- Behavioral Analog Topology Synthesizerطراحی کننده توپولوژي مدارهاي آنالوگ درحوزه سيگنال كوچك و فركانس پايينhttps://sites.google.com/
site/netlist2scheme/ - Cool Teen Buddy
https://sites.google.com/site/coolteenbuddy/ - Diman Zad-Tootaghaj 's Academic WebsiteDiman Zad-Tootaghaj 's Academic Website سایت گوگل دیمن زاد توت آغاجhttps://sites.google.com/
site/dimantootaghaj/ - Eigenvalues-based Steganalysis
https://sites.google.com/site/eigenvaluesbasedsteganalysis/ - FARHATفرحتhttps://sites.
google.com/site/farhat83site/ - Farsheed FarhatFarshiid Farsheed Farshead Farshied Farsheid Farshyd فرشید فرشيد فرحت فرهت فرحط فرهطhttps://sites.google.com/
site/farsheed83/ - Farshid Farhat 's Google-Pageصفحه گوگل فرشيد فرحتhttps://sites.google.com/
site/farshidfarhat2/ - Farshid Farhat 's Google-SiteYou will find the links to other resources related to Farshid Farhathttps://sites.google.
com/site/farshidfarhat/ - frash downloads
https://sites.google.com/site/frashdownloads/ - frashpix
https://sites.google.com/site/frashpix/ - Game Theoretic Network SimulatorGame Theory Network Simulator Game Strategies in Network Security Simulation by Visual C++https://sites.google.com/
site/ gametheoreticnetworksimulator/ - Multi-Dimensional Correlated SteganalysisMulti-Dimensional Correlated Steganalysis (MDCS) Multi-Dimensional Correlation (MDC) Steganalysis by Dimensional Cross Correlationhttps://sites.
google.com/site/ mdimcorrsteganalysis/ - Optical CDMA Network Simulator
https://sites.google.com/site/opticalcdmanetworksimulator/ - Sharif Students 79دانشجویان شریف ورودی سال 1379https://sites.google.com/
site/sharifstudents79/ - Sharif Students Servicesسرویس های فن آوری اطلاعات توسط دانشجویان شریفhttps://sites.google.com/
site/sharifstudentsservices/ - Student Branch of Iranian Society of CryptologyStudent Branch of Iranian Society of Cryptology at Sharif University of Technologyhttps://sites.
google.com/site/sbisc4sharif/ - Wireless Mobile Adhoc Network Simulatorشبیه ساز شبکه ادهاکhttps://sites.google.com/
site/wmanetsecsim/ - آموزشگاه موسیقی نوای سه گاهآدرس: تهران، نارمک، بالاتر از میدان هفت حوض، ضلع شمال شرقی چهارراه سرسبز، جنب موسسه ملی زبان (دختران)، ساختمان عتیق، پلاک 11. تلفن: 77805234-021https://sites.
google.com/site/navayesegah/ - سایت گوگل فرشيد فرحتسایت گوگل فرشيد فرحتhttps://sites.google.com/
site/farshid83site/ - شاخه دانشجویي انجمن رمز ایران در دانشگاه صنعتی شریفشاخه دانشجوئی انجمن رمز ایران در دانشگاه صنعتی شریفhttps://sites.google.com/
site/sbisc4sut/ - فراامنیتمدیریت حل سیستم فراتر از امنیتhttps://sites.google.com/
site/xtra4security/
Thursday, November 9, 2017
Sites.Google.Com
Thursday, November 2, 2017
SITES.PSU.EDU
Optical CDMA Network Simulator (OCNS)
Persian Boy Names
Persian Girl Names
Extended Authentication and Key Agreement Protocol
Secure Multipath Adaptive Routing Protocol
Authentication and Key Agreement Protocol in 4G
Risk of attack coefficient effect on availability of adhoc networks
Game-theoretic model to mitigate packet dropping
Multi-dimensional correlation steganalysis
SVD and Noise Estimation based Image Steganalysis
Eigenvalues-based LSB steganalysis
Security Weaknesses in PGP Protocol
Performance Modeling and Optimization of MapReduce
Image Steganalysis of Low Rate Embedding in Spatial Domain
Modeling and Optimization of Straggling Mappers
Blind detection of low-rate embedding
Big Data Computing: Modeling and Optimization
Towards Stochastically Optimizing Data Computing Flows
Optimal Placement in Network On-Chip
Optimal Scheduling in Parallel Programming Frameworks
Node Architecture and Cloud Workload Characteristics Analysis
Thumbnail Generation by Smart Cropping
Stochastic Modeling and Optimization of Stragglers
Chinese Academy of Sciences
Vanishing Point Detection in Photo Composition Analysis
Aesthetic Rating for Photos
Shape matching for automated bow echo detection
Detecting Dominant Vanishing Points in Natural Scenes
Skeleton Matching for Severe Weather Detection
Discovering Triangles in Portraits and Landscapes
Leveraging big visual data to predict severe weather
IAAP Scholarship Award
Deep-learned Models and Photography Idea Retrieval
Maryam Mirzakhani, the mother who won Fields Medal
Calculate AT&T Shares in a Shared Data Plan
Travel Grant from CSE Department
CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment
Friday, October 20, 2017
System and methods for UICC-based secure communication
System and methods for uicc-based secure communication US 20150222631 A1
ABSTRACT
A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the management server an authentication management function and an encryption key generator for execution by a secure element and an encryption engine for execution by a secure device processor, sending a request to establish a communication session with a remote device; and communicating with the remote device via a channel established using an application server. The secure element and the secure device processor authenticate each other using a mutual authentication keyset. The secure element, the secure device processor and the device processor each have a security level associated therewith; the security level associated with the secure device processor is intermediate between that of the secure element and that of the device processor. Other embodiments are disclosed.
SYSTEM AND METHODS FOR UICC-BASED SECURE COMMUNICATION 20150222631
Monday, October 16, 2017
Image Aesthetics Rating
Aesthetic Rating for Photos
Tuesday, October 10, 2017
Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment
CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment
Traditional resource management systems rely on a centralized approach to manage users running on each resource. The centralized resource management system is not scalable for large-scale servers as the number of users running on shared resources is increasing dramatically and the centralized manager may not have enough information about applications' need. In this paper we propose a distributed game-theoretic resource management approach using market auction mechanism to find optimal strategy in a resource competition game. The applications learn through repeated interactions to choose their action on choosing the shared resources. Specifically, we look into two case studies of cache competition game and main processor and co-processor congestion game. We enforce costs for each resource and derive bidding strategy. Accurate evaluation of the proposed approach show that our distributed allocation is scalable and outperforms the static and traditional approaches.
Draft > CAGE
Traditional resource management systems rely on a centralized approach to manage users running on each resource. The centralized resource management system is not scalable for large-scale servers as the number of users running on shared resources is increasing dramatically and the centralized manager may not have enough information about applications' need. In this paper we propose a distributed game-theoretic resource management approach using market auction mechanism to find optimal strategy in a resource competition game. The applications learn through repeated interactions to choose their action on choosing the shared resources. Specifically, we look into two case studies of cache competition game and main processor and co-processor congestion game. We enforce costs for each resource and derive bidding strategy. Accurate evaluation of the proposed approach show that our distributed allocation is scalable and outperforms the static and traditional approaches.
Draft > CAGE
Saturday, September 30, 2017
Modeling and Optimization of MapReduce
ABSTRACT
MapReduce framework is widely used to parallelize batch jobs since it exploits a high degree of multi-tasking to process them. However, it has been observed that when the number of mappers increases, the map phase can take much longer than expected. This paper analytically shows that stochastic behavior of mapper nodes has a negative effect on the completion time of a MapReduce job, and continuously increasing the number of mappers without accurate scheduling can degrade the overall performance. We analytically capture the effects of stragglers (delayed mappers) on the performance. Based on an observed delayed exponential distribution (DED) of the response time of mappers, we then model the map phase by means of hardware, system, and application parameters. Mean sojourn time (MST), the time needed to sync the completed map tasks at one reducer, is mathematically formulated. Following that, we optimize MST by finding the task inter-arrival time to each mapper node. The optimal mapping problem leads to an equilibrium property investigated for different types of inter-arrival and service time distributions in a heterogeneous datacenter (i.e., a datacenter with different types of nodes). Our experimental results show the performance and important parameters of the different types of schedulers targeting MapReduce applications. We also show that, in the case of mixed deterministic and stochastic schedulers, there is an optimal scheduler that can always achieve the lowest MST.
[Tech Report] [Master Thesis] [IEEE Trans]
Last version > MapReduce_Performance_Optimization
Thursday, September 28, 2017
www.personal.psu.edu/fuf111
Publications
Discovering Triangles in Portraits for Supporting Photographic Creation, S He, Z Zhou, F Farhat, JZ Wang, IEEE Transactions on Multimedia, Aug 2017.
Intelligent Portrait Composition Assistance — Integrating Deep-learned Models and Photography Idea Retrieval, F Farhat, MM Kamani, S Mishra, JZ Wang, July 2017.
Skeleton Matching with Applications in Severe Weather Detection, MM Kamani, F Farhat, S Wistar, JZ Wang, Applied Soft Computing, May 2017.
Detecting Dominant Vanishing Points in Natural Scenes with Application to Composition-Sensitive Image Retrieval, Z Zhou, F Farhat, JZ Wang, IEEE Transactions on Multimedia, May 2017.
Shape matching using skeleton context for automated bow echo detection, MM Kamani, F Farhat, S Wistar, JZ Wang, Big Data (Big Data), 2016 IEEE International Conference on, 901-908, Dec 2016.
Detecting Vanishing Points in Natural Scenes with Application in Photo Composition Analysis, Z Zhou, F Farhat, JZ Wang, arXiv preprint arXiv:1608.04267, 2016.
Optimal Placement of Cores, Caches and Memory Controllers in Network On-Chip, DZ Tootaghaj, F Farhat, arXiv preprint arXiv:1607.04298, 2016.
Towards Stochastically Optimizing Data Computing Flows, F Farhat, DZ Tootaghaj, M Arjomand, arXiv preprint arXiv:1607.04334, 2016.
Stochastic Modeling and Optimization of Stragglers, F Farhat, D Zad Tootaghaj, Y He, et al. IEEE Transaction on Cloud Computing, 2016.
Fork-Join Queue Modeling and Optimal Scheduling in Parallel Programming Frameworks, F Farhat, EECS Thesis, The Pennsylvania State University, 2015.
Evaluating the Combined Impact of Node Architecture and Cloud Workload Characteristics on Network Traffic and Performance/Cost, DZ Tootaghaj, F Farhat, M Arjomand, P Faraboschi et al. Workload characterization (IISWC), 2015 IEEE international symposium on, 203-212, 2015.
Towards blind detection of low-rate spatial embedding in image steganalysis, F Farhat, S Ghaemmaghami, IET Image Processing 9 (1), 31-42, 2015.
Modeling and optimization of straggling mappers, F Farhat, DZ Tootaghaj, A Sivasubramaniam, MT Kandemir, CR Das, Technical report, Technical Report CSE-14-006, Pennsylvania State University, 2014.
Security Weaknesses in PGP Protocol, F Farhat, M Heydari, MR Aref, 2013.
Eigenvalues-based LSB steganalysis, F Farhat, A Diyanat, S Ghaemmaghami, MR Aref, The ISC International Journal of Information Security 4 (2), 97-106, 2012.
Image steganalysis based on SVD and noise estimation: Improve sensitivity to spatial LSB embedding families, A Diyanat, F Farhat, S Ghaemmaghami, TENCON 2011-2011 IEEE Region 10 Conference, 1266-1270, 2011.
Multi-dimensional correlation steganalysis, F Farhat, A Diyanat, S Ghaemmaghami, MR Aref, Multimedia Signal Processing (MMSP), 2011 IEEE 13th International Workshop, 2011.
Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks, DZ Tootaghaj, F Farhat, MR Pakravan, MR Aref, Consumer Communications and Networking Conference (CCNC), 2011 IEEE, 163-165, 2011.
Risk of attack coefficient effect on availability of Ad-hoc networks, DZ Tootaghaj, F Farhat, MR Pakravan, MR Aref, Consumer Communications and Networking Conference (CCNC), 2011 IEEE, 166-168, 2011.
Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup, F Farhat, S Salimi, A Salahi, IACR Cryptology ePrint Archive, 2011.
Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes, F Farhat, MR Pakravan, M Salmasizadeh, MR Aref, International Conference on Information Security Practice and Experience, 2010.
An Extended Authentication and Key Agreement Protocol of UMTS, F Farhat, S Salimi, A Salahi, International Conference on Information Security Practice and Experience, 2009.
Click HOME to go to main page!
Friday, September 22, 2017
PIAKAP
Authentication and Key Agreement Protocol in 4G
Abstract
Identification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and efficient bandwidth consumption. In this article we consider UMTS AKA and some other proposed schemes. Then we explain the known weaknesses of the previous frameworks suggested for the UMTS AKA protocol. After that we propose a new protocol called private identification, authentication, and key agreement protocol (PIAKAP), for UMTS mobile network. Our suggested protocol combines identification and AKA stages of UMTS AKA protocol while eliminates disadvantages of related works and brings some new features to improve the UMTS AKA mechanism. These features consist of reducing the interactive rounds of the UMTS AKA with security mode setup and user privacy establishment.
ePrint, Research, Security and tagged Ahmad Salahi, Authentication, Identification, Key Agreement, Mobile Network, PIAKAP, Privacy, Security Protocol, Somayeh Salimi, UMTS on .