Loading...
Search for: habibi--m
0.154 seconds

    Controlling best response dynamics for network games

    , Article IEEE Transactions on Network Science and Engineering ; March , 2018 ; 23274697 (ISSN) Fazli, M ; Maazallahi, A ; Habibi, J ; Habibi, M ; Sharif University of Technology
    IEEE Computer Society  2018
    Abstract
    Controlling networked dynamical systems is a complex endeavor, specifically keeping in mind the fact that in many scenarios the actors that are engaged in the dynamism behave selfishly and therefore only take into account their own individual utility, a setting that has been widely studied in the field of game theory. One way that we can control the system dynamics is through the use of control parameters that are at our disposal, but finding optimal values for these parameters is a complex and time consuming task. In this paper we use the relation between network structural properties and control parameters to create a mathematical model that uses learning methods to find optimal values... 

    Security and privacy analysis of song-mitchell RFID authentication protocol

    , Article Wireless Personal Communications ; Volume 69, Issue 4 , May , 2013 , Pages 1583-1596 ; 09296212 (ISSN) Habibi, M. H ; Aref, M. R ; Sharif University of Technology
    2013
    Abstract
    Many applications, such as e-passport, e-health, credit cards, and personal devices that utilize Radio frequency Identification (RFID) devices for authentication require strict security and privacy. However, RFID tags suffer from some inherent weaknesses due to restricted hardware capabilities and are vulnerable to eavesdropping, interception, or modification. The synchronization and untraceability characteristics are the major determinants of RFID authentication protocols. They are strongly related to privacy of tags and availability, respectively. In this paper, we analyze a new lightweight RFID authentication protocol, Song and Mitchell, in terms of privacy and security. We prove that not... 

    Attacks on Recent RFID Authentication Protocols

    , Article Journal of Signal Processing Systems ; Volume 79, Issue 3 , 2015 , Pages 271-283 ; 19398018 (ISSN) Habibi, M. H ; Aref, M. R ; Sharif University of Technology
    Springer New York LLC  2015
    Abstract
    The developing of RFID systems in sensitive applications like e-passport, e-health, credit cards, and personal devices, makes it necessary to consider the related issues such as maximum reading distance, communication speed and data security. The use of signal processing methods is an efficient and convenient way to achieve the maximum reading distance and communication rate. However, the signal processing techniques are not adequate to provide a reasonable level of security and privacy for RFID systems. Thus, it is necessary to employ specific authentication protocols which assure data security and preserve the user’s privacy. Among other security and privacy characteristic of an RFID... 

    Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1 June 2011 through 3 June 2011 ; Volume 6633 LNCS , June , 2011 , Pages 254-263 ; 03029743 (ISSN) ; 9783642210396 (ISBN) Habibi, M. H ; Alagheband, M. R ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    Yeh et al. have recently proposed a mutual authentication protocol based on EPC Class-1 Gen.-2 standard. They claim their protocol is secure against adversarial attacks and also provides forward secrecy. In this paper we show that the proposed protocol does not have cited security features properly. A powerful and practical attack is presented on this protocol whereby the whole security of the protocol is broken. Furthermore, Yeh et al.'s protocol does not assure the untraceabilitiy and backwarduntraceabilitiy attributes. We also will propose our revision to safeguard the Yeh et al.'s protocol against cited attacks  

    Wave propagation analysis of a spinning porous graphene nanoplatelet-reinforced nanoshell

    , Article Waves in Random and Complex Media ; Volume 31, Issue 6 , 2021 , Pages 1655-1681 ; 17455030 (ISSN) Ebrahimi, F ; Mohammadi, K ; Barouti, M. M ; Habibi, M ; Sharif University of Technology
    Taylor and Francis Ltd  2021
    Abstract
    In this article, wave propagation behavior of a size-dependent spinning graphene nanoplatelet-reinforced composite (GNPRC) cylindrical nanoshell with porosity is presented. The effects of small scale are analyzed based on nonlocal strain gradient theory (NSGT), this accurate theory employs exact length scale parameter and nonlocal constant. The governing equations of GNPRC cylindrical nanoshell coupled with piezoelectric actuator (PIAC) are evolved by minimum potential energy principle and solved by the analytical method. For the first time in the current study, wave propagation-porosity behavior of a GNPRC cylindrical nanoshell coupled with PIAC is examined based on NSGT. The results show... 

    Recovery of uranium from carbonaceous radioactive waste of the UF6 production line in a uranium conversion plant: Laboratory and pilot plant studies

    , Article Hydrometallurgy ; Volume 205 , 2021 ; 0304386X (ISSN) Sadeghi, M. H ; Outokesh, M ; Sharifi, M ; Habibi Zare, M ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    Carbonaceous radioactive waste is produced by adsorption of effluent gases of UF6 production line, on a bed of charcoal. Current research was aimed at developing a process for recovery of uranium from this waste in a laboratory and at pilot scale. As a first step, leaching of uranium from carbonaceous radioactive waste was undertaken by successive steps using Al(NO3)3 and nitric acid, the former used to eliminate corrosivity of the F− ions. The stoichiometry of reaction between F− and Al3+ ions form complexes ranging from AlF2+, AlF2+ to AlF3 depending upon their molar ratio. The results showed that the increase of NO3−/U ratio increased the uranium leaching efficiency. Presence of some... 

    Addressing flaws in RFID authentication protocols

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 7107 LNCS , 2011 , Pages 216-235 ; 03029743 (ISSN) ; 9783642255779 (ISBN) Habibi, M. H ; Aref, M. R ; Ma, D ; Sharif University of Technology
    2011
    Abstract
    The development of RFID systems in sensitive applications like e-passport, e-health, credit cards, and personal devices, makes it necessary to consider the related security and privacy issues in great detail. Among other security characteristic of an RFID authentication protocol, untraceability and synchronization are the most important attributes. The former is strongly related to the privacy of tags and their holders, while the latter has a significant role in the security and availability parameters. In this paper, we investigate three RFID authentication protocols proposed by Duc and Kim, Song and Mitchell, and Cho, Yeo and Kim in terms of privacy and security. We analyze the protocol... 

    FeedbackTrust: Using feedback effects in trust-based recommendation systems

    , Article 3rd ACM Conference on Recommender Systems, RecSys'09, New York, NY, 23 October 2009 through 25 October 2009 ; 2009 , Pages 269-272 ; 9781605584355 (ISBN) Moghaddam, S ; Jamali, M ; Ester, M ; Habibi, J ; Sharif University of Technology
    2009
    Abstract
    With the advent of online social networks, the trust-based approach to recommendation has emerged which exploits the trust network among users and makes recommendations based on the ratings of trusted users in the network. In this paper, we introduce a two dimensional trust model which dynamically gets updated based on users's feedbacks, in contrast to static trust values in current trust models. Explorability measures the extent to which a user can rely on recommendations returned by the social network of a trusted user. Dependability represents the extent to which a user's own ratings can be trusted by users trusting him directly and indirectly. We propose a method to learn the values of... 

    A new method for warehousing assessment and prioritize activities

    , Article International Conference on High Performance Computing Systems 2010, HPCS 2010, 12 July 2010 through 14 July 2010 ; 2010 , Pages 48-54 ; 9781617820663 (ISBN) Javanbakht, M ; Pourkamali, M ; Habibi, J ; Sharif University of Technology
    2010
    Abstract
    The data mining activities done for making a data warehouse are too extensive and going through such a process is hardly possible in such cases. Therefore, there is a need for a new method which would be capable of prioritizing such activities according to organizational goals and missions. In this paper a new method based on the detection of necessary components of the data warehouse is offered for assessment and measurement of the data warehouse capacity and quality. Indeed the presented method serves as a complementary process alongside current methodologies to improve data warehouses. The presented method provides the possibility to assess and compare different data warehouses in terms... 

    TBDQ: A pragmatic task-based method to data quality assessment and improvement

    , Article PLoS ONE ; Volume 11, Issue 5 , 2016 ; 19326203 (ISSN) Vaziri, R ; Mohsenzadeh, M ; Habibi, J ; Sharif University of Technology
    Public Library of Science  2016
    Abstract
    Organizations are increasingly accepting data quality (DQ) as a major key to their success. In order to assess and improve DQ, methods have been devised. Many of these methods attempt to raise DQ by directly manipulating low quality data. Such methods operate reactively and are suitable for organizations with highly developed integrated systems. However, there is a lack of a proactive DQ method for businesses with weak IT infrastructure where data quality is largely affected by tasks that are performed by human agents. This study aims to develop and evaluate a new method for structured data, which is simple and practical so that it can easily be applied to real world situations. The new... 

    Measuring data quality with weighted metrics

    , Article Total Quality Management and Business Excellence ; 2017 , Pages 1-13 ; 14783363 (ISSN) Vaziri, R ; Mohsenzadeh, M ; Habibi, J ; Sharif University of Technology
    Routledge  2017
    Abstract
    Data quality (DQ) has been defined as ‘fitness for use’. In order to measure and improve DQ, various methodologies have been defined. A DQ methodology is a set of guidelines and techniques that define a rational process to measure and improve the quality of data. In order to make DQ measurement and improvement more organised, DQ dimensions have been defined. A dimension is a single aspect of DQ, such as accuracy, completeness, timeliness, and relevancy. In order to measure dimensions, special tools have been developed. These are called metrics. In most organisations, some data are more significant than others. In other words, some data carry more ‘weight’. Hence, they must play a more... 

    A protocol for constraint automata execution in a synchronous network of processors

    , Article 12th International Conference on Verification and Evaluation of Computer and Communication Systems, VECoS 2018, 26 September 2018 through 28 September 2018 ; Volume 11181 LNCS , 2018 , Pages 80-94 ; 03029743 (ISSN); 9783030003586 (ISBN) Farhadi, A ; Izadi, M ; Habibi, J ; Sharif University of Technology
    Springer Verlag  2018
    Abstract
    In service oriented computing we encounter the problem of coordinating autonomous services (e.g., micro-services) communicate within the deployment environments (e.g., multi-cloud infrastructures) but participate for the functional requirements. While the environments have the deployment concerns like real-time, security, privacy or even energy consumption constraints, for the sake of brevity, the formal models of coordination in service oriented systems generally abstract away these concerns and focus on the functional ones such as synchronization, data and context dependency constraints. In this paper, we consider Constraint Automata (CA) as a formal model of the functional behaviours for... 

    Correction to: Wave propagation characteristics of the electrically GNP-reinforced nanocomposite cylindrical shell (Journal of the Brazilian Society of Mechanical Sciences and Engineering, (2019), 41, 5, (221), 10.1007/s40430-019-1715-x)

    , Article Journal of the Brazilian Society of Mechanical Sciences and Engineering ; Volume 41, Issue 6 , 2019 ; 16785878 (ISSN) Habibi, M ; Mohammadgholiha, M ; Safarpour, H ; Sharif University of Technology
    Springer Verlag  2019
    Abstract
    The article Wave propagation characteristics of the electrically GNP reinforced nanocomposite cylindrical shell, written by Hamed Safarpour, was originally published electronically on the publisher’s internet portal (currently SpringerLink) on 12/04/2019 with open access. With the author(s)’ decision to step back from Open Choice, the copyright of the article changed on [07/05/2019] to © The Brazilian Society of Mechanical Sciences and Engineering 2019 and the article is forthwith distributed under the terms of copyright  

    Wave propagation characteristics of the electrically GNP-reinforced nanocomposite cylindrical shell

    , Article Journal of the Brazilian Society of Mechanical Sciences and Engineering ; Volume 41, Issue 5 , 2019 ; 16785878 (ISSN) Habibi, M ; Mohammadgholiha, M ; Safarpour, H ; Sharif University of Technology
    Springer Verlag  2019
    Abstract
    In this article, wave propagation characteristics of a size-dependent graphene nanoplatelet (GNP) reinforced composite cylindrical nanoshell coupled with piezoelectric actuator (PIAC) and surrounded with viscoelastic foundation is presented. The effects of small scale are analyzed based on nonlocal strain gradient theory (NSGT) which is an accurate theory employing exact length scale parameter and nonlocal constant. The governing equations of the GNP composite cylindrical nanoshell coupled with PIAC have been evolved using Hamilton’s principle and solved with assistance of the analytical method. For the first time in the current study, wave propagation electrical behavior of a GNP composite... 

    Influence of spring-mass systems on frequency behavior and critical voltage of a high-speed rotating cantilever cylindrical three-dimensional shell coupled with piezoelectric actuator

    , Article JVC/Journal of Vibration and Control ; Volume 25, Issue 9 , 2019 , Pages 1543-1557 ; 10775463 (ISSN) Safarpour, H ; Pourghader, J ; Habibi, M ; Sharif University of Technology
    SAGE Publications Inc  2019
    Abstract
    In this article, vibrational behavior and critical voltage of a spinning cylindrical thick shell covered with piezoelectric actuator (PIAC) carrying spring-mass systems are investigated. It should be noted that, the installed sensors on the proposed systems are considered as a tip mass. This structure rotates about axial direction and the formulations include the Coriolis and centrifugal effects. In addition, various cases of thermal (uniform, linear, and nonlinear) distributions are studied. The modeled cylindrical thick shell covered with PIAC, its equations of motion, and boundary conditions are derived by the principle of minimum total potential energy and based on a new... 

    Measuring data quality with weighted metrics

    , Article Total Quality Management and Business Excellence ; Volume 30, Issue 5-6 , 2019 , Pages 708-720 ; 14783363 (ISSN) Vaziri, R ; Mohsenzadeh, M ; Habibi, J ; Sharif University of Technology
    Routledge  2019
    Abstract
    Data quality (DQ) has been defined as ‘fitness for use’. In order to measure and improve DQ, various methodologies have been defined. A DQ methodology is a set of guidelines and techniques that define a rational process to measure and improve the quality of data. In order to make DQ measurement and improvement more organised, DQ dimensions have been defined. A dimension is a single aspect of DQ, such as accuracy, completeness, timeliness, and relevancy. In order to measure dimensions, special tools have been developed. These are called metrics. In most organisations, some data are more significant than others. In other words, some data carry more ‘weight’. Hence, they must play a more... 

    Efficient distribution of requests in federated cloud computing environments utilizing statistical multiplexing

    , Article Future Generation Computer Systems ; Volume 90 , 2019 , Pages 451-460 ; 0167739X (ISSN) Habibi, M ; Fazli, M ; Movaghar, A ; Sharif University of Technology
    Elsevier B.V  2019
    Abstract
    One of the main questions in cloud computing environments is how to efficiently distribute user requests or Virtual Machines (VMs) based on their resource needs over time. This question is also an important one when dealing with a cloud federation environment where rational cloud service providers are collaborating together by sharing customer requests. By considering intrinsic aspects of the cloud computing model one can propose request distribution methods that play on the strengths of this computing paradigm. In this paper we look at statistical multiplexing and server consolidation as such a strength and examine the use of the coefficient of variation and other related statistical... 

    Predicting subjective features from questions on qa websites using BERT

    , Article 6th International Conference on Web Research, ICWR 2020, 22 April 2020 through 23 April 2020 ; 2020 , Pages 240-244 Annamoradnejad, I ; Fazli, M ; Habibi, J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Community Question-Answering websites, such as StackOverflow and Quora, expect users to follow specific guidelines in order to maintain content quality. These systems mainly rely on community reports for assessing contents, which has serious problems, such as the slow handling of violations, the loss of normal and experienced users' time, the low quality of some reports, and discouraging feedback to new users. Therefore, with the overall goal of providing solutions for automating moderation actions in QA websites, we aim to provide a model to predict 20 quality or subjective aspects of questions in QA websites. To this end, we used data gathered by the CrowdSource team at Google Research in... 

    Efficient distribution of requests in federated cloud computing environments utilizing statistical multiplexing

    , Article Future Generation Computer Systems ; Volume 90 , 2019 , Pages 451-460 ; 0167739X (ISSN) Habibi, M ; Fazli, M ; Movaghar, A ; Sharif University of Technology
    Elsevier B.V  2019
    Abstract
    One of the main questions in cloud computing environments is how to efficiently distribute user requests or Virtual Machines (VMs) based on their resource needs over time. This question is also an important one when dealing with a cloud federation environment where rational cloud service providers are collaborating together by sharing customer requests. By considering intrinsic aspects of the cloud computing model one can propose request distribution methods that play on the strengths of this computing paradigm. In this paper we look at statistical multiplexing and server consolidation as such a strength and examine the use of the coefficient of variation and other related statistical... 

    Influence of system parameters on buckling and frequency analysis of a spinning cantilever cylindrical 3D shell coupled with piezoelectric actuator

    , Article Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science ; Volume 234, Issue 2 , 2020 , Pages 512-529 Shokrgozar, A ; Safarpour, H ; Habibi, M ; Sharif University of Technology
    SAGE Publications Ltd  2020
    Abstract
    In this research, buckling and vibrational characteristics of a spinning cylindrical moderately thick shell covered with piezoelectric actuator carrying spring-mass systems are performed. This structure rotates about axial direction and the formulations include the Coriolis and centrifugal effects. In addition, various cases of thermal (uniform, linear, and nonlinear) distributions are studied. The modeled cylindrical moderately thick shell covered with piezoelectric actuator, its equations of motion, and boundary conditions are derived by the Hamilton's principle and based on a moderately cylindrical thick shell theory. For the first time in the present study, attached mass-spring systems...