Loading...
Search for:
hadavi--mahdi
0.105 seconds
Total 383 records
Vehicle identification sensor models for origin-destination estimation
, Article Transportation Research Part B: Methodological ; Volume 89 , 2016 , Pages 82-106 ; 01912615 (ISSN) ; Shafahi, Y ; Sharif University of Technology
Elsevier Ltd
2016
Abstract
The traditional approach to origin-destination (OD) estimation based on data surveys is highly expensive. Therefore, researchers have attempted to develop reasonable low-cost approaches to estimating the OD vector, such as OD estimation based on traffic sensor data. In this estimation approach, the location problem for the sensors is critical. One type of sensor that can be used for this purpose, on which this paper focuses, is vehicle identification sensors. The information collected by these sensors that can be employed for OD estimation is discussed in this paper. We use data gathered by vehicle identification sensors that include an ID for each vehicle and the time at which the sensor...
Vehicle identification sensors location problem for large networks
, Article Journal of Intelligent Transportation Systems: Technology, Planning, and Operations ; 2018 ; 15472450 (ISSN) ; Shafahi, Y ; Sharif University of Technology
Taylor and Francis Inc
2018
Abstract
Finding the optimal location for sensors is a key problem in flow estimation. There are several location models that have been developed recently for vehicle identification (ID) sensors. However, these location models cannot be applied to large networks because there are many constraints and integer variables. Based on a property of the location problem for vehicle ID sensors, given the initial vehicle ID sensors that are pre-installed and fixed on the network, this article presents a solution that greatly reduces the size of this location problem. An applied example demonstrates that when 8% of the arcs from a real network that are randomly selected have a vehicle ID sensor, the reductions...
Vehicle Identification Sensors Location Problem with the Purpose of Origin-destination Estimation
, Ph.D. Dissertation Sharif University of Technology ; Shafahi, Yousef (Supervisor)
Abstract
Origin-Destination (OD) table is an important input for managing and controling processes of transportation systems. OD flow estimation based on the observations of traffic sensors is a famous way of attaining this table. Technology developments in recent years reduce the cost and improve the quality of the results for this method. This research explores the methods for applying one of these technologies, vehicle identification systems, with the purpose of OD flow estimation.In this research several location models for vehicle identification systems are presented. These models have better performances comparing to the existing models in the literature. Furthermore, location models for some...
Vehicle identification sensors location problem for large networks
, Article Journal of Intelligent Transportation Systems: Technology, Planning, and Operations ; Volume 23, Issue 4 , 2019 , Pages 389-402 ; 15472450 (ISSN) ; Shafahi, Y ; Sharif University of Technology
Taylor and Francis Inc
2019
Abstract
Finding the optimal location for sensors is a key problem in flow estimation. There are several location models that have been developed recently for vehicle identification (ID) sensors. However, these location models cannot be applied to large networks because there are many constraints and integer variables. Based on a property of the location problem for vehicle ID sensors, given the initial vehicle ID sensors that are pre-installed and fixed on the network, this article presents a solution that greatly reduces the size of this location problem. An applied example demonstrates that when 8% of the arcs from a real network that are randomly selected have a vehicle ID sensor, the reductions...
Applications of Hough Transform in Frequency Domain for Radar Systems
, M.Sc. Thesis Sharif University of Technology ; Nayebi, Mohammad Mehdi (Supervisor)
Abstract
Hough transform is frequently used in radar applications. The structure of using this transformation in radars is so that it has been used only in Range radars which transmit short pulses and their primary goal is to make better estimation of the range of the targets. In this work, we introduce the ways in which we can use the Hough transform in Doppler radars which transmit long pulses and their primary goal is to make better estimation of target doppler. We must use Hough transform in time-doppler domain for this class of radars including continuous-wave radars. To prepare this time-doppler domain image some time-frequency transform must be applied to the radar received signal and a part...
Equilibrium Flow with Side Constraint
, M.Sc. Thesis Sharif University of Technology ; Zakai Aashtiani, Hedayat (Supervisor)
Abstract
Wardrop’s first principle for defining the equilibrium flow in transportation networks is one of the mostly accepted assumptions in traffic assignment models. Optimization Models, Variational Inequalities, and Complementarity Equations are among the known models based on this assumption. In these models with the assumption of unlimited capacity for the network’s arcs and use of nonlinear cost functions, the constraint of arc capacity is considered implicitly. Another approach is to consider the arc capacity, explicitly. In recent decade this approach was the subject of some researches. In this thesis, these researches will be discussed. Then, researches about explicit consideration of the...
An Approach for Secure Data Outsourcing
, Ph.D. Dissertation Sharif University of Technology ; alili, Rasool (Supervisor)
Abstract
Data outsourcing is an approach to delegate the burden of data management to external servers. In spite of its clear advantages, data outsourcing requires security assurances including data confidentiality, query result correctness, and access control enforcement. Research proposals have identified solutions with disparate assumptions for different security requirements. It is a real obstacle towards having an integrated solution through the combination of existing approaches. The practicality of data outsourcing to the cloud is seriously affected by this challenge. In this thesis, a unified view based on secret sharing is proposed to simultaneously achieve confidentiality, correctness, and...
A new MCMC sampling based segment model for radar target recognition
, Article Radioengineering ; Volume 24, Issue 1 , 2015 , Pages 280-287 ; 12102512 (ISSN) ; Radmard, M ; Nayebi, M ; Sharif University of Technology
Czech Technical University
2015
Abstract
One of the main tools in radar target recognition is high resolution range profile (HRRP). However, it is very sensitive to the aspect angle. One solution to this problem is to assume the consecutive samples of HRRP identically independently distributed (IID) in small frames of aspect angles, an assumption which is not true in reality. However, based on this assumption, some models have been developed to characterize the sequential information contained in the multi-aspect radar echoes. Therefore, they only consider the short dependency between consecutive samples. Here, we propose an alternative model, the segment model, to address the shortcomings of these assumptions. In addition, using a...
Access control aware data retrieval for secret sharing based database outsourcing
, Article Distributed and Parallel Databases ; Volume 34, Issue 4 , 2016 , Pages 505-534 ; 09268782 (ISSN) ; Jalili, R ; Karimi, L ; Sharif University of Technology
Springer New York LLC
2016
Abstract
Enforcing dynamic and confidential access control policies is a challenging issue of data outsourcing to external servers due to the lack of trust towards the servers. In this paper, we propose a scalable yet flexible access control enforcement mechanism when the underlying relational data, on which access policies are defined, has been shared through a secret sharing scheme. For sharing values of an attribute in a relation, the attribute is assigned a secret distribution key and its values are split and distributed among data servers according to a Shamir based secret sharing scheme. Given access control policies over attributes of the relation schema, access to distribution keys, used...
Access control aware data retrieval for secret sharing based database outsourcing
, Article Distributed and Parallel Databases ; Volume 34, Issue 4 , Dec , 2015 , pp 505–534 ; 09268782 (ISSN) ; Jalili, R ; Karimi, L ; Sharif University of Technology
Kluwer Academic Publishers
2015
Abstract
Enforcing dynamic and confidential access control policies is a challenging issue of data outsourcing to external servers due to the lack of trust towards the servers. In this paper, we propose a scalable yet flexible access control enforcement mechanism when the underlying relational data, on which access policies are defined, has been shared through a secret sharing scheme. For sharing values of an attribute in a relation, the attribute is assigned a secret distribution key and its values are split and distributed among data servers according to a Shamir based secret sharing scheme. Given access control policies over attributes of the relation schema, access to distribution keys, used...
Quantization effect of the parameter space on the performance of Hough detector
, Article 4th Microwave and Radar Week MRW-2010 - 11th International Radar Symposium, IRS 2010 - Conference Proceedings, 16 June 2010 through 18 June 2010 ; June , 2010 , Pages 457-460 ; 9789955690184 (ISBN) ; Moqiseh, A ; Nayebi, M. M ; Sharif University of Technology
2010
Abstract
Hough transform is proposed in literature as an effective technique for target detection in search radars. However, this detector has a disadvantage when the received SNR of radar is low. Although the distribution of noise power in the data space is often uniform and all processing cells of this space approximately receive the same power of noise, after transforming these cells to the Hough parameter space, this distribution will not remain uniform. In other words, noise power in some regions of the parameter space is greater than the others. Therefore, false alarm increases in these regions. Selecting a greater threshold to reduce the number of false detections will result a lower...
Polynomial segment model for radar target recognition using Gibbs sampling approach
, Article IET Signal Processing ; Volume 11, Issue 3 , 2017 , Pages 285-294 ; 17519675 (ISSN) ; Radmard, M ; Nayebi, M. M ; Sharif University of Technology
Institution of Engineering and Technology
2017
Abstract
High resolution range profile (HRRP) is a widely noted tool in radar target recognition. However, its high sensitivity to the target's aspect angle makes it necessary to seek solutions for this problem. One alternative is to assume consecutive samples of HRRP identically and independently distributed in small frames of aspect angles, an assumption which is not true in reality. Based on this simplifying assumption, some models, such as the hidden Markov model, have been developed to characterise the sequential information contained in multi-aspect radar echoes. As a result, these models consider only the short dependency between consecutive samples. Considering such issues, in this study, the...
Self-powered wearable piezoelectric sensors based on polymer nanofiber-metal-organic framework nanoparticle composites for arterial pulse monitoring
, Article ACS Applied Nano Materials ; Volume 3, Issue 9 , August , 2020 , Pages 8742-8752 ; Hasanzadeh, M ; Simchi, A ; Sharif University of Technology
American Chemical Society
2020
Abstract
High-performance wearable electronic devices with the capability of converting mechanical force into electrical energy have been gaining increasing attention for biomedical monitoring applications. We present a novel wearable piezoelectric sensor based on a poly(vinylidene fluoride) (PVDF) nanofibrous membrane containing microporous zirconium-based metal-organic frameworks (MOFs) for arterial pulse monitoring. It is shown that the incorporation of 5 wt % of MOF greatly enhances the piezoelectric constant of the polymer fibrous mat by 3.4-fold without significant loss in its flexibility. The nanofibrous composite exhibits a peak-to-peak voltage of 600 mV under an applied force of 5 N, which...
Surface roughness of electrospun nanofibrous mats by a novel image processing technique
, Article Surface Review and Letters ; Volume 26, Issue 1 , 2019 ; 0218625X (ISSN) ; Kasaei, S ; Haghi, A. K ; Sharif University of Technology
World Scientific Publishing Co. Pte Ltd
2019
Abstract
A novel technique based on image processing inspired by the simple assumption for the first time to assess the roughness of nanofibrous mats based on grayscale variations is proposed. The height of a nanofibrous mat in different regions of the surface is simulated by grayscale variations in the image while the relation between grayscale and height is obtained as a linear function. The roughness is obtained by measuring height variations in the surface profile. Statistical roughness parameters of nanofibrous mats are also obtained from direct measurement with roughness profilometry and atomic force microscopy (AFM) for comparison of the roughness of nanofibrous mats between direct measurement...
Database as a service: Towards a unified solution for security requirements
, Article Proceedings - International Computer Software and Applications Conference ; 2012 , Pages 415-420 ; 07303157 (ISSN) ; 9780769547589 (ISBN) ; Noferesti, M ; Jalili, R ; Damiani, E ; Sharif University of Technology
2012
Abstract
Security of database outsourcing, due to the untrustworthiness of service provider, is a basic challenge to have Database As a Service in a cloud computing environment. Having disparate assumptions to solve different aspects of security such as confidentiality and integrity is an obstacle for an integrated secure solution through the combination of existing approaches. Concentrating on confidentiality and integrity aspects of database outsourcing, this paper proposes an approach in which each attribute value is split up between several data servers using a customized threshold secret sharing scheme. Our approach preserves data confidentiality and at the same time provides the correctness...
Security and searchability in secret sharing-based data outsourcing
, Article International Journal of Information Security ; Volume 14, Issue 6 , November , 2015 , Pages 513-529 ; 16155262 (ISSN) ; Jalili, R ; Damiani, E ; Cimato, S ; Sharif University of Technology
Springer Verlag
2015
Abstract
A major challenge organizations face when hosting or moving their data to the Cloud is how to support complex queries over outsourced data while preserving their confidentiality. In principle, encryption-based systems can support querying encrypted data, but their high complexity has severely limited their practical use. In this paper, we propose an efficient yet secure secret sharing-based approach for outsourcing relational data to honest-but-curious data servers. The problem with using secret sharing in a data outsourcing scenario is how to efficiently search within randomly generated shares. We present multiple partitioning methods that enable clients to efficiently search among shared...
Surface roughness of electrospun nanofibrous mats by a novel image processing technique
, Article Surface Review and Letters ; Volume 26, Issue 1 , 2019 ; 0218625X (ISSN) ; Kasaei, S ; Khodaparast Haghi, A ; Sharif University of Technology
World Scientific Publishing Co. Pte Ltd
2019
Abstract
A novel technique based on image processing inspired by the simple assumption for the first time to assess the roughness of nanofibrous mats based on grayscale variations is proposed. The height of a nanofibrous mat in different regions of the surface is simulated by grayscale variations in the image while the relation between grayscale and height is obtained as a linear function. The roughness is obtained by measuring height variations in the surface profile. Statistical roughness parameters of nanofibrous mats are also obtained from direct measurement with roughness profilometry and atomic force microscopy (AFM) for comparison of the roughness of nanofibrous mats between direct measurement...
Missing a trusted reference monitor: How to enforce confidential and dynamic access policies?
, Article Communications in Computer and Information Science ; Vol. 428, issue , Oct , 2014 , p. 92-104 ; ISSN: 18650929 ; ISBN: 978-3319109022 ; Javadi, S. A ; Hadavi, M. A ; Jalili1, R ; Sharif University of Technology
2014
Abstract
Popularity of data outsourcing and its consequent access control issues such as dynamism and efficiency is the main motivation of this paper. Existing solutions suffer from the potential unlimited number of user keys, inefficient update of policies, and disclosure of data owner’s access control policies. Using Chinese remainder theorem and proxy re-encryption together, in this paper, we propose an efficient access control enforcement mechanism based on selective encryption that addresses all the shortages. The overall architecture, required algorithms, and access control policy update are discussed. The mechanism is evaluated through simulation and, the given results are satisfactory
Computational-based approach for predicting porosity of electrospun nanofiber mats using response surface methodology and artificial neural network methods
, Article Journal of Macromolecular Science, Part B: Physics ; Volume 54, Issue 11 , 2015 , Pages 1404-1425 ; 00222348 (ISSN) ; Khodaparast Haghi, A ; Kasaei, S ; Hasanzadeh, M ; Sharif University of Technology
Taylor and Francis Inc
2015
Abstract
Comparative studies between response surface methodology (RSM) and artificial neural network (ANN) methods to find the effects of electrospinning parameters on the porosity of nanofiber mats is described. The four important electrospinning parameters studied included solution concentration (wt.%), applied voltage (kV), spinning distance (cm) and volume flow rate (mL/h). It was found that the applied voltage and solution concentration are the two critical parameters affecting the porosity of the nanofiber mats. The two approaches were compared for their modeling and optimization capabilities with the modeling capability of RSM showing superiority over ANN, having comparatively lower values of...
Secrecy capacity in large cooperative networks in presence of eavesdroppers with unknown locations
, Article 2016 Iran Workshop on Communication and Information Theory, IWCIT 2016, 3 May 2016 through 4 May 2016 ; 2016 ; 9781509019229 (ISBN) ; Kazempour, N ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2016
Abstract
In this paper, an extended large wireless network, with a single transmitter-receiver pair, under the secrecy constraint is considered. In contrast to works which use idealized assumptions, a more realistic network situation with unknown eavesdroppers locations is investigated: the legitimate users only know their own Channel State Information (CSI), not the eavesdroppers CSI. Also, the network is analyzed by taking in to account the effects of both fading and path loss. Under these assumptions, a power efficient cooperative scheme, named stochastic virtual beamforming, is proposed. Applying this scheme, any desired pair of secure rate and outage level denoted by (Rs, ϵ) will be achievable...