Loading...
Search for: peyvandi--hossein
0.201 seconds

    Attacking Tor; A Report on RAPTOR and Similar Attacking Tors

    , M.Sc. Thesis Sharif University of Technology Banka, Sadaf (Author) ; Peyvandi, Hossein (Supervisor)
    Abstract
    Coming to the generation of technology, where everything is possible through the Internet contributes a significant proportion to privacy protection. Several Privacy protection technologies have been launched to maintain the confidentiality of user information. Tor, also known as an Onion Router, is indeed the largest global anonymized network technology, including over 7000 distinct domain controller endpoints located all over the globe. Various kinds of wrongdoings are increasing day by day such as terrorism, abuse of the child is increasing using the network. To stop this monitoring plan is needed to develop. To enable this all the hacking mechanisms along with the architecture were... 

    Effective Segmentation of Iris in Noisy Eye Images Using C-means based on Grasshopper Optimization Algorithm

    , M.Sc. Thesis Sharif University of Technology Abdulkhaleq Abd Oun, Mazin (Author) ; Peyvandi, Hossein (Supervisor)
    Abstract
    Iris segmentation is an essential step in a medical imaging-based automated diagnosis system. The operation of dividing a digital image into areas with different characteristics and setting objectives is known as image segmentation. The extraction of the iris from unnecessary sections of the image is very important for any biometric device. Eyelid / eyelash obstruction, special reflections, intensity heterogeneity, and an irregular iris border, are considered as noise which affect the iris segmentation process. Focusing on Fuzzy C-Means (FCM) clustering and Grasshopper Optimization Algorithm (GOA), we present a new and efficient method for dividing iris-filled, annoying, and iris limits that... 

    A PSO-OSELM based Machine Learning Method for Internet Traffic Classification

    , M.Sc. Thesis Sharif University of Technology Al Shammari, Amir Abdollah (Author) ; Peyvandi, Hossein (Supervisor)
    Abstract
    Classification of Traffic Internet obtained early interest in the computer science community. Various methods have been presented for classifying the traffic of Internet to manage both security and Quality of Service (QoS). Nonetheless, traditional methods of classification including scheme of Transmission Control Protocol/Internet Protocol (TCP/IP) have not been accepted because of their complicated management. Classification method of network through learning algorithms of machine is the most popular classification method of traffic at this time. ELM was proposed as a modern algorithm of learning for the Single-hidden Layer Feed Forward Neural Networks (SLFNs). Meanwhile, learning process... 

    Primary Visual Pathway Simulation in Mouse Using NetPyNE

    , M.Sc. Thesis Sharif University of Technology Waheed Al-Kaabi, Anwer Fadhil (Author) ; Peyvandi, Hossein (Supervisor)
    Abstract
    Simulation of biophysical neural networks enables the interpretation and integration of fast-growing and different experimental datasets. The widely used NEURON simulator allows molecular-to-network simulation. However, it is still a very hard challenge to create large-scale models and operate parallel simulations applying NEURON. SUNY Downstate developed the NetPyNE means networks using Python and NEURON, which was funded by the New York State Department of Health and some other institutions. NetPyNE is a Python-based tool that enables the development of data-driven multi-scale network models in NEURON through both programmatic and graphical interfaces. It is a powerful tool for parallel... 

    Detection of DDOS Attacks in Network Traffic through Clustering based and Machine Learning Classification

    , M.Sc. Thesis Sharif University of Technology Kazim Al Janabi, Ali Hossein (Author) ; Peyvandi, Hossein (Supervisor)
    Abstract
    Today, with the development of technology, cyberattacks are on the rise. Personal and corporate computer systems can be exposed to various threats and dangers of hackers and malware, including information theft, forgery, and denial of service, which can cause great material and moral damage to individuals and organizations. So, it is necessary to take security measures in this regard. Many security mechanisms are available to prevent security vulnerabilities against various threats. In this study, first, after carefully studying network attacks, we identify the criteria for identifying attacks that can be executed in network traffic and explain how to calculate them. The current research... 

    Palm Vein Pattern Recognition using Deep Convolutional Neural Network (DCNN) with Gabor Filter

    , M.Sc. Thesis Sharif University of Technology Nazari Tavakoli, Amir Ali (Author) ; Motahari, Abolfazl (Supervisor) ; Peyvandi, Hossein (Supervisor)
    Abstract
    Frequently using Personal Identification Information has escalated the security concerns of bank accounts, emails, daily transactions, and other activities. Therefore, user access to such apps must be controlled. Traditional personal verification methods offer limited security because they might need to be remembered or stolen. Therefore, Biometric authentication, which identifies persons by their unique biological information, is gaining popularity. However, palm vein identification is highly secure because the vein patterns are not duplicated in other people, even in monozygotic twins. Moreover, it has a liveness detection and is convenient since the vein pattern cannot be faked,... 

    Off-chain management and state-tracking of smart programs on blockchain for secure and efficient decentralized computation

    , Article International Journal of Computers and Applications ; 2021 ; 1206212X (ISSN) Mallaki, M ; Majidi, B ; Peyvandi, A ; Movaghar, A ; Sharif University of Technology
    Taylor and Francis Ltd  2021
    Abstract
    In the last decade various crypto-currencies opened new doors to a decentralized electronic monetary system. Emergence of new Blockchain platforms, such as Ethereum, introduced new features for the implementation of decentralized software or smart contracts. The applications of blockchain technology for secure and efficient information systems is rapidly increasing. However, due to the limitations of this platform including high computational and storage cost, it is not possible to run sophisticated and computationally expensive software on the blockchain. In this paper, a new framework for execution of smart programs on blockchain called the Smart Program Runner Framework (SPRF) is... 

    Off-chain management and state-tracking of smart programs on blockchain for secure and efficient decentralized computation

    , Article International Journal of Computers and Applications ; Volume 44, Issue 9 , 2022 , Pages 822-829 ; 1206212X (ISSN) Mallaki, M ; Majidi, B ; Peyvandi, A ; Movaghar, A ; Sharif University of Technology
    Taylor and Francis Ltd  2022
    Abstract
    In the last decade various crypto-currencies opened new doors to a decentralized electronic monetary system. Emergence of new Blockchain platforms, such as Ethereum, introduced new features for the implementation of decentralized software or smart contracts. The applications of blockchain technology for secure and efficient information systems is rapidly increasing. However, due to the limitations of this platform including high computational and storage cost, it is not possible to run sophisticated and computationally expensive software on the blockchain. In this paper, a new framework for execution of smart programs on blockchain called the Smart Program Runner Framework (SPRF) is... 

    Calculation of the Energy Release Rate of Nano-Cracks in FCC Materials Via the Many Body Atomic Scale FEM

    , M.Sc. Thesis Sharif University of Technology Ostad Hossein, Alireza (Author) ; Mohammadi Shodja, Hossein (Supervisor)
    Abstract
    Since the classical continuum theory fails to deal with the problems associated with defects, stress concentrators, and relevant deformation phenomena in solids, alternative approaches that can detect the atomistic nature of materials' fracture are required. The deficiency of the capture the size effect which yields delusively high values for some components of the stress field right on the edge of the stress concentrators, and its weakness in describing the complex interaction between small inhomogeneities, cracks and the like when they are only a few nanometers apart, are among some of the disadvantages of the classical approach. In recent years, however, atomistic methods are emerging to... 

    Semisolid Stir Joining of As-Cast Silicon-Aluminum Bronze

    , M.Sc. Thesis Sharif University of Technology Ferasat, Keyvan (Author) ; Kokabi, Amir Hossein (Supervisor) ; Ashuri, Hossein (Supervisor)
    Abstract
    Aluminum Bronzes have many applications in marine environments. These alloys suffer from both hot cracking and cold cracking. In order to overcome the hot cracking and cold cracking, Semisolid Stir Joining method and a proper thermal cycle was used respectively. Effects of temperature, stirring rate, and tool type were investigated in Semisolid Stir joining method. In this method, butt joint design was used in order to place specimens, and the specimens were heated up to specific temperatures (920, 925, 930°C). A stirrer (Cylindrical and Grooved tool) with three rotational speeds (800, 1200, 1600 RPM) was introduced into the stir weld seam. Welded specimens were cooled to the 900°C... 

    The Study of Eliminating Gender Gap in Iran Labor Market on Participation Rate of Married Urban Women

    , M.Sc. Thesis Sharif University of Technology Asghari, Fatemeh (Author) ; Rahmati, Mohammad Hossein (Supervisor) ; Joshaghani, Hossein (Supervisor)
    Abstract
    The low female labor force participation rate in the Iranian labor market relative to the global average and even to countries that do not differ significantly from the socio-economic characteristics of our country is one of the important questions of the Iranian labor market. In this study, we seek to answer the question of whether the economic participation rate of married women will increase if the gender gaps in wages, job findings and job losses among women and men are eliminated in the Iranian labor market. To answer this question using household expenditure and income data and labor force data, we show that between the two categories of occupations, in terms of the share of women's... 

    Graph homomorphisms through random walks [electronic resource]

    , Article Journal of Graph Theory ; 2003, Volume 44, Issue 1, pages 15–38 Daneshgar, A. (Amir) ; Hajiabolhassan, Hossein ; Sharif University of Technology
    Abstract
    In this paper we introduce some general necessary conditions for the existence of graph homomorphisms, which hold in both directed and undirected cases. Our method is a combination of Diaconis and Saloff–Coste comparison technique for Markov chains and a generalization of Haemers interlacing theorem. As some applications, we obtain a necessary condition for the spanning subgraph problem, which also provides a generalization of a theorem of Mohar (1992) as a necessary condition for Hamiltonicity. In particular, in the case that the range is a Cayley graph or an edge-transitive graph, we obtain theorems with a corollary about the existence of homomorphisms to cycles. This, specially, provides... 

    Unique list-colourability and the fixing chromatic number of graphs [electronic resource]

    , Article Discrete Applied Mathematics ; Volume 152, Issues 1–3, 1 November 2005, Pages 123–138 Daneshgar, A. (Amir) ; Hajiabolhassan, Hossein ; Sharif University of Technology
    Abstract
    In this paper we introduce a chromatic parameter, called the fixing chromatic number, which is related to unique colourability of graphs, in the sense that it measures how one can embed the given graph G in G∪Kt by adding edges between G and Kt to make the whole graph uniquely t-colourable. We study some basic properties of this parameter as well as its relationships to some other well-known chromatic numbers as the acyclic chromatic number. We compute the fixing chromatic number of some graph products by applying a modified version of the exponential graph construction  

    Circular colouring and algebraic no-homomorphism theorems

    , Article European Journal of Combinatorics ; Volume 28, Issue 6, August 2007, Pages 1843–1853 Daneshgar, A. (Amir) ; Hajiabolhassan, Hossein ; Sharif University of Technology
    Abstract
    In this paper, we apply some new algebraic no-homomorphism theorems in conjunction with some new chromatic parameters to estimate the circular chromatic number of graphs. To show the applicability of the general results, as a couple of examples, we generalize a well known inequality for the fractional chromatic number of graphs and we also show that the circular chromatic number of the graph obtained from the Petersen graph by excluding one vertex is equal to 3. Also, we focus on the Johnson–Holroyd–Stahl conjecture about the circular chromatic number of Kneser graphs and we propose an approach to this conjecture. In this regard, we introduce a new related conjecture on Kneser graphs and we... 

    Density and power graphs in graph homomorphism problem

    , Article Discrete Mathematics ; Volume 308, Issue 17, 6 September 2008, Pages 4027–4030 Daneshgar, A. (Amir) ; Hajiabolhassan, Hossein ; Sharif University of Technology
    Abstract
    We introduce two necessary conditions for the existence of graph homomorphisms based on the concepts of density and power graph. As corollaries, we obtain a lower bound for the fractional chromatic number, and we set forward elementary proofs of the facts that the circular chromatic number of the Petersen graph is equal to three and the fact that the Coxeter graph is a core  

    The argus-II retinal prosthesis implantation; from the global to local successful experience

    , Article Frontiers in Neuroscience ; Volume 12, Issue SEP , 2018 ; 16624548 (ISSN) Farvardin, M ; Afarid, M ; Attarzadeh, A ; Johari, M. K ; Mehryar, M ; Nowroozzadeh, M. H ; Rahat, F ; Peyvandi, H ; Farvardin, R ; Nami, M ; Sharif University of Technology
    2018
    Abstract
    Over the past few years, visual prostheses (namely, Argus II retinal implant) and gene therapy have obtained FDA approval in treating blindness resulting from retinitis pigmentosa. Compared to gene therapy; Argus II is less costly with a demonstrated favorable outcome, though the vision is yet artificial. To obtain better results, expectation counseling and preoperative retinal assessment are critical. The global experience with Argus II has enrolled no more than 300 cases so far. The first Argus II retinal prosthesis in Iran was successfully implanted in Shiraz (October 2017). To date, Argus II artificial retina is implanted in four patients in Iran. Beside successful surgery and... 

    Temperature dependence study of nonocontact AFM images using molecular dynamics simulations [electronic resource]

    , Article Int. Journal of Modern Physics ; 2012, Vol. 5, pp. 418-432 Nejat Pishkenari, H. (Hossein) ; Meghdar, Ali ; Sharif University of Technology
    Abstract
    The effect of temperature on the noncontact atomic force microscopy (NC-AFM) surface imaging is investigated with the aid of molecular dynamics (MD) analysis based on the Sutton-Chen (SC) interatomic potential. Particular attention is devoted to the tip and sample flexibility at different temperatures. When a gold coated probe is brought close to the Au (001) surface at high temperatures, the tip and surface atoms are pulled together and their distance becomes smaller. The tip and sample atoms displacement varies in the different environment temperatures and this leads to the different interaction forces. Along this line, to study the effect of temperature on the resulting images, we have... 

    Developing an Analytical Model for Predicting the Residual Stresses Induced by Shot Peening with Considering the Effect of Initial Surface Treatment

    , Ph.D. Dissertation Sharif University of Technology Sherafatnia, Khalil (Author) ; Farrahi, Gholam Hossein (Supervisor) ; Mahmoudi, Amir Hossein (Co-Supervisor)
    Abstract
    Shot peening is a cold-working process commonly used in industry to improve the fatigue performance, stress corrosion resistance and surface nano-crystallization of metallic parts. This process extends fatigue life via two mechanisms: Preventing the crack growth due to compressive residual stresses and, preventing the crack initiation because of increased material hardness. These mechanisms are the results of the bombardment of the component's surface with small spherical particles. In this research, an analytical model is developed for estimating the residual stress distribution induced by shot peening process. The modifications of the developed analytical model are related to... 

    Evaluating Reliability of SSDs Against Power Outage

    , M.Sc. Thesis Sharif University of Technology (Author) ; Asadi, Hossein (Supervisor)
    Abstract
    Solid-State Drives (SSDs) provide high performance, low power consumption, and hence are widely used in the I/O cache of enterprise storage systems and high performance servers. Although employing high performance SSDs in the I/O cache of storage systems significantly improves system performance, it comes with significant reliability threats for write operations upon power failures. In order to provide high level of reliability, storage architectures employ SSDs in I/O cache with RAID-1 configuration, however, such configuration only partially mitigates the reliability issues of the SSDs. In this thesis, we analyze the reliability of SSD-based I/O caches against power outage and high...