Loading...
Search for: letafati--mehdi
0.112 seconds

    Theoretical and Experimental Study of Turbine Discs under Severe Spin and Temperature Fluctuations

    , M.Sc. Thesis Sharif University of Technology Letafati, Mohammad Hassan (Author) ; Durali, Mohammad (Supervisor)
    Abstract
    Gas turbine discs must be tested before they are installed in an engine for their mechanical properties and resistance to crack growth. Such test is usually done in a device called Spin Tester in which high rotational speed and temperature fluctuations can be applied to a disc. In this project a plug-in software is developed by which life of gas turbine discs under sever fluctuations of rotating speed and temperature can be assessed. The tests performed in the software are; stress analysis, fatigue analysis, crack initiation point, and finally 3-D fatigue crack growth path. The software is written using Python programming in ABAQUS. The software adds a sub-menu in ABAQUS Plugins as "Engine... 

    Three-hop untrusted relay networks with hardware imperfections and channel estimation errors for internet of things

    , Article IEEE Transactions on Information Forensics and Security ; Volume 15 , March , 2020 , Pages 2856-2868 Letafati, M ; Kuhestani, A ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Cooperative relaying can be introduced as a promising approach for data communication in the Internet of Things (IoT), where the source and the destination may be placed far away. In this paper, by taking a variety of realistic hardware imperfections (HWIs) and channels estimation errors (CEEs) into account, the secrecy performance of a three-hop cooperative network with a source, a destination and two consecutive amplify-and-forward (AF) relays is investigated. The relays are considered to be untrusted, i.e., while they are mandatory helpers for data transmission, they may overhear the received signals. We adopt the artificial noise injection scheme, to keep the source message secret from... 

    A novel metaverse-as-a-service architecture from an operator view

    , Article Proceedings - 2023 IEEE International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023 ; 2023 , Pages 209-216 ; 979-835033333-6 (ISBN) Ahsani, V ; Rahimi, A ; Letafati, M ; Khalaj, B. H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2023
    Abstract
    In this research paper, the authors present a comprehensive overview of three key elements of Metaverse-as-a-service (MaaS) platforms: privacy and security, edge computing, and blockchain technology. The study begins by examining security concerns for wireless access to the Metaverse. It then delves into privacy and security issues within the Metaverse from data-centric, learning-centric, and human-centric perspectives. The authors propose novel and less-explored methods to aid mobile network operators and Metaverse service providers in creating secure and private MaaS platforms across various layers of the Metaverse, from access to social interactions. The article also explores the... 

    Jamming-resilient frequency hopping-aided secure communication for internet-of-things in the presence of an untrusted relay

    , Article IEEE Transactions on Wireless Communications ; Volume 19, Issue 10 , July , 2020 , Pages 6771-6785 Letafati, M ; Kuhestani, A ; Behroozi, H ; Ng, D. W. K ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    In this paper, we propose a light-weight jamming-resistant scheme for the Internet-of-Things (IoT) in 5G networks to ensure high-quality communication in a two-hop cooperative network. In the considered system model, a source communicates with a destination in the presence of an untrusted relay and a powerful multi-Antenna adversary jammer. The untrusted relay is an authorized necessary helper who may wiretap the confidential information. Meanwhile, the jammer is an external attacker who tries to damage both the training and transmission phases. Different from traditional frequency hopping spread spectrum (FHSS) techniques that require a pre-determined pattern between communicating nodes, in... 

    A new frequency hopping-aided secure communication in the presence of an adversary jammer and an untrusted relay

    , Article 2020 IEEE International Conference on Communications Workshops, ICC Workshops 2020, 7 June 2020 through 11 June 2020 ; July , 2020 Letafati, M ; Kuhestani, A ; Ng, D. W. K ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    The Internet-of-Things (IoT) spans various applications in healthcare filed, from smart wearable or implantable sensors to remote monitoring of elderly, and medical device networking. In this paper, a jamming-resistant scheme for the healthcare IoT is proposed to provide secure and reliable data transmission in a two-hop cooperative network, where a source communicates with a destination in the presence of an untrusted relay and an active adversary. The untrusted relay is an authorized necessary helper who may wiretap the confidential information, e.g., the secret measured data of a patient, while the jammer is an external attacker who tries to interrupt the communication. Different from... 

    Physical Layer Secure Image Transmission Based on Machine Learning Methods

    , M.Sc. Thesis Sharif University of Technology Letafati, Mehdi (Author) ; Behroozi, Hamid (Supervisor) ; Hossein Khalaj, Babak (Co-Supervisor)
    Abstract
    The rapid development of wireless communications, e.g., the sixth generation (6G) networks, together with the emergence of various technologies for exchanging data has made the information security a big concern. In other words, today’s decentralized wireless networks face with major challenges in terms of key distribution and management of traditional cryptographic techniques. In contrast, the approach of PHY layer security, which wisely utilizes the inherent characteristics of wireless links, has been introduced to address provable and lightweight security mechanisms. In addition, learning-based techniques have shown to be able to provide well-established mechanisms in enhancing the... 

    Outage-Constrained robust and secure design for downlink rate-splitting UAV networks

    , Article 2021 IEEE International Conference on Communications Workshops, ICC Workshops 2021, 14 June 2021 through 23 June 2021 ; 2021 ; 9781728194417 (ISBN) Bastami, H ; Moradikia, M ; Letafati, M ; Abdelhadi, A ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Unmanned aerial vehicles (UAVs) are developing rapidly owing to flexible deployment and access services as the air base stations. In this paper, by taking the realistic assumption of imperfect channel state information at transmitter (CSIT), we investigate the robust and secure design of downlink UAV network while considering the worst-case outage constraints due to communication link uncertainties. In our proposed heterogeneous network, comprised of both UAV-cells and macro-users, rate splitting technique is deployed by UAV base-station (UAV-BS) to enhance the system performance in terms of security, power saving, and robustness against imperfect CSIT. Through our proposed design, we... 

    On learning-assisted content-based secure image transmission for delay-aware systems with randomly-distributed eavesdroppers

    , Article IEEE Transactions on Communications ; 2021 ; 00906778 (ISSN) Letafati, M ; Behroozi, H ; Khalaj, B. H ; Jorswieck, E. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    In this paper, a learning-aided content-based image transmission scheme is proposed, where a multi-antenna source wishes to securely deliver an image to a legitimate destination in the presence of randomly-distributed passive eavesdroppers (Eves). We take into account the fact that not all regions of an image have the same importance from the security perspective. Hence, we employ a hybrid method to realize both the error-free data delivery of public regions—containing less-important pixels; and an artificial noise (AN)-aided transmission scheme for securing the confidential packets. To reinforce system’s security, fountain-based packet delivery is also adopted, where the source node encodes... 

    Content-Based medical image transmission against randomly-distributed passive eavesdroppers

    , Article 2021 IEEE International Conference on Communications Workshops, ICC Workshops 2021, 14 June 2021 through 23 June 2021 ; 2021 ; 9781728194417 (ISBN) Letafati, M ; Behroozi, H ; Hossein Khalaj, B ; Jorswieck, E. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    In this paper, a content-aware medical image transmission scheme is investigated over a multiple-input single-output (MISO) channel in wireless healthcare systems. The multi-antenna-aided access point, as a source node, wishes to wirelessly send medical images of a patient to a trusted destination node, while multiple randomly-located totally passive and non-colluding eavesdroppers (Eves) try to wiretap the transmission. Considering the fact that not all regions of an image have the same importancy level from the security view-point, we first segment the image into two parts: the region of interest (RoI), which more likely contains important diagnostic information regarding the medical image... 

    A lightweight secure and resilient transmission scheme for the internet of things in the presence of a hostile jammer

    , Article IEEE Internet of Things Journal ; Volume 8, Issue 6 , 2021 , Pages 4373-4388 ; 23274662 (ISSN) Letafati, M ; Kuhestani, A ; Wong, K. K ; Piran, M. J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    In this article, we propose a lightweight security scheme for ensuring both information confidentiality and transmission resiliency in the Internet-of-Things (IoT) communication. A single-Antenna transmitter communicates with a half-duplex single-Antenna receiver in the presence of a sophisticated multiple-Antenna-Aided passive eavesdropper and a multiple-Antenna-Assisted hostile jammer (HJ). A low-complexity artificial noise (AN) injection scheme is proposed for drowning out the eavesdropper. Furthermore, for enhancing the resilience against HJ attacks, the legitimate nodes exploit their own local observations of the wireless channel as the source of randomness to agree on shared secret... 

    On learning-assisted content-based secure image transmission for delay-aware systems with randomly-distributed eavesdroppers

    , Article IEEE Transactions on Communications ; Volume 70, Issue 2 , 2022 , Pages 1125-1139 ; 00906778 (ISSN) Letafati, M ; Behroozi, H ; Khalaj, B. H ; Jorswieck, E. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    In this paper, a learning-aided content-based image transmission scheme is proposed, where a multi-antenna source wishes to securely deliver an image to a legitimate destination in the presence of randomly-distributed passive eavesdroppers (Eves). We take into account the fact that not all regions of an image have the same importance from the security perspective. Hence, we employ a hybrid method to realize both the error-free data delivery of public regions - containing less-important pixels; and an artificial noise (AN)-aided transmission scheme for securing the confidential packets. To reinforce system's security, fountain-based packet delivery is also adopted, where the source node... 

    Hardware-Impaired PHY Secret Key Generation With Man-in-the-Middle Adversaries

    , Article IEEE Wireless Communications Letters ; Volume 11, Issue 4 , 2022 , Pages 856-860 ; 21622337 (ISSN) Letafati, M ; Behroozi, H ; Khalaj, B. H ; Jorswieck, E. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    In this letter, we examine the PHY layer secret key generation (PHY-SKG) scheme in the presence of man-in-the-middle (MiM) adversary, while legitimate parties suffer from hardware impairments (HIs). Different from previous works on PHY-SKG that consider adversaries who simply try to make an interference in the communication link, the MiM aims to deceive legitimate entities about the source of common randomness. To conquer the MiM attack, legitimate parties utilize randomized pilots (RPs) in our proposed scheme. We analyze the effect of HIs on the performance of system by deriving the achievable secret key rate (SKR). Our results highlight a fundamental limit, as a ceiling phenomena, on the... 

    Learning-based secret key generation in relay channels under adversarial attacks

    , Article IEEE Open Journal of Vehicular Technology ; Volume 4 , 2023 , Pages 749-764 ; 26441330 (ISSN) Letafati, M ; Behroozi, H ; Khalaj, B. H ; Jorswieck, E. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2023
    Abstract
    Wireless secret key generation (WSKG) facilitates efficient key agreement protocols for securing the sixth generation (6G) wireless networks thanks to its inherently lightweight functionality. Nevertheless, with the existence of adversarial attacks or internal impairments, WSKG can be negatively affected during the randomness distillation, where the legitimate parties measure a source of common randomness. In this article, we propose a learning-aided approach for cooperative WSKG under man-in-the-middle (MitM) adversarial attack, while the legitimate nodes suffer from hardware impairments (HIs). The key idea is to process the PHY-attribute data on the application layer via deploying a deep... 

    , M.Sc. Thesis Sharif University of Technology Mardiha, Milad (Author) ; Vakilian, Mehdi (Supervisor) ; Fardmanesh, Mehdi (Supervisor)

    Design and Fabrication of Inductive High Temperature Superconducting Fault Current Limiter

    , Ph.D. Dissertation Sharif University of Technology Hekmati, Arsalan (Author) ; Vakilian, Mehdi (Supervisor) ; Fardmanesh, Mehdi (Supervisor)
    Abstract
    The continuous rise in electricity demand and the ever growing power generation in different power networks over the world have caused the short circuit level in the power systems to exceed the operational rating of the installed power devices (including cables, circuit breakers and buses). Replacing these devices with new higher rating devices is an expensive solution. From this point of view, utilizing fault current limiters is an economical solution. Superconducting fault current limiters form an efficient category of current limiters. This type is expected to be studied and used widely in future due to their advantages. In this thesis, the first chapter reviews the superconductivity... 

    Enhancement of THz Radiation from Josephson Junctions in Superconductors Using Electromagnetic Resonators

    , M.Sc. Thesis Sharif University of Technology Iranmehr, Masoud (Author) ; Ahmadi Boroujeni, Mehdi (Supervisor) ; Fardmanesh, Mehdi (Supervisor)
    Abstract
    Terahertz waves which includes frequencies between 100 GHz to 10 THz of electromagnetic spectrum have found many applications in science, medical treatments and industry. One of the recent methods to produce these waves is using nonlinear properties of superconductors based on Josephson junctions which inherently appear in some superconductors called BSCCO. Stack of intrinsic junctions of these superconducting materials can radiate terahertz waves by only applying a DC voltage across them. This Thesis investigates some of these structures based on Josephson junctions to produce coherent radiation of terahertz waves. For the optimization of the radiation power, this study also investigates... 

    On the Spectrum of Modified Theories of Gravity

    , M.Sc. Thesis Sharif University of Technology Seraj, Ali (Author) ; Golshani, Mehdi (Supervisor) ; Sheikh Jabbari, Mohammad Mehdi (Supervisor)
    Abstract
    There are different approaches in modifications of General Relativity as the theory of gravity. The modified theories of gravity are important cases in this context, which mostly start by modifying the Einstein-Hilbert action, while keeping the general covariance. Within the modified theories of gravity, we consider two cases. The first is the f(R) theories of gravity, and the second is curvature squared theories of gravity with an action like S = ∫d4x pg( 116GR + (R)2 + R2 +(R)2). Curvature squared theories of gravity have interesting feautures, most important of which is renormalizability, in contrast with General Relativity. But this advantage, as noted by K.S. Stelle in 1977 comes at... 

    Critique and Survey of Various Formulation of Multiverse Theory

    , Ph.D. Dissertation Sharif University of Technology Masoumi, Saeed (Author) ; Golshani, Mehdi (Supervisor) ; Sheikh Jabbari, Mohammad Mehdi (Supervisor)
    Abstract
    Multiverse scenario has been recently addressed by physicists and they have found it useful in many areas of physics. In this dissertation, I have treated some issues about multiverse such as the kinds of multiverses, the arguments for or against multiverse, areas in which multiverse is introduced, etc. This dissertation has six chapters and an appendix. In the chapter one, some classifications of multiverse is introduced, and also some definitions of the concept of a world is presented. Then, my classification and definition of a multiverse and a world is introduced. In the chapter two, the concept of possible worlds in philosophy and its relationship with multiverse hypothesis is examined.... 

    On Thermodynamics and Phase Space of Near Horizon Extremal Geometries

    , Ph.D. Dissertation Sharif University of Technology Hajian, Kamal (Author) ; Sheikh-Jabbari, Mohammad Mehdi (Supervisor) ; Golshani, Mehdi (Co-Advisor)
    Abstract
    Near Horizon Extremal Geometries (NHEG), are geometries which may appear in the near horizon region of the extremal black holes. These geometries have SL(2;R)U(1)n isometry, and constitute a family of solutions to the theory under consideration. In the first part of this report,their thermodynamic properties are reviewed, and their three universal laws are derived. In addition, at the end of the first part, the role of these laws in black hole thermodynamics is presented. In the second part of this thesis, we review building their classical phase space in the Einstein-Hilbert theory. The elements in the NHEG phase space manifold are built by appropriately chosen coordinate transformations of... 

    Optimal Multicriteria Design of HTS Transformer and Construction of a Laboratory Scale Sample

    , Ph.D. Dissertation Sharif University of Technology Moradnouri, Ahmad (Author) ; Vakilian, Mehdi (Supervisor) ; Fardmanesh, Mehdi (Co-Supervisor) ; Hekmati, Arsalan (Co-Supervisor)
    Abstract
    Employing high-temperature superconducting (HTS) tapes, instead of copper or aluminum wires for winding in a superconducting transformer, results in a series of significant advantages; such as: smaller volume, lighter weight, higher efficieny, greatly extended overload capability, better voltage regulation, lower life cycle cost, fault current limiting capability, lower environmental pollution and lower risk potential against fire hazards.In this thesis, optimal design of flux diverter using genetic algorithm for axial short circuit force reduction in HTS transformers has been performed. Then, multilayered flux diverters have been proposed for reduction of weight and losses. The impact of...