Loading...
Search for:
jalil--rasool
0.129 seconds
Total 109 records
Processing Queries with Mathematical Expressions on Encrypted Outsourced Databases
, M.Sc. Thesis Sharif University of Technology ; Jalil, Rasool (Supervisor)
Abstract
The ever-increasing volume of data and the lack of computational and storage facilities have caused a managerial challenge to organizations. The existence of these challenges on the one hand and the increase of storage services on the other hand have compelled the organizations to delegate their storage and management of data to the server providers of cloud storage services. The outsourcing of data to servers obviates the need for purchasing exorbitant storage equipment and recruiting professional workforce in the organization. Since the organization’s data will be kept outside the organization’s ambience in case of using such services in form of outsourcing, and the data will not be under...
Dynamic Functional Connectivity in Autism Spectrum Disorder Using Resting-State fMRI
, M.Sc. Thesis Sharif University of Technology ; Fatemizadeh, Emadeddin (Supervisor)
Abstract
Autism Spectrum Disorder (ASD) is a group of neurodevelopmental disorders that cause repetitive behaviors and social and communication skills abnormalities. Autistic Disorder(AD) is one of the disorders in ASD that is being investigated in this study. There has been an increase in research about AD in recent years due to the increasing AD prevalence and the high autistic living costs. The dynamic functional connectivity between healthy and autistic groups has been analyzed by using graph theory. The brain is modeled as a dynamic graph using resting-state fMRI. The graph theory metric is calculated in the dynamic graph of each subject, and the distinction of the two groups is checked using...
Increasing the Efficiency of Solar Cells Through the Redesign of the Cell Structure and the Addition of A Sensorless Solar Tracker
, M.Sc. Thesis Sharif University of Technology ; Kavehvash, Zahra (Supervisor)
Abstract
In this thesis, the efficiency of energy conversion in solar cells has been enhanced through the use of an innovative structure combining a wideband plasmonic solar absorber (UWB), quantum dots (QDs), and an intermediate band (RB-IBSC). The QD structure has been integrated with a plasmonic array and optimized accordingly. Although the conventional QD structure is effective in improving solar cell efficiency, it has two fundamental issues. Firstly, the short carrier lifetime, which has been addressed by adding the RB-IBSC band. The key concept behind RB-IBSCs involves creating a structure that facilitates electron movement more effectively in one direction than in the other. By asymmetric...
Biosorption of Zinc Ions Using Biomasses Produced From Four Different Types of Microbes Under Batch and Continuous Conditions
, M.Sc. Thesis Sharif University of Technology ; Roostaazad, Reza (Supervisor) ; Razavi, Jalil (Supervisor)
Abstract
Biosorption capacity of zinc (II) by biomasses produced from four species of microorganism including two kinds of bacteria (Pseudomonas putida and Streptomyces rimosus) and two kinds of fungi ( Aspergillus niger and Phanerochate chrysosporium) in batch case were investigated and compared. In all cases dried original bio mass and dried pretreated bio mass with NaOH were used. In all cases biosorption capacity of pretreated biomasses were much higher than non-treated biuomasses to the ratio of 3.8 – 1.4 times. Freundlich and Langmuir equilibrium isotherms were used to match with experimental results of this research. Except S.rimosus, all others were completely matched with Langmuir...
Deep interpretation of parkland environment for autonomous landscaping robot for the green smart city
, Article 4th International Conference on Pattern Recognition and Image Analysis, IPRIA 2019, 6 March 2019 through 7 March 2019 ; 2019 , Pages 185-189 ; 9781728116211 (ISBN) ; Majidi, B ; Manzuri, M. T ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2019
Abstract
In the past decade, making the cities green and environmentally friendly is becoming a major issue for many countries around the world. The green city is an urban environment in which the parklands and natural habitats are integrated into the living and the working space of the communities. This significant increase in the scale of parklands in the green cities requires autonomous landscaping. In this paper, a computer vision system for an autonomous landscaping robot which is capable of seeding various types of grass and designing patterns in the lawns is developed. The proposed robotic platform uses deep convolutional neural networks for finding the required patches for the replanting of...
Tunable spatial fractional derivatives with graphene-based transmit arrays
, Article Optics Express ; Volume 31, Issue 8 , 2023 , Pages 12572-12584 ; 10944087 (ISSN) ; Habibiyan, H ; Khavasi, A ; Sharif University of Technology
Optica Publishing Group (formerly OSA)
2023
Abstract
The optical implementation of mathematical spatial operators is a critical step toward achieving practical high-speed, low-energy analog optical processors. In recent years, it has been shown that using fractional derivatives in many engineering and science applications leads to more accurate results. In the case of optical spatial mathematical operators, the derivatives of the first and second orders have been investigated. But no research has been performed on fractional derivatives. On the other hand, in previous studies, each structure is dedicated to a single integer order derivative. This paper proposes a tunable structure made of graphene arrays on silica to implement fractional...
A Method for Querying on Encrypted XML Data
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
When organizations prefer to outsource their data, security protection of data will be more important. Using cryptography in addition to access control techniques is a natural way for saving confidentiality of data against untrusted server. However, encryption and decryption of data result in database performance degradation. In such a situation all the information stored in encrypted form, one cannot make the selection on the database content any more. Data should be decrypted first, so an unwilling tradeoff between the security and performance is normally forced. The appropriate approaches to increase the performance are methods to deal directly with the encrypted data without firstly...
Toward A Safe, Assured, and Dynamic Communication Protocol Stack
, Ph.D. Dissertation Sharif University of Technology ; Jalili, Rasool (Supervisor)A Method for Searching on Encrypted Data
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
Using database encryption to protect data in some situations where access control is not soleley enough is inevitable. Database encryption provides an additional layer of protecton to conventional access control techniques. It prevents unauthorized users, including intruders breaking into a network, from viewing the sensitive data. As a result data remains protected even in the event that database is successfully attacked or stolen. However, encryption and decryption of data result in database performance degradation. In the situation where all the information is stored in encrypted form, one cannot make the selection on the database content any more. Data should be decrypted first, so an...
An Intrusion Detection System for the Grid Environment
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
Existing Intrusion Detection Systems (IDSs) are not designed to deal with all categories of processing environments. This thesis focuses on IDSs for the Grid computing environment, and concentrates on feature selection and performance. An existing framework, Globus, is used as the basis for the consideration and development of the research issue in Grid computing. The system is based on two engine designs: (a) Signature and (b) Support Vector Machine; SVM has been selected for pattern discovery in traffic analysis. We found that the performance of the system greatly depends on the efficiency of the underlying framework and the number of Intrusion Detection System instances. We demonstrate...
Alert Correlation Analysis For Intrusion Detection
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
While intrusion detection systems (IDSs) are widely used, large number of alerts as well as high rate of false positive events make such a security mechanism insufficient. Accordingly, a track of recent security research, focused on alert correlation. This thesis proposes a Hidden Markov Model (HMM) based correlation method of intrusion alerts which have been fired from different IDS sensors across an enterprise. We used HMM to predict the next attack class of the intruder that is also known as plan recognition. Our method has two advantages. Firstly, it does not require any usage or modeling of network topology, system vulnerabilities, and system configurations. Secondly, as we perform high...
Security in Concurrent Execution of an Authentication Protocol
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
Today many communications take place over asynchronous insecure networks which do not provide any guarantee of security (as Internet); hence there is a must in authenticating party or parties with which we are going to interact. In many cases, more than two parties (entities) are going to interact, resulting in need of group authentication. Since authentication is inseparable from key exchange, we are going to introduce a new authenticated group key exchange protocol in this thesis which benefits from all known features for such a protocol in the literature such as contributiveness and deniability. To overcome the problem of concurrency, we use a framework dedicated to security in concurrent...
Providing Confidentiality of Outsourced Data through Fragmentation
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
Data outsourcing is considered as a promising approach in today computing and connected world. This approach enables organizations to outsource their data to anexternal third party server which is responsible for storing and propagation of outsourced data. Although data outsourcing offers many benefits, especially for those organizations with limited resources and increaseing data volume, but this approach in security aspects like providing confidentiality and privacy about curious external third party or other threats, is faced by serious challenges. In the recent decade many approaches for solving or at least decreasing the potential threats over providing confidentiality of outsourced...
Evaluation of Security Features of an E-voting Protocol in a Semi-operational Environment
,
M.Sc. Thesis
Sharif University of Technology
;
Jalili, Rasool
(Supervisor)
Abstract
Electronic voting refers to voting methods that is done using electronic devices or via the Internet or Web. Helios and Civitas protocols are among the recent protocols introduced in this field. Importance and high sensitivity of electronic voting protocols has led researchers to pay high attention about their security analysis. In recent years, different approaches have been used to inspect and analyze electronic voting protocols. In many of such approaches, analysis had been done in a very abstract environment and without considering the operational requirements.The purpose of this thesis is to evaluate the security features of electronic voting protocols, considering their operational and...
Optimizing the Total Cost of Inventory Control System in Integrated Multi-Echelon Supply Chain With Time-sensitive Deteriorating Rates
, M.Sc. Thesis Sharif University of Technology ; hajji, Rasool (Supervisor)
Abstract
In this paper, we consider a three-echelon supply chain consisting of a producer, a distributor and a retailer. Generally each echelon tends to minimize his own inventory costs. On the other hand, competitive environment of business market, force companies to develop strategic alliances. In order to boost their partnership, separated echelons must integrate their policies, so that the total cost of the system be minimized. The model, extends the research of Wang et al.(2011) by changing the No shortage assumption into backlog shortage model.
This study assumes different deterioration rates among different echelons, and deterioration rates are time-sensitive, which is very helpful in...
This study assumes different deterioration rates among different echelons, and deterioration rates are time-sensitive, which is very helpful in...
Inventory Ordering System with Fuzzy Parameters in Supply Chain
, M.Sc. Thesis Sharif University of Technology ; Hajji, Rasool (Supervisor)
Abstract
Inventory control has been always considered important due to its prominent role in managing and better application of resources in the field of operational systems. Ordering system or review stock policy in supply chain management can be mentioned as one of the inventory control study fields of management. A lot of researches have been done in investigating ordering system in supply chain under certainty conditions; however, since the real world is full of uncertainties, parameters such as demand cannot be predicted exactly and we encounter with ambiguity. In this case, using crisp (exact) values can cause to decide wrongly (a wrong decision). On the other hand, due to absence of sufficient...
Analysis of End-to-End Electronic Voting Systems
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
End-to-end electronic voting protocols for electronic voting systems are used to hold a secure election with the two features of anonymity and verifiability. Verifiable mixnets are a fundamental element of electronic voting systems, which can keep the voters anonymous by mixing their votes, and provide a verifiability mechanism to prove their performance correctness. As the design of electronic voting protocols is error-prone, researchers consider the use of mathematics-based and systematic methods for their analysis. Therefore, based on formal methods and the process algebra approach, several studies have been conducted to analyze these systems, but none have properly analyzed verifiable...
Optimization of Raw Material Inventory Control System in Khorramshahr Oil Extraction Company Based on ( r,Q ) Optimal Inventory Policy
, M.Sc. Thesis Sharif University of Technology ; Hajji, Rasool (Supervisor)
Abstract
This thesis is related to applying survey of scientific inventory control methods in Khoramshahr Oil Extraction Company (KHOEC). KHOEC is the producer of edible oils in I.R of Iran and is a subset of E.T.K.A holding organization. The inventory costs of high consuming items are studied and optimized based on the optimal ordering policy (r, Q). First, the company raw materials are identified and classified based on ABC analysis method. For developing the new method of inventory control, the demand for each item is predicted, and the probability distribution of demand during the lead time is determined. Then according to this information and the desired service level of management, order point...
Development of Location-Inventory Model in Dual Channel Supply Chain and Solving the Model by Tabu Search Algorithm
,
M.Sc. Thesis
Sharif University of Technology
;
Hajji, Rasool
(Supervisor)
Abstract
This thesis presents a location- inventory model for dual-channel supply chains .Dual-channel supply chains have two channels for sale the traditional in-store (retail) channel and the online (retail) channel.The model assigns online demands to the capacitated stores currently serving in-store demands. Keeping the delivery network of the in-store demands unchanged, the model aims at minimizing the summation of transportation cost, inventory cost, and fixed handling cost in the system while assigning the online demands. We assume that at the beginning of each period a distribution center which just distributes products to the stores, follows an order-up-to policy which increases the total...
A Trust-based Approach for Correctness Verification of Query Results in Data Outsourcing Scenario
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
One of the security issues in database outsourcing scenario is the correctness of the query results. Correctness verification includes integrity, completeness and freshness of the results. Most of the proposed approaches for correctness verification impose high overhead on the components of the scenario which prevents the scenario to implemented in practical applications. In this thesis, we have proposed a probabilistic approach which imposes acceptable overhead for correctness verification of returned results of service provider. The approach uses the previous behavior of the service provider to calculate a trust value toward it which is used to adjust the imposed overhead. In other words,...