Loading...
Search for: mirzasoleiman--baharan
0.022 seconds

    Failure Tolerance of Epidemic Spreading in Complex Network

    , M.Sc. Thesis Sharif University of Technology Mirzasoleiman, Baharan (Author) ; Jalili, Mahdi (Supervisor)
    Abstract
    Complex networks serve as generic models for many social, technological and biological systems that have been shown to share a number of common structural properties such as power-law degree distribution and small-worldness. These networks determine interactions and influence the spread of diseases, behaviours and ideas. Epidemics and failures like new behaviours ideas and innovations can spread throughout a network and prevent it from doing its functionalities. In this work, we investigate error and attack tolerance of epidemic spreading in complex networks. The main content of this thesis is arranged in three sections as follows: Firstly, the effect of random and systematic failures is... 

    Failure tolerance of motif structure in biological networks

    , Article PLoS ONE ; Volume 6, Issue 5 , May , 2011 ; 19326203 (ISSN) Mirzasoleiman, B ; Jalili, M ; Sharif University of Technology
    2011
    Abstract
    Complex networks serve as generic models for many biological systems that have been shown to share a number of common structural properties such as power-law degree distribution and small-worldness. Real-world networks are composed of building blocks called motifs that are indeed specific subgraphs of (usually) small number of nodes. Network motifs are important in the functionality of complex networks, and the role of some motifs such as feed-forward loop in many biological networks has been heavily studied. On the other hand, many biological networks have shown some degrees of robustness in terms of their efficiency and connectedness against failures in their components. In this paper we... 

    Immunizing complex networks with limited budget

    , Article EPL ; Volume 98, Issue 3 , 2012 ; 02955075 (ISSN) Mirzasoleiman, B ; Babaei, M ; Jalili, M ; Sharif University of Technology
    2012
    Abstract
    In this letter we studied the epidemic spreading on scale-free networks assuming a limited budget for immunization. We proposed a general model in which the immunity of an individual against the disease depends on its immunized friends in the network. Furthermore, we considered the possibility that each individual might be eager to pay a price to buy the vaccine and become immune against the disease. Under these assumptions we proposed an algorithm for improving the performance of all previous immunization algorithms. We also introduced a heuristic extension of the algorithm, which works well in scale-free networks  

    Cascaded failures in weighted networks

    , Article Physical Review E - Statistical, Nonlinear, and Soft Matter Physics ; Volume 84, Issue 4 , 2011 ; 15393755 (ISSN) Mirzasoleiman, B ; Babaei, M ; Jalili, M ; Safari, M ; Sharif University of Technology
    2011
    Abstract
    Many technological networks can experience random and/or systematic failures in their components. More destructive situations can happen if the components have limited capacity, where the failure in one of them might lead to a cascade of failures in other components, and consequently break down the structure of the network. In this paper, the tolerance of cascaded failures was investigated in weighted networks. Three weighting strategies were considered including the betweenness centrality of the edges, the product of the degrees of the end nodes, and the product of their betweenness centralities. Then, the effect of the cascaded attack was investigated by considering the local weighted flow... 

    Reuse-attack mitigation in wireless sensor networks

    , Article IEEE International Conference on Communications, 5 June 2011 through 9 June 2011 ; June , 2011 , Page(s): 1 - 5 ; 05361486 (ISSN) ; 9781612842332 (ISBN) Shafiei, H ; Khonsari, A ; Mirzasoleiman, B ; Ould Khaoua, M ; Sharif University of Technology
    2011
    Abstract
    Privacy preservation in wireless sensor networks has drawn considerable attention from research community during last few years. Emergence of single-owner, multi-user commercial sensor networks along with hostile and uncontrollable environment of such networks, makes the security issue in such networks of a great importance. This paper concentrates on token-based privacy preservation schemes. A possible attack on such schemes has been introduced. Two different approaches has been utilized to mitigate the attack. We present mathematical models for it's effects and overheads. The results have been verified using extensive simulations