Loading...
Search for:
mathematical-techniques
0.018 seconds
Total 39 records
On ideal homomorphic secret sharing schemes and their decomposition
, Article Designs, Codes, and Cryptography ; Volume 89, Issue 9 , 2021 , Pages 2079-2096 ; 09251022 (ISSN) ; Kaboli, R ; Khazaei, S ; Parviz, M ; Rafiei, M. M ; Sharif University of Technology
Springer
2021
Abstract
In 1992, Frankel and Desmedt introduced a technique that enables one to reduce the secret space of an ideal homomorphic secret sharing scheme (IHSSS) into any of its characteristic subgroups. In this paper, we propose a similar technique to reduce the secret space of IHSSSs called the quotient technique. By using the quotient technique, we show that it is possible to yield an ideal linear scheme from an IHSSS for the same access structure, providing an alternative proof of a recent result by Jafari and Khazaei. Moreover, we introduce the concept of decomposition of secret sharing schemes. We give a decomposition for IHSSSs, and as an application, we present a necessary and sufficient...
On the failure probability of used coherent systems
, Article Communications in Statistics - Theory and Methods ; Vol. 43, issue. 10-12 , May , 2014 , pp. 2468-2475 ; ISSN: 03610926 ; Asadi, A. R ; Sharif University of Technology
Abstract
In analyzing the lifetime properties of a coherent system, the concept of "signature" is a useful tool. Let T be the lifetime of a coherent system having n iid components. The signature of the system is a probability vector s=(s1, s2,., sn), such that s i=P(T=Xi:n), where, Xi:n, i=1, 2,., n denote the ordered lifetimes of the components. In this note, we assume that the system is working at time t>0. We consider the conditional signature of the system as a vector in which the ith element is defined as pi(t)=P(T=Xi: n|T>t) and investigate its properties as a function of time
Integration of image de-blurring in an aerial Mono-SLAM
, Article Proceedings of the Institution of Mechanical Engineers, Part G: Journal of Aerospace Engineering ; Vol. 228, issue. 8 , May , 2014 , p. 1348-1362 ; Gholampour, P ; Malaek, S. M. B ; Sharif University of Technology
Abstract
In this article, we discuss the possibility of integrating image de-blurring techniques in an aerial simultaneous localization and mapping by a single camera (monocular simultaneous localization and mapping (Mono-SLAM)). We use an integrated aerial virtual environment together with a six-degree-of-freedom aircraft flight simulator to show the effectiveness of the approach to generate three-dimensional flight trajectories via integration of image de-blurring in the associated loop of the Mono-SLAM. The objective is to increase the overall performance of a flying mission over an unknown area by means of a vision-only method. The integrated aerial virtual environment produces and collects...
Nonlinear bending of functionally graded tapered beams subjected to thermal and mechanical loading
, Article International Journal of Non-Linear Mechanics ; Vol. 65, issue , October , 2014 , p. 141-147 ; Fallah, A ; Aghdam, M. M ; Sharif University of Technology
Abstract
Non-linear bending analysis of tapered functionally graded (FG) beam subjected to thermal and mechanical load with general boundary condition is studied. The governing equations are derived and a discussion is made about the possibility of obtaining analytical solution. In the case of no axial force along the beam, a closed form solution is presented for the problem. For the general case with axial force, the Galerkin technique is employed to overcome the shortcoming of the analytical solution. Moreover, the Generalized Differential Quadrature (GDQ) method is also implemented to discretize and solve the governing equations in the general form and validate the results obtained from two other...
Lower bounds for the blow-up time in a semilinear parabolic problem involving a variable source
, Article Applied Mathematics Letters ; Vol. 27, issue , 2014 , p. 49-52 ; Ghaemi, M ; Hesaaraki, M ; Sharif University of Technology
Abstract
This letter is concerned with the blow-up of the solutions to a semilinear parabolic problem with a reaction given by a variable exponent. Lower bounds for the time of blow-up are derived if the solutions blow up
The effect of fractional order on oscillatory behavior of scalar fractional delay systems of neutral type
, Article IFAC Proceedings Volumes (IFAC-PapersOnline) ; February , 2013 , Pages 480-485 ; 14746670 (ISSN); 9783902823274 (ISBN) ; Haeri, M ; Sharif University of Technology
2013
Abstract
The undamped oscillations of a scalar fractional neutral system are studied in this paper. For this purpose, it is proved that this kind of systems can have the oscillatory behavior. The necessary and sufficient condition is proposed to determine that there exists a delay value for which the system oscillates. The frequency, amplitude and required delay for the undamped oscillations depend on the fractional order. However, the behavior of dependencies is not specified. Indeed, when the system has oscillatory behavior, it is bounded-input bounded-output stable for delay less than the required delay. Moreover, when the order is approaching to an integer value, the necessary and sufficient...
Free vibration analysis of moderately thick functionally graded plates on elastic foundation using the extended Kantorovich method
, Article Archive of Applied Mechanics ; Volume 83, Issue 2 , February , 2013 , Pages 177-191 ; 09391533 (ISSN) ; Aghdam, M. M ; Kargarnovin, M. H ; Sharif University of Technology
2013
Abstract
Free vibration analysis of moderately thick rectangular FG plates on elastic foundation with various combinations of simply supported and clamped boundary conditions are studied. Winkler model is considered to describe the reaction of elastic foundation on the plate. Governing equations of motion are obtained based on the Mindlin plate theory. A semi-analytical solution is presented for the governing equations using the extended Kantorovich method together with infinite power series solution. Results are compared and validated with available results in the literature. Effects of elastic foundation, boundary conditions, material, and geometrical parameters on natural frequencies of the FG...
A note on comaximal graph of non-commutative rings
, Article Algebras and Representation Theory ; Volume 16, Issue 2 , 2013 , Pages 303-307 ; 1386923X (ISSN) ; Habibi, M ; Majidinya A ; Manaviyat, R ; Sharif University of Technology
Kluwer Academic Publishers
2013
Abstract
Let R be a ring with unity. The graph (R) is a graph with vertices as elements of R, where two distinct vertices a and b are adjacent if and only if Ra + Rb = R. Let 2(R) be the subgraph of (R) induced by the non-unit elements of R. Let R be a commutative ring with unity and let J(R) denote the Jacobson radical of R. If R is not a local ring, then it was proved that: (a) If 2(R)J(R) is a complete n-partite graph, then n = 2. (b) If there exists a vertex of 2(R)J(R) which is adjacent to every vertex, then R ≅ ℤ2 × F, where F is a field. In this note we generalize the above results to non-commutative rings and characterize all non-local ring R (not necessarily commutative) whose 2(R)J(R) is a...
On the diameter and girth of zero-divisor graphs of posets
, Article Discrete Applied Mathematics ; Volume 160, Issue 9 , 2012 , Pages 1319-1324 ; 0166218X (ISSN) ; Das, A. K ; Maimani, H. R ; Pournaki, M. R ; Yassemi, S ; Sharif University of Technology
2012
Abstract
In this paper, we deal with zero-divisor graphs of posets. We prove that the diameter of such a graph is either 1, 2 or 3 while its girth is either 3, 4 or ∞. We also characterize zero-divisor graphs of posets in terms of their diameter and girth
An automatic JPEG ghost detection approach for digital image forensics
, Article 24th Iranian Conference on Electrical Engineering, ICEE 2016, 10 May 2016 through 12 May 2016 ; 2016 , Pages 1645-1649 ; 9781467387897 (ISBN) ; Babaie Zadeh, M ; Sadri, A. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2016
Abstract
In this paper we propose a new automatic method for discriminating original and tampered images based on 'JPEG ghost detection' method, which is a subset of format-based image forensics approaches. The inconsistency of quality factors indicates that the photo is a composite one created from at least two different cameras and therefore it is a manipulated photo. Our classification algorithm first extracts the ghost border. Then the image is classified as original or tampered groups by thresholding a distance in feature space. © 2016 IEEE
A semilinear PDE with free boundary
, Article Nonlinear Analysis, Theory, Methods and Applications ; Volume 151 , 2017 , Pages 145-163 ; 0362546X (ISSN) ; Shahgholian, H ; Sharif University of Technology
Elsevier Ltd
2017
Abstract
We study the semilinear problem Δu=λ+(x)(u+)q−1−λ−(x)(u−)q−1inB1, from a regularity point of view for solutions and the free boundary ∂{±u>0}. Here B1 is the unit ball, 1
Epistemic protocols for dynamic gossip
, Article Journal of Applied Logic ; Volume 20 , 2017 , Pages 1-31 ; 15708683 (ISSN) ; Van Eijck, J ; Pardo, P ; Ramezanian, R ; Schwarzentruber, F ; Sharif University of Technology
Abstract
A gossip protocol is a procedure for spreading secrets among a group of agents, using a connection graph. In each call between a pair of connected agents, the two agents share all the secrets they have learnt. In dynamic gossip problems, dynamic connection graphs are enabled by permitting agents to spread as well the telephone numbers of other agents they know. This paper characterizes different distributed epistemic protocols in terms of the (largest) class of graphs where each protocol is successful, i.e. where the protocol necessarily ends up with all agents knowing all secrets. © 2016 Elsevier B.V
A technique to improve De-anonymization attacks on graph data
, Article 26th Iranian Conference on Electrical Engineering, ICEE 2018, 8 May 2018 through 10 May 2018 ; 2018 , Pages 704-709 ; 9781538649169 (ISBN) ; Delavar, M ; Mohajeri, J ; Salmasizadeh, M ; Sharif University of Technology
Abstract
Social networks and the shared data in these networks are always considered as good opportunities in hands of the attackers. To evaluate the privacy risks in these networks and challenge the anonymization techniques, several de-anonymization attacks have been introduced so far. In this paper, we propose a technique to improve the success rate of passive seed based de-anonymization attacks. Our proposed technique is simple and can be applied in combination with different types of de-anonymization attacks. We show that it can achieve high success rates with low number of seeds compared to similar attacks. Our technique can also be used for applying partial attacks on graphs which results in...
Division algebras with left algebraic commutators
, Article Algebras and Representation Theory ; Volume 21, Issue 4 , 2018 , Pages 807-816 ; 1386923X (ISSN) ; Akbari, S ; Bien, M. H ; Sharif University of Technology
Springer Netherlands
2018
Abstract
Let D be a division algebra with center F and K a (not necessarily central) subfield of D. An element a ∈ D is called left algebraic (resp. right algebraic) over K, if there exists a non-zero left polynomial a0 + a1x + ⋯ + anxn (resp. right polynomial a0 + xa1 + ⋯ + xnan) over K such that a0 + a1a + ⋯ + anan = 0 (resp. a0 + aa1 + ⋯ + anan). Bell et al. proved that every division algebra whose elements are left (right) algebraic of bounded degree over a (not necessarily central) subfield must be centrally finite. In this paper we generalize this result and prove that every division algebra whose all multiplicative commutators are left (right) algebraic of bounded degree over a (not...
Invariance in growth and mass transport
, Article Mathematics and Mechanics of Solids ; Volume 24, Issue 6 , 2019 , Pages 1707-1713 ; 10812865 (ISSN) ; Epstein, M ; Sharif University of Technology
SAGE Publications Inc
2019
Abstract
The equations of balance of a continuum under conditions of growth and mass diffusion are derived from a principle of invariance under general observer transformations. The resulting equations are invariant under inertial transformations. Apparent body forces stemming from the mass transport phenomenon are identified and shown to be associated with non-inertial observers
Mental arousal level recognition competition on the shared database
, Article 27th Iranian Conference on Electrical Engineering, ICEE 2019, 30 April 2019 through 2 May 2019 ; 2019 , Pages 1730-1736 ; 9781728115085 (ISBN) ; Rezania, S ; Khazaei, E ; Taghibeyglou, B ; Hashemi, S. S ; Kaveh, R ; Abootalebi, V ; Bagheri, S ; Homayounfar, M ; Asadi, M ; Mohammadian, A ; Mozafari, M ; Hasanzadeh, N ; DIni, H ; Sarvi, H. M ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2019
Abstract
This paper presents the results of the shared task with the aim of arousal level recognition for the competition held in conjunction with the 27th Iranian Conference on Electrical Engineering (ICEE 2019). A database annotated with arousal level labels released by Research Center for Development of Advanced Technologies. The contest was held on arousal database according to a defined protocol. Three teams were able to enter into the final stage of the competition according to compare their performance measure with the baseline method. The baseline method is proposed by the data owner. The aim of this paper is outlining the database, protocol design, and providing an overview of top-ranked...
Mixed paths and cycles determined by their spectrum
, Article Linear Algebra and Its Applications ; Volume 586 , 2020 , Pages 325-346 ; Ghafari, A ; Nahvi, M ; Nematollahi, M. A ; Sharif University of Technology
Elsevier Inc
2020
Abstract
A mixed graph is obtained from a graph by orienting some of its edges. The Hermitian adjacency matrix of a mixed graph with the vertex set {v1,…,vn}, is the matrix H=[hij]n×n, where hij=−hji=i if there is a directed edge from vi to vj, hij=1 if there exists an undirected edge between vi and vj, and hij=0 otherwise. The Hermitian spectrum of a mixed graph is defined to be the spectrum of its Hermitian adjacency matrix. In this paper we study mixed graphs which are determined by their Hermitian spectrum (DHS). First, we show that each mixed cycle is switching equivalent to either a mixed cycle with no directed edges (Cn), a mixed cycle with exactly one directed edge (Cn 1), or a mixed cycle...
Determination of potential function in contact problems
, Article 8th International Conference on Computer Methods and Experimental Measurements for Surface and Contact Mechanics, CONTACT/SURFACE 2007, 16 May 2007 through 18 May 2007 ; Volume 55 , 2007 , Pages 227-236 ; 17433533 (ISSN); 9781845640736 (ISBN) ; Adibnazari, S ; Sharif University of Technology
2007
Abstract
In this paper, a relation is introduced that simplifies the determination of the Muskhelishvilis potential function in plane contact problems. The relation is (z)=1/2[p(z)iq(z)], which is correct for all uncoupled-elastic contact problems. This relation is proved in a mathematical way and utilized to obtain the potential function in several contact problems. A complete agreement has been observed between our results and the potential functions that have been obtained from complicated methods in the past. Utilization of the relation simplifies the solution of contact problems and analytical calculation of the stress and displacement fields, which is helpful in the analytical studies of...
Chaos prediction in MEMS-NEMS resonators
, Article International Journal of Engineering Science ; Vol. 82 , 2014 , pp. 74-83 ; ISSN: 00207225 ; Pishkenari, H. N ; Yousefi-Koma, A ; Tajaddodianfar, F ; Sharif University of Technology
Abstract
Different nonlinearities in micro-electro-mechanical resonators lead to various nonlinear behaviors such as chaotic motion which can affect the resonator performance. As a result, it is important to properly identify and analyze the chaotic regions in resonators. In this paper, a novel method is proposed for prediction of the chaos in the micro- and nano-electro-mechanical resonators. Based on the proposed method, first an accurate analytical solution for the dynamics behavior of the nano-resonators is derived using the multiple scales method up to the second order. The results obtained by this analytical solution are validated by comparing them with the numerical ones. Using the analytical...
An analytical solution for shape-memory-polymer Euler-Bernoulli beams under bending
, Article International Journal of Mechanical Sciences ; Vol. 84, issue , July , 2014 , p. 84-90 ; Mohammadi, H ; Naghdabadi, R ; Sharif University of Technology
Abstract
The purpose of this paper is to present efficient and accurate analytical expressions for deflection of a shape memory polymer (SMP) beam employing Euler-Bernoulli beam theory in a thermomechanical SMP cycle. Material behavior is considered using a recently 3D thermodynamically consistent constitutive model available in literature. In different steps of an SMP thermomechanical cycle, closed form expressions for internal variables variations, stresses and beam curvature distribution are presented. We show that during the cooling process, stored strains evolve to fix the temporary shape and then during the heating process they relax to recover the permanent shape. Effects of applying external...