Loading...
Search for:
haghighat--m--h
0.146 seconds
Total 23110 records
Variable bit rate video traffic prediction based on kernel least mean square method
, Article IET Image Processing ; Volume 9, Issue 9 , 2015 , Pages 777-794 ; 17519659 (ISSN) ; Kalbkhani, H ; Shayesteh, M. G ; Nouri, M ; Sharif University of Technology
2015
Abstract
In this study, the problem of variable bit rate (VBR) video traffic prediction is addressed. VBR traffic prediction is necessary in dynamic bandwidth allocation for multimedia quality of service control strategies. Autoregressive (AR) models have been widely used in VBR traffic prediction where the least mean square (LMS)-based methods were utilised for parameter estimation. However, they are ineffective when the traffic is dynamic in nature. In this study, using the Brock, Dechert, and Scheinkman (BDS) test, it is shown that the video traffic is non-linear. Kernel is an efficient tool to convert non-linear data into linear one in a higher-dimensional space. The kernel LMS (KLMS) method is...
High-performance LDPC codes for CDMA applications
, Article 4th International Workshop on Mobile and Wireless Communications Network, MWCN 2002, 9 September 2002 through 11 September 2002 ; 2002 , Pages 105-109 ; 0780376056 (ISBN); 9780780376052 (ISBN) ; Jamali, S. H ; Behroozi, H ; Nasiri Kenari, M ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2002
Abstract
Recently, V. Sorokine et al. (see IEEE Trans. Commun., vol.48, no.10, p.1660-8, 2000; vol.48, no.11, p.1818-28, 2000) have introduced a class of low-density parity-check (LDPC) codes which, when applied on an IS-95 CDMA system, show, at BER=10-3, a five-fold and two-fold increase in capacity compared to the traditional uncoded scheme and to state-of-the-art low-rate orthogonal convolutional codes, respectively. However, these codes suffer from an error-floor at lower BERs which are needed for high-quality services, such as data. To enhance the capacity of CDMA systems, not only for moderate BER values but also for lower BER values, we modify the construction of these codes slightly, to...
Automatic checking of eligibility in electronic voting protocolsusing mCRL2
, Article 2011 CSI International Symposium on Computer Science and Software Engineering, CSSE 2011, 15 June 2011 through 16 June 2011 ; June , 2011 , Pages 62-68 ; 9781612842073 (ISBN) ; Mahrooghi, H. R ; Jalili, R ; Sharif University of Technology
2011
Abstract
Eligibility is one of the important security properties which must be satisfied in electronic voting systems. This property refers to legitimacy of voters and their right to vote only once. Due to insufficiency of an observational analysis to guarantee this property, formal methods are recently used to build trust on sensitive systems such as e-voting for all the involved parties. This paper reports our attempt to automatically check the eligibility property in electronic voting systems using the model checking approach. ThemCRL2 language and its toolset are also used to achieve such a checking. Two protocols, FOO92 and Lee&Kim, are modeled as case studies
Payload attribution via character dependent multi-bloom filters
, Article IEEE Transactions on Information Forensics and Security ; Volume 8, Issue 5 , 2013 , Pages 705-716 ; 15566013 (ISSN) ; Tavakoli, M ; Kharrazi, M ; Sharif University of Technology
2013
Abstract
Network forensic analysts employ payload attribution systems (PAS) as an investigative tool, which enables them to store and summarize large amounts of network traffic, including full packet payload. Hence an investigator could query the system for a specific string and check whether any of the packets transmitted previously in the network contained that specific string. As a shortcoming, the previously proposed techniques are unable to support wildcard queries. Wildcards are an important type of query that allow the investigator to locate strings in the payload when only part of the string is known. In this paper, a new data structure for payload attribution, named Character Dependent...
A bi-level approach for optimal contract pricing of independent dispatchable DG units in distribution networks
, Article International Transactions on Electrical Energy Systems ; Volume 26, Issue 8 , 2016 , Pages 1685-1704 ; 20507038 (ISSN) ; Rajabi Ghahnavieh, A ; Haghighat, H ; Sharif University of Technology
John Wiley and Sons Ltd
2016
Abstract
Distributed generation (DG) units are increasingly installed in the power systems. Distribution companies (DisCo) can opt to purchase the electricity from DG in an energy purchase contract to supply the customer demand and reduce energy loss. This paper proposes a framework for optimal contract pricing of independent dispatchable DG units considering competition among them. While DG units tend to increase their profit from the energy purchase contract, DisCo minimizes the demand supply cost. Multi-leader follower game theory concept is used to analyze the situation in which competing DG units offer the energy price to DisCo and DisCo determines the DG generation. A bi-level approach is used...
Adaptive LSTAR model for long-range variable bit rate video traffic prediction
, Article IEEE Transactions on Multimedia ; Volume 19, Issue 5 , 2017 , Pages 999-1014 ; 15209210 (ISSN) ; Shayesteh, M. G ; Haghighat, N ; Sharif University of Technology
2017
Abstract
Static bandwidth allocation for variable bit rate (VBR) video traffic forfeits the available bandwidth. Prediction of the next frame size is thus useful in dynamic bandwidth allocation. It has been shown that VBR video traces are long-range dependent, which makes one-frame-ahead prediction insufficient for dynamic bandwidth allocation. Several studies have been conducted based on the linear autoregressive (AR) model to address VBR traffic prediction. In this paper, we propose the use of a nonlinear model from the AR family called logistic smooth transition autoregressive (LSTAR) to predict VBR video traffic. Furthermore, we introduce adaptive algorithms, including least mean square (LMS),...
Harmony search based algorithms for bandwidth-delay-constrained least-cost multicast routing
, Article Computer Communications ; Volume 31, Issue 10 , 2008 , Pages 2505-2519 ; 01403664 (ISSN) ; Toroghi Haghighat, A ; Mahdavi, M ; Sharif University of Technology
2008
Abstract
The advent of various real-time multimedia applications in high-speed networks creates a need for quality of service (QoS) based multicast routing. Two important QoS constraints are the bandwidth constraint and the end-to-end delay constraint. The QoS based multicast routing problem is a known NP-complete problem that depends on (1) bounded end-to-end delay and link bandwidth along the paths from the source to each destination, and (2) minimum cost of the multicast tree. In this paper, we presents novel centralized algorithms to solve the bandwidth-delay-constrained least-cost multicast routing problem based on the harmony search (HS) algorithm. Our first algorithm uses modified Prüfer...
Investigation of limiting grain size and microstructure homogeneity in the presence of second phase particles using the Monte Carlo method
, Article Journal of Materials Processing Technology ; Volume 195, Issue 1-3 , 2008 , Pages 195-203 ; 09240136 (ISSN) ; Karimi Taheri, A ; Sharif University of Technology
2008
Abstract
The prediction of material microstructure is of great interest to the material designers since the property and performance of materials depend strongly on their microstructures. In this research the Monte Carlo method and grain growth phenomenon have been used to predict the limiting grain size in the presence of second phase particles. The results showed a good agreement with the previous published results predicted by the analytical models. It was found that the lattice orientation parameter, Q, strongly affects the kinetic of the grain growth. The experimental and theoretical results of limiting grain size predicted by Monte Carlo method showed that by decreasing the value of Q the...
An efficient and provably-secure coercion-resistant e-voting protocol
, Article 2013 11th Annual Conference on Privacy, Security and Trust, PST 2013 ; 2013 , Pages 161-168 ; 9781467358392 (ISBN) ; Dousti, M. S ; Jalili, R ; Sharif University of Technology
2013
Abstract
We present an efficient and provably-secure e-voting protocol, which is a variant of the JCJ e-votingprotocol (Juels et al., 2010). It decreases the total number of JCJ's operations from O(n2) to O(n), where n is the number of votes or voters (whichever is the maximum). Note that since the operations under consideration are time-consuming (e.g., public-key encryption), the improvement is quite substantial. As a rough comparison, consider a nation-wide election with around ten million voters/votes. Assuming each operation takes one microsecond, and no parallelization is used, one can see a huge difference: our protocol tallies the votes in 10 seconds, while the JCJ protocol requires over 3...
Minimal assumptions to achieve privacy in e-voting protocols
, Article 2013 10th International ISC Conference on Information Security and Cryptology, ISCISC 2013 ; 29- 30 August , 2013 ; Kargar, M. A ; Dousti, M. S ; Jalili, R ; Sharif University of Technology
IEEE Computer Society
2013
Abstract
Chevallier-Mames et al, proved that in a specific condition (such as the lack of untappable channels and trusted-third parties), the universal verifiability and privacy-preserving properties of e-voting protocols are incompatible (WOTE'06 and TTE'10). In this paper, we first show a flaw in their proof. Then, we prove that even with more assumptions, such as the existence of TTPs and untappable channels between the authorities, an e-voting protocol is unable to preserve privacy, regardless of verifiability. Finally, we demonstrate that preserving privacy in e-voting protocols requires the provision of at least one of the following assumptions: limited computational power of adversary,...
A mesh-independent finite element formulation for modeling crack growth in saturated porous media based on an enriched-FEM technique
, Article International Journal of Fracture ; Vol. 188, issue. 1 , 2014 , p. 79-108 ; Vahab, M ; Haghighat, E ; Moallemi, S ; Sharif University of Technology
2014
Abstract
In this paper, the crack growth simulation is presented in saturated porous media using the extended finite element method. The mass balance equation of fluid phase and the momentum balance of bulk and fluid phases are employed to obtain the fully coupled set of equations in the framework of u - p formulation. The fluid flow within the fracture is modeled using the Darcy law, in which the fracture permeability is assumed according to the well-known cubic law. The spatial discritization is performed using the extended finite element method, the time domain discritization is performed based on the generalized Newmark scheme, and the non-linear system of equations is solved using the...
An efficient algorithm for bandwidth-delay constrained least cost multicast routing
, Article 2008 IEEE Canadian Conference on Electrical and Computer Engineering, CCECE 2008, Niagara Falls, ON, 4 May 2008 through 7 May 2008 ; 2008 , Pages 1641-1645 ; 08407789 (ISSN) ; 9781424416431 (ISBN) ; Mahdavi, M ; Torghy Haghighat, A ; Ghariniyat, A ; Sharif University of Technology
2008
Abstract
The advent of various real-time multimedia applications in high-speed networks creates a need for quality of service (QoS) based multicast routing. Two important QoS constraints are the bandwidth constraint and the end-to-end delay constraint. The QoS based multicast routing problem is a known NP-complete problem that depends on (1) bounded end-to-end delay and link bandwidth along the paths from the source to each destination, and (2) minimum cost of the multicast tree. In this paper we describe a new representation, called node parent index (NPI) representation, for representing trees and describe harmony operations accord to this representation. The presented algorithm is based on the...
Coordination variability during walking and running in individuals with and without patellofemoral pain part 1: lower limb intersegmental coordination variability
, Article Journal of Medical and Biological Engineering ; Volume 41, Issue 3 , 2021 , Pages 295-304 ; 16090985 (ISSN) ; Rezaie, M ; Ebrahimi, S ; Shokouhyan, S. M ; Motealleh, A ; Parnianpour, M ; Sharif University of Technology
Springer Science and Business Media Deutschland GmbH
2021
Abstract
Purpose: Although it has been proposed that individuals with patellofemoral pain show less lower limb intersegmental coordination variability, the evidence to support this hypothesis is rare. The purpose of this study was, therefore, to evaluate whether individuals with patellofemoral pain exhibit less intersegmental coordination variability compared with healthy individuals during walking and running. Also, it was hypothesized that increasing task demand would exacerbate group differences regarding coordination variability measures. Methods: Three-dimensional kinematics were collected while 17 females with patellofemoral pain and 17 healthy females walked at preferred speed, and ran at...
Coordination variability during walking and running in individuals with and without patellofemoral pain part 2: proximal segments coordination variability
, Article Journal of Medical and Biological Engineering ; Volume 41, Issue 3 , 2021 , Pages 305-313 ; 16090985 (ISSN) ; Rezaie, M ; Ebrahimi, S ; Shokouhyan, S. M ; Motealleh, A ; Parnianpour, M ; Sharif University of Technology
Springer Science and Business Media Deutschland GmbH
2021
Abstract
Purpose: There is a scarcity of studies evaluating the variability of couplings between proximal segments (trunk, pelvis, and thigh) in individuals with patellofemoral pain (PFP) while emerging evidence has suggested that aberrant motions of trunk and pelvis can have a contributory role in the etiology of PFP. The purpose of this study was, therefore, to evaluate the trunk, pelvis, and thigh intersegmental coordination variability in PFP compared with healthy individuals. Methods: Thirty-four participants (17 with PFP and 17 healthy controls) walked (at preferred speed) and ran (at preferred and fixed speed) on a treadmill each trial for 30 seconds. Three-dimensional kinematics were recorded...
Correction to: Coordination variability during walking and running in individuals with and without patellofemoral pain part 2: Proximal segments coordination variability (journal of medical and biological engineering, (2021), 41, 3, (305-313), 10.1007/s40846-021-00598-z)
, Article Journal of Medical and Biological Engineering ; Volume 41, Issue 3 , 2021 , Pages 314- ; 16090985 (ISSN) ; Rezaie, M ; Ebrahimi, S ; Shokouhyan, S. M ; Motealleh, A ; Parnianpour, M ; Sharif University of Technology
Springer Science and Business Media Deutschland GmbH
2021
Abstract
In the original publication, there were errors in some sentences, Figure legends, and Tables that are corrected as below:. © 2021, Taiwanese Society of Biomedical Engineering
CO2/N2 Mixed Gas Separation in Glycerol Liquid Membrane Containing Sodium Carbonate Carriers
, M.Sc. Thesis Sharif University of Technology ; Bastani, Darush (Supervisor)
Abstract
In this research, initially the Glycerol liquid membrane with dissolved sodium carbonate carriers, which is supported by CA porous filter, was prepared. The effects of Na2CO3 concentration and pressure difference on gas permeability were investigated. Permeability of CO2 and N2 were measured at pressure difference of 0.7, 1.6, 2.1 and 2.8 bar with carbonate sodium concentration of 0, 1 and 2 mol/lit. Permeability of CO2 was found to be higher than N2. Increasing the pressure difference resulted in an increase in the N2 permeability coefficient while decreased the CO2 permeability coefficient. Increasing the concentration of sodium carbonate increased the CO2 permeability drastically but...
Influence of Shear Wall Positioning in Design of Concrete Frames
, M.Sc. Thesis Sharif University of Technology ; Maleki, Shervin (Supervisor)
Abstract
Numerous research is available in the literature regarding shear walls. These have considered parameters like wall cross-section, Reinforcement configuration, boundary elements, etc. In addition, seismic and wind loading behavior has been discussed. Currently, the software ETABS is used extensively in automatic design of shear walls, The programs design bases are investigated in this thesis in ragards to flexural, shear and boundary elements of shear walls under seismic loading. The attachment of wall elements to frame (column) elements is of particular interest in this study
Range-Doppler Map Generation in the Presence of Sparse Clutter for Multistatic Radar
, M.Sc. Thesis Sharif University of Technology ; Karbasi, Mohammad (Supervisor)
Abstract
Multistatic radar has several advantages over monostatic radar (such as better detection), which are due to the use of different viewing angles and the difference in their clutter characteristics. Clutter in many applications (such as marine applications) has the property of being sparse in certain dictionaries. Therefore, the investigation of sparse clutter (such as sea clutter) is of particular importance. It is worth noting that the detection of targets in the vicinity of the sea faces difficulties due to the dynamics of the sea, which causes the Doppler spectrum to change with time and change in space. Considering the fact that the sea clutter is sparse clutter, one of the powerful...
Fraud Detection in Financial Transactions
, M.Sc. Thesis Sharif University of Technology ; Beigy, Hamid (Supervisor)
Abstract
With development of electronic payment infrastructures and increase of payment transactions in result, abusing these infrastructures and fraudulent efforts has been increased. Problem of “Fraud Detection in Financial Transactions” is finding these illegal/abnormal transactions while many other legitimate transactions exist. Goal of this thesis is providing a method for fraud detection in financial transactions using representation learning. Many approaches are used for solving fraud detection including classic data mining algorithms and deep learning based methods, which are compared in this thesis. We also covered diverse feature engineering and representation learning ideas for improving...
Iron oxyhydroxide nanoparticles: green synthesis and their cytotoxicity activity against A549 human lung adenocarcinoma cells
, Article Rendiconti Lincei ; Volume 33, Issue 2 , 2022 , Pages 461-469 ; 20374631 (ISSN) ; Alijani, H. Q ; Hashemi Shahraki, S ; Naderifar, M ; Rahimi, S. S ; Abolhasani Zadeh, F ; Iravani, S ; Haghighat, M ; Khatami, M ; Sharif University of Technology
Springer Science and Business Media Deutschland GmbH
2022
Abstract
Iron oxyhydroxide (α-FeOOH, Goethite) is one of the most thermodynamically stable iron oxides and a widespread soil mineral. In this study, a mixture of two phenolic extracts of rosemary and Echinacea was utilized as stabilizing and reducing agents for the synthesis of Goethite (FeOOH) nanoparticles without utilizing harmful toxic solvents. The resulting nanoparticles were characterized by X-ray powder diffraction (XRD), field emission scanning electron microscopy (FESEM)-energy dispersive spectroscopy (EDS), transmission electron microscopy (TEM), vibrating-sample magnetometer (VSM), thermogravimetry/differential thermal analysis (TG/DTA), and Brunauer–Emmett-Teller (BET). MTT assay was...