Loading...
Search for: fazli--mahyar
0.13 seconds

    A novel design of the KASUMI block cipher using one-hot residue number system

    , Article Middle East Journal of Scientific Research ; Volume 11, Issue 8 , 2012 , Pages 1078-1086 ; 19909233 (ISSN) Mahyar, H ; Sharif University of Technology
    2012
    Abstract
    The KASUMI block cipher is used for the cellular communications networks and safety of many wireless standards. Third generation cellular network technology (3G) permits to transmit information, voice and video at very high data rates never seen before that will revolutionize personal communications and information exchange. On the other hand, Residue Number System (RNS) is a modular representation and is evidenced to be serviceable equipment in many applications which need high-speed computations and high-performance components. RNS is a non-weighted and integer number system that can support secure, highspeed, low-power, parallel and carry-free arithmetic. For attaining the most... 

    Reliable and high-speed KASUMI block cipher by residue number system code

    , Article World Applied Sciences Journal ; Volume 17, Issue 9 , 2012 , Pages 1149-1158 ; 18184952 (ISSN) Mahyar, H ; Sharif University of Technology
    2012
    Abstract
    Third generation cellular network technology (3G) can revolutionize communications and data exchanges between many people in a more overwhelming fashion than 2G and 2.5G networks did. The 3G UMTS, the 3G GSM and the 3G GPRS rely on the KASUMI block cipher. Therefore, increasing speed, decreasing power consumption and error detection/correction are the major concerns of the KASUMI algorithm and its generation. On the other hand, Residue Number System is a non-weighted number system and it is currently considered as an important method for high-speed, low-power, parallel and carry-free arithmetic realizations. Redundant Residue Number System is an extension of RNS that also supports error... 

    Business Process Oriented Software Engineering

    , M.Sc. Thesis Sharif University of Technology Mahyar, Alireza (Author) ; Habibi, Jafar (Supervisor)
    Abstract
    Enterprises are founded according to their business processes based on its targets. For implementing an Information System, first it is required to analyze, design and model of the processes based on a specific methodology.The methodologies of software engineering usually used to be function oriented however object oriented is usual and practical todays. Analyzing the business processes according to one of these two concepts has some problems, however merging these two concepts, makes a powerful method in analyzing and designing of a system more easily and accurately.Some software development methodologies consider these two aspects in a way, however working with them has many complexities... 

    Optimizing Best Response Games on Social Networks

    , Ph.D. Dissertation Sharif University of Technology Fazli, MohammadAmin (Author) ; Habibi, Jafar (Supervisor)
    Abstract
    Controlling dynamical systems is an important area of research, having many applications in related practical fields. One class of dynamical systems which have obtained ever-growing importance in recent years are networked dynamical systems, in which dynamic behavior is observed on nodes interacting in a networked setting. This is mainly due to the rise of complex networks, e.g. social networks, as an important and powerful method of capturing dynamic behavior that exists in different systems. One important aspect of such systems is that in many scenarios, actors that participate in them are selfish and act rationally based on their own self interest. Therefore guiding such systems to... 

    Design of tensegrity structures for supporting deployable mesh antennas

    , Article Scientia Iranica ; Volume 18, Issue 5 , October , 2011 , Pages 1078-1087 ; 10263098 (ISSN) Fazli, N ; Abedian, A ; Sharif University of Technology
    2011
    Abstract
    This paper is an attempt to develop a design methodology for a special deployable structure for potential use in micro-satellites. The basic form of this structure is a hexagonal prismatic tensegrity structure, which, after being rigidified, is used as the supporting structure of a mesh-like antenna. Here, the objectives of presenting the design methodology are to prevent structural elements from failure, while maintaining the structural natural frequency and mesh tension above an intended value and in addition, to minimize the overall mass. Here, the suggested design strategy combines the need for a behavioral study (i.e. fast and wide range evaluation) at the beginning of the design, with... 

    Modeling and Simulation of the Behavior of Cancer Cells, A Multi-agent Approach

    , M.Sc. Thesis Sharif University of Technology Fazli, Rasol (Author) ; Habibi, Jafar (Supervisor)
    Abstract
    Cancer is a complicated disease. So, cancer treatment can not be possible without understanding its complex behavior. Each of cells do inner operations spontaneously and have interactions on external environment. This feature of cells has caused to model their behaviors using multi-agents and considering each cell as an intelligent agent. Using this approach, a novel multi-scale agent-based model known as basic model has been introduced. Furthermore, two signaling pathways have been added to this model. For simulation, a new agent-based modeling framework has been proposed. After that, learning has been involved, for considering drug effects. Finally, by means of this model we can predict... 

    Analyzing Permission Abuses in the Android Operating System

    , M.Sc. Thesis Sharif University of Technology Fazli, Zahra (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    Android phones are widely used now. Convenient user interface and various applications for these devices has played a significant role in their success. The wide usage of these devices besides the nature of their applications lead to collect lots of sensitive information on them. Consequently the protection of this information is very important. The unfamiliarity and the inattention of the most of smart phone users to security issues highlight the importance of the data protection and the privacy. The permission access in Android operating system is static and users should permit applications to access the requested permissions on installing them. Also these programs can use their... 

    UCS-NT: An unbiased compressive sensing framework for Network Tomography

    , Article ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings ; 2013 , Pages 4534-4538 ; 15206149 (ISSN) ; 9781479903566 (ISBN) Mahyar, H ; Rabiee, H. R ; Hashemifar, Z. S ; Sharif University of Technology
    2013
    Abstract
    This paper addresses the problem of recovering sparse link vectors with network topological constraints that is motivated by network inference and tomography applications. We propose a novel framework called UCS-NT in the context of compressive sensing for sparse recovery in networks. In order to efficiently recover sparse specification of link vectors, we construct a feasible measurement matrix using this framework through connected paths. It is theoretically shown that, only O(k log(n)) path measurements are sufficient for uniquely recovering any k-sparse link vector. Moreover, extensive simulations demonstrate that this framework would converge to an accurate solution for a wide class of... 

    Detection of top-K central nodes in social networks: A compressive sensing approach

    , Article Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015, 25 August 2015 through 28 August 2015 ; 2015 , Pages 902-909 ; 9781450338547 (ISBN) Mahyar, H ; Pei, J ; Tang, J ; Silvestri, F ; Sharif University of Technology
    Association for Computing Machinery, Inc  2015
    Abstract
    In analysing the structural organization of a social network, identifying important nodes has been a fundamental problem. The concept of network centrality deals with the assessment of the relative importance of a particular node within the network. Most of the traditional network centrality definitions have a high computational cost and require full knowledge of network topological structure. On the one hand, in many applications we are only interested in detecting the top-k central nodes of the network with the largest values considering a specific centrality metric. On the other hand, it is not feasible to efficiently identify central nodes in a large real-world social network via... 

    Compressed sensing in cyber physical social systems

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 10760 LNCS , 2018 , Pages 287-305 ; 03029743 (ISSN) Grosu, R ; Ghalebi, K. E ; Movaghar, A ; Mahyar, H ; Sharif University of Technology
    2018
    Abstract
    We overview the main results in Compressed Sensing and Social Networks, and discuss the impact they have on Cyber Physical Social Systems (CPSS), which are currently emerging on top of the Internet of Things. Moreover, inspired by randomized Gossip Protocols, we introduce TopGossip, a new compressed-sensing algorithm for the prediction of the top-k most influential nodes in a social network. TopGossip is able to make this prediction by sampling only a relatively small portion of the social network, and without having any prior knowledge of the network structure itself, except for its set of nodes. Our experimental results on three well-known benchmarks, Facebook, Twitter, and Barabási,... 

    Propose a Model to Minimize Energy Consumption in Turning Machining Operations

    , M.Sc. Thesis Sharif University of Technology Fazli, Erfan (Author) ; Fatahi-Valilai, Omid (Supervisor)

    Envy free chain store pricing

    , Article 2011 CSI International Symposium on Computer Science and Software Engineering, CSSE 2011, 15 June 2011 through 16 June 2011 ; June , 2011 , Pages 44-47 ; 9781612842073 (ISBN) Fazli, M ; Nikparto, N ; Saghafian, M ; Sharif University of Technology
    2011
    Abstract
    In this paper we study envy free pricing problem in general graphs where there is not a seller in every graph's nodes. We assume unique establishment cost for initiating a store in each node and we wish to find an optimal set of nodes in which we would make the maximum profit by initiating stores in them. Our model is motivated from the observation that a same product has different prices in different locations and there is also an establishing cost for initiating any store. We consider both of these issues in our model: first where should we establish the stores, and second at what price should we sell our items in them to gain maximum possible profit. We prove that in a case of constant... 

    Predicting Usefulness of Code Review Comments Using Machine Learning Algorithms

    , M.Sc. Thesis Sharif University of Technology Mohammadi, Atefeh (Author) ; Fazli, Mohammad Amin (Supervisor)
    Abstract
    The competition for staying in the business world has intensified today with the rise of open-source and commercial software. As long as a software is tailor-made to suit the needs of users, it is so-called alive and can stay in the competition. So the maintenance phase is necessary to make changes to the software to meet the needs of users. To reduce costs associated with this phase, it is necessary to avoid software bugs. One way to avoid software bugs is to use peer code review. Peer code review has been recognized as one of the best software engineering principles of the last 35 years. This principle helps maintain the quality of the code due to changes made to parts of the code that... 

    Representation Learning for Dynamic Graphs

    , M.Sc. Thesis Sharif University of Technology Loghmani, Erfan (Author) ; Fazli, Mohammad Amin (Supervisor)
    Abstract
    Representation learning methods on graphs have enabled using machine learning methods on graphs' discrete structure by transferring them to a continuous domain. As graphs' structures are not always static and may evolve through time, dynamic representation learning methods have recently gained scholars' attention. Several methods have been proposed to enable the model to update the embeddings graph changes, or new interactions happen between nodes. These online methods could significantly reduce the learning time by refreshing the model as the changes occur, so we don't need to retrain the model with the complete graph information. Moreover, by using the temporal information of interactions,... 

    An Intelligent Triangular Pattern Recognition in Stock Price Charts

    , M.Sc. Thesis Sharif University of Technology Hedayati, Emadeddin (Author) ; Fazli, Mohammad Amin (Supervisor)
    Abstract
    Stock price patterns are a technical analysis approach to forecast future trends with tremendous practical benefits. However, the current algorithms solely rely on machine learning techniques and deep neural networks which could be a problem in countries where data sets such as these are not available. We propose an algorithm based on geometry and mathematics for this problem, leading to an O(n^3logn + n^2k) complexity, where k is the number of triangular patterns  

    Predicting Opponent’s Movement in Dota 2

    , M.Sc. Thesis Sharif University of Technology Bashiri, Vahid (Author) ; Fazli, Mohammad Amin (Supervisor)
    Abstract
    Video games with respect to an ever Increasing player pool and Industry growth, have attracted a lot of attention in recent years. Dota 2, as one of the most successful games both in casual gamers’ community and E-sport community, is considered as a proper case study, however, most of the research done was limited to predicting games’ outcome. Despite The popularity, the rather unintelligent AI of the game has made quite a frustrating experience for new players. In this research, with a novel approach, hero features are used to predict their future positions. For this purpose, 35 professional games are collected and analyzed and 601 features are extracted. Then, suitable features are... 

    Multi-view approach to suggest moderation actions in community question answering sites

    , Article Information Sciences ; Volume 600 , 2022 , Pages 144-154 ; 00200255 (ISSN) Annamoradnejad, I ; Habibi, J ; Fazli, M ; Sharif University of Technology
    Elsevier Inc  2022
    Abstract
    With thousands of new questions posted every day on popular Q&A websites, there is a need for automated and accurate software solutions to replace manual moderation. In this paper, we address the critical drawbacks of crowdsourcing moderation actions in Q&A communities and demonstrate the ability to automate moderation using the latest machine learning models. From a technical point, we propose a multi-view approach that generates three distinct feature groups that examine a question from three different perspectives: 1) question-related features extracted using a BERT-based regression model; 2) context-related features extracted using a named-entity-recognition model; and 3) general lexical... 

    Single-layer MoS2-MoO3-x heterojunction nanosheets with simultaneous photoluminescence and co-photocatalytic features

    , Article Catalysts ; Volume 11, Issue 12 , 2021 ; 20734344 (ISSN) Saadati, M ; Akhavan, O ; Fazli, H ; Sharif University of Technology
    MDPI  2021
    Abstract
    Single-layer MoS2-MoO3-x heterojunction nanosheets with visible-light-sensitive band gap energy and average lateral dimensions of ~70 nm were synthesized by using a two-step combined exfoliation method. The exfoliation was initiated from pristine MoS2, while some sulfur sites in expanded MoS2 sheets during exfoliating were substituted by ambient non-thermal oxygen, resulting in formation of α-MoO3-x crystalline domains. The morphological features, crystalline structure, phase formation, number of layers, and optical properties of the MoS2-MoO3-x nanosheets were determined by atomic force microscopy; X-ray diffraction; field emission electron microscopy; transmission electron microscopy; and... 

    Political Tweet Classification with Active Learning

    , M.Sc. Thesis Sharif University of Technology Mirzababaei, Sajad (Author) ; Fazli, Mohammad Amin (Supervisor)
    Abstract
    Deep learning algorithms combined with supervision rely heavily on labeled data, posing challenges in the data labeling process. Addressing this issue, researchers in the field of machine learning have focused on developing approaches to reduce the dependency on labeled data and improve the efficiency of data collection for labeling purposes. This thesis investigates the training of a classification model using data collected through a human-in-the-loop system. Notably, this research pioneers the application of active learning techniques to differentiate between political and non-political Persian tweets. The dataset introduced in this study is the sole available collection for this specific... 

    Design and Implementation of an Intelligent Agent for Automatic Configuration of Content Delivery Servers

    , M.Sc. Thesis Sharif University of Technology Lotfi, Hossein (Author) ; Fazli, Mohammad Amin (Supervisor)
    Abstract
    Content delivery networks play a significant role in improving the quality of internet services by placing the necessary content closer to users on servers. Currently, over half of internet traffic is delivered through these networks to end users. The efficiency of a content delivery network depends on various parameters, including the type of requested content, workload distribution methods, network topology, routing algorithms, caching policies, network server configurations, and resource allocation (shared or dedicated hardware resources). Additionally, the requests made to a content delivery network vary based on the type of service and even the time of day, making optimization a...