Loading...
Search for:
akhbari--b
0.093 seconds
Total 3078 records
Privacy analysis and improvements of two recent RFID authentication protocols
, Article 11th International ISC Conference on Information Security and Cryptology, ISCISC 2014 ; 3-4 September , 2014 , pp. 137-142 ; ISBN: 9781479953837 ; Abdolmaleki, B ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
2014
Abstract
Radio Frequency Identification (RFID) technology is being deployed at our daily life. Although RFID systems provide useful services to users, they can also threat the privacy and security of the end-users. In order to provide privacy and security for RFID users, different RFID authentication protocols have been proposed. In this study, we investigate the privacy of two recently proposed RFID authentication protocols. It is shown that these protocols have some privacy problems that cannot provide user privacy. Then, in order to enhance the privacy of these protocols, two improvements of analyzed protocols are proposed that provide RFID users privacy
ECG denoising using angular velocity as a state and an observation in an Extended Kalman Filter framework
, Article Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS ; 2012 , Pages 2897-2900 ; 1557170X (ISSN) ; 9781424441198 (ISBN) ; Shamsollahi, M. B ; Jutten, C ; Coppa, B ; Sharif University of Technology
2012
Abstract
In this paper an efficient filtering procedure based on Extended Kalman Filter (EKF) has been proposed. The method is based on a modified nonlinear dynamic model, previously introduced for the generation of synthetic ECG signals. The proposed method considers the angular velocity of ECG signal, as one of the states of an EKF. We have considered two cases for observation equations, in one case we have assumed a corresponding observation to angular velocity state and in the other case, we have not assumed any observations for it. Quantitative evaluation of the proposed algorithm on the MIT-BIH Normal Sinus Rhythm Database (NSRDB) shows that an average SNR improvement of 8 dB is achieved for an...
T wave alternans detection in ECG using extended kalman filter and dualrate EKF
, Article European Signal Processing Conference ; 1-5 September , 2014 , pp. 2500-2504 ; ISSN: 22195491 ; ISBN: 9780992862619 ; Shamsollahi, M. B ; Jutten, C ; Sharif University of Technology
2014
Abstract
T Wave Alternans (TWA) is considered as an indicator of Sudden Cardiac Death (SCD). In this paper for TWA detection, a method based on a nonlinear dynamic model is presented. For estimating the model parameters, we use an Extended Kalman Filter (EKF). We propose EKF6 and dualrate EKF6 approaches. Dualrate EKF is suitable for modeling the states which are not updated in all time instances. Quantitative and qualitative evaluations of the proposed method have been done on TWA challenge database. We compare our method with that proposed by Sieed et al. in TWA challenge 2008. We also compare our method with our previous proposed approach (EKF25-4obs). Results show that the proposed method can...
ECG fiducial points extraction by extended Kalman filtering
, Article 2013 36th International Conference on Telecommunications and Signal Processing, TSP 2013 ; 2013 , Pages 628-632 ; 9781479904044 (ISBN) ; Shamsollahi, M. B ; Jutten, C ; Sharif University of Technology
2013
Abstract
Most of the clinically useful information in Electrocardiogram (ECG) signal can be obtained from the intervals, amplitudes and wave shapes (morphologies). The automatic detection of ECG waves is important to cardiac disease diagnosis. In this paper, we propose an efficient method for extraction of characteristic points of ECG. The method is based on a nonlinear dynamic model, previously introduced for generation of synthetic ECG signals. For estimating the parameters of model, we use an Extendend Kalman Filter (EKF). By introducing a simple AR model for each of the dynamic parameters of Gaussian functions in model and considering separate states for ECG waves, the new EKF structure was...
Fiducial points extraction and characteristicwaves detection in ECG signal using a model-based bayesian framework
, Article ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings ; 2013 , Pages 1257-1261 ; 15206149 (ISSN) ; 9781479903566 (ISBN) ; Shamsollahi, M. B ; Jutten, C ; Sharif University of Technology
2013
Abstract
The automatic detection of Electrocardiogram (ECG) waves is important to cardiac disease diagnosis. A good performance of an automatic ECG analyzing system depends heavily upon the accurate and reliable detection of QRS complex, as well as P and T waves. In this paper, we propose an efficient method for extraction of characteristic points of ECG signal. The method is based on a nonlinear dynamic model, previously introduced for generation of synthetic ECG signals. For estimating the parameters of model, we use an Extendend Kalman Filter (EKF). By introducing a simple AR model for each of the dynamic parameters of Gaussian functions in model and considering separate states for ECG waves, the...
Comparison of ECG fiducial point extraction methods based on dynamic bayesian network
, Article 2017 25th Iranian Conference on Electrical Engineering, ICEE 2017, 2 May 2017 through 4 May 2017 ; 2017 , Pages 95-100 ; 9781509059638 (ISBN) ; Shamsollahi, M. B ; Jutten, C ; Sharif University of Technology
2017
Abstract
Cardiovascular diseases are one of the major causes of mortality in humans. One way to diagnose heart diseases and abnormalities is processing of cardiac signals such as electrocardiogram (ECG) signal. In many ECG analysis, location of peak, onset and offset of ECG waves must be extracted as a preprocessing step. These points are called ECG fiducial points (FPs) and convey clinically useful information. In this paper, we compare some FP extraction methods including three methods proposed recently by our research team. These methods are based on extended Kalman filter (EKF), hidden Markov model (HMM) and switching Kalman filter (SKF). Results are given for ECG signals of QT database. For all...
Fetal electrocardiogram R-peak detection using robust tensor decomposition and extended Kalman filtering
, Article Computing in Cardiology ; Volume 40 , 2013 , Pages 189-192 ; 23258861 (ISSN) ; 9781479908844 (ISBN) ; Niknazar, M ; Jutten, C ; Shamsollahi, M. B ; Rivet, B ; Sharif University of Technology
2013
Abstract
In this paper, we propose an efficient method for R-peak detection in noninvasive fetal electrocardiogram (ECG) signals which are acquired from multiple electrodes on mother's abdomen. The proposed method is performed in two steps: first, we employ a robust tensor decomposition-based method for fetal ECG extraction, assuming different heart rates for mother and fetal ECG; then a method based on extended Kalman filter (EKF) in which the ECG beat is modeled by 3 state equations (P, QRS and T), is used for fetal R-peak detection. The results show that the proposed method is efficiently able to estimate the location of R-peaks of fetal ECG signals. The obtained average scores of event 4 and 5 on...
Cryptanalysis of two EPC-based RFID security schemes
, Article 12th International ISC Conference on Information Security and Cryptology, 8 September 2015 through 10 September 2015 ; 2015 , Pages 116-121 ; 9781467376099 (ISBN) ; Baghery, K ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2015
Abstract
Radio Frequency Identification (RFID) is an easy to use technology for quick and low-cost identification and authentication. Since RFID systems have found in various parts of our daily lives, security awareness about these systems has become one of the prominent topics for researchers. In this study, we investigate two RFID security schemes which both are under Electronic Product Code (EPC) standard. It is shown that both the analyzed protocols have some drawbacks and are vulnerable to several security attacks including secret parameters reveal, impersonation, reader forward secrecy and also one of them does not provide date integrity. In addition, in order to overcome all the discovered...
Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standard
, Article 2016 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 111-116 ; 9781509034345 (ISBN) ; Baghery, K ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2017
Abstract
Recently, different RFID authentication protocols conforming to EPC Class 1 Generation 2 (EPC C1 G2) standard have been proposed. In 2013, Xiao et al. have proposed an improved mutual authentication protocol which claimed to eliminate the weaknesses of Yoon's protocol that has been proposed in 2012. In this paper, we study the security and the privacy of Xiao et al.'s protocol. It is shown that their protocol suffers from secret parameters reveal, tag impersonation attack, backward and forward traceability attacks. Then, in order to enhance the security and the privacy of this protocol, a modified version is proposed. In order to evaluate our proposed protocol, its security and privacy are...
ECG fiducial point extraction using switching Kalman filter
, Article Computer Methods and Programs in Biomedicine ; Volume 157 , 2018 , Pages 129-136 ; 01692607 (ISSN) ; Montazeri Ghahjaverestan, N ; Shamsollahi, M. B ; Jutten, C ; Sharif University of Technology
Elsevier Ireland Ltd
2018
Abstract
In this paper, we propose a novel method for extracting fiducial points (FPs) of the beats in electrocardiogram (ECG) signals using switching Kalman filter (SKF). In this method, according to McSharry's model, ECG waveforms (P-wave, QRS complex and T-wave) are modeled with Gaussian functions and ECG baselines are modeled with first order auto regressive models. In the proposed method, a discrete state variable called “switch” is considered that affects only the observation equations. We denote a mode as a specific observation equation and switch changes between 7 modes and corresponds to different segments of an ECG beat. At each time instant, the probability of each mode is calculated and...
ECG segmentation and fiducial point extraction using multi hidden Markov model
, Article Computers in Biology and Medicine ; Volume 79 , 2016 , Pages 21-29 ; 00104825 (ISSN) ; Shamsollahi, M. B ; Sayadi, O ; Armoundas, A. A ; Jutten, C ; Sharif University of Technology
Elsevier Ltd
2016
Abstract
In this paper, we propose a novel method for extracting fiducial points (FPs) of electrocardiogram (ECG) signals. We propose the use of multi hidden Markov model (MultiHMM) as opposed to the traditional use of Classic HMM. In the MultiHMM method, each segment of an ECG beat is represented by a separate ergodic continuous density HMM. Each HMM has different state number and is trained separately. In the test step, the log-likelihood of two consecutive HMMs is compared and a path is estimated, which shows the correspondence of each part of the ECG signal to the HMM with the maximum log-likelihood. Fiducial points are estimated from the obtained path. For performance evaluation, the Physionet...
Securing key exchange and key agreement security schemes for RFID passive tags
, Article 24th Iranian Conference on Electrical Engineering, ICEE 2016, 10 May 2016 through 12 May 2016 ; 2016 , Pages 1475-1480 ; 9781467387897 (ISBN) ; Baghery, K ; Akhbari, B ; Alavi, S. M ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2016
Abstract
In the last decade, various types of RFID security schemes have been proposed which have tried to provide all security and privacy requirements of end-users. In this paper, we cryptanalyze two new-found key exchange and key agreement security schemes which are proposed by Zhang et al. and Kim in 2012 and 2013 respectively. We present the reveal secret parameter, tag impersonation and traceability attacks on Zhang et al's protocol with success probability '1', and also we show that an attacker can impersonate the tag and the reader of Kim's protocol both with success probabilities '1/4'. We also present some modifications on the structure of studied schemes and propose two modified schemes...
The capacity region of the parallel partially cooperative relay broadcast channel with unmatched degraded subchannels
, Article 2009 IEEE International Symposium on Information Theory, ISIT 2009, Seoul, 28 June 2009 through 3 July 2009 ; 2009 , Pages 189-193 ; 21578102 (ISSN); 9781424443130 (ISBN) ; Mirmohseni, M ; Akhbari, B ; Firouzi, H ; Aref, M. R ; Sharif University of Technology
2009
Abstract
We investigate the parallel partially cooperative relay broadcast channel with unmatched degraded subchannels. We characterize the capacity region of this channel in the general setting that, transmitter sends a common message for both users and a private message for each of them. Our achievability result is based on the choosing appropriate parameters for the general achievable rate region of partially cooperative relay broadcast channel. We provide a converse proof for this achievable region as well, which establishes the capacity region.© 2009 IEEE
Application of independent component analysis for activation detection in functional magnetic resonance imaging (fMRI) data
, Article IEEE Workshop on Statistical Signal Processing Proceedings, 31 August 2009 through 3 September 2009, Cardiff ; 2009 , Pages 129-132 ; 9781424427109 (ISBN) ; Fatemizadeh, E ; Sharif University of Technology
2009
Abstract
In this extended summary, our aim is analyzing functional magnetic resonance imaging (fMRI) data by independent component analysis (ICA) in order to find regions of brain which were activated by neural activity in human brain. We employ the minimum description length (MDL) criterion to reduce the dimension of the data and estimate the number of components, which makes ICA work more efficiently. We also use a simple oscillating index method to select automatically the components of interest. MDL and oscillating index criteria have not already been used in applying ICA for analyzing fMRI data. In order to investigate the advantage of using MDL and oscillating index, we perform some experiments...
The performance comparison of improved continuous mixed P-norm and other adaptive algorithms in sparse system identification
, Article International Journal of Advanced Intelligence Paradigms ; 2020 , Pages 65-74 ; Volume 16, Issue 1 ; Ghaffari, A ; Sharif University of Technology
Inderscience Publishers
2020
Abstract
One of the essential usages of adaptive filters is in sparse system identification on which the performance of classic adaptive filters is not acceptable. There are several algorithms that designed especially for sparse systems; we call them sparsity aware algorithms. In this paper we studied the performance of two newly presented adaptive algorithms in which P-norm constraint is considered in defining cost function. The general title of these algorithms is continuous mixed P-norm (CMPN). The performances of these algorithms are considered for the first time in sparse system identification. Also the performance of l0 norm LMS algorithm is analysed and compared with our proposed algorithms....
Watermarking of still images in wavelet domain based on entropy masking model
, Article TENCON 2005 - 2005 IEEE Region 10 Conference, Melbourne, 21 November 2005 through 24 November 2005 ; Volume 2007 , 2005 ; 21593442 (ISSN); 0780393112 (ISBN); 9780780393110 (ISBN) ; Ghaemmaghami, S ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2005
Abstract
A new robust image adaptive digital watermarking algorithm in wavelet transform domain is proposed in this paper. The proposed method exploits Human Visual System (HVS) characteristics and entropy masking concept to determine image adaptive thresholds for selection of perceptually significant coefficients. The mark is embedded in the coefficients of all subbands including the LL subband. Experimental results show that the proposed method significantly improves watermarking performance over conventional methods, in the terms of invisibility and robustness
Watermarking of still images using multiresolution singular value decomposition
, Article 2005 International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2005, Hong Kong, 13 December 2005 through 16 December 2005 ; Volume 2005 , 2005 , Pages 325-328 ; 0780392663 (ISBN); 9780780392663 (ISBN) ; Ghaemmaghami, S ; Sharif University of Technology
IEEE Computer Society
2005
Abstract
A novel robust image-adaptive digital watermarking algorithm using Multi-Resolution Singular value Decomposition (MR-SVD) is proposed in this paper. The proposed method strengthens the watermark based on the concept of entropy masking, while meeting the mark imperceptibility requirement. Experimental results show that the proposed method improves watermarking performance over watermarking methods in wavelet domain transform, in terms of both invisibility and robustness. © 2005 IEEE
On the Capacity and Cooperative Strategies in Information Networks
,
Ph.D. Dissertation
Sharif University of Technology
;
Aref, Mohammad Reza
(Supervisor)
Abstract
Due to the remarkable growth in using communication networks such as ad-hoc, wireless and sensor networks, studying the building blocks of these networks (e.g., relay channel and interference channel) from information theoretic viewpoint and investigating cooperative strategies have recently received considerable attention. Also, owing to wide range of applications, state-dependent channels have been widely studied. In this dissertation, at first, we consider a state-dependent relay channel (SD-RC). For the cases wherein channel states are available causally or non-causally at different nodes, we propose new achievable rates for this channel using compress-and-forward strategy. Also we...
A new algorithm for fault location on transmission lines
, Article 2009 IEEE Power and Energy Society General Meeting, PES '09, Calgary, AB, 26 July 2009 through 30 July 2009 ; 2009 ; 9781424442416 (ISBN) ; Daniar, S ; Akhbari, M ; Sharif University of Technology
IEEE
2009
Abstract
In this paper, a new algorithm for fault detection/location on transmission line based on linear state estimation is presented. The proposed technique uses phasor measurements from PMU's. Fault location and voltage of fault point are added as the new state variables in a linear state estimator based on PMU data. In addition, by using the ability of bad data identification in the state estimation, a new scheme for fault location and identification of faulted transmission line is proposed. For test and validation of the proposed algorithm, simulation results on a six bus test case are presented. ©2009 IEEE
Inter-Beat and Intra-Beat ECG Interval Analysis Based on State Space and Hidden Markov Models
, Ph.D. Dissertation Sharif University of Technology ; Shamsollahi, Mohammad Bagher (Supervisor)
Abstract
Cardiovascular diseases are one of the major causes of mortality in humans. One way to diagnose heart diseases and abnormalities is processing of cardiac signals such as ECG.In many of these processes, inter-beat and intra-beat features of ECG signal must be extracted. These features include peak, onset and offset of ECG waves,meaningful intervals and segments that can be defined for ECG signal. ECG fiducial point (FP) extraction refers to identifying the location of the peak as well as the onset and offset of the P-wave,QRS complex and T-wave which convey clinically useful information. However, the precise segmentation of each ECG beat is a difficult task, even for experienced...