Loading...
Search for: khazaei--m
0.142 seconds

    Generalization of Auxiliary Input Leakage Model for Public-Key Cryptosystems

    , M.Sc. Thesis Sharif University of Technology Khoshakhlagh, Hamid Reza (Author) ; Khazaei, Shahram (Supervisor)
    Abstract
    Side channel attacks, where an attacker learns some physical information about the state of a device, are one of the ways in which cryptographic schemes are broken in practice. leakage resilient ryptography addressed this issue at a higher abstraction level, proposing models capturing such attacks. Auxiliary Input is one of these models. In this thesis, we study public-key encryption schemes in this model of leakage. we also propose a method to consider this leakage continuously (i.e., not just one observation of the adversary). at the end, we consider the leakage from both the secret key owner and the encryptor. This odel captures a wider class of side-channel attacks  

    Security Analysis of Decentralized E-voting Protocols in the Universal Composability Framework

    , M.Sc. Thesis Sharif University of Technology Rezaei Aliabadi, Mehry (Author) ; Khazaei, Shahram (Supervisor)
    Abstract
    Designing efficient and secure electronic voting protocols without the presence of trusted authorities, which are known as decentralized voting protocols, is one of the most interesting and challenging problems in cryptography. In these protocols the outcome of the protocol is determined by voters collaborating with each other. Since voting is a significant concept in every society, the correctness and security of voting protocols are important. For security analysis of electronic voting protocols, an intuitive proof is not enough and we require a comprehensive approach that provides provable security. In this thesis, we use universal composition framework to analyze a decentralized e-voting... 

    Characterization of sol-gel derived silver/fluor-hydroxyapatite composite coatings on titanium substrate

    , Article Surface and Coatings Technology ; Volume 352 , 2018 , Pages 522-528 ; 02578972 (ISSN) Batebi, K ; Abbasi Khazaei, B ; Afshar, A ; Sharif University of Technology
    Elsevier B.V  2018
    Abstract
    A composite coating containing silver, fluoride and hydroxyapatite (Ag-FHA) was developed on titanium substrate by sol-gel method. Triethylphosphite, hydrated calcium nitrate, ammonium fluoride and silver nitrate were used respectively, as P, Ca, F and Ag precursors with a Ca:P ratio 1.67 and concentration of silver was 0.3 wt%. Coatings were characterized by Fourier transform infrared spectroscopy (FTIR), X-ray diffraction (XRD), field-emission scanning electron microscopy (FE-SEM) and atomic absorption spectrometry (AAS). Potentiodynamic polarization measurements in simulated body fluid proved corrosion protection caused by both Ag-FHA coatings. Antibacterial activity of coatings against... 

    Temporal Analysis of Functional Brain Connectivity Using EEG Signals

    , M.Sc. Thesis Sharif University of Technology Khazaei, Ensieh (Author) ; Mohammadzadeh, Narges Hoda (Supervisor)
    Abstract
    Human has different emotions such as happiness, sadness, anger, etc. Recognizing these emotions plays an important role in human-machine interface. Emotion recognition can be divided into approaches, physiological and non-physiological signals. Non-physiological signals include facial expressions, body gesture, and voice, and physiological signals include electroencephalograph (EEG), electrocardiograph (ECG), and functional magnetic resonance imaging (fMRI). EEG signal has been absorbed a lot of attention in emotion recognition because recording of EEG signal is easy and it is non-invasive. Analysis of connectivity and interaction between different areas of the brain can provide useful... 

    Studying Ideal Access Structures in Secret Sharing Schemes

    , M.Sc. Thesis Sharif University of Technology Haji Aghajanpour, Niloufar (Author) ; Khazaei, Shahram (Supervisor)
    Abstract
    A secret sharing scheme involves a dealer who has a secret and distribute that among a set of participants, in such a way that only authorized subsets can recover the secret value. The collection of authorized subsets called the access structure and a secret sharing scheme in which unauthorized subset cannot reveal any partial information about the secret is called a perfect secret sharing scheme. One of the problems in secret sharing schemes is finding the appropriate lower bound for a parameter called the information ratio and optimizing it. A perfect secret sharing scheme is ideal when it has an optimal information ratio. In other words, if all shares have the same length as the secret,... 

    A unimodal person authentication system based on signing sound

    , Article Proceedings - IEEE-EMBS International Conference on Biomedical and Health Informatics: Global Grand Challenge of Health Informatics, BHI 2012 ; 2012 , Pages 152-154 ; 9781457721779 (ISBN) Khazaei, D ; Maghooli, K ; Afdideh, F ; Azimi, H ; Sharif University of Technology
    IEEE  2012
    Abstract
    Person authentication based on only the name, password or person identification number is not secured enough. In recent years researchers have focused on human physiological and behavioral parameters, because these parameters are more unique and human-specific than traditional ones. This approach of person authentication is usually called biometric authentication. Signature is the most commonly used behavioral biometric which is investigated in two ways of online and offline by researchers. In online procedure, the temporal indices of signature such as signing velocity, and acceleration are involved to increase the accuracy relative to offline methods and to recognize counterfeit signatures.... 

    Single Base Variant Calling Based on Reference Genome and Reads

    , M.Sc. Thesis Sharif University of Technology Ghareghani, Maryam (Author) ; Khazaei, Shahram (Supervisor) ; Motahari, Abolfazl (Co-Advisor)
    Abstract
    Genome sequencing is one of the fundamental problems in today’s Biology. It has applications in significant problems such as finding association between an individual’s genome sequence and his phenotypes, discovering new genes, and finding evolutionary relations between organisms. Following the rapid advances in sequencing technologies and generation of a huge amount of short reads, efficient computational tools are needed for processing sequencing data. Shortness of reads is a factor that makes the task of reconstructing repetitive genomic regions complicated. In fact, the main challenge in both sequencing and resequencing problems is reconstruction of repeat regions. Common resequencing... 

    Correlation-Intractable Hash Functions and Their Appliction to NIZK

    , M.Sc. Thesis Sharif University of Technology Vahdani Ghaleh Ghourineh, Behzad (Author) ; Khazaei, Shahram (Supervisor)
    Abstract
    Correlation-intractability is a random-oracle-like property of hash functions, so one can expect that constructions that are secure in random-oracle-model, remain secure when implemented using a correlation-intractable hash function. This is true about Fiat-Shamir transform which is a method for eliminating interaction from public-coin interactive proofs. One can see that when this method is applied to a public-coin three-round honest-verifier zero-knowledge proof, using a correlation-intractable hash function that also satisfies some mild assumption, the result is a NIZK argument. This is the basis for the correlation-intractability framework for NIZK which recently has been used to... 

    Linear Secret Sharing from the Optimality Point of View

    , M.Sc. Thesis Sharif University of Technology Norouzi Bezmin Abadi, Hassan (Author) ; Khazaei, Shahram (Supervisor)
    Abstract
    A secret sharing scheme is a way to share a secret between a group of people so that only authorized subsets can retrieve the original secret. Secret sharing schemes were first introduced by Shamir and Blakley for threshold access structures. In a threshold access structure, a subset of individuals is allowed if the number of members exceeds a predetermined threshold. After Shamir, the study of general access structures was considered, and Ito, Saito, and Nishizeki proposed a way to construct a secret sharing scheme for these structures. Reducing the length of party's share in secret-sharing schemes and finding the optimal scheme for access structures has long been the focus of researchers... 

    Heterogeneous catalytic ozonation by Nano-MgO is better than sole ozonation for metronidazole degradation, toxicity reduction, and biodegradability improvement

    , Article Desalination and Water Treatment ; Volume 57, Issue 35 , 2016 , Pages 16435-16444 ; 19443994 (ISSN) Kermani, M ; Bahrami Asl, F ; Farzadkia, M ; Esrafili, A ; Salahshour Arian, S ; Khazaei, M ; Dadban Shahamat, Y ; Zeynalzadeh, D ; Sharif University of Technology
    Taylor and Francis Inc  2016
    Abstract
    Abstract: In the current paper, the removal efficiency of metronidazole (MNZ) using a catalytic ozonation process (COP) in the presence of magnesium oxide nanocrystals, as a catalyst, was investigated in deionized water and compared with a sole ozonation process (SOP). The influence of several operational factors on both removal processes was evaluated: solution pH, MgO dosage, initial MNZ concentration, and reaction time. Biodegradability improvement, mineralization rate, oxidation intermediates, and toxicity were also studied for the COP. The results showed that MgO nanocrystals accelerated MNZ removal compared to the SOP. The optimum pH for both SOP and COP was obtained at 10 and optimum... 

    A full pipeline of diagnosis and prognosis the risk of chronic diseases using deep learning and Shapley values: The Ravansar county anthropometric cohort study

    , Article PLoS ONE ; Volume 17, Issue 1 January , 2022 ; 19326203 (ISSN) Jafari, H ; Shohaimi, S ; Salari, N ; Kiaei, A. A ; Najafi, F ; Khazaei, S ; Niaparast, M ; Abdollahi, A ; Mohammadi, M ; Sharif University of Technology
    Public Library of Science  2022
    Abstract
    Anthropometry is a Greek word that consists of the two words "Anthropo"meaning human species and "metery"meaning measurement. It is a science that deals with the size of the body including the dimensions of different parts, the field of motion and the strength of the muscles of the body. Specific individual dimensions such as heights, widths, depths, distances, environments and curvatures are usually measured. In this article, we investigate the anthropometric characteristics of patients with chronic diseases (diabetes, hypertension, cardiovascular disease, heart attacks and strokes) and find the factors affecting these diseases and the extent of the impact of each to make the necessary... 

    Stochastic nature of series of waiting times

    , Article Physical Review E - Statistical, Nonlinear, and Soft Matter Physics ; Volume 87, Issue 6 , 2013 ; 15393755 (ISSN) Anvari, M ; Aghamohammadi, C ; Dashti Naserabadi, H ; Salehi, E ; Behjat, E ; Qorbani, M ; Khazaei Nezhad, M ; Zirak, M ; Hadjihosseini, A ; Peinke, J ; Tabar, M. R. R ; Sharif University of Technology
    2013
    Abstract
    Although fluctuations in the waiting time series have been studied for a long time, some important issues such as its long-range memory and its stochastic features in the presence of nonstationarity have so far remained unstudied. Here we find that the "waiting times" series for a given increment level have long-range correlations with Hurst exponents belonging to the interval 1/2

    , M.Sc. Thesis Sharif University of Technology khazaei Nezhad Gharatekan, Mehdi (Author) ; Bahrampour, Alireza (Supervisor)
    Abstract
    By employing the image theory the Er doped microsphere coupled to an external cavity made by a metallic mirror is simulated by a bimicrosphere laser. The symmetric structure causes the formation of odd and even modes corresponding to the TE and TM mode of the microsphere and splitting the oscillation frequencies. The oscillation frequencies are dependent on the coupling coefficient. The coupling coefficient is obtained near the mirror-microsphere distance. The ohmic mirror loss also is determined as a function of the mirror distance. The total optical loss experienced in these resonators is exceptionally low. In fact,quality factor as high as 108 − 1011 have already been demonstrated for... 

    Energy consumption in pervaporation, conventional and hybrid processes to separate toluene and i-octane

    , Article Chemical Engineering and Processing - Process Intensification ; Volume 128 , June , 2018 , Pages 46-52 ; 02552701 (ISSN) Khazaei, A ; Mohebbi, V ; Mosayyebi Behbahani, R ; Ramazani Saadat Abadi, A ; Sharif University of Technology
    Elsevier B.V  2018
    Abstract
    Chemical industries need to employ new process designs due to environmental policies and energy optimization because of the global energy challenge. Pervaporation has been introduced as a promising alternative for conventional processes such as distillation, known as energy intensive process, in chemical plants. In this work, the energy consumption of different processes for separation of toluene and i-octane (representatives of aromatics and aliphatic mixtures) has been evaluated, based on our previous laboratory pervaporation experiments using Polyvinyl alcohol/Graphene oxide mixed matrix membranes. Accordingly, hybrid distillation-pervaporation and cascade pervaporation systems have been... 

    Dynamic Searchable Encryption Schemes

    , M.Sc. Thesis Sharif University of Technology Fareghbal Khameneh, Hamid (Author) ; Khazaei, Shahram (Supervisor) ; Rafiee Karkevandi, Mojtaba (Supervisor)
    Abstract
    Dynamic searchable encryption schemes enable keyword search query and update operations on encrypted data. One of their applications is to use them in cloud storage services that allow the client to store, search and update data on an external server. Due to the importance of efficiency in real-world applications, retrieving information in searchable schemes involves leakage of some information such as search and access patterns. However, with the addition of update operations (insertion and deletion), more leakages are considered for these schemes. In this regard, reducing the amount of information disclosed to the server is necessary. For this purpose, forward and backward security... 

    Mental arousal level recognition competition on the shared database

    , Article 27th Iranian Conference on Electrical Engineering, ICEE 2019, 30 April 2019 through 2 May 2019 ; 2019 , Pages 1730-1736 ; 9781728115085 (ISBN) Saidi, M ; Rezania, S ; Khazaei, E ; Taghibeyglou, B ; Hashemi, S. S ; Kaveh, R ; Abootalebi, V ; Bagheri, S ; Homayounfar, M ; Asadi, M ; Mohammadian, A ; Mozafari, M ; Hasanzadeh, N ; DIni, H ; Sarvi, H. M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    This paper presents the results of the shared task with the aim of arousal level recognition for the competition held in conjunction with the 27th Iranian Conference on Electrical Engineering (ICEE 2019). A database annotated with arousal level labels released by Research Center for Development of Advanced Technologies. The contest was held on arousal database according to a defined protocol. Three teams were able to enter into the final stage of the competition according to compare their performance measure with the baseline method. The baseline method is proposed by the data owner. The aim of this paper is outlining the database, protocol design, and providing an overview of top-ranked... 

    Light propagation and Localization in Inhomogeneous and Random Optical Waveguide Lattices

    , Ph.D. Dissertation Sharif University of Technology Khazaei Nezhad Gharehtekan, Mehdi (Author) ; Mahdavi, Mohammad (Supervisor) ; Bahrampour, Ali Reza (Co-Advisor)
    Abstract
    Photonic lattices can provide an inexpensive and fine tools to investigate some common phenomena in condensed matter physics, quantum optics, relativistic mechanics,atomic and molecular physics. These phenomena contain Anderson localization,Bloch oscillation, Dynamic localization, coherent and squeezed states, Relativistic Dirac equation, Rabi oscillation, ... .In this thesis, it was investigated three worthy phenomena of them, which at first are introduced in condensed matter physics for electronic systems, in photonic lattices. These phenomena are as follow: Transverse localization of light wave, Bloch oscillation and dynamic localization of light. It was also simulate classically, the... 

    40-years of lake urmia restoration research: review, synthesis and next steps

    , Article Science of the Total Environment ; Volume 832 , 2022 ; 00489697 (ISSN) Parsinejad, M ; Rosenberg, D. E ; Ghale, Y. A. G ; Khazaei, B ; Null, S. E ; Raja, O ; Safaie, A ; Sima, S ; Sorooshian, A ; Wurtsbaugh, W. A ; Sharif University of Technology
    Elsevier B.V  2022
    Abstract
    Public concern over environmental issues such as ecosystem degradation is high. However, restoring coupled human-natural systems requires integration across many science, technology, engineering, management, and governance topics that are presently fragmented. Here, we synthesized 544 peer-reviewed articles published through September 2020 on the desiccation and nascent recovery of Lake Urmia in northwest Iran. We answered nine questions of scientific and popular interest about causes, impacts, stabilization, recovery, and next steps. We find: (1) Expansion of irrigated agriculture, dam construction, and mismanagement impacted the lake more than temperature increases and precipitation... 

    Improvement of fault detection in wireless sensor networks

    , Article 2009 Second ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM 2009, Sanya, 8 August 2009 through 9 August 2009 ; Volume 4 , 2009 , Pages 644-646 ; 9781424442461 (ISBN) Khazaei, E ; Barati, A ; Movaghar, A ; Yangzhou University; Guangdong University of Business Studies; Wuhan Institute of Technology; IEEE SMC TC on Education Technology and Training; IEEE Technology Management Council ; Sharif University of Technology
    2009
    Abstract
    This paper presents a centralized fault detection algorithm for wireless sensor networks. Faulty sensor nodes are identified based on comparisons between neighboring nodes and own central node and dissemination of the decision made at each node. RNS system is used to tolerate transient faults in sensing and communication. In this system, arithmetic operations act on residues - reminder of dividing original number in several definite modules - in parallel. Consequently computations on these residues which are smaller than the original number are performed, so speed up arithmetic and decreased power consumption is achieved. ©2009 IEEE  

    Probability of missed detection as a criterion for receiver placement in MIMO PCL

    , Article IEEE National Radar Conference - Proceedings, 7 May 2012 through 11 May 2012, Atlanta, GA ; 2012 , Pages 0924-0927 ; 10975659 (ISSN) ; 9781467306584 (ISBN) Majd, M. N ; Chitgarha, M. M ; Radmard, M ; Nayebi, M. M ; Sharif University of Technology
    IEEE  2012
    Abstract
    Using multiple antennas at the transmit and receive sides of a passive radar brings both the benefits of MIMO radar and passive radar. However one of the obstacles arisen in such configuration is the receive antennas placement in proper positions so that the radar performance is improved. Here we just consider the case of positioning one receiver among multiple illuminators of opportunity. Indeed it is a start for the solution of optimizing the geometry of the multiple receivers in a passive radar