Loading...
Search for:
mojahedian--mohammad-mahdi
0.141 seconds
Total 5637 records
Secure Index Coding
, Ph.D. Dissertation Sharif University of Technology ; Aref, Mohammad Reza (Supervisor)
Abstract
Reliable and secure communication requires low error probability and low information leakage, respectively. But there are different metrics for error probability and information leakage. Two important reliability metrics are ϵ or zero probability of error. An ϵ-error criterion requires the (average or maximal) error probability to vanish as the blocklength increases, while a zero-error criterion, demands the error to be exactly zero for every given bloklength. Three important security metrics are weak, strong, or perfect secrecy. A weak notion of secrecy requires the percentage of the message that is leaked to vanish as the code blocklength increases, while a strong notion of secrecy...
Compressed Sensing and Matrix Completion and their Applications in Communications
, M.Sc. Thesis Sharif University of Technology ; Babaiezadeh, Massoud (Supervisor) ; Ashtiani, Farid (Supervisor)
Abstract
Matrix completion is an emerging field that is proposed after new and attractive field of compressed sensing. Matrix completion is concerned with the problem of recovering an unknown matrix from a small fraction of its entries. In general, accurate recovery of a matrix from a small number of entries is impossible, but the knowledge that the unknown matrix has low rank radically changes this premise, making the search for solutions meaningful. Matrix completion problem comes up in great number of applications,including collaborative filtering, machine learning, control, image processing, sensor networks, system identification and communications (spectrum sensing and network coding). In this...
Waveform Design for Joint Radar-Communication Systems
, Ph.D. Dissertation Sharif University of Technology ; Nayebi, Mohammad Mahdi (Supervisor) ; Naghsh, Mohammad Mahdi (Co-Supervisor) ; Karbasi, Mohammad (Co-Supervisor)
Abstract
The integration of radar and communication functionalities into a unified Joint Radar-Communication (JRC) system offers enhanced spectral efficiency and reduced hardware complexity. Recognized as a key enabler for next-generation wireless networks, JRC systems require a careful balance between radar and communication demands, where waveform design plays a pivotal role in achieving this equilibrium. Although waveform design has been extensively studied separately in radar and communication domains, the requirements of modern networks necessitate a unified approach that simultaneously addresses the needs of both systems. This thesis advances waveform design methodologies for JRC systems,...
Radar Target Parameter Estimation Using Frequency and Space Diversity
, Ph.D. Dissertation Sharif University of Technology ; Nayebi, Mohammad Mahdi (Supervisor)
Abstract
In this dissertation, the application of frequency and space diversities in radar target parameter estimation are investigated. On this basis, multi-frequency signal is used to improve the range resolution, array structure is used to increase the angle estimation accuracy and the merger of the multi-frequency signal and array structure are used to increase the maximum number of targets that can be uniquely identified.Considering the desirable properties of multi-frequency signals such as high bandwidth efficiency, high range resolution achievement without chip length decrease and …, there has been increased interest in the vast area of research on the design of such signals that has...
Using the Echo of Rotating Parts to Recognize a Radar Target
, M.Sc. Thesis Sharif University of Technology ; Nayebi, Mohammad Mahdi (Supervisor)
Abstract
Target recognition techniques based on micro Doppler phenomenon are popular because they are applicable even on low resolution radars, in contrast to other techniques such as High Resolution Range Profile (HRRP) which need high resolution in range or angle. Usually, main purpose of such techniques is generating robust features against target initial state, velocity, aspect angle, etc. rather than features which exactly identify a target. Main approaches in the literature are based on time-frequency transforms (TFT) such as spectrogram in order to generate features to classify targets, but in this thesis, we propose a totally different method using Recurrence Plot for generating features...
Numerical Analysis of Mechanized Tunneling Effects in Different Conditions on Internal Forces and Settlement of Superstructures
, M.Sc. Thesis Sharif University of Technology ; Ahmadi, Mohammad Mahdi (Supervisor)
Abstract
In this research with Finite Element Methods in ABAQUS, numerical modeling has done in three-dimensions, which can be used to determine the effect of different factors on the surface settlement. Also, various factors such as geotechnical conditions, tunnel diameter,tunnel depth, the impact of the thickness of the segments and the amount of eccentricity of the structure relative to the longitudinal axis of the tunnel considered in this study. Face Pressure Supports, and Grout Injection Pressures are taken into account, too.Tunnel drilling causes a change in the displacement area and creates a changing zone around the tunnel. In this regard, not only adjacent buildings will be affected by...
Design and Implementation of Proton Precession Magnetometer
, M.Sc. Thesis Sharif University of Technology ; Fardmanesh, Mahdi (Supervisor)
Abstract
Proton precession magnetometers are one of the most sensitive scalar magnetic sensors. Their function is based on Zeeman effect and also nuclear magnetic resonance phenomena. In this project we have designed and implemented needed coils, swithching and signal detection circuits. Because of extremely high sensitivity of this sensor to induced noises and also gradient of earth’s magnetic fileld, detection of precession signal needs design of low noise electronic circuits with special EMC considerations. The implemented system in this project contains different blocks, such as switching circuit and its related control unit, amplifier, filter and frequency meter. Using this system, the obtained...
Positivity Bounds on Effective Field Theories: Galileon Theories as a Case Study
, M.Sc. Thesis Sharif University of Technology ; Torabian, Mahdi (Supervisor)
Abstract
Effective field theory is a practical method for model building and explaining experimental/observational data. These theories are constructed based on knowing low energy degrees of freedom and symmetries (accidental or fundamental). By construction, these theories are applicable up to a cut-off scale and their predictions beyond that are not reliable. For applications to higher energies a UV completion is needed through which modifications are applied or new heavy degrees of freedom are introduced. In order to complete a theory in a Wilsonian approach, scattering amplitudes must satisfy some constraints. These constraints are derived from basic assumptions like Lorentz invariance,...
Numerical Study of Pile Behavior under Seismic Loading
, M.Sc. Thesis Sharif University of Technology ; Ahmadi, Mohammad Mahdi (Supervisor)
Abstract
Numerous structures which are involved in seismic soil-pile-structure interaction have been destroyed. Considering complexities which exist in soil-pile interaction problems and lack of precise methods without imperfect bases, it is necessary to use numerical methods for analyzing soil-pile interaction problems. In this research, three-dimensional modeling and studying the effect of changing soil and pile parameters on the behavior of pile under earthquake loading is performed using finite difference software, FLAC3D. The soil in this model has a softening behavior. Real earthquake spectrum has been applied into the model as the acceleration time history at the bedrock level. The results of...
Perfectly secure index coding
, Article IEEE International Symposium on Information Theory - Proceedings, 14 June 2015 through 19 June 2015 ; Volume 2015-June , 2015 , Pages 1432-1436 ; 21578095 (ISSN) ; 9781467377041 (ISBN) ; Gohari, A ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2015
Abstract
In this paper, we investigate the index coding problem in the presence of an eavesdropper. Messages are to be sent from one transmitter to a number of legitimate receivers who have side information about the messages, and share a set of secret keys with the transmitter. We assume perfect secrecy, meaning that the eavesdropper should not be able to retrieve any information about the message set. This problem is a generalization of the Shannon's cipher system. We study the minimum key lengths for zero-error and perfectly secure index coding problems
On the equivalency of reliability and security metrics for wireline networks
, Article IEEE International Symposium on Information Theory - Proceedings, 25 June 2017 through 30 June 2017 ; 2017 , Pages 2713-2717 ; 21578095 (ISSN) ; 9781509040964 (ISBN) ; Gohari, A ; Aref, M. R ; Sharif University of Technology
2017
Abstract
'To be considered for the 2017 IEEE Jack Keil Wolf ISIT Student Paper Award' In this paper, we show the equivalency of weak and strong secrecy conditions for a large class of secure network coding problems. When we restrict to linear operations, we show the equivalency of 'perfect secrecy with zero-error constraint' and 'weak secrecy with-error constraint'. © 2017 IEEE
On the equivalency of reliability and security metrics for wireline networks
, Article Scientia Iranica ; Volume 26, Issue 3 D , 2019 , Pages 1749-1761 ; 10263098 (ISSN) ; Aref, M. R ; Gohari, A ; Sharif University of Technology
Sharif University of Technology
2019
Abstract
This study considers a secure network coding problem in which some secret keys are shared among legitimate nodes, and there exists an eavesdropper that is able to hear a subset of links. We show the equivalency of secure network coding under weak and strong secrecy conditions. For linear network coding, we show a stronger result: equivalency of "perfect secrecy and zero-error constraints" to "weak secrecy and ϵ-error constraints". This is a secure version of the result obtained by Langberg and Effiros on the equivalence of zero-error and ϵ-error regions in the network coding problem with co-located sources. Jalali and Ho exploited extractor functions to prove the weak and strong rate region...
Identifying and Ranking Factors Affecting High Rise Concrete Construction Productivity (Study Current Situation and Strategies to Improve productivity)
,
M.Sc. Thesis
Sharif University of Technology
;
Mortaheb, Mohammad Mahdi
(Supervisor)
Abstract
The current global economy challenges and the importance of maintaining a sustainable development strategy has increasingly bolded the importance of construction productivity measures. This research describes the results of a running research that is to find the most critical factors affecting the productivity of high rise concrete building projects in developing countries. To achieve that, we have conducted Delphi method in two phases. In the first phase we had a brainstorming program with construction experts from owner organizations, construction contractors and designing engineers to identify factors that have influenced productivity in recent concrete building construction projects.50...
Multi-period Value-at-Risk Forecasting
, M.Sc. Thesis Sharif University of Technology ; Barakchian, Mahdi (Supervisor)
Abstract
Multi-period Value-at-Risk (VaR) forecasting is important for risk management. Financial institutions especially commercial banks according to Basel Committee regulations for capital adequacy in “Internal Approach”, should forecast their VaR for multi-period horizons (longer than one day). The most conventional approach for forecasting multi-period VaR is scaling one-day forecasted VaR that is called “square root of time rule”; therefore most works in this area have been focused on forecasting one-day VaR. In this study, we review performance of a wide range of different methods in forecasting multi-period VaR. The results of our study show that historical simulation performs weakly in...
Beamforming Through Array Thinning
, M.Sc. Thesis Sharif University of Technology ; Nayebi, Mohammad Mahdi (Supervisor)
Abstract
Modern communication and space systems such as satellite communication devices, radars, SAR and radio astronomy interferometers are realized with large antenna arrays since this kind of radiating systems are able to generate radiation patterns with high directivity and resolution. In such a framework, conventional arrays with uniform inter-element spacing could be not satisfactory in terms of costs and dimensions. An interesting alternative is to reduce the array elements obtaining the so called ‘ thinned arrays’. Large thinned arrays have been exploited because of their advantages in terms of weight,consumption, hardware complexity, and cost over the...
Effects of Soil-Pile-Structure Interaction on the Seismic Response of a Bridges
, M.Sc. Thesis Sharif University of Technology ; Ahmadi, Mohammad Mahdi (Supervisor)
Abstract
A large number of structures subjected to the seismic loading have been damaged or have experienced failure in different parts such as the pile structure or even in the entire structure due to unanticipated effects of the soil-pile-structure interaction.The complexity of problems regarding the soil-pile-structure interaction is an influencing factor in prediction of the behavior of structure during the earthquakes. In this study, the effect of the interaction on the dynamic response of bridges was investigated using the finite element software ABAQUS. The primary purpose of this study, as previously described, is to study the effects of the soil-structure interaction on a bridge located on a...
Fully Homomorphic Encryption Implementation
, M.Sc. Thesis Sharif University of Technology ; Shabany, Mahdi (Supervisor)
Abstract
After being introduced in 2009, the first fully homomorphic encryption (FHE) scheme has created significant excitement in academia and industry. Despite rapid advances in the last 6 years, FHE schemes are still not ready for deployment due to an efficiency bottleneck. Here we introduce a hardware/software codesign, in fact a hardware accelerator optimized for a class of reconfigurable logic to bring homomorphic encryption schemes one step closer to deployment in real-life applications. The accelerator we present is connected via a fast PCIe interface to a CPU platform to provide homomorphic evaluation services to any application that needs to support blinde computations. Specifically we...
Application of Adaptive Neural Network Systems in Controller Design of Nonlinear Processes
, M.Sc. Thesis Sharif University of Technology ; Shahrokhi, Mohammad (Supervisor)
Abstract
In this project design of adaptive neural network controller for uncertain nonlinear systems in the presence of different restrictions has been investigated. After providing introduction and motivation, two general forms of nonlinear systems including strict- feedback and pure- feedback have been introduced. In order to solve the problem caused by each restriction, a solution has been proposed. For the strict- feedback nonlinear systems several restrictions are considered such as, unknown dynamic model, unmeasured state, input saturation, unknown control directions, time delays in states and input. Stability analysis based on the Lyapunov theorem has been established. In addition, two kinds...
A Numerical Study of Train-induced Vibration and the Screening Effectiveness of Shredded-tire-Infilled Trenches
, M.Sc. Thesis Sharif University of Technology ; Ahmadi, Mohammad Mahdi (Supervisor)
Abstract
Train-induced vibrations can disturb the residential areas close to the rail as well as making ground-borne noises that can create problems for sensitive apparatus and devices. To reduce these problems, there need to be an evaluation of the amplitude of the ground-borne vibrations. The goal in this study is creating a suitable finite difference model in order to predict the intensity of train induced vibrations propagating inside or on the surface of the soil using FLAC (Fast Lagrangian Analysis of Continua) software as well as assessing the effectiveness of recycled shredded tires in reducing the surface vibrations by using these material as the filler for vibration isolation trenches. The...
Numerical Modeling of the Bearing Capacity of Suction Caisson by Finite Element Method
, M.Sc. Thesis Sharif University of Technology ; Ahmadi, Mohammad Mahdi (Supervisor)
Abstract
Suction caisson is a relatively new technology which was introduced about 30 years ago for the first time and after several investigations, was found its position in the oil industry and construction of anchorages, during previous decade. So nowadays, it is the most effective and economical choice as the mooring of offshore structures in comparison with the other foundations. Suction caisson is a hollow cylinder with an open bottom and a closed top. After placement on the seafloor, the caisson first penetrates into the soil by its self weight and then inserts into the ground by pumping water out of it. Although many researchers have attempted to understand the behavior of suction caissons...