Loading...
Search for: samadi-dooki--aref
0.137 seconds

    On the Capacity of Information Networks Utilizing Cognition and Cooperative Strategies

    , Ph.D. Dissertation Sharif University of Technology Mirmohseni, Mahtab (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    Interference management is one of the key issues in wireless networks wherein multiple source-destination pairs share the same medium and frequency band and interfere with each other. The exponentially growth in the number of wireless systems and services results in the spectrum shortage which has emerged the technologies that increase the spectral efficiency. Providing the users with cognition equipments in these networks enables them to sense the medium and use the obtained data to adapt their transmissions to cooperate with other users and improve their own rates as well as the others which results in the cognitive radio technology. In order to access the full potential of this technology,... 

    Analysis of Secret Key Agreement in The Channel Model with Side Information

    , M.Sc. Thesis Sharif University of Technology Bahrami, Mohsen (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    In this thesis, the problem of secret key agreement in the channel model with side information is studiedx. In order to investigate the problem, we consider three models according to the different ways of side information availability which are the state-dependent broadcast channel; the state-dependent broadcast channel in presence of public channel and the state-dependent wiretap channel with degraded versions of the channel state information.For the problem of secret key agreement in broadcast channels, two models, the state-dependent wiretap channel and state-dependent three receivers broadcast channel, are considered. We obtain inner and outer bounds of the secret key capacity region for... 

    Coordination in Cooperative Networks and Secret Key Agreement Using Common Information

    , M.Sc. Thesis Sharif University of Technology Bereyhi, Ali (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    In order to utilize cooperative resources of a network, we have to investigate cooperative networks and strategies. Information theory, by introducing different concepts such as coordination and common information, gives us a suitable tool to study cooperative networks and using their resources. In this thesis, we investigate coordination and secret key agreement in cooperative networks. Our study consists of two parts. In the first part, we consider coordination and its applications in cooperative networks. For this purpose, we introduce the triangular multiterminal network as a proper model for studying empirical coordination in multiterminal networks and establish an inner and outer... 

    A Dynamic Programming Approach for Network Air Cargo Revenue Management

    , M.Sc. Thesis Sharif University of Technology Aref Kashfi, Samin (Author) ; Modarres, Mohammad (Supervisor)
    Abstract
    This research aims to establish a novel approach to meet the capacity utilization challenge of the freight forwarders in order to maximize the expected revenue in a cargo network. The two-dimensional cargo capacities are assumed to be stochastic and limited in each leg. A stochastic dynamic programming model is developed to demonstrate the maximization of expected revenue over a finite planning horizon, in which each fare class request is to be either accepted or rejected. Although the main problem is computationally intractable due to multidimensional state variable, it can be decomposed into one-dimensional capacity control sub-problems for each leg. A heuristic algorithm is developed to... 

    When is it possible to simulate a DMC channel from another?

    , Article 2013 IEEE Information Theory Workshop, ITW 2013 ; Sept , 2013 , Page(s): 1 - 5 ; 9781479913237 (ISBN) Haddadpour, F ; Yassaee, M. H ; Aref, M. R ; Gohari, A
    2013
    Abstract
    In this paper, we study the problem of simulating a DMC channel from another DMC channel. We assume that the input to the channel we are simulating is i.i.d. and that the transmitter and receivers are provided with common randomness at limited rates. We prove bounds for simulating point-to-point, MAC and broadcast channels. As a special case, we recover the achievability part of the result of Cuff for point-to-point channel simulation via a noiseless link and shared randomness  

    A Theoretic Analysis of Energy Constrained Systems: Energy Transfering and Harvesting Systems

    , M.Sc. Thesis Sharif University of Technology Rezaee, Milad (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    Energy Harvesting has been appeared as an approach in order to make the green communications possible. In Energy Harvesting systems, nodes extract energy from the nature to extend their lifetimes. The harvested energy can also be used for the purpose of communication and specially for the transmission process. Compared to the conventional batterypowered systems, the Energy Harvesting systems have access to an unbounded source of energy (like vibration absorption devices, water mills, wind turbines, microbial fuel cells, solar cells, thermo-electric generators, piezoelectric cells, etc). However, the diffused nature of this energy makes it difficult to be used for communication. In this work,... 

    9-Round attack on AES-256 by a 6-round property

    , Article Proceedings - 2010 18th Iranian Conference on Electrical Engineering, ICEE 2010, 11 May 2010 through 13 May 2010 ; 2010 , Pages 226-230 ; 9781424467600 (ISBN) Sharifi, A ; Soleimany, H ; Aref, M ; Sharif University of Technology
    2010
    Abstract
    In this paper, we propose a new 6-round Related-Key Impossible Differential property of AES-256 and two related-key impossible differential attacks on 7 and 9 round AES-256, based on the proposed property. The overall complexity of the proposed 7 round attack is decreased by the factor 217. This is for the first time that a Related-Key Impossible Differential attack on 9-round AES-256 is successful. Also this is the first related-key attack on 9-round AES-256 that needs only 2 keys. Although the data and time complexities of the attack are approximately code book and exhaustive search, but we think the proposed property will be useful in future research like boomerang and rectangle attacks  

    An achievable rate region for a class of broadcast-relay networks

    , Article IEEE Information Theory Workshop 2010, ITW 2010, 6 January 2010 through 8 January 2010, Cairo ; 2010 ; 9781424463725 (ISBN) Salehkalaibar, S ; Ghabeli, L ; Aref, M ; Sharif University of Technology
    2010
    Abstract
    In this paper we define Broadcast Relay Networks (BRN) with two relays. There are a transmitter, two relays and two receivers in the network. We find an achievable rate region for it by considering full cooperation between relays. We use symmetric relaying method at relays and Marton's broadcast code construction for the transmitter.We will show that Kramer's rate region for Broadcast Relay Channel (BRC), Ghabeli's rate for symmetric two-relay network, and Marton's rate region for Broadcast Channel are special cases of our achievable rate region  

    Improved related-key boomerang cryptanalysis of AES-256

    , Article 2010 International Conference on Information Science and Applications, ICISA 2010, 21 April 2010 through 23 April 2010 ; April , 2010 ; 9781424459438 (ISBN) Soleimany, H ; Sharifi, A ; Aref, M ; Sharif University of Technology
    2010
    Abstract
    A specific class of differential cryptanalytic approach, known as Related Key Boomerang Attack, has been successfully applied to several symmetric cryptographic primitives in particular encryption schemes such as Advanced Encryption Standard (AES). In this paper, we propose a new related-key boomerang attack on 8-round AES-256, a couple of ones on 9-round following the work of Gorski et al. In the first one, we attacked 8-round AES-256 with the time complexity of 279 and the data complexity of 259. The extended 8-round attack on 9-round AES-256 is more efficient than previous attacks from both time and data complexity perspectives  

    Developing an integrated revenue management and customer relationship management approach in the hotel industry

    , Article Journal of Revenue and Pricing Management ; Volume 14, Issue 2 , March , 2015 , Pages 97-119 ; 14766930 (ISSN) Vaeztehrani, A ; Modarres, M ; Aref, S ; Sharif University of Technology
    Palgrave Macmillan Ltd  2015
    Abstract
    Revenue management (RM) and customer relationship management (CRM) are the standard strategies of many hotels to increase their profitability. Although the objectives and time horizons of RM and CRM are different, they can be considered as complimentary business strategies. However, the integration has received little attention both practically and theoretically. In this study, we develop an approach to jointly make the capacity allocation and overbooking decisions considering CRM strategies over a hotel network. Hotel customers are divided based on their lifetime value into two major groups of occasional and loyal customers. Price discounts and room availability guarantee (RAG) are offered... 

    Improving Physical Layer Security for Cellular Users in Threat of Eavesdroppers

    , M.Sc. Thesis Sharif University of Technology Rahimi, Mahdi (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    Security for wireless communication networks has become a crucial issue because of the broadcast nature of wireless channels. On every cellular network Since it is possible for passive nodes to easily overhear the confidential information transmitted between transmitter and receiver, it is necessary to provide secure communication.When a cellular user wants to communicate with a node or base station on the cellular network, it expects that information will be transmitted and received without interference, with enough quality and without eavesdropping. On the other hand In practical scenarios, we know that cellular network nodes are not equipped with ideal equipment and some percent... 

    The Effect of Channel Parameters on the Degrees of Freedom Regions of the Interference Channels

    , Ph.D. Dissertation Sharif University of Technology Johnny, Milad (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    In the research area of network information theory, except in some cases, finding the exact capacity of different communication channels has always been a challenge. In the high-signal to noise ratios, the capacity of all Gaussian channels can be calculated within a low difference. Therefore, a parameter called the degree of freedom is introduced that describes the behaviour of the capacity of different networks at high signal-to-noise ratios. In other words, the DoF region is used as a tool to determine the capacity of interference channels at high $ \mathrm{SNR}$ values. In almost all interference networks, the idea of interference alignment can be used to achieve the... 

    New Automatic Meet in the Middle Cryptanalysis of Block Ciphers

    , Ph.D. Dissertation Sharif University of Technology Ahmadi, Siavash (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    Block ciphers are one of the most necessary primitives for security protocols, and so, cryptanalysis of them is also essential as well. On the other hand, the security assessment of block ciphers is usually manual work with various specific-idea according to the target block cipher type and algorithm. Some basic known methods for cryptanalysis of block ciphers include linear, differential, meet in the middle, and integral attacks. However, cryptanalysis methods are not limited to them, and many new hybrid or innovative methods are employed to provide better results. Recently, automated cryptanalysis of block ciphers and proposing new methods for analyzes of these ciphers are in the... 

    Using Blockchain to achieve Privacy in E-health

    , M.Sc. Thesis Sharif University of Technology Meisami, Sajad (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    With the advent of the Internet of Things (IoT), e-health has become one of the main topics of research. Due to the sensitivity of patient information, patient privacy seems challenging. Nowadays, patient data is usually stored in the cloud in healthcare programs, making it difficult for users to have enough control over their data. The recent increment in announced cases of security and surveillance breaches compromising patients' privacy call into question the conventional model, in which third-parties gather and control immense amounts of patients' Healthcare data. In this work, we try to resolve the issues mentioned above by using blockchain technology. We propose a blockchain-based... 

    Improvement of Physical Layer Security Based on Polar Codes in Wireless Communications

    , M.Sc. Thesis Sharif University of Technology Ghamami, Iman (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    In modern wireless communication networks,that we have heterogeneous, asynchronous and ultra low latency networks and Due to the high processing power required by conventional cryptographic systems based on computational security, information theoritc security can play important role in the future development of these systems. Security in this case does not depend on the eavesdropper's computing power, but on the statistical independence between the main message and the received message of the eavesdropper. In recent years, polar codes have created new arenas, as they were the provable channel codes that could achieve capacity and reliability simultaneously. In addition, the clear structure,... 

    Use of the Blockchain to Improve the Security of Patients’ Health Records in Electronic Health Systems

    , M.Sc. Thesis Sharif University of Technology Mohammadi, Mehrzad (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    This thesis aims to create an electronic health system for transferring, verifying, and monitoring patient data. Blockchain technology is used in this system. In this system, the patient can communicate with the relevant hospital via an authentication protocol and transmit his data to the hospital. The hospital levels the patient's data creates the patient's treatment prescription and shares it with the pharmacy and insurance company to facilitate the patient's effective treatment. Blockchain technology has been used in a variety of electronic health systems. There are several problems with these systems, including the incorrect use of blockchain, a lack of comprehensiveness, a lack of... 

    Analysis and Optimization of the Electronic Health System Using the Blockchain

    , M.Sc. Thesis Sharif University of Technology Javan, Reza (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    The electronic health system plays a crucial role in modern healthcare, facilitating efficient data management, secure information exchange, and improved patient care. However, existing systems often face challenges related to security, privacy, scalability, and interoperability. The primary objectives of this study are proposing a system that ensures data security, patient and peer privacy, scalability, data integrity, deniability, traceability, secure data sharing, access control, transparency, real-time monitoring, and security in the drug supply chain. To achieve these objectives, we have proposed a system that encompasses a wide range of requirements of healthcare system. To enhance... 

    Designing a Lightweight Smart Health System with Identity Privacy Protection

    , M.Sc. Thesis Sharif University of Technology Zahedi, Hossein (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    The applications of Internet of Things technology are increasing day by day. In the Internet of Things, various devices are connected to each other with the help of the Internet and perform various operations automatically. Today, this technology has various applications in smart city, smart home, smart car, as well as military industries and industrial factories. One of the newest applications is its use in the field of health and hygiene, which is known as the Internet of Medical Things or Smart Health. With the emergence of new epidemic diseases, the importance of this application becomes more clear. Smart health helps the patient. without going to the hospital and doctor in person, to... 

    Facile preparation of branched hierarchical ZnO nanowire arrays with enhanced photocatalytic activity: a photodegradation kinetic model

    , Article Applied Surface Science ; Volume 435 , 2018 , Pages 108-116 ; 01694332 (ISSN) Ebrahimi, M ; Yousefzadeh, S ; Samadi, M ; Dong, C ; Zhang, J ; Moshfegh, A. Z ; Sharif University of Technology
    Elsevier B.V  2018
    Abstract
    Branched hierarchical zinc oxide nanowires (BH-ZnO NWs) were fabricated successfully by a facile and rapid synthesis using two-step growth process. Initially, ZnO NWs have been prepared by anodizing zinc foil at room temperature and followed by annealing treatment. Then, the BH- ZnO NWs were grown on the ZnO NWs by a solution based method at very low temperature (31 oC). The BH- ZnO NWs with different aspect ratio were obtained by varying reaction time (0.5, 2, 5, 10 h). Photocatalytic activity of the samples was studied under both UV and visible light. The results indicated that the optimized BH-ZnO NWs (5 h) as a photocatalyst exhibited the highest photoactivity with about 3 times higher... 

    Design and tailoring of one-dimensional ZnO nanomaterials for photocatalytic degradation of organic dyes: a review

    , Article Research on Chemical Intermediates ; Volume 45, Issue 4 , 2019 , Pages 2197-2254 ; 09226168 (ISSN) Samadi, M ; Zirak, M ; Naseri, A ; Kheirabadi, M ; Ebrahimi, M ; Moshfegh, A. Z ; Sharif University of Technology
    Springer Netherlands  2019
    Abstract
    Abstract: Photocatalysis using semiconductors has emerged as a promising wastewater treatment process to overcome the major challenges faced by conventional technologies. The advantages of ZnO nanomaterials over other semiconductors, and their structure-dependent properties, make them important building blocks in nanotechnology as multifunctional materials. Moreover, it has been confirmed that ZnO nanomaterials can exhibit high performance in photodegradation of organic dyes for treatment of industrial effluent. The wurtzite structure of ZnO contains polar and nonpolar planes; the low surface energy and thermodynamic stability of the nonpolar planes enable formation of one-dimensional (1D)...