Loading...
Search for:
talebi--mahyar
0.102 seconds
Total 92 records
A novel design of the KASUMI block cipher using one-hot residue number system
, Article Middle East Journal of Scientific Research ; Volume 11, Issue 8 , 2012 , Pages 1078-1086 ; 19909233 (ISSN) ; Sharif University of Technology
2012
Abstract
The KASUMI block cipher is used for the cellular communications networks and safety of many wireless standards. Third generation cellular network technology (3G) permits to transmit information, voice and video at very high data rates never seen before that will revolutionize personal communications and information exchange. On the other hand, Residue Number System (RNS) is a modular representation and is evidenced to be serviceable equipment in many applications which need high-speed computations and high-performance components. RNS is a non-weighted and integer number system that can support secure, highspeed, low-power, parallel and carry-free arithmetic. For attaining the most...
Reliable and high-speed KASUMI block cipher by residue number system code
, Article World Applied Sciences Journal ; Volume 17, Issue 9 , 2012 , Pages 1149-1158 ; 18184952 (ISSN) ; Sharif University of Technology
2012
Abstract
Third generation cellular network technology (3G) can revolutionize communications and data exchanges between many people in a more overwhelming fashion than 2G and 2.5G networks did. The 3G UMTS, the 3G GSM and the 3G GPRS rely on the KASUMI block cipher. Therefore, increasing speed, decreasing power consumption and error detection/correction are the major concerns of the KASUMI algorithm and its generation. On the other hand, Residue Number System is a non-weighted number system and it is currently considered as an important method for high-speed, low-power, parallel and carry-free arithmetic realizations. Redundant Residue Number System is an extension of RNS that also supports error...
Business Process Oriented Software Engineering
, M.Sc. Thesis Sharif University of Technology ; Habibi, Jafar (Supervisor)
Abstract
Enterprises are founded according to their business processes based on its targets. For implementing an Information System, first it is required to analyze, design and model of the processes based on a specific methodology.The methodologies of software engineering usually used to be function oriented however object oriented is usual and practical todays. Analyzing the business processes according to one of these two concepts has some problems, however merging these two concepts, makes a powerful method in analyzing and designing of a system more easily and accurately.Some software development methodologies consider these two aspects in a way, however working with them has many complexities...
Non-statistical rational maps
, Article Mathematische Zeitschrift ; Volume 302, Issue 1 , 2022 , Pages 589-608 ; 00255874 (ISSN) ; Sharif University of Technology
Springer Science and Business Media Deutschland GmbH
2022
Abstract
We show that in the family of degree d⩾ 2 rational maps of the Riemann sphere, the closure of strictly postcritically finite maps contains a (relatively) Baire generic subset of maps displaying maximal non-statistical behavior: for a map f in this generic subset, the set of accumulation points of the sequence of empirical measures of almost every point in the phase space, is equal to the largest possible one, that is the set of all f-invariant measures. We also introduce an abstract setting to study non-statistical dynamics and sufficient conditions for their existence in a general family of maps. These sufficient conditions are related to the notions of “statistical instability” and...
Experimental Investigation of Biodiesel Production from Oils by Transesterification Method Catalyzed by Nano-heterogeneous Catalysts
, M.Sc. Thesis Sharif University of Technology ;
Abstract
Today polyolefin definitely is one of the most applicable polymers in the world. One of these polymers is ultra-high molecular weight polyethylene. Being applicable in a number of high-tech industries such as military service, battery separators, and other areas, expands the usage of these polymers. Electrospinning is one of the molding methods in order to synthesize fiber polymers. Using this method, a great deal of polymer fibers have been prepared. It is worth noting that the device used for olefins should have temperature control and temperature increase ability. The electrospinning device with the temperature control has not been built in the country; therefore, this device has been...
UCS-NT: An unbiased compressive sensing framework for Network Tomography
, Article ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings ; 2013 , Pages 4534-4538 ; 15206149 (ISSN) ; 9781479903566 (ISBN) ; Rabiee, H. R ; Hashemifar, Z. S ; Sharif University of Technology
2013
Abstract
This paper addresses the problem of recovering sparse link vectors with network topological constraints that is motivated by network inference and tomography applications. We propose a novel framework called UCS-NT in the context of compressive sensing for sparse recovery in networks. In order to efficiently recover sparse specification of link vectors, we construct a feasible measurement matrix using this framework through connected paths. It is theoretically shown that, only O(k log(n)) path measurements are sufficient for uniquely recovering any k-sparse link vector. Moreover, extensive simulations demonstrate that this framework would converge to an accurate solution for a wide class of...
Detection of top-K central nodes in social networks: A compressive sensing approach
, Article Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015, 25 August 2015 through 28 August 2015 ; 2015 , Pages 902-909 ; 9781450338547 (ISBN) ; Pei, J ; Tang, J ; Silvestri, F ; Sharif University of Technology
Association for Computing Machinery, Inc
2015
Abstract
In analysing the structural organization of a social network, identifying important nodes has been a fundamental problem. The concept of network centrality deals with the assessment of the relative importance of a particular node within the network. Most of the traditional network centrality definitions have a high computational cost and require full knowledge of network topological structure. On the one hand, in many applications we are only interested in detecting the top-k central nodes of the network with the largest values considering a specific centrality metric. On the other hand, it is not feasible to efficiently identify central nodes in a large real-world social network via...
Numerical modeling of adhesively bonded composite patch repair of cracked aluminum panels with concept of CZM and XFEM
, Article Proceedings of the Institution of Mechanical Engineers, Part G: Journal of Aerospace Engineering ; Volume 230, Issue 8 , 2016 , Pages 1448-1466 ; 09544100 (ISSN) ; Abedian, A ; Sharif University of Technology
SAGE Publications Ltd
2016
Abstract
Application of composite patches in repair of damaged/aged aircraft structures is one of the most popular repairing methods in aerospace engineering. Since running experiments are difficult, time consuming, expensive, and also require high level of expertise, simulation of the behavior of the patch and also the faulty components after repair can assist designers and engineers in optimization of their designs. In this article, full-scale simulation of a damaged panel that is experimentally repaired with a composite patch will be considered using ABAQUS, a commercial finite element code. The crack growth process is modeled with the extended finite element method and the cohesive zone model...
Optimization of composite patch repair for maximum stability of crack growth in an aluminum plate
, Article Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science ; Volume 231, Issue 20 , 2017 , Pages 3690-3701 ; 09544062 (ISSN) ; Abedian, A ; Sharif University of Technology
2017
Abstract
In this paper, the configuration parameters of pre-designed composite patch repair are optimized with the aim of achieving the highest level of stability of crack growth in aluminum in the presence of some constraints such as weight, load sustainability, shear stress in the adhesive layer and maximum stress in the patch. For this purpose, the patch is modeled in full scale by ABAQUS, a commercial finite element code. The crack growth process is simulated with the extended finite element method under uniaxial tensile loading, and the Cohesive Zone Model is used to model the progressive damage in the adhesive of the composite patch repair. Also, sensitivity analysis is performed on the...
A Stochastic Process Algebra for Ad Hoc Protocols Verification
, M.Sc. Thesis Sharif University of Technology ; Movaghar, Ali (Supervisor)
Abstract
Processalgebras,acompositionalmethodofmodelingsystemsandtheirbehavioural features, have been a key instrument in the verification of systems and have strived to completely span a whole spectrum of verification solutions for diverse areas of applications. In this sense, modeling and analysis of the performance metrics in a Mobile Ad hoc Network (MANET) in contrast to other systems, face different challenges which demand different strategies. Hence, our goal here is to model and analyze the qualitative and quantitative aspects of MANETs within one especially designed compositional framework. To achieve this framework, we will first have a look at the different methods which aim to model MANETs...
Numerical and Experimental Methods to Optimization and Damage Detection in Composite Patch Repairs
, Ph.D. Dissertation Sharif University of Technology ; Abedian, Ali (Supervisor)
Abstract
Application of composite patches in repair of damaged/aged aircraft structures is one of the most popular repairing methods in aerospace engineering and because of its advantages the use of this type of repair is increasing today. However, to use these patches in life extension of aged aircraft, the added weight to the structure should be strictly controlled. This could be best done if achieving the optimum and smart design by using optimization and structural health monitoring methods. These two concept about pre-designed of composite patch repair are investigated in this thesis. The simulation by Abaqus software and experimental results and tests will be used for this purpose. In first...
Design of Tensegrity Structure as Supporting Structure of Mesh-Like Deployable Antenna for use in Micro-Satellites
, M.Sc. Thesis Sharif University of Technology ; Abedian, Ali (Supervisor)
Abstract
Deployable structures have been used on small satellites since the beginning of such space programmes. Here, the design sequence for a special tensegrity structure, for use as supporting structure for deployable mesh-like antenna will be proposed. The design process is conducted to prevent structural elements from failure, and satisfy the minimum specified natural frequency. In this research, structural modeling is performed based on two external geometric parameters (overall height and diameter), and three internal geometric parameters (elements cross-section properties). The pre-stress in structural element is the last design parameter. Also, materials are pre-assigned. Internal forces of...
Conceptual Study of an Unmanned Water-Thrusted Aerial Firefighting System (UWFS)
, M.Sc. Thesis Sharif University of Technology ; Saghafi, Fariborz (Supervisor)
Abstract
In this research work, the concept of an unmanned aerial firefighting system with water thrusters has been studied. This system consists of a platform head, a waterhose and a ground pump. The concept is briefly to pump water through the hose and then fall it down on fire from the platform. This conceptual system may have many other applications. The other applications have also been addressed in the introduction section. This platform can be considered as an unmanned aerial vehicle whose lift and control forces is provided by water thrusters. The conceptual study has been carried out based on three subjects of preliminary sizing, system dynamic modeling and controller design for platform...
A Bounded Translation of Universal Quantifier-Free Sequents of Intuitionistic Predicate Logic into Basic Predicate Logic
, M.Sc. Thesis Sharif University of Technology ; Ardeshir, Mohammad (Supervisor)
Abstract
In this thesis we construct a bounded translation of intuitionistic predicate logic into Basic predicate logic with restricted use of universal quantifier and without equality inspired by papers [1] and [2]
Compressed sensing in cyber physical social systems
, Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 10760 LNCS , 2018 , Pages 287-305 ; 03029743 (ISSN) ; Ghalebi, K. E ; Movaghar, A ; Mahyar, H ; Sharif University of Technology
2018
Abstract
We overview the main results in Compressed Sensing and Social Networks, and discuss the impact they have on Cyber Physical Social Systems (CPSS), which are currently emerging on top of the Internet of Things. Moreover, inspired by randomized Gossip Protocols, we introduce TopGossip, a new compressed-sensing algorithm for the prediction of the top-k most influential nodes in a social network. TopGossip is able to make this prediction by sampling only a relatively small portion of the social network, and without having any prior knowledge of the network structure itself, except for its set of nodes. Our experimental results on three well-known benchmarks, Facebook, Twitter, and Barabási,...
Spin and charge fluctuations in a one-dimensional lattice with long-range interactions
, Article Physica B: Condensed Matter ; Volume 571 , 2019 , Pages 204-209 ; 09214526 (ISSN) ; Davoudi, B ; Sharif University of Technology
Elsevier B.V
2019
Abstract
We study the competition between spin and charge fluctuations of the extended Hubbard model with on-site and dipole-dipole interactions in a one-dimensional lattice. Using the extended two-particle self consistent (ETPSC) method, we find the corresponding expressions for spin and charge response functions. In this approach, the irreducible spin and charge vertices are a function of inter-particle distance (r) and wave-number (q). This theory allows us to determine the crossover temperatures and the dominant instability as a function of U and V. The phase diagrams are obtained for several effective particle densities: n = 0.5, n = 1 and n = 4/3. Each phase diagram (U − V − T space)...
Management of Classifiers Pool in Data Stream Classification Using Probabilistic Graphical Models
, M.Sc. Thesis Sharif University of Technology ; Beigy, Hamid (Supervisor)
Abstract
Concept drift is a common situation in data streams where distribution which data is generated from, changes over time due to various reasons like environmental changes. This phenomenon challenges classification process strongly. Recent studies on keeping a pool of classifiers each modeling one of the concepts, have achieved promising results. Storing used classifiers in a pool enables us to exploit prior knowledge of concepts in the future occurrence of them. Most of the methods presented so far, introduce a similarity measure between current and past concepts and select the closest stored concept as current one. These methods don’t consider possible relations and dependenies between...
Numerical Simulation of Incompressible Turbulent Flow with the Artificial Compressibility-Based Incompressible Smoothed Particle Hydrodynamics
, M.Sc. Thesis Sharif University of Technology ; Hejranfar, Kazem (Supervisor)
Abstract
In the present study, an incompressible smoothed particle hydrodynamics based on the artificial compressibility method is applied for simulating the incompressible turbulent flows. The Reynolds-averaged incompressible Navier–Stokes equations using the artificial compressibility method in the Eulerian reference frame are written in the Lagrangian reference frame to provide an appropriate incompressible SPH algorithm for the turbulent flow computations. Here, the k-L_m turbulence model, which is a simplified k-ϵ turbulence model, is used and formulated in the Lagrangian reference frame. The SPH formulation implemented here is based on an implicit dual-time stepping scheme to be capable of...
Asynchronous track-to-track fusion by direct estimation of time of sample in sensor networks
, Article IEEE Sensors Journal ; Vol. 14, issue. 1 , Jan , 2014 , p. 210-217 ; 1530437X ; Hemmatyar, A. M. A ; Sharif University of Technology
2014
Abstract
Asynchronous data fusion is inevitable in track-to-track fusion for tracking high-speed targets. For low-speed targets, e.g., the movement of clouds, synchronization is insignificant and, depending on the application, may be disregarded. Real-time asynchronous fusion is a demanding task in sensor networks when the sensors are not synchronous in sampling-rate or in sampling-phase. In the method proposed in this paper, an estimator in the fusion center estimates the actual time of the sample with respect to the time-reference of the fusion center upon receiving the data from a sensor. Then, the computer of the fusion center uses predictions to transfer all the received data to the data...
Optimum and reliable routing in VANETs: An opposition based ant colony algorithm scheme
, Article 2013 International Conference on Connected Vehicles and Expo, ICCVE 2013 - Proceedings ; 2013 , Pages 926-930 ; Ahmadi, M ; Talebi, S ; Sharif University of Technology
IEEE Computer Society
2013
Abstract
By the advancement in technology on one side, and governmental as well as social demands for lowest rate of driving accidents and reliable communication among vehicles on the other side, particularly in highways, vehicular ad-hoc networks (VANETs) are of special interest as a reliable approach to this aim. VANET is typically defined as the communication network for wireless communicating between vehicles in a region. One of the most important challenges in such networks is reliable routing of data packages among the vehicle users. Several VANET routing topologies are published in the literature; however, there is still a lack of reliable scheme. This is due to the nature of users behaviour...