Loading...
Search for: noferesti--z
0.317 seconds

    Gas barrier properties of PP/EPDM blend nanocomposites

    , Article Journal of Membrane Science ; Volume 282, Issue 1-2 , 2006 , Pages 142-148 ; 03767388 (ISSN) Frounchi, M ; Dadbin, S ; Salehpour, Z ; Noferesti, M ; Sharif University of Technology
    2006
    Abstract
    Nanocomposites of polypropylene (PP)/ethylene-propylene-diene rubber (EPDM) blend with montmorillonite-based organoclay were prepared in a solvent blending method. Solvent blending of PP and EPDM in a composition of 50:50 formed a two phase morphology in which EPDM appeared as dispersed phase with irregular shape. The size of dispersed phase reduced significantly to almost spherical domains by addition of the nanoclay. For better dispersion of nanoclay in the PP/EPDM blend, an antioxidant was used as compatibilizer. State of nanoclay dispersion was evaluated by X-ray diffraction (XRD), and also, by a novel method using permeability measurements data in a permeability model. The measured... 

    HB2DS: a behavior-driven high-bandwidth network mining system

    , Article Journal of Systems and Software ; Volume 127 , 2017 , Pages 266-277 ; 01641212 (ISSN) Noferesti, M ; Jalili, R ; Sharif University of Technology
    Elsevier Inc  2017
    Abstract
    This paper proposes a behavior detection system, HB2DS, to address the behavior-detection challenges in high-bandwidth networks. In HB2DS, a summarization of network traffic is represented through some meta-events. The relationships amongst meta-events are used to mine end-user behaviors. HB2DS satisfies the main constraints exist in analyzing of high-bandwidth networks, namely online learning and outlier handling, as well as one-pass processing, delay, and memory limitations. Our evaluation indicates significant improvement in big data stream analyzing in terms of accuracy and efficiency. © 2016 Elsevier Inc  

    Inline high-bandwidth network analysis using a robust stream clustering algorithm

    , Article IET Information Security ; Volume 13, Issue 5 , 2019 , Pages 486-497 ; 17518709 (ISSN) Noferesti, M ; Jalili, R ; Sharif University of Technology
    Institution of Engineering and Technology  2019
    Abstract
    High-bandwidth network analysis is challenging, resource consuming, and inaccurate due to the high volume, velocity, and variety characteristics of the network traffic. The infinite stream of incoming traffic forms a dynamic environment with unexpected changes, which requires analysing approaches to satisfy the high-bandwidth network processing challenges such as incremental learning, inline processing, and outlier handling. This study proposes an inline high-bandwidth network stream clustering algorithm designed to incrementally mine large amounts of continuously transmitting network traffic when some outliers can be dropped before determining the network traffic behaviour. Maintaining... 

    ACoPE: An adaptive semi-supervised learning approach for complex-policy enforcement in high-bandwidth networks

    , Article Computer Networks ; Volume 166 , 2020 Noferesti, M ; Jalili, R ; Sharif University of Technology
    Elsevier B.V  2020
    Abstract
    Today's high-bandwidth networks require adaptive analyzing approaches to recognize the network variable behaviors. The analyzing approaches should be robust against the lack of prior knowledge and provide data to impose more complex policies. In this paper, ACoPE is proposed as an adaptive semi-supervised learning approach for complex-policy enforcement in high-bandwidth networks. ACoPE detects and maintains inter-flows relationships to impose complex-policies. It employs a statistical process control technique to monitor accuracy. Whenever the accuracy decreased, ACoPE considers it as a changed behavior and uses data from a deep packet inspection module to adapt itself with the change. The... 

    Query Correctness Assurance for Outsourced Databases

    , M.Sc. Thesis Sharif University of Technology Noferesti, Morteza (Author) ; Jalili, Rasoul (Supervisor)
    Abstract
    In the secure data outsourcing scenario, verification of the reply of an unreliable server includes assessing the authenticity, completeness and it’s integrity. In this thesis, an efficient method, with emphasis on freshness, has been introduced to evaluate the correctness of the replies from a server. It takes in hand different application needs, inherent differences in the data, and different update mechanisms. This method evaluates freshness by using timestamps alongside the data being out sourced. Due to the requirement of verifying not only the freshness of the response, but the correctness of the timestamps as well, two general methods for evaluating and verifying the responses were... 

    Behavior-Driven Security Policy Enforcement on High Bandwidth Networks

    , Ph.D. Dissertation Sharif University of Technology Noferesti, Morteza (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    High-bandwidth network analysis is challenging, resource consuming, and inaccurate due to the high volume, velocity, and variety characteristics of the network traffic. Today's high-bandwidth networks require adaptive analyzing approaches to recognize the network variable behaviors. The analyzing approaches should be robust against the lack of prior knowledge and provide data to impose more complex policies.This thesis introduces complex policy relation and proposes a two-layer framework to enforce complex policies, named HB2DS. The proposed framework is equipped with the mechanism and policy layers. The mechanism layer processes network packets header and payload to generate a flow stream.... 

    A signature-based approach of correctness assurance in data outsourcing scenarios

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 7093 LNCS , 2011 , Pages 374-378 ; 03029743 (ISSN) ; 9783642255595 (ISBN) Noferesti, M ; Hadavi, M. A ; Jalili, R ; Sharif University of Technology
    2011
    Abstract
    Correctness assurance of query results in data outsourcing scenarios includes authenticity, completeness, and freshness of the results. Utilizing signature chaining and aggregation, this paper proposes a method to verify the correctness of results returned from an untrusted server. An MHT constructed over attribute values of a tuple is used to provide the authenticity, and timestamp is used to provide the freshness verifiability of results. While our approach supports a wide range of queries, simulation results indicate its efficiency in comparison with some existing methods in terms of communication and computation overhead imposed to execute a query  

    The Model for Industrialization Feasibility of Projects on the Basis of Sustainable Development

    , M.Sc. Thesis Sharif University of Technology Noferesti, Samindokht (Author) ; Mortaheb, Mohammad Mehdi (Supervisor)
    Abstract
    Pre-fabrication of building components, as a level of industrial building, is an innovative method of construction, which is widely used in developed countries nowadays. However, this method has accounted for a small percentage of the construction in developing countries like Iran. On the other hand, it is essential to consider sustainable development with the incidence of issues such as degradation of natural resources and ecosystems, pollution, over population, injustice procedure, and decrease in quality of human life. Industrial building systems have a significant impact on improvement and expansion of sustainable development laws due to their potential characteristics. Hence, the... 

    Distinguishing attack on bivium

    , Article Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010, 29 June 2010 through 1 July 2010, Bradford ; 2010 , Pages 1075-1078 ; 9780769541082 (ISBN) Noferesti, Z ; Rohani, N ; Mohajeri, J ; Aref, M. R ; Sharif University of Technology
    2010
    Abstract
    Bivium is a simplified version of Trivium, a hardware profile finalist of eSTREAM project. Bivium has an internal state of size 177 bits and a key length of 80 bits. In this paper we introduce a distinguishing attack on this cipher. In this method we first find the best linear approximation for the updating function. Then by using this approximation, and optimizing the time delay, we find the distinguisher. The complexity of the attack is O(230.79), which is an improvement to the previous distinguishing attack with a complexity of order O(232)  

    Distinguishing Attacks on Stream Ciphers

    , M.Sc. Thesis Sharif University of Technology Noferesti, Zainab (Author) ; Aref, Mohammad Reza (Supervisor) ; Mohajeri, Javad (Supervisor)
    Abstract
    Stream ciphers are cryptographic schemes being widely used in communications as a means of providing security of data. Hence, scrutinizing their level of security against different cryptanalytic methods has obviously turned to be of great importance. Randomness of the keystream is an important requirement for stream ciphers. The cipher should be designed in such a way that the keystream is free of any statistical biases that would let attackers distinguish it from a random sequence. A distinguishing attack on a stream cipher is one that determines whether a given stream of symbols is a truly random sequence or generated by a specific cipher with an unknown key. In this thesis, we focus on... 

    Down from the pedestal: Revisiting the exploit of literature in EFL language classes

    , Article International Journal of Applied Linguistics and English Literature ; Volume 4, Issue 2 , 2015 , Pages 158-168 ; 22003592 (ISSN) Rezanejad, A ; Lari, Z ; Mosalli, Z ; Sharif University of Technology
    Australian International Academic Centre PTY LTD  2015
    Abstract
    According to Arthur (2006, p. 200), “Through the use of literature, a language learning experience might become at the same time a source of immediate pleasure and satisfaction for the student. This possibility makes literature an appealing teaching device for ESL teachers”. However, numerous factors may contribute to the teachers’ lack of interest in using literary texts as a teaching tool. This study was an attempt to investigate Iranian EFL teachers’ attitude toward using literature in language classes and their perception toward the probable reasons of some teachers’ lack of interest in doing so. Altogether forty-four language teachers (19 females and 25 males, with a mean age of 26)... 

    Inclusion of carbon nanotubes in a hydroxyapatite sol-gel matrix

    , Article Ceramics International ; Volume 35, Issue 7 , 2009 , Pages 2987-2991 ; 02728842 (ISSN) Najafi, H ; Nemati, Z. A ; Sadeghian, Z ; Sharif University of Technology
    2009
    Abstract
    In this study, the inclusion of multi-walled carbon nanotubes as the second phase in the hydroxyapatite matrix, in order to improve the mechanical strength, has been performed via the sol-gel process. The stability of carbon nanotube sol with the changes of pH and dispersant values (sodium dodecyl sulfate) was evaluated by zeta potential analysis. The results indicated that synthesis of hydroxyapatite particles in the presence of the carbon nanotubes had the best result in homogenization of the carbon nanotube dispersion and faster crystallization of hydroxyapatite. The crystallization of hydroxyapatite phase was investigated with differential scanning calorimetry (DSC) and X-ray diffraction... 

    Fourier optics approach in evaluation of the diffraction and defocus aberration in three-dimensional integral imaging

    , Article Computational Modelling of Objects Represented in Images: Fundamentals, Methods and Applications III - Proceedings of the International Symposium, CompIMAGE 2012 ; 2012 , Pages 81-84 ; 9780415621342 (ISBN) Esfahani, Z. E. A ; Kavehvash, Z ; Mehrany, K ; Sharif University of Technology
    CRC  2012
    Abstract
    The unwanted effects of diffraction and defocus aberration in three-dimensional integral imaging are taken into account by using the Fourier optics approach. The concepts of point spread function and optical transfer function widely in use for conventional two-dimensional imaging are generalized and applied to three-dimensional integral imaging systems. The effects of diffraction and defocus aberration are then studied and the performance of the conventional single lens imaging system is compared against that of the integral imaging  

    Multi-target sputter deposition of Ni50Ti 50 - XHfx shape memory thin films for high temperature microactuator application

    , Article Sensors and Actuators, A: Physical ; Volume 121, Issue 2 , 2005 , Pages 543-548 ; 09244247 (ISSN) Sanjabi, S ; Cao, Y. Z ; Barber, Z. H ; Sharif University of Technology
    2005
    Abstract
    High temperature shape memory NiTiHf thin films with varying hafnium contents up to 28.7 at.% were fabricated by DC magnetron sputtering using simultaneous sputter deposition from separate elemental targets. The required film composition was achieved by adjusting the power ratio to the targets. The as-deposited films were amorphous; a post deposition annealing was performed at 550 °C to crystallize the films. Two-micron thick films were characterized by energy dispersive spectroscopy in a scanning electron microscope, temperature controlled X-ray diffraction, differential scanning calorimetry, and atomic force microscopy. The results showed that above 10 at.% Hf additions the transformation... 

    Strong Revenue (Non-)Monotonicity of Single-parameter Auctions

    , Article EC 2023 - Proceedings of the 24th ACM Conference on Economics and Computation ; 2023 , Pages 452-471 ; 979-840070104-7 (ISBN) Chen, Z ; Huang, Z ; Majdi, D ; Yan, Z ; Sharif University of Technology
    Association for Computing Machinery, Inc  2023
    Abstract
    Consider Myerson's optimal auction with respect to an inaccurate prior, e.g., estimated from data, which is an underestimation of the true value distribution. Can the auctioneer expect getting at least the optimal revenue w.r.t. the inaccurate prior since the true value distribution is larger? This so-called strong revenue monotonicity is known to be true for single-parameter auctions when the feasible allocations form a matroid. We find that strong revenue monotonicity fails to generalize beyond the matroid setting, and further show that auctions in the matroid setting are the only downward-closed auctions that satisfy strong revenue monotonicity. On the flip side, we recover an approximate... 

    Subsidy cut and its effect on tehran electricity company: A system dynamics approach

    , Article Proceedings of the 2012 - Summer Computer Simulation Conference, SCSC 2012, Part of SummerSim 2012 Multiconference ; Volume 44, Issue 10 , 2012 , Pages 113-120 ; 9781618399847 (ISBN) Mehmanchi, E ; Fard, S. Z
    2012
    Abstract
    In recent years, subsidy payment has been made a main challenge for governments due to growth of population and energy price in global markets. Targeted subsidy plan has been implemented in Iran since last year, and this article discusses its effects on costs and revenues of Tehran Electricity Company as one of the major subdivisions of Iran's electricity industry. In the new system, structural changes have been made in electricity tariffs, so it is not possible to predict the future trends in electricity consumption only based on the past consumptions. In order to model the decision making structure in the recent conditions, a system dynamics method is applied. In addition to modeling the... 

    Interactions of coinage metal clusters with histidine and their effects on histidine acidity; Theoretical investigation

    , Article Organic and Biomolecular Chemistry ; Volume 10, Issue 47 , Oct , 2012 , Pages 9373-9382 ; 14770520 (ISSN) Javan, M. J ; Jamshidi, Z ; Tehrani, Z. A ; Fattahi, A ; Sharif University of Technology
    2012
    Abstract
    Understanding the nature of interaction between metal nanoparticles and biomolecules such as amino acids is important in the development and design of biosensors. In this paper, binding of M3 clusters (M = Au, Ag and Cu) with neutral and anionic forms of histidine amino acid was studied using density functional theory (DFT-B3LYP). It was found that the interaction of histidine with M3 clusters is governed by two major bonding factors: (a) the anchoring N-M and O-M bonds and (b) the nonconventional N-H⋯M and O-H⋯M hydrogen bonds. The nature of these chemical bonds has been investigated based on quantum theory of atoms in molecules (QTAIM) and natural bond orbital (NBO) analyses. In the next... 

    Can anion interaction accelerate transformation of cytosine tautomers? Detailed view form QTAIM analysis

    , Article Structural Chemistry ; Volume 23, Issue 6 , 2012 , Pages 1843-1855 ; 10400400 (ISSN) Jebeli Javan, M ; Tehrani, Z. A ; Fattahi, A ; Jamshidi, Z ; Sharif University of Technology
    2012
    Abstract
    The relative stabilities and noncovalent interactions of the six low-lying energy tautomers of cytosine nucleobase with some biological anions (such as F-, Cl-, and CN-) have been investigated in gas phase by density functional theory (DFT) method in conjunction with 6-311++G (d,p) atomic basis set. Furthermore, to systematically investigate all possible tautomerisms from cytosine induced by proton transfer, we describe a study of structural tautomer interconversion in the gas phase and in a continuum solvent using DFT calculation. We carried out geometrical optimizations with the integral equation formalism of polarizable continuum (IEF-PCM) model to account for the solvent effect, and the... 

    Interactions of glutathione tripeptide with gold cluster: Influence of intramolecular hydrogen bond on complexation behavior

    , Article Journal of Physical Chemistry A ; Volume 116, Issue 17 , 2012 , Pages 4338-4347 ; 10895639 (ISSN) Tehrani, Z. A ; Jamshidi, Z ; Javan, M. J ; Fattahi, A ; Sharif University of Technology
    2012
    Abstract
    Understanding the nature of the interaction between metal nanoparticles and biomolecules has been important in the development and design of sensors. In this paper, structural, electronic, and bonding properties of the neutral and anionic forms of glutathione tripeptide (GSH) complexes with a Au 3 cluster were studied using the DFT-B3LYP with 6-31+G**-LANL2DZ mixed basis set. Binding of glutathione with the gold cluster is governed by two different kinds of interactions: Auâ€"X (X = N, O, and S) anchoring bond and Au··•·•H-X nonconventional hydrogen bonding. The influence of the intramolecular hydrogen bonding of glutathione on the interaction of this peptide with the gold cluster has been... 

    Implementing distance line protection schemes among IEC61850-enabled substations

    , Article Proceedings of the IEEE Power Engineering Society Transmission and Distribution Conference ; April , 2014 , Page(s): 1 - 5 ; ISSN: 21608555 ; ISBN: 9781479936557 Falahati, B ; Darabi, Z ; Vakilian, M
    2014
    Abstract
    As digital technology has developed, relays have evolved from simple electro-mechanical devices into robust microprocessor-embedded intelligent electronic devices (IEDs). Distance protection, one of the most important and sophisticated forms of substation protection, quickly and selectively detects and clears phase faults in sub-transmission and transmission lines. The installation of a substation automation system (SAS) involves implementing control, monitoring, and protection logic by programming the IEDs and providing an appropriate communication network. IEC61850 has gradually satisfied the need for a standard communication protocol so that IEDs from different manufacturers can...