Loading...
Search for: golkarifard--morteza
0.178 seconds

    Flow Management with Service Chain Embedding in Software-Defined Networks

    , Ph.D. Dissertation Sharif University of Technology Golkarifard, Morteza (Author) ; Movaghar, Ali (Supervisor)
    Abstract
    5G networks are going to support a variety of vertical services, with a diverse set of key performance indicators (KPIs), by using enabling technologies such as software-defined networking and network function virtualization. It is the responsibility of the network operator to efficiently allocate the available resources to the service requests in such a way to honor KPI requirements, while accounting for the limited quantity of available resources and their cost. A critical challenge is that requests may be highly varying over time, requiring a solution that accounts for their dynamic generation and termination. With this motivation, we seek to make joint decisions for request admission,... 

    Efficient Offloading in Ambient Cloud

    , M.Sc. Thesis Sharif University of Technology Golkarifard, Morteza (Author) ; Movaghar Rahimabadi, Ali (Supervisor)
    Abstract
    Execution speed seriously bothers application developers and users for wearable devices such as Google Glass. Intensive applications like Mobile Augmented Reality (MAR) suffer from significant delays when CPU is busy. Energy is another concern when the devices are in low battery level but users need them for urgency use. To ease such pains, one approach is to expand the computational power by cloud offloading. This paradigm works well when the available Internet access has enough bandwidth. Another way, however, is to leverage nearby devices for computation offloading, which is known as device-to-device (D2D) offloading. In this paper, we present Dandelion, a unified code offloading system... 

    A Hitchhiker's guide to computation offloading: Opinions from practitioners

    , Article IEEE Communications Magazine ; Volume 55, Issue 7 , 2017 , Pages 193-199 ; 01636804 (ISSN) Golkarifard, M ; Yang, J ; Movaghar, A ; Hui, P ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    Due to the increasing usage and capabilities of smart devices, mobile application developers build a large number of resource intensive applications, such as WAR applications. Even with the rapid development in hardware technology, the computing capability and battery capacity on wearable devices and smartphones still cannot meet the application demands with heavy computations and high battery drain. Pervasive computing addresses this problem by migrating applications to the resource providers external to mobile devices. The profitability of this method heavily depends on how to implement it and when to use it. Although there are many computation offloading systems proposed in the... 

    Dynamic VNF placement, resource allocation and traffic routing in 5G

    , Article Computer Networks ; Volume 188 , April , 2021 ; 13891286 (ISSN) Golkarifard, M ; Chiasserini, C. F ; Malandrino, F ; Movaghar, A ; Sharif University of Technology
    Elsevier B. V  2021
    Abstract
    5G networks are going to support a variety of vertical services, with a diverse set of key performance indicators (KPIs), by using enabling technologies such as software-defined networking and network function virtualization. It is the responsibility of the network operator to efficiently allocate the available resources to the service requests in such a way to honor KPI requirements, while accounting for the limited quantity of available resources and their cost. A critical challenge is that requests may be highly varying over time, requiring a solution that accounts for their dynamic generation and termination. With this motivation, we seek to make joint decisions for request admission,... 

    Dandelion: a unified code offloading system for wearable computing

    , Article IEEE Transactions on Mobile Computing ; 29 May , 2018 ; 15361233 (ISSN) Golkarifard, M ; Yang, J ; Huang, Z ; Movaghar, A ; Hui, P ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Execution speed seriously bothers application developers and users for wearable devices such as Google Glass. Intensive applications like 3D games suffer from significant delays when CPU is busy. Energy is another concern when the devices are in low battery level but users need them for urgency use. To ease such pains, one approach is to expand the computational power by cloud offloading. This paradigm works well when the available Internet access has enough bandwidth. Another way is to leverage nearby devices for computation-offloading, which is known as device-to-device (D2D) offloading. In this paper, we present Dandelion, a unified code offloading system for wearable computing. Dandelion... 

    Dandelion: A unified code offloading system for wearable computing

    , Article IEEE Transactions on Mobile Computing ; Volume 18, Issue 3 , 2019 , Pages 546-559 ; 15361233 (ISSN) Golkarifard, M ; Yang, J ; Huang, Z ; Movaghar, A ; Hui, P ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    Execution speed seriously bothers application developers and users for wearable devices such as Google Glass. Intensive applications like 3D games suffer from significant delays when CPU is busy. Energy is another concern when the devices are in low battery level, but users need them for urgency use. To ease such pains, one approach is to expand the computational power by cloud offloading. This paradigm works well when the available Internet access has enough bandwidth. Another way is to leverage nearby devices for computation-offloading, which is known as device-to-device (D2D) offloading. In this paper, we present Dandelion, a unified code offloading system for wearable computing. Such... 

    Ant colony algorithm for the shortest loop design problem [electronic resource]

    , Article Computers and Industrial Engineering, Elsevier ; Volume 50, Issue 4, August 2006, Pages 358–366 Eshghi, K. (Kourosh) ; Kazemi, Morteza ; Sharif University of Technology
    Abstract
    In this paper, a new algorithm for solving the shortest loop design problem is presented. The shortest loop design problem is to find the shortest loop for an automated guided vehicle covering at least one edge of each department of a block layout. In this paper, first it is shown that this problem can be represented as a graph model. The properties of the presented model enable us to design a meta-heuristic based on ant colony system algorithm for solving the shortest loop design problem. Computational results show the efficiency of our algorithm in compare to the other techniques  

    Hyperion: a wearable augmented reality system for text extraction and manipulation in the air

    , Article Proceedings of the 8th ACM Multimedia Systems Conference, MMSys 2017, 20 June 2017 through 23 June 2017 ; 2017 , Pages 284-295 ; 9781450350020 (ISBN) Chatzopoulos, D ; Bermejo, C ; Huang, Z ; Butabayeva, A ; Zheng, R ; Golkarifard, M ; Hui, P ; Sharif University of Technology
    2017
    Abstract
    We develop Hyperion a Wearable Augmented Reality (WAR) system based on Google Glass to access text information in the ambient environment. Hyperion is able to retrieve text content from users' current view and deliver the content to them in different ways according to their context.We design four work modalities for different situations that mobile users encounter in their daily activities. In addition, user interaction interfaces are provided to adapt to different application scenarios. Although Google Glass may be constrained by its poor computational capabilities and its limited battery capacity, we utilize code-level offloading to companion mobile devices to improve the runtime... 

    Love Wave Propagation in a Functionally Graded Magneto-Electro-Elastic Half-Space with Quadratic Variations

    , M.Sc. Thesis Sharif University of Technology Nobahar, Masoud (Author) ; Eskandari, Morteza (Supervisor)
    Abstract
    The propagation behavior of Love wave in functionally graded magneto-electro-elastic half-spaces with a quadratic variation is addressed. The magneto-electromechanical coupling factor, the dispersion relations, electric potential, magnetic potential and displacement are obtained analytically for both magneto-electrically open and short conditions. The effect of gradient coefficient on phase velocity, group velocity and magneto-electromechanical coupling factor are plotted and discussed. Research on the wave propagation in magneto-electro-elastic materials is still very limited. This work provides us with a theoretical foundation to design and practically apply SAW devices with high... 

    Modeling Reaction and Distribution of Water in Nanopores of the Cathode Catalyst Layer of PEM Fuel Cell

    , M.Sc. Thesis Sharif University of Technology Nushak, Fatemeh (Author) ; baghalha, morteza (Supervisor)
    Abstract
    In the proton exchange membrane fuel cells (PEM, the produced water would be divided into two phases of vapor and liquid. distribution of both liquid and vapor phases in different cell layers affects the performance, the efficiency and the life of a fuel cell significantly. Moreover, Nano pores of the cathode catalyst layer are involved with some phenomena such as electrochemical reaction kinetics, heat and mass transfer and interface phase change. One of the most important problems in the performance of fuel cells is distribution of liquid water in the porous areas. Water flooding in fuel cells causes to delay in oxygen transport to active sites in the catalyst layer because the pores of... 

    Elastic Analysis of a Surface Stiffened Transversely Isotropic Half-space Under a Buried Horizontal Point Load

    , M.Sc. Thesis Sharif University of Technology Naghib, Hamed (Author) ; Eskandari, Morteza (Supervisor)
    Abstract
    In this study, the interaction between thin plate completely bonded to the transversely isotropic halfspace and a concentrated force applied horizontally (Mindlin-type force) are considered. This problem has been solved analytically. This problem is used as sample for thin solid films and surface coating technology, where the surface of solid is covered by thethin plate for increasing its stiffness. Moreover, this problem is a good sample when homogenous solid is subjected to contact loading and can be seen that mechanical properties of material which is near the solid surface varies; consequently, a two-phase solid is created.Because of the influence of noted inhomogeneity, solid is... 

    Modeling and Simulation of the Catalyst Regeneration Process of FCC Unit of Abadan Refinery

    , M.Sc. Thesis Sharif University of Technology Loni, Zahra (Author) ; Baghalha, Morteza (Supervisor)
    Abstract
    Hydrodynamics plays a crucial role in defining the performance of fluidized beds. The numerical simulation of fluidized bed is very important in the prediction of its behaviour. From this point of view, in the present study a dynamic two dimensioanl model is developed for the modeling of regenerator system of a UOP fluid catalytic cracking (FCC) unit of Abadan refinery with a high-efficiency regenerator. Of the various modeling and simulation techniques, computational fluid dynamics (CFD) is employed in this thesis. Effects of gas velocity, the transient local solid volume fraction, pressure drop for gas and solid phase, solid holdup distribution and solid circulation pattern have been... 

    Database Schema Extraction Prevention Through DBMS Error Handling

    , M.Sc. Thesis Sharif University of Technology Naghdi, Sepideh (Author) ; Amini, Morteza (Supervisor)
    Abstract
    Nowadays large volume of sensitive data of organizations are stored in the databases. Thus, databases are attractive to the attackers to execute different types of attacks with different purposes. The useful information that attackers try to achieve in the preliminary steps of the attacks against the databases, is the database structure or schema. One of the popular approach to extract the schema of a database is to analyze the returned error messages from its DBMS. Hence, a solution to prevent schema disclosure via the error messages is customizing and modifying them. To achieve this goal, in this thesis, we propose a framework to handle and customize the error messages automatically and... 

    Privacy Preserving Access Control for Service Composition in Cloud Computing

    , M.Sc. Thesis Sharif University of Technology Osanloo, Farnaz (Author) ; Amini, Morteza (Supervisor)
    Abstract
    Cloud computing is a new computing environment where computing infrastructure, platform and software are provided as a service. Rapid growth of cloud environments has increased the importance of security requirements and challenges for both service providers and users in cloud. Two main security issues in software as a service (SaaS) delivery model are access control and privacy preserving in basic web services and also in composite services obtaining through the automatic composition and inference of policies from the ones specified for basic services. In this thesis, we present a privacy preserving access control model and framework for service composition in SaaS delivery model of cloud... 

    An Access Control System for Time Series Data in NoSQL Databases

    , M.Sc. Thesis Sharif University of Technology Noury, Amir (Author) ; Amini, Morteza (Supervisor)
    Abstract
    An important class of applications which have been rapidly growing recently is the one that create and use time series data. These types of data sets are ordered based on the timestamps associated to their data items. In practice, traditional relational databases are unable to satisfy the requirements of these data sets; however, NoSQL databases with column-wide data structure are appropriate infrastructure for them. These databases are very efficient in read and write operations (especially for time series data, which are ordered) and are able to store unstructured data. Time series data may contain valuable and sensitive information; hence, they should be protected from the information... 

    Numerical Simulation of a Telescopic Metallic Yielding Damper

    , M.Sc. Thesis Sharif University of Technology Davoodi, Vahid (Author) ; Eskandari, Morteza (Supervisor)
    Abstract
    In this study, a new type of metallic yielding damper called Telescopic damper is proposed and analyzed numerically. The damper comprises of three concentric steel tubes connected together by lead shear keys. The relative axial deformation of steel tubes under axial forces results in shear deformation and yielding in lead shear keys and dissipates energy. The inner steel tube has a lock which limits its movement to some certain extent and beyond this limit the outer tube activates. Therefore, a multi-linear force-deformation behavior with two different yield plateaus is expected for the introduced telescopic damper. The multi-level yield plateaus of damper makes it effective in both low and... 

    Information-flow Analysis in Android Apps for Protecting User Privacy

    , M.Sc. Thesis Sharif University of Technology Barkhordari, Alireza (Author) ; Amini, Morteza (Supervisor)
    Abstract
    The rapid growth of Android operating system alongside its open-source nature has made it as the most popular operating system of mobile devices. On the other hand, regarding the increasing computational power of mobile devices, a wide variety of applications are coming to this type of devices. Meanwhile unfortunately many malicious softwares trying to keep up with other applications, are targeting this popular operating system. Therefore with regard to the fact that this type of devices usually store private and sensitive information of their users, security of mobile operating systems is considered very important. Having this matter in mind, the goal of this research work has been... 

    Secure- multiparty Computation Protocol for Privacy Preserving Data Mining

    , M.Sc. Thesis Sharif University of Technology Maftouni, Mahya (Author) ; Amini, Morteza (Supervisor)
    Abstract
    Privacy preserving data mining helps organizations and companies not only to deal with privacy concerns of customers and regular limitations, but also to benefit from collaborative data mining. Utilizing cryptographic techniques and secure multiparty computation (SMC) are among widely employed approaches for preserving privacy in distributed data mining. The general purpose of secure multiparty computation protocols to compute specific functions on private inputs of parties in a collaborative manner and without revealing their private inputs. Providing rigorous security proof of secure multiparty computation makes it a good choice for privacy preservation, despite of its cryptographic... 

    Analysis of Slabs Stiffened by Cables and Pedestals

    , M.Sc. Thesis Sharif University of Technology Mokhberi, Arsalan (Author) ; Eskandari, Morteza (Supervisor)
    Abstract
    In this study, a new concrete slab stiffened by concrete pedestals and steel cables is introduced. The slab system is studied by employing both analytical and numerical methods. The steel cables are connected to the edges of slab and the concrete pedestals mounted at the bottom face of slab act as the middle supports of cables. The tension force in the cable and its inclination results in upward forces acting at the bottom face of slab. With the aims of classical theory of thin plates and the superposition technique, the problem of a simply supported rectangular slab stiffened by cables is studied analytically. The obtained results are verified by a numerical modelling implemented in SAP2000... 

    Parametric Study of Telescopic Metallic Yielding Dampers

    , M.Sc. Thesis Sharif University of Technology Misaghi, Mohammad (Author) ; Eskandari, Morteza (Supervisor)
    Abstract
    The parametric study of a new introduced metallic yielding damper called telescopic damper is addressed. The telescopic damper comprises of three concentric steel pipes connected together by lead shear keys. The inner and outer steel pipes are subjected to axial loading which results in the shear yielding of the embedded lead cylinders. The inner steel pipe has a lock which limits its movement to some certain extent and beyond this limit the outer tube activates. Employing ABAQUS software, the behavior of damper under cyclic loading is studied numerically. The finite element model is verified by available results in the literature. The effects of inner and outer steel pipes thickness,...