Loading...
Search for:
khazaei--a
0.141 seconds
Total 13843 records
Forecasting Residential Natural Gas Consumption in Tehran Using Machine Learning Methods
, M.Sc. Thesis Sharif University of Technology ; Maleki, Abbas (Supervisor)
Abstract
According to increasing energy demand in Iran and the world, the role of natural gas as a relatively clean and cost-effective source has received more attention. Given the high share of the residential sector in the country's natural gas consumption, providing a model for forecasting the demand of this sector is of great importance for policy makers and decision makers in this field. In the present study, we employ three popular methods of machine learning, support vector regression, artificial neural network and decision tree to predict the consumption of natural gas in the residential sector in Tehran according to meteorological parameters (including temperature, precipitation and wind...
Towards more secure constructions of adjustable join schemes
, Article IEEE Transactions on Dependable and Secure Computing ; Volume 19, Issue 2 , 2022 , Pages 1078-1089 ; 15455971 (ISSN) ; Rafiee, M ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2022
Abstract
An adjustable join (AdjoinAdjoin) scheme [4] is a symmetric-key primitive that enables a user to securely outsource his database to a server, and later to issue join queries for a pair of columns. When queries are extended to a list of columns, the 3Partition3Partition security of Adjoin schemes [8] does not capture the expected security. To address this deficiency, we introduce the syntax and security notion of multi-adjustable join (M-AdjoinM-Adjoin) schemes. We propose a new security notion for this purpose, which we refer to as M3PartitionM3Partition. The 3Partition3Partition security of AdjoinAdjoin extends to the M3PartitionM3Partition security of M-AdjoinM-Adjoin in a straightforward...
Hinting Pseudorandom Generation
, M.Sc. Thesis Sharif University of Technology ; Khazaei, Shahram (Supervisor)
Abstract
In many sciences, including computer science, generating random numbers have always been an interesting problem.Pseudo-random generators are one of the most important solutions to this problem and one of the primitives, used especially in cryptography and computer science, which have made it easier for us to generate random numbers.The main purpose of these generators is to increase the length of an n-bit string to an l-bit string where l>n.We need an initial value called Seed in this definition. We will present a new and stronger definition in this essay, called the Hinting Pseudorandom Generator, which has different outputs as well. Thus, our input is n bits and our output is n.l bits. We...
Effect of long-range correlated disorder on the transverse localization of light in 1D array of optical waveguides
, Article Optics Communications ; Volume 307 , 2013 , Pages 39-45 ; 00304018 (ISSN) ; Mahdavi, S. M ; Bahrampour, A. R ; Golshani, M ; Sharif University of Technology
2013
Abstract
In this paper, the effects of the long-range correlated diagonal disordered optical waveguide arrays in the presence and absence of the positive Kerr nonlinearity are analyzed numerically. The calculated inverse localization length shows that the long-range correlation in a disordered system causes a decrease in the transverse localization in linear optical waveguide arrays. In the presence of positive Kerr nonlinearity, the inverse localization length is increased by increasing the nonlinear parameters in long-range correlated disordered systems in comparison with the uniform distribution disordered systems. This means that the long range correlation causes an enhancement of transverse...
Effect of Kerr nonlinearity on the transverse localization of light in 1D array of optical waveguides with off-diagonal disorder
, Article Optics Communications ; Volume 294 , 2013 , Pages 299-304 ; 00304018 (ISSN) ; Golshani, M ; Bahrampour, A. R ; Mahdavi, S. M ; Sharif University of Technology
2013
Abstract
In this paper a simulation of the transverse localization of light in 1D array of optical waveguides in the presence of off-diagonal disorder is presented. Effects of self-focusing and self-defocusing Kerr nonlinearity on the transverse localization of surface and bulk modes of the disordered waveguides array are taken into consideration. The simulation shows that in the off-diagonal disordered array at low nonlinear parameters, the transverse localization of light becomes more than that of the corresponding diagonal disordered array. However by increasing the nonlinear parameters the diagonal disordered array is localized more than the associated off-diagonal disordered array for both...
Energy consumption in pervaporation, conventional and hybrid processes to separate toluene and i-octane
, Article Chemical Engineering and Processing - Process Intensification ; Volume 128 , June , 2018 , Pages 46-52 ; 02552701 (ISSN) ; Mohebbi, V ; Mosayyebi Behbahani, R ; Ramazani Saadat Abadi, A ; Sharif University of Technology
Elsevier B.V
2018
Abstract
Chemical industries need to employ new process designs due to environmental policies and energy optimization because of the global energy challenge. Pervaporation has been introduced as a promising alternative for conventional processes such as distillation, known as energy intensive process, in chemical plants. In this work, the energy consumption of different processes for separation of toluene and i-octane (representatives of aromatics and aliphatic mixtures) has been evaluated, based on our previous laboratory pervaporation experiments using Polyvinyl alcohol/Graphene oxide mixed matrix membranes. Accordingly, hybrid distillation-pervaporation and cascade pervaporation systems have been...
Poly(vinyl alcohol)/graphene oxide mixed matrix membranes for pervaporation of toluene and isooctane
, Article Polymer - Plastics Technology and Engineering ; Volume 56, Issue 12 , 2017 , Pages 1286-1294 ; 03602559 (ISSN) ; Mohebbi, V ; Behbahani, R. M ; Ahmad Ramazani, S. A ; Sharif University of Technology
2017
Abstract
Poly(vinyl alcohol)/graphene oxide mixed matrix membranes have been prepared and applied for the pervaporation of isooctane (aliphatic) and toluene (aromatic) mixtures. Characteristics of the membranes such as crystallinity, morphology, and swelling have been investigated, and the results have been used to describe pervaporation performance. Experimental tests evidenced that incorporation of low content of graphene oxide nanoplates (0.5 wt%) in poly(vinyl alcohol) increases affinity of the membrane to aromatics by S and π bonds and selectivity increase to about four times. Moreover, interaction of graphene oxide with toluene results in increasing of swelling and decreasing of permeation...
Study of End-to-End Voting Systems Helios and Scantegrity II
, M.Sc. Thesis Sharif University of Technology ; Khazaei, Shahram (Supervisor)
Abstract
Voting is a detachable part of the democratic governments. In the era of modern computer systems, the need for electronic voting systems in no longer avoidable.Designing a secure electronic voting system is a difficult problem since both privacy and integrity must be achieved at the same time. This difficulty has cast the problem to the center of attention of many researchers.In this thesis we will consider the new generation of voting systems known as end-to-end that were designed to solve the problems in the previous generations of voting systems and to uphold the security of the system. Many of end-toend voting systems use concepts of cryptography in addition to machine tools.A central...
Improving the Performance of Distributed Fusion for PHD Filter in Multi-Object Tracking
, M.Sc. Thesis Sharif University of Technology ; Jamzad, Mansour (Supervisor)
Abstract
The Gaussian mixture (cardinalized) probability hypothesis density (GM-(C)PHD) filter is a closed form approximation of multi-target Bayes filter which can overcome most of multi-target tracking problems. Limited field of view, decreasing cost of cameras and its advances induce us to use large-scale camera networks. Increasing the size of camera networks make centralized networks practically inefficient. On the other hand, scalability, simplicity and low data transmission cost has made distributed networks a good replacement for centralized networks. However, data fusion in distributed network is sub-optimal due to unavailable cross-correlation.Among data fusion algorithms which deal with...
Functional Encryption
, M.Sc. Thesis Sharif University of Technology ; Khazaei, Shahram (Supervisor)
Abstract
In this thesis we will focus on Functional Encryption. At first a wide range of different types of requirements and applications which are not fulfilled by Public-Key Encryption are considered. These types of requirements finally led us to Functional Encryption. Then a breaf explanation of differrent types of Functional Encryption is presented. In the sequel we will exlain Functional Encryption more formally. Finally we will consider the latest achievemnets and open problems in this area
A Survey on Searchable Symmetric Encryption Schemes
, M.Sc. Thesis Sharif University of Technology ; Khazaei, Shahram (Supervisor)
Abstract
Using “Searchable Encryption” enables us to encrypt the data, while preserving the possibility of running search queries. One of the most important applications of the mentioned is in Cloud Storage. As users do not trust the Cloud space, they are not inclined to store their data on the Could. The solution to this problem is of course, Cryptography. However, ordinary Cryptography methods, eliminate the data’s searchability. Hence, we need encryption schemes that code the data while retaining their searchability. So far, various schemes has been proposed that differ in their performance, security level, and usage. In this thesis, we aim to discuss and analyze these methods
A rigorous security analysis of a decentralized electronic voting protocol in the universal composability framework
, Article Journal of Information Security and Applications ; Volume 43 , 2018 , Pages 99-109 ; 22142134 (ISSN) ; Rezaei Aliabadi, M ; Sharif University of Technology
Elsevier Ltd
2018
Abstract
Designing an efficient and secure electronic voting (e-voting) protocol without the presence of trusted authorities, known as decentralized voting protocols, is one of the most interesting and challenging problems in cryptography. In these protocols the outcome of the protocol is computed by voters collaborating with each other. We provide a rigorous proof of security of a decentralized e-voting protocol proposed by Khader et al. in the Universal Composability (UC) Framework. This protocol is the state-of-the-art decentralized e-voting protocol in terms of efficiency and security, whose security has only been justified against a set of desired properties required in e-voting protocols. For...
A Survey of Hitting Set Attack on Anonymous Protocols Based on Pure Mix-Net
, M.Sc. Thesis Sharif University of Technology ; Khazaei, Shahram (Supervisor)
Abstract
One of the main requirements in today’s computer networks such as the Internet is protecting the privacy of users. Hence, anonymity is a useful tool for privacy and provides user’s anonymity. So far, several protocols have been designed to provide anonymity but most of the times, attackers found a way to take advantage of weaknesses in the design and implementation of these protocols. There is a class of attacks,where attacker tries to relate clients of anonymity system to each other, regardless of the communication protocols they use, just by observing networks traffic.The MIX technique forms the basis of many popular ervices that offer anonymity of communication in open and shared networks...
Private Set Operations Over Encrypted Data in Cloud Computing
, Ph.D. Dissertation Sharif University of Technology ; Khazaei, Shahram (Supervisor)
Abstract
In recent years, different cryptographic tools have been introduced for a wide range of cloud computing applications that can be classified based on a trade-off between performance and security. In this thesis, we introduced the private set operation schemes, and at their heart, private set intersection schemes, in the cloud computing platform. These schemes are of particular importance because they can be used as basic cryptographic schemes for a wide range of functionalities in the cloud platform. Using these schemes, the user can securely store datasets on the cloud, run set queries remotely and receive the desired results. To this end, we first modeled the syntax and the security notions...
Sutdies in Ideal Access Structures
, Ph.D. Dissertation Sharif University of Technology ; Khazaei, Shahram (Supervisor)
Abstract
In this thesis, in addition to reviewing the previous work done in the study of ideal access structures, we present the author's recent results in this field. As a first result, we introduce a new technique for reducing the size of the secret space in ideal homomorphic secret sharing schemes. The concept of decomposition of secret sharing schemes is formally introduced for the first time. In this regard, we show that ideal homomorphic and abelian secret sharing schemes are decomposable. We also examine the inherent group-characterizability of secret sharing schemes and show that an ideal secret sharing scheme is not necessarily inherently group-characterizable. Some weaker definitions of the...
A full pipeline of diagnosis and prognosis the risk of chronic diseases using deep learning and Shapley values: The Ravansar county anthropometric cohort study
, Article PLoS ONE ; Volume 17, Issue 1 January , 2022 ; 19326203 (ISSN) ; Shohaimi, S ; Salari, N ; Kiaei, A. A ; Najafi, F ; Khazaei, S ; Niaparast, M ; Abdollahi, A ; Mohammadi, M ; Sharif University of Technology
Public Library of Science
2022
Abstract
Anthropometry is a Greek word that consists of the two words "Anthropo"meaning human species and "metery"meaning measurement. It is a science that deals with the size of the body including the dimensions of different parts, the field of motion and the strength of the muscles of the body. Specific individual dimensions such as heights, widths, depths, distances, environments and curvatures are usually measured. In this article, we investigate the anthropometric characteristics of patients with chronic diseases (diabetes, hypertension, cardiovascular disease, heart attacks and strokes) and find the factors affecting these diseases and the extent of the impact of each to make the necessary...
Generalization of Auxiliary Input Leakage Model for Public-Key Cryptosystems
, M.Sc. Thesis Sharif University of Technology ; Khazaei, Shahram (Supervisor)
Abstract
Side channel attacks, where an attacker learns some physical information about the state of a device, are one of the ways in which cryptographic schemes are broken in practice. leakage resilient ryptography addressed this issue at a higher abstraction level, proposing models capturing such attacks. Auxiliary Input is one of these models. In this thesis, we study public-key encryption schemes in this model of leakage. we also propose a method to consider this leakage continuously (i.e., not just one observation of the adversary). at the end, we consider the leakage from both the secret key owner and the encryptor. This odel captures a wider class of side-channel attacks
Security Analysis of Decentralized E-voting Protocols in the Universal Composability Framework
, M.Sc. Thesis Sharif University of Technology ; Khazaei, Shahram (Supervisor)
Abstract
Designing efficient and secure electronic voting protocols without the presence of trusted authorities, which are known as decentralized voting protocols, is one of the most interesting and challenging problems in cryptography. In these protocols the outcome of the protocol is determined by voters collaborating with each other. Since voting is a significant concept in every society, the correctness and security of voting protocols are important. For security analysis of electronic voting protocols, an intuitive proof is not enough and we require a comprehensive approach that provides provable security. In this thesis, we use universal composition framework to analyze a decentralized e-voting...
Studying Ideal Access Structures in Secret Sharing Schemes
, M.Sc. Thesis Sharif University of Technology ; Khazaei, Shahram (Supervisor)
Abstract
A secret sharing scheme involves a dealer who has a secret and distribute that among a set of participants, in such a way that only authorized subsets can recover the secret value. The collection of authorized subsets called the access structure and a secret sharing scheme in which unauthorized subset cannot reveal any partial information about the secret is called a perfect secret sharing scheme. One of the problems in secret sharing schemes is finding the appropriate lower bound for a parameter called the information ratio and optimizing it. A perfect secret sharing scheme is ideal when it has an optimal information ratio. In other words, if all shares have the same length as the secret,...
Efficient fully format compliant selective scrambling methods for compressed video streams
, Article Advanced International Conference on Telecommunications andInternational Conference on Internet and Web Applications and Services, AICT/ICIW'06, Guadelope, 19 February 2006 through 25 February 2006 ; Volume 2006 , 2006 , Pages 42- ; 0769525229 (ISBN); 9780769525228 (ISBN) ; Ghaemmaghami, S ; Khazaei, S ; Sharif University of Technology
2006
Abstract
Format compliance, a desirable feature of multimedia security systems, means that the secured bitstream resembles the unprotected compressed bitstream. It is called full format compliance, if the scrambled stream can be decoded by a typical decoder. In this paper, we address the issues that are to be carefully taken into account to develop efficient fully format compliant scrambling methods for compressed video. We also propose new selective scrambling methods for securing compressed video streams. The security issues, in different parts of these scrambling methods, are analyzed and their impact on bit-rate and complexity is discussed. We show that our scrambling methods provide...