Loading...
Search for:
noferesti--morteza
0.115 seconds
Total 199 records
HB2DS: a behavior-driven high-bandwidth network mining system
, Article Journal of Systems and Software ; Volume 127 , 2017 , Pages 266-277 ; 01641212 (ISSN) ; Jalili, R ; Sharif University of Technology
Elsevier Inc
2017
Abstract
This paper proposes a behavior detection system, HB2DS, to address the behavior-detection challenges in high-bandwidth networks. In HB2DS, a summarization of network traffic is represented through some meta-events. The relationships amongst meta-events are used to mine end-user behaviors. HB2DS satisfies the main constraints exist in analyzing of high-bandwidth networks, namely online learning and outlier handling, as well as one-pass processing, delay, and memory limitations. Our evaluation indicates significant improvement in big data stream analyzing in terms of accuracy and efficiency. © 2016 Elsevier Inc
Inline high-bandwidth network analysis using a robust stream clustering algorithm
, Article IET Information Security ; Volume 13, Issue 5 , 2019 , Pages 486-497 ; 17518709 (ISSN) ; Jalili, R ; Sharif University of Technology
Institution of Engineering and Technology
2019
Abstract
High-bandwidth network analysis is challenging, resource consuming, and inaccurate due to the high volume, velocity, and variety characteristics of the network traffic. The infinite stream of incoming traffic forms a dynamic environment with unexpected changes, which requires analysing approaches to satisfy the high-bandwidth network processing challenges such as incremental learning, inline processing, and outlier handling. This study proposes an inline high-bandwidth network stream clustering algorithm designed to incrementally mine large amounts of continuously transmitting network traffic when some outliers can be dropped before determining the network traffic behaviour. Maintaining...
ACoPE: An adaptive semi-supervised learning approach for complex-policy enforcement in high-bandwidth networks
, Article Computer Networks ; Volume 166 , 2020 ; Jalili, R ; Sharif University of Technology
Elsevier B.V
2020
Abstract
Today's high-bandwidth networks require adaptive analyzing approaches to recognize the network variable behaviors. The analyzing approaches should be robust against the lack of prior knowledge and provide data to impose more complex policies. In this paper, ACoPE is proposed as an adaptive semi-supervised learning approach for complex-policy enforcement in high-bandwidth networks. ACoPE detects and maintains inter-flows relationships to impose complex-policies. It employs a statistical process control technique to monitor accuracy. Whenever the accuracy decreased, ACoPE considers it as a changed behavior and uses data from a deep packet inspection module to adapt itself with the change. The...
Query Correctness Assurance for Outsourced Databases
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasoul (Supervisor)
Abstract
In the secure data outsourcing scenario, verification of the reply of an unreliable server includes assessing the authenticity, completeness and it’s integrity. In this thesis, an efficient method, with emphasis on freshness, has been introduced to evaluate the correctness of the replies from a server. It takes in hand different application needs, inherent differences in the data, and different update mechanisms. This method evaluates freshness by using timestamps alongside the data being out sourced. Due to the requirement of verifying not only the freshness of the response, but the correctness of the timestamps as well, two general methods for evaluating and verifying the responses were...
Behavior-Driven Security Policy Enforcement on High Bandwidth Networks
, Ph.D. Dissertation Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
High-bandwidth network analysis is challenging, resource consuming, and inaccurate due to the high volume, velocity, and variety characteristics of the network traffic. Today's high-bandwidth networks require adaptive analyzing approaches to recognize the network variable behaviors. The analyzing approaches should be robust against the lack of prior knowledge and provide data to impose more complex policies.This thesis introduces complex policy relation and proposes a two-layer framework to enforce complex policies, named HB2DS. The proposed framework is equipped with the mechanism and policy layers. The mechanism layer processes network packets header and payload to generate a flow stream....
A signature-based approach of correctness assurance in data outsourcing scenarios
, Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 7093 LNCS , 2011 , Pages 374-378 ; 03029743 (ISSN) ; 9783642255595 (ISBN) ; Hadavi, M. A ; Jalili, R ; Sharif University of Technology
2011
Abstract
Correctness assurance of query results in data outsourcing scenarios includes authenticity, completeness, and freshness of the results. Utilizing signature chaining and aggregation, this paper proposes a method to verify the correctness of results returned from an untrusted server. An MHT constructed over attribute values of a tuple is used to provide the authenticity, and timestamp is used to provide the freshness verifiability of results. While our approach supports a wide range of queries, simulation results indicate its efficiency in comparison with some existing methods in terms of communication and computation overhead imposed to execute a query
The Model for Industrialization Feasibility of Projects on the Basis of Sustainable Development
, M.Sc. Thesis Sharif University of Technology ; Mortaheb, Mohammad Mehdi (Supervisor)
Abstract
Pre-fabrication of building components, as a level of industrial building, is an innovative method of construction, which is widely used in developed countries nowadays. However, this method has accounted for a small percentage of the construction in developing countries like Iran. On the other hand, it is essential to consider sustainable development with the incidence of issues such as degradation of natural resources and ecosystems, pollution, over population, injustice procedure, and decrease in quality of human life. Industrial building systems have a significant impact on improvement and expansion of sustainable development laws due to their potential characteristics. Hence, the...
Gas barrier properties of PP/EPDM blend nanocomposites
, Article Journal of Membrane Science ; Volume 282, Issue 1-2 , 2006 , Pages 142-148 ; 03767388 (ISSN) ; Dadbin, S ; Salehpour, Z ; Noferesti, M ; Sharif University of Technology
2006
Abstract
Nanocomposites of polypropylene (PP)/ethylene-propylene-diene rubber (EPDM) blend with montmorillonite-based organoclay were prepared in a solvent blending method. Solvent blending of PP and EPDM in a composition of 50:50 formed a two phase morphology in which EPDM appeared as dispersed phase with irregular shape. The size of dispersed phase reduced significantly to almost spherical domains by addition of the nanoclay. For better dispersion of nanoclay in the PP/EPDM blend, an antioxidant was used as compatibilizer. State of nanoclay dispersion was evaluated by X-ray diffraction (XRD), and also, by a novel method using permeability measurements data in a permeability model. The measured...
Distinguishing attack on bivium
, Article Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010, 29 June 2010 through 1 July 2010, Bradford ; 2010 , Pages 1075-1078 ; 9780769541082 (ISBN) ; Rohani, N ; Mohajeri, J ; Aref, M. R ; Sharif University of Technology
2010
Abstract
Bivium is a simplified version of Trivium, a hardware profile finalist of eSTREAM project. Bivium has an internal state of size 177 bits and a key length of 80 bits. In this paper we introduce a distinguishing attack on this cipher. In this method we first find the best linear approximation for the updating function. Then by using this approximation, and optimizing the time delay, we find the distinguisher. The complexity of the attack is O(230.79), which is an improvement to the previous distinguishing attack with a complexity of order O(232)
Distinguishing Attacks on Stream Ciphers
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Mohajeri, Javad (Supervisor)
Abstract
Stream ciphers are cryptographic schemes being widely used in communications as a means of providing security of data. Hence, scrutinizing their level of security against different cryptanalytic methods has obviously turned to be of great importance. Randomness of the keystream is an important requirement for stream ciphers. The cipher should be designed in such a way that the keystream is free of any statistical biases that would let attackers distinguish it from a random sequence. A distinguishing attack on a stream cipher is one that determines whether a given stream of symbols is a truly random sequence or generated by a specific cipher with an unknown key. In this thesis, we focus on...
Ant colony algorithm for the shortest loop design problem [electronic resource]
, Article Computers and Industrial Engineering, Elsevier ; Volume 50, Issue 4, August 2006, Pages 358–366 ; Kazemi, Morteza ; Sharif University of Technology
Abstract
In this paper, a new algorithm for solving the shortest loop design problem is presented. The shortest loop design problem is to find the shortest loop for an automated guided vehicle covering at least one edge of each department of a block layout. In this paper, first it is shown that this problem can be represented as a graph model. The properties of the presented model enable us to design a meta-heuristic based on ant colony system algorithm for solving the shortest loop design problem. Computational results show the efficiency of our algorithm in compare to the other techniques
Modeling Reaction and Distribution of Water in Nanopores of the Cathode Catalyst Layer of PEM Fuel Cell
, M.Sc. Thesis Sharif University of Technology ; baghalha, morteza (Supervisor)
Abstract
In the proton exchange membrane fuel cells (PEM, the produced water would be divided into two phases of vapor and liquid. distribution of both liquid and vapor phases in different cell layers affects the performance, the efficiency and the life of a fuel cell significantly. Moreover, Nano pores of the cathode catalyst layer are involved with some phenomena such as electrochemical reaction kinetics, heat and mass transfer and interface phase change. One of the most important problems in the performance of fuel cells is distribution of liquid water in the porous areas. Water flooding in fuel cells causes to delay in oxygen transport to active sites in the catalyst layer because the pores of...
Love Wave Propagation in a Functionally Graded Magneto-Electro-Elastic Half-Space with Quadratic Variations
, M.Sc. Thesis Sharif University of Technology ; Eskandari, Morteza (Supervisor)
Abstract
The propagation behavior of Love wave in functionally graded magneto-electro-elastic half-spaces with a quadratic variation is addressed. The magneto-electromechanical coupling factor, the dispersion relations, electric potential, magnetic potential and displacement are obtained analytically for both magneto-electrically open and short conditions. The effect of gradient coefficient on phase velocity, group velocity and magneto-electromechanical coupling factor are plotted and discussed. Research on the wave propagation in magneto-electro-elastic materials is still very limited. This work provides us with a theoretical foundation to design and practically apply SAW devices with high...
Elastic Analysis of a Surface Stiffened Transversely Isotropic Half-space Under a Buried Horizontal Point Load
, M.Sc. Thesis Sharif University of Technology ; Eskandari, Morteza (Supervisor)
Abstract
In this study, the interaction between thin plate completely bonded to the transversely isotropic halfspace and a concentrated force applied horizontally (Mindlin-type force) are considered. This problem has been solved analytically. This problem is used as sample for thin solid films and surface coating technology, where the surface of solid is covered by thethin plate for increasing its stiffness. Moreover, this problem is a good sample when homogenous solid is subjected to contact loading and can be seen that mechanical properties of material which is near the solid surface varies; consequently, a two-phase solid is created.Because of the influence of noted inhomogeneity, solid is...
Modeling and Simulation of the Catalyst Regeneration Process of FCC Unit of Abadan Refinery
, M.Sc. Thesis Sharif University of Technology ; Baghalha, Morteza (Supervisor)
Abstract
Hydrodynamics plays a crucial role in defining the performance of fluidized beds. The numerical simulation of fluidized bed is very important in the prediction of its behaviour. From this point of view, in the present study a dynamic two dimensioanl model is developed for the modeling of regenerator system of a UOP fluid catalytic cracking (FCC) unit of Abadan refinery with a high-efficiency regenerator. Of the various modeling and simulation techniques, computational fluid dynamics (CFD) is employed in this thesis. Effects of gas velocity, the transient local solid volume fraction, pressure drop for gas and solid phase, solid holdup distribution and solid circulation pattern have been...
Secure- multiparty Computation Protocol for Privacy Preserving Data Mining
, M.Sc. Thesis Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
Privacy preserving data mining helps organizations and companies not only to deal with privacy concerns of customers and regular limitations, but also to benefit from collaborative data mining. Utilizing cryptographic techniques and secure multiparty computation (SMC) are among widely employed approaches for preserving privacy in distributed data mining. The general purpose of secure multiparty computation protocols to compute specific functions on private inputs of parties in a collaborative manner and without revealing their private inputs. Providing rigorous security proof of secure multiparty computation makes it a good choice for privacy preservation, despite of its cryptographic...
Information-flow Analysis in Android Apps for Protecting User Privacy
, M.Sc. Thesis Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
The rapid growth of Android operating system alongside its open-source nature has made it as the most popular operating system of mobile devices. On the other hand, regarding the increasing computational power of mobile devices, a wide variety of applications are coming to this type of devices. Meanwhile unfortunately many malicious softwares trying to keep up with other applications, are targeting this popular operating system. Therefore with regard to the fact that this type of devices usually store private and sensitive information of their users, security of mobile operating systems is considered very important. Having this matter in mind, the goal of this research work has been...
Analysis of Slabs Stiffened by Cables and Pedestals
, M.Sc. Thesis Sharif University of Technology ; Eskandari, Morteza (Supervisor)
Abstract
In this study, a new concrete slab stiffened by concrete pedestals and steel cables is introduced. The slab system is studied by employing both analytical and numerical methods. The steel cables are connected to the edges of slab and the concrete pedestals mounted at the bottom face of slab act as the middle supports of cables. The tension force in the cable and its inclination results in upward forces acting at the bottom face of slab. With the aims of classical theory of thin plates and the superposition technique, the problem of a simply supported rectangular slab stiffened by cables is studied analytically. The obtained results are verified by a numerical modelling implemented in SAP2000...
Parametric Study of Telescopic Metallic Yielding Dampers
, M.Sc. Thesis Sharif University of Technology ; Eskandari, Morteza (Supervisor)
Abstract
The parametric study of a new introduced metallic yielding damper called telescopic damper is addressed. The telescopic damper comprises of three concentric steel pipes connected together by lead shear keys. The inner and outer steel pipes are subjected to axial loading which results in the shear yielding of the embedded lead cylinders. The inner steel pipe has a lock which limits its movement to some certain extent and beyond this limit the outer tube activates. Employing ABAQUS software, the behavior of damper under cyclic loading is studied numerically. The finite element model is verified by available results in the literature. The effects of inner and outer steel pipes thickness,...
An Access Control System for Time Series Data in NoSQL Databases
, M.Sc. Thesis Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
An important class of applications which have been rapidly growing recently is the one that create and use time series data. These types of data sets are ordered based on the timestamps associated to their data items. In practice, traditional relational databases are unable to satisfy the requirements of these data sets; however, NoSQL databases with column-wide data structure are appropriate infrastructure for them. These databases are very efficient in read and write operations (especially for time series data, which are ordered) and are able to store unstructured data. Time series data may contain valuable and sensitive information; hence, they should be protected from the information...