Loading...
Search for: jahangir--m--s
0.171 seconds

    Assessment of the urban heat island in the city of Tehran using reliability methods

    , Article Atmospheric Research ; Volume 225 , 2019 , Pages 144-156 ; 01698095 (ISSN) Jahangir, M. S ; Moghim, S ; Sharif University of Technology
    Elsevier Ltd  2019
    Abstract
    Climate change affects temperature, magnitude, and also the duration of the Urban Heat Island (UHI), which has severe impacts on the environment, communities, and the people's lives. This study evaluates UHI formation in the city of Tehran (Iran) using a reliability framework, which is able to include related uncertainties into the modeling procedure. First, 2 km air temperature field from Weather and Research Forecasting (WRF) model is downscaled to a 50 m grid spacing using a probabilistic downscaling method, which combines inverse distance weighting (IDW) interpolation and a Bayesian regression model. This downscaling method not only can produce a long record of the fine resolution of the... 

    A lightweight key establishment scheme for wireless sensor networks

    , Article 3rd International Conference on New Technologies, Mobility and Security, NTMS 2009 ; Article number 5384737 , 2009 ; 9781424462735 (ISBN) Nikounia, S. H ; Amin, F ; Jahangir, A ; Sharif University of Technology
    2009
    Abstract
    Key predistribution in sensor networks refers to the problem of distributing secret keys among sensor nodes prior to deployment. Recently, many key predistribution schemes have been proposed for wireless sensor networks. To further improve these techniques, researchers have also proposed to use sensors' expected location information to help predistribution of keying materials. In this paper we propose a lightweight and scalable key establishment scheme for GPS-enabled wireless sensor networks. This scheme has little communication overhead and memory usage. Since communications and computations of key establishment schemes are done only once and when the network is begin initiated, actually... 

    Low-power arithmetic unit for DSP applications

    , Article International Symposium on System on Chip, SoC ; 31 October- 2 November , 2011 , pp. 68-71 ; ISBN: 9781457706721 Modarressi, M ; Nikounia, S. H ; Jahangir, A. H ; Sharif University of Technology
    2011
    Abstract
    DSP algorithms are one of the most important components of modern embedded computer systems. These applications generally include fixed point and floating-point arithmetic operations and trigonometric functions which have long latencies and high power consumption. Nonetheless, DSP applications enjoy from some interesting characteristics such as tolerating slight loss of accuracy and high degree of value locality which can be exploited to improve their power consumption and performance. In this paper, we present an application-specific result-cache that aims to reduce the power consumption and latency of DSP algorithms by reusing the results of the arithmetic operations executed on the same... 

    Low-power arithmetic unit for DSP applications

    , Article 2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems, SPICES 2015 ; 2011 , Pages 68-71 ; 9781457706721 (ISBN) Modarressi, M ; Nikounia, S. H ; Jahangir, A. H ; Sharif University of Technology
    2011
    Abstract
    DSP algorithms are one of the most important components of modern embedded computer systems. These applications generally include fixed point and floating-point arithmetic operations and trigonometric functions which have long latencies and high power consumption. Nonetheless, DSP applications enjoy from some interesting characteristics such as tolerating slight loss of accuracy and high degree of value locality which can be exploited to improve their power consumption and performance. In this paper, we present an application-specific result-cache that aims to reduce the power consumption and latency of DSP algorithms by reusing the results of the arithmetic operations executed on the same... 

    Lazy instruction scheduling: Keeping performance, reducing power

    , Article ISLPED'08: 13th ACM/IEEE International Symposium on Low Power Electronics and Design, Bangalore, 11 August 2008 through 13 August 2008 ; 2008 , Pages 375-380 ; 15334678 (ISSN); 9781605581095 (ISBN) Mahjur, A ; Taghizadeh, M ; Jahangir, A. H ; Sharif University of Technology
    2008
    Abstract
    An important approach to reduce power dissipation is reducing the number of instructions executed by the processor. To achieve this goal, this paper introduces a novel instruction scheduling algorithm that executes an instruction only when its result is required by another instruction. In this manner, it not only does not execute useless instructions, but also reduces the number of instructions executed after a mispredicted branch. The cost of the extra hardware is 161 bytes for 128 instruction window size. Measurements done using SPEC CPU 2000 benchmarks show that the average number of executed instructions is reduced by 13.5% while the average IPC is not affected. Copyright 2008 ACM  

    Finding aggregation tree with genetic algorithm for network correlated data gathering

    , Article 2nd International Conference on Sensor Technologies and Applications, SENSORCOMM 2008, Cap Esterel, 25 August 2008 through 31 August 2008 ; 2008 , Pages 429-434 ; 9780769533308 (ISBN) Habibi Masouleh, H ; Tahaee, S. A ; Jahangir, A. H ; Sharif University of Technology
    2008
    Abstract
    The critical issue in designing correlated data networks like Wireless Sensor Networks is to minimize the total cost of data transmission in the network, and decrease the amount of data flow. The problem of finding optimal aggregation tree for correlated data gathering in single sink network is considered as an NP-Complete problem and hence heuristic methods are usually applied to solve it[1]. In this paper, we apply genetic algorithm (GA) to solve the problem. In our method, we improve the performance of genetic search by selecting proper initial population. This initial population is determined in two ways, by using Prime's algorithm, and shortest path tree. The main issue is to regard... 

    Numerical investigation of the effects of a copper foam filled with phase change materials in a water-cooled photovoltaic/thermal system

    , Article Energy Conversion and Management ; Volume 163 , 2018 , Pages 187-195 ; 01968904 (ISSN) Mousavi, S ; Kasaeian, A ; Shafii, M. B ; Jahangir, M. H ; Sharif University of Technology
    Elsevier Ltd  2018
    Abstract
    The purpose of the present study is to investigate the thermal performance of a photovoltaic/thermal system, integrated with phase change materials in porous medium. For this purpose, a metal foam was employed as porous medium and the performance of five different PCMs, as organic and inorganic, were examined as well. Moreover, the effects of different key parameters such as the mass flow rate, solar irradiance, inlet water temperature and inclination were studied. Finally, the simulation results were compared with a water-cooled photovoltaic/thermal without incorporating PCMs and porous medium, and thermal performance of the three PV/T cases were reported. The highest thermal efficiency of... 

    Analysis of TESLA protocol in vehicular ad hoc networks using timed colored Petri nets

    , Article 2015 6th International Conference on Information and Communication Systems, ICICS 2015, 7 April 2015 through 9 April 2015 ; April , 2015 , Pages 222-227 ; 9781479973491 (ISBN) Jahanian, M. H ; Amin, F ; Jahangir, A. H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Authentication is an essential security requirement in safety-related vehicle-to-vehicle applications in VANETs. TESLA is one of the most popular broadcast source authentication protocols proposed and standardized for this purpose. Having strict time constraints and being prone to GPS synchronization errors make the analysis of this protocol challenging. In this paper, we utilize a timed model checking approach based on timed colored Petri nets to model and verify TESLA considering its time-sensitive behaviors. In this way, we show how neglecting timing aspects in protocol design and in protocol modelling can lead to successfully launched attacks and erroneous analyses respectively, and how... 

    A content-based deep intrusion detection system

    , Article International Journal of Information Security ; 2021 ; 16155262 (ISSN) Soltani, M ; Siavoshani, M. J ; Jahangir, A. H ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2021
    Abstract
    The growing number of Internet users and the prevalence of web applications make it necessary to deal with very complex software and applications in the network. This results in an increasing number of new vulnerabilities in the systems, and leading to an increase in cyber threats and, in particular, zero-day attacks. The cost of generating appropriate signatures for these attacks is a potential motive for using machine learning-based methodologies. Although there are many studies on using learning-based methods for attack detection, they generally use extracted features and overlook raw contents. This approach can lessen the performance of detection systems against content-based attacks... 

    A content-based deep intrusion detection system

    , Article International Journal of Information Security ; Volume 21, Issue 3 , 2022 , Pages 547-562 ; 16155262 (ISSN) Soltani, M ; Siavoshani, M. J ; Jahangir, A. H ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2022
    Abstract
    The growing number of Internet users and the prevalence of web applications make it necessary to deal with very complex software and applications in the network. This results in an increasing number of new vulnerabilities in the systems, and leading to an increase in cyber threats and, in particular, zero-day attacks. The cost of generating appropriate signatures for these attacks is a potential motive for using machine learning-based methodologies. Although there are many studies on using learning-based methods for attack detection, they generally use extracted features and overlook raw contents. This approach can lessen the performance of detection systems against content-based attacks... 

    Performance evaluation of energy management system in smart home using wireless sensor network

    , Article 2012 2nd Iranian Conference on Smart Grids, ICSG 2012, 23 May 2012 through 24 May 2012 ; May , 2012 , Page(s): 1 - 8 ; 9781467313995 (ISBN) Maghsoodi, N. H ; Haghnegahdar, M ; Jahangir, A. H ; Sanaei, E ; Sharif University of Technology
    IEEE  2012
    Abstract
    In this paper we evaluate the performance of Energy Management and Building Automation Systems in smart environment using wireless sensor network. We describe some aspects of smart grid and then explain the related communication models of smart meters and building management or energy management systems in a smart home. We propose three models, then we compare these models and we select a model for our test bed. We implement the selected model in real environment using wireless sensor network. We analyse network delay to find out whether wireless sensor network is useful or not. With proposed model, we can save up to 57% in energy cost. Also, we develop In- home display to inform customers... 

    An adaptable deep learning-based intrusion detection system to zero-day attacks

    , Article Journal of Information Security and Applications ; Volume 76 , 2023 ; 22142134 (ISSN) Soltani, M ; Ousat, B ; Jafari Siavoshani, M ; Jahangir, A. H ; Sharif University of Technology
    Elsevier Ltd  2023
    Abstract
    The main challenge of an intrusion detection system (IDS) is detecting novelties (i.e., zero-day attacks) in addition to generating a report about the known attacks (i.e., classifying known attacks). Another challenge of an IDS is the adaptation to the detected novelties. For this purpose, it needs sufficient labeled samples of the new attacks. On the other hand, the labeling procedure is a time-consuming task for the security expert teams. This paper proposes a DL-based IDS framework adaptable to new attacks, consisting of different phases. The first phase uses deep learning-based open set recognition methods to identify unknown samples (i.e., new attacks), and make a report from different... 

    Modeling and Data Mining of Partial Discharge in Power Transformer Solid Insulation

    , M.Sc. Thesis Sharif University of Technology Jahangir, Hamid (Author) ; Vakilian, Mehdi (Supervisor)
    Abstract
    Transformers are one of the most important equipments in transmission and distribution networks. Transformer unplanned outages have severe impacts on the continuity of power system operation. To improve the reliability of transformers and to achieve an optimum operation cost, online condition monitoring of transformers is inevitable. Information about the quality of the transformers insulation system is known as the best parameter to be monitored in a transformer. Since partial discharge signals are initiated long before the beginning of a severe damage, partial discharge monitoring and its evaluation canbe employed to warn the operator.Data mining on the partial discharge signals extracts... 

    Network Traffic Analyzer

    , M.Sc. Thesis Sharif University of Technology Silavi, Ehsan (Author) ; Jahangir, Amir Hossein (Supervisor)
    Abstract
    In order to increase the network performance, to discover network security threats, to guarantee the quality of services, to simulate networks and develop new network protocols, network designers and operators need software tools to analyze the network traffic. The first step to do this analysis is network monitoring. This can be done by using various software and hardware tools.
    In this research we developed a tool which analyzes the network traffic using appropriate statistical methods. The models which are analyzed in this application are: Poisson, Self-similar and Weibull. This application analyzes the network traffic based on this statistical models and calculates their parameters.... 

    Analysis and Evaluation of Real Timeliness and Safety of VANET

    , M.Sc. Thesis Sharif University of Technology Ahmadvand, Hossein (Author) ; Jahangir, Amir Hossein (Supervisor)
    Abstract
    The increasing number of road accidents and fatalities have yielded the introduction of several solutions by related industries such as automobile manufacture. Proposed solutions can be classified into two categories: passive, such as airbags, and active such as ABS ad ITS-based technologies. Inter vehicles communication let the communication between vehicles(V2V) or between vehicles and road infrastructure (V2I) by relying on DSRC technology and standards. Intelligent Transportation System (ITS) has three main types of applications namely safety, traffic and commercial. Safety applications are the main goal of vehicular communication, and real time guarantee in safety applications is so... 

    Analysis and Evaluation of Routing Protocols Conformance Test

    , M.Sc. Thesis Sharif University of Technology Tabatabaee, Hosein (Author) ; Jahangir, Amir Hossein (Supervisor)
    Abstract
    Nowadays, one of the problems of network designers and users is the correctness of network equipment functionality. Since routers play an important role in information transfer between various networks and communicate with each other through a routing protocol, any violation of such protocol can result in the network's failure or defective transfer of data. Thus, being assured of the conformance of the implemented protocol in a router with what has been defined in the protocol's standard is of great significance. To this end, before using or exposing a router, network equipment testers should run protocol conformance tests on it and insure its correct functionality. This brings up the... 

    An Efficient Approach for Improving the Performance of Real-time Flow Routing in SDN Controllers

    , M.Sc. Thesis Sharif University of Technology Heidari, Hossein (Author) ; Jahangir, Amir Hossein (Supervisor)
    Abstract
    In real-time systems, jobs that miss their deadline are considered worthless or ineffective. Nowadays, real-time applications (such as multimedia) that communicate through software-defined networks (SDN) are widely used and will continue to expand in the future. SDN is an emerging network architecture in which control plane is separated from data plane to manage it directly. In this research, we make changes to the controller and the switch used in such network to deliver real time packets or real-time flows (such as video) on time, as much as possible. As missed deadline packets are worthless and they waste bandwidth, dropping them is a solution. Moreover, the controller can drop flows that... 

    Downscaling Tehran’s Temperature Field Using Machine Learning Algorithms and Geospatial Interpolation

    , M.Sc. Thesis Sharif University of Technology Jahangir, Mohammad Sina (Author) ; Moghim, Sanaz (Supervisor)
    Abstract
    Due to climate change and the increase in the emission of greenhouse gasses, the temperature of the large cities is increasing. Tehran, which is the capital of Iran and the most populated city of it, is no exception. One of the significant tools for characterizing heat in the cities is having access to the temperature field of the region. Different tools can be used for achieving the temperature field. Two methods for doing so are remote sensing and numerical models. Each one of the mentioned methods has their own strength and weaknesses. In this research, the WRF-ARW model (version 3.7) is used for deriving meteorological fields for the city of Tehran. One of the many merits of using... 

    An analytical performance evaluation for WSNs using loop-free bellman ford protocol

    , Article 2009 International Conference on Advanced Information Networking and Applications, AINA 2009, Bradford, 26 May 2009 through 29 May 2009 ; 2009 , Pages 568-571 ; 1550445X (ISSN); 9780769536385 (ISBN) Baharloo, M ; Hajisheykhi, R ; Arjomand, M ; Jahangir, A. H ; IEEE Computer Society ; Sharif University of Technology
    2009
    Abstract
    Although several analytical models have been proposed for wireless sensor networks (WSNs) with different capabilities, very few of them consider the effect of general service distribution as well as design constraints on network performance. This paper presents a new analytical model to compute message latency in a WSN with loop-free Bellman Ford routing strategy. The model considers limited buffer size for each node using M/G/1/k queuing system. Also, contention probability and resource utilization are suitably modeled. The results obtained from simulation experiments confirm that the model exhibits a high degree of accuracy for various network configurations. © 2009 IEEE  

    Modeling and Evaluating Reliability in Wireless Sensor Networks

    , M.Sc. Thesis Sharif University of Technology Yousefi, Hamed (Author) ; Jahangir, Amir Hossein (Supervisor)
    Abstract
    Recent advancement in wireless communications, electronics, low power design and also tendency to use high performance low cost products have led to emergence of Wireless Sensor Networks (WSNs). As the main purpose of a WSN is information gathering and it’s transmission to the sink node, the main problem is to deliver information correctly with minimum energy consumption. Besides, whereas the majority of developed applications for WSNs are event-critical applications, achieving reliable data transfer as the main factor of dependability and quality of service seems vital. However, data transmission is unreliable over multi-hop WSN due to the unreliability of wireless links and node failures. ...