Loading...
Search for:
nemaney-pour--alireza
0.171 seconds
Total 707 records
Simultaneous Group Membership with Members Collaboration in Wireless Networks Using Hierarchical Approach
, M.Sc. Thesis Sharif University of Technology ; Nemaney Pour, Alireza (Supervisor)
Abstract
Recently, demand for using variant applications in distributed networks has been increased largely. Most of these applications are based on group communication.In distributed group communication, two important factors need to be considered, group construction, and Group Key Management (GKM). The group construction specifies the process of constructing a new group by cooperation between distributed users. As well, GKM ensures re-freshness of the group key after each join/leave operation. Both of these tasks must be done by collaboration between members. This leads to imposing complexity and communication overhead to the system.This thesis proposes efficient methods for group construction and...
Group Communication in Secure Multicast for Wireless Networks Using One-Time Password
, M.Sc. Thesis Sharif University of Technology ; Nemaney Pour, Alireza (Supervisor)
Abstract
Recently, the number of requests for multicast services through the wireless networks has increased. However, for successful deployment of these services, security and efficiency of content delivery must be provided at first. This thesis presents a new approach for secure multicast in wireless networks. This approach, CRAW (Combination of Re-keying and Authentication in Wireless networks) combines member authentication procedure with group key management protocol together to provide efficient re-keying. One-time password is proposed for member authentication and CKC (Code for Key Calculation) is suggested for group key management in wireless networks. In fact, the combination of...
An Efficient Approach for Spam Mail Detection in the Sender Side
, M.Sc. Thesis Sharif University of Technology ; Nemaney Pour, Alireza (Supervisor)
Abstract
Spam mails are unwanted mails sent to large numbers of users. Such emails not only consume the network resources but also cause lots of security uncertainties. Based on our observation, the location where the spam filters operate in is an important parameter to save network resources. In this thesis, we introduce a new and effective approach to avoid spam emails from being transferred by relocating the filtering system in the sender mail server. Compared with previous methods in our method, the spam email is detected after spammer clicks on the send button. Here the sender mail server decides based on some pre-defined criteria. If the sender mail server determines that the email is not spam,...
Simultaneous Group Membership for Key Management in Secure IP Multicast Using Hierarchical Approach
, M.Sc. Thesis Sharif University of Technology ; Nemaney Pour, Alireza (Supervisor)
Abstract
This research presents an efficient group key management protocol, CKCSS (Code for Key Calculation in Single and Simultaneous join/leave) for secure multicast. In this research, we propose a new protocol to reduce the key management overheads for single join/leave at first and then use the development of this technique for simultaneous one. This protocol is based on logical key hierarchy. In this protocol, when new members join the group, server sends only the group key to those new members. Then, current members and the new members calculate all the necessary keys by node codes and one-way hash function. A node code is a random number assigned to each key to help users calculate the...
Group Authentication in Secure IP Multicast Using One-Time Password
, M.Sc. Thesis Sharif University of Technology ; Nemaney Pour, Alireza (Supervisor)
Abstract
Since the number of Internet users for the services such as e-applications is increasing rapidly, authentication constrains more latency as well as load to the system. It is due to large number of users whose identity needs to be checked and compared individually, and the number of simultaneous authentication requests in a specific time. To solve the stated issues, this thesis proposes a new definition of group authentication and describes group authentication protocols. Group authentication is the verification of identity of multiple requests of users at the same time. In this protocol, the authentication server inputs the multiple authentication requests in a function, and then applies...
An efficient spam mail detection by counter technique
, Article World Academy of Science, Engineering and Technology ; Volume 50 , May , 2011 , Pages 573-576 ; 2010376X (ISSN) ; Behnam Roudsari, S ; Nemaney Pour, A ; Sharif University of Technology
2011
Abstract
Spam mails are unwanted mails sent to large number of users. Spam mails not only consume the network resources, but cause security threats as well. This paper proposes an efficient technique to detect, and to prevent spam mail in the sender side rather than the receiver side. This technique is based on a counter set on the sender server. When a mail is transmitted to the server, the mail server checks the number of the recipients based on its counter policy. The counter policy performed by the mail server is based on some pre-defined criteria. When the number of recipients exceeds the counter policy, the mail server discontinues the rest of the process, and sends a failure mail to sender of...
An efficient group key management protocol using code for key calculation: CKC
, Article Telecommunication Systems ; Volume 51, Issue 2-3 , 2012 , Pages 115-123 ; 10184864 (ISSN) ; Eidkhani, E ; Mortazavi, S. A ; Nemaney Pour, A ; Sharif University of Technology
2012
Abstract
This paper presents a new group key management protocol, CKC (Code for Key Calculation) for secure IP multicast. In this protocol which is based on logical key hierarchy, only the group key needs to be sent to new member at join. Then, using the group key current members and the new member calculate the necessary keys by node codes and one-way hash function. A node code is a random number assigned to each node to help users calculate necessary keys. Again, at leave server just sends the new group key to the remaining members. By this key, members calculate necessary keys using node codes and one-way hash function. The security of the keys is based on one-wayness of hash function. The results...
A new group key management protocol using code for key calculation: CKC
, Article 2010 International Conference on Information Science and Applications, ICISA 2010, 21 April 2010 through 23 April 2010 ; April , 2010 ; 9781424459438 (ISBN) ; Eidkhani, E ; Mortazavi, S. A ; Nemaney Pour, A ; Sharif University of Technology
2010
Abstract
This paper presents a new group key management protocol, CKC (Code for Key Calculation). This protocol is based on logical key hierarchy. When a new member joins the group, server sends only the group key for that member. Then, current members and the new member calculate the necessary keys using node codes and one-way hash function. Node code is a code which is assigned to each node of the key tree. Again at leave, server just sends the new group key to remaining members. By this key, members calculate necessary keys using node codes and one-way hash function. The security of the keys is based on one-wayness of hash function. The results show that CKC reduces computational and communication...
Flexural Behavior of Concrete Beams Strengthened by Classical Method and Comparing The Results with Strengthening by FRP
, M.Sc. Thesis Sharif University of Technology ; Khaloo, Alireza (Supervisor)
Abstract
Retrofitting and strengthening existing structures is one of the most important concepts of structural and earthquake engineering. Strengthening of structures could be due to changes in application and applied load, errors in calculation, mistakes in construction, weakness of old codes, structural height increases and changes in environmental conditions. Different methods for increasing the flexural strength and ductility of reinforced concrete beams, as one of the major structural components, have been presented. This research presents an experimental study on the strengthening of reinforced concrete beams by reinforced concrete jackets (classical method) and Fiber Reinforced Polymer (FRP)...
Natural frequencies of C60, C70, and C80 fullerenes
, Article Applied Physics Letters ; Volume 96, Issue 2 , 2010 ; 00036951 (ISSN) ; Vafai, A ; Sharif University of Technology
2010
Abstract
This letter adopts an atomistic modeling approach to study free vibrational characteristics of C60, C70, and C80 fullerenes. In this regard, we use the molecular structural mechanics consisting of equivalent structural beams to calculate the nonzero natural frequencies. The simulation results indicate that the first natural frequency of the fullerene is in the order terahertz and decreases nonlinearly with respect to the number of the carbon atoms
A macroscopic traffic flow model that includes driver sensitivity to the number of free spaces ahead
, Article Transportmetrica B ; 2017 , Pages 1-17 ; 21680566 (ISSN) ; Nassiri, H ; Sharif University of Technology
2017
Abstract
This paper addresses the first-order extension of the Lighthill–Whitham– Richards (LWR) macroscopic traffic flow model. Although previous studies have focused on the fluid aspect of traffic flow, none have addressed the sensitivity of drivers to the number of free spaces within a certain distance ahead of the subject driver. To incorporate driver behavior, we used the number of free spaces ahead of subject drivers and their sensitivity to the number of free spaces within a certain distance ahead. The resulting model is a convection-diffusion model. By computing Einstein's diffusion equation and comparing it with the diffusion coefficient in the extended model, a theoretical relation for the...
A macroscopic traffic flow model that includes driver sensitivity to the number of free spaces ahead
, Article Transportmetrica B ; Volume 8, Issue 1 , 2020 , Pages 290-306 ; Nassiri, H ; Sharif University of Technology
Taylor and Francis Ltd
2020
Abstract
This paper addresses the first-order extension of the Lighthill–Whitham– Richards (LWR) macroscopic traffic flow model. Although previous studies have focused on the fluid aspect of traffic flow, none have addressed the sensitivity of drivers to the number of free spaces within a certain distance ahead of the subject driver. To incorporate driver behavior, we used the number of free spaces ahead of subject drivers and their sensitivity to the number of free spaces within a certain distance ahead. The resulting model is a convection-diffusion model. By computing Einstein's diffusion equation and comparing it with the diffusion coefficient in the extended model, a theoretical relation for the...
Ultra-broadband polarization-independent perfect absorber based on phase change material (Ge 2Sb 2Te 5 or GST) for the visible and infrared regions
, Article Optical and Quantum Electronics ; Volume 55, Issue 2 , 2023 ; 03068919 (ISSN) ; Arik, K ; Sharif University of Technology
Springer
2023
Abstract
Broadband optical absorbers are increasingly in demand in various applications, including solar cells and radiative cooling systems. Among various types of structures, absorbers based on metamaterial structures have attracted much attention. However, they generally suffer from the issues of narrow bandwidth, high-cost fabrication, and high sensitivity to polarization changes. This paper presents a broadband, polarization-independent metamaterial absorber working in both infrared and visible frequency regimes. This structure is composed of a continuous phase-change material film (Ge 2Sb 2Te 5) separated between two thin spacer layers of SiO 2, and an array of amorphous Silicon particles...
Prediction and Compensation of Intraoperative Brain Shift Using Biomechanical Modeling
, M.Sc. Thesis Sharif University of Technology ; Farahmand, Farzam (Supervisor)
Abstract
The human brain is the most sensitive and important human organ and surgery must be done with high precision and without risk. During surgery, brain tissue deform continuously due to gravity, out of the cerebrospinal fluid and the changing pressure of the cerebrospinal fluid and the surgical maneuvers. Because the surgeon has no direct view on brain internal, the ways to solve this problem is to pay attention. This method makes it possible to the surgeon see in the brain and the brain tissue deformation. This thesis method is based on biomechanical modeling. After forming finite element model from the pre-operative MRI, brain surface and volume datasets during surgery as a load, apply to the...
Finite element model of SWCNT under hydrostatic pressure
, Article AIP Conference Proceedings, 10 April 2007 through 12 April 2007, Sharjah ; Volume 929 , 2007 , Pages 82-88 ; 0094243X (ISSN) ; 0735404399 (ISBN); 9780735404397 (ISBN) ; Ahmadian, M. T ; Sharif University of Technology
2007
Abstract
A finite element technique is used to mimic radial deformation of single-walled carbon nanotubes under hydrostatic pressure. The elastic deformation of nanotubes is modeled via elastic beams. Properties of the beam element are evaluated by considering characteristics of the covalent bonds between the carbon atoms in a hexagonal lattice. Applying the beam model in a three dimensional space, the elastic properties of the nanotube in the transverse direction are evaluated. The effects of diameter and wall thickness on the radial and circumferential elastic moduli of zigzag and armchair nanotubes are considered. Results are in good agreement with molecular structural mechanics data in the...
Deep learning-driven beamforming optimization for high-performance 5g planar antenna arrays
, Article 2023 13th International Conference on Computer and Knowledge Engineering, ICCKE 2023 ; 2023 , Pages 485-490 ; 979-835033015-1 (ISBN) ; Razavi Pour, S. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2023
Abstract
The ability of 5G wireless communication networks to effectively and simultaneously interact with incoming signals is made possible by antenna arrays, which play a vital role in assisting the functioning of 5G wireless communication networks. The utilization of beamforming enables the enhancement of signal strength, expansion of coverage area, and reduction of interference, thereby optimizing the performance of the communication networks. This paper introduces a deep learning approach that utilizes a deep neural network (DNN). This approach establishes an appropriate framework to implement beamforming for planar antenna arrays. The DNN utilizes the desired radiation pattern as an input to...
Optimizing sidelobe levels in 5G antenna arrays: a grasshopper optimization algorithm approach for enhanced network performance
, Article 2023 14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023 ; 2023 ; 979-835033509-5 (ISBN) ; Razavi Pour, S. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2023
Abstract
The deployment of 5G networks requires advanced antenna technologies to meet the increasing demands for high-capacity and low-latency communication. Antenna arrays, known for their beamforming capabilities, are vital in achieving these goals. However, sidelobes in the antenna radiation pattern can introduce errors and significantly impact the system's overall performance. This paper proposes a novel beamforming optimization technique for linear antenna arrays (LLA) in 5G networks. Our approach leverages the power of metaheuristic algorithms, precisely the Grasshopper Optimization Algorithm (GOA), to optimize the array configuration and reduce the Sidelobe Levels (SLL). The main objective is...
A rapid seismic fragility and risk analysis of electrical substation equipment considering modeling uncertainties
, Article Engineering Structures ; Volume 293 , 2023 ; 01410296 (ISSN) ; Ismail Pour Estekanchi, H ; Sharif University of Technology
Elsevier Ltd
2023
Abstract
This study aims to evaluate the influences of modeling-related uncertainties on the seismic response and fragility function of the four vulnerable components of electrical substation equipment, taking into account the dynamic interaction between apparatuses via bus slider-rigid bus conductors. The 3D finite element model for interconnected disconnect switch- circuit breaker-current transformer-surge arrester system is developed in OpenSees software. A sensitivity analysis is conducted to evaluate and rank the importance of individual random variables on the seismic responses. To incorporate modeling uncertainties into the failure fragility function, probabilistic structural interconnected...
An Introduction to Rigid Analytic Geometry
, M.Sc. Thesis Sharif University of Technology ; Rastegar, Arash (Supervisor)
Abstract
Rigid analytic geometry was developed by John Tate in 1971. Although it seems that a rigid analytic spaces on non-Archimedean field F, is like something called F-analytic manifold; however in general these two are distinct concepts.
In this thesis; we introduce rigid analytic spaces. It begins in chapter one by non-Archimedean fields. In this chapter also contains theorem 1-3-7; which there is no proof for it without usage of methods of this chapter; up to the present. Topics discussed in this chapter are interesting subjects of other applica¬tions of non-Archimedean fields. There is a visualization of the field Q_p; and an appendix includes some definitions and consequences of ordered...
In this thesis; we introduce rigid analytic spaces. It begins in chapter one by non-Archimedean fields. In this chapter also contains theorem 1-3-7; which there is no proof for it without usage of methods of this chapter; up to the present. Topics discussed in this chapter are interesting subjects of other applica¬tions of non-Archimedean fields. There is a visualization of the field Q_p; and an appendix includes some definitions and consequences of ordered...
Unified Optimization in Air Traffic Flow Management Problem Under Uncertainties
, M.Sc. Thesis Sharif University of Technology ; Rafiee, Majid (Supervisor)
Abstract
Reviewing the literature on air traffic flow management shows that reducing flight delay is one of the main challenges facing air transportation systems. This is due to the high cost of incurring delays. At the first stage, two mixed integer-programming model is presented here that aims to minimize delay cost of air traffic. The first presented model seeks to minimize flights delay costs by choosing an optimal airport configuration and balancing departure and arrival flights and the second presented model solve this problem with the new approach with categorizing the airplane by types and prioritizing them. Numerical examples are solved in CPLEX 12.6 to evaluate models performance. Numeric...