Loading...
Search for:
forghani--pouyan
0.089 seconds
Vision-based 3d Object Recognition
, M.Sc. Thesis Sharif University of Technology ; Kasaei, Shohreh (Supervisor)
Abstract
Object recognition is a field of image processing with the purpose of object detection and determining its pose. There was a wide research of object recognition using 2d information. These methods are less efficient due to their sensitivity to view and scale. Today with development of 3d technology, 3d reconstruction of objects has been eased, thus there is a new trend of 3d methods. 3d object recognition uses 3d data and model to recognize objects more efficiently in different views and in occlusion and clutter. The related works are classified in three category of view-based, feature matching, and classification. In this research we attempted to improve one of the best feature matching...
A Secure and Efficient Digital Signature Based on Polar Codes
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor)
Abstract
Regarding to the emergence of quantum computers and advances in the large scale implementation of them, exploiting hard problems of coding theory is of great importance.This family of problems, like those of lattices, has an acceptable resistance against classic and quantum attacks. Thus, they can be replaced with hard problems in number theory and algebra. Increasing dominance of cyberspace made us highly dependent to it. Consequently, preparing tools and methods to mitigate future threats is necessary. Digital signatures constitute an important family of cryptographic primitives. Code-based digital signatures are mostly suffering from two main drawbacks: large public key and long time of...
An improved macro-model for simulation of single electron transistor (SET) using HSPICE
, Article TIC-STH'09: 2009 IEEE Toronto International Conference - Science and Technology for Humanity, 26 September 2009 through 27 September 2009, Toronto, ON ; 2009 , Pages 1000-1004 ; 9781424438785 (ISBN) ; Dousti, M ; Pouyan, M ; Faez, R ; Sharif University of Technology
2009
Abstract
To get a more accurate model for simulation of single electron transistors (SETs), we have proposed a new macromodel that includes the ability of electron tunneling time calculation. In our proposed model, we have modified the previous models and applied some basic corrections to their formulas. In addition, we have added a switched capacitor circuit, as a quantizer, to calculate the electron tunneling time. We used HSPICE for high-speed simulation and observed that the simulation results obtained from our model matched more closely with that of SIMON 2.0. We also could evaluate the time of electron tunneling through the barrier by using the quantizer. Clearly, our macro-model gives more...
A new efficient approach to search for all multi-state minimal cuts
, Article IEEE Transactions on Reliability ; Volume 63, Issue 1 , March , 2014 , Pages 154-166 ; Mahdavi Amiri, N ; Sharif University of Technology
2014
Abstract
There are several exact or approximating approaches that apply {m d}-MinCuts (d-MCs) to compute multistate two-Terminal reliability. Searching for and determining d-MCs in a stochastic-flow network are important for computing system reliability. Here, by investigating the existing methods and using our new results, an efficient algorithm is proposed to find all the d-MCs. The complexity of the new algorithm illustrates its efficiency in comparison with other existing algorithms. Two examples are worked out to show how the algorithm determines all the d -MCs in a network flow with unreliable nodes, and in a network flow of moderate size. Moreover, using the d-MCs found by the algorithm, the...
An efficient algorithm for the multi-state two separate minimal paths reliability problem with budget constraint
, Article Reliability Engineering and System Safety ; Volume 142 , October , 2015 , Pages 472-481 ; 09518320 (ISSN) ; Mahdavi Amiri, N ; Sharif University of Technology
Elsevier Ltd
2015
Abstract
Abstract Several researchers have worked on transmitting a given amount of flow through a network flow within fastest possible time, allowing flow to be transmitted through one or more paths. Extending this problem to the system reliability problem, the quickest path reliability problem has been introduced. The problem evaluates the probability of transmitting some given amount of flow from a source node to a sink node through a single minimal path in a stochastic-flow network within some specified units of time. Later, the problem has been extended to allow flow to be transmitted through two or more separate minimal paths (SMPs). Here, we consider the problem of sending flow through two...
A new algorithm for generating all minimal vectors for the q SMPs reliability problem with time and budget constraints
, Article IEEE Transactions on Reliability ; Volume 65, Issue 2 , 2016 , Pages 828-842 ; 00189529 (ISSN) ; Mahdavi Amiri, N ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2016
Abstract
The quickest path reliability problem evaluates the probability of transmitting some given units of flow from a source node to a sink node through a single minimal path in a stochastic-flow network within some specified units of time. This problem has been recently extended to the case of transmitting flow through q separate minimal paths (SMPs) simultaneously within a budget constraint. Here, we propose a new algorithm to solve such problems. The algorithm finds all the minimal vectors for which a given demand level d units of flow can be transmitted through q SMPs from a source node to a sink node satisfying some given time and budget limits. In our proposed algorithm, a special...
An improved algorithm for finding all upper boundary points in a stochastic-flow network
, Article Applied Mathematical Modelling ; Volume 40, Issue 4 , 2016 , Pages 3221-3229 ; 0307904X (ISSN) ; Mahdavi Amiri, N ; Sharif University of Technology
Elsevier Inc
2016
Abstract
The d-MinCut (d-MC) problem has been extensively studied in the past decades and various algorithms have been proposed. The existing algorithms often consist of two general stages, finding all the d-MC candidates and testing each candidate for being a d-MC. To find all the d-MC candidates, a system of equations and inequalities should be solved. Here, we propose a novel efficient algorithm to solve the system. Then, using our new results, an improved algorithm is proposed for the d-MC problem. Computing its complexity, we show the proposed algorithm to be more efficient than the other existing algorithms with respect to the number of minimal cuts. A medium-size network example is worked...
Application of Axiomatic Design Theory in Cloud-Based Segmented Production Systems
, M.Sc. Thesis Sharif University of Technology ; Houshmand, Mahmoud (Supervisor)
Abstract
Designing and evaluating the segmented production structures of the production system due to the variety of production systems is one of the important issues that have been considered in recent decade. In this research, the paradigm of designing a segmented production system has been studied to increase the adaptation of the organizational structure of production systems to changing and diverse behavior of the market as well as to increase the responsiveness to demand in the organization. The segmented production system provides production units to small, flexible and decentralized production units. The segmentation process used in this research uses an axiomatic design structure. The...
A New SPICE macro-model for the simulation of single electron circuits
, Article Journal of the Korean Physical Society ; Volume 56, Issue 4 , 2010 , Pages 1202-1207 ; 03744884 (ISSN) ; Dousti, M ; Pouyan, M ; Faez, R ; Sharif University of Technology
2010
Abstract
To get a more accurate model for the simulation of single electron transistors (SETs), we propose a new macro-model that includes an electron tunneling time calculation. In our proposed model, we have modified the previous models and have applied some basic corrections to the formulas. In addition, we have added a switched capacitor circuit, as a quantizer, to calculate the electron tunneling time. We used HSPICE for a high-speed simulation and observed that the simulation results obtained from our model match more closely with that of SIMON 2.0. We also could evaluate the time of electron tunneling through the barrier by using the quantizer. Clearly, our macro-model gives more accurate...
PolarSig: An efficient digital signature based on polar codes
, Article IET Communications ; Volume 14, Issue 17 , 2020 , Pages 2889-2897 ; KoochakShooshtari, M ; Aref, M. R ; Sharif University of Technology
Institution of Engineering and Technology
2020
Abstract
Code-based digital signatures suffer from two main drawbacks: Large public key size and slow signature generation. Large public key size is inherent in almost all the code-based cryptosystems and other post-quantum alternatives; however, slow signature generation is due to their specific structure. Most of the current code-based signature schemes are constructed based on Courtois, Finiasz, and Sendrier (CFS) signature. CFS uses a counter to produce decodable syndromes or the complete decoding technique that imposes some extra computational cost to the signing algorithm for many choices of codes. In this study, the authors propose an efficient digital signature, PolarSig, which can reduce...
Price Forecasting for Short-Term Trading in the Coin Future Market
, M.Sc. Thesis Sharif University of Technology ; Kianfar, Farhad (Supervisor)
Abstract
Gold Coin Futures Market by contract delivery month of Dey, in 1387 as part of the capital market in Iran Mercantile Exchange started its activities. Each transaction in this market includes ten coins all gold (tamam bahar). Nowadays We have three symbols on each of the next three months are traded in an active market. In this market, any natural or legal person giving the guarantee fund with any of the agencies approved by the Stock Organization and in the terms of seller or buyer begin their trading. For transactions in order to succeed, we need to predict the rise or fall of prices to be a buyer in the rises and be seller in the falls. With considering the performance of Neural Networks...
A Process Model for Software Product line Engineering Based on the Model Driven Architecture
, M.Sc. Thesis Sharif University of Technology ; Mirian Hosseinabadi, Hassan (Supervisor)
Abstract
Software development process is a base ground for all software activities and ensures all aspects of the software. No quality is guaranteed without a definite process. Model-Driven Software Development process proposes an industrial method for software companies to produce the required software through model(s) and tools. On the other hand, Software Product Line imposes a set of frameworks and principles. As a result a tangible decrement of development time and cost along with an increment of quality is achieved. Mixing both processes creates a stronger industrial process in order to decrease the development time and cost. In this thesis, through a survey on both of the processes and related...
A novel fuzzy genetic annealing classification approach
, Article EMS 2009 - UKSim 3rd European Modelling Symposium on Computer Modelling and Simulation, 25 November 2009 through 27 November 2009, Athens ; 2009 , Pages 87-91 ; 9780769538860 (ISBN) ; Mohamadi, H ; Saniee Abadeh, M ; Foroughifar, A ; Sharif University of Technology
2009
Abstract
In this paper, a novel classification approach is presented. This approach uses fuzzy if-then rules for classification task and employs a hybrid optimization method to improve the accuracy and comprehensibility of obtained outcome. The mentioned optimization method has been formulated by simulated annealing and genetic algorithm. In fact, the genetic operators have been used as perturb functions at the core of simulated annealing heuristic. Results of proposed approach have been compared with several well-known methods such as Naïve Bayes, Support Vector Machine, Decision Tree, k-NN, and GBML, and show that our method performs the classification task as well as other famous algorithms. ©...
Misuse detection via a novel hybrid system
, Article EMS 2009 - UKSim 3rd European Modelling Symposium on Computer Modelling and Simulation, 25 November 2009 through 27 November 2009, Athens ; 2009 , Pages 11-16 ; 9780769538860 (ISBN) ; Abadeh, M. S ; Momenzadeh, A ; Pouyan, M. B ; Sharif University of Technology
2009
Abstract
Intrusion detection systems (IDS) are tools located inside computer networks that analyze the network traffics. In this paper, a novel fuzzy-evolutionary system is presented to effectively detect the intrusion in computer networks. This system utilizes a hybridization of simulated annealing heuristic and tabu search algorithm to improve the accuracy of fuzzy if-then rules as intrusion detectors. Each of these algorithms has its advantageous and disadvantageous. Using the hybrid model of both algorithms, the proposed system employs the good features of them to improve the accuracy of obtained rules. Evaluation of the proposed system is done on the KDDCup99 Dataset which has information about...
The Effect of Type, Size and Morphology of Nanoparticles on the Hydrodynamics of Rising Bubble Motion
, M.Sc. Thesis Sharif University of Technology ; Bastani, Dariush (Supervisor) ; Feizi, Pouyan (Co-Supervisor)
Abstract
The motion of gas bubbles in the bulk of a fluid can be one of the most widely used industrial phenomena. Various factors such as the size and shape of the bubbles, the physical properties of the liquid phase such as density and viscosity, method of gas injection, the presence of impurities, etc. affect this phenomenon. Some of the most important industrial processes that include the motion of bubbles in the liquid phase bulk are gas adsorption, distillation and froth flotation. According to the results of previous studies, the hydrodynamics of bubble motion in the bulk of a liquid fluid depends on the presence of impurities such as surfactants, proteins and colloidal particles. In many...
An MP-based approximation algorithm on reliability evaluation of multistate flow networks
, Article Reliability Engineering and System Safety ; Volume 191 , 2019 ; 09518320 (ISSN) ; Kagan, N ; Mahdavi Amiri, N ; Sharif University of Technology
Elsevier Ltd
2019
Abstract
In recent decades, multistate two-terminal reliability problem has attracted several researchers, and accordingly many exact and approximation approaches have been proposed in the literature in terms of minimal cuts (MCs) or minimal paths (MPs) to address this problem. Here, an MP-based approximation approach is developed based on exact algorithms. With all the MPs at hand, the approach rearranges the MPs ascendingly with respect to their lengths and then sets the flow on some MPs to be zero which turns to reduce the computing cost in solving the problem. We provide the complexity results, and by employing some benchmarks and one thousand randomly generated networks illustrate that not only...
On multi-state two separate minimal paths reliability problem with time and budget constraints
, Article International Journal of Operational Research ; Volume 37, Issue 4 , 2020 , Pages 479-490 ; Mahdavi Amiri, N ; Kagan, N ; Sharif University of Technology
Inderscience Publishers
2020
Abstract
In a stochastic-flow network, a (d, T, b, P1, P2)-MP is a system state vector for which d units of flow can be transmitted through two separate minimal paths (SMPs) P1 and P2 simultaneously from a source node to a sink node satisfying time and budget limitations T and b, respectively. Problem of determining all the (d, T, b, P1, P2)-MPs, termed as the (d, T, b, P1, P2)-MP problem, has been attractive in reliability theory. Here, some new results are established for the problem. Using these results, a new algorithm is developed to find all the (d, T, b, P1, P2)-MPs, and its correctness is established. The algorithm is compared with a recently proposed one to show the practical efficiency of...
Evaluating Reliability of a Stochastic-flow Network in Terms of All Upper and Lower Boundary Points
, Ph.D. Dissertation Sharif University of Technology ; Mahdavi Amiri, Nezam (Supervisor)
Abstract
In recent years, stochastic-flow networks (SFNs) have been extensively applied to many problems such as distribution, power transmission, and telecommunication. In quality management and decision making, an important task is to design some performance indices in order to measure the performance of an SFN. The system reliability and unreliability are such two common performance indices.Hitherto, several research works have been conducted for evaluating these two performance indices.One approach for evaluating the reliability of SFNs is determining all the upper or lower boundary points (respectively, UBPs or LBPs).Here, we study four problems to determine: (1) all the UBPs in a two-terminal...
A comparative study of different approaches for finding the upper boundary points in stochastic-flow networks
, Article International Journal of Enterprise Information Systems ; Volume 10, Issue 3 , 1 July , 2014 , Pages 13-20 ; ISSN: 15481115 ; Nasseri, S. H ; Forghani Elahabad, M ; Ebrahimnejad, A ; Sharif University of Technology
2014
Abstract
An information system network (ISN) can be modeled as a stochastic-flow network (SFN). There are several algorithms to evaluate reliability of an SFN in terms of Minimal Cuts (MCs). The existing algorithms commonly first find all the upper boundary points (called d-MCs) in an SFN, and then determine the reliability of the network using some approaches such as inclusion-exclusion method, sum of disjoint products, etc. However, most of the algorithms have been compared via complexity results or through one or two benchmark networks. Thus, comparing those algorithms through random test problems can be desired. Here, the authors first state a simple improved algorithm. Then, by generating a...
The Effect of Aging Phenomenon on Wear Behavior and Mechanical Properties of 7005 Series Aluminum Alloy
, M.Sc. Thesis Sharif University of Technology ; Serajzadeh, Siamak (Supervisor) ; Karimi Taheri, Ali (Supervisor)
Abstract
In this research, the effects of natural and artificial aging heat treatments on the mechanical and wear behavior of an aluminum alloy from the 7xxx series have been investigated. The study commenced with annealing of the received samples, which were subsequently divided into four categories. One of these categories was placed in a freezer as annealed samples, while the other two underwent artificial aging heat treatments at temperatures of 180 and 210 degrees Celsius. The final category naturally aged over time. As a result, different structures with varied distributions and morphologies of precipitates were formed, and the mechanical properties, mechanisms, and wear resistance of the...