Loading...
Search for:
safi--g
0.094 seconds
Total 2424 records
An evaluation method for aspectual modeling of distributed software architectures
, Article 6th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2008, Doha, 31 March 2008 through 4 April 2008 ; 2008 , Pages 903-908 ; 9781424419685 (ISBN) ; Montaghami, V ; Safi, G ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
2008
Abstract
Dealing with crosscutting requirements in software development usually makes the process more complex. Modeling and analyzing of these requirements in the software architecture facilitate detecting architectural risks early. Distributed systems have more complexity and so these facilities are much useful in development of such systems. Aspect oriented Architectural Description Languages(ADL) have emerged to represent solutions for discussed problems; nevertheless, imposing radical changes to existing architectural modeling methods is not easily acceptable by architects. Software architecture analysis methods, furthermore, intend to verify that the quality requirements have been addressed...
A Framework for Users' Privacy Preserving of Instant Messaging on Mobile Social Networks
, Ph.D. Dissertation Sharif University of Technology ; Movaghar, Ali (Supervisor)
Abstract
In recent years, mobile social networks have largely been developed and gained considerable popularity. With the development of smartphones, the growth rate of users on mobile social networks has dramatically increased, with users constantly interacting and sharing their various private and public data. Such volume of information can be used for profitable purposes and may affect the users' privacy. However, due to the limitations of smartphones and the trivial and costly encryption, entrusting the encryption to the user, both for users and for the service provider will be challenging, thus, social network providers themselves take charge that can compromise the privacy. In this...
A service based approach to self-adaptive software systems based on constructing a group of autonomic elements
, Article Proceedings of the 7th IEEE International Conference and Workshop on Engineering of Autonomic and Autonomous Systems, EASe 2010, 22 March 2010 through 26 March 2010 ; March , 2010 , Pages 101-105 ; 9780769540047 (ISBN) ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
2010
Abstract
As requirements and environments become much more complex, the need for self-adaptive and self-healing software system grows. There are several existing works which present such systems by using different approaches. Using alternative solutions to provide a service or requirement is one of the most important approaches among existing works. In this paper an alternative-based approach for adding self-adaptive capabilities to software systems is proposed. In this approach a group of autonomic elements will be constructed based on different design or implementations that could be considered for a specific service or requirement. By using this approach, a highly adaptive software system could be...
Performance Optimization of SBR Reactors Using Fluidized Media (Conversion of SBR to SMBBR)
, M.Sc. Thesis Sharif University of Technology ; Borghei, Mehdi (Supervisor)
Abstract
In recent years, utilization of hybrid attached and suspended growth system for modification of conventional activated sludge systems has attracted a lot of attentions. Nowadays, with development of urban areas and also introducing new emerging contaminants and as a result an increase in the influent loading of wastewater treatment facilities, the importance of upgrading and retrofitting available facilities have been highlighted. Conversion of Sequencing Batch Reactors to Sequencing Batch Biofilm Reactors is a viable solution for overcoming these problems. Eventhough several researches have been conducted on removal of different contaminants through these systems, the information about the...
A novel approach for avoiding wormhole attacks in VANET
, Article 1st South Central Asian Himalayas Regional IEEE/IFIP International Conference on Internet, AH-ICI 2009, 3 November 2009 through 5 November 2009, Kathmundu ; 2009 ; 9781424445707 (ISBN) ; Movaghar, A ; Mohammadizadeh, M ; Sharif University of Technology
2009
Abstract
Different attacks on routing protocols in ad hoc networks occur that one of the most dangerous types is called wormhole attack. This attack happens with the assistance of at least two or more malicious nodes. In this attack nodes create a private tunnel which if a packet comes to one of them, it will be guided to other pair of these malicious nodes by this tunnel and that node broadcasts it into network. This action provides a short connection in the network that is controlled by these malicious nodes. Hence they control all Packets that come to them and threaten the security of data within packets or delete them. Totally, what a wormhole does is an incorrect understanding of network...
SEAODV: Secure efficient AODV routing protocol for MANETs networks
, Article ACM International Conference Proceeding Series, 24 November 2009 through 26 November 2009, Seoul ; Volume 403 , 2009 , Pages 940-944 ; 9781605587103 (ISBN) ; Movaghar, A ; Safi, S. M ; Sharif University of Technology
2009
Abstract
Secure routing is one of the most important topics in the wireless MANETs networks. MANETs networks don't have a central infrastructure for the management of routing in the networks. Each node independently routes and sends packets, so many attacks such as forging, modifying, and denial of service (DoS), Occur in these networks. In this paper, we present the new protocol, SEAODV; Secure Efficient Ad-hoc on Demand Routing Protocol for MANETs networks. SEAODV is based on the AODV algorithm and in comparison with existing secure AODV protocols such as SAODV, ARAN and SEAR have improved security and performances. SEAODV uses HEAP authentication Scheme with symmetric cryptography and one-way hash...
A novel approach for avoiding wormhole attacks in VANET
, Article 2nd International Workshop on Computer Science and Engineering, WCSE 2009, 28 October 2009 through 30 October 2009 ; Volume 2 , 2009 , Pages 160-165 ; 9780769538815 (ISBN) ; Movaghar, A ; Mohammadizadeh, M ; Sharif University of Technology
2009
Abstract
Different attacks on routing protocols in ad hoc networks occur that one of the most dangerous types is called wormhole attack. This attack happens with the assistance of at least two or more malicious nodes. In this attack nodes create a private tunnel which if a packet comes to one of them, it will be guided to other pair of these malicious nodes by this tunnel and that node broadcasts it into network. This action provides a short connection in the network that is controlled by these malicious nodes. Hence they control all Packets that come to them and threaten the security of data within packets or delete them. Totally, what a wormhole does is an incorrect understanding of network...
Privacy protection scheme for mobile social network
, Article Journal of King Saud University - Computer and Information Sciences ; Volume 34, Issue 7 , 2022 , Pages 4062-4074 ; 13191578 (ISSN) ; Movaghar, A ; Ghorbani, M ; Sharif University of Technology
King Saud bin Abdulaziz University
2022
Abstract
In the recent years, popularity and number of users of mobile social networks have grown significantly. Due to different types of communication on these networks, users share a lot of information with each other. One of the most critical challenges of social networks is disclosure and unauthorized access to information, data, and communication between users that is a kind of violation of their privacy, which can be done by social network providers, especially unauthorized users. One way to protect one's privacy is using encryption. Therefore, in the present paper, an improved secure design was presented for mobile social network using ciphertext-policy attribute-based encryption (CP-ABE) and...
Fabrication of Superstrate Copper Indium Sulfide Solar Cell Avoiding Titanium Dioxide Blocking Layer
, M.Sc. Thesis Sharif University of Technology ; Taghavinia, Nima (Supervisor)
Abstract
During recent years, thin-film solar cells based on chalcogenide light absorbers with CuInxGa1-xS(Se)2 compound have attracted considerable attraction due to their desirable band gaps and demonstrated high power conversion efficiencies. These solar cells are fabricated under two categories named as ‘substrate’ and ‘superstrate’, generally. The best reported energy conversion efficiency belongs to substrate type (sodalime glass/Mo/absorber layer/buffer layer/window layer) CIGS solar cells, most have been fabricated with vacuum processes. In spite of this, superstrate solar cells (transparent conducting oxide/blocking layer/buffer layer/absorber layer/back contact) provide easier and cheaper...
A framework for protecting privacy on mobile social networks
, Article Mobile Networks and Applications ; Volume 26, Issue 3 , 2021 , Pages 1281-1299 ; 1383469X (ISSN) ; Movaghar, A ; Safikhani Mahmoodzadeh, K ; Sharif University of Technology
Springer
2021
Abstract
In recent years, mobile social networks have largely been developed and gained considerable popularity. An approach to protecting privacy on mobile social networks is the use of encryption and access control. Good alternatives for use on mobile social networks are the Public Broadcast Encryption approach for appropriate concordance and consistency with the structure of social networks as well as the Attribute-Based Encryption owing to its capability and proper implementation of the access control policy. Accordingly, in this paper, a framework was presented based on the Public Broadcast Encryption and Attribute-Based Encryption. Using proxies, we outsourced some of these operations in the...
Investigation of Flooding Phenomena in Gas-liquid Flow
, M.Sc. Thesis Sharif University of Technology ; Nouri-Broujerdi, Ali (Supervisor)
Abstract
In a counter current two phase flow systems that liquid flows downward due to gravity on the pipe wall and gas flows upward due to pressure gradient in the pipe core, Flooding and reversal Flooding are important phenomena. Flooding is beginning of velocity direction change of liquid from downward to upward that with zero axial velocity of liquid in interface, liquid is on verge of moving upward. When mass flow rate of liquid or gas increase, some part of liquid film are separated and enter the gas stream. With further increase in mass flow rate of liquid or gas in flooding point, reversal flooding occurs that cause to all liquid film flows upward. Flooding and reversal flooding phenomena are...
Improvement of size-based particle separation throughput in slanted spiral microchannel by modifying outlet geometry
, Article Electrophoresis ; Volume 41, Issue 5-6 , February , 2020 , Pages 353-359 ; Maleki Jirsaraei, N ; Rouhani, S ; Safi, S ; Alizadeh, M ; Sharif University of Technology
Wiley-VCH Verlag
2020
Abstract
The inertial microfluidic technique, as a powerful new tool for accurate cell/particle separation based on the hydrodynamic phenomenon, has drawn considerable interest in recent years. Despite numerous microfluidic techniques of particle separation, there are few articles in the literature on separation techniques addressing external outlet geometry to increase the throughput efficiency and purity. In this work, we report on a spiral inertial microfluidic device with high efficiency (>98%). Herein, we demonstrate how changing the outlet geometry can improve the particle separation throughput. We present a complete separation of 4 and 6 μm from 10 μm particles potentially applicable to...
Preparation and Properties of PZT-PMN Ceramics using nano PZT Particles Obtained from Microemulsion Method
, M.Sc. Thesis Sharif University of Technology ; Nemati, Ali (Supervisor) ; Rahmanifar, Mohammad Safi (Supervisor)
Abstract
Microemulsion is one of the major processing techniques to synthesize a nano, homogeneous, and almost agglomerate-free powders. Any kind of oxide ceramics such as piezoelectric ceramics can be synthesis via this method in nano scale without the formation of any intermediate phase. In this study, Lead zirconate titanate (PZT) powders with composition near the morphotropic phase boundary (MPB) have been synthesized via a microemulsion processing route. This emulsion system is a thermodynamically stable mixture of oil (cyclohexane), nonionic surfactant (Triton X100), and an aqueous solution containing specific amount of Pb2+, Zr4+ and Ti4+. The ratio of these ions was adjusted with using ICP....
Effect of SiO2 content on Y-TZP/Al2O3 ceramic-nanocomposite properties as potential dental applications
, Article Ceramics International ; Volume 46, Issue 8 , 2020 , Pages 10910-10916 ; SharifianJazi, F ; Esmaeilkhanian, A ; Moradi, M ; Safi Samghabadi, A. H ; Sharif University of Technology
Elsevier Ltd
2020
Abstract
Yttria-stabilized tetragonal zirconia polycrystals (Y-TZP) have been widely applied in fixed partial prostheses as well as dental uses i.e. a substructure for crowns. However, Y-TZP has limited applications, which is due to the presence of defects in its microstructure introduced during the manufacturing process. Accordingly, due to Y-TZP limitations, the novel (X)Y-TZP- 20Al2O3-(80-X) SiO2 (X = 65, 70 and 75) ceramic nanocomposites were successfully fabricated via the powder metallurgy method. X-ray diffraction (XRD) patterns of commercial powders showed the stabilization of monoclinic zirconia (ZM) by increasing the silica content. In order to determine the fracture load and micro-bending...
Semi-IPN carrageenan-based nanocomposite hydrogels: Synthesis and swelling behavior
, Article Journal of Applied Polymer Science ; Volume 118, Issue 5 , 2010 , Pages 2989-2997 ; 00218995 (ISSN) ; Marandi, G. B ; Pourjavadi, A ; Kiani, G ; Sharif University of Technology
2010
Abstract
Inclusion of nano-clays into hydrogels is an efficient approach to produce nanocomposite hydrogels. The introduction of nano-clay into hydrogels causes an increase in water absorbency. In the present work, Nanocomposite hydro-gels based on kappa-carrageenan were synthesized using sodium montmorillonite as nano-clay. Acrylamide and meth-ylenebisacrylamide were used as monomer and crosslinker, respectively. The structure of nanocomposite hydrogels was investigated by XRD and SEM techniques. Swelling behavior of nanocomposite hydrogels was studied by varying clay and carrageenan contents as well as methylenebisacrylamide concentration. An optimum swelling capacity was achieved at 12% of sodium...
Comparison between isothermal and non-isothermal fatigue behavior in a cast aluminum-silicon-magnesium alloy
, Article Strength of Materials ; Volume 47, Issue 6 , November , 2015 , Pages 840-848 ; 00392316 (ISSN) ; Winter, G ; Farrahi, G. H ; Sharif University of Technology
Springer New York LLC
2015
Abstract
In the present study, the out-of-phase thermomechanical fatigue (OP-TMF) behavior of a cast aluminum-silicon-magnesium alloy, the A356.0 alloy which has been widely used in diesel engine cylinder heads, is compared to room-temperature and high-temperature low cycle fatigue (RT-, HT-LCF) behaviors. For this purpose, strain/temperature-controlled isothermal and non-isothermal fatigue tests were performed based on realistic loading conditions in cylinder heads. Fatigue tests results showed that the plastic strain increased during cycles under constant mechanical strain amplitude, while the specimen failed. Under LCF loadings, the cyclic hardening occurred at low temperatures for the A356.0...
Machine learning in energy economics and finance: A review
, Article Energy Economics ; Volume 81 , 2019 , Pages 709-727 ; 01409883 (ISSN) ; Creamer, G. G ; Rafizadeh, N ; Sharif University of Technology
Elsevier B.V
2019
Abstract
Machine learning (ML) is generating new opportunities for innovative research in energy economics and finance. We critically review the burgeoning literature dedicated to Energy Economics/Finance applications of ML. Our review identifies applications in areas such as predicting energy prices (e.g. crude oil, natural gas, and power), demand forecasting, risk management, trading strategies, data processing, and analyzing macro/energy trends. We critically review the content (methods and findings) of more than 130 articles published between 2005 and 2018. Our analysis suggests that Support Vector Machine (SVM), Artificial Neural Network (ANN), and Genetic Algorithms (GAs) are among the most...
Fault-tolerant earliest-deadline-first scheduling algorithm
, Article 21st International Parallel and Distributed Processing Symposium, IPDPS 2007, Long Beach, CA, 26 March 2007 through 30 March 2007 ; 2007 ; 1424409101 (ISBN); 9781424409105 (ISBN) ; Miremadi, S. G ; Deconinck, G ; Sharif University of Technology
2007
Abstract
The general approach to fault tolerance in uniprocessor systems is to maintain enough time redundancy in the schedule so that any task instance can be re-executed in presence of faults during the execution. In this paper a scheme is presented to add enough and efficient time redundancy to the Earliest-Deadline-First (EDF) scheduling policy for periodic real-time tasks. This scheme can be used to tolerate transient faults during the execution of tasks. We describe a recovery scheme which can be used to re-execute tasks in the event of transient faults and discuss conditions that must be met by any such recovery scheme. For performance evaluation of this idea a tool is developed. © 2007 IEEE
Addressing NoC reliability through an efficient fibonacci-based crosstalk avoidance codec design
, Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 18 November 2015 through 20 November 2015 ; Volume 9530 , 2015 , Pages 756-770 ; 03029743 (ISSN); 9783319271361 (ISBN) ; Miremadi, S. G ; Wang, G ; Perez, G. M ; Zomaya, A ; Li, K ; Sharif University of Technology
Springer Verlag
2015
Abstract
The reliable transfer in Network on Chips (NoCs) can be threatened by crosstalk fault occurring in wires. Crossstalk fault is due to inter-wire coupling capacitance that based on the patterns of transitions appearing on the wires, significantly limits the reliability of NoCs. Among these transitions, 101 and 010 bit patterns impose the worst crosstalk effects to wires. This work intends to increase the reliability of NoCs against crosstalk faults by applying an improved Fibonacci-based numeral system, called Doubled-Penultimate Fibonacci (DP-Fibo). In the DP-Fibo coding algorithm, code words without ‘101’ and ‘010’ bit patterns are produced to reduce crosstalk faults. Experimental results...
Prediction by Genetic Algorithm and measurement by center hole drilling of residual stresses of MAG weldment
, Article Advanced Materials Research, 2 November 2008 through 5 November 2008 ; Volume 83-86 , 2010 , Pages 738-745 ; 10226680 (ISSN) ; 0878492976 (ISBN); 9780878492978 (ISBN) ; Majzoobi, G. H ; Fadaee, A ; Sharif University of Technology
2010
Abstract
In the present work, specimens were cut out from St-37 plates with 19 mm thickness. The thickness of plates was reduced to 12.5 mm by milling and grinding operations. Then a standard V-shaped fillet was made on one edge of the plates. Two plates were butt-welded by standard metal arc gas (MAG) welding process. Residual stresses induced by welding were measured on 20 specimens by centre hole drilling. Load controlled axial fatigue tests were carried out to determine the fatigue life of specimens. Crack growth rates were obtained from experiment. Fractography of specimens was performed. Genetic Algorithm (GA) was employed for prediction of residual stress value in weldments using the crack...