Loading...
Search for: ramezanian--vida
0.148 seconds

    Punishment Normative Systems

    , M.Sc. Thesis Sharif University of Technology Feghhi, Saman (Author) ; Ramezanian, Rasoul (Supervisor)
    Abstract
    In real life, we can not always expect agents and authorities to have the same desires. Also when it comes to conflicts, agents always tend to break the authorities’ norms to follow their own strategies. Hence we can not expect strict norms to model an actual real life situation.In this article we introduce punishment normative systems, based on multi-agent Marokov chain processes (MMDPs). We try to extend the punishment idea to be also applicable on long-run and infinite strategies. We consider a version of the multi-agent model that is widely used in different situations and then provide an algorithm to find a fair normative system that distributes obligations equally on the agents, while... 

    Formal Verification of Privacy Property Using Applied Pi Calculus and Epistemic Logic

    , M.Sc. Thesis Sharif University of Technology Mohammadi, Jamal (Author) ; Ramezanian, Rasoul (Supervisor)
    Abstract
    Applied pi calculus is a variant of the pi calculus with extensions for modeling cryptographic protocols. In such a calculus, the security guarantees are usually stated as equivalences. While process calculi provide a natural means to describe the protocols themselves, epistemic logics are often better suited for expressing certain security properties such as secrecy and anonymity. These methods studied in this work to investigation the verification of privacy properties in security protocols. And finally, a new approach is introduced to bridge the gap between these two approaches: using the set of traces generated by a process as models. In this method an epistemic logic has constructs for... 

    Formal Verification of Anonymous Communication Protocols

    , M.Sc. Thesis Sharif University of Technology Deljoo, Vahid (Author) ; Ramezanian, Rasool (Supervisor)
    Abstract
    One of the biggest challenges in online communication is privacy of individuals. Although anonymous communication (AC) protocols has been the subject of several security and anonymity analyses recently, there are still few frameworks for analyzing such complex systems (e.g. Tor) and their anonymity properties in a unified manner. In this study, an overview of anonymity features and techniques will be discussed by examining various protocols that provide undetectable network communication. Afterwards, the Tor network is described more precisely. Furthermore, the literature of formal methods is briefly reviewed, and the Universal Composable (UC) framework for the analysis of cryptography... 

    Automated Negotiation in Electronic Commerce

    , M.Sc. Thesis Sharif University of Technology Mehri, Hamideh (Author) ; Ramezanian, Rasoul (Supervisor)
    Abstract
    Extensive growth of the internet has had a profound effect on the business environment and rise to a phenomenon known as electronic commerce.electronic commerce has an important role in improvement of organization performance and likewise,has influence in everyday life.despite its name,e commerce is not fully automated.typically,online transactions require a significant level of human intervention.to achieve high degree of automation,we need a new model of software.this model is based upon the notion of agents.agents can act in different stages of e-commerce.one of the most important of these stages is negotiation.negotiation capabilities are essential for e-commerce systems.the agents... 

    Epistemic Protocols in Gossip Problem and Modeling Secrecy and Ignorance

    , Ph.D. Dissertation Sharif University of Technology Ramezanian, Rahim (Author) ; Ardeshir, Mohammad (Supervisor)
    Abstract
    Epistemic algorithms are instructions and rules based on knowledge of agents. These algorithms by individual or group knowledge of agents make decisions about future behavior of systems. Epistemic gossip protocols is one of these algorithms. They are used to for spreading secrets among nodes in a network. According to individual knowledge of each node they decide who calls whom in each step. In security problems epistemic algorithms are used to detect the safety of protocols. Some epistemic notions like ignorance and contingency are used in formalization of security problems. In the thesis we study these epistemic algorithms  

    Supervised Monocular Depth Estimation using Deep Neural Networks

    , M.Sc. Thesis Sharif University of Technology Ramezanian, Vida (Author) ; Kasaei, Shohreh (Supervisor)
    Abstract
    In this project, we address monocular depth estimation, a fundamental challenge in understanding environmental scenes. Estimating depth from a single image can be particularly challenging due to out-of-distribution information such as occlusions, unexpected objects, and varying lighting conditions, all of which can disrupt model performance. Despite advancements in monocular depth estimation through the development of deep neural networks, challenges remain in accurately estimating depth maps and object boundaries. This research introduces a method aimed at improving the performance and reliability of monocular depth estimation models by leveraging epistemic uncertainty estimation in the... 

    Design Patterns for Agent-Oriented Software Engineering, and Formalizing Design Patterns

    , M.Sc. Thesis Sharif University of Technology Rahmani, Hazhar (Author) ; Ramezanian, Rasoul (Supervisor)
    Abstract
    Agent-Oriented Software Engineering is one of the novel and growing paradigms in computer science, which provides systematic approaches for analysis, designing, implementation and maintenance of multi-agent systems. Agents are the main entities of the agent-oriented software systems. Agents are autonomous and behave flexibly and intelligently. This paradigm is appropriate for developing open, complex, flexible and distributed systems. Design pattern is a general reusable solution to a commonly occurring problem within a specific context in software design. Using patterns in software design has many benefits such as increasing the quality and robustness of the software. Regarding the fact... 

    Analysis of Group Formation in Social Networks Using Evolutionary Game Theory

    , M.Sc. Thesis Sharif University of Technology Rahimi Gorji, Saeed (Author) ; Ramezanian, Rasoul (Supervisor)
    Abstract
    Evolutionary game theory is a relatively new branch of game theory (in contrast to the classical game theory) which has overcome some of the common problems of the classical version such as highly rational agents assumption. Because of this, it has gained popularity among different sciences. On the other hand, social network as one of the branches of complex networks is a pretty novel research area and has application in several fields. Networks are everywhere and most real-world networks are complex ones. Group formation and evolution are among important subjects in studying social networks and some works has been done in analyzing and modeling them. In this thesis we have presented a... 

    Optimal Reserve Price in Sequential First-Price Auctions with Network Externalities

    , M.Sc. Thesis Sharif University of Technology Vahdat Azad, Mahdie (Author) ; Ramezanian, Rasoul (Supervisor)
    Abstract
    The auction models are one of the fundamental issues of economics. So far, the bidders were assumed independent of one another in auction models. In this thesis the bidders are considered as a social network. Bidding of an agent influences bidding behavior of other agents based on the network among them. Considering social network among the buyers, we study seller's optimal strategy  

    New Hybrid Approaches Information Clustering Based on FCM Clustering and Optimization CFA

    , M.Sc. Thesis Sharif University of Technology Farzin Far, Zohreh (Author) ; Ramezanian, Rasoul (Supervisor)
    Abstract
    Clustering algorithms are developed to provide general attitudes on database, recognizing latent structures and their more effective accessibility. Recently, broad studies are conducted on clustering since it is recognized as an important tool to explore and analyze data. Clustering is a fundamental learning operation without monitoring in data exploration which divides data into groups of objects so that objects in one group have the most similarity to each other and lowest similarity to objects in other groups. Some clustering algorithms such fuzzy clustering model (FCM) are widely used in clustering problem solution although this technique addresses local optimized searches. Additionally,... 

    Description and Analysis of Security Protocol by Universal Composability Framework

    , M.Sc. Thesis Sharif University of Technology Seifollahpour, Najmeh (Author) ; Ramezanian, Rasoul (Supervisor)
    Abstract
    Security protocols may be provable secure when used alone, but these protocols lose their security under composition operation. Universal Composition framework (UC) is a tool for analyzing security protocols under composition. UC framework guarantees that the cryptographic protocols keep their security under this composition operation. In this paper we state a modeling for key-evolving signature protocol within the UC framework as a case study. To do this, the ideal functionality is proposed for key-evolving signature scheme that keeps the security requirements of this scheme. Finally, we show that UC definition of security is equivalent to definition of security which is termed here as... 

    Agent-based Programming and it's Application Using GOAL

    , M.Sc. Thesis Sharif University of Technology Hosseinian, Narges Sadat (Author) ; Ramezanian, Rasoul (Supervisor)
    Abstract
    With the significant advances in software engineering and developing complicated systems, it’s important to investigate the interaction between systems. Agentoriented software engineering is a new paradigm for developing distributed intelligent systems. Agent technology currently plays an important role in complex software development. The underlying paradigm offers a large repertoire of original concepts, architectures, interaction protocols, and methodologies for the analysis and the specification of complex systems built as Multi-Agent Systems (MAS). Several efforts, originating from academia, industry, and several standardisation consortium, have been made in order to provide new tools,... 

    Hypercomputation and Hypercomputer

    , M.Sc. Thesis Sharif University of Technology Ebrahimi Mood, Sepehr (Author) ; Ramezanian, Rasoul (Supervisor)
    Abstract
    Since the computation of human life is in progress rapidly, we need to offer new concepts in Computational Theory, to obviate these needs. One of these concepts are hypercomputation and hypercomputers, which draw lots of attention in recent years. In this thesis, we study hypercomputaion and hypercomputers in more details.First, we briefly review Computational Theory principles and hypercomputation. After that, we provide and explain about some hypercomputers models and their computational power. After a detail description of interactive computation, as one of the models of hypercomputation, we propose our “Consistent Persistent Turing Machine,” as a model of hypercomputer for interactive... 

    , M.Sc. Thesis Sharif University of Technology Aftabi, Abed (Author) ; Yaghmaei, Soheyla (Supervisor) ; Maghsoudi, Vida (Supervisor)
    Abstract
    This practice investigates about the resistance & sustainability of a sample of available microorganisms in fruit juices vs. a natural anti microbe called vanillin. To be more precisely the anti bacterial characteristic of vanillin has been tested against famous pathogenic organism Escherichia Coli in apple juice. The practice has been experienced for different concentrations of Vanillin, controlling & reducing the microbe concentration in apple synthetic juice. The effect has been investigated by measuring sensitivity of results in two different temperatures one in 8 degree of centigrade & other in 15, in each temperature two PH have been tested (PH = 3.5 & 4.5) 0-40-80 m-molar as 3... 

    Antimicrobial Effects of Iranian Red Sumac

    , M.Sc. Thesis Sharif University of Technology Taheri, Saeede (Author) ; Maghsoodi, Vida (Supervisor) ; Yaghmaei, Soheila (Supervisor)
    Abstract
    The most important desire of all researchers in food industry is decreasing the contamination of foods and increasing their shelf life. Due to harmfulness of chemical preservatives their use has been limited and therefore natural antimicrobials have been demanded. Recently spices have been noticed as natural antimicrobial agents. Sumac is a kind of spice which has antibacterial and antioxidant activities.The aim of this project is to investigate effects of water and alcoholic extracts of Iranian red sumac comparatively on three gram positive bacteria (Bacillus coagulans , Bacillus subtilis, Staphylococcus aureus) and one gram negative (Escherichia coli) by well and disk diffusion method.... 

    Preparation of Gelatin-Alginate Hydrogel for Using as Cell Culture Scaffold

    , M.Sc. Thesis Sharif University of Technology Fadaodini, Samira (Author) ; Mashayekhan, Shohreh (Supervisor) ; Maghsoudi, Vida (Supervisor)
    Abstract
    Hydrogels are polymeric three-dimensional networks able to swell in the presence of an aqueous medium. Hydrogels from natural proteins and polysaccharides are ideal scaffolds for tissue engineering since they resemble the extracellular matrices of tissue comprised of various amino acids and sugar-based macromolecules.The biocompatible and biodegradable hydrogel scaffolds are promising materials for tissue engineering. Here, we report a new class of hydrogels derived from oxidized alginate (OA) and gelatin. The prepared oxidized alginate was shown to be efficient in crosslinking gelatin, leading to hydrogel formation. The effect of degree of oxidation and concentration of OA on the mechanical... 

    Cmail: A Decentralized Messaging System

    , M.Sc. Thesis Sharif University of Technology Kaboli Nooshabadi, Reza (Author) ; Ramezanian, Rasoul (Supervisor)
    Abstract
    Due to the increase of computer networks and their application, the need for secure communication has become a very important concern. We introduce Cmail, a secure messaging system that works without any central party and in addition protects privacy of users. This system is on top of a cryptocurrency system such as Bitcoin. Bitcoin is cryptocurrency that works on the Internet. The suply of bitcoins and verification of transactions is done by Bitcoin miners, which are some typical client of Bitcoin system, in a decentralizd maner. In Cmail the miners have additional task, they should transfer messages of users and if needed, they hold it for a limited time. In order to increase incentive of... 

    Investigating the Optimum Conditions for Cell Growth and Behavior on Hydrogel Surfaces

    , M.Sc. Thesis Sharif University of Technology Hajiabbas, Maryam (Author) ; Mashayekhan, Shohre (Supervisor) ; Maghsudi, Vida (Supervisor)
    Abstract
    Generally, the concept of producing ‘spare parts’ of the body for replacement of damaged or lost organs lies at the core of the varied biotechnological practices referred as tissue engineering. Tissue engineering is an interdisciplinary field that incorporates principles of engineering with the life sciences. Tissue engineering is based on three principle; cells, scaffolds for cells expansion, attachment as an environment like ECM and growth factors. These things together can help tissue engineers to provide microenvironments which are suitable for special cells. The most important thing in this kind of works is the ability to simulate environment for cells the same as body. According to the... 

    Antioxidant Production from Rice Bran and Optimization of the Process

    , M.Sc. Thesis Sharif University of Technology Arab, Fatemeh (Author) ; Alemzadeh, Iran (Supervisor) ; Maghsoudi, Vida (Supervisor)
    Abstract
    An antioxidant is a molecule capable of preventing the oxidation of other molecules and neutralizing free radicals. Free radicals are the root cause for many human diseases.Rice bran is one of the most important co-products in the rice milling.In this research antioxidant activity of two Iranian rice bran varieties Fajr and Tarem, extracted by three different solvents (methanol, ethanol and ethyl acetate),determined at different time of extraction by measurement of total phenolic content, free radical scavenging, inhabitation of linoleic acid peroxidation and reducing power. The methanolic extract of Fajr rice bran produced strong results in antioxidant activity. The amount of Total... 

    Coverage improvement in femtocell networks via efficient utility pricing

    , Article IET Communications ; Volume 10, Issue 16 , 2016 , Pages 2215-2221 ; 17518628 (ISSN) Shafiei kordshouli, M ; Zeinalpour Yazdi, Z ; Ramezanian, R ; Sharif University of Technology
    Institution of Engineering and Technology  2016
    Abstract
    Employing femtocell technology noticeably improves both the indoor coverage and the overall cellular network's capacity. In the downlink scenario, when macrocell users (MUs) are far from the macro base station (MBS) and close to the femto access points (FAPs), the transmitted signals of FAPs to their users cause severe interference on MUs. One solution to overcome this issue is serving MUs by neighbouring FAPs. Generally femtocells are selfish and have no desire to allocate their resources to MUs. In this study, a framework to motivate femtocells to share their free resources with MUs is proposed. In this framework, the femtocells are assumed to belong to a specific unit. The unit encourages...