Loading...
Search for:
mohammadzadeh-lajevardi--amir
1.908 seconds
Total 1147 records
Ontology-based Advanced Persistent Attacks Detection
, Ph.D. Dissertation Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
Advanced Persistent Threats (APTs), use hybrid, slow, and low-level patterns to leak and exfiltrate information, manipulate data, or prevent progression of a program or mission. Since current intrusion detection systems (IDSs) and alert correlation systems do not correlate low-level operating system events with network events and use alert correlation instead of event correlation, the intruders use low and hybrid events in order to make detection difficult for such detection systems. In addition, these attacks use low and slow patterns to bypass intrusion detection and alert correlation systems. Since most of the attack detection approaches use a short time-window, the slow APTs abuse this...
Synthesis and Study of the Interaction of Aza-Crwon Macrocyclic Ligands with Carboxylate Side Arms with Cd Salts
, M.Sc. Thesis Sharif University of Technology ; Ghanbari, Bahram (Supervisor)
Abstract
In the present study, the coordination chemistry of an amino acid azacrown macrocycle ligand bearing one carboxylic acid arm (MA1) was investigated by employing NMR spectroscopy, crystallography and computational chemistry. MA1 was synthetized by the reaction of chloroacetic acid with the parent azacrown macrocycle and its purity was confirmed with 13C and 1H NMR for the first time. A new MA1 homologue, MA3 was also successfully prepared and characterized with NMR, mass spectrometry, and elemental analysis. NMR studies showed that MA1 binds to cadmium via the carboxylate arm in solution. Crystallographic studies showed that MA1 formed a one-dimensional polymer with cadmium, wherein the...
Investigation and Management of the Risk of Musculoskeletal Injury in Workers of Irankhodro Assembly Line by Using Qualitative and Quantitative Tools in Occupational Biomechanics
, M.Sc. Thesis Sharif University of Technology ; Arjmand, Navid (Supervisor)
Abstract
According to epidemiological studies, low back pain is the most prevalent musculoskeletal disease thus indicating the important role of biomechanical engineers to manage risk of injury. Different quantitative (i.e., biomechanical models) and qualitative (empirical) assessment tools are used to evaluate risk of musculoskeletal injuries. The present study uses various quantitative and qualitative risk assessment tools to investigate the risk of injury among workers in Iran Khodro Automaker company (IKCO) assembly hall No. 3 (Pars Peugeot car assembly). Moreover, different engineering and administrative interventions are suggested to manage risk of musculoskeletal injuries when needed. The...
A semantic-based correlation approach for detecting hybrid and low-level APTs
, Article Future Generation Computer Systems ; Volume 96 , 2019 , Pages 64-88 ; 0167739X (ISSN) ; Amini, M ; Sharif University of Technology
Elsevier B.V
2019
Abstract
Sophisticated and targeted malwares, which today are known as Advanced Persistent Threats (APTs), use multi-step, distributed, hybrid and low-level patterns to leak and exfiltrate information, manipulate data, or prevent progression of a program or mission. Since current intrusion detection systems (IDSs) and alert correlation systems do not correlate low-level operating system events with network events and use alert correlation instead of event correlation, the intruders use low and hybrid events in order to distribute the attack vector, hide malwares behaviors, and therefore make detection difficult for such detection systems. In this paper, a new approach for detecting hybrid and...
Big knowledge-based semantic correlation for detecting slow and low-level advanced persistent threats
, Article Journal of Big Data ; Volume 8, Issue 1 , 2021 ; 21961115 (ISSN) ; Amini, M ; Sharif University of Technology
Springer Science and Business Media Deutschland GmbH
2021
Abstract
Targeted cyber attacks, which today are known as Advanced Persistent Threats (APTs), use low and slow patterns to bypass intrusion detection and alert correlation systems. Since most of the attack detection approaches use a short time-window, the slow APTs abuse this weakness to escape from the detection systems. In these situations, the intruders increase the time of attacks and move as slowly as possible by some tricks such as using sleeper and wake up functions and make detection difficult for such detection systems. In addition, low APTs use trusted subjects or agents to conceal any footprint and abnormalities in the victim system by some tricks such as code injection and stealing...
Diverse Video Captioning Using Recurrent Neural Networks and Part of Speech
, M.Sc. Thesis Sharif University of Technology ; Mohammadzadeh, Narges Al Hoda (Supervisor) ; Behroozi, Hamid (Co-Supervisor)
Abstract
In recent years, the simultaneous analysis of image and text by artificial intelligence has gained much attention. Video description is one of the topics used to help the blind, automate video content analysis, and more. This issue is usually examined in the context of supervised learning and is very similar to image description and machine translation.The proposed solutions to this problem are mainly in the framework of encoder-decoder and attention-based neural networks. Selection of various pre-trained networks to extract 2D and 3D visual features (description of objects and actions in the image), various hierarchical structures and different teaching methods (based on reinforcement...
New Approuches to Logical Paradoxes
, M.Sc. Thesis Sharif University of Technology ; Ardeshir, Mohammad (Supervisor) ; Lajevardi, Kaave (Supervisor)
Abstract
This dissertation consists of five parts. In the fist part we draw a scheme of Logical Paradoxes: What is a paradox, what are logical paradoxes, different versions of logical paradoxes, etc. The three next parts are respectively about: Tarski’s Hierarchy Approach, Kripke’s Fixed Point Theory and Herzberger and Gupta’s Revision Theory of Truth. In the end of each of these three parts, we consider some critics. In the last part, we introduce our new approach. This is based on a new concept called Pseudo-Contradiction. Relative to a (consistent) set S of axioms, a sentence φ is a Pseudo-contradiction if and only if both φ and ¬φ are inconsistent with S. We try to show the Liar sentence can be...
Multifaceted service identification: Process, requirement and data
, Article Computer Science and Information Systems ; Volume 13, Issue 2 , 2016 , Pages 335-358 ; 18200214 (ISSN) ; Parsa, S ; Mohammadzade Lajevardi, A ; Sharif University of Technology
ComSIS Consortium
2016
Abstract
Service Identification is one of the most important phases in serviceoriented development methodologies. Although several service identification methods tried to identify services automatically or semi-automatically, various aspects of business domain are not taken into account simultaneously. To overcome this issue, three strategies from three different aspects of business domain are combined for semi-automated identification of services in this article. At first, the tasks interconnections within the business processes are considered. Then, based on the common supporting requirements, another tasks dependency has been determined and finally, regarding the significant impact of data in...
Markhor: malware detection using fuzzy similarity of system call dependency sequences
, Article Journal of Computer Virology and Hacking Techniques ; 2021 ; 22638733 (ISSN) ; Parsa, S ; Amiri, M. J ; Sharif University of Technology
Springer-Verlag Italia s.r.l
2021
Abstract
Static malware detection approaches are time-consuming and cannot deal with code obfuscation techniques. Dynamic malware detection approaches, on the other hand, address these two challenges, however, suffer from behavioral ambiguity, such as the system calls obfuscation. In this paper, we introduce Markhor, a dynamic and behavior-based malware detection approach. Markhor uses system call data dependency and system call control dependency sequences to create a weighted list of malicious patterns. The list is then used to determine the malicious processes. Next, the similarity of a file system call sequences to a malicious pattern is extracted based on a fuzzy algorithm and the file nature is...
Markhor: malware detection using fuzzy similarity of system call dependency sequences
, Article Journal of Computer Virology and Hacking Techniques ; Volume 18, Issue 2 , 2022 , Pages 81-90 ; 22638733 (ISSN) ; Parsa, S ; Amiri, M. J ; Sharif University of Technology
Springer-Verlag Italia s.r.l
2022
Abstract
Static malware detection approaches are time-consuming and cannot deal with code obfuscation techniques. Dynamic malware detection approaches, on the other hand, address these two challenges, however, suffer from behavioral ambiguity, such as the system calls obfuscation. In this paper, we introduce Markhor, a dynamic and behavior-based malware detection approach. Markhor uses system call data dependency and system call control dependency sequences to create a weighted list of malicious patterns. The list is then used to determine the malicious processes. Next, the similarity of a file system call sequences to a malicious pattern is extracted based on a fuzzy algorithm and the file nature is...
Human Action Recognition Using Depthmap Image Sequences for Abnormal Event Detection
,
M.Sc. Thesis
Sharif University of Technology
;
Mohammadzadeh, Hoda
(Supervisor)
Abstract
The human action recognition is one of the most important concepts of computer vision in recent decades. Most of the two dimensional methods in this field are facing serious challenges such as occlusion and missing the third dimension of data. Development of depth sensors has made easy access to tracking people and 3D positions of human body joints. This Thesis proposes a new method of action recognition that utilizes the position of joints obtained by Kinect sensor. The learning stage uses Fisher Linear Discriminant Analysis (LDA) to construct discriminant feature space. Two types of distances, i.e., Euclidean and Mahalanobis, are used for recognizing the states. Also, Hidden Markov Model...
Cross-Domain EEG-Based Emotion Recognition
, M.Sc. Thesis Sharif University of Technology ; Mohammadzadeh, Hoda (Supervisor)
Abstract
The non-stationary nature of brain activity signals and their many inter-subject differences have created many challenges in the practical applications of emotion recognition based on electroencephalogram (EEG) signals, such as brain-computer interfaces. In such a way, the use of traditional classifiers in classifying these signals leads to a significant decrease in accuracy when applying the classifier to a new subject. Domain Adaptation methods seem to be an effective way to solve this problem by minimizing the difference between the EEG signals of different subjects. But in the basic techniques for domain adaptation, looking at all subjects' data in the same look causes the loss of a part...
prediction of time to failure in stress corrosion cracking of 304 stainless steel in aqueous chloride solution by artificial neural network
, Article Protection of Metals and Physical Chemistry of Surfaces ; Volume 45, Issue 5 , 2009 , Pages 610-615 ; 20702051 (ISSN) ; Shahrabi, T ; Baigi, V ; Shafiei, A. M ; Sharif University of Technology
2009
Abstract
Despite the numerous researches in Stress Corrosion Cracking (SCC) risk of austenitic stainless steels in aqueous chloride solution, no formulation or reliable method for prediction of time to failure as a result of SCC has yet been defined. In this paper, the capability of artificial neural network for estimation of the time to failure for SCC of 304 stainless steel in aqueous chloride solution together with sensitivity analysis has been expressed. The output results showed that artificial neural network can predict the time to failure for about 74% of the variance of SCC experimental data. Furthermore, the sensitivity analysis also demonstrated the effects of input parameters (Temperature,...
Adaptive model predictive climate control of multi-unit buildings using weather forecast data
, Article Journal of Building Engineering ; Volume 32 , May , 2020 , Pages: 5-6 ; Rezaeizadeh, A ; Sharif University of Technology
Elsevier Ltd
2020
Abstract
Energy use in buildings contributes a large part in global energy demand. To reduce energy use in this group of consumers, specially in cold seasons, an automatic control technique is proposed. In this paper, a model predictive controller (MPC) is employed to minimize the boiler activation time. The method uses the building model and incorporates the weather forecast data to act on the actuator in an optimal fashion while treating the user comfort constraints. This technique, as a part, can be embedded into the building energy management system. The building model parameters are obtained via an online identification process using unscented kalman filter (UKF). This identification is...
Thermal Analysis of RCC Dams During Construction and Operation
, M.Sc. Thesis Sharif University of Technology ; Ghaemian, Mohsen (Supervisor)
Abstract
The most important issues in massive concrete structures such as concrete dams are the increase in temperature due to heat generated by the dam Hydration of cement in concrete. Internal restrains are created from thermal gradient between the surface and the interior of the structure. External restrains are created from connections between structures and foundation for obstruct the movement of concrete structures due to temperature change. External restrains and internal creates tensile stresses in the concrete considerable, which can lead to thermal cracks in the structure. To prevent or minimize the possibility of cracks are examined thermal studies for the design of reinforced concrete...
Hardware Implementation of LDPC Code Applied to Flat-Fading Channels
,
M.Sc. Thesis
Sharif University of Technology
;
Shabany, Mahdi
(Supervisor)
Abstract
Coding information data is one of the ways to prevent noise effect on the information bits, during passing communication channels. Coding data gives the possibility to detect and correct the data in the receiver. The LDPC codes which were first introduced by Gallager in the 1962 are forward error correction codes and can approach the Shannon’s capacity to within hundredths of a decibel.
In this project a modified algorithm for decoding these group of codes is introduced, which can achieve acceptable bit error rate, while it can have better throughput than the same implementations. This algorithm is implemented partial-parallel for IEEE802.11n standard in ASIC. It is shown that, it has...
In this project a modified algorithm for decoding these group of codes is introduced, which can achieve acceptable bit error rate, while it can have better throughput than the same implementations. This algorithm is implemented partial-parallel for IEEE802.11n standard in ASIC. It is shown that, it has...
Fabrication of Hybrid Graphene/Metal Electrodes for Biosensor Applications
, M.Sc. Thesis Sharif University of Technology ; Simchi, Abdolreza (Supervisor)
Abstract
Electrochemical sensing of glucose has received paramount attention in recent years, particularly, the non-enzymatic glucose sensing is one of the trends in the whole biosensing world. In this research, synthesis and evaluation of a hybrid structure of vertical oriented nickel nanorod-reduced graphene oxide sheets as a non-enzymatic glucose sensor were performed. The 3D array of nickel nanorods was synthesized by electrodeposition of nickel sulfate electrolyte in track-etched polycarbonate template with 100 nm pore size and 6-10 μm thickness. The electrodeposition performed in various conditions, and the best result was achieved by application of potential of 3 V for 60 minutes. The shiny...
Auto-selection of space-time Interest Points for Action Recognition
Application in Fisherposes Method
,
M.Sc. Thesis
Sharif University of Technology
;
Mohammadzadeh, Narges Hoda
(Supervisor)
Abstract
In this project, a novel action recognition method, named Fisherposes, is proposed, which is improved by several space-time (spatio-temporal) methods afterwards. The proposed method utilizes skeleton data obtained from Kinect sensor. First, pre-processing is performed in which the scales of bodies are canceled and the skeletons become aligned in order to make the method robust to location, orientation, and scale of people. In Fisherposes method, every action is defined as a sequence of body poses. Using the training samples for the poses, a Fisher subspace is created which we name it Fisherposes. Moreover, a novel distance measuring function, named regularized Mahalanobis distance, is...
Investigation of the Geometry Effect on Electrokinetic Instability in Microflows
, M.Sc. Thesis Sharif University of Technology ; Saidi, Mohammad Hassan (Supervisor)
Abstract
Lab-on-a-chip devices have gained a lot of attention in chemical and biomedical analyses during the past two decades. These devices employ microfluidics basics and fundamentals to combine multifold laboratory processes in one single portable chip. The electric field has been often used in most microfluidics applications for the ease of sample control as well as become easily integrated to other chip components. Instabilities in microflows would occur when two fluids of different electric properties are exposed to an adequately strong electric field. Studying these electrokinetic instabilities is not only important for the fundamental studies but also for practical applications in micromixers...
Scarf Repair Design based on Axiomatic Design
, M.Sc. Thesis Sharif University of Technology ; Abedian, Ali (Supervisor)
Abstract
In this project, first of all the Axiomatic Design approach, then the Scarf Repair and papers about it so far have been explained. Then Scarf Repair design with Axiomatic Design approach has been done and at the end a damaged plate sample has been repaired with developed way. Axiomatic Design is a systematic approach to design or judge existing designs for choosing the best design. This approach, says that a good design is the one that satisfys Independence and Information axioms. Independence axiom says that the better design is the one that its functional requierments are independent from each other and Information axiom says that from designs that satisfy the Independence axiom, the...