Loading...
Search for: efficient-method
0.012 seconds
Total 24 records

    Technical and Economic Modeling Techniques to Improve Efficiency of Gas Turbine Cycle in Different Operational Conditions

    , M.Sc. Thesis Sharif University of Technology Karimi, MohammadReza (Author) ; Sattari, Sorena (Supervisor)
    Abstract
    Gas turbine is one of most widely used in power plants to generate electricity or mechanical power options in the industry , which is having its own advantages and disadvantages . if the turbine use simple , efficiency is generally below 33%. . After installing and employ , these turbines produce efficiency less than their nominal amount . The methods no change in structure exist that increase the efficiency or power of the turbine to acceptable level .In this thesis, gas turbine and to improvement performance methods has been studied . gas turbine with the methods are simulated to obtain the effect of each method in different environmental conditions . Economic sensitivity analysis... 

    Design and Implementation of a DC/AC Converter with High Step up and High Efficiency in Wide Output Power Range for Photovoltaic Applications

    , M.Sc. Thesis Sharif University of Technology Babaee Zarch, Mohammad Javad (Author) ; Zolghardi, Mohammad Reza (Supervisor)
    Abstract
    Solar power is expensive, so engineers are encouraged to put effort on increasing efficiency of solar power equipments. Since photovoltaic panels usually output a low voltage, variable direct current electricity, a boost converter and a suitable inverter are required to use this energy for ordinary commercial appliances. In this project, high step up, high efficiency converters are investigated, and the best converter with high efficiency and limited switch stress which achieves high voltage gain by capacitor multipliers and coupled inductors is illustrated. Afterwards, methods for improving efficiency such as modifying the converter structure and its control strategy are suggested. The... 

    On Efficiency and Bandwidth Enhancement of Integrated Class-J Power Amplifiers

    , Ph.D. Dissertation Sharif University of Technology Alizadeh, Amir Reza (Author) ; Medi, Ali (Supervisor)
    Abstract
    Power amplifiers (PAs) are one of the key components in radio-frequency (RF) and microwave systems. In these systems, PAs must be highly efficient to simplify the thermal management and to enhance dc power requirements. Future systems, including WiMax, 4G, 5G, and beyond, will likely require larger bandwidths due to their wider spectral allocations caused by the extended bandwidth of baseband signals. Therefore, highly-efficient and broadband PAs are needed to be employed in these systems. To realize high-efficiencies over wide frequency ranges, class-J mode of operation was introduced by Cripps in 2009. Class-J mode of operation is capable of maintaining a high efficiency (78% in theory)... 

    Effect of Electromagnetic Field on Membrane Fouling in Filtration Process

    , M.Sc. Thesis Sharif University of Technology Rouina, Mohammad (Author) ; Kariminia, Hamid Reza (Supervisor) ; Mousavi, Abbas (Supervisor)
    Abstract
    Current research studies the effect of electromagnetic field on reducing precipitation on membrane surface in reverse osmosis. Reverse osmosis is one of the most widely applied methods for water desalinization. Despite its advantages over other desalinization techniques, suffers from shortcomings such as blockage of membrane surface. Use of magnetic fields for reducing precipitation in process equipment, the so-called magnetic treatment, has been studied and practiced for decades. This research intends to study the effect of electromagnetic field on water and its mineral content, and the possibility of its application as a method for reducing precipitation and blockage in reverse osmosis... 

    Towards an efficient method for spreading information in social network

    , Article 2009 3rd Asia International Conference on Modelling and Simulation, AMS 2009, Bandung, Bali, 25 May 2009 through 26 May 2009 ; 2009 , Pages 152-157 ; 9780769536484 (ISBN) Ahmadi, H ; Mehrbakhsh, A ; Asgarian, E ; Sharif University of Technology
    2009
    Abstract
    Nowadays, content distribution is of high attention in peer to peer information systems. There are two main problems that could be mentioned in this context. The first problem is how to disseminate fragments of information efficiently and the next is to avoid missing same rare fragments towards end of download. For overcoming these problems, a new mechanism is presented in this paper which uses gossip algorithms on basis of social networks. Our mechanism maintains simplicity of gossip and has low overhead. This mechanism includes two phases for managing traffic and solving bottleneck problem: one for spreading rumors inside the social network and finding network of interests and the other... 

    Tolerance–reliability analysis of mechanical assemblies for quality control based on Bayesian modeling

    , Article Assembly Automation ; Volume 39, Issue 5 , 2019 , Pages 769-782 ; 01445154 (ISSN) Khodaygan, S ; Ghaderi, A ; Sharif University of Technology
    Emerald Group Publishing Ltd  2019
    Abstract
    Purpose: The purpose of this paper is to present a new efficient method for the tolerance–reliability analysis and quality control of complex nonlinear assemblies where explicit assembly functions are difficult or impossible to extract based on Bayesian modeling. Design/methodology/approach: In the proposed method, first, tolerances are modelled as the random uncertain variables. Then, based on the assembly data, the explicit assembly function can be expressed by the Bayesian model in terms of manufacturing and assembly tolerances. According to the obtained assembly tolerance, reliability of the mechanical assembly to meet the assembly requirement can be estimated by a proper first-order... 

    Simple and efficient remote sensing image transformation for lossless compression

    , Article Proceedings of SPIE - The International Society for Optical Engineering ; Volume 8285 , 2011 ; 0277786X (ISSN) ; 9780819489326 (ISBN) Sepehrband, F ; Ghamisi, P ; Mortazavi, M ; Choupan, J ; Sharif University of Technology
    2011
    Abstract
    Remote Sensing (RS) images or satellite images include information about earth. Compression of RS images is important in the field of satellite transmission systems and mass storage purposes. Because of importance of information and existent of large amount of details, lossless compression preferred. Real time compression technique is applied on satellite and aerial transmission systems [1]. A simple algorithm accelerates the whole process in real time purposes. Lossless JPEG, JPEG-LS and JPEG2000 are some famous lossless compression methods. Transformation is the first step of these methods. In this paper, a simple and efficient method of lossless image transformation has been introduced by... 

    Recognizing combinations of facial action units with different intensity using a mixture of hidden Markov models and neural network

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7 April 2010 through 9 April 2010 ; Volume 5997 LNCS , April , 2010 , Pages 304-313 ; 03029743 (ISSN) ; 9783642121265 (ISBN) Khademi, M ; Manzuri Shalmani, M. T ; Kiapour, M. H ; Kiaei, A. A ; Sharif University of Technology
    2010
    Abstract
    Facial Action Coding System consists of 44 action units (AUs) and more than 7000 combinations. Hidden Markov models (HMMs) classifier has been used successfully to recognize facial action units (AUs) and expressions due to its ability to deal with AU dynamics. However, a separate HMM is necessary for each single AU and each AU combination. Since combinations of AU numbering in thousands, a more efficient method will be needed. In this paper an accurate real-time sequence-based system for representation and recognition of facial AUs is presented. Our system has the following characteristics: 1) employing a mixture of HMMs and neural network, we develop a novel accurate classifier, which can... 

    Iterative implicit integration procedure for hybrid simulation of large nonlinear structures

    , Article Earthquake Engineering and Structural Dynamics ; Volume 40, Issue 9 , October , 2011 , Pages 945-960 ; 00988847 (ISSN) Mosqueda, G ; Ahmadizadeh, M ; Sharif University of Technology
    2011
    Abstract
    A fully implicit iterative integration procedure is presented for local and geographically distributed hybrid simulation of the seismic response of complex structural systems with distributed nonlinear behavior. The purpose of this procedure is to seamlessly incorporate experimental elements in simulations using existing fully implicit integration algorithms designed for pure numerical simulations. The difficulties of implementing implicit integrators in a hybrid simulation are addressed at the element level by introducing a safe iteration strategy and using an efficient procedure for online estimation of the experimental tangent stiffness matrix. In order to avoid physical application of... 

    Intelligent clustering in wireless sensor networks

    , Article 1st International Conference on Networks and Communications, NetCoM 2009, 27 December 2009 through 29 December 2009, Chennai ; 2009 , Pages 12-17 ; 9780769539249 (ISBN) Heidari, E ; Movaghar, A ; Sharif University of Technology
    Abstract
    Minimization of the number of cluster heads in a wireless sensor network is a very important problem to reduce channel contention and to improve the efficiency of the algorithm when executed at the level of cluster-heads. In this paper, we propose an efficient method based on genetic algorithms (GAs) to solve a sensor network optimization problem. Long communication distances between sensors and a sink in a sensor network can greatly drain the energy of sensors and reduce the lifetime of a network. By clustering a sensor network into a number of independent clusters using a GA, we can greatly minimize the total communication distance, thus prolonging the network lifetime. Simulation results... 

    In situ growth of vanadia-titania nano/micro-porous layers with enhanced photocatalytic performance by micro-arc oxidation

    , Article Electrochimica Acta ; Volume 55, Issue 9 , 2010 , Pages 3093-3102 ; 00134686 (ISSN) Bayati, M. R ; Moshfegh, A. Z ; Golestani Fard, F ; Sharif University of Technology
    2010
    Abstract
    Micro-arc oxidation process was used to synthesize V2O5-TiO2 porous layers for the first time. Surface morphology and topography of the layers were investigated by scanning electron microscope (SEM) and atomic force microscope (AFM). X-ray diffraction (XRD) and X-ray photoelectron spectroscopy (XPS) techniques were also employed to evaluate phase structure and chemical composition of the layers. It was found that the V2O5-TiO2 layers consisted of anatase, rutile, and vanadium pentoxide phases fraction of which varied with the applied voltage and the electrolyte concentration. It was also revealed that pore size and surface roughness increased with the applied voltage and the electrolyte... 

    Efficient method for simplifying and approximating the S-boxes based on power functions

    , Article IET Information Security ; Volume 3, Issue 3 , 2009 , Pages 114-118 ; 17518709 (ISSN) Farhadian, A ; Aref, M. R ; Sharif University of Technology
    2009
    Abstract
    In recently proposed cipher algorithms, power functions over finite fields and specially inversion functions play an important role in the S-box design structure. In this study, a new systematic efficient method is introduced to cryptanalyse (to simplify and approximate) such S-boxes. This method is very simple and does not need any heuristic attempt and can be considered as a quick criterion to find some simple approximations. Using this new method, some approximations can be obtained for advanced encryption standard (AES) like S-boxes, such as AES, Camellia, Shark and so on. Finally as an application of this method, a simple linear approximation for AES S-box is presented. © The... 

    Efficient kernel learning from constraints and unlabeled data

    , Article Proceedings - International Conference on Pattern Recognition, 23 August 2010 through 26 August 2010, Istanbul ; 2010 , Pages 3364-3367 ; 10514651 (ISSN) ; 9780769541099 (ISBN) Soleymani Baghshah, M ; Bagheri Shouraki, S ; Sharif University of Technology
    2010
    Abstract
    Recently, distance metric learning has been received an increasing attention and found as a powerful approach for semi-supervised learning tasks. In the last few years, several methods have been proposed for metric learning when must-link and/or cannot-link constraints as supervisory information are available. Although many of these methods learn global Mahalanobis metrics, some recently introduced methods have tried to learn more flexible distance metrics using a kernel-based approach. In this paper, we consider the problem of kernel learning from both pairwise constraints and unlabeled data. We propose a method that adapts a flexible distance metric via learning a nonparametric kernel... 

    Efficient DPCM predictor for hardware implementation of lossless medical brain CT image compression

    , Article International Conference on Signals and Electronic Systems, ICSES'10 - Conference Proceeding, 7 September 2010 through 10 September 2010 ; September , 2010 , Pages 123-126 ; 9788390474342 (ISBN) Sepehrband, F ; Mortazavi, M ; Ghorshi, S ; Sharif University of Technology
    2010
    Abstract
    Computed Tomography (CT) medical images show a specific part of human body and present it in a digital form. Lossless image compression is one of the medical imaging applications. To implement such application on hardware we need a simple and fast algorithm. Differential pulse code modulation (DPCM) is a simple and efficient method for transforming image. In this paper best predictor for DPCM introduce in a manner in which has the best result in compression and also be efficient for hardware implementation. After transforming image by DPCM, Huffman encoding used to compress image. We introduce this method with application to brain CT images  

    Efficient and safe path planning for a mobile robot using genetic algorithm

    , Article 2009 IEEE Congress on Evolutionary Computation, CEC 2009, Trondheim, 18 May 2009 through 21 May 2009 ; 2009 , Pages 2091-2097 ; 9781424429592 (ISBN) Naderan Tahan, M ; Manzuri Shalmani, T ; Sharif University of Technology
    2009
    Abstract
    In this paper, a new method for path planning is proposed using a genetic algorithm (GA). Our method has two key advantages over existing GA methods. The first is a novel environment representation which allows a more efficient method for obstacles dilation in comparison to current cell based approaches that have a tradeoff between speed and accuracy. The second is the strategy we use to generate the initial population in order to speed up the convergence rate which is completely novel. Simulation results show that our method can find a near optimal path faster than computational geometry approaches and with more accuracy in smaller number of generations than GA methods. © 2009 IEEE  

    A simple granulation technique for preparing high-porosity nano copper oxide(II) catalyst beads

    , Article Particuology ; Volume 9, Issue 5 , 2011 , Pages 480-485 ; 16742001 (ISSN) Ahmadi, S. J ; Outokesh, M ; Hosseinpour, M ; Mousavand, T ; Sharif University of Technology
    Abstract
    A simple and efficient method was developed for fabricating spherical granules of CuO catalyst via a three-step procedure. In the first step, copper oxide nanoparticles were synthesized by hydrothermal decomposition of copper nitrate solution under supercritical condition. Then, they were immobilized in the polymeric matrix of calcium alginate, and followed by high-temperature calcination in an air stream as the third step, in which carbonaceous materials were oxidized, to result in a pebble-type catalyst of high porosity. The produced CuO nanoparticles were characterized by transmission electron microscopy (TEM) that revealed an average size of 5 nm, X-ray diffractometry (XRD), and thermo... 

    Architecturally modified Al-DRA composites: The effect of size and shape of the DRA rods on fracture behavior

    , Article Journal of Materials Science ; Volume 45, Issue 11 , June , 2010 , Pages 2852-2861 ; 00222461 (ISSN) Jamali, M ; Farokhzadeh, K ; Bagheri, R ; Seyed Reihani, S. M ; Sharif University of Technology
    2010
    Abstract
    Architectural modification of aluminum matrix composites is considered as an efficient method to improve fracture toughness. Al-DRA (Al-Al/SiC/20 p) composites were fabricated via "powder extrusion-casting- ingot extrusion" route with structures similar to that of reinforced concrete, so that DRA rods were surrounded by unreinforced aluminum. The effects of variation in shape, size, and number of DRA rods on fracture behavior of Al-DRA composites were investigated. Composites containing DRA rods with hexagonal cross-section exhibited higher resistance to crack initiation and growth, in comparison to those containing circular rods. In the case of hexagonal rods, increasing the number of rods... 

    Application of carbon nanoparticle/chitosan modified electrode for the square-wave adsorptive anodic striping voltammetric determination of Niclosamide

    , Article Electrochemistry Communications ; Volume 12, Issue 1 , 2010 , Pages 66-69 ; 13882481 (ISSN) Ghalkhani, M ; Shahrokhian, S ; Sharif University of Technology
    2010
    Abstract
    A new modified electrode formed by carbon nanoparticle/chitosan film (CNP/CS) was used for electrocatalytic reduction of Niclosamide (NA). The electrochemical behavior of NA at the CNP/CS modified electrode was investigated in detail by the means of cyclic voltammetry. The reduction mechanism of NA, corresponds to the redox chemistry of nitro group, was thoroughly investigated. The effect of the experimental parameters e.g. potential and time of accumulation, pH of the buffered solutions and potential sweep rate on the response of the electrode was studied. The prepared electrode showed high stability and uniformity in the composite film, short response time, good reproducibility and an... 

    A novel approach for secure and fast generation of RSA public and private keys on SmartCard

    , Article Proceedings of the 8th IEEE International NEWCAS Conference, NEWCAS2010, 20 June 2010 through 23 June 2010 ; June , 2010 , Pages 265-268 ; 9781424468058 (ISBN) Bahadori, M ; Mali, M. R ; Sarbishei, O ; Atarodi, M ; Sharifkhani, M ; IEEE CAS Society ; Sharif University of Technology
    2010
    Abstract
    RSA based SmartCards have been widely used in security services such as secure data transmission in many applications over the past few years. Generation of a secure key pair which is based on finding a pair of large prime numbers is an indispensable part of creating a secure channel. This paper describes a novel approach for secure and fast key generation of the public key cryptographic algorithm of RSA. This method has been implemented on a typical SmartCard equipped with a crypto-coprocessor and a true random number generator. An efficient method for generating the large random prime numbers is proposed that considerably reduces the total time required for generating a key pair. The key... 

    A novel approach for avoiding wormhole attacks in VANET

    , Article 1st South Central Asian Himalayas Regional IEEE/IFIP International Conference on Internet, AH-ICI 2009, 3 November 2009 through 5 November 2009, Kathmundu ; 2009 ; 9781424445707 (ISBN) Safi, S. M ; Movaghar, A ; Mohammadizadeh, M ; Sharif University of Technology
    Abstract
    Different attacks on routing protocols in ad hoc networks occur that one of the most dangerous types is called wormhole attack. This attack happens with the assistance of at least two or more malicious nodes. In this attack nodes create a private tunnel which if a packet comes to one of them, it will be guided to other pair of these malicious nodes by this tunnel and that node broadcasts it into network. This action provides a short connection in the network that is controlled by these malicious nodes. Hence they control all Packets that come to them and threaten the security of data within packets or delete them. Totally, what a wormhole does is an incorrect understanding of network...