Loading...
Search for: mathematical-techniques
0.018 seconds
Total 39 records

    On ideal homomorphic secret sharing schemes and their decomposition

    , Article Designs, Codes, and Cryptography ; Volume 89, Issue 9 , 2021 , Pages 2079-2096 ; 09251022 (ISSN) Ghasemi, F ; Kaboli, R ; Khazaei, S ; Parviz, M ; Rafiei, M. M ; Sharif University of Technology
    Springer  2021
    Abstract
    In 1992, Frankel and Desmedt introduced a technique that enables one to reduce the secret space of an ideal homomorphic secret sharing scheme (IHSSS) into any of its characteristic subgroups. In this paper, we propose a similar technique to reduce the secret space of IHSSSs called the quotient technique. By using the quotient technique, we show that it is possible to yield an ideal linear scheme from an IHSSS for the same access structure, providing an alternative proof of a recent result by Jafari and Khazaei. Moreover, we introduce the concept of decomposition of secret sharing schemes. We give a decomposition for IHSSSs, and as an application, we present a necessary and sufficient... 

    On the failure probability of used coherent systems

    , Article Communications in Statistics - Theory and Methods ; Vol. 43, issue. 10-12 , May , 2014 , pp. 2468-2475 ; ISSN: 03610926 Asadi, M ; Asadi, A. R ; Sharif University of Technology
    Abstract
    In analyzing the lifetime properties of a coherent system, the concept of "signature" is a useful tool. Let T be the lifetime of a coherent system having n iid components. The signature of the system is a probability vector s=(s1, s2,., sn), such that s i=P(T=Xi:n), where, Xi:n, i=1, 2,., n denote the ordered lifetimes of the components. In this note, we assume that the system is working at time t>0. We consider the conditional signature of the system as a vector in which the ith element is defined as pi(t)=P(T=Xi: n|T>t) and investigate its properties as a function of time  

    Integration of image de-blurring in an aerial Mono-SLAM

    , Article Proceedings of the Institution of Mechanical Engineers, Part G: Journal of Aerospace Engineering ; Vol. 228, issue. 8 , May , 2014 , p. 1348-1362 Atashgah, M. A. A ; Gholampour, P ; Malaek, S. M. B ; Sharif University of Technology
    Abstract
    In this article, we discuss the possibility of integrating image de-blurring techniques in an aerial simultaneous localization and mapping by a single camera (monocular simultaneous localization and mapping (Mono-SLAM)). We use an integrated aerial virtual environment together with a six-degree-of-freedom aircraft flight simulator to show the effectiveness of the approach to generate three-dimensional flight trajectories via integration of image de-blurring in the associated loop of the Mono-SLAM. The objective is to increase the overall performance of a flying mission over an unknown area by means of a vision-only method. The integrated aerial virtual environment produces and collects... 

    Nonlinear bending of functionally graded tapered beams subjected to thermal and mechanical loading

    , Article International Journal of Non-Linear Mechanics ; Vol. 65, issue , October , 2014 , p. 141-147 Niknam, H ; Fallah, A ; Aghdam, M. M ; Sharif University of Technology
    Abstract
    Non-linear bending analysis of tapered functionally graded (FG) beam subjected to thermal and mechanical load with general boundary condition is studied. The governing equations are derived and a discussion is made about the possibility of obtaining analytical solution. In the case of no axial force along the beam, a closed form solution is presented for the problem. For the general case with axial force, the Galerkin technique is employed to overcome the shortcoming of the analytical solution. Moreover, the Generalized Differential Quadrature (GDQ) method is also implemented to discretize and solve the governing equations in the general form and validate the results obtained from two other... 

    Lower bounds for the blow-up time in a semilinear parabolic problem involving a variable source

    , Article Applied Mathematics Letters ; Vol. 27, issue , 2014 , p. 49-52 Baghaei, K ; Ghaemi, M ; Hesaaraki, M ; Sharif University of Technology
    Abstract
    This letter is concerned with the blow-up of the solutions to a semilinear parabolic problem with a reaction given by a variable exponent. Lower bounds for the time of blow-up are derived if the solutions blow up  

    The effect of fractional order on oscillatory behavior of scalar fractional delay systems of neutral type

    , Article IFAC Proceedings Volumes (IFAC-PapersOnline) ; February , 2013 , Pages 480-485 ; 14746670 (ISSN); 9783902823274 (ISBN) Mesbahi, A ; Haeri, M ; Sharif University of Technology
    2013
    Abstract
    The undamped oscillations of a scalar fractional neutral system are studied in this paper. For this purpose, it is proved that this kind of systems can have the oscillatory behavior. The necessary and sufficient condition is proposed to determine that there exists a delay value for which the system oscillates. The frequency, amplitude and required delay for the undamped oscillations depend on the fractional order. However, the behavior of dependencies is not specified. Indeed, when the system has oscillatory behavior, it is bounded-input bounded-output stable for delay less than the required delay. Moreover, when the order is approaching to an integer value, the necessary and sufficient... 

    Free vibration analysis of moderately thick functionally graded plates on elastic foundation using the extended Kantorovich method

    , Article Archive of Applied Mechanics ; Volume 83, Issue 2 , February , 2013 , Pages 177-191 ; 09391533 (ISSN) Fallah, A ; Aghdam, M. M ; Kargarnovin, M. H ; Sharif University of Technology
    2013
    Abstract
    Free vibration analysis of moderately thick rectangular FG plates on elastic foundation with various combinations of simply supported and clamped boundary conditions are studied. Winkler model is considered to describe the reaction of elastic foundation on the plate. Governing equations of motion are obtained based on the Mindlin plate theory. A semi-analytical solution is presented for the governing equations using the extended Kantorovich method together with infinite power series solution. Results are compared and validated with available results in the literature. Effects of elastic foundation, boundary conditions, material, and geometrical parameters on natural frequencies of the FG... 

    A note on comaximal graph of non-commutative rings

    , Article Algebras and Representation Theory ; Volume 16, Issue 2 , 2013 , Pages 303-307 ; 1386923X (ISSN) Akbari, S ; Habibi, M ; Majidinya A ; Manaviyat, R ; Sharif University of Technology
    Kluwer Academic Publishers  2013
    Abstract
    Let R be a ring with unity. The graph (R) is a graph with vertices as elements of R, where two distinct vertices a and b are adjacent if and only if Ra + Rb = R. Let 2(R) be the subgraph of (R) induced by the non-unit elements of R. Let R be a commutative ring with unity and let J(R) denote the Jacobson radical of R. If R is not a local ring, then it was proved that: (a) If 2(R)J(R) is a complete n-partite graph, then n = 2. (b) If there exists a vertex of 2(R)J(R) which is adjacent to every vertex, then R ≅ ℤ2 × F, where F is a field. In this note we generalize the above results to non-commutative rings and characterize all non-local ring R (not necessarily commutative) whose 2(R)J(R) is a... 

    On the diameter and girth of zero-divisor graphs of posets

    , Article Discrete Applied Mathematics ; Volume 160, Issue 9 , 2012 , Pages 1319-1324 ; 0166218X (ISSN) Alizadeh, M ; Das, A. K ; Maimani, H. R ; Pournaki, M. R ; Yassemi, S ; Sharif University of Technology
    2012
    Abstract
    In this paper, we deal with zero-divisor graphs of posets. We prove that the diameter of such a graph is either 1, 2 or 3 while its girth is either 3, 4 or ∞. We also characterize zero-divisor graphs of posets in terms of their diameter and girth  

    An automatic JPEG ghost detection approach for digital image forensics

    , Article 24th Iranian Conference on Electrical Engineering, ICEE 2016, 10 May 2016 through 12 May 2016 ; 2016 , Pages 1645-1649 ; 9781467387897 (ISBN) Azarian Pour, S ; Babaie Zadeh, M ; Sadri, A. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    In this paper we propose a new automatic method for discriminating original and tampered images based on 'JPEG ghost detection' method, which is a subset of format-based image forensics approaches. The inconsistency of quality factors indicates that the photo is a composite one created from at least two different cameras and therefore it is a manipulated photo. Our classification algorithm first extracts the ghost border. Then the image is classified as original or tampered groups by thresholding a distance in feature space. © 2016 IEEE  

    A semilinear PDE with free boundary

    , Article Nonlinear Analysis, Theory, Methods and Applications ; Volume 151 , 2017 , Pages 145-163 ; 0362546X (ISSN) Fotouhi, M ; Shahgholian, H ; Sharif University of Technology
    Elsevier Ltd  2017
    Abstract
    We study the semilinear problem Δu=λ+(x)(u+)q−1−λ−(x)(u−)q−1inB1, from a regularity point of view for solutions and the free boundary ∂{±u>0}. Here B1 is the unit ball, 1

    Epistemic protocols for dynamic gossip

    , Article Journal of Applied Logic ; Volume 20 , 2017 , Pages 1-31 ; 15708683 (ISSN) Van Ditmarsch, H ; Van Eijck, J ; Pardo, P ; Ramezanian, R ; Schwarzentruber, F ; Sharif University of Technology
    Abstract
    A gossip protocol is a procedure for spreading secrets among a group of agents, using a connection graph. In each call between a pair of connected agents, the two agents share all the secrets they have learnt. In dynamic gossip problems, dynamic connection graphs are enabled by permitting agents to spread as well the telephone numbers of other agents they know. This paper characterizes different distributed epistemic protocols in terms of the (largest) class of graphs where each protocol is successful, i.e. where the protocol necessarily ends up with all agents knowing all secrets. © 2016 Elsevier B.V  

    A technique to improve De-anonymization attacks on graph data

    , Article 26th Iranian Conference on Electrical Engineering, ICEE 2018, 8 May 2018 through 10 May 2018 ; 2018 , Pages 704-709 ; 9781538649169 (ISBN) Aliakbari, J ; Delavar, M ; Mohajeri, J ; Salmasizadeh, M ; Sharif University of Technology
    Abstract
    Social networks and the shared data in these networks are always considered as good opportunities in hands of the attackers. To evaluate the privacy risks in these networks and challenge the anonymization techniques, several de-anonymization attacks have been introduced so far. In this paper, we propose a technique to improve the success rate of passive seed based de-anonymization attacks. Our proposed technique is simple and can be applied in combination with different types of de-anonymization attacks. We show that it can achieve high success rates with low number of seeds compared to similar attacks. Our technique can also be used for applying partial attacks on graphs which results in... 

    Division algebras with left algebraic commutators

    , Article Algebras and Representation Theory ; Volume 21, Issue 4 , 2018 , Pages 807-816 ; 1386923X (ISSN) Aaghabali, M ; Akbari, S ; Bien, M. H ; Sharif University of Technology
    Springer Netherlands  2018
    Abstract
    Let D be a division algebra with center F and K a (not necessarily central) subfield of D. An element a ∈ D is called left algebraic (resp. right algebraic) over K, if there exists a non-zero left polynomial a0 + a1x + ⋯ + anxn (resp. right polynomial a0 + xa1 + ⋯ + xnan) over K such that a0 + a1a + ⋯ + anan = 0 (resp. a0 + aa1 + ⋯ + anan). Bell et al. proved that every division algebra whose elements are left (right) algebraic of bounded degree over a (not necessarily central) subfield must be centrally finite. In this paper we generalize this result and prove that every division algebra whose all multiplicative commutators are left (right) algebraic of bounded degree over a (not... 

    Invariance in growth and mass transport

    , Article Mathematics and Mechanics of Solids ; Volume 24, Issue 6 , 2019 , Pages 1707-1713 ; 10812865 (ISSN) Javadi, M ; Epstein, M ; Sharif University of Technology
    SAGE Publications Inc  2019
    Abstract
    The equations of balance of a continuum under conditions of growth and mass diffusion are derived from a principle of invariance under general observer transformations. The resulting equations are invariant under inertial transformations. Apparent body forces stemming from the mass transport phenomenon are identified and shown to be associated with non-inertial observers  

    Mental arousal level recognition competition on the shared database

    , Article 27th Iranian Conference on Electrical Engineering, ICEE 2019, 30 April 2019 through 2 May 2019 ; 2019 , Pages 1730-1736 ; 9781728115085 (ISBN) Saidi, M ; Rezania, S ; Khazaei, E ; Taghibeyglou, B ; Hashemi, S. S ; Kaveh, R ; Abootalebi, V ; Bagheri, S ; Homayounfar, M ; Asadi, M ; Mohammadian, A ; Mozafari, M ; Hasanzadeh, N ; DIni, H ; Sarvi, H. M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    This paper presents the results of the shared task with the aim of arousal level recognition for the competition held in conjunction with the 27th Iranian Conference on Electrical Engineering (ICEE 2019). A database annotated with arousal level labels released by Research Center for Development of Advanced Technologies. The contest was held on arousal database according to a defined protocol. Three teams were able to enter into the final stage of the competition according to compare their performance measure with the baseline method. The baseline method is proposed by the data owner. The aim of this paper is outlining the database, protocol design, and providing an overview of top-ranked... 

    Mixed paths and cycles determined by their spectrum

    , Article Linear Algebra and Its Applications ; Volume 586 , 2020 , Pages 325-346 Akbari, S ; Ghafari, A ; Nahvi, M ; Nematollahi, M. A ; Sharif University of Technology
    Elsevier Inc  2020
    Abstract
    A mixed graph is obtained from a graph by orienting some of its edges. The Hermitian adjacency matrix of a mixed graph with the vertex set {v1,…,vn}, is the matrix H=[hij]n×n, where hij=−hji=i if there is a directed edge from vi to vj, hij=1 if there exists an undirected edge between vi and vj, and hij=0 otherwise. The Hermitian spectrum of a mixed graph is defined to be the spectrum of its Hermitian adjacency matrix. In this paper we study mixed graphs which are determined by their Hermitian spectrum (DHS). First, we show that each mixed cycle is switching equivalent to either a mixed cycle with no directed edges (Cn), a mixed cycle with exactly one directed edge (Cn 1), or a mixed cycle... 

    Determination of potential function in contact problems

    , Article 8th International Conference on Computer Methods and Experimental Measurements for Surface and Contact Mechanics, CONTACT/SURFACE 2007, 16 May 2007 through 18 May 2007 ; Volume 55 , 2007 , Pages 227-236 ; 17433533 (ISSN); 9781845640736 (ISBN) Sharafbafi, F ; Adibnazari, S ; Sharif University of Technology
    2007
    Abstract
    In this paper, a relation is introduced that simplifies the determination of the Muskhelishvilis potential function in plane contact problems. The relation is (z)=1/2[p(z)iq(z)], which is correct for all uncoupled-elastic contact problems. This relation is proved in a mathematical way and utilized to obtain the potential function in several contact problems. A complete agreement has been observed between our results and the potential functions that have been obtained from complicated methods in the past. Utilization of the relation simplifies the solution of contact problems and analytical calculation of the stress and displacement fields, which is helpful in the analytical studies of... 

    Chaos prediction in MEMS-NEMS resonators

    , Article International Journal of Engineering Science ; Vol. 82 , 2014 , pp. 74-83 ; ISSN: 00207225 Maani Miandoab, E ; Pishkenari, H. N ; Yousefi-Koma, A ; Tajaddodianfar, F ; Sharif University of Technology
    Abstract
    Different nonlinearities in micro-electro-mechanical resonators lead to various nonlinear behaviors such as chaotic motion which can affect the resonator performance. As a result, it is important to properly identify and analyze the chaotic regions in resonators. In this paper, a novel method is proposed for prediction of the chaos in the micro- and nano-electro-mechanical resonators. Based on the proposed method, first an accurate analytical solution for the dynamics behavior of the nano-resonators is derived using the multiple scales method up to the second order. The results obtained by this analytical solution are validated by comparing them with the numerical ones. Using the analytical... 

    An analytical solution for shape-memory-polymer Euler-Bernoulli beams under bending

    , Article International Journal of Mechanical Sciences ; Vol. 84, issue , July , 2014 , p. 84-90 Baghani, M ; Mohammadi, H ; Naghdabadi, R ; Sharif University of Technology
    Abstract
    The purpose of this paper is to present efficient and accurate analytical expressions for deflection of a shape memory polymer (SMP) beam employing Euler-Bernoulli beam theory in a thermomechanical SMP cycle. Material behavior is considered using a recently 3D thermodynamically consistent constitutive model available in literature. In different steps of an SMP thermomechanical cycle, closed form expressions for internal variables variations, stresses and beam curvature distribution are presented. We show that during the cooling process, stored strains evolve to fix the temporary shape and then during the heating process they relax to recover the permanent shape. Effects of applying external...