Loading...
Search for: salimi--m--r
0.133 seconds

    Rate regions of secret key sharing in a new source model

    , Article IET Communications ; Volume 5, Issue 4 , March , 2011 , Pages 443-455 ; 17518628 (ISSN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    A source model for secret key generation between terminals is considered. Two users, namely users 1 and 2, at one side communicate with another user, namely user 3, while at the other side via a public channel where three users can observe i.i.d. outputs of correlated sources. Each of users 1 and 2 intends to share a secret key with user 3 where user 1 acts as a wiretapper for user 2 and vice versa. In this model, two situations are considered: communication from users 1 and 2 to user 3 (the forward key strategy) and from user 3 to users 1 and 2 (the backward key strategy). In both situations, the goal is sharing a secret key between user 1 and user 3 while leaking no effective information... 

    Key agreement over multiple access channel using feedback channel

    , Article IEEE International Symposium on Information Theory - Proceedings, 31 July 2011 through 5 August 2011 ; August , 2011 , Pages 1970-1974 ; 21578104 (ISSN) ; 9781457705953 (ISBN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    In this paper, the effect of using an insecure and noiseless feedback channel in increasing secret key rates is investigated. There is a generalized discrete memoryless multiple access channel (GDMMAC) between two transmitters and a receiver where, in addition to the receiver, both of the transmitters receive noisy channel outputs. Furthermore, an insecure and noiseless feedback channel exists from the receiver to the transmitters. Each of the transmitters intends to share a secret key with the receiver while keeping it concealed from the other transmitter. For this setup, an inner bound of the secret key capacity region is derived. For some special cases, the secret key capacity region is... 

    Generalised secure distributed source coding with side information

    , Article IET Communications ; Volume 4, Issue 18 , 2010 , Pages 2262-2272 ; 17518628 (ISSN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2010
    Abstract
    New inner and outer bounds on the achievable compression-equivocation rate region for generalised secure data compression with side information are given that do not match in general. In this setup, two senders, Alice and Charlie intend to transmit information to Bob via channels with limited capacity so that he can reliably reconstruct their observations. The eavesdropper, Eve, has access to one of the channels at each instant and is interested in the source of the same channel at the time. Bob and Eve also have their own observations, which are correlated with Alice's and Charlie's observations. In this model, two equivocation and compression rates are defined with respect to the sources... 

    Secret key rate region of multiple access channel model

    , Article ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications, 17 October 2010 through 20 October 2010, Taichung ; 2010 , Pages 197-202 ; 9781424460175 (ISBN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2010
    Abstract
    A channel model for secret key generation between three terminals is considered. In this model, there is a two-user generalized multiple access channel (MAC) in which, in addition to the receiver, both transmitters receive noisy channel outputs. There is also a one-way public channel from the transmitters to the receiver. In this model, each of the transmitters intends to share a secret key with the receiver using the MAC and the public channel where the transmitters are eavesdroppers with respect to each other. In this setup, the channel outputs at the transmitters are only used for eavesdropping and not as inputs to the encoders. For the secret key rate pair, we derive the inner bound of... 

    A new capacity upper bound for "relay-with-delay" channel

    , Article 2009 IEEE International Symposium on Information Theory, ISIT 2009, Seoul, 28 June 2009 through 3 July 2009 ; 2009 , Pages 26-30 ; 21578102 (ISSN); 9781424443130 (ISBN) Salimi, A ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    2009
    Abstract
    In this paper we prove a new capacity upper bound for a class of relay channels known as Relay-With-Delay channels. The proposed bound is general and holds for any arbitrary amount of delay. We have shown that the previously introduced bounds can be considered as special cases of our proposed upper bound. The new introduced bound is, in some cases, tighter than the previously established bounds. It is also notable that the proposed bound coincides with the previously known capacity of "Relay-With-Delay" channels. © 2009 IEEE  

    The olfactory bulb modulates entorhinal cortex oscillations during spatial working memory

    , Article Journal of Physiological Sciences ; Volume 71, Issue 1 , 2021 ; 18806546 (ISSN) Salimi, M ; Tabasi, F ; Nazari, M ; Ghazvineh, S ; Salimi, A ; Jamaati, H ; Raoufy, M. R ; Sharif University of Technology
    BioMed Central Ltd  2021
    Abstract
    Cognitive functions such as working memory require integrated activity among different brain regions. Notably, entorhinal cortex (EC) activity is associated with the successful working memory task. Olfactory bulb (OB) oscillations are known as rhythms that modulate rhythmic activity in widespread brain regions during cognitive tasks. Since the OB is structurally connected to the EC, we hypothesized that OB could modulate EC activity during working memory performance. Herein, we explored OB–EC functional connectivity during spatial working memory performance by simultaneous recording local field potentials when rats performed a Y-maze task. Our results showed that the coherence of delta,... 

    Pairwise secret key agreement using the source common randomness

    , Article Proceedings of the International Symposium on Wireless Communication Systems, 28 August 2012 through 31 August 2012 ; Aug , 2012 , Pages 751-755 ; 21540217 (ISSN) ; 9781467307604 (ISBN) Salimi, S ; Skoglund, M ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2012
    Abstract
    A secret key agreement setup between three users is considered in which each pair of them wishes to agree on a secret key hidden from the remaining user. The three users observe i.i.d. outputs of correlated sources and there is a noiseless public channel from each user for communication to the others. In this setup, inner and outer bounds of the secret key capacity region is derived. Moreover, some special cases are obtained in which the inner bound coincides the explicit outer bound. Also a binary-erasure example is presented through which the results are examined  

    LBM simulation of electro-osmotic flow (EOF) in nano/micro scales porous media with an inclusive parameters study

    , Article ASME International Mechanical Engineering Congress and Exposition, Proceedings (IMECE) ; Vol. 7 , November , 2014 ; ISBN: 9780791849545 Zakeri, R ; Lee, E. S ; Salimi, M. R ; Sharif University of Technology
    2014
    Abstract
    In this paper, we present our results about simulation of 2D-EOF in Nano/Micro scales porous media using lattice Boltzmann method (LBM) in micro-channel for EOF. The high efficient numerical code use strongly high nonlinear Poisson Boltzmann equation to predicate behavior of EOF in complex geometry. The results are developed with precisely investigation of several effective parameters on permeability of EOF, such as geometry (channel height and number and location of charge), external electric field, thickness of Debye length (ionic concentration), and zeta potential. Our results are in excellent agreement with available analytical results. Our results show that for certain external electric... 

    Film cooling effectiveness enhancement applying another jet in the upstream neighbor of the main jet-using LES approach

    , Article Journal of Applied Fluid Mechanics ; Volume 9, Issue 1 , 2016 , Pages 33-42 ; 17353572 (ISSN) Salimi, M. R ; Ramezanizadeh, M ; Taeibi Rahni, M ; Farhadi Azar, R ; Sharif University of Technology
    Isfahan University of Technology  2016
    Abstract
    Flow hydrodynamic effects and film cooling effectiveness of placing a coolant port (upstream jet) just upstream of the main cooling jet were numerically investigated. The upstream jet was added such that the total cooling cross section (cross sections of the main and upstream jets) remains constant, in comparison to the case of ordinary cooling jet. The finite volume method and the unsteady SIMPLE algorithm on a multi- block non-uniform staggered grid arrangement were applied. The large eddy simulation (LES) approach with the one equation subgrid scale model was used. The jet to cross flow velocity ratio (for both of the main and the upstream jets) is 0.5 and the cross flow Reynolds number... 

    Key agreement over multiple access channel

    , Article IEEE Transactions on Information Forensics and Security ; Volume 6, Issue 3 PART 1 , 2011 , Pages 775-790 ; 15566013 (ISSN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; Golic, J. D ; Sharif University of Technology
    2011
    Abstract
    In this paper, a generalized multiple access channel (MAC) model for secret key sharing between three terminals is considered. In this model, there are two transmitters and a receiver where all three terminals receive noisy channel outputs. In addition, there is a one-way public channel from the transmitters to the receiver. Each of the transmitters intends to share a secret key with the receiver by using the MAC and the public channel, where the transmitters are eavesdroppers with respect to each other. Two strategies for secret key sharing are considered, namely, the pregenerated key strategy and the two-stage key strategy. For both of them, inner and outer bounds of the secret key... 

    Key agreement over a generalized multiple access channel using noiseless and noisy feedback

    , Article IEEE Journal on Selected Areas in Communications ; Volume 31, Issue 9 , 2013 , Pages 1765-1778 ; 07338716 (ISSN) Salimi, S ; Skoglund, M ; Golic, J. D ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2013
    Abstract
    A secret key agreement framework involving three users is considered in which each of the users 1 and 2 intends to share a secret key with user 3 and users 1 and 2 are eavesdroppers with respect to each other. There is a generalized discrete memoryless multiple access channel (GDMMAC) from users 1 and 2 to user 3 where the three users receive outputs from the channel. Furthermore, there is a feedback channel from user 3 to users 1 and 2 through which user 3 sends information extracted from the received output from the GDMMAC to increase the key rates. We consider both noiseless and noisy feedback. In the case of noiseless feedback, a public channel of unlimited capacity from user 3 to users... 

    Synthesis and characterization of new triphenylamine-based dyes with novel anchoring groups for dye-sensitized solar cell applications

    , Article Journal of Materials Science: Materials in Electronics ; Volume 28, Issue 2 , 2017 , Pages 1859-1868 ; 09574522 (ISSN) Salimi Beni, A ; Hosseinzadeh, B ; Azari, M ; Ghahary, R ; Sharif University of Technology
    Springer New York LLC  2017
    Abstract
    Three new chromophores based on the triphenylamine (MM, DM, DN) with various novel electron withdrawing anchoring groups have been synthesized for use in dye-sensitized solar cells (DSSCs). The sensitizers were characterized by 1H and 13C NMR, Mass, UV–Vis, and electrochemical analysis. The HOMO and LUMO electron distributions of the sensitizers were calculated using density functional theory on a B3LYP level for geometry optimization. The DSSC device based on DM dye showed the best photovoltaic performance among MM and DN dyes: maximum monochromatic incident photon-to-current conversion efficiency (IPCE) of 98 %, short circuit current (JSC) of 4.58 mA/cm2, open circuit voltage (VOC) of... 

    Investigation of continuous-time quantum walk by using Krylov subspace-Lanczos algorithm

    , Article European Physical Journal B ; Volume 59, Issue 2 , 2007 , Pages 199-216 ; 14346028 (ISSN) Jafarizadeh, M. A ; Sufiani, R ; Salimi, S ; Jafarizadeh, S ; Sharif University of Technology
    2007
    Abstract
    In papers [Jafarizadehn and Salimi, Ann. Phys. 322, 1005 (2007) and J. Phys. A: Math. Gen. 39, 13295 (2006)], the amplitudes of continuous-time quantum walk (CTQW) on graphs possessing quantum decomposition (QD graphs) have been calculated by a new method based on spectral distribution associated with their adjacency matrix. Here in this paper, it is shown that the CTQW on any arbitrary graph can be investigated by spectral analysis method, simply by using Krylov subspace-Lanczos algorithm to generate orthonormal bases of Hilbert space of quantum walk isomorphic to orthogonal polynomials. Also new type of graphs possessing generalized quantum decomposition (GQD) have been introduced, where... 

    Computational simulation of temperature and velocity distribution in human upper respiratory airway during inhalation of hot air

    , Article Respiratory Physiology and Neurobiology ; Volume 223 , 2016 , Pages 49-58 ; 15699048 (ISSN) Goodarzi Ardakani, V ; Taeibi Rahni, M ; Salimi, M. R ; Ahmadi, G ; Sharif University of Technology
    Elsevier  2016
    Abstract
    The present study provides an accurate simulation of velocity and temperature distributions of inhalation thermal injury in a human upper airway, including vestibule, nasal cavity, paranasal sinuses, nasopharynx, oropharynx, larynx, and upper part of main bronchus. To this end, a series of CT scan images, taken from an adult woman, was used to construct a three dimensional model. The airway walls temperature was adjusted according to existing in vivo temperature measurements. Also, in order to cover all breathing activities, five different breathing flow rates (10, 15, 20, 30, and 40. l/min) and different ambient air temperatures (100, 200, 300, 400, and 500. °C) were studied. Different flow... 

    Applicability of lattice Boltzmann method in simulation of drops and bubbles formation and transport

    , Article AIP Conference Proceedings, 22 September 2014 through 28 September 2014 ; Volume 1648 , 2015 ; 0094243X (ISSN) ; 9780735412873 (ISBN) Taeibi Rahni, M ; Alizadeh, M ; Haghshenas, M ; Salimi, H ; Najafi, M ; Miller, R ; Sharif University of Technology
    2015
    Abstract
    Multiphase flows appear in many scientific and engineering applications. On the other hand, there has been a tremendous experimental and numerical investigation trying to understand complex fluid-fluid interfaces better. However, conventional CFD have certain limitations in complicated situations. Fortunately in the past two decades, new approaches, namely SPH and LBM (sometimes called meshless methods) have been developed. Since they are mesoscopic, they have been able to perform much better than conventional CFD. Especially, LBM is becoming more and more popular and has already been divided to many branches  

    New organic dyes with diphenylamine core for dye-sensitized solar cells

    , Article Journal of Materials Science: Materials in Electronics ; Volume 29, Issue 8 , April , 2018 , Pages 6323-6336 ; 09574522 (ISSN) Salimi Beni, A. R ; Karami, M ; Hosseinzadeh, B ; Ghahary, R ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    In the current investigation, four novel donoracceptor type organic dyes including (DPA-Ba, DPA-Hy, DPA-Rh, DPA-Cy), are proposed and their photophysical and electrochemical properties as well as dye-sensitized solar cell performance are systematically investigated. Among these dyes diphenylamine is utilized as an-electron donor while barbituric acid, hydantoin, rhodanine-n-acetic acid and cyano acetic acid, are proposed as anchoring groups as dye-sensitized solar cells (DSSCs). The synthesized dyes are characterized using FT-IR, NMR, mass spectrometry, absorbance and electrochemical measurements. The photophysical, electrochemical and photovoltaic properties of the solar cells based on... 

    Allergic rhinitis impairs working memory in association with drop of hippocampal – Prefrontal coupling

    , Article Brain Research ; Volume 1758 , 2021 ; 00068993 (ISSN) Salimi, M ; Ghazvineh, S ; Nazari, M ; Dehdar, K ; Garousi, M ; Zare, M ; Tabasi, F ; Jamaati, H ; Salimi, A ; Barkley, V ; Mirnajafi Zadeh, J ; Raoufy, M. R ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    Allergic rhinitis (AR) is a chronic inflammatory disease frequently associated with a deficit in learning and memory. Working memory is an important system for decision making and guidance, which depends on interactions between the ventral hippocampus (vHipp) and the prelimbic prefrontal cortex (plPFC). It is still unclear whether AR influences the activity and coupling of these brain areas, which consequently may impair working memory. The current study aimed to examine alterations of the vHipp-plPFC circuit in a rat model of AR. Our results show decreased working memory performance in AR animals, accompanied by a reduction of theta and gamma oscillations in plPFC. Also, AR reduces... 

    Simulated annealing optimization in wavefront shaping controlled transmission

    , Article Applied Optics ; Volume 57, Issue 21 , 2018 , Pages 6233-6242 ; 1559128X (ISSN) Fayyaz, Z ; Mohammadian, N ; Salimi, F ; Fatima, A ; Rahimi Tabar, M. R ; Nasiri Avanaki, M. R ; Sharif University of Technology
    OSA - The Optical Society  2018
    Abstract
    In this research, we present results of simulated annealing (SA), a heuristic optimization algorithm, for focusing light through a turbid medium. Performance of the algorithm on phase and amplitude modulations has been evaluated. A number of tips to tune the optimization parameters are provided. The effect of measurement noise on the performance of the SA algorithm is explored. Additionally, SA performance is compared with continuous sequential and briefly with other optimization algorithms. © 2018 Optical Society of America  

    VulSlicer: Vulnerability detection through code slicing

    , Article Journal of Systems and Software ; Volume 193 , 2022 ; 01641212 (ISSN) Salimi, S ; Kharrazi, M ; Sharif University of Technology
    Elsevier Inc  2022
    Abstract
    There has been a multitude of techniques proposed for identifying vulnerabilities in software. Forcing a program into a vulnerable state has become increasingly unscalable, given the size of the programs and the number of possible execution states. At the same time, techniques that are looking for vulnerability signatures are marred with weak and incomplete signatures. This is not to say that such techniques have failed to identify previously unknown vulnerabilities in the code. However, they have inherent weaknesses, which result in identifying vulnerabilities that are limited in type and complexity. We propose a novel technique to extract succinct vulnerability-relevant statements... 

    Enhanced thermal stability and biocompatibility of gold nanorods by graphene oxide

    , Article Plasmonics ; 2017 , Pages 1-10 ; 15571955 (ISSN) Shirshahi, V ; Hatamie, S ; Tabatabaei, S. N ; Salimi, M ; Saber, R ; Sharif University of Technology
    2017
    Abstract
    In the present study, the effect of nanosized graphene oxide layer on thermal stability and biocompatibility of gold nanorods has been examined. The graphene oxide-wrapped gold nanorods were prepared by electrostatic interaction between negatively charged graphene oxide and positively charged nanorods. The resulting nanohybrids were then heated at different time intervals to 95 °C in a water bath to assess the effect of heat on the rods morphology. The structural changes in gold nanorods were monitored via UV-Vis spectroscopy measurements and transmission electron microscopy images. In similar experiments, the graphene oxide used to wrap gold nanorods was reduced by ascorbic acid in a 95 °C...