Loading...
Search for:
shakeri--mohammad-reza
1.296 seconds
Total 6169 records
Automatic System Identification Algorithm Including Uncertainty Estimation based on Operational Modal Analysis
, M.Sc. Thesis Sharif University of Technology ; Khodaygan, Saeed (Supervisor) ; Movahedi, Mohammad Reza (Supervisor)
Abstract
Modal analysis is very important in determining the physical properties of structures and mechanisms. This field is divided into two general parts: Experimental Modal Analysis (EMA) and Operational Modal Analysis (OMA). In the operational modal analysis, there are more challenges for the analyst due to the lack of inputs to identify the system. Many of the mechanical structures can not be analyzed experimentally and under specific loadings, but should be identified under actual operating conditions and in situations where the inputs of the system are not measurable. For this purpose, a modal analysis method called "Random Sub-Space Identification" (SSI) is intoduced, which uses only output...
Incorporating Three Echelon Location, Routing and Inventory Decisions in Supply Chain Network Design with Heterogeneous Vehicle
, M.Sc. Thesis Sharif University of Technology ; Shadrokh, Shahram (Supervisor)
Abstract
A key driver of the overall productivity and profitability of a supply chain is its distribution network which can be used to achieve a variety of the supply chain objectives ranging from low cost to high responsiveness. Designing a distribution network consists of three subproblems: location–allocation problem, vehicle routing problem, and inventory control problem. Because of high dependency among these problems, in the literature there are several papers integrating two of the above problems: location–routing problems, inventory–routing problems, and location–inventory problems.
The three echelon location routing inventori problem (LRIP) is raised by the design of transportation...
The three echelon location routing inventori problem (LRIP) is raised by the design of transportation...
A misbehavior‐tolerant multipath routing protocol for wireless Ad hoc networks [electronic resource]
, Article International Journal of Research in Wireless Systems (IJRWS) ; Vol. 2, Issue 9, pp. , Sep. 2013 ; Pakravan, Mohammad Reza ; Aref, Mohammad Reza ; Sharif University of Technology
Abstract
Secure routing is a major key to service maintenance in ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. As a result of the resource limitations in such networks nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a novel data redirection method to mitigate the impact of node misbehavior on network...
The Dynamic Behavior of Calcite Cemented Gravelly Sand – A Case Study of Tehran Soil
, Ph.D. Dissertation Sharif University of Technology ; Haeri, Mohsen (Supervisor) ; Sajjadi, Ali Akbar (Supervisor)
Abstract
An understanding of the effect of degree of cementation on static and dynamic behaviour of cemented soils is becoming increasingly important in design and analysis of geotechnical engineering problems. Naturally cemented coarse-grained soils are widely present in many parts of the world. Misunderstanding of the behaviour of such soils could lead to underestimate or overestimate of the soil parameters. Previous studies conducted by Haeri and his co-workers show that most of the alluvial deposit of Tehran, the capital city of Iran, has a soil with cemented nature. The amount and characteristics of the cementation of the deposit varies in different parts from highly cemented in the north to...
Analysis and Improvement of Intrusion Detection Methods in Data Network Routers
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
Abstract
High-quality online services demand reliable and fast packet delivery at the network layer. However, clear evidence documents the existence of compromised routers in the ISP and enterprise networks, threatening network availability and reliability. A compromised router can stealthily drop, modify, inject, or delay packets in the forwarding path to launch Denial-of-Service, surveillance, man-in-the-middle attacks, etc. So researches tried to create intrusion detection methods to identify adversarial routers and switches. To this end, data-plane fault localization (FL) aims to identify faulty links and is an effective means of achieving high network availability. FL protocols use...
Topological Defects in Confined Nematics by Planar Anchoring
, M.Sc. Thesis Sharif University of Technology ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Supervisor)
Abstract
Confining nematic liquid crystal between two curved boundary conditions while the nematic molecules have a degenerate planar anchoring leads to complex and beautiful textures of molecular disparagement(defect) in the bulk and on the surfaces. Such the liquid crystal shells are made with double-emulsion techniques in microfluidic devices have provided applications for micro-scale colloidal linkers.In this work, we have numerically minimized the elastic energy in one-constant approximation in present of Fournier’s degenerate surface potential with finite element method. The nematic shell is confined between two spherical surfaces that we have studied the final energies and their related...
Improvement of Routing Security in Ad Hoc Networks Against Several Attacks
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Supervisor)
Abstract
Secure routing is a major key to service maintenance in wireless ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. Wormhole attack is one of the most severe active attacks to mobile ad hoc networks. Noting the resource limitations in such networks, nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a...
Solving Symmetric Nonlinear Equations System Using BFGS Trust Region Quadratic Method
, M.Sc. Thesis Sharif University of Technology ; Razvan, Mohammad Reza (Supervisor) ; Peyghami, Mohammad Reza (Supervisor)Design and Implementation of 2.5 Gbps Circuit Switching Fabric
, M.Sc. Thesis Sharif University of Technology ; Pakravan, Mohammad Reza (Supervisor) ; Movahhedy, Mohammad Reza (Supervisor)
Abstract
Providing high bandwidth network infrastructures for ever increasing need of data transport is of great importance. The underling infrastructure for many communication services such as GSM/3G/4G mobile networks and Internet services is Synchronous Digital Hierarchy (SDH) optical transport systems. SDH are standardized protocols that multiplex multiple lower rate digital bit streams, such as E1 and Ethernet, and transfer them synchronously over optical fiber using lasers or LEDs. In addition to high data transfer rates, flexible network management and protection mechanisms have great importance, hence are part of SDH standards. In order to obtain flexible network architecture and protected...
Preserving Privacy in Smart Grid
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
Abstract
Development of Smart Grid and deployment of smart meters in large scale has raised a lot of concerns regarding customers’ privacy. Consequently, several schemes have been proposed to overcome the above mentioned issue. These schemes mainly rely on data aggregation as a method of protecting users’ privacy from the grid operators. However, the main problem with most of these schemes is the fact that they require a large amount of processing power at the meter side. This, together with the fact that smart meters don’t usually have a powerful processor, can cause the unavailability of smart meter data at the required time for operators of the grid, and at the same time disables smart meters from...
Effect of the Geometry of Colloidal Particles on Nematic Liquid Crystals
, Ph.D. Dissertation Sharif University of Technology ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Co-Advisor)
Abstract
A liquid crystal is a state of matter composed of highly anisotropic building blocks. When liquid crystals are exposed to surfaces with given shapes and anchoring conditions, the orientation of their molecules gets spatially disordered and topological defects may form in the system. The interplay between liquid crystals and the geometry and topology of the colloidal particles has motivated extensive recent studies.In this thesis, we present the numerical modeling results for two faceted colloidal particles in a thermotropic nematic liquid crystal. To obtain the equilibrium nematic field with a finiteelement method, we numerically minimize the free energy of the system that based on the...
Transportation Problem of Hub Network with Direct Links
, M.Sc. Thesis Sharif University of Technology ; Haji, Rasoul (Supervisor)
Abstract
Hub and Spoke networks come into play when considering direct link between all origins and destinations is either impossible or expensive in a transportation system. In this kind of problems, some nodes are chosen as hub from all origin and destination nodes to collect flows and then distribute them. Implementing hub network leads to minimizing transportation cost, sorting flows and conveying them in economies of scale. Otherwise, shipping flows directly may cause decreasing the travelling distance and the delivery time consequently. In this dissertation, combination of hub network and direct shipment is investigated. To obtain the optimal hub locations and direct links between non-hub nodes...
Analyzing Cost Engineering Along With Presenting A Model To Reduce Cost Of industrial Products
, M.Sc. Thesis Sharif University of Technology ; Mostafavi, Mostafa (Supervisor)
Abstract
Lack of financial sources for production and performing projects has been an effective issue in all governmental and non-governmental organizations. So, using a structure with capability of detecting and forecasting all expenses and costs, and being able to convert the mass of data into useful and instrumental reports for managerial decision such as estimating total cost, selecting the syntax of production and etc is obvious for recourse management of every organization. Among the various components of the cost engineering system, cost management system by recording and allocating cost is an important issue in efficiency of every cost engineering system.In this thesis, Automotive Industrial...
A robust zero-watermarking scheme using Canny edge detector
, Article International Journal of Electronic Security and Digital Forensics ; Volume 5, Issue 1 , 2013 , Pages 25-44 ; 1751911X (ISSN) ; Jamzad, M ; Sharif University of Technology
2013
Abstract
By expansion of digital multimedia and networking technology, the problem of ownership protection has become increasingly important. Digital watermarking is an efficient way for copyright protection of digital images. Traditional watermarking techniques degrade the quality of host image by embedding a watermark logo. Facing this problem, a new watermarking approach called zero-watermarking has been proposed. In zero-watermarking methods, the watermark does not require to be embedded into the protected image but it uses both the watermark and the protected image to generate a verification map which is registered to a trusted authority for further protection. In this paper we propose a robust...
A robust zero-watermark copyright protection scheme based on DWT and image normalization
, Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 20 November 2011 through 23 November 2011 ; Volume 7088 LNCS, Issue PART 2 , November , 2011 , Pages 359-370 ; 03029743 (ISSN) ; 9783642253454 (ISBN) ; Jamzad, M ; Sharif University of Technology
2011
Abstract
Recently, protecting the copyright of digital media has become an imperative issue due to the growing illegal reproduction and modification of digital media. A large number of digital watermarking algorithms have been proposed to protect the integrity and copyright of images. Traditional watermarking schemes protect image copyright by embedding a watermark in the spatial or frequency domain of an image. However, these methods degrade the quality of the original image in some extend. In recent years, a new approach called zero-watermarking algorithms is introduced. In these methods, the watermark does not require to be embedded into the protected image but is used to generate a verification...
A robust copyright protection scheme based on discrete cosine transform and image normalization
, Article 2011 7th Iranian Conference on Machine Vision and Image Processing, MVIP 2011 - Proceedings ; 2011 ; 9781457715358 (ISBN) ; Jamzad, M ; Sharif University of Technology
2011
Abstract
Watermarking is a way that is used to protect the copyright of images. As the existing watermarking methods are not robust enough a new novel scheme is needed. In this paper, we propose a zero-watermark discrete cosine transformation-based copyright protection scheme, in which a normalization procedure is applied in both watermark embedding and extraction to make our scheme more robust to geometric distortions. This method is resistant to malicious signal processing and geometric attacks such as blurring, JPEG compression, noise adding, sharpening, scaling, rotation and cropping. Experimental results on images with different complexity show that our proposed scheme outperforms related...
An efficient feature extraction methodology for blind image steganalysis using contourlet transform and zernike moments
, Article 2013 10th International ISC Conference on Information Security and Cryptology, ISCISC 2013 ; Aug , 2013 , Page(s): 1 - 6 ; Ghaemmaghami, S ; Sharif University of Technology
IEEE Computer Society
2013
Abstract
We propose an effective blind image steganalysis based on contourlet transform and Zernike moments that improves the detection accuracy of universal image steganalysis methods. The proposed method examines randomness in the test image to distinguish between the stego and non-stego images. The suspicious image is decomposed by contourlet transform, and then the absolute Zernike moments of contourlet subbands coefficients of the image and linear prediction error of each contourlet subband are extracted as features for steganalysis. These features are fed to a nonlinear SVM classifier with an RBF kernel to distinguish between cover and stego images. Experimental results show that the proposed...
Integrated procedure, using differential evolution optimization of rate parameters, for design of small and accurate multistep global chemical mechanisms
, Article Industrial and Engineering Chemistry Research ; Volume 57, Issue 10 , March , 2018 , Pages 3530-3544 ; 08885885 (ISSN) ; Mazaheri, K ; Sharif University of Technology
American Chemical Society
2018
Abstract
Three-dimensional analysis of combustion chambers in industrial gas turbines suffers from lack of simple and accurate reduced mechanisms for oxidation of hydrocarbon fuels. Here, an integrated procedure is introduced based on a differential evolution optimization technique. The procedure is flexible and modular and allows optimization of many rate parameters of a multistep global mechanism based on many different combustion criteria and inlet or operational conditions. The procedure uses any selected chemical reactor model and any reference combustion mechanism provided. Sample design criteria used here are flame temperature, ignition delay time, and concentration of selected species,...
Chemical kinetics Optimization for a DLE Combustor Optimization Using Numerical Method
, Ph.D. Dissertation Sharif University of Technology ; Mazaheri, Karim (Supervisor)
Abstract
Control and reduction of gas turbines pollutants emissions are increasingly of major concern. Here we introduce and apply new algorithms for derivation of accurate and low cost skeletal chemical kinetics, optimization of global multi-step chemical kinetics, and optimization of geometry of Lean Premixed (LPM) dry low emission (DLE) combustors.A new reduction algorithm called SA-GEIE, based on sensitivity analysis of reaction mechanisms respect to ignition delay, flame temperature and pollutants concentration (NO and CO), is introduced. This algorithm is implemented to GRI-3.0 to produce a low cost methane oxidation skeletal mechanism with 118 reactions and 39 specie. The accuracy is assessed...
Optimal Assignment of Patients from Emergency Department to Inpatient Hospital Wards
, M.Sc. Thesis Sharif University of Technology ; Haji, Babak (Supervisor)
Abstract
Emergency Department (ED) overcrowding is one the most problems and challenges that every Emergency Department all over the world is facing with. This problem leads to some problems like prolonged waiting times and Length of Stay in Emergency Department. “Boarding time” is one of the most important ones, which is the time a patient spend for being transferred from Emergency Department to one of the Hospital Inpatient Wards. One important solution to this problem is “overflowing”, and it means allocating patients to an alternative ward rather than their primary ward. In practice, the overflowing process usually controlled in a myopic manner. Limited number of researches that focus in this...