Loading...
Search for: symmetrics
0.01 seconds
Total 140 records

    On the Spectrum of Modified Theories of Gravity

    , M.Sc. Thesis Sharif University of Technology Seraj, Ali (Author) ; Golshani, Mehdi (Supervisor) ; Sheikh Jabbari, Mohammad Mehdi (Supervisor)
    Abstract
    There are different approaches in modifications of General Relativity as the theory of gravity. The modified theories of gravity are important cases in this context, which mostly start by modifying the Einstein-Hilbert action, while keeping the general covariance. Within the modified theories of gravity, we consider two cases. The first is the f(R) theories of gravity, and the second is curvature squared theories of gravity with an action like S = ∫d4x pg( 116GR + (R)2 + R2 +(R)2). Curvature squared theories of gravity have interesting feautures, most important of which is renormalizability, in contrast with General Relativity. But this advantage, as noted by K.S. Stelle in 1977 comes at... 

    Cryptanalysis of Two Authenticated Encryption Schemes Pr∅st and NORX Introduced in CAESAR

    , M.Sc. Thesis Sharif University of Technology Mahmoudi, Ali (Author) ; Aref, Mohammad Reza (Supervisor) ; Mohajeri, Javad (Co-Advisor)
    Abstract
    The goal of authenticated encryption is to ensure confidentiality, integrity and authenti-cation of the messages simultaneously. The anouncement of CAESAR comptetition has attracted esearchers’ attention to this branch of symmetric cryptography, since 2014. 57 schemes have been introduced as the first round candidates of this competition, from which 29 where selected as second round candidates. Cryptanalysis of these schemes needs a lot of collective effort. In this thesis after describing preliminaries of authen- ticated encryption, general structure of the schemes and their reported cryptanalysis is reviewed. Then, the details of Pr∅st family of authenticated encryption, which is one of... 

    Determination of Discharge Coefficient for Sharp-edged Rectangular with Curvature Weirs Experimentally

    , M.Sc. Thesis Sharif University of Technology Rajabi Ahangary, Mehdi (Author) ; Borgheei, Sayyed Mahd (Supervisor) ; Abrishamchi, Ahmad (Co-Advisor)
    Abstract
    Sharp crested weirs are one of the main and oldest means of measuring discharge in water conveyance systems. Many studies have been done on sharp rectangular weirs and have provided many relationships regarding the effect of geometric parameters and various factors on discharge coefficient of the weirs.In some places, due to existence of obstacles or barriers in the channel, it is impossible to create a symmetrical continuous weir some other cases, multiple or asymmetric or curved weirs should be used, which is the main concept of this project. Since it seems unlikely that a purely mathematical model can review the impact of the multiplicity and asymmetry of these weirs without using... 

    Finite Element Formulation for Thermo-elastic Analysis of Functionally Graded Coating on Axisymmetric Shell Structures

    , M.Sc. Thesis Sharif University of Technology Ahmadi Kazemabadi, Abolfazl (Author) ; Hosseini Kordkheili, Ali (Supervisor) ; Zabihollah, Abolghasem (Co-Advisor)
    Abstract
    In this paper, a finite element formulation is presented to study the thermoelastic behavior of Functionally Graded (FG) axisymmetric coating in shell structures. The power law distribution model is assumed for the composition of the constituent materials in thickness direction. The Plasma Spray with multi steps coating method is considered for coating method. The procedure adopted to derive the finite element formulation contains the analytical through-the-thickness integration inherently. So the explicit through-the-thickness integration becomes possible after defining a two-noded, three parameters degenerated axisymmetric FG element. The nonlinear heat transfer equation is used for... 

    Counter-Measure Against Power Analysis Attacks Using Dual-Rail Logic in Reconfigurable Devices

    , M.Sc. Thesis Sharif University of Technology Kashiri, Jamaladdin (Author) ; Bayat Sarmadi, Siavash (Supervisor) ; Asadi, Hossein (Supervisor)
    Abstract
    Naïve hardware implementation of encryption modules can cause leakage about the secret information. Attackers can use this information to extract the secret key. This approach is known as side channel attack (SCA). An example of such attacks is differential power analysis (DPA), which uses a number of traces of power consumption of the encryption device. One of the proposed methods to deal with such attack is using dual rail logic. In previous implementations based on a dual rail logic, symmetric complementary mapping with the cross coupling and pre-charging is being used. This method has relatively high delay and cost; however, significant increase in the level of security can be achieved.... 

    Heegaard Floer Homology

    , M.Sc. Thesis Sharif University of Technology Salehi, Mohsen (Author) ; ahraini, Alireza (Supervisor)
    Abstract
    The main scope of this article is to identify Floer homology invariantsby means of Heegaard splitting of a 3-dimensional orientable manifoldY . Here by ” Heegaard splitting ” for Y , we mean decomposition Y =U ? U , where U and U are two balls with orientable g?handles,? ? ? ? ?gwich attached together on a closed oriented surface ? of boundary.gOne can identify this splitting by specifying two sets of oriented closedcurves ? = (? , ? , · · · , ? ) and ? = (? , ? , · · · , ? ) which live on ? .1 2 g 1 2 g gDesired invariants will be obtained by investigating g?order symmetricproducts of ? , denoted by SPg(? ) . in factT = ? × · · · × ? andg g ? 1 gT = ? × · · · × ? will play the role of... 

    Observer-free control of satellite attitude using a single vector measurement

    , Article IEEE Transactions on Aerospace and Electronic Systems ; Vol. 50, issue. 3 , 2014 , pp. 2070-2081 ; ISSN: 00189251 Safaei, F ; Namvar, M ; Sharif University of Technology
    Abstract
    The existing methods in attitude control of satellites are based on using the estimate of satellite attitude, which is usually generated by using multiple vector measurements. In this paper we propose an output feedback controller that directly uses a single vector measurement and does not use an attitude estimator. The output feedback gain is computed by solving a generalized Riccati differential equation (GRDE). The existence of a solution to the GRDE depends on a uniform controllability condition  

    Stress analysis in symmetric composite laminates subjected to shearing loads

    , Article International Journal of Mechanical Sciences ; Volume 75 , 2013 , Pages 16-25 ; 00207403 (ISSN) Mousanezhad viyand, D ; Yazdani Sarvestani, H ; Nosier, A ; Sharif University of Technology
    2013
    Abstract
    In the present study, an analytical solution is proposed to determine the interlaminar stresses in long symmetric laminated composite plates subjected to shearing loads. An improved first-order shear deformation theory (IFSDT) and a simplified IFSDT (SIFSDT) are utilized to calculate the unknown constants appearing in the reduced elasticity displacement field which actually demonstrate the global deformations of the plate. Then the numerical values of the interlaminar normal and shear stresses are established through the laminates by using Reddy's layerwise theory. Finally, several numerical examples are presented to study the interlaminar stresses in the interfaces of the layers and through... 

    Limit analysis of FGM circular plates subjected to arbitrary rotational symmetric loads using von-Mises yield criterion

    , Article Acta Mechanica ; Volume 224, Issue 8 , 2013 , Pages 1601-1608 ; 00015970 (ISSN) Baghani, M ; Fereidoonnezhad, B ; Sharif University of Technology
    2013
    Abstract
    In this paper, employing the limit analysis theorem, critical loading on functionally graded (FG) circular plate with simply supported boundary conditions and subjected to an arbitrary rotationally symmetric loading is determined. The material behavior follows a rigid-perfectly plastic model and yielding obeys the von-Mises criterion. In the homogeneous case, the highly nonlinear ordinary differential equation governing the problem is analytically solved using a variational iteration method. In other cases, numerical results are reported. Finally, the results are compared with those of the FG plate with Tresca yield criterion and also in the homogeneous case with those of employing the... 

    Key splitting for random key distribution schemes

    , Article Proceedings - International Conference on Network Protocols, ICNP ; 2012 ; 10921648 (ISSN) ; 9781467324472 (ISBN) Ehdaie, M ; Alexiou, N ; Ahmadian, M ; Aref, M. R ; Papadimitratos, P ; Sharif University of Technology
    2012
    Abstract
    A large number of Wireless Sensor Network (WSN) security schemes have been proposed in the literature, relying primarily on symmetric key cryptography. To enable those, Random Key pre-Distribution (RKD) systems have been widely accepted. However, WSN nodes are vulnerable to physical compromise. Capturing one or more nodes operating with RKD would give the adversary keys to compromise communication of other benign nodes. Thus the challenge is to enhance resilience of WSN to node capture, while maintaining the flexibility and low-cost features of RKD. We address this problem, without any special-purpose hardware, proposing a new and simple idea: key splitting. Our scheme does not increase... 

    Universal bounds on the scaling behavior of polar codes

    , Article IEEE International Symposium on Information Theory - Proceedings ; 2012 , Pages 1957-1961 ; 9781467325790 (ISBN) Goli, A ; Hassani, S. H ; Urbanke, R ; Sharif University of Technology
    IEEE  2012
    Abstract
    We consider the problem of determining the tradeoff between the rate and the block-length of polar codes for a given block error probability when we use the successive cancellation decoder. We take the sum of the Bhattacharyya parameters as a proxy for the block error probability, and show that there exists a universal parameter μ such that for any binary memoryless symmetric channel W with capacity I(W), reliable communication requires rates that satisfy R < I(W) - αN -1/μ, where α is a positive constant and N is the block-length. We provide lower bounds on μ, namely μ ≥ 3.553, and we conjecture that indeed μ = 3.627, the parameter for the binary erasure channel  

    Capacity of channel with energy harvesting transmitter

    , Article IET Communications ; Volume 9, Issue 4 , March , 2015 , Pages 526-531 ; 17518628 (ISSN) Ghanizade Bafghi, H ; Seyfe, B ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Institution of Engineering and Technology  2015
    Abstract
    The authors propose a new technique to model the arriving energy's knowledge (AEK) in the energy harvesting (EH) communication systems. They consider a batteryless EH transmitter with the AEK non-causally provided to it. They show that the capacity of the authors' model in general case, that is, discrete memoryless channel, can be derived through a binning scheme. This resembles a Gelfand-Pinsker type capacity formula which intuitively is the result of treating the energy as a channel state. Moreover, they investigate two especial cases of binary and Gaussian channels with the EH transmitters. In the binary symmetric channel with EH transmitter (BSCEH), their coding scheme leads to achieve... 

    Key splitting: Making random key distribution schemes resistant against node capture

    , Article Security and Communication Networks ; Volume 8, Issue 3 , 2015 , Pages 431-445 ; 19390114 (ISSN) Ehdaie, M ; Alexiou, N ; Ahmadian Attari, M ; Aref, M. R ; Papadimitratos, P ; Sharif University of Technology
    John Wiley and Sons Inc  2015
    Abstract
    A large number of random key pre-distribution (RKD) schemes have been proposed in the literature to secure wireless sensor network applications, relying on symmetric key cryptography. However, sensor nodes are exposed to physical compromise by adversaries, who target the symmetric keys stored at each node. With the stolen keys in their possession, the adversaries are then able to compromise communication links between benign nodes. Here, the big challenge arises: how to increase resilience of RKD schemes for wireless sensor networks to node capture, while maintaining the flexibility and low-cost features of RKD? We propose the idea of key splitting to address this problem, without the need... 

    Capacity of a class of symmetric relay networks with orthogonal components

    , Article IET Communications ; Volume 4, Issue 18 , 2010 , Pages 2181-2186 ; 17518628 (ISSN) Ghabeli, L ; Aref, M. R ; Sharif University of Technology
    2010
    Abstract
    In this study, the authors extend the concept of relay channel with orthogonal components to define a class of symmetric relay networks with orthogonal components named symmetric orthogonal relay network. In the defined network, the channels diverge from each node sender use different frequency bands whereas the channels converge to each node receiver use the same frequency band. This structure is very well understood in half-duplex transmission systems where the relays cannot send and receive at the same time or over the same frequency band. The authors show that the unicast capacity of the defined network is equal to the cut-set bound. In the achievability proof, the authors take advantage... 

    Foveated scanning: Dynamic monodimensional enlargement of resolved field of view in lenses of scanner systems

    , Article Applied Optics ; Volume 55, Issue 26 , 2016 , Pages 7314-7323 ; 1559128X (ISSN) Javaherian, F ; Rashidian, B ; Sharif University of Technology
    OSA - The Optical Society 
    Abstract
    An inconsistency between the circular symmetric geometry of conventional optical imagers and the geometry of long linear sensors used in today's line-scan cameras results in suboptimal separate design of optics and electronics of scanner systems. Based on the method of foveated optical imaging, a technique named foveated scanning (FS) is proposed in this paper. The FS technique is employed to enlarge the one-dimensional resolved field of view (RFOV) of conventional lenses and permits optimized performance on a line-of-interest in the image plane where the optoelectronic sensor is located. The achieved enlargement of RFOV is verified on a proof-of-concept basic telephoto lens. Both modulation... 

    Fault-tolerant spanners in networks with symmetric directional antennas

    , Article Theoretical Computer Science ; Volume 704 , 2017 , Pages 18-27 ; 03043975 (ISSN) Abam, M. A ; Baharifard, F ; Borouny, M. S ; Zarrabi Zadeh, H ; Sharif University of Technology
    Abstract
    Let P be a set of points in the plane, each equipped with a directional antenna that covers a sector of angle α and range r. In the symmetric model of communication, two antennas u and v can communicate to each other, if and only if v lies in u's coverage area and vice versa. In this paper, we introduce the concept of fault-tolerant spanners for directional antennas, which enables us to construct communication networks that retain their connectivity and spanning ratio even if a subset of antennas are removed from the network. We show how to orient the antennas with angle α and range r to obtain a k-fault-tolerant spanner for any positive integer k. For α≥π, we show that the range 13 for the... 

    Soap-film flow induced by electric fields in asymmetric frames

    , Article Physical Review E ; Volume 97, Issue 4 , 2018 ; 24700045 (ISSN) Mollaei, S ; Nasiri, M ; Soltanmohammadi, N ; Shirsavar, R ; Ramos, A ; Amjadi, A ; Sharif University of Technology
    American Physical Society  2018
    Abstract
    Net fluid flow of soap films induced by (ac or dc) electric fields in asymmetric frames is presented. Previous experiments of controllable soap film flow required the simultaneous use of an electrical current passing through the film and an external electric field or the use of nonuniform ac electric fields. Here a single voltage difference generates both the electrical current going through the film and the electric field that actuates on the charge induced on the film. The film is set into global motion due to the broken symmetry that appears by the use of asymmetric frames. If symmetric frames are used, the film flow is not steady but time dependent and irregular. Finally, we study... 

    Facile and green one-pot synthesis of fluorophore chromeno[4,3-b]quinolin-6-one derivatives catalyzed by halloysite nanoclay under solvent-free conditions

    , Article ChemistrySelect ; Volume 4, Issue 8 , 2019 , Pages 2301-2306 ; 23656549 (ISSN) Ataee Kachouei, T ; Nasr Esfahani, M ; Baltork, I. M ; Mirkhani, V ; Moghadam, M ; Tangestaninejad, S ; Kia, R ; Sharif University of Technology
    Wiley-Blackwell  2019
    Abstract
    In this study, we demonstrated a straightforward method for the easy access of chromeno[4,3-b]quinolin-6-ones via a one-pot three-component reaction of 4-hydroxycoumarin, aldehydes and aryl amines in the presence of halloysite nanoclay as an eco-friendly, inexpensive and green heterogeneous catalyst under solvent-free conditions. Moreover, symmetric and unsymmetric bis-chromeno[4,3-b]quinolin-6-ones were obtained from dialdehyde or diamines in good yields by this method. To date, this is the first report on the synthesis of symmetric and unsymmetric bis-chromeno[4,3-b]quinolin-6-ones via such a one-pot, multicomponent reaction. Some prepared chromeno[4,3-b]quinolin-6-ones displayed as... 

    A geometrical approach for configuration and singularity analysis of a new non-symmetric 2DOF 5R spherical parallel manipulator

    , Article Mechanism and Machine Theory ; Volume 147 , 2020 Alamdar, A. R ; Farahmand, F ; Behzadipour, S ; Mirbagheri, A. R ; Sharif University of Technology
    Elsevier Ltd  2020
    Abstract
    A new non-symmetric 5R-SPM is introduced and a geometrical approach is developed to analyze its configurations and singularities. The proposed methodology determines the type of configuration of a 5R-SPM, i.e. regular, singular, or out-of-workspace and also the type of singularity, i.e. instantaneous or finite, only based on geometric parameters and without solving verbose kinematic equations. It also provides insights into the workspace and singularities of 5R-SPMs, in the preliminary stage of design. The mechanism was analyzed by both the new geometrical approach and conventional methods for comparison. The geometrical approach could intuitively detect all the singularities observed by the... 

    Impossible differential attack on seven-round AES-128

    , Article IET Information Security ; Volume 2, Issue 2 , 2008 , Pages 28-32 ; 17518709 (ISSN) Bahrak, B ; Aref, M. R ; Sharif University of Technology
    2008
    Abstract
    A specific class of differential cryptanalytic approach, named as impossible differential attack, has been successfully applied to several symmetric cryptographic primitives in particular encryption schemes such as Advanced Encryption Standard (AES). Such attacks exploit differences that are impossible at some intermediate state of the cipher algorithm. The best-known impossible differential attack against AES-128 has applied to six rounds. An attack on AES-128 up to seven rounds is proposed. The proposed attack requires 2115.5 chosen plaintexts and 2109 bytes of memory and performs 2119 seven-round AES encryptions. This is also the best-known attack on a reduced version of the AES-128 till...