Loading...
Search for:
yousefi-nejad-attari--m
0.231 seconds
Total 20657 records
A bi-objective robust optimization model for a blood collection and testing problem: an accelerated stochastic benders decomposition
, Article Annals of Operations Research ; 2018 ; 02545330 (ISSN) ; Pasandideh, S. H. R ; Aghaie, A ; Akhavan Niaki, S. T ; Sharif University of Technology
2018
Abstract
Blood transfusion services are vital components of healthcare systems all over the world. In this paper, a generalized network optimization model is developed for a complex blood supply chain in accordance with Iranian blood transfusion organization (IBTO) structure. This structure consist of four types facilities. Blood collection centers, blood collection and processing centers, mobile teams and blood transfusion center have various duties in IBTO structure. The major contribution is to develop a novel hybrid approach based on stochastic programming, ε-constraint and robust optimization (HSERO) to simultaneously model two types of uncertainties by including stochastic scenarios for total...
SVNN: an efficient PacBio-specific pipeline for structural variations calling using neural networks
, Article BMC Bioinformatics ; Volume 22, Issue 1 , 2021 ; 14712105 (ISSN) ; Hadadian Nejad Yousefi, M ; Goudarzi, M ; Sharif University of Technology
BioMed Central Ltd
2021
Abstract
Background: Once aligned, long-reads can be a useful source of information to identify the type and position of structural variations. However, due to the high sequencing error of long reads, long-read structural variation detection methods are far from precise in low-coverage cases. To be accurate, they need to use high-coverage data, which in turn, results in an extremely time-consuming pipeline, especially in the alignment phase. Therefore, it is of utmost importance to have a structural variation calling pipeline which is both fast and precise for low-coverage data. Results: In this paper, we present SVNN, a fast yet accurate, structural variation calling pipeline for PacBio long-reads...
SVNN: an efficient PacBio-specific pipeline for structural variations calling using neural networks
, Article BMC Bioinformatics ; Volume 22, Issue 1 , 2021 ; 14712105 (ISSN) ; Hadadian Nejad Yousefi, M ; Goudarzi, M ; Sharif University of Technology
BioMed Central Ltd
2021
Abstract
Background: Once aligned, long-reads can be a useful source of information to identify the type and position of structural variations. However, due to the high sequencing error of long reads, long-read structural variation detection methods are far from precise in low-coverage cases. To be accurate, they need to use high-coverage data, which in turn, results in an extremely time-consuming pipeline, especially in the alignment phase. Therefore, it is of utmost importance to have a structural variation calling pipeline which is both fast and precise for low-coverage data. Results: In this paper, we present SVNN, a fast yet accurate, structural variation calling pipeline for PacBio long-reads...
IMOS: improved meta-aligner and minimap2 on spark
, Article BMC Bioinformatics ; Volume 20, Issue 1 , 2019 ; 14712105 (ISSN) ; Goudarzi, M ; Motahari, A ; Sharif University of Technology
BioMed Central Ltd
2019
Abstract
Background: Long reads provide valuable information regarding the sequence composition of genomes. Long reads are usually very noisy which renders their alignments on the reference genome a daunting task. It may take days to process datasets enough to sequence a human genome on a single node. Hence, it is of primary importance to have an aligner which can operate on distributed clusters of computers with high performance in accuracy and speed. Results: In this paper, we presented IMOS, an aligner for mapping noisy long reads to the reference genome. It can be used on a single node as well as on distributed nodes. In its single-node mode, IMOS is an Improved version of Meta-aligner (IM)...
Hydrothermal synthesis of TiO2 nanorod for using as an electron transport material in perovskite solar cells
, Article 6th International Biennial Conference on UltraFine Grained and Nanostructured Materials, UFGNSM 2017, 12 November 2017 through 13 November 2017 ; Volume 1920 , 2018 ; 0094243X (ISSN); 9780735416123 (ISBN) ; Nemati, A ; Attari Navab, A ; Abad, H. M. M ; Sharif University of Technology
American Institute of Physics Inc
2018
Abstract
Now days titanium dioxide is used in different applications because of its good electrical properties, optical stability and cost savings. According to their different nanoscale TiO2 structures, it has been determined that 1D structures such as nanorods, nanotubes and nanowires has better properties than the other structures, including enhancing electron transport and create an offered directional way of transporting of the electrons. However, the grain boundaries in polycrystalline TiO2 nanowires or nanotubes cause electron scattering or trapping, which limit their application in optoelectronics. From these TiO2 structures, TiO2 nanorods have special importance because of less defects...
Embedded SI partial transmit sequence with improved bit error rate
, Article 2nd International Conference on Electrical Engineering, ICEE, Lahore, 25 March 2008 through 26 March 2008 ; 2008 ; 9781424422937 (ISBN) ; Ahmadian Attari, M ; Reisi, N
2008
Abstract
OFDM is a multicarrier modulation scheme with high bandwidth efficiency and robustness to multipath environment used in high data rate transmission. However, a drawback of this system is the large Peak-to-Average-Power Ratio (PAR) of the transmit signal which makes its straightforward implementation quite costly. PAR in an OFDM based system can be reduced significantly by PTS method for which data recovery requires side information (SI) about the phases used at transmitter. Sending SI, not only reduces the rate, but also increases BER, for any error in SI detection can damage a large amount of transmitted information. By introducing a new phase set, we propose a PTS based method for MPSK...
Distributed Processing of Next Generation Sequencing Data Set
, M.Sc. Thesis Sharif University of Technology ; Goudarzi, Maziar (Supervisor) ; Motahari, Abolfazl (Supervisor)
Abstract
DNA analysis plays a significant role in fields such as pharmacy, agriculture, genealogy, and forensics. Next generation sequencing datasets cover a gene several times due to a large number of readings. Therefore, the initial data volume is several times the amount of memory required to store the DNA strand. First, the DNA sequence of a sample should be made using the primary data, and then the difference should be found by comparing the sample DNA sequence with the reference DNA sequence. By finding these differences, one can extract the characteristics of the tested species. The extracted properties are precious for genetics researchers. For example, they can produce drugs that are...
Introduction of clinical, simulation-based software for medical sciences teachings
, Article Procedia Engineering ; Volume 29 , 2012 , Pages 43-47 ; 18777058 (ISSN) ; Edalat-Nejad, M ; Edalat Nejad, N ; Edalatnejad, M ; Sharif University of Technology
2012
Abstract
Simulation is the gold standard for training in aviation and trauma medicine. Now it is available for diseases diagnosis and treatment. With simulation, clinicians can practice their art in a realistic, consequence free environment, combining both theory and practice in a comprehensive program. Method and materials - In the virtual clinical environment of "VPsoft mentor" software, the practitioner reviews a patient's history, orders laboratory tests and procedures, interprets findings, renders diagnoses, and prescribes medication. Every diagnostic or treatment decision the clinician makes for the patient is analyzed by E-mentor, providing instant feedback.Results - This software have been...
Analysis of a fractional order Van der Pol-like oscillator via describing function method
, Article Nonlinear Dynamics ; Volume 61, Issue 1-2 , 2010 , Pages 265-274 ; 0924090X (ISSN) ; Haeri, M ; Tavazoei, M. S ; Sharif University of Technology
2010
Abstract
In this paper, the behavior of a fractional order Van der Pol-like oscillator is investigated using a describing function method. A parametric function for the boundary between oscillatory and nonoscillatory regions of this system is extracted. The analytical results are evaluated by numerical simulations which demonstrate sufficient reliability of the proposed analyzing method
Improving self-care and health literacy in hemodialysis patients: Using software engineering
, Article Proceedings - 2012 7th International Conference on Computing and Convergence Technology (ICCIT, ICEI and ICACT), ICCCT 2012, 3 December 2012 through 5 December 2012 ; December , 2012 , Pages 317-320 ; 9788994364216 (ISBN) ; Edalat-Nejad, M ; Edalat-Nejad, N ; Sharif University of Technology
2012
Abstract
The use of Computer Science in order to categorize and store information, improve diagnostic and therapeutic procedures, patient education and the training of a skilled labor force, has taken important steps and there are constantly new developments in this area
Cooperative relay cognitive interference channel
, Article Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, 17 December 2010 through 19 December 2010, Beijing ; 2010 , Pages 1064-1069 ; 9781424469406 (ISBN) ; Aref, M. R ; Ahmadian Attari, M ; Sharif University of Technology
2010
Abstract
The cooperative relay cognitive interference channel (RCIC) is a four-node network with two source nodes (primary source and cognitive source) and two destination nodes, in which sources try to communicate at certain rates with their corresponding destinations simultaneously through a common medium and each destination can act as a relay to assist the other one. For the partially cooperative RCIC (PC-RCIC), in which only one of the destinations (corresponding to the cognitive source) acts as a relay, we derive an achievable rate region based on using rate splitting and superposition coding at the cognitive source, and using decode-and-forward scheme at the relay. For the degraded PC-RCIC, we...
A Task-Based Greedy Scheduling Algorithm for Minimizing Energy of MapReduce Jobs
, Article Journal of Grid Computing ; Volume 16, Issue 4 , 2018 , Pages 535-551 ; 15707873 (ISSN) ; Goudarzi, M ; Sharif University of Technology
Springer Netherlands
2018
Abstract
MapReduce and its open source implementation, Hadoop, have gained widespread adoption for parallel processing of big data jobs. Since the number of such big data jobs is also rapidly rising, reducing their energy consumption is increasingly more important to reduce environmental impact as well as operational costs. Prior work by Mashayekhy et al. (IEEE Trans. Parallel Distributed Syst. 26, 2720–2733, 2016), has tackled the problem of energy-aware scheduling of a single MapReduce job but we provide a far more efficient heuristic in this paper. We first model the problem as an Integer Linear Program to find the optimal solution using ILP solvers. Then we present a task-based greedy scheduling...
The double dividend of a joint tariff and VAT reform: Evidence from Iran
, Article World Bank Economic Review ; Volume 37, Issue 2 , 2023 , Pages 331-349 ; 02586770 (ISSN) ; Vesal, M ; Sharif University of Technology
Oxford University Press
2023
Abstract
This paper provides empirical evidence on a novel complementarity between VAT and trade taxes. Downstream domestic firms require VAT receipts from importers to claim VAT on purchases, increasing incentives for honest reporting of imports. Trade gap, the difference between mirror and domestic trade reports in Iran at 6-digit HS disaggregation, is used to measure this complementarity. Iran introduced VAT in 2008 and, since then, has increased its rate from 3 to 9 percent. Difference-in-differences estimates show that a 1 percentage point increase in the VAT rate reduces the trade gap by about 2 percent. Consistent with the compliance mechanisms for VAT, a smaller effect for consumer products...
More details on analysis of fractional-order Van der Pol oscillator
, Article JVC/Journal of Vibration and Control ; Volume 15, Issue 6 , 2009 , Pages 803-819 ; 10775463 (ISSN) ; Haeri, M ; Attari, M ; Bolouki, S ; Siami, M ; Sharif University of Technology
2009
Abstract
This paper is devoted to the analysis of fractional order Van der Pol system studied in the literature. Based on the existing theorems on the stability of incommensurate fractional order systems, we determine parametric range for which a fractional order Van der Pol system with a specific order can perform as an undamped oscillator. Numerical simulations are presented to support the given analytical results. These results also illuminate a main difference between oscillations in a fractional order Van der Pol oscillator and its integer order counterpart. We show that contrary to integer order case, trajectories in a fractional Van der Pol oscillator do not converge to a unique cycle. © 2009...
Robust relay beamforming against jamming attack
, Article IEEE Communications Letters ; 2017 ; 10897798 (ISSN) ; Ahmadian Attari, M ; Amiri, R ; Sharif University of Technology
2017
Abstract
In this letter, we surpass the jamming effect and also estimate the jamming channel state information by using Kalman filtering (KF) approach. Furthermore, we design a closed-form beamforming weight for maximizing the achievable rate subject to the condition that the total relays power transmission would be below a predefined threshold level, which is formulated as a Quadratically Constrained Quadratic Program (QCQP). Simulation results show efficient performance of the proposed method for different destruction powers of jammer by achieving the Cramer Rao Lower Bound (CRLB). IEEE
Provably secure strong designated verifier signature scheme based on coding theory
, Article International Journal of Communication Systems ; Volume 30, Issue 7 , 2017 ; 10745351 (ISSN) ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
John Wiley and Sons Ltd
2017
Abstract
Strong Designated Verifier Signature (SDVS) provides authentication for the signer and the verifier such that the signer is assured that what s/he has signed, is only verified by the designated verifier. Currently, the security of most of the SDVS schemes is based on hard problems in the number theory. As it is proved that all kinds of cryptosystems which are based on the number theory will not tolerate quantum attacks, here, an SDVS scheme based on hard problems in coding theory is presented. We have proved that the suggested scheme is unforgeable under a chosen message attack in Random Oracle Model. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd
Robust relay beamforming against jamming attack
, Article IEEE Communications Letters ; Volume 22, Issue 2 , February , 2018 , Pages 312-315 ; 10897798 (ISSN) ; Ahmadian Attari, M ; Amiri, R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2018
Abstract
In this letter, we surpass the jamming effect and also estimate the jamming channel state information by using the Kalman filtering approach. Furthermore, we design a closed-form beamforming weight for maximizing the achievable rate subject to the condition that the total relays power transmission would be below a predefined threshold level, which is formulated as a quadratically constrained quadratic program. Simulation results show the efficient performance of the proposed method for different destruction powers of the jammer by achieving the Cramér-Rao lower bound. © 1997-2012 IEEE
Efficient and practical protocol for silylation of hydroxyl groups using reusable lithium perchlorate dispread in silica gel under neutral condition [electronic resource]
, Article Journal of Organometallic Chemistry ; 2006, Volume 691, Issue 5, Pages 817–820 ; Yousefi, R ; Saidi, M. R ; Sharif University of Technology
Abstract
A very efficient and mild procedure for the trimethylsilylation of a wide variety of alcohols, including primary, allylic, benzylic, secondary, hindered secondary, tertiary, and phenols with hexamethyldisilazane on the surface of silica gel dispersed with LiClO4 in room temperature at few minutes in excellent yields under neutral conditions is reported. This procedure also allows the excellent selectivity under LP-SiO2 system for silylation of alcohols in the presence of amine and phenolic hydroxy groups
Comments on a lightweight cloud auditing scheme: Security analysis and improvement
, Article Journal of Network and Computer Applications ; Volume 139 , 2019 , Pages 49-56 ; 10848045 (ISSN) ; Ahmadian Attari, M ; Rajabzadeh Asaar, M ; Aref, M. R ; Sharif University of Technology
Academic Press
2019
Abstract
In a cloud storage service, public auditing mechanisms allow a third party to verify integrity of the outsourced data on behalf of data users without the need to retrieve data from the cloud server. Recently, Shen et al. proposed a new lightweight and privacy preserving cloud data auditing scheme which employs a third party medium to perform time-consuming operations on behalf of users. The authors have claimed that the scheme meets the security requirements of public auditing mechanisms. In this paper, we show that Shen et al.'s scheme is insecure by proposing two attacks on the scheme. In the first attack, an outside adversary can modify some messages in transmission to the cloud server...
An identity-based online/offline secure cloud storage auditing scheme
, Article Cluster Computing ; Volume 23, Issue 2 , 2020 , Pages 1455-1468 ; Rajabzadeh Asaar, M ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
Springer
2020
Abstract
Cloud storage has significantly reduced data management costs for data owners. However, loss of physical control over the data after outsourcing, triggers some security concerns such as data integrity. Provable Data Possession (PDP) protocols, enable data owners to audit the integrity of their outsourced data without the need to retrieve the file from cloud server. However, most existing PDP schemes require resource-constrained users to perform costly operations for generating metadata on file blocks. In online/offline PDP mechanisms introduced most recently, the user’s computation is divided into online/offline phases, where the costly operations are allowed to be carried out in the offline...