Loading...
Search for: spreading
0.009 seconds
Total 177 records

    Numerical investigation into the effects of geometrical and loading parameters on lateral spreading behavior of liquefied layer

    , Article Acta Geotechnica ; 2013 , Pages 1-13 ; 18611125 (ISSN) Pak, A ; Seyfi, S ; Ghassemi, A ; Sharif University of Technology
    2013
    Abstract
    Numerical simulation of liquefaction-induced lateral spreading in gently sloped sandy layers requires fully coupled dynamic hydro-mechanical analysis of saturated sandy soil subjected to seismic loading. In this study, a fully coupled finite element model utilizing a critical-state two-surface-plasticity constitutive model has been applied to numerically investigate the effects of surface/subsurface geometry on lateral spreading. Using a variable permeability function with respect to excess pore pressure ratio is another distinctive feature of the current study. The developed code has been verified against the results of the well-known VELACS project. Lateral spreading phenomenon has been... 

    Control of diseases epidemic spreading through metapopulation models

    , Article International Journal of Control Theory and Applications ; Volume 8, Issue 2 , 2015 , Pages 769-784 ; 09745572 (ISSN) Afshar, M ; Razvan, M. R ; Sharif University of Technology
    International Sciences Press  2015
    Abstract
    We study a system of ordinary differential equations which describes the metapopulation SIR model. The main target is to control the epidemic spreading using the structure of connections between cities. For this purpose, we formulate optimal control strategy that the control represents a drug treatment and Prevention strategies . Some methods are given in numerical example section such as control through spectral radius of movement matrix or optimal control through travelling between cities. Existence results for the optimal control are studied  

    An inequality using perfect matchings and laplacian spread of a graph

    , Article Linear and Multilinear Algebra ; Volume 67, Issue 3 , 2019 , Pages 442-447 ; 03081087 (ISSN) Akbari, S ; Fath-Tabar, G. H ; Ghasemian, E ; Sharif University of Technology
    Taylor and Francis Ltd  2019
    Abstract
    Let G be a simple connected graph of order n. Let (Formula presented.) be the Laplacian eigenvalues of G. In this paper, we show that if X and Y are two subsets of vertices of G such that (Formula presented.) and the set of all edges between X and Y decomposed into r disjoint perfect matchings, then, (Formula presented.) where (Formula presented.). Also, we determine a relation between the Laplacian eigenvalues and matchings in a bipartite graph by showing that if (Formula presented.) is a bipartite graph, (Formula presented.) and (Formula presented.), then G has a matching that saturates U. © 2019, © 2019 Informa UK Limited, trading as Taylor & Francis Group  

    A note on the algebraic connectivity of a graph and its complement

    , Article Linear and Multilinear Algebra ; 2019 ; 03081087 (ISSN) Afshari, B ; Akbari, S ; Sharif University of Technology
    Taylor and Francis Ltd  2019
    Abstract
    For a graph G, let λ2(G) denote its second smallest Laplacian eigenvalue. It was conjectured that (Formula presented.), where (Formula presented.) is the complement of G. In this paper, it is shown that (Formula presented.). © 2019, © 2019 Informa UK Limited, trading as Taylor & Francis Group  

    A note on the algebraic connectivity of a graph and its complement

    , Article Linear and Multilinear Algebra ; 2019 ; 03081087 (ISSN) Afshari, B ; Akbari, S
    Taylor and Francis Ltd  2019
    Abstract
    For a graph G, let λ2(G) denote its second smallest Laplacian eigenvalue. It was conjectured that (Formula presented.), where (Formula presented.) is the complement of G. In this paper, it is shown that (Formula presented.). © 2019, © 2019 Informa UK Limited, trading as Taylor & Francis Group  

    A note on the algebraic connectivity of a graph and its complement

    , Article Linear and Multilinear Algebra ; Volume 69, Issue 7 , 2021 , Pages 1248-1254 ; 03081087 (ISSN) Afshari, B ; Akbari, S ; Sharif University of Technology
    Taylor and Francis Ltd  2021
    Abstract
    For a graph G, let (Formula presented.) denote its second smallest Laplacian eigenvalue. It was conjectured that (Formula presented.), where (Formula presented.) is the complement of G. In this paper, it is shown that (Formula presented.). © 2019 Informa UK Limited, trading as Taylor & Francis Group  

    A note on the algebraic connectivity of a graph and its complement

    , Article Linear and Multilinear Algebra ; Volume 69, Issue 7 , 2021 , Pages 1248-1254 ; 03081087 (ISSN) Afshari, B ; Akbari, S ; Sharif University of Technology
    Taylor and Francis Ltd  2021
    Abstract
    For a graph G, let (Formula presented.) denote its second smallest Laplacian eigenvalue. It was conjectured that (Formula presented.), where (Formula presented.) is the complement of G. In this paper, it is shown that (Formula presented.). © 2019 Informa UK Limited, trading as Taylor & Francis Group  

    Increasing robustness of one bit embedding spread spectrum audio watermarking against malicious attack

    , Article Proceedings of the IASTED International Conference on Circuits, Signals, and Systems, Clearwater Beach, FL, 28 November 2004 through 1 December 2004 ; 2004 , Pages 69-73 ; 0889864551 (ISBN); 9780889864559 (ISBN) Erfani, Y ; Ghaemmaghami, S ; IASTED ; Sharif University of Technology
    2004
    Abstract
    In this paper, we change the correlation detector at receiver of spread spectrum (SS) audio watermarking to present a mechanism that prevents the system against malicious attack. The receiver of typical SS-based watermarking can only detect the watermark bit, while a pirate can send a pure signal that may incorrectly be detected as a watermarked signal. In our system we consider all conditions that we may have in SS-based watermarking system. By computing a threshold, we can detect watermark in any of two cases of having watermarked signal or pure original signal at the receiver. We reduce false alarm probability to approximately zero in our system. This mechanism, as compared to SS, comes... 

    Performance of WCDMA spreading in downlink for FDD mode

    , Article Proceedings of the International Conference on Telecommunications 2002, Beijing, 23 June 2002 through 26 June 2002 ; Volume 1 , 2002 , Pages 383-387 ; 7505377027 (ISBN) Moradi, H ; Kenari, M. N ; Ahmadian, M ; Sharif University of Technology
    2002
    Abstract
    UMTS is the European standard of third generation of mobile communications and its air interface is called WCDMA. In this paper a simple WCDMA system in downlink and in FDD mode is simulated and results is presented. The simulation that is an execution of apart of physical layer functions as layer 1, is including data modulation, spreading multipath channel, AWGN noise, data demodulation, despreading and Rake receiver. It is obvious that transmission methods of data correspond with WCDMA standard. In the other word, frames and slots structure, data symbols setting and requiring parameters follow the defined standards  

    Performance of WCDMA spreading in downlink for FDD mode

    , Article 1st IEEE International Conference on Circuits and Systems for Communications, ICCSC 2002, 26 June 2002 through 28 June 2002 ; Volume 2002-June , 2002 , Pages 254-257 ; 5742202601 (ISBN); 9785742202608 (ISBN) Moradi, H ; Kenari, M. N ; Ahmadian, M ; Salahi, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2002
    Abstract
    UMTS is the European standard of the third generation of mobile communications and its air interface is called WCDMA. In this paper a simple WCDMA system in downlink and FDD mode is simulated and results are presented. The simulation that is an execution, apart from physical layer functions as layer 1, includes data modulation, spreading multipath channel, AWGN noise, data demodulation, despreading and Rake receiver. It is obvious that transmission methods of data correspond to WCDMA standards. In other words, frames and slots structure, data symbols setting and required parameters follow the defined standards. © 2002 St. Petersburg State Poly Univ  

    Data hiding robust to mobile communication vocoders

    , Article IEEE Transactions on Multimedia ; Volume 18, Issue 12 , 2016 , Pages 2345-2357 ; 15209210 (ISSN) Kazemi, R ; Perez Gonzalez, F ; Akhaee, M. A ; Behnia, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    The swift growth of cellular mobile networks in recent years has made voice channels almost accessible everywhere. Besides, data hiding has recently attracted significant attention due to its ability to imperceptibly embed side information that can be used for signal enhancement, security improvement, and two-way authentication purposes. In this regard, we aim at proposing efficient schemes for hiding data in the widespread voice channel of cellular networks. To this aim, our first contribution is to model the channel accurately by considering a linear filter plus a nonlinear scaling function. This model is validated through experiments with true speech signals. Then we leverage on this... 

    An opportunistic network approach towards disease spreading

    , Article 6th International Conference on Complex Networks and Their Applications, Complex Networks 2017, 29 November 2017 through 1 December 2017 ; Volume 689 , November , 2018 , Pages 314-325 ; 1860949X (ISSN) ; 9783319721491 (ISBN) Joneydi, S ; Khansari, M ; Kaveh, A ; Sharif University of Technology
    Springer Verlag  2018
    Abstract
    Research in modeling epidemic spreading in static networks has reached maturity in recent years. On the contrary, disease spreading in dynamic networks can be considered as an important open issue. Hence, mapping dynamic interactions of crowds to a static network and then immunizing the resulting network is the subject of this paper. In this work, we analogize spreading of diseases in dynamic networks -based on dynamic interactions- to message delivery in opportunistic networks. Thus, different diseases which have different spreading behaviors could be simulated by specific routing protocols. Having used interactions among individuals in the utilized dataset, the resulting network is... 

    Interplay between competitive and cooperative interactions in a three-player pathogen system

    , Article Royal Society Open Science ; Volume 7, Issue 1 , 2020 Pinotti, F ; Ghanbarnejad, F ; Hövel, P ; Poletto, C ; Sharif University of Technology
    Royal Society Publishing  2020
    Abstract
    In ecological systems, heterogeneous interactions between pathogens take place simultaneously. This occurs, for instance, when two pathogens cooperate, while at the same time, multiple strains of these pathogens co-circulate and compete. Notable examples include the cooperation of human immunodeficiency virus with antibiotic-resistant and susceptible strains of tuberculosis or some respiratory infections with Streptococcus pneumoniae strains. Models focusing on competition or cooperation separately fail to describe how these concurrent interactions shape the epidemiology of such diseases. We studied this problem considering two cooperating pathogens, where one pathogen is further structured... 

    The profitability of pair trading strategy in stock markets: Evidence from Toronto stock exchange

    , Article International Journal of Finance and Economics ; 2021 ; 10769307 (ISSN) Keshavarz Haddad, G ; Talebi, H ; Sharif University of Technology
    John Wiley and Sons Ltd  2021
    Abstract
    Market practitioners and speculators attempt to make benefits from the existence of market price gaps and profit opportunities by arbitrage strategies. Although some investors trade stocks based on the available financial and fundamental information of a particular share, there are others who make profits by risk hedging and swing trading opportunities. One of these strategies is pairs trading, which is a sub-category of statistical arbitrage. Pairs trading can assure reasonably a risk-free profit gaining. This paper aims to make a hypothetical portfolio composed of pairs of stocks by exploring a significant association between their prices in the Toronto Stock Exchange, TSX. We compare the... 

    Audio watermarking for covert communication through telephone system

    , Article 6th IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2006, Vancouver, BC, 27 August 2006 through 30 August 2006 ; 2006 , Pages 955-959 ; 0780397541 (ISBN); 9780780397545 (ISBN) Tavakoli, E ; Vosoughi Vahdat, B ; Shamsollahi, M. B ; Sameni, R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2006
    Abstract
    In this paper, a novel service that uses audio watermarking for covert communication through telephone system is presented. This system is suitable for ISDN and PSIN networks and it can be modified for using in mobile systems. We use a Direct sequence spread spectrum algorithem with perceptual modeling of HAS for embedding watermark into the audio or speed signals. The watermark is robust against telephone channel attacks such as AWGN , Low pass filtering, D/A-A/D conversion, Downsampling down to 64 slips and A-Law or μ-Law conversion. This system is also robust against audio format conversion such as wave (windows PCM) format to mp3 (down o 64 kbps compression. © 2006 IEEE  

    Social distancing in pedestrian dynamics and its effect on disease spreading

    , Article Physical Review E ; Volume 104, Issue 1 , 2021 ; 24700045 (ISSN) Sajjadi, S ; Hashemi, A ; Ghanbarnejad, F ; Sharif University of Technology
    American Physical Society  2021
    Abstract
    Nonpharmaceutical measures such as social distancing can play an important role in controlling the spread of an epidemic. In this paper, we use a mathematical model combining human mobility and disease spreading. For the mobility dynamics, we design an agent-based model consisting of pedestrian dynamics with a novel type of force to resemble social distancing in crowded sites. For the spreading dynamics, we consider the compartmental susceptible-exposed-infective (SEI) dynamics plus an indirect transmission with the footprints of the infectious pedestrians being the contagion factor. We show that the increase in the intensity of social distancing has a significant effect on the exposure... 

    Analytical Solutions of Actin-Retrograde-Flow in a Circular Stationary Cell: A Mechanical Point of View

    , Article Bulletin of Mathematical Biology ; Vol. 76, issue. 3 , March , 2014 , p. 744-760 ; 00928240 Ghasemi, V., A ; Firoozabadi, B ; Saidi, M. S ; Sharif University of Technology
    Abstract
    The network of actin filaments in the lamellipodium (LP) of stationary and migrating cells flows in a retrograde direction, from the membrane periphery toward the cell nucleus. We have theoretically studied this phenomenon in the circular stationary (fully spread) cells. Adopting a continuum view on the LP actin network, new closed-form solutions are provided for the actin-retrograde-flow (ARF) in a polar coordinate system. Due to discrepancy in the mechanical models of the actin network in the ARF regime, solutions are provided for both assumptions of solid and fluid behavior. Other involved phenomena, including polymerizing machine at the membrane periphery, cytosol drag, adhesion... 

    Blind consecutive extraction of multi-carrier spread spectrum data from digital images

    , Article 2017 25th Iranian Conference on Electrical Engineering, ICEE 2017, 2 May 2017 through 4 May 2017 ; 2017 , Pages 1835-1839 ; 9781509059638 (ISBN) Soltanian, M ; Ghaemmaghami, S ; Sharif University of Technology
    Abstract
    We address blind extraction of spread spectrum data embedded in a digital image. The multicarrier iterative generalized least-squares (M-IGLS) data extraction algorithm is the basis of our study and a new algorithm based on M-IGLS is introduced in which both computational complexity and data extraction accuracy are enhanced. In the new method named multicarrier consecutive iterative generalized least-squares (M-CIGLS) algorithm, neither the cover image nor the spread spectrum carriers are required for the hidden data extraction. Additionally, knowledge of the number of carriers is no more needed. Simulation results show the ability of this method to extract data with a superior performance... 

    Comparative approach for detection of biosurfactant-producing bacteria isolated from Ahvaz petroleum excavation areas in south of Iran

    , Article Annals of Microbiology ; Volume 58, Issue 3 , 2008 , Pages 555-559 ; 15904261 (ISSN) Afshar, S ; Bagheri Lotfabad, T ; Roostaazad, R ; Rouholamini Najafabadi, A ; Akbari Noghabi, K ; Sharif University of Technology
    University of Milan  2008
    Abstract
    The current study was undertaken to compare four analytical methods including drop collapse, oil spreading, surface tension (SFT) measurements, and blood agar lysis tests for detection of biosurfactant-producing bacteria. Among 32 biosurfactant-producing bacteria isolated from Ahvaz oil fields, in south of Iran, 16 isolates (50%) exhibited highest biosurfactant production. Eleven isolates (MASH.1 to MASH.11) demonstrated a reduction in surface tension from 65 mN/m to less than 41 mN/m. The results showed that about 91% of these highly biosurfactant producers had the same response levels of "++++" and "+++" in the case of both SFT and oil spreading methods. Among these, seven isolates had the... 

    Time-variant reliability-based prediction of COVID-19 spread using extended SEIVR model and Monte Carlo sampling

    , Article Results in Physics ; Volume 26 , 2021 ; 22113797 (ISSN) Shadabfar, M ; Mahsuli, M ; Sioofy Khoojine, A ; Hosseini, V. R ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    A probabilistic method is proposed in this study to predict the spreading profile of the coronavirus disease 2019 (COVID-19) in the United State (US) via time-variant reliability analysis. To this end, an extended susceptible-exposed-infected-vaccinated-recovered (SEIVR) epidemic model is first established deterministically, considering the quarantine and vaccination effects, and then applied to the available COVID-19 data from US. Afterwards, the prediction results are described as a time-series of the number of people infected, recovered, and dead. Upon introducing the extended SEIVR model into a limit-state function and defining the model parameters including transmission, recovery, and...