Loading...
Search for:
habibi--mahyar
0.141 seconds
Total 392 records
Business Process Oriented Software Engineering
, M.Sc. Thesis Sharif University of Technology ; Habibi, Jafar (Supervisor)
Abstract
Enterprises are founded according to their business processes based on its targets. For implementing an Information System, first it is required to analyze, design and model of the processes based on a specific methodology.The methodologies of software engineering usually used to be function oriented however object oriented is usual and practical todays. Analyzing the business processes according to one of these two concepts has some problems, however merging these two concepts, makes a powerful method in analyzing and designing of a system more easily and accurately.Some software development methodologies consider these two aspects in a way, however working with them has many complexities...
A novel design of the KASUMI block cipher using one-hot residue number system
, Article Middle East Journal of Scientific Research ; Volume 11, Issue 8 , 2012 , Pages 1078-1086 ; 19909233 (ISSN) ; Sharif University of Technology
2012
Abstract
The KASUMI block cipher is used for the cellular communications networks and safety of many wireless standards. Third generation cellular network technology (3G) permits to transmit information, voice and video at very high data rates never seen before that will revolutionize personal communications and information exchange. On the other hand, Residue Number System (RNS) is a modular representation and is evidenced to be serviceable equipment in many applications which need high-speed computations and high-performance components. RNS is a non-weighted and integer number system that can support secure, highspeed, low-power, parallel and carry-free arithmetic. For attaining the most...
Reliable and high-speed KASUMI block cipher by residue number system code
, Article World Applied Sciences Journal ; Volume 17, Issue 9 , 2012 , Pages 1149-1158 ; 18184952 (ISSN) ; Sharif University of Technology
2012
Abstract
Third generation cellular network technology (3G) can revolutionize communications and data exchanges between many people in a more overwhelming fashion than 2G and 2.5G networks did. The 3G UMTS, the 3G GSM and the 3G GPRS rely on the KASUMI block cipher. Therefore, increasing speed, decreasing power consumption and error detection/correction are the major concerns of the KASUMI algorithm and its generation. On the other hand, Residue Number System is a non-weighted number system and it is currently considered as an important method for high-speed, low-power, parallel and carry-free arithmetic realizations. Redundant Residue Number System is an extension of RNS that also supports error...
UCS-NT: An unbiased compressive sensing framework for Network Tomography
, Article ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings ; 2013 , Pages 4534-4538 ; 15206149 (ISSN) ; 9781479903566 (ISBN) ; Rabiee, H. R ; Hashemifar, Z. S ; Sharif University of Technology
2013
Abstract
This paper addresses the problem of recovering sparse link vectors with network topological constraints that is motivated by network inference and tomography applications. We propose a novel framework called UCS-NT in the context of compressive sensing for sparse recovery in networks. In order to efficiently recover sparse specification of link vectors, we construct a feasible measurement matrix using this framework through connected paths. It is theoretically shown that, only O(k log(n)) path measurements are sufficient for uniquely recovering any k-sparse link vector. Moreover, extensive simulations demonstrate that this framework would converge to an accurate solution for a wide class of...
Detection of top-K central nodes in social networks: A compressive sensing approach
, Article Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015, 25 August 2015 through 28 August 2015 ; 2015 , Pages 902-909 ; 9781450338547 (ISBN) ; Pei, J ; Tang, J ; Silvestri, F ; Sharif University of Technology
Association for Computing Machinery, Inc
2015
Abstract
In analysing the structural organization of a social network, identifying important nodes has been a fundamental problem. The concept of network centrality deals with the assessment of the relative importance of a particular node within the network. Most of the traditional network centrality definitions have a high computational cost and require full knowledge of network topological structure. On the one hand, in many applications we are only interested in detecting the top-k central nodes of the network with the largest values considering a specific centrality metric. On the other hand, it is not feasible to efficiently identify central nodes in a large real-world social network via...
Compressed sensing in cyber physical social systems
, Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 10760 LNCS , 2018 , Pages 287-305 ; 03029743 (ISSN) ; Ghalebi, K. E ; Movaghar, A ; Mahyar, H ; Sharif University of Technology
2018
Abstract
We overview the main results in Compressed Sensing and Social Networks, and discuss the impact they have on Cyber Physical Social Systems (CPSS), which are currently emerging on top of the Internet of Things. Moreover, inspired by randomized Gossip Protocols, we introduce TopGossip, a new compressed-sensing algorithm for the prediction of the top-k most influential nodes in a social network. TopGossip is able to make this prediction by sampling only a relatively small portion of the social network, and without having any prior knowledge of the network structure itself, except for its set of nodes. Our experimental results on three well-known benchmarks, Facebook, Twitter, and Barabási,...
Controlling best response dynamics for network games
, Article IEEE Transactions on Network Science and Engineering ; March , 2018 ; 23274697 (ISSN) ; Maazallahi, A ; Habibi, J ; Habibi, M ; Sharif University of Technology
IEEE Computer Society
2018
Abstract
Controlling networked dynamical systems is a complex endeavor, specifically keeping in mind the fact that in many scenarios the actors that are engaged in the dynamism behave selfishly and therefore only take into account their own individual utility, a setting that has been widely studied in the field of game theory. One way that we can control the system dynamics is through the use of control parameters that are at our disposal, but finding optimal values for these parameters is a complex and time consuming task. In this paper we use the relation between network structural properties and control parameters to create a mathematical model that uses learning methods to find optimal values...
Detection of Central Nodes in Social Networks
, Ph.D. Dissertation Sharif University of Technology ; Movaghar, Ali (Supervisor) ; Rabiee, Hamid Reza (Supervisor)
Abstract
In analyzing the structural organization of many real-world networks, identifying important nodes has been a fundamental problem. The network centrality concept deals with the assessment of the relative importance of network nodes based on specific criteria. Central nodes can play significant roles on the spread of influence and idea in social networks, the user activity in mobile phone networks, the contagion process in biological networks, and the bottlenecks in communication networks. High computational cost and the requirement of full knowledge about the network topology are the most significant obstacles for applying the general concept of network centrality to large real-world social...
A low-cost sparse recovery framework for weighted networks under compressive sensing
, Article Proceedings - 2015 IEEE International Conference on Smart City, SmartCity 2015, Held Jointly with 8th IEEE International Conference on Social Computing and Networking, SocialCom 2015, 5th IEEE International Conference on Sustainable Computing and Communications, SustainCom 2015, 2015 International Conference on Big Data Intelligence and Computing, DataCom 2015, 5th International Symposium on Cloud and Service Computing, SC2 2015, 19 December 2015 through 21 December 2015 ; 2015 , Pages 183-190 ; 9781509018932 (ISBN) ; Rabiee, H. R ; Movaghar, A ; Hasheminezhad, R ; Ghalebi, E ; Nazemian, A ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2015
Abstract
In this paper, motivated by network inference, we introduce a general framework, called LSR-Weighted, to efficiently recover sparse characteristic of links in weighted networks. The links in many real-world networks are not only binary entities, either present or not, but rather have associated weights that record their strengths relative to one another. Such models are generally described in terms of weighted networks. The LSR-Weighted framework uses a newly emerged paradigm in sparse signal recovery named compressive sensing. We study the problem of recovering sparse link vectors with network topological constraints over weighted networks. We evaluate performance of the proposed framework...
Extracting implicit social relation for social recommendation techniques in user rating prediction
, Article 26th International World Wide Web Conference, WWW 2017 Companion, 3 April 2017 through 7 April 2017 ; 2019 , Pages 1343-1351 ; 9781450349147 (ISBN) ; Elahe Ghalebi, K ; Mahyar, H ; Grosu, R ; Firouzi, M ; Movaghar, A ; Sharif University of Technology
International World Wide Web Conferences Steering Committee
2019
Abstract
Recommendation plays an increasingly important role in our daily lives. Recommender systems automatically suggest items to users that might be interesting for them. Recent studies illustrate that incorporating social trust in Matrix Factorization methods demonstrably improves accuracy of rating prediction. Such approaches mainly use the trust scores explicitly expressed by users. However, it is often challenging to have users provide explicit trust scores of each other. There exist quite a few works, which propose Trust Metrics to compute and predict trust scores between users based on their interactions. In this paper, first we present how social relation can be extracted from users'...
Centrality-based group formation in group recommender systems
, Article 26th International World Wide Web Conference, WWW 2017 Companion, 3 April 2017 through 7 April 2017 ; 2019 , Pages 1187-1196 ; 9781450349147 (ISBN) ; Khalili, S ; Elahe Ghalebi, K ; Grosu, R ; Mojde Morshedi, S ; Movaghar, A ; Sharif University of Technology
International World Wide Web Conferences Steering Committee
2019
Abstract
Recommender Systems have become an attractive field within the recent decade because they facilitate users' selection process within limited time. Conventional recommender systems have proposed numerous methods focusing on recommendations to individual users. Recently, due to a significant increase in the number of users, studies in this field have shifted to properly identify groups of people with similar preferences and provide a list of recommendations for each group. Offering a recommendations list to each individual requires significant computational cost and it is therefore often not efficient. So far, most of the studies impose four restrictive assumptions: (1) limited number of...
Extracting implicit social relation for social recommendation techniques in user rating prediction
, Article 26th International World Wide Web Conference, WWW 2017 Companion, 3 April 2017 through 7 April 2017 ; 2019 , Pages 1343-1351 ; 9781450349147 (ISBN) ; Elahe Ghalebi, K ; Mahyar, H ; Grosu, R ; Firouzi, M ; Movaghar, A ; Sharif University of Technology
International World Wide Web Conferences Steering Committee
2019
Abstract
Recommendation plays an increasingly important role in our daily lives. Recommender systems automatically suggest items to users that might be interesting for them. Recent studies illustrate that incorporating social trust in Matrix Factorization methods demonstrably improves accuracy of rating prediction. Such approaches mainly use the trust scores explicitly expressed by users. However, it is often challenging to have users provide explicit trust scores of each other. There exist quite a few works, which propose Trust Metrics to compute and predict trust scores between users based on their interactions. In this paper, first we present how social relation can be extracted from users'...
Identifying central nodes for information flow in social networks using compressive sensing
, Article Social Network Analysis and Mining ; Volume 8, Issue 1 , 2018 ; 18695450 (ISSN) ; Hasheminezhad, R ; Ghalebi, E ; Nazemian, A ; Grosu, R ; Movaghar, A ; Rabiee, H. R ; Sharif University of Technology
Springer-Verlag Wien
2018
Abstract
This paper addresses the problem of identifying central nodes from the information flow standpoint in a social network. Betweenness centrality is the most prominent measure that shows the node importance from the information flow standpoint in the network. High betweenness centrality nodes play crucial roles in the spread of propaganda, ideologies, or gossips in social networks, the bottlenecks in communication networks, and the connector hubs in biological systems. In this paper, we introduce DICeNod, a new approach to efficiently identify central nodes in social networks without direct measurement of each individual node using compressive sensing, which is a well-known paradigm in sparse...
Compressive sensing of high betweenness centrality nodes in networks
, Article Physica A: Statistical Mechanics and its Applications ; Volume 497 , 1 May , 2018 , Pages 166-184 ; 03784371 (ISSN) ; Hasheminezhad, R ; Ghalebi, E ; Nazemian, A ; Grosu, R ; Movaghar, A ; Rabiee, H. R ; Sharif University of Technology
Elsevier B.V
2018
Abstract
Betweenness centrality is a prominent centrality measure expressing importance of a node within a network, in terms of the fraction of shortest paths passing through that node. Nodes with high betweenness centrality have significant impacts on the spread of influence and idea in social networks, the user activity in mobile phone networks, the contagion process in biological networks, and the bottlenecks in communication networks. Thus, identifying k-highest betweenness centrality nodes in networks will be of great interest in many applications. In this paper, we introduce CS-HiBet, a new method to efficiently detect top-k betweenness centrality nodes in networks, using compressive sensing....
Passive radar processing blocks gain estimation
, Article International MultiConference of Engineers and Computer Scientists 2007, IMECS 2007, Kowloon, 21 March 2007 through 23 March 2007 ; Volume 2 , 2007 , Pages 1748-1752 ; 20780958 (ISSN) ; 9789889867171 (ISBN) ; Behnia, F ; Sharif University of Technology
2007
Abstract
Passive radars use illuminators of opportunity to detect target and measure its parameters. The usual processing routine consists of direct path interference and clutter removal and computation of cross ambiguity function (CAF) to estimate ampIitude-range-Doppler surface. Main parameters affecting this procedure are direct path interference and clutter, receiver thermal noise and near large targets. This paper presents an investigation on effect of each parameter and tries to estimate processing gain of each Block. A comparison between different adaptive interference removal methods also presented
Magnetic, thermally stable, and superhydrophobic polyurethane sponge: A high efficient adsorbent for separation of the marine oil spill pollution
, Article Chemosphere ; Volume 287 , 2022 ; 00456535 (ISSN) ; Pourjavadi, A ; Sharif University of Technology
Elsevier Ltd
2022
Abstract
Herein, we demonstrated a facile method for the fabrication of magnetic and superhydrophobic polyurethane sponge with water contact angle of 159° as an adsorbent for cleanup the marine oil spill pollution. For this aim, a polyurethane sponge was coated with carbon black (CB), hexagonal boron nitride (h-BN)@Fe3O4, and acrylic resin and then characterized by different techniques. Owing to the chemical and thermal stability of h-BN and CB, the modified sponge was stable under corrosive conditions (pH = 1–14 and salt solutions) and at different temperatures (−12 °C–105 °C). In addition to common oils and organic solvents, we also used the real spilled oils containing monoaromatics and...
Thermally conductive and superhydrophobic polyurethane sponge for solar-assisted separation of high-viscosity crude oil from water
, Article ACS Applied Materials and Interfaces ; Volume 14, Issue 5 , 2022 , Pages 7329-7339 ; 19448244 (ISSN) ; Pourjavadi, A ; Sharif University of Technology
American Chemical Society
2022
Abstract
The rapid and effective separation of high-viscosity heavy crude oil from seawater is a worldwide challenge. Herein, an ultralow density, photothermal, superhydrophobic, and thermally conductive polyurethane/polyaniline/hexagonal boron nitride@Fe3O4/polyacrylic-oleic acid resin sponge (PU/PANI/h-BN@Fe3O4/AR) was fabricated with a water contact angle (WCA) of 158°, thermal conductivity of 0.76 W m-1 K-1, density of 0.038 g cm-3, limited oxygen index (LOI) of 28.82%, and porosity of 97.97% and used for solar-assisted separation of high-viscosity crude oil from water. Photothermal components were composed of PANI and Fe3O4, while h-BN particles were used as thermally conductive and flame...
Superhydrophobic and thermally conductive carbon black/hexagonal boron nitride@Fe3O4/cellulose composite paper for electromagnetic interference shielding
, Article Synthetic Metals ; Volume 285 , 2022 ; 03796779 (ISSN) ; Pourjavadi, A ; Sharif University of Technology
Elsevier Ltd
2022
Abstract
Herein, a series of superhydrophobic thin polyacrylic resin-coated carbon black (CB)/hexagonal boron nitride (h-BN)@Fe3O4/cellulose composite papers with good flexibility, low density (~0.67 g/cm3), high electrical conductivity (~0.065 S/cm), good thermal conductivity (0.462 W.m−1. K−1), and with water contact angle (WCA) of 153° were successfully fabricated by a facile dip-coating/spraying method. The CB-BN@Fe3O4 distribution in cellulose matrix provided high electrical conductivity in the in-plane and thickness directions. The electrical conductivity in both in-plane and thickness directions increased by increasing the number of vacuum-assisted dip-coating cycles. Moreover, these...
Exploiting Locality Properties of Nodes for Improving Search Efficiency in P2P Networks
, M.Sc. Thesis Sharif University of Technology ; Habibi, Jafar (Supervisor)
Abstract
The Use of peer-to-peer architectures instead of traditional client-server architecture can be beneficial in many aspects such as increasing scalability of the systems, enhancing fault tolerance in critical situations, extending the system resources and various other advantages. Nowadays, many applications are based on peer-to-peer architectures and as a result, a large portion of the internet traffic is produced by these applications. This has been a motivation to many researchers to focus on reducing the amount of this traffic while satisfying the content distribution demands. One of the main problems that can result in generating large amount of traffic and also long response times for...
Automatic Extraction of Semantic Web Service Composition Patterns
, M.Sc. Thesis Sharif University of Technology ; Habibi, Jafar (Supervisor)
Abstract
In today’s competitive world، web services have become more and more prevalent and their efficient discovery and composition in order to create novel functionalities is essential for variety of applications. Due to the large number of available services، the discovery of services is a difficult and time consuming task. Existing approaches in web services discovery and composition attempt to use simple web services while ignoring the use of once composed services. Reusing frequently used composite services can considerably increase performance of the entire system. Moreover، the advent of semantic web، as an effective solution of representing information interpretable by machines and none...