9 results on '"Noroozi, Hamid"'
Search Results
2. En cloud-native public key infrastruktur för fordon : För ett VPKI med hög tillgänglihhet och dynamisk skalbarhet
- Author
-
Noroozi, Hamid
- Subjects
effektivitet ,tillgänglighet ,Efficiency ,Microservice ,Container Orchestration ,pseudonymitet ,Pseudonym Unlinkability ,VANETs ,VPKI ,personlig integritet ,Säkerhet ,Computer Sciences ,Scalability ,moln ,Availability ,Vehicular Communications ,Resilient ,ospårbarhet ,anonymitet ,Datavetenskap (datalogi) ,Pseudonym Transition ,Privacy ,Security ,motståndskraftig ,Identity and Credential Management ,Cloud ,skalbarhet ,Vehicular PKI ,identitet- och behörighetsuppgifter - Abstract
Efforts towards standardization of Vehicular Communication Systems (VCSs) have been conclusive on the use of Vehicular Public-Key Infrastructure (VPKI) for the establishment of trust among network participants. Employing VPKI in Vehicular Communication (VC) guarantees the integrity and authenticity of Cooperative Awareness Messages (CAMs) and Decentralized Environmental Notification Messages (DENMs). It also offers a level of privacy for vehicles as VPKI provides them with a set of non-linkable short-lived certificates, called pseudonyms, which are used to sign outgoing messages by vehicles while they communicate with other vehicles referred to as Vehicle-to-Vehicle (V2V) or Roadside Units (RSUs) referred to as Vehicle-to-Infrastructure (V2I). Each vehicle uses a pseudonym for its lifetime and by switching to a not- previously- used pseudonym, it continues to communicate without risking its privacy. There have been two approaches suggested by the literature on how to provide vehicles with pseudonyms. One is the so-called pre-loading mode, suggesting to pre-load vehicles with all pseudonyms they need, which increases the cost of revocation in case they are compromised. The other one is the on-demand mode, suggesting a real-time offering of pseudonyms by VPKI at vehicles request e.g., on starting each trip. Choosing the on-demand approach imposes a considerable burden of availability and resilience on VPKI services. In this work, we are confronting the problems regarding a large-scale deployment of an on-demand VPKI that is resilient, highly available, and dynamically scalable. In order to achieve that, by leveraging state-of-the-art tools and design paradigms, we have enhanced a VPKI system to ensure that it is capable of meeting enterprise-grade Service Level Agreement (SLA) in terms of availability, and it can also be cost-efficient as services can dynamically scale-out in the presence of high load, or possibly scale-in when facing less demand. That has been made possible by re-architecting and refactoring an existing VPKI into a cloud-native solution deployed as microservices. Towards having a reliable architecture based on distributed microservices, one of the key challenges to deal with is Sybil-based misbehavior. By exploiting Sybil-based attacks in VPKI, malicious vehicles can gain influential advantage in the system, e.g., one can affect the traffic to serve its own will. Therefore, preventing the occurrence of Sybil attacks is paramount. On the other hand, traditional approaches to stop them, often come with a performance penalty as they verify requests against a relational database which is a bottleneck of the operations. We propose a solution to address Sybil-based attacks, utilizing Redis, an in-memory data store, without compromising the system efficiency and performance considerably. Running our VPKI services on Google Cloud Platform (GCP) shows that a large-scale deployment of VPKI as a Service (VPKIaaS) can be done efficiently. Conducting various stress tests against the services indicates that the VPKIaaS is capable of serving real world traffic. We have tested VPKIaaS under synthetically generated normal traffic flow and flash crowd scenarios. It has been shown that VPKIaaS managed to issue 100 pseudonyms per request, submitted by 1000 vehicles where vehicles kept asking for a new set of pseudonyms every 1 to 5 seconds. Each vehicle has been served in less than 77 milliseconds. We also demonstrate that, under a flash crowd situation, with 50000 vehicles, VPKIaaS dynamically scales out, and takes ≈192 milliseconds to serve 100 pseudonyms per request submitted by vehicles. Ansträngningar för standardisering av Vehicular Communication Systems har varit avgörande för användandet av Vehicular Public-Key Infrastructure (VPKI) för att etablera förtroende mellan nätverksdeltagare. Användande av VPKI i Vehicular Communication (VC) garanterar integritet och autenticitet av meddelanden. Det erbjuder ett lager av säkerhet för fordon då VPKI ger dem en mängd av icke länkbara certifikat, kallade pseudonym, som används medan de kommunicerar med andra fordon, kallat Vehicle-to-Vehicle (V2V) eller Roadside Units (RSUs) kallat Vehicle-to-Infrastructure (V2I). Varje fordon använder ett pseudonym under en begränsad tid och genom att byta till ett icke tidigare använt pseudonym kan det fortsätta kommunicera utan att riskera sin integritet. I litteratur har två metoder föreslagits för hur man ska ladda fordon med pseudonym de behöver. Den ena metoden det så kallade offline-läget, som proponerar att man för-laddar fordonen med alla pseudonym som det behöver vilket ökar kostnaden för revokering i fall de blir komprometterat. Den andra metoden föreslår ett on-demand tillvägagångssätt som erbjuder pseudonym via VPKI på fordonets begäran vid början av varje färd. Valet av på begäran metoden sätter en stor börda på tillgänglighet och motståndskraft av VPKI tjänster. I det här arbetet, möter vi problem med storskaliga driftsättningar av en på begäran VPKI som är motståndskraftig, har hög tillgänglighet och dynamiskt skalbarhet i syfte att uppnå dessa attribut genom att nyttja toppmoderna verktyg och designparadigmer. Vi har förbättrat ett VPKI system för att säkerställa att det är kapabelt att möta SLA:er av företagsklass gällande tillgänglighet och att det även kan vara kostnadseffektivt eftersom tjänster dynamiskt kan skala ut vid högre last eller skala ner vid lägre last. Detta har möjliggjorts genom att arkitekta om en existerande VPKI till en cloud-native lösning driftsatt som mikrotjänster. En av nyckelutmaningarna till att ha en pålitlig arkitektur baserad på distribuerade mikrotjänster är sybil-baserad missuppförande. Genom att utnyttja Sybil baserade attacker på VPKI, kan illvilliga fordon påverka trafik att tjäna dess egna syften. Därför är det av största vikt att förhindra Sybil attacker. Å andra sidan så dras traditionella metoder att stoppa dem med prestandakostnader. Vi föreslår en lösning för att adressera Sybilbaserade attacker genom att nyttja Redis, en in-memory data-store utan att märkbart kompromissa på systemets effektivitet och prestanda. Att köra våra VPKI tjänster på Google Cloud Platform (GCP) och genomföra diverse stresstester mot dessa har visat att storskaliga driftsättningar av VPKI as a Service (VPKIaaS) kan göras effektivt samtidigt som riktigt trafik hanteras. Vi har testat VPKIaaS under syntetisk genererat normalt trafikflöde samt flow och flash mängd scenarier. Det har visat sig att VPKIaaS klarar att utfärda 100 pseudonym per förfråga utsänt av 1000 fordon (där fordonen bad om en ny uppsättning pseudonym varje 1 till 5 sekunder), och varje fordon fått svar inom 77 millisekunder. Vi demonstrerar även att under en flashcrowd situation, där antalet fordon höjs till 50000 med en kläckningsgrad på 100. VPKIaaS dynamiskt skalar ut och tar ≈192 millisekunder att betjäna 100 pseudonymer per förfrågan gjord av fordon.
- Published
- 2021
3. VPKIaaS: Towards Scaling Pseudonymous Authentication for Large Mobile Systems
- Author
-
Noroozi, Hamid, Khodaei, Mohammad, and Papadimitratos, Panos
- Subjects
Communication Systems ,Kommunikationssystem - Abstract
QC 20190611
- Published
- 2019
4. Alternative Polynomials for Rijndael : Diffusion Analysis
- Author
-
Noroozi, Hamid
- Subjects
Advanced Encryption Standard ,Irreducible Polynomial ,Matematik ,Datavetenskap (datalogi) ,Computer Sciences ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,Rijndael ,Diffusion Analysis ,Mathematica ,Mathematics ,Computer Science::Cryptography and Security ,Symmetric key Encryption - Abstract
The Rijndael cryptosystem uses a particular polynomial to create its constants. All calculations within the encryption and decryption layers are based on this polynomial. This arouse the curiosity to see what happens if the polynomial is substituted by other polynomials. This paper’s main area of study is to investigate the consequences of using different polynomials to construct the Rijndael cryptosystem. To do so, as a phase of this study, a Mathematica package has been created to ease the investigations. As the second phase, using the aforementioned package, some kind of diffusion analysis has been done on the newly constructed Rijndael-like cryptosystems. The fundamental challenge was to figure out the reason of having the particular polynomial chosen. By the end of the experiment, we concluded that choosing other polynomials with the same characteristics as an ingredient of the Rijndael algorithm, does not have any perceptible effects on the diffusion level.
- Published
- 2014
5. The Effect of Peer Interaction on Iranian EFL Learners' Self-efficacy in Vocabulary Learning.
- Author
-
Noroozi, Hamid and Mehrdad, Ali Gholami
- Subjects
ENGLISH as a foreign language ,SOCIAL interaction ,SELF-efficacy ,VOCABULARY education ,HIGH school students ,ANALYSIS of covariance - Abstract
The current study aimed to explore the effects of peer interaction on self-efficacy in vocabulary learning. The participants of the study included 64 EFL students in two intact classes at Takhti high school and Pardis language institute in Hamedan, Iran who were conveniently sampled to take part in the study. They aged 15-17 and were randomly positioned into one experimental and one control group. The participants were assigned as the experimental group and as control group 32 each. the experimental group received the intervention including peer interaction for example Word Expert Cards (Richek & McTague, 2008) while those in the control group had time to learn vocabularies and deepen their learningindividuallyand researcher monitored and told them to memorize or paraphrase the vocabularies themselves individually All the participants completed a self-efficacy questionnaire on vocabulary learning. The participants completed a questionnaire on self-efficacy learning twice, once before the treatment as the pretest and a second time after the treatment as the posttest. The data thus obtained were then analyzed through measuring the Analysis of Covariance (ANCOVA) to examine the trajectories of change in the participants' self-efficacy over the treatment. The results indicated a significant increase in the self-efficacy indexes of the experimental group compared with the control group. The findings from the current study provide empirical evidence suggesting that through peer interaction it could be possible to enhance self-efficacy, which in turn may contribute to the development of language skills. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
6. Instrumented transforaminal lumbar interbody fusion in surgical treatment of recurrent disc herniation.
- Author
-
Omidi-Kashani, Farzad, Hasankhani, Ebrahim Ghayem, and Noroozi, Hamid Reza
- Subjects
TRAUMATIC tentorial herniation ,DISEASE relapse ,TREATMENT effectiveness - Abstract
Background: The incidence of recurrence in patients undergoing primary discectomy due to lumbar disc herniation (LDH), is regularly reported as 5-15%. In this study we aimed to evaluate surgical outcome of instrumented transforaminal lumbar interbody fusion (TLIF) in the patients suffering from recurrent LDH. Methods: We retrospectively studied 51 patients (30 female, 21 male) from August 2007 to October 2011. The mean age and follow-up of the patients was 46.4±14.8 (ranged; 29-77 years old) and 31.4±6.8 (ranged; 25-50 months), respectively. Clinical improvement was assessed by Oswestry Disability Index (ODI), visual analogue scale (VAS), and subjective satisfaction rate, while fusion was appraised radiologically. Data analysis was by one sample Kolmogorov-Smirnov, paired t, and Mann-Whitney tests. Results: Surgery could significantly improve mean leg and lumbar VAS and ODI from preoperative 7.4±2.5, 7.8±3.1, and 72.1±21.5 to postoperative 3.4±3.6, 3.5±2.6, and 27.5±18.0, respectively at the last follow-up visit. Subjective satisfaction rate was excellent in 24 patients (47.1%), good in 14 (27.5%), fair 11 (21.6%), and poor in two (3.9%). We had one patient with iatrogenic partial L5 nerve root injury and one with unknown late onset refractory postoperative back pain. Fusion rate was 100% and instrument failure was nil. Conclusion: In surgical treatment of the patients with recurrent LDH, bilaterally instrumented TLIF is a relatively safe and effective procedure and can be associated with least instrument failure and highest fusion rate while no postoperative bracing is also needed. [ABSTRACT FROM AUTHOR]
- Published
- 2014
7. DIFFERENCES IN ADIPONECTIN GENE EXPRESSION: ADIPONECTIN GENE EXPRESSION IS HIGHER IN GLUTEAL THAN IN ABDOMINAL ADIPOSE TISSUE.
- Author
-
Moghadasi, Mehrzad, Mohebbi, Hamid, Rahmani-Nia, Farhad, Hassan-Nia, Sadegh, Noroozi, Hamid, and Nematollahzadeh, Mohedeseh
- Subjects
ADIPOSE tissue physiology ,ADIPONECTIN ,GLUTEAL muscles - Abstract
Objective: Obesity down regulated the adiponectin gene expression, but differences in adiponectin gene expression in gluteal adipose tissue (GAT) and in abdominal adipose tissue (AAT) are not well known. Therefore, the purpose of this study was to examine the differences in adiponectin gene expression in GAT and in AAT. Material & Methods: Nineteen healthy obese middle aged men (aged 41.4±6.1 years; mean ± SD) Adipose tissue (AT) biopsies from the subcutaneous abdominal and subcutaneous gluteal depots were obtained. Results: Adiponectin gene expression was 22.7% higher in subcutaneous GAT than in subcutaneous AAT. Conclusion: Adiponectin gene expression is higher in GAT than in AAT, suggesting GAT to be more important for circulating adiponectin levels. [ABSTRACT FROM AUTHOR]
- Published
- 2014
8. Effects of short-term lifestyle activity modification on adiponectin mRNA expression and plasma concentrations.
- Author
-
Moghadasi, Mehrzad, Mohebbi, Hamid, Rahmani-Nia, Farhad, Hassan-Nia, Sadegh, and Noroozi, Hamid
- Subjects
ACTIVE oxygen in the body ,ANALYSIS of variance ,BEHAVIOR modification ,ENERGY metabolism ,GOODNESS-of-fit tests ,HEALTH behavior ,MAGNETIC resonance imaging ,TYPE 2 diabetes ,OBESITY ,POLYMERASE chain reaction ,RNA ,RANDOMIZED controlled trials ,PHYSICAL activity ,DATA analysis software ,ADIPONECTIN ,DESCRIPTIVE statistics - Abstract
Adiponectin mRNA and plasma concentrations were reduced in obesity. Exercise training may reduce the adipose tissue (AT), although it is not well known, whether exercise – induced change in AT, increases adiponectin mRNA expression and plasma concentrations or not. Therefore, the purpose of this study was to examine the effects of short-term lifestyle activity modification (LAM) on adiponectin mRNA and plasma concentrations. Sixteen obese and overweight middle-aged men (age, 35–50 years) with type 2 diabetes participated in this study. The subjects were randomly assigned to LAM group (n=8) or control group (n=8). The subjects in LAM group walked two miles in 30 min on a treadmill on 4 days per week for 12 weeks according to the guidelines of the Centers for Disease Control and Prevention and American College of Sports Medicine. The results showed that body mass, body mass index, central visceral adipose tissue and subcutaneous adipose tissue volume and hip and thigh subcutaneous adipose tissue (hip and thigh SAT) volume were decreased in the LAM group compared to the control group (P<0.05). Adiponectin mRNA in abdominal and gluteal subcutaneous AT were increased significantly in the LAM group compared to the control group (P<0.05), while plasma adiponectin concentrations, hs-CRP and insulin resistance did not change significantly. In conclusion, adiponectin mRNA levels increase after 12 weeks of LAM; however, plasma adiponectin levels were not affected by this protocol in obese and overweight middle-aged men with type 2 diabetes. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
9. Impact of morphine use in reducing the need for CT scan in patients with cervical spine trauma: a double blinded randomized clinical trial.
- Author
-
Sharifi, Mohammad Davood, Doloo, Hamid Zamani Moghadam, Hashemian, Amir Masoud, Tourghabe, Javad Tootian, Kakhki, Behrang Rezvani, Teimoori, Sasan Johari, Chokan, Niaz Mohammad Jafari, and Noroozi, Hamid Reza
- Abstract
Background: Cervical spine trauma occurs mostly among young males due to falls and car accidents. The CT scan technology is replacing radiography in many medical clinics as it is very capable in detecting subtle cervical spine injuries. However, the use of CT scan for routine screening in patients with cervical spine trauma remains controversial due to its radiation risks and relatively high cost. Objective: The focus of this research was on using morphine in patients with cervical spine trauma. The objective was to determine the ability of morphine to reduce the number of patients in need of CT scans. Methods: This double-blinded randomized clinical trial study was conducted from April 2014 to March 2015 in Hasheminejad Hospital in Mashhad, Iran. We enrolled 67 patients with cervical spine trauma and normal radiography in the study. They were divided randomly into two groups (groups A and B), where group A received intravenous morphine, and group B received a placebo. We measured the pain scores in both groups before giving the medication and 10 minutes afterwards using a visual analog scale (VAS). Results: As a result of receiving morphine, the patients in group A had significantly lower pain than group B (pvalue < 0.001). The average pain score in group A was reduced by 43% versus 23% in group B. However, the most pain reduction was in those in group A with a normal CT scan. The pain score of these patients dropped by 52%. Conclusions: The findings of this study suggest that patients with a normal radiography may be discharged with a cervical collar without a need for a CT scan if morphine reduces their pain. This is because the pain in these patients stem from the muscles and non-bony structures in the cervical spine area. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.