Loading...
Search for:
haji-mohammadzadeh--mohammad-aref
0.167 seconds
Total 5941 records
Mathematical Object and Logical Form in Homotopy Type Theory
, M.Sc. Thesis Sharif University of Technology ; Ardeshir, Mohammad (Supervisor)
Abstract
Arising from the intersection of two modern ideas in logic and mathematics, namely Type Theory - specifically Martin-Löf’s intuitionistic type theory, and Homotopy Theory, Homotopy Type Theory has introduced a novel formalism that formalizes every mathematical object - including constructions, definitions, and proofs - in a specific and fundamentally different way from other interpretive frameworks (such as set theory), bringing forth new results - both philosophically and mathematically. The first goal of this research is to understand the meaning of Homotopy Type Theory as a foundation for mathematics through exploring this new formalism. The second goal of this research is to understand...
Fundamental limits of Smultaneous Information and Energy Transmission and Reception
,
M.Sc. Thesis
Sharif University of Technology
;
Aref, Mohammad Reza
(Supervisor)
;
Mirmohseni, Mahtab
(Co-Advisor)
Abstract
Nowadays energy consumption becomes an important design factor in communication systems because of financial reasons and environmental concerns. There would be many equipments with large energy consumption in next generation (5G) networks, so energy efficiency will play an important rule in these networks. Two alternative techniques used for energy consumption management are energy harvesting and simultaneous wireless information and power transfer (SWIPT). A useful scenario in SWIPT is to use received energy for future transmissions. In this scenario, the design of encoder and decoder is a new open problem, because of the memory now appeared in the system. Thus to understand the interplay...
Energy-aware workflow scheduling in fog computing using a hybrid chaotic algorithm
, Article Journal of Supercomputing ; Volume 79, Issue 16 , 2023 , Pages 18569-18604 ; 09208542 (ISSN) ; Akbari Zarkesh, M ; Haji Shahmohamd, P ; Akhavan, J ; Chhabra, A ; Sharif University of Technology
Springer
2023
Abstract
Fog computing paradigm attempts to provide diverse processing at the edge of IoT networks. Energy usage being one of the important elements that may have a direct influence on the performance of fog environment. Effective scheduling systems, in which activities are mapped on the greatest feasible resources to meet various competing priorities, can reduce energy use. Consequently, a hybrid discrete optimization method called HDSOS-GOA, which uses the Dynamic voltage and frequency scaling (DVFS) approach, is proposed to handle scientific workflow scheduling challenges in the fog computing environment. HDSOS-GOA combines the search qualities of Symbiotic Organisms Search (SOS) and the...
Create an Algorithm for Designing of Button-BPM and Striplines in a Synchrotron
, M.Sc. Thesis Sharif University of Technology ; Samadfam, Mohammad (Supervisor) ; Mohammadzadeh, Mohammad (Co-Advisor)
Abstract
Beam diagnostics is an essential constituent of any accelerator. The position information of the electron beam is obtained by a set of Beam Position Monitors (BPMs), which in addition to determining the position, are used to derive information concerning lattice functions and beam dynamics. To design of Button Beam Position Monitor(BPM) for a Synchrotron Light Source, to get beam stabilities on submicron levels, preliminary studies were done to have optimal design. We present an algorithem which caculate all required parameteres for different design of button BPMs. To calculate induced charge and voltage on each button, Poisson's equation has been solved by Green method. For sensivity...
A misbehavior‐tolerant multipath routing protocol for wireless Ad hoc networks [electronic resource]
, Article International Journal of Research in Wireless Systems (IJRWS) ; Vol. 2, Issue 9, pp. , Sep. 2013 ; Pakravan, Mohammad Reza ; Aref, Mohammad Reza ; Sharif University of Technology
Abstract
Secure routing is a major key to service maintenance in ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. As a result of the resource limitations in such networks nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a novel data redirection method to mitigate the impact of node misbehavior on network...
Investigation of the Geometry Effect on Electrokinetic Instability in Microflows
, M.Sc. Thesis Sharif University of Technology ; Saidi, Mohammad Hassan (Supervisor)
Abstract
Lab-on-a-chip devices have gained a lot of attention in chemical and biomedical analyses during the past two decades. These devices employ microfluidics basics and fundamentals to combine multifold laboratory processes in one single portable chip. The electric field has been often used in most microfluidics applications for the ease of sample control as well as become easily integrated to other chip components. Instabilities in microflows would occur when two fluids of different electric properties are exposed to an adequately strong electric field. Studying these electrokinetic instabilities is not only important for the fundamental studies but also for practical applications in micromixers...
The Influence of Shear-walls Location on Asymmetrical Buildings
, M.Sc. Thesis Sharif University of Technology ; Khaloo, Ali Reza (Supervisor)
Abstract
In building construction, a rigid vertical diaphragm is capable of transferring lateral forces from exterior walls, roofs and floors to the ground foundation in a direction parallel to its planes.[1] Refractory elements against lateral forces contain moment frames, shear walls or a combination of them. In this research, shear walls are discussed. Nowadays, in cities having old contexture, some of the buildings should be destructed. Thus, modern buildings should be built. Due to the limitation of adequate space and lack of symmetrical plan, buildings must be built in asymmetrical form. To design the structures with asymmetrical plan, it is necessary to study buildings with presence of...
High-Speed Human Tracking in CCTV Cameras
, M.Sc. Thesis Sharif University of Technology ; Mohammadzadeh, Narjesolhoda (Supervisor)
Abstract
In this work, we present AppMoTrack, a novel tracking-by-detection (TBD) ap-proach that effectively balances speed and accuracy. The proposed framework lever-ages Incremental Principal Component Analysis (PCA) to extract robust features from bounding boxes, followed by Fisher Linear Discriminant Analysis (LDA) to refine these features by considering class separability, where each unique target across frames rep-resents a class. A hierarchical cost function is introduced to enhance data association precision. For detections with high confidence scores, a two-stage process is employed: first, a combination of Intersection over Union (IoU) and cosine distance between LDA-transformed PCA...
EPR Dosimetry based on Monte Carlo Method (Simulation and Measuring Dose with EPR Method)
, M.Sc. Thesis Sharif University of Technology ; Hosseini, Abolfazl (Supervisor) ; Mohammadzadeh, Mohammad (Co-Advisor)
Abstract
The Electron Paramagnetic Resonance(EPR) is a retrospective and accurate dosimetry method to measure irradiated-induced radical population in the matter for determination the induced dose in the matter. The dose uncertainties will be about 1 percent. in the first stage of the present research, the response of EPR system to a reference sample has been measured. Then, responses due to the other samples has been compared with it and the secondary sample dose has been calculated. The reference sample usually is alanine. Unlike the perturbation theory forecast,the EPR signal intensity response to dose for alanine is not linear. In this thesis, first, the alanine samples (with pellet form) have...
On the Achievable Rate Region Improvement in Information Networks Utilizing Cognition and Cooperative Strategies
, Ph.D. Dissertation Sharif University of Technology ; Aref, Mohammad Reza (Supervisor)
Abstract
User cooperation is an important concept in wireless networks to achieve best performance subject to low cost. Dynamic and broadcast natures of wireless networks are two indispensable characteristics of these networks. Therefore, when a user transmits his signal to the receiver, other users in his neighborhood may receive the signal as well. Hence, these neighbors can decide to cooperate with each other in transmitting their messages to the receiver. On the other hand, due to the dynamic nature of the wireless networks, one can assume that each user has some knowledge about the interference signals or the fading coefficient that are not known to the other users. Therefore by utilizing user...
Secure Index Coding
, Ph.D. Dissertation Sharif University of Technology ; Aref, Mohammad Reza (Supervisor)
Abstract
Reliable and secure communication requires low error probability and low information leakage, respectively. But there are different metrics for error probability and information leakage. Two important reliability metrics are ϵ or zero probability of error. An ϵ-error criterion requires the (average or maximal) error probability to vanish as the blocklength increases, while a zero-error criterion, demands the error to be exactly zero for every given bloklength. Three important security metrics are weak, strong, or perfect secrecy. A weak notion of secrecy requires the percentage of the message that is leaked to vanish as the code blocklength increases, while a strong notion of secrecy...
Privacy Preserving Learning with Adjustable Utility Privacy Trade-off
, Ph.D. Dissertation Sharif University of Technology ; Aref, Mohammad Reza (Supervisor)
Abstract
The rapid evolution of artificial intelligence (AI) technologies has led to the widespread adoption of AI systems in diverse research and industrial fields. Deep neural networks, at the forefront of AI's power, demonstrate high performance by leveraging large volumes of training data. However, acquiring such vast amounts of data requires collaboration among individual data owners, who may have concerns about privacy. To address these concerns, various privacy-preserving methodologies have been proposed. These methodologies share a common goal of striking a balance between preserving privacy and maintaining data utility. This study aims to explore and analyze these privacy protection...
Critical-Item Supply-Chain Using Agent-Based Modelling
, M.Sc. Thesis Sharif University of Technology ; Haji, Alireza (Supervisor)
Abstract
One of the crucial matters in the area of Supply Chain Management is the ability of a supply chain to act and react under different circumstances. A helpful tool to understand the supply chain is simulation modeling. With the help of simulation modeling, we can provide the opportunity for the agents in a model to perform based on the defined environment.In the current research, a complete literature review is performed on the topics of supply chain planning and various distribution models and algorithms. With the focus on the vaccine as a critical item, we propose a model to distribute vaccines based on the degree of agents, and we realize that vaccine distribution, while facing huge demand...
A Secure and Efficient Digital Signature Based on Polar Codes
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor)
Abstract
Regarding to the emergence of quantum computers and advances in the large scale implementation of them, exploiting hard problems of coding theory is of great importance.This family of problems, like those of lattices, has an acceptable resistance against classic and quantum attacks. Thus, they can be replaced with hard problems in number theory and algebra. Increasing dominance of cyberspace made us highly dependent to it. Consequently, preparing tools and methods to mitigate future threats is necessary. Digital signatures constitute an important family of cryptographic primitives. Code-based digital signatures are mostly suffering from two main drawbacks: large public key and long time of...
New Approaches for Achievability Proof in Network Information Theory: Asymptotic Regime and Beyond
, Ph.D. Dissertation Sharif University of Technology ; Aref, Mohammad Reza (Supervisor)
Abstract
Two new frameworks for achievability proof in network information theory (NIT) are introduced . The first framework which we call it OSRB (Output Statistics of Random Binning) framework, uses random binning arguments and is based on a duality between channel and source coding problems. Furthermore, the OSRB framework uses pmf approximation arguments instead of counting and typicality which are used widely in conventional achievability proofs in NIT. This allows for proving coordination and strong secrecy problems, where certain statistical conditions on the distribution of random variables need to be satisfied. These statistical conditions include independence between messages and...
New Approaches for Achievability Proof in Network Information Theory: Asymptotic Regime and Beyond
, Ph.D. Dissertation Sharif University of Technology ; Aref, Mohammad Reza (Supervisor)
Abstract
Two new frameworks for achievability proof in network information theory (NIT) are introduced . The first framework which we call it OSRB (Output Statistics of Random Binning) framework, uses random binning arguments and is based on a duality between channel and source coding problems. Furthermore, the OSRB framework uses pmf approximation arguments instead of counting and typicality which are used widely in conventional achievability proofs in NIT. This allows for proving coordination and strong secrecy problems, where certain statistical conditions on the
distribution of random variables need to be satisfied. These statistical conditions include independence between messages and...
distribution of random variables need to be satisfied. These statistical conditions include independence between messages and...
Introducing a Strategy for Decision Making in a Multi-Period News-Vendor Problem with Multiple Markets
, M.Sc. Thesis Sharif University of Technology ; Haji, Alireza (Supervisor)
Abstract
In this paper, we introduce a novel decision making strategy on how to assign markets to a multi-item newsvendor’s problem. We present a new formulation method based on the integration of news-vendor problem and dynamic programming approach alongside an efficient solution method. Suppose there are n distinct products and corresponding time intervals for selling them in different markets. These products will be worthless (perishable) at the end of each interval. Our proposed framework represents a trade-off between costs associated with staying in a market for further periods and costs of relocating the business in a new market. The objective is to maximize the total profit of our decisions...
Achievable Rates for Relay Networks with “Partial Decode and Forward” Strategy
,
Ph.D. Dissertation
Sharif University of Technology
;
Aref, Mohammad Reza
(Supervisor)
Abstract
“Decode and Forward” is one of coding strategies used in relay channel and networks in which each relay in the network decodes the transmitted message by the sender and other relays in the network and then re-encode and transmit it to the other relays and the receiver in the network. This process results in the cooperation between the relays and the sender to remove the uncertainty of the receiver about the transmitted message. “irregular encoding-successive decoding”, “regular encoding-backward decoding” and “regular encoding-sliding window decoding” are different methods usually used in “Decode and Forward” strategy. “partial decode and forward” is a generalized form of “decode and...
Analysis of Key Agreement in Secure Networks from the View of Information Theory
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor)
Abstract
In this thesis the problem of simultaneously generating multiple keys among multiple terminals is investigated. After providing a survey on the related works and exploiting the problem of sharing a common secret key and a private key among three terminals, we introduce a new source model which we call it the Four-Terminal model. We consider the problem of generating three kinds of keys among legitimate terminals and investigate the problem under two different scenarios, Backward and Forward scenarios, which depend on the kind of restrictions imposed on the usage of the public channel. We derive an achievable region for the backward scenario, using the combination of superposition coding and...
Coordination in Cooperative Networks and Secret Key Agreement Using Common Information
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor)
Abstract
In order to utilize cooperative resources of a network, we have to investigate cooperative networks and strategies. Information theory, by introducing different concepts such as coordination and common information, gives us a suitable tool to study cooperative networks and using their resources. In this thesis, we investigate coordination and secret key agreement in cooperative networks. Our study consists of two parts. In the first part, we consider coordination and its applications in cooperative networks. For this purpose, we introduce the triangular multiterminal network as a proper model for studying empirical coordination in multiterminal networks and establish an inner and outer...