Loading...
Search for: salimi--m
0.152 seconds

    VulSlicer: Vulnerability detection through code slicing

    , Article Journal of Systems and Software ; Volume 193 , 2022 ; 01641212 (ISSN) Salimi, S ; Kharrazi, M ; Sharif University of Technology
    Elsevier Inc  2022
    Abstract
    There has been a multitude of techniques proposed for identifying vulnerabilities in software. Forcing a program into a vulnerable state has become increasingly unscalable, given the size of the programs and the number of possible execution states. At the same time, techniques that are looking for vulnerability signatures are marred with weak and incomplete signatures. This is not to say that such techniques have failed to identify previously unknown vulnerabilities in the code. However, they have inherent weaknesses, which result in identifying vulnerabilities that are limited in type and complexity. We propose a novel technique to extract succinct vulnerability-relevant statements... 

    The olfactory bulb modulates entorhinal cortex oscillations during spatial working memory

    , Article Journal of Physiological Sciences ; Volume 71, Issue 1 , 2021 ; 18806546 (ISSN) Salimi, M ; Tabasi, F ; Nazari, M ; Ghazvineh, S ; Salimi, A ; Jamaati, H ; Raoufy, M. R ; Sharif University of Technology
    BioMed Central Ltd  2021
    Abstract
    Cognitive functions such as working memory require integrated activity among different brain regions. Notably, entorhinal cortex (EC) activity is associated with the successful working memory task. Olfactory bulb (OB) oscillations are known as rhythms that modulate rhythmic activity in widespread brain regions during cognitive tasks. Since the OB is structurally connected to the EC, we hypothesized that OB could modulate EC activity during working memory performance. Herein, we explored OB–EC functional connectivity during spatial working memory performance by simultaneous recording local field potentials when rats performed a Y-maze task. Our results showed that the coherence of delta,... 

    New lifting relations for estimating LBM distribution functions from corresponding macroscopic quantities, based on equilibrium and non-equilibrium moments

    , Article Journal of Computational Physics ; Volume 302 , 2015 , Pages 155-175 ; 00219991 (ISSN) Salimi, M. R ; Taeibi Rahni, M ; Sharif University of Technology
    2015
    Abstract
    Due to superior accuracy and stability of multiple relaxation time (MRT) collision operator over its single relaxation time (SRT) counterpart, new lifting relations are proposed here to construct single particle distribution functions for MRT-LBM from macroscopic variables. Using these lifting relations, a new hybrid FVM-LB method is presented (called Finite type-LB hybrid method), which is consistent with MRT-LBM. In this new hybrid method, single-particle distribution functions in MRT-LBM sub-domain boundaries are computed, using equilibrium and non-equilibrium moments. These moments are computed in Navier-Stokes/FVM sub-domain boundaries, using macroscopic variables and their derivatives.... 

    Improving real world vulnerability characterization with vulnerable slices

    , Article PROMISE 2020 - Proceedings of the 16th ACM International Conference on Predictive Models and Data Analytics in Software Engineering, Co-located with ESEC/FSE 2020, 8 November 2020 through 9 November 2020 ; 2020 , Pages 11-20 Salimi, S ; Ebrahimzadeh, M ; Kharrazi, M ; Sharif University of Technology
    Association for Computing Machinery, Inc  2020
    Abstract
    Vulnerability detection is an important challenge in the security community. Many different techniques have been proposed, ranging from symbolic execution to fuzzing in order to help in identifying vulnerabilities. Even though there has been considerable improvement in these approaches, they perform poorly on a large scale code basis. There has also been an alternate approach, where software metrics are calculated on the overall code structure with the hope of predicting code segments more likely to be vulnerable. The logic has been that more complex code with respect to the software metrics, will be more likely to contain vulnerabilities. In this paper, we conduct an empirical study with a... 

    Adaptive control of robot manipulators including actuator dynamics and without joint torque measurement

    , Article 2010 IEEE International Conference on Robotics and Automation, ICRA 2010, Anchorage, AK, 3 May 2010 through 7 May 2010 ; 2010 , Pages 4639-4644 ; 10504729 (ISSN) ; 9781424450381 (ISBN) Salimi Khaligh, Y ; Namvar, M ; Sharif University of Technology
    2010
    Abstract
    Ignoring actuator dynamics in control of rigid manipulators can in practice result in performance degradation or loss of system stability. However, consideration of actuator dynamics usually requires measurement of robot joint torques. This paper addresses motion tracking control of an n-DOF rigid robot by taking into account its actuator dynamics. Joint torque measurement is avoided by using an adaptive observer. The backstepping technique is adopted to develop a dynamically smooth adaptive nonlinear controller dealing with uncertainties in manipulator and actuator dynamics. Semi-global convergence of motion tracking errors as well as torque estimation error are proven without any... 

    Rate regions of secret key sharing in a new source model

    , Article IET Communications ; Volume 5, Issue 4 , March , 2011 , Pages 443-455 ; 17518628 (ISSN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    A source model for secret key generation between terminals is considered. Two users, namely users 1 and 2, at one side communicate with another user, namely user 3, while at the other side via a public channel where three users can observe i.i.d. outputs of correlated sources. Each of users 1 and 2 intends to share a secret key with user 3 where user 1 acts as a wiretapper for user 2 and vice versa. In this model, two situations are considered: communication from users 1 and 2 to user 3 (the forward key strategy) and from user 3 to users 1 and 2 (the backward key strategy). In both situations, the goal is sharing a secret key between user 1 and user 3 while leaking no effective information... 

    Key agreement over multiple access channel using feedback channel

    , Article IEEE International Symposium on Information Theory - Proceedings, 31 July 2011 through 5 August 2011 ; August , 2011 , Pages 1970-1974 ; 21578104 (ISSN) ; 9781457705953 (ISBN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    In this paper, the effect of using an insecure and noiseless feedback channel in increasing secret key rates is investigated. There is a generalized discrete memoryless multiple access channel (GDMMAC) between two transmitters and a receiver where, in addition to the receiver, both of the transmitters receive noisy channel outputs. Furthermore, an insecure and noiseless feedback channel exists from the receiver to the transmitters. Each of the transmitters intends to share a secret key with the receiver while keeping it concealed from the other transmitter. For this setup, an inner bound of the secret key capacity region is derived. For some special cases, the secret key capacity region is... 

    Generalised secure distributed source coding with side information

    , Article IET Communications ; Volume 4, Issue 18 , 2010 , Pages 2262-2272 ; 17518628 (ISSN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2010
    Abstract
    New inner and outer bounds on the achievable compression-equivocation rate region for generalised secure data compression with side information are given that do not match in general. In this setup, two senders, Alice and Charlie intend to transmit information to Bob via channels with limited capacity so that he can reliably reconstruct their observations. The eavesdropper, Eve, has access to one of the channels at each instant and is interested in the source of the same channel at the time. Bob and Eve also have their own observations, which are correlated with Alice's and Charlie's observations. In this model, two equivocation and compression rates are defined with respect to the sources... 

    Secret key rate region of multiple access channel model

    , Article ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications, 17 October 2010 through 20 October 2010, Taichung ; 2010 , Pages 197-202 ; 9781424460175 (ISBN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2010
    Abstract
    A channel model for secret key generation between three terminals is considered. In this model, there is a two-user generalized multiple access channel (MAC) in which, in addition to the receiver, both transmitters receive noisy channel outputs. There is also a one-way public channel from the transmitters to the receiver. In this model, each of the transmitters intends to share a secret key with the receiver using the MAC and the public channel where the transmitters are eavesdroppers with respect to each other. In this setup, the channel outputs at the transmitters are only used for eavesdropping and not as inputs to the encoders. For the secret key rate pair, we derive the inner bound of... 

    A new capacity upper bound for "relay-with-delay" channel

    , Article 2009 IEEE International Symposium on Information Theory, ISIT 2009, Seoul, 28 June 2009 through 3 July 2009 ; 2009 , Pages 26-30 ; 21578102 (ISSN); 9781424443130 (ISBN) Salimi, A ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    2009
    Abstract
    In this paper we prove a new capacity upper bound for a class of relay channels known as Relay-With-Delay channels. The proposed bound is general and holds for any arbitrary amount of delay. We have shown that the previously introduced bounds can be considered as special cases of our proposed upper bound. The new introduced bound is, in some cases, tighter than the previously established bounds. It is also notable that the proposed bound coincides with the previously known capacity of "Relay-With-Delay" channels. © 2009 IEEE  

    Pairwise secret key agreement using the source common randomness

    , Article Proceedings of the International Symposium on Wireless Communication Systems, 28 August 2012 through 31 August 2012 ; Aug , 2012 , Pages 751-755 ; 21540217 (ISSN) ; 9781467307604 (ISBN) Salimi, S ; Skoglund, M ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2012
    Abstract
    A secret key agreement setup between three users is considered in which each pair of them wishes to agree on a secret key hidden from the remaining user. The three users observe i.i.d. outputs of correlated sources and there is a noiseless public channel from each user for communication to the others. In this setup, inner and outer bounds of the secret key capacity region is derived. Moreover, some special cases are obtained in which the inner bound coincides the explicit outer bound. Also a binary-erasure example is presented through which the results are examined  

    Heat transfer analysis of a porously covered heated square cylinder, using a hybrid Navier-Stokes-lattice Boltzmann numerical method

    , Article International Journal of Thermal Sciences ; Volume 91 , May , 2015 , Pages 59-75 ; 12900729 (ISSN) Salimi, M. R ; Taeibi Rahni, M ; Jam, F ; Sharif University of Technology
    Elsevier Masson SAS  2015
    Abstract
    In this work, two-dimensional laminar flow and heat transfer across a heated square cylinder, covered by a porous layer in a plane channel have been numerically investigated. The flow and thermal fields inside the porous layer were simulated using BrinkmaneForchmeyer extended Darcy model. Simulations were performed in different Reynolds numbers (Re = 60, 120, 160, and 200), porosities (ω = 0.7, 0.87, and 0.96), solid to fluid thermal conductivity ratios (λR = 10, 200, and 2000) and blockage ratios (BR = 0.5, 0.25 and 0.125). The effects of the mentioned parameters on pressure drop and heat transfer rate were investigated in detail. Also, the contribution of each side of the central squared... 

    Pore-scale simulation of fluid flow passing over a porously covered square cylinder located at the middle of a channel, using a hybrid MRT-LBM–FVM approach

    , Article Theoretical and Computational Fluid Dynamics ; Volume 29, Issue 3 , 2015 , Pages 171-191 ; 09354964 (ISSN) Salimi, M. R ; Taeibi Rahni, M ; Jam, F ; Sharif University of Technology
    Springer New York LLC  2015
    Abstract
    A comprehensive study was performed to analyze the unsteady laminar flow characteristics around a porously covered, a fully porous, and a solid squared section cylinder located in the middle of a plane channel. In order to simulate fluid flow inside porous media and porous–fluid interface accurately (minimizing modeling error), the porous region was analyzed in pore scale, using LBM. Additionally, to minimize the LBM-related compressibility error through the porous region, a multi-block multiple relaxation time lattice Boltzmann method (MRT-LBM) was used. Also, to decrease CPU time, a Navier–Stokes flow solver, based on finite volume method and SIMPLE algorithm, was coupled with MRT-LBM to... 

    Heat transfer and entropy generation analysis in a three-dimensional impinging jet porous heat sink under local thermal non-equilibrium condition

    , Article International Journal of Thermal Sciences ; Volume 153 , 2020 Salimi, M. R ; Taeibi Rahni, M ; Rostamzadeh, H ; Sharif University of Technology
    Elsevier Masson SAS  2020
    Abstract
    A precise heat transfer simulation of a three-dimensional impinging jet porous heat sink is presented and is analyzed from thermodynamics vantage point under local thermal non-equilibrium condition. To increase the computational efficiency of the analysis, pore-scale modeling based on lattice Boltzmann method (LBM) is used inside the porous media (at a meso-scale), whilst finite volume method (FVM) is employed around it (at a macro-scale). The effects of the Reynolds number, porous layer thickness, solid/fluid thermal conductivity ratio, and porosity on the critical heat transfer and entropy generation parameters are investigated. Additionally, the relations between viscous entropy... 

    Compound triple jets film cooling improvements via velocity and density ratios: Large eddy simulation

    , Article Journal of Fluids Engineering, Transactions of the ASME ; Volume 133, Issue 3 , Mar , 2011 ; 00982202 (ISSN) Farhadi Azar, R ; Ramezanizadeh, M ; Taeibi Rahni, M ; Salimi, M ; Sharif University of Technology
    2011
    Abstract
    The flow hydrodynamic effects and film cooling effectiveness placing two small coolant ports just upstream the main jet (combined triple jets) were numerically investigated. Cross sections of all jets are rectangular and they are inclined normally into the hot cross-flow. The finite volume method and the SIMPLE algorithm on a multiblock nonuniform staggered grid were applied. The large-eddy simulation approach with three different subgrid scale models was used. The obtained results showed that this flow configuration reduces the mixing between the freestream and the coolant jets and hence provides considerable improvements in film cooling effectiveness (both centerline and spanwise averaged... 

    New hybrid finite volume-thermal lattice Boltzmann method, based on multi relaxation time collision operator

    , Article International Journal of Heat and Mass Transfer ; Volume 138 , 2019 , Pages 1281-1294 ; 00179310 (ISSN) Salimi, M. R ; Alizadeh Seresht, E ; Taeibi Rahni, M ; Sharif University of Technology
    Elsevier Ltd  2019
    Abstract
    Hybrid FVM-LBM schemes are developed in the past few years to use capabilities of both Navier-Stokes based finite volume method (FVM) and lattice Boltzmann method (LBM) to solve macro-meso multiscale problems. In this scheme, the major task is to develop some lifting relations that reconstruct distribution functions in LBM sub-domain from macroscopic variables and their derivatives. The macroscopic variables are computed using Navier-Stokes based FVM in macroscale sub-domain, while distribution functions are computed using LBM in mesoscale sub-domain. The pioneer works in this area used the single relaxation time (SRT) version of LBM. However, it is known that the numerical stability and... 

    Prediction of asphaltene deposition during turbulent flow using heat transfer approach

    , Article Petroleum Science and Technology ; Volume 36, Issue 9-10 , February , 2018 , Pages 632-639 ; 10916466 (ISSN) Salimi, F ; Ayatollahi, S ; Vafaie Seftie, M ; Sharif University of Technology
    Taylor and Francis Inc  2018
    Abstract
    In this study, asphaltene deposition from crude oil has been studied experimentally using a test loop and prediction using theoretical study under turbulent flow (Reynolds numbers below 5000). The effects of many parameters such as oil velocity, surface temperature and concentration of flocculated asphaltene on the asphaltene deposition were investigated. The results showed that asphaltene deposition thickness increases with increasing both surface temperature and concentration of flocculated asphaltene and decreasing oil velocity. Thermal approach was used to describe the mechanisms involved in this process and the results of data fitting showed that there are good agreements between the... 

    Film cooling effectiveness enhancement applying another jet in the upstream neighbor of the main jet-using LES approach

    , Article Journal of Applied Fluid Mechanics ; Volume 9, Issue 1 , 2016 , Pages 33-42 ; 17353572 (ISSN) Salimi, M. R ; Ramezanizadeh, M ; Taeibi Rahni, M ; Farhadi Azar, R ; Sharif University of Technology
    Isfahan University of Technology  2016
    Abstract
    Flow hydrodynamic effects and film cooling effectiveness of placing a coolant port (upstream jet) just upstream of the main cooling jet were numerically investigated. The upstream jet was added such that the total cooling cross section (cross sections of the main and upstream jets) remains constant, in comparison to the case of ordinary cooling jet. The finite volume method and the unsteady SIMPLE algorithm on a multi- block non-uniform staggered grid arrangement were applied. The large eddy simulation (LES) approach with the one equation subgrid scale model was used. The jet to cross flow velocity ratio (for both of the main and the upstream jets) is 0.5 and the cross flow Reynolds number... 

    Allergic rhinitis impairs working memory in association with drop of hippocampal – Prefrontal coupling

    , Article Brain Research ; Volume 1758 , 2021 ; 00068993 (ISSN) Salimi, M ; Ghazvineh, S ; Nazari, M ; Dehdar, K ; Garousi, M ; Zare, M ; Tabasi, F ; Jamaati, H ; Salimi, A ; Barkley, V ; Mirnajafi Zadeh, J ; Raoufy, M. R ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    Allergic rhinitis (AR) is a chronic inflammatory disease frequently associated with a deficit in learning and memory. Working memory is an important system for decision making and guidance, which depends on interactions between the ventral hippocampus (vHipp) and the prelimbic prefrontal cortex (plPFC). It is still unclear whether AR influences the activity and coupling of these brain areas, which consequently may impair working memory. The current study aimed to examine alterations of the vHipp-plPFC circuit in a rat model of AR. Our results show decreased working memory performance in AR animals, accompanied by a reduction of theta and gamma oscillations in plPFC. Also, AR reduces... 

    Key agreement over multiple access channel

    , Article IEEE Transactions on Information Forensics and Security ; Volume 6, Issue 3 PART 1 , 2011 , Pages 775-790 ; 15566013 (ISSN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; Golic, J. D ; Sharif University of Technology
    2011
    Abstract
    In this paper, a generalized multiple access channel (MAC) model for secret key sharing between three terminals is considered. In this model, there are two transmitters and a receiver where all three terminals receive noisy channel outputs. In addition, there is a one-way public channel from the transmitters to the receiver. Each of the transmitters intends to share a secret key with the receiver by using the MAC and the public channel, where the transmitters are eavesdroppers with respect to each other. Two strategies for secret key sharing are considered, namely, the pregenerated key strategy and the two-stage key strategy. For both of them, inner and outer bounds of the secret key...