.8 of mole percent, respectively. The arithmetic average of the model's absolute error was found to be 5.69%, which is acceptable in engineering calculations  

    Forensic detection of image manipulation using the zernike moments and pixel-pair histogram

    , Article IET Image Processing ; Volume 7, Issue 9 , December , 2013 , Pages 817-828 ; 17519659 (ISSN) Shabanifard, M ; Shayesteh, M. G ; Akhaee, M. A ; Sharif University of Technology
    2013
    Abstract
    Integrity verification or forgery detection of an image is a difficult procedure, since the forgeries use various transformations to create an altered image. Pixel mapping transforms, such as contrast enhancement, histogram equalisation, gamma correction and so on, are the most popular methods to improve the objective property of an altered image. In addition, fabricators add Gaussian noise to the altered image in order to remove the statistical traces produced because of pixel mapping transforms. A new method is introduced to detect and classify four various categories including original, contrast modified, histogram-equalised and noisy images. In the proposed method, the absolute value of... 

    CLASS: Combined logic and architectural soft error sensitivity analysis

    , Article Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC ; 2013 , Pages 601-607 ; 9781467330299 (ISBN) Ebrahimi, M ; Chen, L ; Asadi, H ; Tahoori, M. B ; Sharif University of Technology
    2013
    Abstract
    With continuous technology downscaling, the rate of radiation induced soft errors is rapidly increasing. Fast and accurate soft error vulnerability analysis in early design stages plays an important role in cost-effective reliability improvement. However, existing solutions are suitable for either regular (a.k.a address-based such as memory hierarchy) or irregular (random logic such as functional units and control logic) structures, failing to provide an accurate system-level analysis. In this paper, we propose a hybrid approach integrating architecture-level and logic-level techniques to accurately estimate the vulnerability of all regular and irregular structures within a microprocessor.... 

    Security analysis of an identity-based mix net

    , Article 2013 10th International ISC Conference on Information Security and Cryptology, ISCISC 2013 ; 2013 Yajam, H. A ; Mahmoodi, A ; Mohajeri, J ; Salmasizadeh, M ; Sharif University of Technology
    IEEE Computer Society  2013
    Abstract
    One of the most important systems for providing anonymous communication is the Mix nets which should provide correctness and privacy as security requirements against active adversaries. In 2009, Zhong proposed a new mix net scheme which uses identity-based cryptographic techniques and proved that it has 'correctness' and 'privacy' properties in the semi-honest model. Since the semi-honest model is a very strong assumption for practical application, we show that if a user or the last mix server is corrupted, Zhong scheme does not provide privacy against an active adversary  

    Correctness verification in database outsourcing: A trust-based fake tuples approach

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 7671 LNCS , 2012 , Pages 343-351 ; 03029743 (ISSN) ; 9783642351297 (ISBN) Ghasemi, S ; Noferesti, M ; Hadavi, M. A ; Nogoorani, S. D ; Jalili, R ; Sharif University of Technology
    2012
    Abstract
    An important security challenge in database outsourcing scenarios is the correctness verification of query results. The proposed approaches in the literature, impose high overhead on both the service provider and specially the clients. In this paper, we propose the Trust-Based Fake Tuples approach to audit the correctness of query results. In this approach, some fake tuples are included among the real ones in order to verify the correctness of the results. The experience learnt from past results is used in this paper to evaluate the trust toward the service provider. This trust value is used to tune the number of fake tuples and subsequently the imposed overhead. As the trust value toward... 

    Comprehensive control framework for ensuring loading margin of power systems considering demand-side participation

    , Article IET Generation, Transmission and Distribution ; Volume 6, Issue 12 , 2012 , Pages 1189-1201 ; 17518687 (ISSN) Rabiee, A ; Parvania, M ; Vanouni, M ; Parniani, M ; Fotuhi Firuzabad, M ; Sharif University of Technology
    Abstract
    This study presents a comprehensive control framework to ensure desired loading margin (LM) while minimising the corresponding control cost. The proposed framework is divided into corrective control (CC) and preventive control (PC) subproblems. The CC subproblem deals with the condition that a power system encounters voltage instability as a result of severe contingencies. This control is merely devised to restore system stability. The PC subproblem is brought up when the system operates in a stable region but its LM is insufficient. In this manner, the system-operating point is changed such that the desired LM is achieved. One of the features of the proposed methodology is to consider... 

    Application of Karnaugh map for easy generation of error correcting codes

    , Article Scientia Iranica ; Volume 19, Issue 3 , June , 2012 , Pages 690-695 ; 10263098 (ISSN) Tabandeh, M ; Sharif University of Technology
    2012
    Abstract
    With increasing use of data transmission between digital systems as well as subsystems, the need for more reliable communication is felt. In this research, a new approach to the linear error correcting codes is introduced. Among advantages of this technique are simpler code construction and also decoding algorithm, as well as easier understanding of the basic concept. Based on an earlier paper and also recent work done, we first discuss briefly the use of Karnaugh map and its advantages in constructing simple codes. We then prove a theorem on application of the map to multiple error correcting codes. Using these results, we propose a simple technique that leads to obtaining a code with more...