Loading...
Search for: mobility
0.01 seconds
Total 736 records

    Security Analysis of an Offline Mobile Micro-Payment System

    , M.Sc. Thesis Sharif University of Technology Foroutan, Fouzhan (Author) ; Goudarzi, Maziar (Supervisor)
    Abstract
    Mobile payment has already become an integral part of modern life for daily banking needs. Many payment systems are now providing financial services to customers. Most of these systems need and rely on online network access to provide their services. On the other hand, there are many regions in the world that have no network access or the network quality is poor with intermittent failures. Customers in these areas are unable to transfer money or buy goods and pay for it using their mobile devices by such above systems. This motivated us to find a way for transferring money without need for network availability. As a result we devised an offline peer-to peer mobile payment system (MobiPOS).... 

    Covid-19 & Income Mobility in Iran

    , M.Sc. Thesis Sharif University of Technology Mehri Khonakdari, Reza (Author) ; Keshavarz Haddad, Gholamreza (Supervisor)
    Abstract
    During the covid-19 pandemic, in many countries, women's employment sector received more impact than men's. Some researchers consider this incident due to a decrease in the supply of women due to the closure of childcare centers and absenteeism in schools. Some consider this to be due to a reduction in the demand for women's labor due to the damage to the service sector. In this research, using the transition matrix, we showed that, during the epidemic period, the households in which women were employed in the pre-epidemic period (first group) had a greater reduction in income mobility than the households in which only men were employed (second group). Then, using the ordered logit of... 

    Exploring Public Perception of Justice in Mobility Transitions: Evidence from a Bicycle Sharing System in Iran

    , M.Sc. Thesis Sharif University of Technology Khajehpour, Bahareh (Author) ; Miremadi, Iman (Supervisor)
    Abstract
    Globally, bicycle sharing is one of the fast-growing solutions to climate change in the transport sector. However, what inequities may be reflected, exacerbated, or arose from its adoption and use? Relying on a qualitative research design involving interviews with bicycle sharing users, non-adopters, and daily observers of the cycling infrastructure (N = 36), site visits, and a literature review, we examine distributive, procedural, and recognition injustices in association with Bdood, an operating BSS in Iran, a developing country that allows for less-documented types of injustice to arise. In doing so, we utilize a comprehensive transport/mobility justice framework, drawn from the fields... 

    Evaluation and design of beaconing in mobile wireless networks

    , Article Ad Hoc Networks ; Vol. 9, issue. 3 , 2011 , p. 368-386 ; ISSN: 15708705 Nayebi, A ; Karlsson, G ; Sarbazi-Azad, H ; Sharif University of Technology
    Abstract
    One of the intrinsic problems of mobility in wireless networks is the discovery of mobile nodes. A widely used solution for this problem is to use different variations of beacons, such as hello packets. Although a poorly designed beaconing scheme may lead to unnecessary energy usage or poor throughput, a systematic approach to analyze and select beaconing parameters is not provided in the literature. Here, we propose a model to study the beaconing efficiency using some measures such as the link lifetime, the probability of link establishment, and the delay to discover a new neighbor. The model is general and does not adhere to any particular mobility model; the only input from the mobility... 

    A novel probabilistic key management algorithm for large-scale MANETs

    , Article Proceedings - 27th International Conference on Advanced Information Networking and Applications Workshops ; 2013 , Pages 349-356 ; 9780769549521 (ISBN) Gharib, M ; Emamjomeh Zadeh, E ; Norouzi Fard, A ; Movaghar, A ; Sharif University of Technology
    2013
    Abstract
    Mobile ad hoc networks (MANETs) have become very interesting during last years, but the security is the most important problem they suffer from. Asymmetric cryptography is a very useful solution to provide a secure environment in multihop networks where intermediate nodes are able to read, drop or change messages before resending them. However, storing all keys in every node by this approach is inefficient, if practically possible, in large-scale MANETs due to some limitations such as memory or process capability. In this paper, we propose a new probabilistic key management algorithm for large-scale MANETs. To the best of our knowledge, this is the first method which probabilistically uses... 

    Cloud computing based technologies, applications and structure in U-learning

    , Article Proceedings 2012 17th IEEE International Conference on Wireless, Mobile and Ubiquitous Technology in Education, WMUTE 2012, 27 March 2012 through 30 March 2012 ; March , 2012 , Pages 196-198 ; 9780769546629 (ISBN) Ghazizadeh, A ; Manouchehry, M ; Sharif University of Technology
    2012
    Abstract
    This article mainly focuses on the characteristic, technologies and applications of cloud computing in mobile and electronic learning, and analyzes the features of this concept. We firstly tried to clarify the meaning of cloud computing as well as its features, secondly, proposed different models of using cloud computing in different learning environments, including web-based learning, mobile video learning and observational learning  

    Effect of traffic-load dependent vehicle routing algorithm on the connectivity in VANETs

    , Article IEEE Vehicular Technology Conference, 15 May 2011 through 18 May 2011 ; May , 2011 , Page(s): 1 - 5 ; 15502252 (ISSN) ; 9781424483310 (ISBN) Kazerooni, A ; Ashtiani, F ; Sharif University of Technology
    2011
    Abstract
    In this paper, we evaluate how traffic-load dependent vehicle routing at intersections is able to improve the connectivity status of all streets. To this end, we consider a VANET scenario, comprised of several streets and intersections. Then, we focus on two vehicle routing algorithms, one based on the distance to destination, i.e., traffic-load independent (TLI) algorithm, and another one based on both distance to destination and traffic load status of the local streets, i.e., traffic-load dependent (TLD) algorithm. By employing a simple mobility model based on an open BCMP queueing network, we derive the spatial traffic distribution at two cases. Afterwards, we propose a simple algorithm... 

    Verification of mobile ad hoc networks: An algebraic approach

    , Article Theoretical Computer Science ; Volume 412, Issue 28 , June , 2011 , Pages 3262-3282 ; 03043975 (ISSN) Ghassemi, F ; Fokkink, W ; Movaghar, A ; Sharif University of Technology
    2011
    Abstract
    We introduced Computed Network Process Theory to reason about protocols for mobile ad hoc networks (MANETs). Here we explore the applicability of our framework in two regards: model checking and equational reasoning. The operational semantics of our framework is based on constrained labeled transition systems (CLTSs), in which each transition label is parameterized with the set of topologies for which this transition is enabled. We illustrate how through model checking on CLTSs one can analyze mobility scenarios of MANET protocols. Furthermore, we show how by equational theory one can reason about MANETs consisting of a finite but unbounded set of nodes, in which all nodes deploy the same... 

    Improving security issues in MANET AODV routing protocol

    , Article Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 1 September 2015 through 2 September 2015 ; Volume 155 , November , 2015 , Pages 237-250 ; 18678211 (ISSN) ; 9783319250663 (ISBN) Gharehkoolchian, M ; Hemmatyar, A. M. A ; Izadi, M ; Sharif University of Technology
    Springer Verlag  2015
    Abstract
    Mobile Ad-hoc Networks (MANETs) are forming dynamically by joining or leaving the nodes into/from the network without any fix infrastructure. It is also possible that each mobile node act as a host or router. This kind of wireless network is prone to various security threats or attacks due to its unique characteristics like dynamic topology, open medium, lack of central monitoring, etc. So security is a vital scope in MANET to protect communication between mobile nodes. Ad-hoc On-demand Distance Vector (AODV) is one of the on-demand reactive routing protocols in MANET that initially was improved without considering security protection. Significant attempts have been done to secure AODV... 

    A distributed truthful routing protocol for mobile ad hoc networks

    , Article Proceedings of ICCIA 2010 - 2010 International Conference on Computer and Information Application, 2 November 2010 through 4 November 2010, Tianjin ; 2010 , Pages 133-140 ; 9781424485963 (ISBN) Shirzad, F ; Movaghar, A ; Shirzadeh, E ; Sharif University of Technology
    2010
    Abstract
    In Mobile Ad hoc Networks (MANETs), nodes depend on each other for routing and forwarding their packets. However, to save power and other resources, nodes belonging to independent authorities may behave selfishly, and not cooperate in network activities. Such selfish behaviour poses a real threat to the proper functioning of MANETs. To cope with this situation, a motivation stimulation mechanism is required to provide sufficient incentives for nodes to forward other nodes' packets. One appropriate approach is to have network nodes pay in order to motivate them to cooperate with the protocol. To achieve truthfulness, the payment should be based on the cost of transmission of packets. Since... 

    Investigation of breakdown voltage in InAIAs/InGaAs/InP HEMTs with different structures

    , Article IEICE Electronics Express ; Volume 7, Issue 19 , 2010 , Pages 1447-1452 ; 13492543 (ISSN) Ohadi, S ; Faez, R ; Hoseini, H. R ; Sharif University of Technology
    Abstract
    InAlAs/InGaAs/InP high electron mobility transistors have higher mobility comparing to structures without indium. But existence of indium causes smaller Eg and as a result smaller breakdown voltage. However, increasing percentage of indium results in higher mobility and as a result higher current and transconductance. Therefore decreasing percentage of indium causes higher breakdown voltage at the sometime lower transconductance. One of the most important parameters that limit maximum output power of transistor is breakdown voltage. In this paper, InAIAs/InGaAs/InP HEMTs with different structures are simulated and a structure with a good transconductance and breakdown voltage is introduced  

    On social-aware content caching for D2D-enabled cellular networks with matching theory

    , Article IEEE Internet of Things Journal ; 2017 ; 23274662 (ISSN) Li, J ; Liu, M ; Lu, J ; Shu, F ; Zhang, Y ; Bayat, S ; Jayakody, D. N. K ; Sharif University of Technology
    Abstract
    In this paper, the problem of content caching in 5G cellular networks relying on social-aware device-to-device (D2D) communications is investigated. Our focus is on how to efficiently select important users (IUs) and how to allocate content files to the storage of these selected IUs to form a distributed caching system. We aim at proposing a novel approach for minimizing the downloading latency and maximizing the social welfare simultaneously. In particular, we first model the problem of maximizing the social welfare as a many-to-one matching game based on the social property of mobile users. We study this game by exploiting users’ social properties to generate the utility functions of the... 

    A Hitchhiker's guide to computation offloading: Opinions from practitioners

    , Article IEEE Communications Magazine ; Volume 55, Issue 7 , 2017 , Pages 193-199 ; 01636804 (ISSN) Golkarifard, M ; Yang, J ; Movaghar, A ; Hui, P ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    Due to the increasing usage and capabilities of smart devices, mobile application developers build a large number of resource intensive applications, such as WAR applications. Even with the rapid development in hardware technology, the computing capability and battery capacity on wearable devices and smartphones still cannot meet the application demands with heavy computations and high battery drain. Pervasive computing addresses this problem by migrating applications to the resource providers external to mobile devices. The profitability of this method heavily depends on how to implement it and when to use it. Although there are many computation offloading systems proposed in the... 

    Anonymous authentication protocol for GSM networks

    , Article International Journal of Security and Networks ; Volume 3, Issue 1 , 2008 , Pages 54-62 ; 17478405 (ISSN) Asadpour, M ; Sattarzadeh, B ; Movaghar, A ; Sharif University of Technology
    Inderscience Publishers  2008
    Abstract
    In this paper, we propose a new anonymous channel protocol for authentication in GSM mobile communication networks. The protocol is the result of incorporating our anonymity scheme to an efficient GSM authentication protocol proposed by Chang et al. As a result, our protocol has all the features of their scheme including anonymity. Compared with the most recent protocols in this area, such as those by Peinado and Hwang et al., we show that our scheme generally is more secure and more efficient. © 2008, Inderscience Publishers  

    Non-fixed scatterers and their effects on MIMO multicarrier fading communication channels

    , Article 50th Annual IEEE Global Telecommunications Conference, GLOBECOM 2007, Washington, DC, 26 November 2007 through 30 November 2007 ; December , 2007 , Pages 3765-3769 ; 1424410436 (ISBN); 9781424410439 (ISBN) Saligheh Rad, H ; Gazor, S ; Shariatpanahi, P ; Sharif University of Technology
    2007
    Abstract
    There are two types of scatterers in a multipath propagation environment: fixed and non-fixed scatterers. Fixed scatterers like buildings, mountains and tree stems do not move, while non-fixed (moving) scatterers like cars, people and tree leaves move from their initial positions. In addition to different movements of the mobile station (MS) that cause different kinds of Doppler fading, movements of non-fixed scatterers are also anticipated to generate other kinds of fading/correlation. This fading changes depend on the type of the propagation environment and the type of movements of local surrounding scatterers. In this paper we characterize these effects in terms of temporal correlations.... 

    Improved user identity confidentiality for UMTS mobile networks

    , Article ECUMN 2007: Fourth European Conference on Universal Multiservice Networks, Toulouse, 14 February 2007 through 16 February 2007 ; 2007 , Pages 401-409 ; 076952768X (ISBN); 9780769527680 (ISBN) Sattarzadeh, B ; Asadpour, M ; Jalili, R ; Sharif University of Technology
    2007
    Abstract
    In UMTS mobile networks, there are some circumstances that the International Mobile Subscriber Identity (IMSI) of a user is conveyed in clear-text over the radio interface. Such situations violate the anonymity of users. In this paper, we introduce an Improved User Identity Confidentiality (IUIC) mechanism which attempts to avoid the drawback and makes users more anonymous. We give the role of IMSI to anonymous tickets in such a way that IMSI is never exposed on the radio interface or over any other link. Our IUIC mechanism, employs symmetric cryptography based on the existing network access security features of UMTS. Its implementation, security, and performance issues are also considered.... 

    Stealth steganography in SMS

    , Article 2006 IFIP International Conference on Wireless and Optical Communications Networks, Bangalore, 11 April 2006 through 13 April 2006 ; 2006 ; 1424403405 (ISBN); 9781424403400 (ISBN) Shahreza, M. S ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    The short message service, abbreviated to SMS, is one of the services used in mobile phones and has been warmly welcomed by the public throughout the world, esp. in Asia and Europe. Using this service, individuals can write and send to each other short messages and also black and white pictures. On the one hand, considering the issue of information security and esp. establishing hidden communications, many methods have been presented for hidden communications, among which steganography is a relatively new one. Combining steganography of data in picture and using pictures in SMS messages, this article proposes a method for hidden exchange of information. The main focus of this article is on... 

    Planning of dynamic compensation manipulator motions for stability enhancement of mobile manipulators by soft computing

    , Article 2006 ASME International Mechanical Engineering Congress and Exposition, IMECE2006, Chicago, IL, 5 November 2006 through 10 November 2006 ; 2006 ; 10716947 (ISSN); 0791837904 (ISBN); 9780791837900 (ISBN) Ghaffari, A ; Naderi, D ; Meghdari, A ; Eslami, S ; Sharif University of Technology
    American Society of Mechanical Engineers (ASME)  2006
    Abstract
    Mobile manipulators are developed in order to execute separately in various regions where there is not possibility for human to appear there. Recently, the size of mobile manipulators has been decreased according to their given tasks. For such systems, the stability issue is very important. The robot system should be able to keep itself in an optimal situation. For reaching to this goal, one can use a redundant degree of freedom for the mobile manipulator such that this redundancy makes it possible to recover the system's stability by dynamic compensatory motion of manipulator when the system is unstable. In this paper, we present an algorithm which is fast enough to stabilize the mobile... 

    Stability enhancement of mobile manipulators via soft computing

    , Article International Journal of Advanced Robotic Systems ; Volume 3, Issue 3 , 2006 , Pages 191-198 ; 17298806 (ISSN) Ghaffari, A ; Meghdari, A ; Naderi, D ; Eslami, S ; Sharif University of Technology
    InTech Europe  2006
    Abstract
    Nowadays the size and dimension of mobile manipulators have been decreased for being usable in various regions. This leads several problems such as danger of instability. Therefore, many researches have been done to overcome the problem of overturning of a mobile manipulator. In this paper, an algorithm for increasing the stability of a mobile manipulator is presented based on the optimization of a performance index. The path of vehicle and the desired task of the end-effector are predefined. In order to apply the optimal stability criterion, it is more convenient that the manipulator be of a redundant. Considering the interaction between the vehicle and the manipulator and using the genetic... 

    Dynamics modeling of "CEDRA" rescue robot on uneven terrain

    , Article Scientia Iranica ; Volume 13, Issue 3 , 2006 , Pages 272-283 ; 10263098 (ISSN) Meghdari, A ; Mahboobi, S. H ; Gaskarimahalle, A. L ; Sharif University of Technology
    Sharif University of Technology  2006
    Abstract
    This paper presents an effective approach for kinematic and dynamic modeling of high mobility Wheeled Mobile Robots (WMR). As an example of these robots, the method has been applied to the CEDRA rescue robot, which is a complex, multibody mechanism. The model is derived for 6-DOF motions, enabling movements in x, y and z directions, as well as for roll, pitch and yaw rotations. Forward kinematics equations are derived using the Denavit-Hartenberg method and Jacobian matrices for the wheels. Moreover, the inverse kinematics of the robot are obtained and solved for the wheel velocities and steering commands, in terms of the desired velocity, heading and measured link angles. Finally, the...