Loading...
Search for: khazaei--m
0.128 seconds

    Multiple human tracking using PHD filter in distributed camera network

    , Article Proceedings of the 4th International Conference on Computer and Knowledge Engineering, ICCKE 2014 ; 2014 , pp. 569-574 ; ISBN: 9781479954865 Khazaei, M ; Jamzad, M ; Sharif University of Technology
    2014
    Abstract
    The Gaussian mixture probability hypothesis density (GM-PHD) filter is a closed form approximation of the multi-target Bayes filter which can overcome most multitarget tracking problems. Limited field of view, decreasing cost of cameras, and advances of using multi-camera induce us to use large-scale camera networks. In this paper, a multihuman tracking framework using the PHD filter in a distributed camera network is proposed. Each camera tracks objects locally with PHD filter and a track-after-detect scheme and its estimates of targets are sent to neighboring nodes. Then each camera fuses its local estimates with it's neighbors. The proposed method is evaluated on the public PETS2009... 

    Towards more secure constructions of adjustable join schemes

    , Article IEEE Transactions on Dependable and Secure Computing ; Volume 19, Issue 2 , 2022 , Pages 1078-1089 ; 15455971 (ISSN) Khazaei, S ; Rafiee, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    An adjustable join (AdjoinAdjoin) scheme [4] is a symmetric-key primitive that enables a user to securely outsource his database to a server, and later to issue join queries for a pair of columns. When queries are extended to a list of columns, the 3Partition3Partition security of Adjoin schemes [8] does not capture the expected security. To address this deficiency, we introduce the syntax and security notion of multi-adjustable join (M-AdjoinM-Adjoin) schemes. We propose a new security notion for this purpose, which we refer to as M3PartitionM3Partition. The 3Partition3Partition security of AdjoinAdjoin extends to the M3PartitionM3Partition security of M-AdjoinM-Adjoin in a straightforward... 

    A rigorous security analysis of a decentralized electronic voting protocol in the universal composability framework

    , Article Journal of Information Security and Applications ; Volume 43 , 2018 , Pages 99-109 ; 22142134 (ISSN) Khazaei, S ; Rezaei Aliabadi, M ; Sharif University of Technology
    Elsevier Ltd  2018
    Abstract
    Designing an efficient and secure electronic voting (e-voting) protocol without the presence of trusted authorities, known as decentralized voting protocols, is one of the most interesting and challenging problems in cryptography. In these protocols the outcome of the protocol is computed by voters collaborating with each other. We provide a rigorous proof of security of a decentralized e-voting protocol proposed by Khader et al. in the Universal Composability (UC) Framework. This protocol is the state-of-the-art decentralized e-voting protocol in terms of efficiency and security, whose security has only been justified against a set of desired properties required in e-voting protocols. For... 

    Efficient fully format compliant selective scrambling methods for compressed video streams

    , Article Advanced International Conference on Telecommunications andInternational Conference on Internet and Web Applications and Services, AICT/ICIW'06, Guadelope, 19 February 2006 through 25 February 2006 ; Volume 2006 , 2006 , Pages 42- ; 0769525229 (ISBN); 9780769525228 (ISBN) Kiaei, M. S ; Ghaemmaghami, S ; Khazaei, S ; Sharif University of Technology
    2006
    Abstract
    Format compliance, a desirable feature of multimedia security systems, means that the secured bitstream resembles the unprotected compressed bitstream. It is called full format compliance, if the scrambled stream can be decoded by a typical decoder. In this paper, we address the issues that are to be carefully taken into account to develop efficient fully format compliant scrambling methods for compressed video. We also propose new selective scrambling methods for securing compressed video streams. The security issues, in different parts of these scrambling methods, are analyzed and their impact on bit-rate and complexity is discussed. We show that our scrambling methods provide... 

    Relationship of profitability of world’s top companies with entrepreneurship, competitiveness, and business environment indicators

    , Article Applied Economics ; Volume 53, Issue 23 , December , 2020 , Pages 2584-2597 Khazaei, M ; Sharif University of Technology
    Routledge  2020
    Abstract
    Identifying the factors affecting profitability is important from the perspective of market players. One of the most important benchmarks of firm performance is accounting profit and effective factors analysis so that users of accounting information analyse the factors affecting profit, firm performance and various aspects of its performance and according to estimates Done, make your own decision on how to allocate resources. The main purpose of this study is to investigate the impact of some factors of competitiveness, entrepreneurship and business environment indicators on the profitability of the world’s top companies. For this purpose, 176 top companies in the world from 2013 to 2018... 

    Relationship of profitability of world’s top companies with entrepreneurship, competitiveness, and business environment indicators

    , Article Applied Economics ; Volume 53, Issue 23 , 2021 , Pages 2584-2597 ; 00036846 (ISSN) Khazaei, M ; Sharif University of Technology
    Routledge  2021
    Abstract
    Identifying the factors affecting profitability is important from the perspective of market players. One of the most important benchmarks of firm performance is accounting profit and effective factors analysis so that users of accounting information analyse the factors affecting profit, firm performance and various aspects of its performance and according to estimates Done, make your own decision on how to allocate resources. The main purpose of this study is to investigate the impact of some factors of competitiveness, entrepreneurship and business environment indicators on the profitability of the world’s top companies. For this purpose, 176 top companies in the world from 2013 to 2018... 

    On ideal homomorphic secret sharing schemes and their decomposition

    , Article Designs, Codes, and Cryptography ; Volume 89, Issue 9 , 2021 , Pages 2079-2096 ; 09251022 (ISSN) Ghasemi, F ; Kaboli, R ; Khazaei, S ; Parviz, M ; Rafiei, M. M ; Sharif University of Technology
    Springer  2021
    Abstract
    In 1992, Frankel and Desmedt introduced a technique that enables one to reduce the secret space of an ideal homomorphic secret sharing scheme (IHSSS) into any of its characteristic subgroups. In this paper, we propose a similar technique to reduce the secret space of IHSSSs called the quotient technique. By using the quotient technique, we show that it is possible to yield an ideal linear scheme from an IHSSS for the same access structure, providing an alternative proof of a recent result by Jafari and Khazaei. Moreover, we introduce the concept of decomposition of secret sharing schemes. We give a decomposition for IHSSSs, and as an application, we present a necessary and sufficient... 

    Effect of long-range correlated disorder on the transverse localization of light in 1D array of optical waveguides

    , Article Optics Communications ; Volume 307 , 2013 , Pages 39-45 ; 00304018 (ISSN) Khazaei Nezhad, M ; Mahdavi, S. M ; Bahrampour, A. R ; Golshani, M ; Sharif University of Technology
    2013
    Abstract
    In this paper, the effects of the long-range correlated diagonal disordered optical waveguide arrays in the presence and absence of the positive Kerr nonlinearity are analyzed numerically. The calculated inverse localization length shows that the long-range correlation in a disordered system causes a decrease in the transverse localization in linear optical waveguide arrays. In the presence of positive Kerr nonlinearity, the inverse localization length is increased by increasing the nonlinear parameters in long-range correlated disordered systems in comparison with the uniform distribution disordered systems. This means that the long range correlation causes an enhancement of transverse... 

    Effect of Kerr nonlinearity on the transverse localization of light in 1D array of optical waveguides with off-diagonal disorder

    , Article Optics Communications ; Volume 294 , 2013 , Pages 299-304 ; 00304018 (ISSN) Khazaei Nezhad, M ; Golshani, M ; Bahrampour, A. R ; Mahdavi, S. M ; Sharif University of Technology
    2013
    Abstract
    In this paper a simulation of the transverse localization of light in 1D array of optical waveguides in the presence of off-diagonal disorder is presented. Effects of self-focusing and self-defocusing Kerr nonlinearity on the transverse localization of surface and bulk modes of the disordered waveguides array are taken into consideration. The simulation shows that in the off-diagonal disordered array at low nonlinear parameters, the transverse localization of light becomes more than that of the corresponding diagonal disordered array. However by increasing the nonlinear parameters the diagonal disordered array is localized more than the associated off-diagonal disordered array for both... 

    Breaking anonymity of some recent lightweight RFID authentication protocols

    , Article Wireless Networks ; Volume 25, Issue 3 , 2018 , Pages 1-18 ; 10220038 (ISSN) Baghery, K ; Abdolmaleki, B ; Khazaei, S ; Aref, M. R ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    Due to their impressive advantages, Radio Frequency IDentification (RFID) systems are ubiquitously found in various novel applications. These applications are usually in need of quick and accurate authentication or identification. In many cases, it has been shown that if such systems are not properly designed, an adversary can cause security and privacy concerns for end-users. In order to deal with these concerns, impressive endeavors have been made which have resulted in various RFID authentications being proposed. In this study, we analyze three lightweight RFID authentication protocols proposed in Wireless Personal Communications (2014), Computers & Security (2015) and Wireless Networks... 

    Breaking anonymity of some recent lightweight RFID authentication protocols

    , Article Wireless Networks ; Volume 25, Issue 3 , 2019 , Pages 1235-1252 ; 10220038 (ISSN) Baghery, K ; Abdolmaleki, B ; Khazaei, S ; Aref, M. R ; Sharif University of Technology
    Springer New York LLC  2019
    Abstract
    Due to their impressive advantages, Radio Frequency IDentification (RFID) systems are ubiquitously found in various novel applications. These applications are usually in need of quick and accurate authentication or identification. In many cases, it has been shown that if such systems are not properly designed, an adversary can cause security and privacy concerns for end-users. In order to deal with these concerns, impressive endeavors have been made which have resulted in various RFID authentications being proposed. In this study, we analyze three lightweight RFID authentication protocols proposed in Wireless Personal Communications (2014), Computers & Security (2015) and Wireless Networks... 

    Game-based privacy analysis of RFID security schemes for confident authentication in IoT

    , Article Wireless Personal Communications ; Volume 95, Issue 4 , 2017 , Pages 5057-5080 ; 09296212 (ISSN) Abdolmaleki, B ; Baghery, K ; Khazaei, S ; Aref, M. R ; Sharif University of Technology
    2017
    Abstract
    Recently, Radio Frequency Identification (RFID) and Near Field Communication systems are found in various user-friendly services that all of us deal with in our daily lives. As these systems are ubiquitously deployed in different authentication and identification applications, inferring information about our behavior will be possible by monitoring our use of them. In order to provide privacy and security requirements of RFID users in novel authentication applications, lots of security schemes have been proposed which have tried to provide secure and untraceable communication for end-users. In this paper, we investigate the privacy of three RFID security schemes which have been proposed... 

    Adsorption dynamics of surface-modified silica nanoparticles at solid-liquid interfaces

    , Article Langmuir ; Volume 38, Issue 41 , 2022 , Pages 12421-12431 ; 07437463 (ISSN) Khazaei, M. A ; Bastani, D ; Mohammadi, A ; Kordzadeh, A ; Sharif University of Technology
    American Chemical Society  2022
    Abstract
    Understanding the adsorption dynamics of nanoparticles at solid-liquid interfaces is of paramount importance to engineer nanoparticles for a variety of applications. The nanoparticle surface chemistry is significant for controlling the adsorption dynamics. This study aimed to experimentally examine the adsorption of surface-modified round-shaped silica nanoparticles (with an average diameter of 12 nm), grafted with hydrophobic (propyl chains) and/or hydrophilic (polyethylene glycol chains) agents, at an aqueous solution-silica interface with spherical soda-lime glass beads (diameter of 3 mm) being used as adsorbents. While no measurable adsorption was observed for solely hydrophobic or... 

    A high-accuracy hybrid method for short-term wind power forecasting

    , Article Energy ; Volume 238 , 2022 ; 03605442 (ISSN) Khazaei, S ; Ehsan, M ; Soleymani, S ; Mohammadnezhad Shourkaei, H ; Sharif University of Technology
    Elsevier Ltd  2022
    Abstract
    In this article, a high-accuracy hybrid approach for short-term wind power forecasting is proposed using historical data of wind farm and Numerical Weather Prediction (NWP) data. The power forecasting is carried out in three stages: wind direction forecasting, wind speed forecasting, and wind power forecasting. In all three phases, the same hybrid method is used, and the only difference is in the input data set. The main steps of the proposed method are constituted of outlier detection, decomposition of time series using wavelet transform, effective feature selection and prediction of each time series decomposed using Multilayer Perceptron (MLP) neural network. The combination of automatic... 

    On The Behavior of Low-Rise, Irregular, Dual Structures

    , M.Sc. Thesis Sharif University of Technology Khazaei, Siamak (Author) ; Mofid, Masoud (Supervisor)
    Abstract
    The Response modification factor R represents the behavior of the structure such as ductility, overstrength and the inherent redundancy. This factor shall be defined according to the type of lateral force resisting system. However, there are some complexities and/or uncertainties in codes related to the R factor according to the height, form of irregularities and structural systems. Therefore, from the scientific point of view as well as reliability, it is very clear that the R factor cannot be similar for all kinds of structures, categorized as a specific group. In this investigation, assuming a low-rise, vertically irregular structure with a heliport which has a dual structural system... 

    Modeling and Optimization of Composite Brake Friction Materials Formulation

    , M.Sc. Thesis Sharif University of Technology Khazaei, Ali (Author) ; Shojaei, Akbar (Supervisor)
    Abstract
    Automotive brake pad is one of the most widely used composites. Commonly, more than 10 components are applied to make these materials and due to the large number of components and interactions between them, choice, explaination of the behavior and optimization of brake friction materials are some industry's challenges. Until now, some methods have been presented to design and optimization of these materials, but due to different complexities, there is lack of practical method that could be used for explaining the tribological behavior, engineering calculation and optimization of brake friction materials. Today, formulation of the current brake pads in the industry has mainly come from trial... 

    Reflection Cryptanalysis of GOST Block Cipher

    , M.Sc. Thesis Sharif University of Technology Oraei, Hossein (Author) ; khazaei, Shahram (Supervisor)
    Abstract
    Block ciphers are the central tool in the design of security protocols. GOST is a block cipher that several attacks have been published on it during the past 20 years. One of them is the reflection attack that was first introduced in 2007. This attack utilizes similarities of some round functions of both encryption and decryption processes. In addition, there are approaches that combines techniques of the reflection attack and variants of the meet-in-the-middle attack. In this thesis, we study reflection-based attacks on GOST. We first describe the GOST block cipher and the reflection attack. Then, we review previous reflectionbased attacks such as reflection-meet-in-the-middle attack and... 

    Linear-Differential Cryptanalysis of Word-Reduced Variants of Cubehash

    , M.Sc. Thesis Sharif University of Technology Javid, Sahand (Author) ; Khazaei, Shahram (Supervisor)
    Abstract
    In this thesis, first we will have a brief review on hash functions and related concepts.Then, we will descibe the hash function, Cubehash, which is one of the competitors in the competition held by NIST for selecting SHA-3 standard. Next, we will describe an attack based on linearization of differential paths in hash functions and apply this attack on Cubehash. At the end, we will discuss the results of this attack on Cubehash  

    Cryptographic Hash Functions from Expander Graphs

    , M.Sc. Thesis Sharif University of Technology Zarei, Afshin (Author) ; khazaei, Shahram (Supervisor)
    Abstract
    A hash function maps efficiently every finite length string to a fixed one. The output represents the entire content of the input, similar to digital fingerprint of input text. In order to be able to use a hash function in cryptography, it should be hard to find two distinct inputs with the same output (collision), because finding a collision in hash functions leads to malicious attacks on many security systems.We say a hash function is provably collision resistant, if finding a collision can be reduced to the known hard problems. Family of MD hash functions are one of the most famous applied hash functions which are considerably used in industrial applications. However, they are not... 

    Randomized partial checking revisited

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 7779 LNCS , February , 2013 , Pages 115-128 ; 03029743 (ISSN) ; 9783642360947 (ISBN) Khazaei, S ; Wikstrom, D ; Sharif University of Technology
    2013
    Abstract
    We study mix-nets with randomized partial checking (RPC) as proposed by Jakobsson, Juels, and Rivest (2002). RPC is a technique to verify the correctness of an execution both for Chaumian and homomorphic mix-nets. The idea is to relax the correctness and privacy requirements to achieve a more efficient mix-net. We identify serious issues in the original description of mix-nets with RPC and show how to exploit these to break both correctness and privacy, both for Chaumian and homomorphic mix-nets. Our attacks are practical and applicable to real world mix-net implementations, e.g., the Civitas and the Scantegrity voting systems