Loading...
Search for:
khazaei--a
0.142 seconds
Total 13843 records
A unimodal person authentication system based on signing sound
, Article Proceedings - IEEE-EMBS International Conference on Biomedical and Health Informatics: Global Grand Challenge of Health Informatics, BHI 2012 ; 2012 , Pages 152-154 ; 9781457721779 (ISBN) ; Maghooli, K ; Afdideh, F ; Azimi, H ; Sharif University of Technology
IEEE
2012
Abstract
Person authentication based on only the name, password or person identification number is not secured enough. In recent years researchers have focused on human physiological and behavioral parameters, because these parameters are more unique and human-specific than traditional ones. This approach of person authentication is usually called biometric authentication. Signature is the most commonly used behavioral biometric which is investigated in two ways of online and offline by researchers. In online procedure, the temporal indices of signature such as signing velocity, and acceleration are involved to increase the accuracy relative to offline methods and to recognize counterfeit signatures....
Single Base Variant Calling Based on Reference Genome and Reads
, M.Sc. Thesis Sharif University of Technology ; Khazaei, Shahram (Supervisor) ; Motahari, Abolfazl (Co-Advisor)
Abstract
Genome sequencing is one of the fundamental problems in today’s Biology. It has applications in significant problems such as finding association between an individual’s genome sequence and his phenotypes, discovering new genes, and finding evolutionary relations between organisms. Following the rapid advances in sequencing technologies and generation of a huge amount of short reads, efficient computational tools are needed for processing sequencing data. Shortness of reads is a factor that makes the task of reconstructing repetitive genomic regions complicated. In fact, the main challenge in both sequencing and resequencing problems is reconstruction of repeat regions. Common resequencing...
Correlation-Intractable Hash Functions and Their Appliction to NIZK
, M.Sc. Thesis Sharif University of Technology ; Khazaei, Shahram (Supervisor)
Abstract
Correlation-intractability is a random-oracle-like property of hash functions, so one can expect that constructions that are secure in random-oracle-model, remain secure when implemented using a correlation-intractable hash function. This is true about Fiat-Shamir transform which is a method for eliminating interaction from public-coin interactive proofs. One can see that when this method is applied to a public-coin three-round honest-verifier zero-knowledge proof, using a correlation-intractable hash function that also satisfies some mild assumption, the result is a NIZK argument. This is the basis for the correlation-intractability framework for NIZK which recently has been used to...
Linear Secret Sharing from the Optimality Point of View
, M.Sc. Thesis Sharif University of Technology ; Khazaei, Shahram (Supervisor)
Abstract
A secret sharing scheme is a way to share a secret between a group of people so that only authorized subsets can retrieve the original secret. Secret sharing schemes were first introduced by Shamir and Blakley for threshold access structures. In a threshold access structure, a subset of individuals is allowed if the number of members exceeds a predetermined threshold. After Shamir, the study of general access structures was considered, and Ito, Saito, and Nishizeki proposed a way to construct a secret sharing scheme for these structures. Reducing the length of party's share in secret-sharing schemes and finding the optimal scheme for access structures has long been the focus of researchers...
Design of peptide-based inhibitor agent against amyloid-β aggregation: Molecular docking, synthesis and in vitro evaluation
, Article Bioorganic Chemistry ; Volume 102 , September , 2020 ; Erfani, M ; Bavi, O ; Khazaei, S ; Sharifzadeh, M ; Hajiramezanali, M ; Beiki, D ; Shamloo, A ; Sharif University of Technology
Academic Press Inc
2020
Abstract
Formation of the amyloid beta (Aβ) peptide aggregations represents an indispensable role in appearing and progression of Alzheimer disease. β-sheet breaker peptides can be designed and modified with different amino acids in order to improve biological properties and binding affinity to the amyloid beta peptide. In the present study, three peptide sequences were designed based on the hopeful results of LIAIMA peptide and molecular docking studies were carried out onto the monomer and fibril structure of amyloid beta peptide using AutoDock Vina software. According to the obtained interactions and binding energy from docking, the best-designed peptide (D-GABA-FPLIAIMA) was chosen and...
40-years of lake urmia restoration research: review, synthesis and next steps
, Article Science of the Total Environment ; Volume 832 , 2022 ; 00489697 (ISSN) ; Rosenberg, D. E ; Ghale, Y. A. G ; Khazaei, B ; Null, S. E ; Raja, O ; Safaie, A ; Sima, S ; Sorooshian, A ; Wurtsbaugh, W. A ; Sharif University of Technology
Elsevier B.V
2022
Abstract
Public concern over environmental issues such as ecosystem degradation is high. However, restoring coupled human-natural systems requires integration across many science, technology, engineering, management, and governance topics that are presently fragmented. Here, we synthesized 544 peer-reviewed articles published through September 2020 on the desiccation and nascent recovery of Lake Urmia in northwest Iran. We answered nine questions of scientific and popular interest about causes, impacts, stabilization, recovery, and next steps. We find: (1) Expansion of irrigated agriculture, dam construction, and mismanagement impacted the lake more than temperature increases and precipitation...
Breaking anonymity of some recent lightweight RFID authentication protocols
, Article Wireless Networks ; Volume 25, Issue 3 , 2018 , Pages 1-18 ; 10220038 (ISSN) ; Abdolmaleki, B ; Khazaei, S ; Aref, M. R ; Sharif University of Technology
Springer New York LLC
2018
Abstract
Due to their impressive advantages, Radio Frequency IDentification (RFID) systems are ubiquitously found in various novel applications. These applications are usually in need of quick and accurate authentication or identification. In many cases, it has been shown that if such systems are not properly designed, an adversary can cause security and privacy concerns for end-users. In order to deal with these concerns, impressive endeavors have been made which have resulted in various RFID authentications being proposed. In this study, we analyze three lightweight RFID authentication protocols proposed in Wireless Personal Communications (2014), Computers & Security (2015) and Wireless Networks...
Breaking anonymity of some recent lightweight RFID authentication protocols
, Article Wireless Networks ; Volume 25, Issue 3 , 2019 , Pages 1235-1252 ; 10220038 (ISSN) ; Abdolmaleki, B ; Khazaei, S ; Aref, M. R ; Sharif University of Technology
Springer New York LLC
2019
Abstract
Due to their impressive advantages, Radio Frequency IDentification (RFID) systems are ubiquitously found in various novel applications. These applications are usually in need of quick and accurate authentication or identification. In many cases, it has been shown that if such systems are not properly designed, an adversary can cause security and privacy concerns for end-users. In order to deal with these concerns, impressive endeavors have been made which have resulted in various RFID authentications being proposed. In this study, we analyze three lightweight RFID authentication protocols proposed in Wireless Personal Communications (2014), Computers & Security (2015) and Wireless Networks...
Game-based privacy analysis of RFID security schemes for confident authentication in IoT
, Article Wireless Personal Communications ; Volume 95, Issue 4 , 2017 , Pages 5057-5080 ; 09296212 (ISSN) ; Baghery, K ; Khazaei, S ; Aref, M. R ; Sharif University of Technology
2017
Abstract
Recently, Radio Frequency Identification (RFID) and Near Field Communication systems are found in various user-friendly services that all of us deal with in our daily lives. As these systems are ubiquitously deployed in different authentication and identification applications, inferring information about our behavior will be possible by monitoring our use of them. In order to provide privacy and security requirements of RFID users in novel authentication applications, lots of security schemes have been proposed which have tried to provide secure and untraceable communication for end-users. In this paper, we investigate the privacy of three RFID security schemes which have been proposed...
A high-accuracy hybrid method for short-term wind power forecasting
, Article Energy ; Volume 238 , 2022 ; 03605442 (ISSN) ; Ehsan, M ; Soleymani, S ; Mohammadnezhad Shourkaei, H ; Sharif University of Technology
Elsevier Ltd
2022
Abstract
In this article, a high-accuracy hybrid approach for short-term wind power forecasting is proposed using historical data of wind farm and Numerical Weather Prediction (NWP) data. The power forecasting is carried out in three stages: wind direction forecasting, wind speed forecasting, and wind power forecasting. In all three phases, the same hybrid method is used, and the only difference is in the input data set. The main steps of the proposed method are constituted of outlier detection, decomposition of time series using wavelet transform, effective feature selection and prediction of each time series decomposed using Multilayer Perceptron (MLP) neural network. The combination of automatic...
, M.Sc. Thesis Sharif University of Technology ; Bahrampour, Alireza (Supervisor)
Abstract
By employing the image theory the Er doped microsphere coupled to an external cavity made by a metallic mirror is simulated by a bimicrosphere laser. The symmetric structure causes the formation of odd and even modes corresponding to the TE and TM mode of the microsphere and splitting the oscillation frequencies. The oscillation frequencies are dependent on the coupling coefficient. The coupling coefficient is obtained near the mirror-microsphere distance. The ohmic mirror loss also is determined as a function of the mirror distance. The total optical loss experienced in these resonators is exceptionally low. In fact,quality factor as high as 108 − 1011 have already been demonstrated for...
Heterogeneous catalytic ozonation by Nano-MgO is better than sole ozonation for metronidazole degradation, toxicity reduction, and biodegradability improvement
, Article Desalination and Water Treatment ; Volume 57, Issue 35 , 2016 , Pages 16435-16444 ; 19443994 (ISSN) ; Bahrami Asl, F ; Farzadkia, M ; Esrafili, A ; Salahshour Arian, S ; Khazaei, M ; Dadban Shahamat, Y ; Zeynalzadeh, D ; Sharif University of Technology
Taylor and Francis Inc
2016
Abstract
Abstract: In the current paper, the removal efficiency of metronidazole (MNZ) using a catalytic ozonation process (COP) in the presence of magnesium oxide nanocrystals, as a catalyst, was investigated in deionized water and compared with a sole ozonation process (SOP). The influence of several operational factors on both removal processes was evaluated: solution pH, MgO dosage, initial MNZ concentration, and reaction time. Biodegradability improvement, mineralization rate, oxidation intermediates, and toxicity were also studied for the COP. The results showed that MgO nanocrystals accelerated MNZ removal compared to the SOP. The optimum pH for both SOP and COP was obtained at 10 and optimum...
On ideal homomorphic secret sharing schemes and their decomposition
, Article Designs, Codes, and Cryptography ; Volume 89, Issue 9 , 2021 , Pages 2079-2096 ; 09251022 (ISSN) ; Kaboli, R ; Khazaei, S ; Parviz, M ; Rafiei, M. M ; Sharif University of Technology
Springer
2021
Abstract
In 1992, Frankel and Desmedt introduced a technique that enables one to reduce the secret space of an ideal homomorphic secret sharing scheme (IHSSS) into any of its characteristic subgroups. In this paper, we propose a similar technique to reduce the secret space of IHSSSs called the quotient technique. By using the quotient technique, we show that it is possible to yield an ideal linear scheme from an IHSSS for the same access structure, providing an alternative proof of a recent result by Jafari and Khazaei. Moreover, we introduce the concept of decomposition of secret sharing schemes. We give a decomposition for IHSSSs, and as an application, we present a necessary and sufficient...
Dynamic Searchable Encryption Schemes
, M.Sc. Thesis Sharif University of Technology ; Khazaei, Shahram (Supervisor) ; Rafiee Karkevandi, Mojtaba (Supervisor)
Abstract
Dynamic searchable encryption schemes enable keyword search query and update operations on encrypted data. One of their applications is to use them in cloud storage services that allow the client to store, search and update data on an external server. Due to the importance of efficiency in real-world applications, retrieving information in searchable schemes involves leakage of some information such as search and access patterns. However, with the addition of update operations (insertion and deletion), more leakages are considered for these schemes. In this regard, reducing the amount of information disclosed to the server is necessary. For this purpose, forward and backward security...
Light propagation and Localization in Inhomogeneous and Random Optical Waveguide Lattices
, Ph.D. Dissertation Sharif University of Technology ; Mahdavi, Mohammad (Supervisor) ; Bahrampour, Ali Reza (Co-Advisor)
Abstract
Photonic lattices can provide an inexpensive and fine tools to investigate some common phenomena in condensed matter physics, quantum optics, relativistic mechanics,atomic and molecular physics. These phenomena contain Anderson localization,Bloch oscillation, Dynamic localization, coherent and squeezed states, Relativistic Dirac equation, Rabi oscillation, ... .In this thesis, it was investigated three worthy phenomena of them, which at first are introduced in condensed matter physics for electronic systems, in photonic lattices. These phenomena are as follow: Transverse localization of light wave, Bloch oscillation and dynamic localization of light. It was also simulate classically, the...
Improvement of fault detection in wireless sensor networks
, Article 2009 Second ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM 2009, Sanya, 8 August 2009 through 9 August 2009 ; Volume 4 , 2009 , Pages 644-646 ; 9781424442461 (ISBN) ; Barati, A ; Movaghar, A ; Yangzhou University; Guangdong University of Business Studies; Wuhan Institute of Technology; IEEE SMC TC on Education Technology and Training; IEEE Technology Management Council ; Sharif University of Technology
2009
Abstract
This paper presents a centralized fault detection algorithm for wireless sensor networks. Faulty sensor nodes are identified based on comparisons between neighboring nodes and own central node and dissemination of the decision made at each node. RNS system is used to tolerate transient faults in sensing and communication. In this system, arithmetic operations act on residues - reminder of dividing original number in several definite modules - in parallel. Consequently computations on these residues which are smaller than the original number are performed, so speed up arithmetic and decreased power consumption is achieved. ©2009 IEEE
Stochastic nature of series of waiting times
, Article Physical Review E - Statistical, Nonlinear, and Soft Matter Physics ; Volume 87, Issue 6 , 2013 ; 15393755 (ISSN) ; Aghamohammadi, C ; Dashti Naserabadi, H ; Salehi, E ; Behjat, E ; Qorbani, M ; Khazaei Nezhad, M ; Zirak, M ; Hadjihosseini, A ; Peinke, J ; Tabar, M. R. R ; Sharif University of Technology
2013
Abstract
Although fluctuations in the waiting time series have been studied for a long time, some important issues such as its long-range memory and its stochastic features in the presence of nonstationarity have so far remained unstudied. Here we find that the "waiting times" series for a given increment level have long-range correlations with Hurst exponents belonging to the interval 1/2
Mental arousal level recognition competition on the shared database
, Article 27th Iranian Conference on Electrical Engineering, ICEE 2019, 30 April 2019 through 2 May 2019 ; 2019 , Pages 1730-1736 ; 9781728115085 (ISBN) ; Rezania, S ; Khazaei, E ; Taghibeyglou, B ; Hashemi, S. S ; Kaveh, R ; Abootalebi, V ; Bagheri, S ; Homayounfar, M ; Asadi, M ; Mohammadian, A ; Mozafari, M ; Hasanzadeh, N ; DIni, H ; Sarvi, H. M ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2019
Abstract
This paper presents the results of the shared task with the aim of arousal level recognition for the competition held in conjunction with the 27th Iranian Conference on Electrical Engineering (ICEE 2019). A database annotated with arousal level labels released by Research Center for Development of Advanced Technologies. The contest was held on arousal database according to a defined protocol. Three teams were able to enter into the final stage of the competition according to compare their performance measure with the baseline method. The baseline method is proposed by the data owner. The aim of this paper is outlining the database, protocol design, and providing an overview of top-ranked...
Intelligent semi-active vibration control of eleven degrees of freedom suspension system using magnetorheological dampers
, Article Journal of Mechanical Science and Technology ; Volume 26, Issue 2 , 2012 , Pages 323-334 ; 1738494X (ISSN) ; Sarrafan, A ; Khayyat, A. A. A ; Zabihollah, A ; Sharif University of Technology
2012
Abstract
A novel intelligent semi-active control system for an eleven degrees of freedom passenger car's suspension system using magnetorheological (MR) damper with neuro-fuzzy (NF) control strategy to enhance desired suspension performance is proposed. In comparison with earlier studies, an improvement in problem modeling is made. The proposed method consists of two parts: a fuzzy control strategy to establish an efficient controller to improve ride comfort and road handling (RCH) and an inverse mapping model to estimate the force needed for a semi-active damper. The fuzzy logic rules are extracted based on Sugeno inference engine. The inverse mapping model is based on an artificial neural network...
Performance and exhaust emission characteristics of a spark ignition engine operated with gasoline and CNG blend
, Article Proceedings of the Spring Technical Conference of the ASME Internal Combustion Engine Division ; 2012 , Pages 179-187 ; 15296598 (ISSN) ; 9780791844663 (ISBN) ; Hamidi, A. A ; Mozafari, A. A ; Sharif University of Technology
2012
Abstract
Using CNG as an additive for gasoline is a proper choice due to higher octane number of CNG enriched gasoline with respect to that of gasoline. As a result, it is possible to use gasoline with lower octane number in the engine. This would also mean the increase of compression ratio in SI engines resulting in higher performance and lower gasoline consumption. Over the years, the use of simulation codes to model the thermodynamic cycle of an internal combustion engine have developed tools for more efficient engine designs and fuel combustion. In this study, a thermodynamic cycle simulation of a conventional four-stroke spark-ignition engine has been developed. The model is used to study the...