Loading...
Search for: intersections
0.011 seconds

    Efficient scalable multi-party private set intersection using oblivious PRF

    , Article 17th International Workshop on Security and Trust Management, STM 2021, co-located with the 26th European Symposium on Research in Computer Security, ESORICS 2021, 8 October 2021 through 8 October 2021 ; Volume 13075 LNCS , 2021 , Pages 81-99 ; 03029743 (ISSN); 9783030918583 (ISBN) Kavousi, A ; Mohajeri, J ; Salmasizadeh, M ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2021
    Abstract
    In this paper, we present a concretely efficient protocol for private set intersection (PSI) in the multi-party setting using oblivious pseudorandom function (OPRF). In fact, we generalize the approach used in the work of Chase and Miao [CRYPTO 2020] towards deploying a lightweight multi-point OPRF construction for two-party PSI. Our protocol only includes oblivious transfer (OT) extension and garbled Bloom filter as its main ingredients and avoids computationally expensive operations. From a communication pattern perspective, the protocol consists of two types of interactions. The first type is performed over a star-like communication graph in which one designated party interacts with all... 

    A hybrid deep and machine learning model for short-term traffic volume forecasting of adjacent intersections

    , Article IET Intelligent Transport Systems ; Volume 16, Issue 11 , 2022 , Pages 1648-1663 ; 1751956X (ISSN) Mirzahossein, H ; Gholampour, I ; Sajadi, S. R ; Zamani, A. H ; Sharif University of Technology
    John Wiley and Sons Inc  2022
    Abstract
    Despite complex fluctuations, missing data, and maintenance costs of detectors, traffic volume forecasting at intersections is still a challenge. Moreover, most existing forecasting methods consider an isolated intersection instead of multiple adjacent ones. By accurately forecasting the volume of short-term traffic, a low-cost method can be provided to solve the problems of congestion, delay, and breakdown of detectors in the road transport system. This paper outlines a novel hybrid method based on deep learning to estimate short-term traffic volume at three adjacent intersections. The gated recurrent unit (GRU) and long short-term memory (LSTM) bilayer network with wavelet transform (WL)... 

    Applicaton of warrant for Installation of Protected Left-Turn Phase at Signalized Intersections

    , M.Sc. Thesis Sharif University of Technology Kamkari, Mahshid (Author) ; Nassiri, Habibollah (Supervisor)
    Abstract
    Left-turn operation is a critical component in the safe and efficient operation of a signalized intersection. The proper type of left-turn phasing results in reduction of traffic delay and number of accidents. A review of the literature indicates that different warrants have been proposed for the installation of the protected left-turn phase; however, there is not a consensus to implement a specific warrant up to the present. In general, the warrants fall into four categories: traffic volume, operational characteristics of traffic, intersection geometrics and accident experiences. Considering the high rate of accidents resulting from left-turn movements at signalized intersections in Iran,... 

    The Effect of Red Light Violation on the Level of Service in Urban Signalized Intersections

    , M.Sc. Thesis Sharif University of Technology Sharifian Jazi, Vahid (Author) ; Nassiri, Habibollah (Supervisor)
    Abstract
    One of the frequent aspects of lawlessness at signalized intersections, is red-light violation (RLV). In addition to its adverse effect on intersection safety, RLV can cause delay in the startup of the vehicles in the next phase defined as “green flow”. In this research, in order to investigate the adverse effect of RLV, the required data were collected from two signalized intersections in the City of Esfahan, Iran using recording cameras. Then, using a cellular network in the intersections and the Aimsun traffic simulation software, the effects of RLV on the delay, capacity, and level of service of the intersections were evaluated. The results show that the behavior of the drivers in the... 

    Identify and Study the Factors that Influence the Behavior of Pedestrians to Cross the Signalized Intersections

    , M.Sc. Thesis Sharif University of Technology Yahyapour, Arash (Author) ; Nassiri, Habibollah (Supervisor)
    Abstract
    Pedestrian accidents involve most of traffic accidents mainly happen in urban intersections (signalized or non-signalized). The present research is to identify and evaluate the factors influencing the pedestrian decision while crossing the street at signalized intersections. The data used in this study are captured by recording the behavior of 596 pedestrians while crossing 2 signalized intersections in Karaj. To better identify the variables affecting the behavior of pedestrians, such as age, education, etc., 394 people have been interviewed in person. The factors affecting the pedestrian behavior are divided into two general groups: 1- Social, demographic, economic, family, and other... 

    Identification and Modeling Of Factors Affecting The Waiting Time of Pedestrians to Cross at Signalized Intersections

    , M.Sc. Thesis Sharif University of Technology Yeganeh, Ali (Author) ; Nasiri, Habibollah (Supervisor)
    Abstract
    Studies show that Pedestrians are at fault in 59% of the vehicle-pedestrian accidents. The traffic crash statistics show the importance of understanding factors of pedestrian errors. If pedestrians terminate their waiting behavior during the red light period and cross the street, they would put themselves in danger. Pedestrians’ red-light violation is a type of highly dangerous behavior occurring at intersections. A total of 1130 pedestrians approaching the intersections during red light periods were observed from the videotapes data collected at 6 intersections in Tehran, Iran. Pedestrian crossing behaviors are classified into immediate crossing behavior and waiting behavior. A logit model... 

    A Correction Algorithm for Intersecting Trajectories of Two Flying Robots

    , M.Sc. Thesis Sharif University of Technology Ebrahimi, Bahareh (Author) ; Banazade, Afshin (Supervisor)
    Abstract
    The main interest of this study is designing a correction algorithm for intersecting trajectories of two flying robots. For this purpose, path planning algorithms were studied and Rapidly-exploring random tree (RRT) was chosen as a proper algorithm for flying robots in urban environments which is modified for the problem. It should be considered that this project focuses on path correction therefore initial path could be produced by any suitable algorithm. In addition, new paths were designed with flying robots’ performance equations. The correction was done so the paths differ as little as possible in comparison to the original path. Since there are no flight regulations available for... 

    Study of water entry of circular cylinder by using analytical and numerical solutions

    , Article Journal of the Brazilian Society of Mechanical Sciences and Engineering ; Volume 34, Issue 3 , July , 2012 , Pages 225-232 ; 16785878 (ISSN) Ghadimi, P ; Dashtimanesh, A ; Djeddi, S. R ; Sharif University of Technology
    2012
    Abstract
    Water impact phenomenon in the case of a circular cylinder is an important issue in offshore industry where cross members may be in the splash zone of the incident wave. An analytical method as well as a numerical solution are employed to study the water entry problem of a circular section. The procedure for derivation of the analytical formulas is demonstrated step by step. The volume of fluid (VOF) simulation of the water entry problem is also performed to offer comparison of the results of the linearized analytical solution with a fully nonlinear and viscous fluid flow solution. To achieve this, the FLOW- 3D code is utilized. Some consideration has also been given to the points of... 

    Delay-based passenger car equivalent at signalized intersections in Iran

    , Article Promet - Traffic - Traffico ; Volume 29, Issue 2 , 2017 , Pages 135-142 ; 03535320 (ISSN) Nassiri, H ; Tabatabaie, S ; Sahebi, S ; Sharif University of Technology
    Faculty of Transport and Traffic Engineering  2017
    Abstract
    Due to their different sizes and operational characteristics, vehicles other than passenger cars have a different influence on traffic operations especially at intersections. The passenger car equivalent (PCE) is the parameter that shows how many passenger cars must be substituted for a specific heavy vehicle to represent its influence on traffic operation. PCE is commonly estimated using headway-based methods that consider the excess headway utilized by heavy vehicles. In this research, the PCE was estimated based on the delay parameter at three signalized intersections in Tehran, Iran. The data collected were traffic volume, travel time for each movement, signalization, and geometric... 

    Upper Bounds for Eigenvalues of Natural Operators on Compact Riemannian Manifolds

    , M.Sc. Thesis Sharif University of Technology Hassannezhad, Asma (Author) ; Colbois, Bruno (Supervisor) ; El Soufi, Ahmad (Supervisor) ; Ranjbar-Motlagh, Alireza (Supervisor)
    Abstract
    The purpose of this thesis is to find upper bounds for the eigenvalues of natural operators acting on functions on a compact Riemannian man-ifold (M, g) such as the Laplace–Beltrami operator and Laplace-type operators. In the case of the Laplace–Beltrami operator, two aspects are investigated:
    The first aspect is to study relationships between the intrinsic geometry and eigenvalues of the Laplace–Beltrami operator. In this regard, we obtain upper bounds depending only on the dimension and a conformal invariant called min-conformal volume. Asymptotically, these bounds are consistent with the Weyl law. They improve previous results by Korevaar and Yang and Yau. The proof relies on the... 

    Improving the Security of Private Set Intersectio

    , M.Sc. Thesis Sharif University of Technology Mahdavi Oliaiy, Mahdi (Author) ; Aref, Mohammad Reza (Supervisor) ; Mohajeri, Javad (Co-Advisor)
    Abstract
    In some applications in the field of information technology such as social networks and medical databases in different hospitals, sometimes an entity needs to calculate the extent of its sharing of information documents with other institutions. Access to one entity's information is not possible due to the confidentiality of users' information. Therefore, in order to calculate common documents, users should be able to do so without revealing their private information. Therefore, it is required protocols such that can only obtain the shared information between two mentioned entities, while preserving the confidentiality of uncommon information. The schemes that meet the above objectives are... 

    Some Graphs Associated with Groups

    , M.Sc. Thesis Sharif University of Technology Rahimi Rad, Saman (Author) ; Akbari, Saeed (Supervisor)
    Abstract
    In this thesis we ascribe a one graph to groups and investigate the relations between groups structure and graph. Let G be a group. The prime index graph of G, denoted by π(G), is the graph whose vertex set is the set of all subgroups of G and two distinct comparable vertices H and K are adjacent if and only if the index of H in K or the index of K in H is prime.Also, The intersection graph of G denoted by Γ(G), is the graph whose vertex set is the set of all non-trivial proper subgroups of G and two distinct vertices H and K are adjacent if and only if H ⋂ K≠ {e}, where e denoted the identity element of G. We denote the complement of Γ(G) by Λ(G). In this thesis we consider the following... 

    An Algorithmic Approach to the Intersection Problem in Latin Squares

    , M.Sc. Thesis Sharif University of Technology Mohammadi Nevisi, Maysam (Author) ; Mahmoudian, Ebadollah (Supervisor)
    Abstract
    The so-called intersection problem has been considered for many different combinatorial structures, including Latin squares. This intersection problem basically takes a pair of structures, with the same parameters and based on the same underlying set, and determines the possible number of common sub-objects (such as blocks, entries, etc.) which they may have. The intersection problem has also been extended from consideration of pairs of combinatorial structures to sets of three, or even sets of , where may be larger than 3. In this thesis, we study the related problem of determining, for all orders n, the set of integers k for which there exists = 4 Latin squares of order n having... 

    Intersection Theory of Moduli Space of Stable N-Pointed Curves of Genus Zero

    , M.Sc. Thesis Sharif University of Technology Hassani, Mahyar (Author) ; Jafari, Amir (Supervisor)
    Abstract
    A moduli spase consists in classifying geometric objects up tp equivalence relations and its point are in 1-1 corrospondence with equivalence classes. One of the most important moduli spaces in algebraic geometry is «moduli space of stable n-pointed curves of genus zero» which has many applications in mathematics and theoretical physics.In [10] Knudsen shows that for every n 3 there is a smooth projective variety Xn that is a moduli space for stable n-pointed curves of genus zero.In this thesis we study moduli spaces and introduce Xn and its relation with cross ratios. This way we show Xn is smooth projective variety and a fine moduli space. [5] After that we study a paper by Sean Keel. [9]... 

    Analysis and Improvement of Private Set Intersection Schemes

    , M.Sc. Thesis Sharif University of Technology Kavousi, Alireza (Author) ; Mohajeri, Javad (Supervisor) ; Salmasizadeh, Mahmoud (Co-Supervisor)
    Abstract
    Secure multi-party computation (MPC) enables a group of mutually distrustful parties to compute a joint and agreed upon function of their private inputs without disclosing anything but the corresponding output. One of the most important secure computation protocols is private set intersection (PSI). In PSI, often two or several parties wish to find the intersection of their sets without revealing other non-common elements. There exist some other variants of PSI protocol like PSI cardinality or threshold PSI which in the former only the cardinality of the intersection set is revealed and in the latter the intersection set is revealed if its cardinality is greater (less) than a certain value.... 

    Analytical relations for long-droplet breakup in asymmetric T junctions

    , Article Physical Review E - Statistical, Nonlinear, and Soft Matter Physics ; Volume 91, Issue 5 , May , 2015 ; 15393755 (ISSN) Bedram, A ; Moosavi, A ; Hannani, S. K ; Sharif University of Technology
    American Physical Society  2015
    Abstract
    We develop accurate analytical relations for the droplet volume ratio, droplet length during breakup process, and pressure drop of asymmetric T junctions with a valve in each of the branches for producing unequal-sized droplets. An important advantage of this system is that after manufacturing the system, the size of the generated droplets can be changed simply by adjusting the valves. The results indicate that if the valve ratio is smaller than 0.65, the system enters a nonbreakup regime. Also the pressure drop does not depend on the time and decreases by increasing the valve ratio, namely, opening the degree of valve 1 to valve 2. In addition, the results reveal that by decreasing... 

    Effects of boundary-layer bleed parameters on supersonic intake performance

    , Article Journal of Propulsion and Power ; Volume 31, Issue 3 , March , 2015 , Pages 826-836 ; 07484658 (ISSN) Soltani, M. R ; Younsi, J. S ; Farahani, M ; Sharif University of Technology
    American Institute of Aeronautics and Astronautics Inc  2015
    Abstract
    The performance and the buzz onset of a supersonic mixed-compression axisymmetric intake are experimentally investigated. Effectsof the slot bleed position, angle, and width onthe intake performance and onthe buzz initiation at three different Mach numbers of 1.8, 2.0, and 2.2 and at a zero degree angle of attack are studied. The intake performance is assessed using the total pressure recovery, mass flow ratio, flow distortion, and bleed mass flow ratio. The results show that applying the bleed at a position near the intake entrance and reducing the bleed entrance slant angle and width all improve the intake performance considerably. Moreover, these parameters postpone the buzz onset. In... 

    A ray tracing acceleration technique for wave propagation modeling

    , Article APMC 2009 - Asia Pacific Microwave Conference 2009, 7 December 2009 through 10 December 2009, Singapore ; 2009 , Pages 1100-1103 ; 9781424428021 (ISBN) Parsa, S ; Shishegar, A. A ; Sharif University of Technology
    IEEE  2009
    Abstract
    In this paper we deal with ray tracing acceleration problem in wave propagation simulation as a separate problem from its computer graphical counterpart and try to review accelerating techniques with this point of view. We build a classical kd-tree adapted to the special geometry of the problem. Then we mention the main differences between these two problems and devise algorithms that use these differences for accelerating intersection test in this problem even further  

    Practical method to predict an upper bound for minimum variance track-to-track fusion

    , Article IET Signal Processing ; Volume 11, Issue 8 , 2017 , Pages 961-968 ; 17519675 (ISSN) Zarei Jalalabadi, M ; Malaek, S. M. B ; Sharif University of Technology
    Abstract
    This study deals with the problem of track-to-track fusion in a sensor network when the correlation terms between the estimates of the agents are unknown. The proposed method offers an upper bound for the optimal minimum variance fusion rule through construction of the correlation terms according to an optimisation scheme. In general, the upper bound filter provides an estimate that is more conservative than the optimal estimate generated by the minimum variance fusion rule, while at the same time is less conservative than one obtained by the widely used covariance intersection method. From the geometrical viewpoint, the upper bound filter results in the inscribed largest volume ellipsoid... 

    Hierarchical optimal control of large-scale nonlinear chemical processes

    , Article ISA Transactions ; Volume 48, Issue 1 , January , 2009 , Pages 38-47 ; 00190578 (ISSN) Ramezani, M. H ; Sadati, N ; Sharif University of Technology
    2009
    Abstract
    In this paper, a new approach is presented for optimal control of large-scale chemical processes. In this approach, the chemical process is decomposed into smaller sub-systems at the first level, and a coordinator at the second level, for which a two-level hierarchical control strategy is designed. For this purpose, each sub-system in the first level can be solved separately, by using any conventional optimization algorithm. In the second level, the solutions obtained from the first level are coordinated using a new gradient-type strategy, which is updated by the error of the coordination vector. The proposed algorithm is used to solve the optimal control problem of a complex nonlinear...