I am a PhD candidate in the Numerical Analysis Group of Computer Science Department at the University of Toronto . My beloved supervisor is Kenneth R. Jackson.
I did my Masters in Electrical Engineering under supervision of Ben Liang at the University of Toronto. My Master was on theoretical study of throughput in multiple access relay channels where links are scheduled to avoid collision. You can find my thesis here.
I earned my B. Sc. in Electrical Engineering from Sharif University of Technology in 2008.
CVI joined Numerical Analysis Lab from March 2014 where I am pursuing my PhD. My research interest is in application of neural networks for efficient valuation of large portfolios of unit-linked insurance products.
I was a member of Computer Networks group from January 2010 till December 2013. My research there was focused on Computer Networks. In particular, I conducted research on ways to improve the access delay of wireless networks.
I joined WHIMSIC lab in august 2008, where I pursued my Masters. My research focused on theory and practice of multiple access relay networks. I developed analytical frameworks for the uplink of a multi-source single-destination relayaided wireless system where transmissions are scheduled to avoid collisions.
From September 2006 to August 2008, I was a research assistant in ERI's Speech laboratory. I worked on a variety of subjects pertinent to speech processing under the supervision of Dr. Shahrokh Ghaemmaghami, the Dean of the ERI. These subjects include: 1) Speech recognition methods with the aid of Hidden Markov Model (HMM) and Support Vector Machine (SVM). 2) Usefull approaches in preparing a good, reliable database. 3) Speech synthesizing methods.
I started my research activities in Multimedia Lab in August 2007. I was collaborating with M. A. Akhaee, then a Phd candidate at Sharif University of Technology, and supervised by Prof. Farokh Marvasti. Our research covered a wide area of image and audio processing as some of them are listed below: 1) Speech Denoising using Adaptive Filters. 2) Blind, Reversible Audio Watermarking with the aid of OFDM ideas and iterative methods. 3) Image Watermarking.
Introduction to Theory of Computation.