Tuesday, May 31, 2011

آموزشگاه موسیقی


برگ نخست

برگ اول آموزشگاه موسیقی نوای سه گاه (با مجوز رسمی از وزارت ارشاد)
آموزشگاه موسیقی نوای سه گاه با کمک گروهی از اساتید مجرب دانشگاه و فارغ التحصیلان رشته موسیقی آماده آموزش هنرجویان در زمینه انواع سازها و آوازهای ایرانی و کلاسیک، مبانی و سلفژ هارمونی، آهنگسازی، موسیقی کودکان (ارف)، و کلاسهای کنکور موسیقی میباشد.
برگ نخست
 
 
 
برای ثبت این وبسایت در آرشیو اینترنتی خود بر روی لینکهای زیر کلیک کنید.
AddThis Social Bookmark Button AddThis Feed Button
 
 
 
designed by frash

Monday, May 30, 2011

Best Golf Bags For Sale


This Week Only: FREE Shipping To Mainland USA &
NO US Sales Tax on All Golf Bags For Sale!

Specials for May
Callaway X-22 Stand Bag
Callaway X-22 Stand Bag
List Price: $208.35
Sale Price: $159.99
 Buy Now   
TaylorMade Pure-Lite 2.0 Stand Bag
TaylorMade Pure-Lite 2.0 Stand Bag
List Price: $201.62
Sale Price: $159.99
 Buy Now   
Callaway Org.14 Xtreme Cart Bag
Callaway Org.14 Xtreme Cart Bag
List Price: $195.46
Sale Price: $149.99
 Buy Now   

Looking for the best golf bags for sale online? Then you've come to the right golf store. We carry a wide selection of stand, cart, and staff bags, from major brand names including Callaway and TaylorMade. At Golf Bag Center you can be sure to find the best golf bags to protect your clubs and gear, while giving you the best price on the Internet.

A quality bag may not directly improve your game, but it can definitely give you an enjoyable and comfortable golfing experience. You can fit your golf clubs, shoes, apparel, balls, snacks, or any other accessories in your bag and carry them with you when you go from hole to hole. Knowing that you have access to all your gear at any time on the course, is such a mental relief. No matter what your needs are or what your skill level is, we have the right bag with the right features in the right color for you.

Do you like to walk on the course and carry your gear with you? No problem. Our selection of quality golf stand bags is your best choice. Most of them are lightweight and come with wide and comfortable shoulder straps, which make them easy to carry.

Are you the type of person that likes to hop on a cart? That's fine. Most of our golf cart bags have pockets that face away from the cart and you can easily take out a power bar, your GPS, or any other gear while enjoying your ride on the cart. Our cart bags have many cool features like accordion expandable side pockets, insulated cooler pocket, or removable coolers.

Thinking of turning pro? Problem solved. It's your time to go for a tour or staff bag. It can hold a full set of clubs and any supplies and equipments you may need. Your full arsenal of Drivers, Fairway Woods, Irons, Wedges, and Putter clubs will be at arm's reach in your bag. The stylish and professional looks of these bags will make you stand out on the course.

If you have any questions, give us a call. Be sure to take advantage of our SUPER SAVER WEEK that ends this week. You can save up to 30% off our entire store. Moreover, this week only, you can enjoy FREE shipping to mainland USA and NO SALES TAX on all golf bags on sale. There's no better time to get your new golf bag than right now!


Sunday, May 22, 2011

Mahshid Farhat (مهشید فرحت)

Security Improvement of Ad-hoc Networks Routing Protocol

Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks

Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks

  • Download Citations
  • Email
  • Print
  • Rights And Permissions

Tootaghaj, Diman Zad ; Farhat, Farshid ; Pakravan, Mohammad-Reza ; Aref, Mohammad-Reza ; 
Information Systems and Security Lab (ISSL), Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran


This paper appears in:  Consumer Communications and Networking Conference (CCNC), 2011 IEEE 
Issue Date :  9-12 Jan. 2011 
On page(s): 163 
Print ISBN: 978-1-4244-8789-9 
Digital Object Identifier :  10.1109/CCNC.2011.5766444 
Date of Current Version :   12 May 2011

ABSTRACT

Performance of routing is severely degraded when misbehaving nodes drop packets instead of properly forwarding them. In this paper, we propose a Game-Theoretic Adaptive Multipath Routing (GTAMR) protocol to detect and punish selfish or malicious nodes which try to drop information packets in routing phase and defend against collaborative attacks in which nodes try to disrupt communication or save their power. Our proposed algorithm outranks previous schemes because it is resilient against attacks in which more than one node coordinate their misbehavior and can be used in networks which wireless nodes use directional antennas. We then propose a game theoretic strategy, ERTFT, for nodes to promote cooperation. In comparison with other proposed TFT-like strategies, ours is resilient to systematic errors in detection of selfish nodes and does not lead to unending death spirals.

Risk of attack coefficient effect on availability of Ad-hoc networks

Risk of attack coefficient effect on availability of Ad-hoc networks

  • Download Citations
  • Email
  • Print
  • Rights And Permissions

Tootaghaj, Diman Zad ; Farhat, Farshid ; Pakravan, Mohammad-Reza ; Aref, Mohammad-Reza ; 
Information Systems and Security Lab (ISSL), Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran


This paper appears in:  Consumer Communications and Networking Conference (CCNC), 2011 IEEE 
Issue Date :  9-12 Jan. 2011 
On page(s): 166 
Print ISBN: 978-1-4244-8789-9 
Digital Object Identifier :  10.1109/CCNC.2011.5766445 
Date of Current Version :   12 May 2011

ABSTRACT

Security techniques have been designed to obtain certain objectives. One of the most important objectives all security mechanisms try to achieve is the availability, which insures that network services are available to various entities in the network when required. But there has not been any certain parameter to measure this objective in network. In this paper we consider availability as a security parameter in ad-hoc networks. However this parameter can be used in other networks as well. We also present the connectivity coefficient of nodes in a network which shows how important is a node in a network and how much damage is caused if a certain node is compromised.

Wednesday, May 18, 2011

Game-Theoretic Approach in Network Security, Availability and Privacy

Game-Theoretic Network Simulator

 

This is GTNS: game theoretic network simulator help document. In order to download GTNS click it. To download samples click it!

Introduction:

GTNS is a discrete-event network simulator targeted primarily for research and educational use.

GTNS is written in Visual C++ programming language and supports different network topologies. This simulator was first produced to implement locally multipath adaptive routing (LMAR) protocol, classified as a new reactive distance vector routing protocol for MANETs. LMAR can find an ad-hoc path without selfish nodes and wormholes using an exhaustive search algorithm in polynomial time. Also when the primary path fails, it discovers an alternative safe path if network graph remains connected after eliminating selfish/malicious nodes. The key feature of LMAR to seek safe route free of selfish and malicious nodes in polynomial time is its searching algorithm and flooding stage that its generated traffic is equi-loaded compared to single-path routing protocols but its security efficiency to bypass the attacks is much better than the other multi-path routing protocols. LMAR concept is introduced to provide the security feature known as availability and a simulator has been developed to analyze its behavior in complex network environments [1]. Then we have added detection mechanism to the simulator, which can detect selfish nodes in network. The proposed algorithm is resilient against collision and can be used in networks which wireless nodes use directional antennas and it also defend against an attack that malicious nodes try to break communications by relaying the packets in a specific direction. Some game theoretic strategies to enforce cooperation in network have been implemented in GTNS, for example Forwarding-Ratio Strategy, TFT-Strategy and ERTFT. This tutorial helps new users to get familiar with GTNS and run different network scenarios.


Getting Started with GTNS:

After debugging GTNS simulator you can see the following window:

Figure 1- GTNS simulator environment

Network-Router:

To implement your own network you can click on Network-Router as you can see in figure 2 and 3 you can add one node by clicking on add button, or you can add different number of nodes, randomly placed over screen by clicking the Self-Generate button. In figure 4 you can see a sample network topology created by adding 5 nodes to the network. You can change the default preferences of node by clicking on Default Preferences button, or you can change different parameters of any node in the network by clicking on that node in the screen. Any node in the network can be deleted or you can change its parameters during simulation or you can force it as a selfish node. Figure 5 shows different parameters of nodes that can be changed. You can change the router's caption, its coverage range, delay, X_axis and Y_axis of the router in the screen, the length and width of router image and battery power of any router can be changed in the network.

Figure 2- Network-Router button




Figure 3- Network-Router-Self-Generate button





Figure 4- A sample of network topology created by adding 5 nodes in GTNS environment





Figure 5- Editing node parameters by clicking on any node on the screen



Creating Links between nodes in GTNS:

As it is seen in figure 6 you can add links between nodes by clicking on Network-Link-Self-Generate button. All nodes which are in the coverage range of each other will be connected with a full-duplex link.

You can also add links between any two nodes in network by clicking on Network-Link-Add. Figure 7 shows different parameters that can be changed by clicking this button. You can select two routers that you want to make a link between them and frequency and duplicity of the link. You can add wormhole links between any two nodes by creating links between nodes which are not in the coverage range of each other. During simulation you can add or delete a specific link between any two nodes in network.

Figure 8 shows a sample topology created by using Link-Self-Generate button.


Figure 6- Adding links between nodes in GTNS simulator





Figure 7- Different parameters that can be changed by clicking Link-Add button






Figure 8- A sample network created by adding self-generate links between 10 nodes in GTNS


Adding Traffic to network:

As you see from figure 9, you can add traffic between any two nodes in network by clicking Network-Traffic-Add. Figure 10 shows different parameters that you can change when you want to add traffic between any two source and destination node in network. You can select routing protocol and start time of traffic sparks.

Figure 9- Adding traffic to the network

 

In GTNS you can add random traffic to network. Figure 11 shows the window when you click on Network-Traffic-Self-Generate-Ad-hoc. You can select the starting and stopping time of random traffic generated, and number of connections during this interval. Data traffic rate and different protocols can be selected in this window.

Figure 10- different parameters that can be changed during adding traffic between any two nodes




Figure 11- Different parameters that can be selected by adding random traffic in network

Simulation in GTNS:

 

To simulate the network created in GTNS, you should click on Simulation-Profile button as you can see in figure 12. Then the Simulation window will be opened where you can see the clock and view events. Figure 13 shows Simulation window. You can also change the speed of simulation by moving Master and slave speed buttons.

By clicking on Resume button you can run the simulation and see different packet exchange in network.

For example we have created one connection between node 1 and 64. After clicking Resume button node 1 will broadcast RReq packets. Figure 14 shows broadcasting of RReq packets, when RReq passes a link, it will become blue. When the first RReq packet reaches to destination, node 64 will broadcast RRep packets. Figure 15 shows broadcasting of RRep packets. Links become yellow when RRep packets pass them.

 

Figure 12- A sample grid network topology and simulation button in GTNS





Figure 13- Simulation-Profile window





Figure 14- A sample grid network topology and broadcasting of RReq packets




Figure 15-  A sample grid network topology and broadcasting of RRep packets




Afterwards node 1 sends the traffic towards node 64 by choosing the shortest path in its routing table. The intermediate nodes send the traffic towards their first index entry, the best path. The purple line in Figure 16 shows the forwarding path from the source to the destination (this line is overwritten by the return path of ACK packet). The ACK packet traverses the reverse path (the green line) back to the source, as the intermediate nodes set the reverse hop back to the source in their routing tables. So the green line of reverse path over-color the purple line of forwarding path.

Figure 16: Established connection with the shortest path

Getting results:

 

You can see different statistic results of the simulation by clicking on Simulation-Statistic button as shown in figure 17. Figure 18 shows the Statistics window opened when you click on this button. You can see different parameters of network. For example you can see number of data packets that have been forwarded by intermediate nodes in Data Trans. No, you can see number of forwarded RReq and RRep packets in the fields RReq Trans. No and RRep Trans. No respectively. Also number of data packets and number of Ack packets generated during simulation are shown in Gen. Data No. CN and Gen. Ack No. CN. Number of established connections and total power of network after simulation and number of ad-hoc nodes and selfish nodes of type 1 and 2 and clock of the system is shown in this window.

Also after clicking on Simulation-Statistics button, the results of simulation will be saved in my_file.txt file. An example of this file and simulation results of some simulations are shown in figure 19.

 

Figure 17- Simulation-Statistics button in GTNS




Figure 18- The Statistics window which shows the simulation results created in GTNS




Figure 19- Simulation results written in my_file.txt in GTNS

 

REFERENCES:

[1] F. Farhat, M. R. Pakravan, M. Salmasizadeh, M. R. Aref, "Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes", ISPEC 2010: 187-200.

[2] http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5766445 

[3] http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5766444

- Location and data privacy
- Privacy and security mechanisms with selfish players
We study security/privacy mechanisms in the presence of selfish stakeholders, notably by means of game theory. For more information,
click here. We are applying this approach notably to:
. Securing online advertisement
. Recommendation systems
. Revocation
. Location privacy
- Secure neighbor discovery
Other aspects of wireless networks (these projects have been phased out)
- Secure vehicular communications
- Non-cooperative behavior in wireless networks
- Key management in decentralized wireless networks
- DOMINO (protecting WiFi hotspots against greedy behavior)
- CommonSense (Water management in rural areas by means of wireless sensors)
- Wireless Sensor Networks with Mobile Elements
- Group Communication in ad hoc networks

انجمن رمز ایران

Sunday, May 15, 2011

Workshop on Design and Cryptanalysis of eVoting Protocols

شرکت برای دانشجویان شریف رایگان است

1st Design and Cryptanalysis of E-Voting Protocols Workshop in Iran
6th Workshop of SBiSC@SUT, 26 May 2011
Kahroba Hall, Department of Electrical Engineering, Sharif University of Technology
اولین کارگاه علمی طراحی و تحلیل پروتکل های رای گیری الکترونیکی در ایران
ششمین کارگاه شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف
5 خرداد 1390، سالن کهربای دانشکده مهندسی برق دانشگاه صنعتی شریف


8-9

پذیرش و افتتاحیه



9-9:40

دکتر محمود سلماسی زاده (سخنران مدعو)

سخنرانی کلیدی


9:40-10:20

محمد حسین فرشچی (دانشجوی کارشناسی ارشد)

طرح های رأی گیری ایستگاهی


10:20-10:50

پذیرایی



10:50-11:30

زهرا احمدیان (دانشجوی دکتری)

مبانی طرح های رأی گیری الکترونیکی

11:30-12:10

مریم رجب زاده عصار (دانشجوی دکتری)

طرح های رأی گیری اینترنتی


12:10-13:30

ناهار و نماز



13:30-14:10

امیر صنعی (کارشناسی ارشد)

روند اجرایی سیستم های رأی گیری الکترونیکی


14:10-14:40

مریم رجب زاده عصار (دانشجوی دکتری)

مدل پیشگوی تصادفی و کاربرد آن در رأی گیری الکترونیکی


14:40-15

پذیرایی



15-15:40

نسا عسگریان (دانشجوی کارشناسی ارشد)

نظریه بازی ها و کاربرد آن در ارزیابی رأی گیری الکترونیکی


15:40-16:30

حمید رضا محروقی (دانشجوی دکتری)

روش های صوری و کاربرد آن در رأی گیری الکترونیکی


16:30-17

اختتامیه


Saturday, May 14, 2011

Workshop on Information Hiding Systems


Workshop on Information Hiding Systems

Workshop on Information Hiding Systems

کارگاه علمی سیستم های پنهان سازی اطلاعات

 

شاخه دانشجويي انجمن رمز ايران در دانشگاه صنعتي شريف کارگاه علمی تحت عنوان سيستم هاي پنهان سازی اطلاعات (Information Hiding Systems) را در روزهاي 29 و 30 آبان ماه سال جاري در سالن کهرباي دانشکده مهندسي برق دانشگاه صنعتي شريف برگزارکرد. هدف از برگزاري اين کارگاه علمی آموزشي آشناکردن پژوهشگران شاغل در دانشگاه و صنعت با مفاهيم نهان نگاری، نشان گذاری و تحليل نهان نگاري ميباشد که در ادامه موضوعات مورد بحث در کارگاه به تفصيل بيان شده است.

برنامه روز چهارشنبه 29 آبان 1387 (مباحث مقدماتی):
9:00 تلاوت آیاتی از قرآن مجید

9:05 سخنرانی فرشید فرحت، رئیس شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف
9:15 سمینار نهان نگاری، اهداف و کاربردهای آن (محمد علي اخايي، دانشجوی دکتری شریف)
9:55 سمینار نیازمنديهاي يک سيستم پنهان نگار (1) (نيما خادمي کلانتری، دانشجوی کارشناسی ارشد امیرکبیر)
  • مدلهاي بينايي و شنوايي انسان و نقش آن در نامحسوس بودن نهان نگاره
  • متريکهاي نهان نگاري (SNR,PSNR, PEAQ, Qindex, Watson Distance, etc) 
10:30 تنفس و پذیرایی
10:45 سمینار نيازمنديهاي يک سيستم پنهان نگار (2) (حسين کورکچي، کارشناسی ارشد شریف)
  • نقش تبديلها در نهان نگاري (فرکانس, ويولت, ريجلت, کانتورلت و ...) 
  • معرفي حملات و مشخصه ويژه هر حمله بر روي سيگنال نهان نگاري شده
11:35 سمینار نهان نگاري از ديدگاه تئوري اطلاعات (هانیه خليليان، کارشناسی ارشد شریف)
  • مدلسازي کانال, سيستم و مفاهيم ظرفيتي 
12:00 وقت نماز و ناهار
13:15 سمینار روشهاي نخستين پنهان نگاري (1) (سعيد سررشته داري، کارشناسی ارشد شریف)
  • LSB, Patchwork, Echo, etc
14:00 سمینار روشهاي نخستين پنهان نگاري (2) (بهاره اخباری، دانشجوی دکتری شریف)
  • QIM, SS, Phase Mod, etc
14:45 تنفس و پذیرایی
15:00 سمینار نهان نگاري زبان (یلدا محسن زاده، کارشناسی ارشد شریف)
15:35 سمینار الگوريتم هاي يادگيري ماشين و نقش آن در تحليل نهان نگاره (سوده بخشنده، کارشناسی ارشد)

برنامه روز پنجشنبه 30 آبان 1387 (مباحث پیشرفته):
8:25 تلاوت آیاتی از قرآن مجید
8:30 سمینار روشهاي پنهان نگاري وفقي (مجتبی سيد حسيني، کارشناسی ارشد)
9:10 سمینار روشهاي تحليل نهان نگاره (سعيدرضا خسروي راد، کارشناسی ارشد)
  • متغيرهاي آناليز و آماره هاي درجه بالا
10:00 تنفس و پذیرایی
10:20 سمینار روشهاي نوين مبتني بر کوانتيزاسيون (نيما خادمي کلانتری، کارشناسی ارشد)
  • Vector Quant, Projection quant, lattice based
11:10 سمینار روشهاي پيشرفته طيف گسترده (محمد علي اخايي، دانشجوی دکتری شریف)
  • جمعي و ضربي و کار پيشنهادي
12:00 مراسم اتقدیر از برگزارکنندگان با حضور دکتر امیر دانشگر
12:20 وقت نماز و ناهار
13:30 سمینار نهان سازي و ارتباط آن با مسايل Forensics (یلدا محسن زاده، کارشناسی ارشد)
14:10 مسائل مهم و بروز پنهان نگاري (سعیدرضا خسروي راد و مجتبی سيد حسيني، کارشناسی ارشد)
  • سمینار مقاومت در برابر حملات geometric
  • سمینار مقاومت در برابر حمله Gain 

 

Workshop on A5/1 Algorithm Cryptanalysis

 

شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف، کارگاه آموزشی تحلیل-رمز الگوریتم A5/1 را در تاریخ 1387/7/14 در پنجمین کنفرانس رمز ایران (دانشگاه صنعتی مالک اشتر) برگزار نمود. برنامه های ارائه شده در کارگاه آموزشی در قالب سمینار  هایی به شرح زیر است:

هانیه صدقییک حمله واقعی برای شکستن A5/1
میترا فاطمی تحلیل الگوریتم A5/1 با استفاده از حمله تقسیم و حل
فرشيد فرحت تحلیل همبستگی الگوریتم رمز A5/1
حسین کورکچی حمله به الگوریتم رمز A5/1 با توجه به بده بستان داده، زمان و حافظه
احسان مختاری تحلیل خطای همزمانی الگوریتم رمز A5/1