Loading...
Search for:
mohammadzadeh-lajevardi--amir
0.171 seconds
Total 1231 records
Ontology-based Advanced Persistent Attacks Detection
, Ph.D. Dissertation Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
Advanced Persistent Threats (APTs), use hybrid, slow, and low-level patterns to leak and exfiltrate information, manipulate data, or prevent progression of a program or mission. Since current intrusion detection systems (IDSs) and alert correlation systems do not correlate low-level operating system events with network events and use alert correlation instead of event correlation, the intruders use low and hybrid events in order to make detection difficult for such detection systems. In addition, these attacks use low and slow patterns to bypass intrusion detection and alert correlation systems. Since most of the attack detection approaches use a short time-window, the slow APTs abuse this...
Synthesis and Study of the Interaction of Aza-Crwon Macrocyclic Ligands with Carboxylate Side Arms with Cd Salts
, M.Sc. Thesis Sharif University of Technology ; Ghanbari, Bahram (Supervisor)
Abstract
In the present study, the coordination chemistry of an amino acid azacrown macrocycle ligand bearing one carboxylic acid arm (MA1) was investigated by employing NMR spectroscopy, crystallography and computational chemistry. MA1 was synthetized by the reaction of chloroacetic acid with the parent azacrown macrocycle and its purity was confirmed with 13C and 1H NMR for the first time. A new MA1 homologue, MA3 was also successfully prepared and characterized with NMR, mass spectrometry, and elemental analysis. NMR studies showed that MA1 binds to cadmium via the carboxylate arm in solution. Crystallographic studies showed that MA1 formed a one-dimensional polymer with cadmium, wherein the...
Investigation and Management of the Risk of Musculoskeletal Injury in Workers of Irankhodro Assembly Line by Using Qualitative and Quantitative Tools in Occupational Biomechanics
, M.Sc. Thesis Sharif University of Technology ; Arjmand, Navid (Supervisor)
Abstract
According to epidemiological studies, low back pain is the most prevalent musculoskeletal disease thus indicating the important role of biomechanical engineers to manage risk of injury. Different quantitative (i.e., biomechanical models) and qualitative (empirical) assessment tools are used to evaluate risk of musculoskeletal injuries. The present study uses various quantitative and qualitative risk assessment tools to investigate the risk of injury among workers in Iran Khodro Automaker company (IKCO) assembly hall No. 3 (Pars Peugeot car assembly). Moreover, different engineering and administrative interventions are suggested to manage risk of musculoskeletal injuries when needed. The...
A semantic-based correlation approach for detecting hybrid and low-level APTs
, Article Future Generation Computer Systems ; Volume 96 , 2019 , Pages 64-88 ; 0167739X (ISSN) ; Amini, M ; Sharif University of Technology
Elsevier B.V
2019
Abstract
Sophisticated and targeted malwares, which today are known as Advanced Persistent Threats (APTs), use multi-step, distributed, hybrid and low-level patterns to leak and exfiltrate information, manipulate data, or prevent progression of a program or mission. Since current intrusion detection systems (IDSs) and alert correlation systems do not correlate low-level operating system events with network events and use alert correlation instead of event correlation, the intruders use low and hybrid events in order to distribute the attack vector, hide malwares behaviors, and therefore make detection difficult for such detection systems. In this paper, a new approach for detecting hybrid and...
Big knowledge-based semantic correlation for detecting slow and low-level advanced persistent threats
, Article Journal of Big Data ; Volume 8, Issue 1 , 2021 ; 21961115 (ISSN) ; Amini, M ; Sharif University of Technology
Springer Science and Business Media Deutschland GmbH
2021
Abstract
Targeted cyber attacks, which today are known as Advanced Persistent Threats (APTs), use low and slow patterns to bypass intrusion detection and alert correlation systems. Since most of the attack detection approaches use a short time-window, the slow APTs abuse this weakness to escape from the detection systems. In these situations, the intruders increase the time of attacks and move as slowly as possible by some tricks such as using sleeper and wake up functions and make detection difficult for such detection systems. In addition, low APTs use trusted subjects or agents to conceal any footprint and abnormalities in the victim system by some tricks such as code injection and stealing...
Diverse Video Captioning Using Recurrent Neural Networks and Part of Speech
, M.Sc. Thesis Sharif University of Technology ; Mohammadzadeh, Narges Al Hoda (Supervisor) ; Behroozi, Hamid (Co-Supervisor)
Abstract
In recent years, the simultaneous analysis of image and text by artificial intelligence has gained much attention. Video description is one of the topics used to help the blind, automate video content analysis, and more. This issue is usually examined in the context of supervised learning and is very similar to image description and machine translation.The proposed solutions to this problem are mainly in the framework of encoder-decoder and attention-based neural networks. Selection of various pre-trained networks to extract 2D and 3D visual features (description of objects and actions in the image), various hierarchical structures and different teaching methods (based on reinforcement...
Multifaceted service identification: Process, requirement and data
, Article Computer Science and Information Systems ; Volume 13, Issue 2 , 2016 , Pages 335-358 ; 18200214 (ISSN) ; Parsa, S ; Mohammadzade Lajevardi, A ; Sharif University of Technology
ComSIS Consortium
2016
Abstract
Service Identification is one of the most important phases in serviceoriented development methodologies. Although several service identification methods tried to identify services automatically or semi-automatically, various aspects of business domain are not taken into account simultaneously. To overcome this issue, three strategies from three different aspects of business domain are combined for semi-automated identification of services in this article. At first, the tasks interconnections within the business processes are considered. Then, based on the common supporting requirements, another tasks dependency has been determined and finally, regarding the significant impact of data in...
Markhor: malware detection using fuzzy similarity of system call dependency sequences
, Article Journal of Computer Virology and Hacking Techniques ; 2021 ; 22638733 (ISSN) ; Parsa, S ; Amiri, M. J ; Sharif University of Technology
Springer-Verlag Italia s.r.l
2021
Abstract
Static malware detection approaches are time-consuming and cannot deal with code obfuscation techniques. Dynamic malware detection approaches, on the other hand, address these two challenges, however, suffer from behavioral ambiguity, such as the system calls obfuscation. In this paper, we introduce Markhor, a dynamic and behavior-based malware detection approach. Markhor uses system call data dependency and system call control dependency sequences to create a weighted list of malicious patterns. The list is then used to determine the malicious processes. Next, the similarity of a file system call sequences to a malicious pattern is extracted based on a fuzzy algorithm and the file nature is...
Markhor: malware detection using fuzzy similarity of system call dependency sequences
, Article Journal of Computer Virology and Hacking Techniques ; Volume 18, Issue 2 , 2022 , Pages 81-90 ; 22638733 (ISSN) ; Parsa, S ; Amiri, M. J ; Sharif University of Technology
Springer-Verlag Italia s.r.l
2022
Abstract
Static malware detection approaches are time-consuming and cannot deal with code obfuscation techniques. Dynamic malware detection approaches, on the other hand, address these two challenges, however, suffer from behavioral ambiguity, such as the system calls obfuscation. In this paper, we introduce Markhor, a dynamic and behavior-based malware detection approach. Markhor uses system call data dependency and system call control dependency sequences to create a weighted list of malicious patterns. The list is then used to determine the malicious processes. Next, the similarity of a file system call sequences to a malicious pattern is extracted based on a fuzzy algorithm and the file nature is...
New Approuches to Logical Paradoxes
, M.Sc. Thesis Sharif University of Technology ; Ardeshir, Mohammad (Supervisor) ; Lajevardi, Kaave (Supervisor)
Abstract
This dissertation consists of five parts. In the fist part we draw a scheme of Logical Paradoxes: What is a paradox, what are logical paradoxes, different versions of logical paradoxes, etc. The three next parts are respectively about: Tarski’s Hierarchy Approach, Kripke’s Fixed Point Theory and Herzberger and Gupta’s Revision Theory of Truth. In the end of each of these three parts, we consider some critics. In the last part, we introduce our new approach. This is based on a new concept called Pseudo-Contradiction. Relative to a (consistent) set S of axioms, a sentence φ is a Pseudo-contradiction if and only if both φ and ¬φ are inconsistent with S. We try to show the Liar sentence can be...
Human Action Recognition Using Depthmap Image Sequences for Abnormal Event Detection
,
M.Sc. Thesis
Sharif University of Technology
;
Mohammadzadeh, Hoda
(Supervisor)
Abstract
The human action recognition is one of the most important concepts of computer vision in recent decades. Most of the two dimensional methods in this field are facing serious challenges such as occlusion and missing the third dimension of data. Development of depth sensors has made easy access to tracking people and 3D positions of human body joints. This Thesis proposes a new method of action recognition that utilizes the position of joints obtained by Kinect sensor. The learning stage uses Fisher Linear Discriminant Analysis (LDA) to construct discriminant feature space. Two types of distances, i.e., Euclidean and Mahalanobis, are used for recognizing the states. Also, Hidden Markov Model...
Cross-Domain EEG-Based Emotion Recognition
, M.Sc. Thesis Sharif University of Technology ; Mohammadzadeh, Hoda (Supervisor)
Abstract
The non-stationary nature of brain activity signals and their many inter-subject differences have created many challenges in the practical applications of emotion recognition based on electroencephalogram (EEG) signals, such as brain-computer interfaces. In such a way, the use of traditional classifiers in classifying these signals leads to a significant decrease in accuracy when applying the classifier to a new subject. Domain Adaptation methods seem to be an effective way to solve this problem by minimizing the difference between the EEG signals of different subjects. But in the basic techniques for domain adaptation, looking at all subjects' data in the same look causes the loss of a part...
prediction of time to failure in stress corrosion cracking of 304 stainless steel in aqueous chloride solution by artificial neural network
, Article Protection of Metals and Physical Chemistry of Surfaces ; Volume 45, Issue 5 , 2009 , Pages 610-615 ; 20702051 (ISSN) ; Shahrabi, T ; Baigi, V ; Shafiei, A. M ; Sharif University of Technology
2009
Abstract
Despite the numerous researches in Stress Corrosion Cracking (SCC) risk of austenitic stainless steels in aqueous chloride solution, no formulation or reliable method for prediction of time to failure as a result of SCC has yet been defined. In this paper, the capability of artificial neural network for estimation of the time to failure for SCC of 304 stainless steel in aqueous chloride solution together with sensitivity analysis has been expressed. The output results showed that artificial neural network can predict the time to failure for about 74% of the variance of SCC experimental data. Furthermore, the sensitivity analysis also demonstrated the effects of input parameters (Temperature,...
Adaptive model predictive climate control of multi-unit buildings using weather forecast data
, Article Journal of Building Engineering ; Volume 32 , May , 2020 , Pages: 5-6 ; Rezaeizadeh, A ; Sharif University of Technology
Elsevier Ltd
2020
Abstract
Energy use in buildings contributes a large part in global energy demand. To reduce energy use in this group of consumers, specially in cold seasons, an automatic control technique is proposed. In this paper, a model predictive controller (MPC) is employed to minimize the boiler activation time. The method uses the building model and incorporates the weather forecast data to act on the actuator in an optimal fashion while treating the user comfort constraints. This technique, as a part, can be embedded into the building energy management system. The building model parameters are obtained via an online identification process using unscented kalman filter (UKF). This identification is...
Data-driven buiding climate control using model prediction and online weather forecast data
, Article ; July , 2020 , Pages 1801-1806 ; Rezaei Zadeh, A ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2020
Abstract
This paper proposes a multi-unit building model, in which the parameters are obtained via an online identification process. The identification process is carried out on-the-fly so it can update the best model of the building units. A model predictive controller (MPC) is also employed that uses the prediction of the building model, as well as the weather forecast data and acts on the heating boiler in an optimal fashion. In addition, since the controller is designed for a multi-unit building, it is crucial to estimate the amount of the delay that takes the hot flow to reach the units. This paper presents a very simple method for the delay identification based on unscented kalman filter. For...
Enhancing the structural performance of masonry arch bridges with ballast mats
, Article Journal of Performance of Constructed Facilities ; Volume 31, Issue 5 , 2017 ; 08873828 (ISSN) ; Miri, A ; Nouri, M ; Sharif University of Technology
2017
Abstract
A large portion of the railway bridge stock in many countries is comprised of masonry arch bridges. During recent years, more attention has been paid to the maintenance of such structures. Rehabilitation and retrofitting methods have been proposed to enhance the performance of masonry arch bridges and extend their service life. Because a large portion of forces exerted on such structures comes from the railway track and passing trains, structural elements are added to the track to reduce the forces transmitted to bridges. One such element is the ballast mat, which, according to suppliers, has a positive impact on the structural performance of the track. This paper tries to assess the effects...
Software implementation of MPEG2 decoder on an ASIP JPEG processor
, Article 17th 2005 International Conference on Microelectronics, ICM 2005, Islamabad, 13 December 2005 through 15 December 2005 ; Volume 2005 , 2005 , Pages 310-317 ; 0780392620 (ISBN); 9780780392625 (ISBN) ; Hessabi, S ; Goudarzi, M ; Sharif University of Technology
2005
Abstract
In this paper, we present an MPEG-2 video decoder implemented in our ODYSSEY design methodology. We start with an ASIP tailored to the JPEG decompression algorithm. We extend that ASIP by required software routines such that the extended ASIP can now perform MPEG2 decoding while still benefiting from hardware units common between JPEG and MPEG2. This demonstrates the ability of our approach in extending an already manufactured ASIP, which was tailored to a given application, such that it implements new, yet related applications. The implementation platform is a VirtexII-Pro FPGA. The hardware part is implemented in VHDL, and the software runs on a PowerPC processor. Experimental results show...
Thermal Analysis of RCC Dams During Construction and Operation
, M.Sc. Thesis Sharif University of Technology ; Ghaemian, Mohsen (Supervisor)
Abstract
The most important issues in massive concrete structures such as concrete dams are the increase in temperature due to heat generated by the dam Hydration of cement in concrete. Internal restrains are created from thermal gradient between the surface and the interior of the structure. External restrains are created from connections between structures and foundation for obstruct the movement of concrete structures due to temperature change. External restrains and internal creates tensile stresses in the concrete considerable, which can lead to thermal cracks in the structure. To prevent or minimize the possibility of cracks are examined thermal studies for the design of reinforced concrete...
Hardware Implementation of LDPC Code Applied to Flat-Fading Channels
,
M.Sc. Thesis
Sharif University of Technology
;
Shabany, Mahdi
(Supervisor)
Abstract
Coding information data is one of the ways to prevent noise effect on the information bits, during passing communication channels. Coding data gives the possibility to detect and correct the data in the receiver. The LDPC codes which were first introduced by Gallager in the 1962 are forward error correction codes and can approach the Shannon’s capacity to within hundredths of a decibel.
In this project a modified algorithm for decoding these group of codes is introduced, which can achieve acceptable bit error rate, while it can have better throughput than the same implementations. This algorithm is implemented partial-parallel for IEEE802.11n standard in ASIC. It is shown that, it has...
In this project a modified algorithm for decoding these group of codes is introduced, which can achieve acceptable bit error rate, while it can have better throughput than the same implementations. This algorithm is implemented partial-parallel for IEEE802.11n standard in ASIC. It is shown that, it has...
Fabrication of Hybrid Graphene/Metal Electrodes for Biosensor Applications
, M.Sc. Thesis Sharif University of Technology ; Simchi, Abdolreza (Supervisor)
Abstract
Electrochemical sensing of glucose has received paramount attention in recent years, particularly, the non-enzymatic glucose sensing is one of the trends in the whole biosensing world. In this research, synthesis and evaluation of a hybrid structure of vertical oriented nickel nanorod-reduced graphene oxide sheets as a non-enzymatic glucose sensor were performed. The 3D array of nickel nanorods was synthesized by electrodeposition of nickel sulfate electrolyte in track-etched polycarbonate template with 100 nm pore size and 6-10 μm thickness. The electrodeposition performed in various conditions, and the best result was achieved by application of potential of 3 V for 60 minutes. The shiny...