Babak Sadeghian

Learn More
BACKGROUND This study aimed to assess the relationship of air pollution and plasma surrogate markers of endothelial dysfunction in the pediatric age group. METHODS This cross-sectional study was conducted in 2009-2010 among 125 participants aged 10-18 years. They were randomly selected from different areas of Isfahan city, the second large and(More)
Intrusion detection systems are designed based on the assumption that the behavior of an intruder is different from a normal user of a system. We show that intrusion detection can be done based on the assumption that the correlation of system events and parameters is changed during an attack to the system. In this paper, we propose a new method in(More)
BACKGROUND This study aimed to determine the association of ambient particulate matter (PM) on surrogate markers of endothelial function and inflammation in healthy children with or without exposure to second-hand smoke. METHODS This cross-sectional study was conducted in 2011 in Isfahan, which is the second largest and second most air-polluted city in(More)
Nowadays, one of the main challenges facing computer systems is increasing attacks and security threats against them. Therefore, capturing, analyzing, designing, developing and testing of security requirements have became an important issue in development of security-critical computing systems, such as banking, military and e-commerce systems. For(More)
OBJECTIVES Air pollution is a hazardous environmental problem with several adverse health effects including its impact on the development of chronic diseases as diabetes mellitus. This study aimed to investigate the association of geographical distribution of air quality index (AQI) and type 2 diabetes mellitus in an air-polluted city by using geographic(More)
Reconfigurable computing has grown to become an important and large field of research. It offers advantages over traditional hardware and software implementation of computational algorithms. In this paper, we implemented multiple cryptographic algorithms, namely DES, LOKI, DESX, Biham-DES, and S n DES on a reconfigurable hardware. Our implementation results(More)
Signed difference approach was first introduced by Wang for finding collision in MD5. In this paper we introduce ternary difference approach and present it in 3 symbols. To show its application we combine ternary difference approach with conventional differential cryptanalysis and apply that to cryptanalysis the reduced round PRESENT. We also use ant colony(More)
This study aims to determine the atmospheric concentrations of particulate matter 2.5 (PM2.5)-bounded polycyclic aromatic hydrocarbons (PAHs) and their association with their urinary metabolites in children and adolescents. This study was conducted from October 2014 to March 2016 in Isfahan, Iran. We measured 16 species of PAHs bounded to PM2.5 by gas(More)
Asynchronous designs have the potential to be robust with respect to changes in the physical environment. They also appear to consume less power and provide better performance compared to their synchronous counterparts. In this work, synchronous and asynchronous implementations of the modular multiplication that is the major part of the RSA algorithm is(More)
  • 1