• Home
  • masoud shafiee
  • OpenAccess
    • List of Articles masoud shafiee

      • Open Access Article

        1 - Design of Secure Communication System by Use of Synchronization of Chaotic Systems
        Mohammad nikkhoo masoud shafiee koorosh kiani
        In this paper, the concept of secure synchronization of chaotic systems using adaptive and robust techniques , has been discussed and then a new secure communication scheme, based on secure synchronization of a general class of chaotic systems called Generalized Lorenz More
        In this paper, the concept of secure synchronization of chaotic systems using adaptive and robust techniques , has been discussed and then a new secure communication scheme, based on secure synchronization of a general class of chaotic systems called Generalized Lorenz System, are presented. This communication scheme is combination of conventional cryptographic methods and chaotic modulation method. Analytical and simulation results using sine and voice signal and with unknown constant propagation delay between transmitter and receiver , have been presented. Also, robustness of this scheme against Gaussian channel noise with variance of , and security analysis of this communication system from brute-force viewpoint has been evaluated. By using this communication scheme, the very great key length has been obtained. Manuscript profile
      • Open Access Article

        2 - Sliding Mode Controller for TCP Congestion Control
        roohollah barzamini masoud shafiee
        In this paper a new sliding mode controller for congestion problem in TCP networks has been proposed. Congestion occurs due to high network loads. It affects some aspects of network behavior. Congestion control prevents or reduces loads in bottlenecks and manages traffi More
        In this paper a new sliding mode controller for congestion problem in TCP networks has been proposed. Congestion occurs due to high network loads. It affects some aspects of network behavior. Congestion control prevents or reduces loads in bottlenecks and manages traffic. By using control theory, closed loop data transfer processing structure in computer networks can cope with the congestion problem. Sliding mode controller can provide robust behavior in presence of uncertainties and disturbances. In sliding mode control, states should be reached to a predefined surface (sliding surface), in a limited time and remain on the same surface over time. Moving on the sliding surface is independent of the uncertainties, so this technique is an approach of robust control. After applying controller to the system, stability of the system with controller has been studied by Lyapunov stability approach. Simulation results show the efficiency of the sliding mode controller in different scenarios. Manuscript profile
      • Open Access Article

        3 - Image Processing of steel sheets for Defect Detection by using Gabor Wavelet
        masoud shafiee mostafa sadeghi
        In different steps of steel production, various defects appear on the surface of the sheet. Putting aside the causes of defects, precise identification of their kinds helps classify steel sheet correctly, thereby it allocates a high percentage of quality control process More
        In different steps of steel production, various defects appear on the surface of the sheet. Putting aside the causes of defects, precise identification of their kinds helps classify steel sheet correctly, thereby it allocates a high percentage of quality control process. QC of steel sheet for promotion of product quality and maintaining the competitive market is of great importance. In this paper, in addition to quick review of image process techniques used, using image process by means of Gabor wavelet, a fast and precise solution for detection of texture defects in steel sheet is presented. In first step, the approach extracts considerable texture specification from image by using Gabor wavelet. The specification includes both different directions and different frequencies. Then using statistical methods, images are selected that have more obvious defects, and location of defects is determined. Offering the experimental samples, the accuracy and speed of the method is indicated. Manuscript profile
      • Open Access Article

        4 - Three-axis attitude control of a micro-satellite by magnetic actuators through-synthesis robust method
        ehsan habibollahian heydarali talebi masoud shafiee
        In this paper a robust controller using µ-synthesis method has been designed for attitude control system of a micro-satellite in LEO orbit. Then the controller has been evaluated with accurate linear and nonlinear simulations. After necessary evaluation three-axis stabi More
        In this paper a robust controller using µ-synthesis method has been designed for attitude control system of a micro-satellite in LEO orbit. Then the controller has been evaluated with accurate linear and nonlinear simulations. After necessary evaluation three-axis stabilization method with only magnetic torques and auxiliary gravity gradient boom was been selected. Nonlinear kinematics and dynamics equation of this system was obtained and linearization was performed on it. Finally the system was converted into a multivariable linear time varying system and controller for this system was performed via µ-synthesis, which has been done by changing from time varying system into system with uncertainty. Manuscript profile
      • Open Access Article

        5 - Cyber Threats Foresight Against Iran Based on Attack Vector
        mahdi omrani masoud shafiee siavash khorsandi
        Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of More
        Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber threats Foresight. This research can prepare the country for countering cyber threats based on existing and potential attack Vectors. First of all, 18 major cyber threats drivers base on attack Vectors through reviewing resources and interviewing with seven experts were identified. We use cross-impact analysis Future studies method to indicate main drivers of future cyber threats such as social engineering, Denial of service, ransomwares, spoofing and fraud and non-state actors. Mic Mac software will be used for this step. Finally, future scenarios for cyber threats were identified by using scenario-based approach. Scenario Wizard software will be used. The results of the research include two strong scenarios and 18 possible scenarios, based on the strongest scenario, ransomware, spoofing, fraud, social engineering and Denial of service are the most likely cyber threats by non-state actors through in a limited level Manuscript profile
      • Open Access Article

        6 - پردازش تصاویر ورق های فولادی به منظور آشکارسازی عیوب به کمک موجک گابور
        Mostafa Sadeghie masoud shafiee
        In different stages of steel production, many defects appear on the surface of the sheet. Regardless of the causes of failures, accurate detection of their types helps to correctly classify the steel sheet and thus occupies a high percentage of the quality control proce More
        In different stages of steel production, many defects appear on the surface of the sheet. Regardless of the causes of failures, accurate detection of their types helps to correctly classify the steel sheet and thus occupies a high percentage of the quality control process. Quality control of steel sheets is of great importance in order to improve product quality and maintain a competitive market. In this article, while reviewing the used image processing techniques, by using image processing with the help of two-dimensional Gabor wavelet, a fast and high-accuracy solution is presented for revealing textural defects of steel sheets. At first, using Gabor wavelet, it extracts significant textural features from the images, which includes both different directions and different frequencies. Then, using the statistical method, the images that contain the defects are selected more clearly and the location of the defect is determined. By presenting test samples, the accuracy and speed of the method used have been shown. Manuscript profile
      • Open Access Article

        7 - Sliding mode control for congestion in TCP/IP networks
        roohollah barzamini masoud shafiee
        Congestion phenomenon is one of the important problems faced by computer network designers and in recent years it has reduced the efficiency of networks. So far, various methods have been proposed to prevent and control this phenomenon, which are based on control theory More
        Congestion phenomenon is one of the important problems faced by computer network designers and in recent years it has reduced the efficiency of networks. So far, various methods have been proposed to prevent and control this phenomenon, which are based on control theory. For this purpose, the closed loop structure of the data transfer process in computer networks can be considered in such a way that the controllers from the Dynamic Queue Management (AQM) family are designed to be implemented in the pathfinders of the network and the rest of the network from the point of view of the pathfinder. It is defined as the control target system or plant. In the field of AQM controller design, many researches have been done and many controllers have been designed. In this article, sliding mode control is introduced as AQM controller. Sliding mode control is resistant to modeling uncertainties and disturbances. In sliding mode control, mode paths must reach a predefined level (sliding level) in a limited period of time and remain at the same level over time. Movement on the sliding surface is independent of uncertainties; Therefore, this technique is one of the resistant control methods. After implementing the sliding mode control on the network model, with the help of Matlab software, how the network behaves in the presence of this The controller was examined and the results obtained were compared with the results of several other controllers. Manuscript profile
      • Open Access Article

        8 - Stock market prediction using optimized grasshopper optimization algorithm and time series algorithms
        Vahid Safari dehnavi masoud shafiee
        Stock market prediction serves as an attractive and challenging field for researchers in financial markets. Many of the models used in stock market prediction are not able to predict accurately or these models require a large amount of input data, which increases the vo More
        Stock market prediction serves as an attractive and challenging field for researchers in financial markets. Many of the models used in stock market prediction are not able to predict accurately or these models require a large amount of input data, which increases the volume of networks and learning complexity, all of which ultimately reduce the accuracy of forecasting. This article proposes a method for forecasting the stock market that can effectively predict the stock market. In this paper, the past market price is used to reduce the volume of input data and this data is placed in a regressor model. Manuscript profile