Loading...
Search for:
barzegar--mohammad-reza
0.236 seconds
Total 6401 records
A misbehavior‐tolerant multipath routing protocol for wireless Ad hoc networks [electronic resource]
, Article International Journal of Research in Wireless Systems (IJRWS) ; Vol. 2, Issue 9, pp. , Sep. 2013 ; Pakravan, Mohammad Reza ; Aref, Mohammad Reza ; Sharif University of Technology
Abstract
Secure routing is a major key to service maintenance in ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. As a result of the resource limitations in such networks nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a novel data redirection method to mitigate the impact of node misbehavior on network...
Growth of Two-Dimensional Molybdenum Disulfide Structures for Gas Sensing Application
, Ph.D. Dissertation Sharif University of Technology ; Irajizad, Azam (Supervisor) ; Asgari, Reza (Supervisor)
Abstract
Molybdenum disulfide (MoS2) nanoflakes, a two-dimensional crystal with tunable bandgap depends on number of layers, is a promising candidate for future nanoelectronic devices. In the present research, flower shaped MoS2 nanoflakes have been synthesized via hydrothermal method. As part of the research, the growth of triangular MoS2 monolayer up to 10 micrometers has optimized by carring out several chemical vapor deposition experiments with varying deposition parameters. The prepared samples were characterized using optical, scanning electron, and atomic force microscopes, x-ray diffraction analysis, and Raman spectroscopy. Based on the experimental results, the growth mechanism has been...
Unit Groups Of Central Simple Algebras And Their Frattini Subgroups
, M.Sc. Thesis Sharif University of Technology ; Mahdavi Hezavehi, Mohammad (Supervisor)
Abstract
Given a finite dimensional F-central simple algebra A = Mn(D),the connection between the Ferattini subgroup (A) and (F) via Z(A′), the center of the derived group of A , is investigated. Setting G = F \(A), it is shown that (F)Z(A′ ) G (\pFp)Z(A′)where the intersection is taken over primes p not dividing the degree of A. Furthermore ,when F is a local or global field, the group G is completely determined. Using the above connection, (A) is also calculated for some particular division rings D
Study and Simulation of Nanoparticles Translocation through Cell Membrane
, M.Sc. Thesis Sharif University of Technology ; Nejat Pishkenari, Hossein (Supervisor)
Abstract
In this research, we aim to study and simulate how nanoparticels translocate through cell membrane. For this purpose, at first a gold nanoparticle is selected as the drug carrier. The partial charges of the ligands are calculated using quantum mechanics based on HF technique with 6-31Gd basis set. To have a realistic shape for nano drug, number and arrangement of ligands are determined based on optimization. After all atom simulations and comparison of results such as diffusion coefficient with experiments, a coarse-grained model of these drugs is created and put inside solvent beside a membrane. The cytoplasmic membrane includes more than 60 types of phospholipids like animal membranes....
Key Dependent Message Security in Cryptography
, M.Sc. Thesis Sharif University of Technology ; Khazaei, Shahram (Supervisor)
Abstract
Key-Dependent Message(KDM) security was introduced as a type of security in which the security of a cryptographic scheme is maintained even when the encrypted key of the scheme or a function of it is given to an attacker. Several approaches for expanding this type of security include extending the family of functions for which the scheme holds KDM security, enhancing the level of security from a Chosen Plaintext Attack(CPA) to a Chosen Ciphertext Attack(CCA) in a scheme that has KDM security, and extending this type of security to other cryptographic primitives. Among the main ideas in this area are the connection between this type of security and Randomized Encoding(RE) in order to expand...
Key Dependent Message Security in Cryptography
, M.Sc. Thesis Sharif University of Technology ; Khazaei, Shahram (Supervisor)
Abstract
Key-Dependent Message(KDM) security was introduced as a type of security in which the security of a cryptographic scheme is maintained even when the encrypted key of the scheme or a function of it is given to an attacker. Several approaches for expanding this type of security include extending the family of functions for which the scheme holds KDM security, enhancing the level of security from a Chosen Plaintext Attack(CPA) to a Chosen Ciphertext Attack(CCA) in a scheme that has KDM security, and extending this type of security to other cryptographic primitives. Among the main ideas in this area are the connection between this type of security and Randomized Encoding(RE) in order to expand...
The Dependence Structure of Negatively Dependence Measures
, Ph.D. Dissertation Sharif University of Technology ; Alishahi, Kasra (Supervisor) ; Zamani, Mohammad Sadegh (Co-Supervisor)
Abstract
Strongly Rayleigh measures are an important class of negatively dependent (repulsive) probability measures. These measures are defined via a geometric condition, called “real stability”, on their generating polynomials, and have interesting probabilistic properties. On one important property of negatively dependent measures is their rigid dependence structure. In other words, the it is impossible for these measures to have strong overall dependencies. In this thesis, we study two manifestations if this phenomenon: (1) paving property and (2) tail triviality. Informally, the paving property states that it is possible to partition the set of the components of every strongly Rayleigh random...
Analysis and Improvement of Intrusion Detection Methods in Data Network Routers
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
Abstract
High-quality online services demand reliable and fast packet delivery at the network layer. However, clear evidence documents the existence of compromised routers in the ISP and enterprise networks, threatening network availability and reliability. A compromised router can stealthily drop, modify, inject, or delay packets in the forwarding path to launch Denial-of-Service, surveillance, man-in-the-middle attacks, etc. So researches tried to create intrusion detection methods to identify adversarial routers and switches. To this end, data-plane fault localization (FL) aims to identify faulty links and is an effective means of achieving high network availability. FL protocols use...
Topological Defects in Confined Nematics by Planar Anchoring
, M.Sc. Thesis Sharif University of Technology ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Supervisor)
Abstract
Confining nematic liquid crystal between two curved boundary conditions while the nematic molecules have a degenerate planar anchoring leads to complex and beautiful textures of molecular disparagement(defect) in the bulk and on the surfaces. Such the liquid crystal shells are made with double-emulsion techniques in microfluidic devices have provided applications for micro-scale colloidal linkers.In this work, we have numerically minimized the elastic energy in one-constant approximation in present of Fournier’s degenerate surface potential with finite element method. The nematic shell is confined between two spherical surfaces that we have studied the final energies and their related...
Solving Symmetric Nonlinear Equations System Using BFGS Trust Region Quadratic Method
, M.Sc. Thesis Sharif University of Technology ; Razvan, Mohammad Reza (Supervisor) ; Peyghami, Mohammad Reza (Supervisor)Effect of the Geometry of Colloidal Particles on Nematic Liquid Crystals
, Ph.D. Dissertation Sharif University of Technology ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Co-Advisor)
Abstract
A liquid crystal is a state of matter composed of highly anisotropic building blocks. When liquid crystals are exposed to surfaces with given shapes and anchoring conditions, the orientation of their molecules gets spatially disordered and topological defects may form in the system. The interplay between liquid crystals and the geometry and topology of the colloidal particles has motivated extensive recent studies.In this thesis, we present the numerical modeling results for two faceted colloidal particles in a thermotropic nematic liquid crystal. To obtain the equilibrium nematic field with a finiteelement method, we numerically minimize the free energy of the system that based on the...
Design and Implementation of 2.5 Gbps Circuit Switching Fabric
, M.Sc. Thesis Sharif University of Technology ; Pakravan, Mohammad Reza (Supervisor) ; Movahhedy, Mohammad Reza (Supervisor)
Abstract
Providing high bandwidth network infrastructures for ever increasing need of data transport is of great importance. The underling infrastructure for many communication services such as GSM/3G/4G mobile networks and Internet services is Synchronous Digital Hierarchy (SDH) optical transport systems. SDH are standardized protocols that multiplex multiple lower rate digital bit streams, such as E1 and Ethernet, and transfer them synchronously over optical fiber using lasers or LEDs. In addition to high data transfer rates, flexible network management and protection mechanisms have great importance, hence are part of SDH standards. In order to obtain flexible network architecture and protected...
Preserving Privacy in Smart Grid
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
Abstract
Development of Smart Grid and deployment of smart meters in large scale has raised a lot of concerns regarding customers’ privacy. Consequently, several schemes have been proposed to overcome the above mentioned issue. These schemes mainly rely on data aggregation as a method of protecting users’ privacy from the grid operators. However, the main problem with most of these schemes is the fact that they require a large amount of processing power at the meter side. This, together with the fact that smart meters don’t usually have a powerful processor, can cause the unavailability of smart meter data at the required time for operators of the grid, and at the same time disables smart meters from...
Improvement of Routing Security in Ad Hoc Networks Against Several Attacks
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Supervisor)
Abstract
Secure routing is a major key to service maintenance in wireless ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. Wormhole attack is one of the most severe active attacks to mobile ad hoc networks. Noting the resource limitations in such networks, nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a...
Computational Study on the Evaluation of Antihemophilic Factors Effect on Clot Formation
, M.Sc. Thesis Sharif University of Technology ; Assempour, Ahmad (Supervisor) ; Ahmadian, Mohammad Taghi (Supervisor)
Abstract
Many heart attacks and strokes are caused by improper clot formation in the vascular system. Mathematical understanding of the clot formation process and the influence of various factors in the clot formation process is very important. In this study, the aim is to simulate and understand the clotting process mathematically by considering natural, external and general mechanisms in the clotting process. In this process, when damage occurs in the endothelial region of the vessel, tissue factor is released and 38 different substances react with each other inside the plasma, eventually forming fibrin. To simulate the movement of different chemical components and proteins in plasma, the...
Solving Nonlinear Systems of Mixed Iqualities and Inequalities Via Trust Region Quadratic Methods
, M.Sc. Thesis Sharif University of Technology ; Razvan, Mohammad Reza (Supervisor) ; Payghami, Mohammad Reza (Supervisor)Jamming Resilient Algorithms for Rendezvous in Cognitive Radio Networks
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
Abstract
Dynamic spectrum access with the aid of cognitive radio (CR) technology is a viable solution to spectrum scarcity. There are many military and emergency applications that require the use of cognitive radio ad-hoc networks (CRAHNs). In these net- works, nodes must first find each other in a wide spectrum and then exchange their desired data. The process of finding each other in a multichannel environment is a challenging task and is usually known as rendezvous. Since rendezvous is the first step in communication, disrupting will disable the nodes from establishing proper communication sessions. That results in a drastic degrade in the performance of the network. Therefore, it is important to...
Numerical Study of Spray Impingement to Solid Wall
, M.Sc. Thesis Sharif University of Technology ; Morad, Mohammad Reza (Supervisor) ; Jahannama, Mohammad Reza (Co-Supervisor)
Abstract
Spray-wall impingement is one of the phenomenon that associated in different subject such as spray cooling, combustion chamber and gas turbine. With the impingement of spray to the wall, liquid film begins to form. Wall film characteristics is still an important subject to study. Due to the various stages of liquid film formation from injection of spray till spray-wall impingement, the investigation of this phenomenon is far more complicated. This paper is meant to provide detailed data on spray-wall impingement and wall film formation physics with the help of computational analysis of OpenFOAM . A Lagrangian-Eulerian method based on discrete phase model (DPM) was employed to model...
QBism is not so simply dismissed
, Article Foundations of Physics ; Volume 50, Issue 7 , 2020 , Pages 693-707 ; Sharif University of Technology
Springer
2020
Abstract
QBism is one of the main candidates for an epistemic interpretation of quantum mechanics. According to QBism, the quantum state or the wavefunction represents the subjective degrees of belief of the agent assigning the state. But, although the quantum state is not part of the furniture of the world, quantum mechanics grasps the real via the Born rule which is a consistency condition for the probability assignments of the agent. In this paper, we evaluate the plausibility of recent criticism of QBism. We focus on the consequences of the subjective character of the quantum state, the issue of realism and the problem of the evolution of the quantum state in QBism. In particular, drawing upon...
Niobium incorporation in 2D MoSe2 for lung cancer biomarkers detection: The first-principle study of sensitivity improvement
, Article Computational and Theoretical Chemistry ; Volume 1225 , 2023 ; 2210271X (ISSN) ; Sharif University of Technology
Elsevier B.V
2023
Abstract
To investigate the biomarker detection capability of the 2D MoSe2 monolayer as the lung cancer detection sensor, the interaction between the biomarker molecules and the surface of the sensor has been studied by first-principles calculations in three scenarios namely i) pristine MoSe2, ii) Nb-doped MoSe2, iii) Nb-decorated MoSe2 monolayers. In this study, it is proposed that Nb-decorated MoSe2 is a promising biosensor for detecting the two most prominent lung cancer biomarkers in the breath namely 2-butanone (C4H8O) and 1-propanol (C3H8O). The adsorption energy, charge transfer, and the equivalent sensitivity for C3H8O adsorption on Nb-decorated MoSe2 were calculated as −1.907 eV, 0.026e, and...