Loading...
Search for:
khazaei--mohammad
0.141 seconds
Total 5164 records
Relationship of profitability of world’s top companies with entrepreneurship, competitiveness, and business environment indicators
, Article Applied Economics ; Volume 53, Issue 23 , December , 2020 , Pages 2584-2597 ; Sharif University of Technology
Routledge
2020
Abstract
Identifying the factors affecting profitability is important from the perspective of market players. One of the most important benchmarks of firm performance is accounting profit and effective factors analysis so that users of accounting information analyse the factors affecting profit, firm performance and various aspects of its performance and according to estimates Done, make your own decision on how to allocate resources. The main purpose of this study is to investigate the impact of some factors of competitiveness, entrepreneurship and business environment indicators on the profitability of the world’s top companies. For this purpose, 176 top companies in the world from 2013 to 2018...
Relationship of profitability of world’s top companies with entrepreneurship, competitiveness, and business environment indicators
, Article Applied Economics ; Volume 53, Issue 23 , 2021 , Pages 2584-2597 ; 00036846 (ISSN) ; Sharif University of Technology
Routledge
2021
Abstract
Identifying the factors affecting profitability is important from the perspective of market players. One of the most important benchmarks of firm performance is accounting profit and effective factors analysis so that users of accounting information analyse the factors affecting profit, firm performance and various aspects of its performance and according to estimates Done, make your own decision on how to allocate resources. The main purpose of this study is to investigate the impact of some factors of competitiveness, entrepreneurship and business environment indicators on the profitability of the world’s top companies. For this purpose, 176 top companies in the world from 2013 to 2018...
Light propagation and Localization in Inhomogeneous and Random Optical Waveguide Lattices
, Ph.D. Dissertation Sharif University of Technology ; Mahdavi, Mohammad (Supervisor) ; Bahrampour, Ali Reza (Co-Advisor)
Abstract
Photonic lattices can provide an inexpensive and fine tools to investigate some common phenomena in condensed matter physics, quantum optics, relativistic mechanics,atomic and molecular physics. These phenomena contain Anderson localization,Bloch oscillation, Dynamic localization, coherent and squeezed states, Relativistic Dirac equation, Rabi oscillation, ... .In this thesis, it was investigated three worthy phenomena of them, which at first are introduced in condensed matter physics for electronic systems, in photonic lattices. These phenomena are as follow: Transverse localization of light wave, Bloch oscillation and dynamic localization of light. It was also simulate classically, the...
On The Behavior of Low-Rise, Irregular, Dual Structures
, M.Sc. Thesis Sharif University of Technology ; Mofid, Masoud (Supervisor)
Abstract
The Response modification factor R represents the behavior of the structure such as ductility, overstrength and the inherent redundancy. This factor shall be defined according to the type of lateral force resisting system. However, there are some complexities and/or uncertainties in codes related to the R factor according to the height, form of irregularities and structural systems. Therefore, from the scientific point of view as well as reliability, it is very clear that the R factor cannot be similar for all kinds of structures, categorized as a specific group. In this investigation, assuming a low-rise, vertically irregular structure with a heliport which has a dual structural system...
Modeling and Optimization of Composite Brake Friction Materials Formulation
, M.Sc. Thesis Sharif University of Technology ; Shojaei, Akbar (Supervisor)
Abstract
Automotive brake pad is one of the most widely used composites. Commonly, more than 10 components are applied to make these materials and due to the large number of components and interactions between them, choice, explaination of the behavior and optimization of brake friction materials are some industry's challenges. Until now, some methods have been presented to design and optimization of these materials, but due to different complexities, there is lack of practical method that could be used for explaining the tribological behavior, engineering calculation and optimization of brake friction materials. Today, formulation of the current brake pads in the industry has mainly come from trial...
Reflection Cryptanalysis of GOST Block Cipher
,
M.Sc. Thesis
Sharif University of Technology
;
khazaei, Shahram
(Supervisor)
Abstract
Block ciphers are the central tool in the design of security protocols. GOST is a block cipher that several attacks have been published on it during the past 20 years. One of them is the reflection attack that was first introduced in 2007. This attack utilizes similarities of some round functions of both encryption and decryption processes. In addition, there are approaches that combines techniques of the reflection attack and variants of the meet-in-the-middle attack. In this thesis, we study reflection-based attacks on GOST. We first describe the GOST block cipher and the reflection attack. Then, we review previous reflectionbased attacks such as reflection-meet-in-the-middle attack and...
Linear-Differential Cryptanalysis of Word-Reduced Variants of Cubehash
, M.Sc. Thesis Sharif University of Technology ; Khazaei, Shahram (Supervisor)
Abstract
In this thesis, first we will have a brief review on hash functions and related concepts.Then, we will descibe the hash function, Cubehash, which is one of the competitors in the competition held by NIST for selecting SHA-3 standard. Next, we will describe an attack based on linearization of differential paths in hash functions and apply this attack on Cubehash. At the end, we will discuss the results of this attack on Cubehash
Cryptographic Hash Functions from Expander Graphs
, M.Sc. Thesis Sharif University of Technology ; khazaei, Shahram (Supervisor)
Abstract
A hash function maps efficiently every finite length string to a fixed one. The output represents the entire content of the input, similar to digital fingerprint of input text. In order to be able to use a hash function in cryptography, it should be hard to find two distinct inputs with the same output (collision), because finding a collision in hash functions leads to malicious attacks on many security systems.We say a hash function is provably collision resistant, if finding a collision can be reduced to the known hard problems. Family of MD hash functions are one of the most famous applied hash functions which are considerably used in industrial applications. However, they are not...
Multiple human tracking using PHD filter in distributed camera network
, Article Proceedings of the 4th International Conference on Computer and Knowledge Engineering, ICCKE 2014 ; 2014 , pp. 569-574 ; ISBN: 9781479954865 ; Jamzad, M ; Sharif University of Technology
2014
Abstract
The Gaussian mixture probability hypothesis density (GM-PHD) filter is a closed form approximation of the multi-target Bayes filter which can overcome most multitarget tracking problems. Limited field of view, decreasing cost of cameras, and advances of using multi-camera induce us to use large-scale camera networks. In this paper, a multihuman tracking framework using the PHD filter in a distributed camera network is proposed. Each camera tracks objects locally with PHD filter and a track-after-detect scheme and its estimates of targets are sent to neighboring nodes. Then each camera fuses its local estimates with it's neighbors. The proposed method is evaluated on the public PETS2009...
Randomized partial checking revisited
, Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 7779 LNCS , February , 2013 , Pages 115-128 ; 03029743 (ISSN) ; 9783642360947 (ISBN) ; Wikstrom, D ; Sharif University of Technology
2013
Abstract
We study mix-nets with randomized partial checking (RPC) as proposed by Jakobsson, Juels, and Rivest (2002). RPC is a technique to verify the correctness of an execution both for Chaumian and homomorphic mix-nets. The idea is to relax the correctness and privacy requirements to achieve a more efficient mix-net. We identify serious issues in the original description of mix-nets with RPC and show how to exploit these to break both correctness and privacy, both for Chaumian and homomorphic mix-nets. Our attacks are practical and applicable to real world mix-net implementations, e.g., the Civitas and the Scantegrity voting systems
Modeling and optimization of friction materials based on genetic programming and experimental frictional data
, Article Journal of Reinforced Plastics and Composites ; Volume 34, Issue 7 , 2015 , Pages 581-590 ; 07316844 (ISSN) ; Shojaei, A ; Sharif University of Technology
SAGE Publications Ltd
2015
Abstract
A genetic programming technique was employed to develop empirical models for predicting specific wear rate and coefficient of friction on brake friction materials. The models consist of independent variables representing the volume fraction of the ingredients. The average absolute relative error for specific wear rate and coefficient of friction were found to be 1.93% and 1.92%, respectively. The models were also verified by the experimental data used for further control of the formulation. Utilizing Tornado plots, the models were found to be able to properly demonstrate the role of the ingredients on overall tribological performance of the brake friction materials. Moreover, a non-dominated...
Privacy Preserving Data Mining
, M.Sc. Thesis Sharif University of Technology ; khazaei, Shahram (Supervisor)
Abstract
Increasing use of new data technologies have made data collection possible in large scales. Practicallity of the data relies upon the extraction of meaningful knowledge.Data mining is a solution to this problem. One of the new areas in data mining is consideration of the concern of privacy alongside the usefulness of the mining results.Main goal of privacy preserving data mining is to develop data mining models which only extract the useful knowledge. In recent years, many researches have been done in this area. Since the literature and notation of these published works vary, a survey would help to better understand these concepts. This thesis tries to explain, analyse,unify and categorize...
Return code schemes for electronic voting systems
, Article 2nd International Joint Conference on Electronic Voting, E-Vote-ID 2017, 24 October 2017 through 27 October 2017 ; Volume 10615 LNCS , 2017 , Pages 198-209 ; 03029743 (ISSN); 9783319686868 (ISBN) ; Wikström, D ; Sharif University of Technology
Springer Verlag
2017
Abstract
We describe several return code schemes for secure vote submission in electronic voting systems. We consider a unified treatment where a return code is generated as a multiparty computation of a secure MAC tag applied on an encrypted message submitted by a voter. Our proposals enjoy a great level of flexibility with respect to various usability, security, and performance tradeoffs. © 2017, Springer International Publishing AG
A Study in Bound of Graph and Generalized Access Structures
, M.Sc. Thesis Sharif University of Technology ; khazaei, Shahram (Supervisor)
Abstract
Determining the value of optimal information ratio for a given access structure and finding the upper and lower bounds for the information ratio in secreet sharing is one of the main problems that has been studied over time. In this thesis, we have tried to introduce the tools used in this field, including polymatroids and Shannon’s inequalities, linear programming, decomposition and etc, examine the papers presented in this field and rewrite obtained results in a simpler way
Determining Regions of Linear Contribution Vectors of Small Access Structures
, M.Sc. Thesis Sharif University of Technology ; Khazaei, Shahram (Supervisor)
Abstract
Objective of Secret Sharing is assigning some random variable which will be called shares, generated based on a random variable called secret, to some participant such that only specific subsets of participants could reconstruct the secret by polling their shares together. Constructing shares as small as possible is desired, hence notions like information ratio and average information ratio have been studied and considered to be a measure of efficiency of secret sharing schemes. In this research contribution vectors of access structures with five participants and graph based access structures with six participants have been studied. Small access structures have been considered shortly after...
Ciphertext-only attack on d × d Hill in O(d13d)
, Article Information Processing Letters ; Volume 118 , 2017 , Pages 25-29 ; 00200190 (ISSN) ; Ahmadi, S ; Sharif University of Technology
Elsevier B.V
2017
Abstract
Hill is a classical cipher which is generally believed to be resistant against ciphertext-only attack. In this paper, by using a divide-and-conquer technique, it is first shown that Hill with d×d key matrix over Z26 can be broken with computational complexity of O(d26d), for the English language. This is much less than the only publicly known attack, i.e., the brute-force with complexity of O(d326d2). Then by using the Chinese Remainder Theorem, it is shown that the computational complexity of the proposed attack can be reduced down to O(d13d). Using an information-theoretic approach, it is shown that the minimum ciphertext length required for a successful attack increases by a factor of...
Forecasting Residential Natural Gas Consumption in Tehran Using Machine Learning Methods
, M.Sc. Thesis Sharif University of Technology ; Maleki, Abbas (Supervisor)
Abstract
According to increasing energy demand in Iran and the world, the role of natural gas as a relatively clean and cost-effective source has received more attention. Given the high share of the residential sector in the country's natural gas consumption, providing a model for forecasting the demand of this sector is of great importance for policy makers and decision makers in this field. In the present study, we employ three popular methods of machine learning, support vector regression, artificial neural network and decision tree to predict the consumption of natural gas in the residential sector in Tehran according to meteorological parameters (including temperature, precipitation and wind...
Towards more secure constructions of adjustable join schemes
, Article IEEE Transactions on Dependable and Secure Computing ; Volume 19, Issue 2 , 2022 , Pages 1078-1089 ; 15455971 (ISSN) ; Rafiee, M ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2022
Abstract
An adjustable join (AdjoinAdjoin) scheme [4] is a symmetric-key primitive that enables a user to securely outsource his database to a server, and later to issue join queries for a pair of columns. When queries are extended to a list of columns, the 3Partition3Partition security of Adjoin schemes [8] does not capture the expected security. To address this deficiency, we introduce the syntax and security notion of multi-adjustable join (M-AdjoinM-Adjoin) schemes. We propose a new security notion for this purpose, which we refer to as M3PartitionM3Partition. The 3Partition3Partition security of AdjoinAdjoin extends to the M3PartitionM3Partition security of M-AdjoinM-Adjoin in a straightforward...
Hinting Pseudorandom Generation
, M.Sc. Thesis Sharif University of Technology ; Khazaei, Shahram (Supervisor)
Abstract
In many sciences, including computer science, generating random numbers have always been an interesting problem.Pseudo-random generators are one of the most important solutions to this problem and one of the primitives, used especially in cryptography and computer science, which have made it easier for us to generate random numbers.The main purpose of these generators is to increase the length of an n-bit string to an l-bit string where l>n.We need an initial value called Seed in this definition. We will present a new and stronger definition in this essay, called the Hinting Pseudorandom Generator, which has different outputs as well. Thus, our input is n bits and our output is n.l bits. We...
Study of End-to-End Voting Systems Helios and Scantegrity II
, M.Sc. Thesis Sharif University of Technology ; Khazaei, Shahram (Supervisor)
Abstract
Voting is a detachable part of the democratic governments. In the era of modern computer systems, the need for electronic voting systems in no longer avoidable.Designing a secure electronic voting system is a difficult problem since both privacy and integrity must be achieved at the same time. This difficulty has cast the problem to the center of attention of many researchers.In this thesis we will consider the new generation of voting systems known as end-to-end that were designed to solve the problems in the previous generations of voting systems and to uphold the security of the system. Many of end-toend voting systems use concepts of cryptography in addition to machine tools.A central...