Loading...
Search for: jafari-nadoushan--mahdi
0.246 seconds

    Repeat ground track orbit design with desired revisit time and optimal tilt

    , Article Aerospace Science and Technology ; Volume 40 , January , 2015 , Pages 200-208 ; 12709638 (ISSN) Jafari Nadoushan, M ; Assadian, N ; Sharif University of Technology
    Elsevier Masson SAS  2015
    Abstract
    A novel method for designing repeat ground track orbits based on the Number Theory is presented. The desired revisit time, tilt capacity, payload swath width, and side-lap are utilized as mission and payload properties for repeat ground track orbit design. The algorithm is developed in the context of the perturbed two body problem, with the secular J4 effect as the only source of perturbation. The concept of the subcycles in the repeat ground track orbits is redefined using the Bezout's theorem and is employed for providing the desired revisit time with the optimal required tilt. This method needs simple calculations and has low computational burden. Therefore, it facilitates the practicing... 

    Widespread chaos in rotation of the secondary asteroid in a binary system

    , Article Nonlinear Dynamics ; Volume 81, Issue 4 , September , 2015 , Pages 2031-2042 ; 0924090X (ISSN) Jafari Nadoushan, M ; Assadian, N ; Sharif University of Technology
    Kluwer Academic Publishers  2015
    Abstract
    The chaotic behavior of the secondary asteroid in a system of binary asteroids due to the asphericity and orbital eccentricity is investigated analytically and numerically. The binary asteroids are modeled with a sphere–ellipsoid model, in which the secondary asteroid is ellipsoid. The first-order resonance is studied for different values of asphericity and eccentricity of the secondary asteroid. The results of the Chirikov method are verified by Poincare section which show good agreement between analytical and numerical methods. It is also shown that asphericity and eccentricity affect the size of resonance regions such that beyond the threshold value, the resonance overlapping occurs and... 

    Chirikov diffusion in the sphere–ellipsoid binary asteroids

    , Article Nonlinear Dynamics ; 2016 , Pages 1-12 ; 0924090X (ISSN) Jafari Nadoushan, M ; Assadian, N ; Sharif University of Technology
    Springer Netherlands  2016
    Abstract
    The Chirikov diffusion in the sphere–ellipsoid binary asteroids through the spin–orbit resonance model is analytically and numerically studied. The primary and the secondary of the binary system are considered sphere and ellipsoid, respectively. The gravitational potential function is expanded up to the fourth-order. The geography of the first- and second-order resonances is derived and studied for different values of asphericity and dynamical flattening of the secondary asteroid and the semimajor axis and eccentricity of the mutual orbit. The Chirikov diffusion due to overlapping of the first- and second-order resonances is examined. For this end, the previously derived criterion for... 

    Geography of the rotational resonances and their stability in the ellipsoidal full two body problem

    , Article Icarus ; Volume 265 , 2016 , Pages 175-186 ; 00191035 (ISSN) Jafari Nadoushan, M ; Assadian, N ; Sharif University of Technology
    Academic Press Inc  2016
    Abstract
    A fourth-order Hamiltonian describing the planar full two body problem is obtained, allowing for a mapping out of the geography of spin-spin-orbit resonances. The expansion of the mutual potential function up to the fourth-order results in the angles to come through one single harmonic and consequently the rotation of both bodies and mutual orbit are coupled. Having derived relative equilibria, stability analysis showed that the stability conditions are independent of physical and orbital characteristics. Simultaneously chaotic motion of bodies is investigated through the Chirikov diffusion utilizing geographic information of the complete resonances. The results show that simultaneous chaos... 

    Ellipsoidal Full Two Body Problem: An Application to Binary Asteroids

    , Ph.D. Dissertation Sharif University of Technology Jafari Nadoushan, Mahdi (Author) ; Asadian, Nima (Supervisor)
    Abstract
    Chaotic and resonant Dynamics of full two body problem are investigated through the sphere-ellipsoid and ellipsoid-ellipsoid models. The fourth-order mutual gravitational potential function is derived in terms of the first-order moment of inertia for both models. Employing Hamiltonian formulation and elliptical expansion, the resonant angles appear in the equations which include secondary’s attitude and mean anomaly for sphere-ellipsoid model and attitude of both bodies and mean anomaly for ellipsoid-ellipsoid model. In first step, resonances overlapping criteria is applied to the first-order resonances of sphere-ellipsoid model and the effect of the asphericity and orbital eccentricity on... 

    Improving Distributed SVM Learning Algorithm in MapReduce Framework Using Coding

    , M.Sc. Thesis Sharif University of Technology Hosseini, Pejman (Author) ; Jafari, Mahdi (Supervisor)
    Abstract
    With the rise of the concept of “Big Data”, both data volumes and data processing time increased, imposing the need for new methods of processing and computation of said data.Analytical and computational methods in Machine Learning are some of the most important applications of Big Data processing. There exist many methods of data analysis in the Machine Learning field, each requiring extensive processing on Big Data. One of the methods for working with Big Data is Distributed Systems. MapReduce is one of the most popular methods distributed computation by increasing the ease and speed of distributed processing of big data. But a number of bottlenecks have been discovered in MapReduce which... 

    Improvement in Distributed Storage by Using Network Coding

    , M.Sc. Thesis Sharif University of Technology Garshasbi, Javad (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    Cloud and distributed storage systems can provide large-scale data storage and high data reliability by adding redundancy to data. Redundant data may get lost due to the instability of distributed systems such as hardware failures. In order to maintain data availability, it is necessary to regenerate new redundant data in another node, referred to as a newcomer and this process reffered to repair process. Repair process is expected to be finished as soon as possible, because the regeneration time can influence the data reliability and availability of distributed storage systems. In this context, the general objective is to minimize the volume of actual network traffic caused by such... 

    Traffic Embedding via Deep Learning

    , M.Sc. Thesis Sharif University of Technology Aqamiri, Saeed (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    One of the most widely used protocols used on the Internet is the SSL protocol, which is also used in many applications to exchange information between the server and the user. Therefore, the analysis of this traffic can help decision makers in many analyses. In this thesis, we are going to present a mapping for feature vectors extracted from SSL traffic that will lead to improving the performance of machine learning algorithms.In this treatise, three methods for learning mapping are proposed, all of which are based on deep learning. The first method is to use a simple self-encoder for map learning that tries to learn a compact map from the input feature vector.The second method is the... 

    A Deep Learning-Based Network Traffic Classifier with the Ability to Detect Novelty

    , M.Sc. Thesis Sharif University of Technology Ousat, Behzad (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    Network traffic classification has been an essential element for security monitoring in the network security scope and also for quality of service purposes. Every now and then, new traffic classes are added to the available groups which are unknown to the system. In an security scope, the novelties are actually the zero-day attacks which can have huge effects on the system environment. There have been many methods developed for traffic classification which are able to distinguish known traffic using signatures or learning-based methods. In a real world scenario, The primary challenge that new traffic classifiers face, is to detect novelty and separate them from the previously known labels.... 

    Improving Distributed Matrix-Factorization-Based Recommender Systems in MapReduce Framework Using Network Coding

    , M.Sc. Thesis Sharif University of Technology Saeidi, Mohsen (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    In recent years, highly recommended systems have been used in various areas. One of the approaches of these systems is a collaborative refinement that consists of three user-based, item-based, and matrix-based parsing. Matrix degradation methods are more effective because they allow us to discover the hidden features that exist between user and item interactions and help us better predict recommendations. The low-level mapping method is designed to store and process very high volume of data. In this method, after completing computations in the author’s nodes, the data is sent to the downsizing nodes, which is referred to as ”data spoofing”. It has been observed that in many applications, the... 

    Designing Machine-Learning based Efficient Combinatorial Auctions

    , M.Sc. Thesis Sharif University of Technology Jamshidi, Arash (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    The aim of this research is to use machine learning methods in the design of Combinatorial Auctions. In particular, in this study, we first examine the relationship between Differential Privacy and combinatorial auctions. We propose a method based on Differential Privacy that, under certain assumptions, can transform any combinatorial auction based on machine learning methods into a Truthful auction using the Exponential Mechanism, such that all participants in the auction have no reason to misreport their Valuation Function. We also prove that in this case, using this method when the number of items is much less than the number of participants does not significantly impact the social... 

    Investigating the Information Leakage of Transport Layer Security Protocol using Deep Learning and Machine Learning Interpretation Methods

    , M.Sc. Thesis Sharif University of Technology Sadeghian, Zeinab (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    Machine learning models and deep learning, in attempting to solve complex and nonlinear problems, are not easily understandable, even for experts in these fields, due to the complexity of functions and issues involved. This lack of interpretability includes how models make decisions and their logical reasoning. Therefore, interpretability methods have gained attention in recent years. On the other hand, machine learning has entered many domains and penetrated a wide range of problems in various fields, especially in computer networks. This is crucial for internet service providers and computer network managers. Solving these problems enables the analysis of data flow structures in the... 

    Proposing an Interpretation Method for Clustering Algorithms

    , M.Sc. Thesis Sharif University of Technology Khodaverdian, Masoud (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    The complexity of machine learning models has made it difficult for end-users and even experts in the field to understand the reasoning behind the decisions made by these models. As a result, the need for explanation and interpretation of machine learning models has been increasing. One subset of machine learning models is clustering models. Despite the extensive research conducted on interpreting supervised models, very few studies have been focused on interpreting clustering models. In this research, we aim to propose algorithms for interpreting a clustering model in a model-agnostic and post-hoc manner. In this study, various methods are presented for interpreting a clustering model. The... 

    Proposal of a Numerical Metric for Comparing and Evaluating Interpreting Methods for Machine Learning Models

    , M.Sc. Thesis Sharif University of Technology Khani, Pouya (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    The complexity and non-linearity of today’s machine learning-based systems make it difficult for both end users and experts in the field to understand the logic and reasoning behind their decisions and outputs. Explainable AI (XAI) methods have gained significant attention in real-world problems as they enhance our understanding of these models, increasing trust and improving their efficiency. By applying different explanation methods on a machine learning model, the same output is not necessarily observed, hence evaluation metrics are needed to assess and compare the quality of explanation methods based on one or more definitions of the goodness of the explanation produced by them. Several... 

    Effect of Generated Data on the Robustness of Adversarial Distillation Methods

    , M.Sc. Thesis Sharif University of Technology Kashani, Paria (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    Nowadays, neural networks are used as the main method in most machine learning applications. But research has shown that these models are vulnerable to adversarial attacks imperceptible changes to the input of neural networks that cause the net- work to be deceived and predict incorrectly. The importance of this issue in sensitive and security applications of neural networks, such as self-driving cars and medical diagnosis systems, becomes much higher. In recent years, many researches have been done in the field of making neural net- works robust against this threat, but in most of them, higher robustness has been provided on the basis of larger and more complex models. Few researches have... 

    The Application of Deep Learning on Network Traffic Classification

    , M.Sc. Thesis Sharif University of Technology Lotfollahi, Mohammad (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    Almost all of the network traffic classification systems use pre-defined extracted features by the experts in computer network. These features include regular expressions, port number, information in the header of different layers and statistical feature of the flow. The main problem of the traffic analysis and anomaly detection system lies in finding appropriate features. The feature extraction is a time consuming process which needs an expert to be done. It is notable that the classification of special kinds of traffic like encrypted traffic is impossible using some subset of mentioned features.The lack of integration in feature detection and classification is also another important issue... 

    Domain Dependent Regularization in Online Optimization

    , M.Sc. Thesis Sharif University of Technology Arabzadeh, Ali (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    As application demands for online convex optimization accelerate, the need for design-ing new methods that simultaneously cover a large class of convex functions and im-pose the lowest possible regret is highly rising. Known online optimization methods usually perform well only in specific settings, e.g., specific parameters such as the diam-eter of decision space, Lipschitz constant, and strong convexity coefficient, where their performance depends highly on the geometry of the decision space and cost functions. However, in practice, the lack of such geometric information leads to confusion in using the appropriate algorithm. To address these issues, some adaptive methods have been proposed... 

    Mitigating DDoS Using BOTNET Analysis with Flow Anomaly Detection

    , M.Sc. Thesis Sharif University of Technology Baradaran Jafari, Navid (Author) ; Jafari, Mahdi (Supervisor) ; Endicott-Popovsky, Barbara (Co-Advisor)
    Abstract
    Internet is the largest multi-purpose, self-reliant, complex and distributed computer network across the globe. The nodes of this network are placed in every place like homes, offices, military camps, schools and all other locations by utilizing many different communication protocols, media and capacities. Furthermore, by rapid technology development, there are many newly born applications utilizing internet in new ways such as Internet of Things systems. The explosive growth of technology causing accelerated addition of new nodes to the internet, and any new single node may have several new unpatched vulnerabilities. This is a serious issue for managing this vast chaotic configuration and... 

    Link Prediction using Dynamic Graph Neural Network with Application to Call Data

    , M.Sc. Thesis Sharif University of Technology Sajadi, Nafiseh Sadat (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    In network science, link prediction is one of the essential tasks that has been neglected. One important application of link prediction in telecommunication networks is analyzing the user's consumption pattern to provide better service. This project aims to predict future links with applications to call data using the users' call history. In previous research, there are two main approaches: 1) heuristic-based approach, and 2) deep-learning-based approach, such as graph neural networks. These methods are mainly used for processing static graphs, and therefore, we cannot generalize them to dynamic graphs. But there are many graphs which are dynamic in nature. For instance, call data records... 

    Improvement of Communication Cost and Waiting Time Trade off in Content Delivery Networks

    , M.Sc. Thesis Sharif University of Technology Ghasemi Rahni, Hamid (Author) ; Jafari Siavoshani, Mahdi (Supervisor)
    Abstract
    By increasing the use of Internet and sharing information in this platform, servers are equipped with more robust hardware and a wider bandwidth network. But the growth of data and services is such that a server, no matter how powerful, does not have the ability to respond all users! Several servers are used to solve this problem. Data centers, content delivery networks, and so on are emerged depending on types of service. One of the important issues in these systems is how to distribute loads between servers in a proportional manner. In this thesis, we first examine the relationship between cost and response time on user requests. Cost can be considered as a communication cost or financial...