Loading...
Search for:
khalaj--m--e
0.14 seconds
Total 21540 records
Chromium carbonitride coating produced on DIN 1.2210 steel by thermo-reactive deposition technique: Thermodynamics, kinetics and modeling
, Article Surface and Coatings Technology ; Volume 225 , 2013 , Pages 1-10 ; 02578972 (ISSN) ; Nazari, A ; Khoie, S. M. M ; Khalaj, M. J ; Pouraliakbar, H ; Sharif University of Technology
2013
Abstract
A duplex surface treatment on DIN 1.2210 steel has been developed involving nitriding and followed by chromium thermo-reactive deposition (TRD) techniques. The TRD process was performed in molten salt bath at 550, 625 and 700°C for 1-14h. The process formed a thickness up to 9.5μm of chromium carbonitride coatings on a hardened diffusion zone. Characterization of the coatings by means of scanning electron microscopy (SEM) and X-ray diffraction analysis (XRD) indicates that the compact and dense coatings mainly consist of Cr(C,N) and Cr2(C,N) phase. All the growth processes of the chromium carbonitride obtained by TRD technique followed a parabolic kinetics. Activation energy (Q) for the...
Modeling the correlation between heat treatment, chemical composition and bainite fraction of pipeline steels by means of artificial neural networks
, Article Neural Network World ; Volume 23, Issue 4 , 2013 , Pages 351-367 ; 12100552 (ISSN) ; Pouraliakbar, H ; Mamaghani, K. R ; Khalaj, M. J ; Sharif University of Technology
2013
Abstract
In the present study, bainite fraction results of continuous cooling of high strength low alloy steels have been modeled by artificial neural networks. The artificial neural network models were constructed by 16 input parameters including chemical compositions (C, Mn, Nb, Mo, Ti, N, Cu, P, S, Si, Al, V), Nb in solution, austenitizing temperature, initial austenite grain size and cooling rate over the temperature range of the occurrence of phase transformations. The value for the output layer was the bainite fraction. According to the input parameters in feed-forward back-propagation algorithm, the constructed networks were trained, validated and tested. To make a decision on the completion...
Correction: Know-how-first anti-intellectualism: Williamson against Williamson (Synthese, (2022), 200, 4, (340), 10.1007/s11229-022-03823-7)
, Article Synthese ; Volume 200, Issue 5 , 2022 ; 00397857 (ISSN) ; Sharif University of Technology
Springer Science and Business Media B.V
2022
Abstract
The article was originally published with the splitting of the corresponding author name into two author names. The original article has been corrected. © The Author(s), under exclusive licence to Springer Nature B.V. 2022
Method as a preprocessing stage for tracking sperms progressive motility
, Article IEEE International Symposium on Signal Processing and Information Technology, IEEE ISSPIT 2013 ; 2013 , Pages 170-174 ; Lashgari, E ; Aghdam, A. A ; Khalaj, B. H ; Sharif University of Technology
IEEE Computer Society
2013
Abstract
Methods of human semen assessment are quite wide ranging. In this paper, we use background subtraction methods in order to detect progressive sperms whose quality of movement strongly influence fertility. Robust Principal Component Analysis (RPCA) is a powerful algorithm which has been used recently for background subtraction purposes. Sperm tracking problem can also be defined as a background subtraction problem. In RPCA algorithm, data is represented by a low rank plus sparse matrix. In our approach, the foreground data is recovered through such matrix decomposition. We compare the RPCA approach with four other background subtraction methods in order to check accuracy of algorithm as a...
Secure deep-JSCC against multiple eavesdroppers
, Article Proceedings - IEEE Global Communications Conference, GLOBECOM ; 2023 , Pages 3433-3438 ; 23340983 (ISSN); 979-835031090-0 (ISBN) ; Letafati, M ; Erdemir, E ; Khalaj, B. H ; Behroozi, H ; Gündüz, D ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2023
Abstract
In this paper, a generalization of deep learning-aided joint source channel coding (Deep-JSCC) approach to secure communications is studied. We propose an end-to-end (E2E) learning-based approach for secure communication against multiple eavesdroppers over complex-valued fading channels. Both scenarios of colluding and non-colluding eavesdroppers are studied. For the colluding strategy, eavesdroppers share their logits to collaboratively infer private attributes based on ensemble learning method, while for the non-colluding setup they act alone. The goal is to prevent eavesdroppers from inferring private (sensitive) information about the transmitted images, while delivering the images to a...
Designing a multi-echelon supply chain network: A car manufacturer case study
, Article Journal of Intelligent and Fuzzy Systems ; Vol. 27, Issue. 6 , 2014 , pp. 2897-2914 ; ISSN 1875-8967 ; Modarres, M ; Tavakkoli-Moghaddam, R ; Sharif University of Technology
2014
Abstract
A multi-echelon supply chain design problem concerns the structure of the network and allocation of resources of the company to meet the demand forecast. This paper tries to design a multi-echelon supply chain network with five echelons including supplier, cross-dock, plant, distribution center and representative (customer). For this purpose, a mixed-integer mathematical model is developed to investigate the location of cross-docks, distribution centers, and also allocation between each pair of parties in order to minimize total cost of location and transportation. Due to the complexity of the model, a novel genetic algorithm is developed and applied on a real-world case study of Iran Khodro...
Manifold learning for ECG arrhythmia recognition
, Article 2013 20th Iranian Conference on Biomedical Engineering, ICBME 2013 ; 2013 , Pages 126-131 ; Jahed, M ; Khalaj, B ; Sharif University of Technology
IEEE Computer Society
2013
Abstract
Heart is a complex system and we can find its function in electrocardiogram (ECG) signal. The records show high mortality rate of heart diseases. So it is essential to detect and recognize ECG arrhythmias. The problem with ECG analysis is the vast variations among morphologies of ECG signals. Premature Ventricular Contractions (PVC) is a common type of arrhythmia which may lead to critical situations and contains risk. This study, proposes a novel approach for detecting PVC and visualizing data with respect to ECG morphologies by using manifold learning. To this end, the Laplacian Eigenmaps - One of the reduction method and it is in the nonlinear category - is used to extract important...
A search for an intermediate-mass black hole in the core of the globular cluster NGC 6266
, Article Astrophysical Journal ; Volume 745, Issue 2 , 2012 ; 0004637X (ISSN) ; Harrison, T. E ; Baumgardt, H ; Khalaj, P ; Sharif University of Technology
2012
Abstract
It has long been thought that intermediate-mass black holes (IMBHs) might be located in the cores of globular clusters. However, studies attempting to confirm this possibility have been inconclusive. To refine the search for these objects, Baumgardt et al. completed a series of N-body simulations to determine the observational properties that a host globular cluster should possess. Keys to revealing the presence of an IMBH were found to be the shape of the cluster's core proper motion dispersion profile and its surface density profile. Among the possible host clusters identified by Baumgardt et al., NGC6266 was found to be the most suitable object to search. Hubble Space Telescope Wide Field...
On learning-assisted content-based secure image transmission for delay-aware systems with randomly-distributed eavesdroppers
, Article IEEE Transactions on Communications ; 2021 ; 00906778 (ISSN) ; Behroozi, H ; Khalaj, B. H ; Jorswieck, E. A ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2021
Abstract
In this paper, a learning-aided content-based image transmission scheme is proposed, where a multi-antenna source wishes to securely deliver an image to a legitimate destination in the presence of randomly-distributed passive eavesdroppers (Eves). We take into account the fact that not all regions of an image have the same importance from the security perspective. Hence, we employ a hybrid method to realize both the error-free data delivery of public regions—containing less-important pixels; and an artificial noise (AN)-aided transmission scheme for securing the confidential packets. To reinforce system’s security, fountain-based packet delivery is also adopted, where the source node encodes...
Content-Based medical image transmission against randomly-distributed passive eavesdroppers
, Article 2021 IEEE International Conference on Communications Workshops, ICC Workshops 2021, 14 June 2021 through 23 June 2021 ; 2021 ; 9781728194417 (ISBN) ; Behroozi, H ; Hossein Khalaj, B ; Jorswieck, E. A ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2021
Abstract
In this paper, a content-aware medical image transmission scheme is investigated over a multiple-input single-output (MISO) channel in wireless healthcare systems. The multi-antenna-aided access point, as a source node, wishes to wirelessly send medical images of a patient to a trusted destination node, while multiple randomly-located totally passive and non-colluding eavesdroppers (Eves) try to wiretap the transmission. Considering the fact that not all regions of an image have the same importancy level from the security view-point, we first segment the image into two parts: the region of interest (RoI), which more likely contains important diagnostic information regarding the medical image...
On learning-assisted content-based secure image transmission for delay-aware systems with randomly-distributed eavesdroppers
, Article IEEE Transactions on Communications ; Volume 70, Issue 2 , 2022 , Pages 1125-1139 ; 00906778 (ISSN) ; Behroozi, H ; Khalaj, B. H ; Jorswieck, E. A ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2022
Abstract
In this paper, a learning-aided content-based image transmission scheme is proposed, where a multi-antenna source wishes to securely deliver an image to a legitimate destination in the presence of randomly-distributed passive eavesdroppers (Eves). We take into account the fact that not all regions of an image have the same importance from the security perspective. Hence, we employ a hybrid method to realize both the error-free data delivery of public regions - containing less-important pixels; and an artificial noise (AN)-aided transmission scheme for securing the confidential packets. To reinforce system's security, fountain-based packet delivery is also adopted, where the source node...
Hardware-Impaired PHY Secret Key Generation With Man-in-the-Middle Adversaries
, Article IEEE Wireless Communications Letters ; Volume 11, Issue 4 , 2022 , Pages 856-860 ; 21622337 (ISSN) ; Behroozi, H ; Khalaj, B. H ; Jorswieck, E. A ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2022
Abstract
In this letter, we examine the PHY layer secret key generation (PHY-SKG) scheme in the presence of man-in-the-middle (MiM) adversary, while legitimate parties suffer from hardware impairments (HIs). Different from previous works on PHY-SKG that consider adversaries who simply try to make an interference in the communication link, the MiM aims to deceive legitimate entities about the source of common randomness. To conquer the MiM attack, legitimate parties utilize randomized pilots (RPs) in our proposed scheme. We analyze the effect of HIs on the performance of system by deriving the achievable secret key rate (SKR). Our results highlight a fundamental limit, as a ceiling phenomena, on the...
Learning-based secret key generation in relay channels under adversarial attacks
, Article IEEE Open Journal of Vehicular Technology ; Volume 4 , 2023 , Pages 749-764 ; 26441330 (ISSN) ; Behroozi, H ; Khalaj, B. H ; Jorswieck, E. A ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2023
Abstract
Wireless secret key generation (WSKG) facilitates efficient key agreement protocols for securing the sixth generation (6G) wireless networks thanks to its inherently lightweight functionality. Nevertheless, with the existence of adversarial attacks or internal impairments, WSKG can be negatively affected during the randomness distillation, where the legitimate parties measure a source of common randomness. In this article, we propose a learning-aided approach for cooperative WSKG under man-in-the-middle (MitM) adversarial attack, while the legitimate nodes suffer from hardware impairments (HIs). The key idea is to process the PHY-attribute data on the application layer via deploying a deep...
Performance analysis of heterogeneous cellular caching networks with overlapping small cells
, Article IEEE Transactions on Vehicular Technology ; 2021 ; 00189545 (ISSN) ; Hossein Khalaj, B ; Xiao, M ; Skoglund, M ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2021
Abstract
Caching at network edges has attracted more and more research interests recently for the purpose of alleviating the network traffic pressure especially in backhaul links and improving user experience. We study Heterogeneous Cellular Caching Networks (HCCNs) consisting of macro cells in which N small cell base stations (SBSs) equipped with cache memory operate in conjunction with the macro cell base station (MBS). We provide closed-form expressions of the MBS and SBSs utilization factors and average user-experienced-delay in HCCNs with overlapping coverage regions, considering general traffic models for the request arrivals based on the Independent Reference Model (IRM) and renewal traffic...
Distributed synchronization and beamforming in uplink relay asynchronous OFDMA CoMP networks
, Article IEEE Transactions on Wireless Communications ; Volume 14, Issue 6 , 2015 , Pages 3471-3480 ; 15361276 (ISSN) ; Kiamari, M ; Khalaj, B. H ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2015
Abstract
In this paper, we use delay-amplify-and-forward relays in the uplink direction of a coordinated multi-point network based on orthogonal frequency division multiplexing. The key novelty is that we assume delay from users to different base stations (BSs), in general, may exceed cyclic prefix (CP) length as might be the case in large cells and cannot be completely compensated by traditional timing advance strategies. Consequently, interchannel interference and intersymbol interference may arise under such assumptions. We first optimize the adjustable delays added at users, relays and BS nodes in order to reduce the effective delay spread at the receive sites, then we optimize relays' weights...
Data association in multi-input single-output passive coherent location schemes
, Article IET Radar, Sonar and Navigation ; Volume 6, Issue 3 , 2012 , Pages 149-156 ; 17518784 (ISSN) ; Karbasi, S. M ; Khalaj, B. H ; Nayebi, M. M ; Sharif University of Technology
2012
Abstract
Efficient combination of multiple input multiple output (MIMO) and passive coherent location (PCL) ideas is expected to improve performance of localisation schemes. While using multiple antennas at transmit and receive sides provides spatial diversity, it is possible to obtain similar performance by using multiple transmitters, already transmitting standard signals (such as digital TV) in the environment (also known as illuminators of opportunity). However, in this case, it is not always possible to ensure that signals of different transmitters are orthogonal to each other. In such cases, resolving signals of multiple transmitters reflected from multiple objects is not a trivial problem. One...
MIMO PCL in a single frequency network
, Article 2011 Microwaves, Radar and Remote Sensing Symposium, MRRS-2011 - Proceedings, 25 August 2011 through 27 August 2011 ; August , 2011 , Pages 280-283 ; 9781424496440 (ISBN) ; Karbasi, S. M ; Khalaj, B. H ; Nayebi, M. M ; Sharif University of Technology
2011
Abstract
Passive localization using MIMO techniques has attracted much attention recently. In such schemes, using multiple antennas at transmitter and receiver sides provides spatial diversity without need for identifiable transmitters. On the other hand, one of the problems facing such approach arises when transmitters of a single frequency network (SFN) are used as non-cooperative transmitters and resolving the signals of multiple transmitters reflected from multiple targets is not trivial at receiver side. Therefore, in order to obtain the diversity gain of MIMO localization schemes, it is necessary to develop a technique to assign each echo arriving at the receiver to a given transmitter. In this...
An energy-efficient leader selection algorithm for cooperative mobile clouds
, Article IFIP Wireless Days, Valencia ; November , 2013 , Page(s): 1 - 4 ; 21569711 (ISSN) ; 9781479905423 (ISBN) ; Salehi, M. J ; Khalaj, B. H ; Katz, M ; Sharif University of Technology
IEEE Computer Society
2013
Abstract
In this paper, we propose and study a context-aware leader selection algorithm within the concept of mobile clouds. We deploy a dedicated Cooperative Control Server (CCS) to assist and manage the process of leader selection more efficiently. The proposed algorithm collects data regarding instantaneous conditions of Mobile Terminals (MTs) and their radio environment; and then computes and assigns a rank to each MT. The ranks calculated based on a combination of different context-related parameters and corresponding weighting factors, allow selecting the leader. Furthermore, the energy efficiency and stability of the selected leaders is investigated for different parameter values through...
Spatial diversity gain of MIMO single frequency network in passive coherent location
, Article Scientia Iranica ; Vol. 21, Issue. 6 , 2014 , pp. 2186-2199 ; ISSN: 10263098 ; Majd, M. N ; Chitgarha, M. M ; Khalaj, B. H ; Nayebi, M. M ; Sharif University of Technology
2014
Abstract
Recently, it has been shown that applying MIMO technology, i.e. using multiple antennas at the transmit side and multiple antennas at the receive side, improves the performance of object detection and localization. In such scenarios, the spatial diversity specifically helps overcome the fading of the cross section of the object, leading to reduced probability of missed detection. Such a phenomenon is, in fact, the dual of probability of bit error reduction in communication systems due to diversity gain. Despite the importance of such performance enhancement, this subject has not been sufficiently investigated in the PCL (Passive Coherent Location) schemes, where the transmitters (or...
The detector's output SNR as a criterion for receiver placement in MIMO DVB-T based passive coherent location
, Article International Congress on Ultra Modern Telecommunications and Control Systems and Workshops ; 2012 , Pages 431-435 ; 21570221 (ISSN) ; 9781467320153 (ISBN) ; Radmard, M ; Majd, M. N ; Khalaj, B. H ; Nayebi, M. M ; Sharif University of Technology
2012
Abstract
As the DVB-T (Digital Video Broadcasting-Terrestrial)'s use is outspreading, one of its interesting emerging applications is to use DVB-T stations as non-cooperative transmitters in order to detect and localize targets. An important and favorable characteristic of DVB-T for this application is its being working in a Single Frequency Network (SFN), so that multiple transmitters can be used simultaneously to detect the targets. In addition, using multiple antennas at the receiver side leads to the well known configuration known as MIMO. However, one of the obstacles, arisen in such configurations, is the receive antennas' placement in proper positions so that the detection performance is...