Loading...
Search for:
noferesti--z
0.317 seconds
Total 1547 records
Gas barrier properties of PP/EPDM blend nanocomposites
, Article Journal of Membrane Science ; Volume 282, Issue 1-2 , 2006 , Pages 142-148 ; 03767388 (ISSN) ; Dadbin, S ; Salehpour, Z ; Noferesti, M ; Sharif University of Technology
2006
Abstract
Nanocomposites of polypropylene (PP)/ethylene-propylene-diene rubber (EPDM) blend with montmorillonite-based organoclay were prepared in a solvent blending method. Solvent blending of PP and EPDM in a composition of 50:50 formed a two phase morphology in which EPDM appeared as dispersed phase with irregular shape. The size of dispersed phase reduced significantly to almost spherical domains by addition of the nanoclay. For better dispersion of nanoclay in the PP/EPDM blend, an antioxidant was used as compatibilizer. State of nanoclay dispersion was evaluated by X-ray diffraction (XRD), and also, by a novel method using permeability measurements data in a permeability model. The measured...
HB2DS: a behavior-driven high-bandwidth network mining system
, Article Journal of Systems and Software ; Volume 127 , 2017 , Pages 266-277 ; 01641212 (ISSN) ; Jalili, R ; Sharif University of Technology
Elsevier Inc
2017
Abstract
This paper proposes a behavior detection system, HB2DS, to address the behavior-detection challenges in high-bandwidth networks. In HB2DS, a summarization of network traffic is represented through some meta-events. The relationships amongst meta-events are used to mine end-user behaviors. HB2DS satisfies the main constraints exist in analyzing of high-bandwidth networks, namely online learning and outlier handling, as well as one-pass processing, delay, and memory limitations. Our evaluation indicates significant improvement in big data stream analyzing in terms of accuracy and efficiency. © 2016 Elsevier Inc
Inline high-bandwidth network analysis using a robust stream clustering algorithm
, Article IET Information Security ; Volume 13, Issue 5 , 2019 , Pages 486-497 ; 17518709 (ISSN) ; Jalili, R ; Sharif University of Technology
Institution of Engineering and Technology
2019
Abstract
High-bandwidth network analysis is challenging, resource consuming, and inaccurate due to the high volume, velocity, and variety characteristics of the network traffic. The infinite stream of incoming traffic forms a dynamic environment with unexpected changes, which requires analysing approaches to satisfy the high-bandwidth network processing challenges such as incremental learning, inline processing, and outlier handling. This study proposes an inline high-bandwidth network stream clustering algorithm designed to incrementally mine large amounts of continuously transmitting network traffic when some outliers can be dropped before determining the network traffic behaviour. Maintaining...
ACoPE: An adaptive semi-supervised learning approach for complex-policy enforcement in high-bandwidth networks
, Article Computer Networks ; Volume 166 , 2020 ; Jalili, R ; Sharif University of Technology
Elsevier B.V
2020
Abstract
Today's high-bandwidth networks require adaptive analyzing approaches to recognize the network variable behaviors. The analyzing approaches should be robust against the lack of prior knowledge and provide data to impose more complex policies. In this paper, ACoPE is proposed as an adaptive semi-supervised learning approach for complex-policy enforcement in high-bandwidth networks. ACoPE detects and maintains inter-flows relationships to impose complex-policies. It employs a statistical process control technique to monitor accuracy. Whenever the accuracy decreased, ACoPE considers it as a changed behavior and uses data from a deep packet inspection module to adapt itself with the change. The...
Query Correctness Assurance for Outsourced Databases
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasoul (Supervisor)
Abstract
In the secure data outsourcing scenario, verification of the reply of an unreliable server includes assessing the authenticity, completeness and it’s integrity. In this thesis, an efficient method, with emphasis on freshness, has been introduced to evaluate the correctness of the replies from a server. It takes in hand different application needs, inherent differences in the data, and different update mechanisms. This method evaluates freshness by using timestamps alongside the data being out sourced. Due to the requirement of verifying not only the freshness of the response, but the correctness of the timestamps as well, two general methods for evaluating and verifying the responses were...
Behavior-Driven Security Policy Enforcement on High Bandwidth Networks
, Ph.D. Dissertation Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
High-bandwidth network analysis is challenging, resource consuming, and inaccurate due to the high volume, velocity, and variety characteristics of the network traffic. Today's high-bandwidth networks require adaptive analyzing approaches to recognize the network variable behaviors. The analyzing approaches should be robust against the lack of prior knowledge and provide data to impose more complex policies.This thesis introduces complex policy relation and proposes a two-layer framework to enforce complex policies, named HB2DS. The proposed framework is equipped with the mechanism and policy layers. The mechanism layer processes network packets header and payload to generate a flow stream....
A signature-based approach of correctness assurance in data outsourcing scenarios
, Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 7093 LNCS , 2011 , Pages 374-378 ; 03029743 (ISSN) ; 9783642255595 (ISBN) ; Hadavi, M. A ; Jalili, R ; Sharif University of Technology
2011
Abstract
Correctness assurance of query results in data outsourcing scenarios includes authenticity, completeness, and freshness of the results. Utilizing signature chaining and aggregation, this paper proposes a method to verify the correctness of results returned from an untrusted server. An MHT constructed over attribute values of a tuple is used to provide the authenticity, and timestamp is used to provide the freshness verifiability of results. While our approach supports a wide range of queries, simulation results indicate its efficiency in comparison with some existing methods in terms of communication and computation overhead imposed to execute a query
The Model for Industrialization Feasibility of Projects on the Basis of Sustainable Development
, M.Sc. Thesis Sharif University of Technology ; Mortaheb, Mohammad Mehdi (Supervisor)
Abstract
Pre-fabrication of building components, as a level of industrial building, is an innovative method of construction, which is widely used in developed countries nowadays. However, this method has accounted for a small percentage of the construction in developing countries like Iran. On the other hand, it is essential to consider sustainable development with the incidence of issues such as degradation of natural resources and ecosystems, pollution, over population, injustice procedure, and decrease in quality of human life. Industrial building systems have a significant impact on improvement and expansion of sustainable development laws due to their potential characteristics. Hence, the...
Distinguishing attack on bivium
, Article Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010, 29 June 2010 through 1 July 2010, Bradford ; 2010 , Pages 1075-1078 ; 9780769541082 (ISBN) ; Rohani, N ; Mohajeri, J ; Aref, M. R ; Sharif University of Technology
2010
Abstract
Bivium is a simplified version of Trivium, a hardware profile finalist of eSTREAM project. Bivium has an internal state of size 177 bits and a key length of 80 bits. In this paper we introduce a distinguishing attack on this cipher. In this method we first find the best linear approximation for the updating function. Then by using this approximation, and optimizing the time delay, we find the distinguisher. The complexity of the attack is O(230.79), which is an improvement to the previous distinguishing attack with a complexity of order O(232)
Distinguishing Attacks on Stream Ciphers
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Mohajeri, Javad (Supervisor)
Abstract
Stream ciphers are cryptographic schemes being widely used in communications as a means of providing security of data. Hence, scrutinizing their level of security against different cryptanalytic methods has obviously turned to be of great importance. Randomness of the keystream is an important requirement for stream ciphers. The cipher should be designed in such a way that the keystream is free of any statistical biases that would let attackers distinguish it from a random sequence. A distinguishing attack on a stream cipher is one that determines whether a given stream of symbols is a truly random sequence or generated by a specific cipher with an unknown key. In this thesis, we focus on...
Down from the pedestal: Revisiting the exploit of literature in EFL language classes
, Article International Journal of Applied Linguistics and English Literature ; Volume 4, Issue 2 , 2015 , Pages 158-168 ; 22003592 (ISSN) ; Lari, Z ; Mosalli, Z ; Sharif University of Technology
Australian International Academic Centre PTY LTD
2015
Abstract
According to Arthur (2006, p. 200), “Through the use of literature, a language learning experience might become at the same time a source of immediate pleasure and satisfaction for the student. This possibility makes literature an appealing teaching device for ESL teachers”. However, numerous factors may contribute to the teachers’ lack of interest in using literary texts as a teaching tool. This study was an attempt to investigate Iranian EFL teachers’ attitude toward using literature in language classes and their perception toward the probable reasons of some teachers’ lack of interest in doing so. Altogether forty-four language teachers (19 females and 25 males, with a mean age of 26)...
Inclusion of carbon nanotubes in a hydroxyapatite sol-gel matrix
, Article Ceramics International ; Volume 35, Issue 7 , 2009 , Pages 2987-2991 ; 02728842 (ISSN) ; Nemati, Z. A ; Sadeghian, Z ; Sharif University of Technology
2009
Abstract
In this study, the inclusion of multi-walled carbon nanotubes as the second phase in the hydroxyapatite matrix, in order to improve the mechanical strength, has been performed via the sol-gel process. The stability of carbon nanotube sol with the changes of pH and dispersant values (sodium dodecyl sulfate) was evaluated by zeta potential analysis. The results indicated that synthesis of hydroxyapatite particles in the presence of the carbon nanotubes had the best result in homogenization of the carbon nanotube dispersion and faster crystallization of hydroxyapatite. The crystallization of hydroxyapatite phase was investigated with differential scanning calorimetry (DSC) and X-ray diffraction...
Fourier optics approach in evaluation of the diffraction and defocus aberration in three-dimensional integral imaging
, Article Computational Modelling of Objects Represented in Images: Fundamentals, Methods and Applications III - Proceedings of the International Symposium, CompIMAGE 2012 ; 2012 , Pages 81-84 ; 9780415621342 (ISBN) ; Kavehvash, Z ; Mehrany, K ; Sharif University of Technology
CRC
2012
Abstract
The unwanted effects of diffraction and defocus aberration in three-dimensional integral imaging are taken into account by using the Fourier optics approach. The concepts of point spread function and optical transfer function widely in use for conventional two-dimensional imaging are generalized and applied to three-dimensional integral imaging systems. The effects of diffraction and defocus aberration are then studied and the performance of the conventional single lens imaging system is compared against that of the integral imaging
Multi-target sputter deposition of Ni50Ti 50 - XHfx shape memory thin films for high temperature microactuator application
, Article Sensors and Actuators, A: Physical ; Volume 121, Issue 2 , 2005 , Pages 543-548 ; 09244247 (ISSN) ; Cao, Y. Z ; Barber, Z. H ; Sharif University of Technology
2005
Abstract
High temperature shape memory NiTiHf thin films with varying hafnium contents up to 28.7 at.% were fabricated by DC magnetron sputtering using simultaneous sputter deposition from separate elemental targets. The required film composition was achieved by adjusting the power ratio to the targets. The as-deposited films were amorphous; a post deposition annealing was performed at 550 °C to crystallize the films. Two-micron thick films were characterized by energy dispersive spectroscopy in a scanning electron microscope, temperature controlled X-ray diffraction, differential scanning calorimetry, and atomic force microscopy. The results showed that above 10 at.% Hf additions the transformation...
Strong Revenue (Non-)Monotonicity of Single-parameter Auctions
, Article EC 2023 - Proceedings of the 24th ACM Conference on Economics and Computation ; 2023 , Pages 452-471 ; 979-840070104-7 (ISBN) ; Huang, Z ; Majdi, D ; Yan, Z ; Sharif University of Technology
Association for Computing Machinery, Inc
2023
Abstract
Consider Myerson's optimal auction with respect to an inaccurate prior, e.g., estimated from data, which is an underestimation of the true value distribution. Can the auctioneer expect getting at least the optimal revenue w.r.t. the inaccurate prior since the true value distribution is larger? This so-called strong revenue monotonicity is known to be true for single-parameter auctions when the feasible allocations form a matroid. We find that strong revenue monotonicity fails to generalize beyond the matroid setting, and further show that auctions in the matroid setting are the only downward-closed auctions that satisfy strong revenue monotonicity. On the flip side, we recover an approximate...
Subsidy cut and its effect on tehran electricity company: A system dynamics approach
, Article Proceedings of the 2012 - Summer Computer Simulation Conference, SCSC 2012, Part of SummerSim 2012 Multiconference ; Volume 44, Issue 10 , 2012 , Pages 113-120 ; 9781618399847 (ISBN) ; Fard, S. Z
2012
Abstract
In recent years, subsidy payment has been made a main challenge for governments due to growth of population and energy price in global markets. Targeted subsidy plan has been implemented in Iran since last year, and this article discusses its effects on costs and revenues of Tehran Electricity Company as one of the major subdivisions of Iran's electricity industry. In the new system, structural changes have been made in electricity tariffs, so it is not possible to predict the future trends in electricity consumption only based on the past consumptions. In order to model the decision making structure in the recent conditions, a system dynamics method is applied. In addition to modeling the...
Interactions of coinage metal clusters with histidine and their effects on histidine acidity; Theoretical investigation
, Article Organic and Biomolecular Chemistry ; Volume 10, Issue 47 , Oct , 2012 , Pages 9373-9382 ; 14770520 (ISSN) ; Jamshidi, Z ; Tehrani, Z. A ; Fattahi, A ; Sharif University of Technology
2012
Abstract
Understanding the nature of interaction between metal nanoparticles and biomolecules such as amino acids is important in the development and design of biosensors. In this paper, binding of M3 clusters (M = Au, Ag and Cu) with neutral and anionic forms of histidine amino acid was studied using density functional theory (DFT-B3LYP). It was found that the interaction of histidine with M3 clusters is governed by two major bonding factors: (a) the anchoring N-M and O-M bonds and (b) the nonconventional N-H⋯M and O-H⋯M hydrogen bonds. The nature of these chemical bonds has been investigated based on quantum theory of atoms in molecules (QTAIM) and natural bond orbital (NBO) analyses. In the next...
Can anion interaction accelerate transformation of cytosine tautomers? Detailed view form QTAIM analysis
, Article Structural Chemistry ; Volume 23, Issue 6 , 2012 , Pages 1843-1855 ; 10400400 (ISSN) ; Tehrani, Z. A ; Fattahi, A ; Jamshidi, Z ; Sharif University of Technology
2012
Abstract
The relative stabilities and noncovalent interactions of the six low-lying energy tautomers of cytosine nucleobase with some biological anions (such as F-, Cl-, and CN-) have been investigated in gas phase by density functional theory (DFT) method in conjunction with 6-311++G (d,p) atomic basis set. Furthermore, to systematically investigate all possible tautomerisms from cytosine induced by proton transfer, we describe a study of structural tautomer interconversion in the gas phase and in a continuum solvent using DFT calculation. We carried out geometrical optimizations with the integral equation formalism of polarizable continuum (IEF-PCM) model to account for the solvent effect, and the...
Interactions of glutathione tripeptide with gold cluster: Influence of intramolecular hydrogen bond on complexation behavior
, Article Journal of Physical Chemistry A ; Volume 116, Issue 17 , 2012 , Pages 4338-4347 ; 10895639 (ISSN) ; Jamshidi, Z ; Javan, M. J ; Fattahi, A ; Sharif University of Technology
2012
Abstract
Understanding the nature of the interaction between metal nanoparticles and biomolecules has been important in the development and design of sensors. In this paper, structural, electronic, and bonding properties of the neutral and anionic forms of glutathione tripeptide (GSH) complexes with a Au 3 cluster were studied using the DFT-B3LYP with 6-31+G**-LANL2DZ mixed basis set. Binding of glutathione with the gold cluster is governed by two different kinds of interactions: Auâ€"X (X = N, O, and S) anchoring bond and Au··•·•H-X nonconventional hydrogen bonding. The influence of the intramolecular hydrogen bonding of glutathione on the interaction of this peptide with the gold cluster has been...
Implementing distance line protection schemes among IEC61850-enabled substations
, Article Proceedings of the IEEE Power Engineering Society Transmission and Distribution Conference ; April , 2014 , Page(s): 1 - 5 ; ISSN: 21608555 ; ISBN: 9781479936557 ; Darabi, Z ; Vakilian, M
2014
Abstract
As digital technology has developed, relays have evolved from simple electro-mechanical devices into robust microprocessor-embedded intelligent electronic devices (IEDs). Distance protection, one of the most important and sophisticated forms of substation protection, quickly and selectively detects and clears phase faults in sub-transmission and transmission lines. The installation of a substation automation system (SAS) involves implementing control, monitoring, and protection logic by programming the IEDs and providing an appropriate communication network. IEC61850 has gradually satisfied the need for a standard communication protocol so that IEDs from different manufacturers can...