Loading...
Search for: azimi--mohammad-reza
0.13 seconds

    Impossible Differential Cryptanalysis of Lightweight Block Ciphers

    , M.Sc. Thesis Sharif University of Technology Azimi, Arash (Author) ; Aref, Mohammad Reza (Supervisor) ; Mohajeri, Javad (Co-Advisor)
    Abstract
    Due to the ever-increasing growth of the ubiquitous computing systems such as RFID, IoT, etc. and their important security concerns specially in the domain of user’s privacy, a great attention from the cryptology community is attracted to the design and analysis of lightweight primitives. Lightweight primitives, including block ciphers, hash functions, stream ciphers, and authenticated encryption schemes, are those ones that are specifically tailored to the devices with extreme limitations in power, area and cost. It is natural that the conventional rules for designing a typical all-purpose primitive can not be used here identically, and designers have to relax the conditions of some... 

    Conceptual Design and Study of Feasibility of a Compressed Air Driven Car

    , M.Sc. Thesis Sharif University of Technology Azimi, Arman (Author) ; Durali, Mohammad (Supervisor)
    Abstract
    Using clean and renewable energy as driving force for vehicles is becoming more and more important because of rising fuel prices and also environmental concerns. Using solar and wind power for direct use in vehicles seems impractical with today’s technology. Compressed air can serve as an intermediate medium to store energy and utilize it for running vehicles. The main purpose of this research was to conceptually design an air driven vehicle with acceptable performance in a city for everyday life. After a brief history, at first step advantages and disadvantages of using air as driving force of vehicle is studied. This study was carried out in different categories including cost, capability... 

    Shortcut Cryptanalysis of Symmetric Block Ciphers (Focusing on Differential and Impossible-Differential Cryptanalysis of ARX Ciphers)

    , Ph.D. Dissertation Sharif University of Technology Azimi, Arash (Author) ; Salmasizadeh, Mahmoud (Supervisor) ; Mohajeri, Javad (Supervisor) ; Aref, Mohammad Reza (Co-Supervisor)
    Abstract
    In this thesis, we analyze the security of symmetric block ciphers using shortcut cryptanalysis, mainly focusing on differential and impossible-differential cryptanalysis. The contributions of this thesis are twofold. First, we evaluate the security of 4 notable block ciphers named TEA, XTEA, Midori, and HIGHT using ad-hoc impossible-differential cryptanalysis in single-key settings. For each cipher, we introduce new impossible differentials in single-key settings, which are later used in the cryptanalysis. The results show that for all of the mentioned block ciphers, we are able to analyze the longest reduced-round versions of them in contrast to each of the previously mounted single-key... 

    , M.Sc. Thesis Sharif University of Technology Azimi, Saloomeh (Author) ; Maddah Hosseini, Hamid Reza (Supervisor)
    Abstract
    A biocompatible ferrofluid have been prepared by co-precipitation of FeCl2.4H2O and FeCl3.6H2O under ultrasonic irradiation and with NaOH as alkaline agent. Also cystein was used as capping agent in the solution. Magnetic properties of the produced ferrofluid then determined by VSM test and magnetite nanoparticles were characterized by XRD and TEM techniques. Results indicate the presence of a biocompatible superparamagnetic ferrofluid including magnetite nanoparticles with particle size ranging under 15 nm. The effect of ultrasonic irradiation on presence of a sharp particle size distribution then denoted by comparing the condition with production without ultrasonic irradiation  

    A misbehavior‐tolerant multipath routing protocol for wireless Ad hoc networks [electronic resource]

    , Article International Journal of Research in Wireless Systems (IJRWS) ; Vol. 2, Issue 9, pp. , Sep. 2013 Sedghi, H. (Haniyeh) ; Pakravan, Mohammad Reza ; Aref, Mohammad Reza ; Sharif University of Technology
    Abstract
    Secure routing is a major key to service maintenance in ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. As a result of the resource limitations in such networks nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a novel data redirection method to mitigate the impact of node misbehavior on network... 

    The Efect of Stress on Brain Connectivity in Experiments Related to Different Tasks

    , M.Sc. Thesis Sharif University of Technology Azimi, Motahareh (Author) ; Shamsollahi, Mohammad Bagher (Supervisor)
    Abstract
    Stress is an integral aspect of human experiences, manifesting in various situations such as tension, anxiety, and specific diseases. Researchers globally are exploring innovative approaches to control stress, aiming to quantify and detect it. The quantification of stress levels using brain signals is a prominent focus in the field of medical engineering.In most studies, the classification objective revolves around two classes (stress-relaxation) or three classes (stress levels). Typically, these studies employ databases inducing stress and recording brain signals uniformly. While various stress induction methods have been used, the resulting brain connections are less discussed.This project... 

    Analysis and Improvement of Intrusion Detection Methods in Data Network Routers

    , M.Sc. Thesis Sharif University of Technology Jamshidi, Mohammad Ali (Author) ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
    Abstract
    High-quality online services demand reliable and fast packet delivery at the network layer. However, clear evidence documents the existence of compromised routers in the ISP and enterprise networks, threatening network availability and reliability. A compromised router can stealthily drop, modify, inject, or delay packets in the forwarding path to launch Denial-of-Service, surveillance, man-in-the-middle attacks, etc. So researches tried to create intrusion detection methods to identify adversarial routers and switches. To this end, data-plane fault localization (FL) aims to identify faulty links and is an effective means of achieving high network availability. FL protocols use... 

    Topological Defects in Confined Nematics by Planar Anchoring

    , M.Sc. Thesis Sharif University of Technology Seyed Nejad, Reza (Author) ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Supervisor)
    Abstract
    Confining nematic liquid crystal between two curved boundary conditions while the nematic molecules have a degenerate planar anchoring leads to complex and beautiful textures of molecular disparagement(defect) in the bulk and on the surfaces. Such the liquid crystal shells are made with double-emulsion techniques in microfluidic devices have provided applications for micro-scale colloidal linkers.In this work, we have numerically minimized the elastic energy in one-constant approximation in present of Fournier’s degenerate surface potential with finite element method. The nematic shell is confined between two spherical surfaces that we have studied the final energies and their related... 

    Improvement of Routing Security in Ad Hoc Networks Against Several Attacks

    , M.Sc. Thesis Sharif University of Technology Sedghi, Hanie (Author) ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Supervisor)
    Abstract
    Secure routing is a major key to service maintenance in wireless ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. Wormhole attack is one of the most severe active attacks to mobile ad hoc networks. Noting the resource limitations in such networks, nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a... 

    Solving Symmetric Nonlinear Equations System Using BFGS Trust Region Quadratic Method

    , M.Sc. Thesis Sharif University of Technology Salimi, Samira (Author) ; Razvan, Mohammad Reza (Supervisor) ; Peyghami, Mohammad Reza (Supervisor)

    Design and Implementation of 2.5 Gbps Circuit Switching Fabric

    , M.Sc. Thesis Sharif University of Technology Jahani, Sohrab (Author) ; Pakravan, Mohammad Reza (Supervisor) ; Movahhedy, Mohammad Reza (Supervisor)
    Abstract
    Providing high bandwidth network infrastructures for ever increasing need of data transport is of great importance. The underling infrastructure for many communication services such as GSM/3G/4G mobile networks and Internet services is Synchronous Digital Hierarchy (SDH) optical transport systems. SDH are standardized protocols that multiplex multiple lower rate digital bit streams, such as E1 and Ethernet, and transfer them synchronously over optical fiber using lasers or LEDs. In addition to high data transfer rates, flexible network management and protection mechanisms have great importance, hence are part of SDH standards. In order to obtain flexible network architecture and protected... 

    Preserving Privacy in Smart Grid

    , M.Sc. Thesis Sharif University of Technology Vahedi, Erfaneh (Author) ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
    Abstract
    Development of Smart Grid and deployment of smart meters in large scale has raised a lot of concerns regarding customers’ privacy. Consequently, several schemes have been proposed to overcome the above mentioned issue. These schemes mainly rely on data aggregation as a method of protecting users’ privacy from the grid operators. However, the main problem with most of these schemes is the fact that they require a large amount of processing power at the meter side. This, together with the fact that smart meters don’t usually have a powerful processor, can cause the unavailability of smart meter data at the required time for operators of the grid, and at the same time disables smart meters from... 

    Effect of the Geometry of Colloidal Particles on Nematic Liquid Crystals

    , Ph.D. Dissertation Sharif University of Technology Hashemi, Masoumeh (Author) ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Co-Advisor)
    Abstract
    A liquid crystal is a state of matter composed of highly anisotropic building blocks. When liquid crystals are exposed to surfaces with given shapes and anchoring conditions, the orientation of their molecules gets spatially disordered and topological defects may form in the system. The interplay between liquid crystals and the geometry and topology of the colloidal particles has motivated extensive recent studies.In this thesis, we present the numerical modeling results for two faceted colloidal particles in a thermotropic nematic liquid crystal. To obtain the equilibrium nematic field with a finiteelement method, we numerically minimize the free energy of the system that based on the... 

    Solving Nonlinear Systems of Mixed Iqualities and Inequalities Via Trust Region Quadratic Methods

    , M.Sc. Thesis Sharif University of Technology Ghasemi, Shojaeddin (Author) ; Razvan, Mohammad Reza (Supervisor) ; Payghami, Mohammad Reza (Supervisor)

    Jamming Resilient Algorithms for Rendezvous in Cognitive Radio Networks

    , M.Sc. Thesis Sharif University of Technology Rezaei, Roohollah (Author) ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
    Abstract
    Dynamic spectrum access with the aid of cognitive radio (CR) technology is a viable solution to spectrum scarcity. There are many military and emergency applications that require the use of cognitive radio ad-hoc networks (CRAHNs). In these net- works, nodes must first find each other in a wide spectrum and then exchange their desired data. The process of finding each other in a multichannel environment is a challenging task and is usually known as rendezvous. Since rendezvous is the first step in communication, disrupting will disable the nodes from establishing proper communication sessions. That results in a drastic degrade in the performance of the network. Therefore, it is important to... 

    Numerical Study of Spray Impingement to Solid Wall

    , M.Sc. Thesis Sharif University of Technology Abbasi Chenari, Fatemeh (Author) ; Morad, Mohammad Reza (Supervisor) ; Jahannama, Mohammad Reza (Co-Supervisor)
    Abstract
    Spray-wall impingement is one of the phenomenon that associated in different subject such as spray cooling, combustion chamber and gas turbine. With the impingement of spray to the wall, liquid film begins to form. Wall film characteristics is still an important subject to study. Due to the various stages of liquid film formation from injection of spray till spray-wall impingement, the investigation of this phenomenon is far more complicated. This paper is meant to provide detailed data on spray-wall impingement and wall film formation physics with the help of computational analysis of OpenFOAM . A Lagrangian-Eulerian method based on discrete phase model (DPM) was employed to model... 

    An algorithm for finding a feasible solution of graph labeling problems [electronic resource]

    , Article Utilitas Mathematica Publishing Incorporated ; 2007, Vol. 72, pp. 163-174 Eshghi, K. (Kourosh) ; Azimi, Parham ; Sharif University Of Technology
    Abstract
    Graceful labeling is one of the best known labeling methods of graphs. Despite the large number of papers published on the subject of graph labeling, there are few particular techniques to be used by researchers to gracefully label graphs. In this paper, first a new approach based on the mathematical programming technique is presented to model the graceful labeling problem. Then a “branching method” is developed to solve the problem for special classes of graphs. Computational results show the efficiency of the proposed algorithm for different classes of graphs. One of the interesting results of our model is in the class of trees. The largest tree known to be graceful has at most 27 vertices... 

    Applications of mathematical programming in graceful labeling of graphs [electronic resource]

    , Article Journal of Applied Mathematics (Published by Hindawi) ; Vol. 10, No. 10, pp. 1-8 Eshghi, K. (Kourosh) ; Azimi, Parham ; Sharif University of Technology
    Abstract
    Graceful labeling is one of the best known labeling methods of graphs. Despite the large number of papers published on the subject of graph labeling, there are few particular techniques to be used by researchers to gracefully label graphs. In this paper, first a new approach based on the mathematical programming technique is presented to model the graceful labeling problem. Then a “branching method” is developed to solve the problem for special classes of graphs. Computational results show the efficiency of the proposed algorithm for different classes of graphs. One of the interesting results of our model is in the class of trees. The largest tree known to be graceful has at most 27 vertices... 

    Assessing and Improving Algorithms to Control the Propagation of Light through Scattering Media

    , M.Sc. Thesis Sharif University of Technology Fayyaz, Zahra (Author) ; Rahimitabar, Mohammad Reza (Supervisor) ; Nasiriavanaki, Mohammad Reza (Supervisor)
    Abstract
    Light propagation through turbid media, such as biological tissues, experience scattering due to inhomogeneous distribution of refractive indices of their microscopic structure. Scattering and diffusion of light not only limit many optical imaging techniques, but are also big challenges for telecommunication, spectroscopy, and other optical techniques. Recently many new imaging methods are developed that work in strongly scattering media such as optical coherence tomography, diffusion tomography, and laser speckle velocimetry. In this thesis, we have studied how wavefront shaping techniques can tackle the problem of scattering. By spatially shaping the wavefront of the incident beam, using... 

    Long Term Seasonal Rainfall and Streamflow Prediction using Regionalization of Ocean- Atmospheric Climatic Variables

    , M.Sc. Thesis Sharif University of Technology Azimi Bozchelouei, Mahmoud (Author) ; Agha Mohammad Hossein Tajrishi, Massoud (Supervisor)
    Abstract
    Due to water resources restriction and increase in water demand, optimum use of existing available resources is more essential. This needs accurate prediction of streamflow with lag time from one to several months. In recent decades identification of long term climate variables as predictors of hydrological process has made considerable evolution in climatic predictions and several studies have been made in this field. In this research streamflow volume of Dez Dam in dry season (April to August) has been predicted by using multiple regression models and considering seasonal rainfall data, climate indices and ocean-atmospheric variables including surface temperature of adjacent seas and...