Loading...
Search for: kargar--m
0.164 seconds

    Truthful and secure routing in Ad Hoc networks

    , Article 2008 International Symposium on Computer Science and its Applications, CSA 2008, Hobart, TAS, 13 October 2008 through 15 October 2008 ; October , 2008 , Pages 369-376 ; 9780769534282 (ISBN) Kargar, M ; Ghodsi, M
    2008
    Abstract
    Cooperation among nodes is vital in wireless networks since in such networks nodes depend on each other for routing packets. However, cooperation in such operations consumes nodes recourses such as battery and bandwidth. Therefore, it is necessary to design incentive mechanisms to enforce nodes to forward packets when the source and destination of the packet are other nodes. We study routing in wireless networks from a game theoretic view point. Based on this view, the network consists of greedy and selfish nodes who accept payments for forwarding data for other nodes if the payments cover their individual costs incurred by forwarding data. Also, route falsification attacks are easy to... 

    Truthful and secure routing in Ad Hoc networks with malicious and selfish nodes

    , Article International Journal of Security and its Applications ; Volume 3, Issue 1 , 2009 , Pages 117-128 ; 17389976 (ISSN) Kargar, M ; Ghodsi, M ; Sharif University of Technology
    2009
    Abstract
    Cooperation among nodes is important in ad hoc networks since in such networks nodes depend on each other for forwarding packets. However, cooperation in such operations consumes nodes energy and recourses. Therefore, it is necessary to design incentive mechanisms to enforce nodes to forward packets when the source and destination of the packet are other nodes in the network. We study routing in ad hoc and wireless networks from a game theoretic view point. Based on this view, the network consists of selfish and greedy nodes who accept payments for forwarding data for other nodes if the payments cover their individual costs incurred by forwarding data. Also, route falsification attacks are... 

    Trusted secure routing for ad hoc networks

    , Article MobiWac'07 - Proceedings of the 5th ACM International Workshop on Mobility Management and Wireless Access, Chania, Crete Island, 22 October 2007 through 22 October 2007 ; 2007 , Pages 176-179 ; 9781595938091 (ISBN) Haghpanah, N ; Akhoondi, M ; Kargar, M ; Movaghar, A ; Sharif University of Technology
    2007
    Abstract
    Cooperation among nodes is vital in Mobil Ac Hoc Networks (MANETs) since in such networks nodes depend on each other for forwarding and routing packets. However, cooperation in such operations consumes nodes' recourses such as battery and bandwidth. Therefore it is necessary to design incentive mechanisms to enforce nodes to forward packets when the source and destination of the packet are other nodes. In this paper, we present a distributed fair solution to judge, punish and re-admit a selfish node, forcing nodes to cooperate with each other. Our scheme is different from previous ones in that it combines two characteristics that have been separately handled in previous works. The first... 

    Heat transfer phenomena in a vortex engine

    , Article Journal of Thermophysics and Heat Transfer ; Volume 23, Issue 4 , 2009 , Pages 847-851 ; 08878722 (ISSN) Kargar, M ; Saidi, M. H ; Ghafourian, A ; Sharif University of Technology
    2009
    Abstract
    The heat transfer phenomenon in a vortex engine was investigated. A mixture of butane and propane was used as the fuel in which the mole fraction of butane and propane was 0.2 and 0.8, respectively. A series of tests were conducted in different conditions of oxidizer and fuel mass flow rates for a vortex engine. The tests were categorized into two groups to find the effects of the oxidizer mass flow rate on the flux of radiation heat transfer and convective cooling at a fixed equivalence ratio. The effects of the equivalence ratio on the heat transfer phenomena at a fixed oxidizer mass flow rate are also determined. The results revealed that the rate of radiation heat transfer to the chamber... 

    Experimental investigation of heat transfer modes in vortex combustion engines

    , Article Collection of Technical Papers - 43rd AIAA/ASME/SAE/ASEE Joint Propulsion Conference, 8 July 2007 through 11 July 2007, Cincinnati, OH ; Volume 6 , 2007 , Pages 5663-5671 ; 1563479036 (ISBN); 9781563479038 (ISBN) Kargar, M ; Saidi, M. H ; Ghafourian, A ; Sharif University of Technology
    2007
    Abstract
    In a vortex engine, oxidizer issues tangentially at the end of the chamber, consequently a cool vortex flows toward the head, being mixed with fuel, a secondary vortex of combustible reactants swirls coaxial with the first vortex to the nozzle exit. Therefore radiation heat transfer from flame to the chamber wall causes to increase wall temperature; meanwhile highly convective coolant flow of outer vortex reduces the wall temperature. In this paper the rate of total heat transfer and radiative heat are measured experimentally and convective cooling is calculated as the difference between the above mentioned quantities. The rate of heat transfer to the chamber wall is calculated using... 

    Haplotyping problem, a clustering approach

    , Article NUMERICAL ANALYSIS AND APPLIED MATHEMATICS: International Conference on Numerical Analysis and Applied Mathematics, Corfu, 16 September 2007 through 20 September 2007 ; Volume 936 , 2007 , Pages 185-190 ; 0094243X (ISSN) ; 073540447X (ISBN); 9780735404472 (ISBN) Eslahchi, C ; Sadeghi, M ; Pezeshk, H ; Kargar, M ; Poormohammadi, H ; Sharif University of Technology
    2007
    Abstract
    Construction of two haplotypes from a set of Single Nucleotide Polymorphism (SNP) fragments is called haplotype reconstruction problem. One of the most popular computational model for this problem is Minimum Error Correction (MEC). Since MEC is an NP-hard problem, here we propose a novel heuristic algorithm based on clustering analysis in data mining for haplotype reconstruction problem. Based on hamming distance and similarity between two fragments, our iterative algorithm produces two clusters of fragments; then, in each iteration, the algorithm assigns a fragment to one of the clusters. Our results suggest that the algorithm has less reconstruction error rate in comparison with other... 

    Simulation of Fluid Flow in Nonstraight Nanochannels

    , M.Sc. Thesis Sharif University of Technology Kargar, Sajad (Author) ; Mousavi, Ali (Supervisor)
    Abstract
    Understanding the flow of liquids and particularly water in nanochannels is important for scientific and technological applications, such as for filtration and drug delivery. In this study, we perform molecular dynamics simulations to investigate the transfer of single-file water molecules across straight or nonstraight single-walled carbon nanotubes (SWCNTs). In contrast with the macroscopic scenario, the nonstraight nanostructure can increase the water permeation. Remarkably, compared with the straight SWCNT, the nonstraight SWCNT with the minimal bending angle of 30° in the simulations can enhance the water transport up to 3.9 times. Also increasing length and diameter of carbon nanotubes... 

    Prioritizing and Clustering Customers in a Supply Chain with Perishable and Fast Moving Consumer Goods (FMCG) (Case Study of Ramak Company)

    , M.Sc. Thesis Sharif University of Technology kargar, Sanaz (Author) ; Rafiee, Majid (Supervisor)
    Abstract
    Knowing different groups of customers and building effective communication with them in such a way as to guarantee the future economic interests of the organization is a very important issue in today's businesses. The attraction of profitable customers, as well as the preservation of valuable old customers, are both important, except for the precise identification of their features. The value of customer longevity plays an important role in customer segmentation, and there are numerous researches that focuses on customer value with the aim of making more profit for the organization, most of which have life-cycle customer value models as the main inputs for segmentation cCustomers have been... 

    Bidirectional water transport through non-straight carbon nanotubes

    , Article Journal of Molecular Liquids ; Volume 276 , 2019 , Pages 39-46 ; 01677322 (ISSN) Kargar, S ; Moosavi, A ; Sharif University of Technology
    Elsevier B.V  2019
    Abstract
    Natural nanochannels and those used for applied purposes are often several nanometers in diameter and have lengths up to micrometer scales. Since normally no pressure gradient, mechanical force or electrical field is exerted on fluids in these situations, the fluid flow within them is not single-file and can be bidirectional. For this reason, studying the behavior of bidirectional flows in the channels is of paramount importance. In this study, a comprehensive investigation on the straight and non-straight bidirectional water transfer through carbon nanotubes is conducted via extensive molecular dynamics simulations. The results indicate that by changing the length, the diameter and the... 

    A novel integrated solar desalination system with a pulsating heat pipe

    , Article Desalination ; Volume 311 , 2013 , Pages 206-210 ; 00119164 (ISSN) Kargar Sharif Abad, H ; Ghiasi, M ; Jahangiri Mamouri, S ; Shafii, M. B ; Sharif University of Technology
    2013
    Abstract
    The application of the solar energy in thermal desalination devices is one of the most beneficial applications of the renewable energies. In this study, a novel solar desalination system is introduced, which is benefited from the undeniable advantages of pulsating heat pipe (PHP) as a fast responding, flexible and high performance thermal conducting device. Results show a remarkable increase in the rate of desalinated water production and the maximum production reaches up to 875mL/(m2.h). However, the optimum water depth in basin and the filling ratio of the PHP are measured 1cm and 40%, respectively  

    Approximation algorithms for software component selection problem

    , Article 14th Asia Pacific Software Engineering Conference, ASPCE 2007, Nagoya, 4 December 2007 through 7 December 2007 ; January , 2007 , Pages 159-166 ; 15301362 (ISSN); 0769530575 (ISBN); 9780769530574 (ISBN) Haghpanah, N ; Habibi, J ; Moaven, S ; Kargar, M ; Yeganeh, H ; Sharif University of Technology
    2007
    Abstract
    Today's software systems are more frequently composed from preexisting commercial or non-commercial components and connectors. These components provide complex and independent functionality and are engaged in complex interactions. Component-Based Software Engineering (CBSE) is concerned with composing, selecting and designing such components. As the popularity of this approach and hence number of commercially available software components grows, selecting a set of components to satisfy a set of requirements while minimizing cost is becoming more difficult. This problem necessitates the design of efficient algorithms to automate component selection for software developing organizations. We... 

    Security Evaluation of Deep Neural Networks in the Presence of an Adversary

    , M.Sc. Thesis Sharif University of Technology Kargar Novin, Omid (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    There has been a noticable surge in the usage of machine learning techniques in various fields, such as security related fields. With this growing pace of using machine learning to solve various problems, securing these models against attackers has become one of the main topics of machine learning literatures. Recent work has shown that in an adversarial environment, machine learning models are vulernable, and attackers can create carefully crafted inputs to fool the models. With the advent of deep neural networks, many researchers have used deep neural networks for the task of malware detection, and they have achieved impresive results. Finding the vulnerlabilities of these models is an... 

    An Efficient and Light Provably Secure Identification Protocol

    , M.Sc. Thesis Sharif University of Technology Kargar, Mohammad Ali (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Identification protocols facilitates two participants A and B to identify themselves to each other. Beside identification, A and B can exchange a secret value along with the identification process as the key exchange identification protocol.A secure key exchange identification protocol hould utilize perfect forward secrecy (PFS) property. PFS means if an attacker could compromise an entity in future and gain its long-term key, he cannot succeed to extract previous session keys. So, he will be unable to decrypt previous messages and they will remain secure. Because of the low power and storage of light devices, updating secret shared keys is a solution to reach PFS in such protocols. A major... 

    The Effect of Performance of Ships Propeller on its Maneuvering in Shallow and Deep Water

    , M.Sc. Thesis Sharif University of Technology Kargar, Soroush (Author) ; Seif, Mohammad Saeed (Supervisor)
    Abstract
    In this thesis ship propeller performance in maneuvering conditions have been investigated which means an oblique flow condition for working propeller. Then results of these investigations have been put to use to simulate maneuvering using MMG equations. These calculations have been done to investigate nominal wake variations in different drift angles and depth conditions. In this project displacement vessel KVLCC2 and propeller POTSDAM VP1304 have been studied due to the abundance of experimental data. Calculations in this study have been carried in three steps: 1, calculation of nominal wake of the vessel in different drift angles and depths via CFD. 2, Using the results of previous... 

    Finding correlation between protein protein interaction modules using semantic web techniques

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 1009-1012 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Kargar, M ; Moaven, S ; Abolhassani, H ; Sharif University of Technology
    2008
    Abstract
    Many complex networks such as social networks and computer show modular structures, where edges between nodes are much denser within modules than between modules. It is strongly believed that cellular networks are also modular, reflecting the relative independence and coherence of different functional units in a cell. In this paper we used a human curated dataset. In this paper we consider each module in the PPI network as ontology. Using techniques in ontology alignment, we compare each pair of modules in the network. We want to see that is there a correlation between the structure of each module or they have totally different structures. Our results show that there is no correlation... 

    AntAngioCOOL: computational detection of anti-angiogenic peptides

    , Article Journal of Translational Medicine ; Volume 17, Issue 1 , 2019 ; 14795876 (ISSN) Zahiri, J ; Khorsand, B ; Yousefi, A. A ; Kargar, M. J ; Shirali Hossein Zade, R ; Mahdevar, G ; Sharif University of Technology
    BioMed Central Ltd  2019
    Abstract
    Background: Angiogenesis inhibition research is a cutting edge area in angiogenesis-dependent disease therapy, especially in cancer therapy. Recently, studies on anti-angiogenic peptides have provided promising results in the field of cancer treatment. Methods: A non-redundant dataset of 135 anti-angiogenic peptides (positive instances) and 135 non anti-angiogenic peptides (negative instances) was used in this study. Also, 20% of each class were selected to construct an independent test dataset (see Additional files 1, 2). We proposed an effective machine learning based R package (AntAngioCOOL) to predict anti-angiogenic peptides. We have examined more than 200 different classifiers to build... 

    Graphyne nanotubes: materials with ultralow phonon mean free path and strong optical phonon scattering for thermoelectric applications

    , Article Journal of Physical Chemistry C ; Volume 122, Issue 39 , 2018 , Pages 22688-22698 ; 19327447 (ISSN) Reihani, A ; Soleimani, A ; Kargar, S ; Sundararaghavan, V ; Ramazani, A ; Sharif University of Technology
    2018
    Abstract
    Thermal conductivity and phonon transport properties of graphyne nanotubes (GNTs) and conventional carbon nanotubes (CNTs) are studied using nonequilibrium molecular dynamics simulations. The effect of nanotube length on the thermal conductivity and phonon transport transition from a ballistic to a diffusive regime is investigated. It is found that the thermal conductivity is significantly higher for CNTs in comparison to that of GNTs across the entire ballistic-diffusive transport range. Among GNTs, β- and γ-GNTs demonstrated the lowest and highest thermal conductivities, respectively. In addition, ultralow ballistic to diffusive transition length (4.5-7.6 nm) was observed in GNTs, which... 

    Kinetic Modeling of Dimehtyl Ether Production from Synthesis Gas

    , M.Sc. Thesis Sharif University of Technology Kargar Sharif Abad, Monireh (Author) ; Kazemeini, Mohammad (Supervisor) ; Aghaziarati, Mahmoud (Supervisor)
    Abstract
    In view of environmental problems and the limited energy supply, synthesis of new liquid fuel from coal or natural gas is becoming a hot research in recent years. Dimethyl ether (DME) is one of the most promising alternates of such synthetic fuels. In this project the kinetics of direct DME synthesis from syngas (H2 and CO) over the new bifunctional catalyst has been investigated in slurry reactor system. A new mechanism and rate law expression were established. The kinetic model has been fitted the experimental data, which has been obtained by other researchers. The new bifunctional catalyst was composed of Cu/ZnO/ZrO2 and Al-modified H-Mordenite zeolite. The calculated apparent... 

    Analysis of Functional Connectivity Among Brain Networks Using FMRI

    , M.Sc. Thesis Sharif University of Technology Rahmati Kargar, Behnam (Author) ; Vosughi Vahdat, Bijan (Supervisor) ; Amini, Arash (Supervisor)
    Abstract
    Development of the fMRI imaging method gives the scientists the opportunity to record functional images from the brain with high spatial resolution and several researches were conducted on this field. Autistic people’s brain has functional differences with normal people. In this paper these differences have been studied. At first fMRI datasets from autistic subjects and control have been recorded and preprocessed. Then the independent components from these datasets have been extracted using group ICA method. Any independent component is an image depicting a brain network. There is a time series for each image which shows the temporal variations of each component. In the next step, the... 

    Probability of missed detection as a criterion for receiver placement in MIMO PCL

    , Article IEEE National Radar Conference - Proceedings, 7 May 2012 through 11 May 2012, Atlanta, GA ; 2012 , Pages 0924-0927 ; 10975659 (ISSN) ; 9781467306584 (ISBN) Majd, M. N ; Chitgarha, M. M ; Radmard, M ; Nayebi, M. M ; Sharif University of Technology
    IEEE  2012
    Abstract
    Using multiple antennas at the transmit and receive sides of a passive radar brings both the benefits of MIMO radar and passive radar. However one of the obstacles arisen in such configuration is the receive antennas placement in proper positions so that the radar performance is improved. Here we just consider the case of positioning one receiver among multiple illuminators of opportunity. Indeed it is a start for the solution of optimizing the geometry of the multiple receivers in a passive radar