Loading...
Search for: analytical-results
0.011 seconds

    An analytical approach for evaluating the optical spectrum emitted from a strongly-coupled single quantum-dot photonic-crystal cavity system

    , Article Proceedings of SPIE - The International Society for Optical Engineering, 26 January 2010 through 28 January 2010 ; January , 2010 , Volume 7609 ; 0277786X (ISSN) ; 9780819480057 (ISBN) Ahmadi, E ; Chalabi, H. R ; Miri, M ; Bayat, M ; Khorasani, S ; Sharif University of Technology
    2010
    Abstract
    A theory is presented for the quantum radiation emitted from a single exciton in a quantum dot. We assume that the quantum dot is in strong coupling to a slab photonic crystal cavity. A dielectric function of spatial coordinates is used to explain the effects of the macroscopic medium. It has been proved that the electric field in such a medium can be described using the so-called K-function. We derive a formula for obtaining the frequency spectrum, and present an analytical result for the optical spectrum, which is dependent on the K-function. We also have considered a slab photonic crystal configuration with hexagonal structure containing a cavity to evaluate the frequency spectrum in such... 

    Analytical solutions for the static instability of nano-switches under the effect of casimir force and electrostatic actuation

    , Article ASME International Mechanical Engineering Congress and Exposition, Proceedings, 13 November 2009 through 19 November 2009 ; Volume 12, Issue PART A , 2010 , Pages 63-69 ; 9780791843857 (ISBN) Mojahedi, M ; Moeenfard, H ; Ahmadian, M. T ; Sharif University of Technology
    Abstract
    This paper deals with the problem of static instability of nano switches under the effect of Casimir force and electrostatic actuation. The nonlinear fringing field effect has been accounted for in the model. Using a Galerkin decomposition method and considering only one mode, the nonlinear boundary value problem describing the static behavior of nano-switch, is reduced to a nonlinear boundary value ordinary differential equation which is solved using the homotopy perturbation method (HPM). In order to ensure the precision of the results, the number of included terms in the perturbation expansion has been investigated. Results have been compared with numerical results and also with... 

    Analysis of link lifetime in wireless mobile networks

    , Article Ad Hoc Networks ; Volume 10, Issue 7 , September , 2012 , Pages 1221-1237 ; 15708705 (ISSN) Nayebi, A ; Sarbazi Azad, H ; Sharif University of Technology
    Abstract
    Link lifetime (LL) analysis is crucially important in designing and evaluating wireless mobile network protocols. Although a considerable amount of research has been conducted on this issue, the current paper studies several aspects of link lifetime for the first time, e.g. a closed form expression for the probability distribution of the residual link lifetime (RLL) for the constant velocity mobility model is obtained, which facilitates marginal studies on the behavior of link lifetime. As a case, using a tail analysis of LL and RLL distributions, we analytically prove that they are heavy-tailed. Using this outcome, a self-similar behavior in the traffic pattern of a sample delay tolerant... 

    Analysis of the downlink saturation throughput of an asymmetric IEEE 802.11n-based WLAN

    , Article 2016 IEEE International Conference on Communications, ICC 2016, 22 May 2016 through 27 May 2016 ; 2016 ; 9781479966646 (ISBN) Soleymani, M ; Maham, B ; Ashtiani, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Frame aggregation (FA) mechanisms improve the throughput of WLANs. In this paper, the effect of the FA mechanism on the throughput of wireless local area networks (WLANs) has been investigated. To this end, we propose an analytical model in order to analyze an IEEE 802.11n network comprised of an access point (AP) and several conventional nodes (CNs), all in the coverage area of each other. With respect to the heavier download traffic compared to the upload one, in our scenario, only the AP uses an FA mechanism and the other nodes use the basic IEEE 802.11 standard. In our proposed analytical model, the maximum downlink (DL) throughput is derived. Regarding the asymmetry among nodes, our... 

    Some analytical results on tuning fractional-order [proportional-integral] controllers for fractional-order systems

    , Article IEEE Transactions on Control Systems Technology ; Volume 24, Issue 3 , 2016 , Pages 1059-1066 ; 10636536 (ISSN) Badri, V ; Tavazoei, M. S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    The first objective of this brief is to discover the solution existence conditions in the methods recently proposed for tuning fractional-order [proportional-integral] (FO-[PI]) controllers. The FO-[PI] controller tuned by these methods can simultaneously ensure the desired phase margin, the desired gain crossover frequency, and the flatness of the phase Bode plot at such a frequency. In this brief, the achievable performance region of these tuning methods is also found in the gain crossover frequency-phase margin plane. Moreover, some results on the shape of this region and the uniqueness of the controller resulting from the considered tuning methods are given. By combining the presented... 

    Analytical cubic solution to weakly nonlinear interactions between surface and interfacial waves

    , Article Proceedings of the International Conference on Offshore Mechanics and Arctic Engineering - OMAE, 31 May 2009 through 5 June 2009, Honolulu, HI ; Volume 6 , 2009 , Pages 625-630 ; 9780791843468 (ISBN) Tahvildari, N ; Jamali, M ; Sharif University of Technology
    Abstract
    Resonant interaction between one surface wave and two oblique interfacial waves is analyzed in a three dimensional system of a finite-depth, two-layer fluid. A third order perturbation analysis is carried out to obtain the evolution equations of the waves amplitudes. Taking the waves amplitudes as the perturbation small parameter, the evolution equations of the waves are solved simultaneously to obtain the short and long term behavior of the interfacial waves. In contrast to the second order analysis, the current analysis shows that after an initial exponential growth period, the interfacial waves stop growing and stabilize. Furthermore, the influences of surface wave frequency, density... 

    New soliton solution of a varactor-loaded nonlinear transmission line

    , Article IEEE Transactions on Microwave Theory and Techniques ; Volume 65, Issue 11 , 2017 , Pages 4084-4092 ; 00189480 (ISSN) Samizadeh Nikoo, M ; Ali Hashemi, S. M ; Sharif University of Technology
    Abstract
    The nonlinearity of a nonlinear transmission line (NLTL) may have a variety of forms. The Korteweg-de Vries (KdV) equation is the governing equation of a highly specific category of NLTLs having a C - V characteristic as C(V) = C0 (1-bV), but works as an approximate model in a general NLTL having any other kinds of nonlinearities. Here, the soliton response of a varactor-loaded NLTL is studied analytically. The presented analysis gives the exact nonlinear partial differential equation (PDE) governing these networks. It is shown that the obtained PDE, being different from the KdV equation, has soliton solutions showing the well-known properties of the KdV solitons. These obtained solitons... 

    Secure two-party computation using an efficient garbled circuit by reducing data transfer

    , Article 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, 6 July 2017 through 7 July 2017 ; Volume 719 , 2017 , Pages 23-34 ; 18650929 (ISSN); 9789811054204 (ISBN) Yalame, M. H ; Farzam, M. H ; Bayat Sarmadi, S ; Sharif University of Technology
    Springer Verlag  2017
    Abstract
    Secure computation has obtained significant attention in the literature recently. Classic architectures usually use either the Garbled Circuit (GC) or the Goldreich-Micali-Wigderson (GMW) protocols. So far, to reduce the complexity of communications in these protocols, various methods have been proposed. The best known work in both methods reduces the communication up to almost 2k-bits (k is the symmetric security parameter) for each AND gate, and using XOR gate is free. In this paper, by combining GC and GMW, we propose a scheme in the semi-honest adversary model. This scheme requires an Oblivious Transfer (OT) and a 2-bit data transfer for each AND gate, keeping XOR gates free. The... 

    An analytical approach for throughput evaluation of wireless network coding

    , Article 2009 IEEE International Conference on Communications, ICC 2009, Dresden, 14 June 2009 through 18 June 2009 ; 2009 ; 05361486 (ISSN); 9781424434350 (ISBN) Amerimehr, M. H ; Ashtiani, F ; Iraji, M. B ; Sharif University of Technology
    2009
    Abstract
    In this paper, we propose a new analytical model for stable throughput evaluation of wireless network coding. In this new approach we consider the arrival and departure rates in and from the wireless nodes, respectively, in steady state. Our analytical model is founded on a multi-class open queueing network. In this model, we include two basic processes of network coding, i.e., packets combination and packets multicasting, in a suitable manner considering the constraints of the queueing networks. In this respect, we consider the coded packets as new classes of customers. By solving the related traffic equations and applying the stability condition, we compute the maximum stable throughput,... 

    A queueing model for wireless tandem network coding

    , Article 2009 IEEE Wireless Communications and Networking Conference, WCNC 2009, Budapest, 5 April 2009 through 8 April 2009 ; 2009 ; 15253511 (ISSN); 9781424429486 (ISBN) Iraji, M. B ; Amerimehr, M. H ; Ashtiani, F ; Sharif University of Technology
    2009
    Abstract
    In this paper, we propose a new analytical model in order to evaluate the throughput of a wireless tandem network coding. Our analytical model is based on a multi-class open queueing network. In this model, we include two basic processes of network coding, i.e., packets combination and packets multicasting, in a suitable way considering the constraints of the queueing networks. To this end, we consider the coded packets as new classes of customers. In our model we consider the arrival and departure rates in and from the wireless nodes in steady state. By solving the related traffic equations and applying the stability condition, we compute the maximum stable throughput, i.e., the maximum... 

    Finite anti-plane shear deformation of nonlinear elastic composites reinforced with elliptic fibers

    , Article Mechanics of Materials ; Volume 41, Issue 7 , 2009 , Pages 868-877 ; 01676636 (ISSN) Avazmohammadi, R ; Naghdabadi, R ; Weng, G. J ; Sharif University of Technology
    2009
    Abstract
    Exact solutions for nonlinear composites undergoing finite deformation are in general difficult to find. In this article, such a solution is obtained for a two-phase composite reinforced with elliptic fibers under anti-plane shear. The analysis is based on the theory of hyperelasticity with both phases characterized by incompressible neo-Hookean strain energies, and is carried out when the composite elliptic cylinder assemblage carries a confocal microgeometry. The problem for a class of compressible neo-Hookean materials is also studied. The analytical results for the stress and strain distributions are verified with finite element calculations where excellent agreement is found. We then... 

    More details on analysis of fractional-order Van der Pol oscillator

    , Article JVC/Journal of Vibration and Control ; Volume 15, Issue 6 , 2009 , Pages 803-819 ; 10775463 (ISSN) Tavazoei, M. S ; Haeri, M ; Attari, M ; Bolouki, S ; Siami, M ; Sharif University of Technology
    2009
    Abstract
    This paper is devoted to the analysis of fractional order Van der Pol system studied in the literature. Based on the existing theorems on the stability of incommensurate fractional order systems, we determine parametric range for which a fractional order Van der Pol system with a specific order can perform as an undamped oscillator. Numerical simulations are presented to support the given analytical results. These results also illuminate a main difference between oscillations in a fractional order Van der Pol oscillator and its integer order counterpart. We show that contrary to integer order case, trajectories in a fractional Van der Pol oscillator do not converge to a unique cycle. © 2009... 

    Reduced order modeling of liquid sloshing in 3D tanks using boundary element method

    , Article Engineering Analysis with Boundary Elements ; Volume 33, Issue 6 , 2009 , Pages 750-761 ; 09557997 (ISSN) Dehghani Firouzabadi, R ; Haddadpour, H ; Ghasemi, M ; Sharif University of Technology
    2009
    Abstract
    This paper presents the application of reduced order modeling technique for investigation of liquid sloshing in three-dimensional tanks. The governing equations of sloshing are written using a boundary element formulation for incompressible potential flow. Then, the governing equations are reduced to a more efficient form that is represented only in terms of the velocity potential on the liquid free surface. This particular form is employed for eigen-analysis of fluid motion and the sloshing frequencies and mode shapes are determined. Then, the sloshing frequencies and the corresponding right- and left-eigenvectors are used along the modal analysis technique to find a reduced order model... 

    Performance analysis of IEEE 802.11 DCF and 802.11e EDCA based on queueing networks

    , Article IET Communications ; Volume 3, Issue 5 , 2009 , Pages 871-881 ; 17518628 (ISSN) Karamad, E ; Ashtiani, F ; Sharif University of Technology
    2009
    Abstract
    The authors propose a new analytical model based on BCMP closed queueing networks in order to evaluate the performance of IEEE 802.11 DCF MAC protocol when all nodes are in the transmission range of each other, that is, a single hop wireless ad hoc network. By the proposed model, some performance metrics such as saturation and non-saturation throughput, distributions of channel access delay and the number of packets in the MAC buffer are derived. An extension of the proposed model is used for the analysis of IEEE 802.11e EDCA and the same performance metrics are evaluated for this protocol. Analytical results on IEEE 802.11e prove that differentiation in service is possible and channel share... 

    Event-Triggered control of a class of nonlinear systems on the basis of indefinite lyapunov theory

    , Article IEEE Transactions on Circuits and Systems II: Express Briefs ; 2019 ; 15497747 (ISSN) Ghazisaeedi, H. R ; Tavazoei, M. S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    This paper proposes event-triggered rules for stabilizing the equilibrium point of a class of nonlinear systems, on the basis of indefinite Lyapunov theory. Unlike the traditional event-triggered control methods, which have been constructed based on the Lyapunov theory, the timederivative of the corresponding Lyapunov function can be positive in some time periods by using the proposed eventtriggered rules. For a class of uncertain nonlinear systems with matched uncertainty, the proposed event-triggered controller guarantees that the trajectories of the system tend to an arbitrary small neighborhood of the equilibrium point of the system. Numerical examples confirm the obtained analytical... 

    Event-Triggered control of a class of nonlinear systems on the basis of indefinite lyapunov theory

    , Article IEEE Transactions on Circuits and Systems II: Express Briefs ; 2019 ; 15497747 (ISSN) Ghazisaeedi, H. R ; Tavazoei, M. S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    This paper proposes event-triggered rules for stabilizing the equilibrium point of a class of nonlinear systems, on the basis of indefinite Lyapunov theory. Unlike the traditional event-triggered control methods, which have been constructed based on the Lyapunov theory, the timederivative of the corresponding Lyapunov function can be positive in some time periods by using the proposed eventtriggered rules. For a class of uncertain nonlinear systems with matched uncertainty, the proposed event-triggered controller guarantees that the trajectories of the system tend to an arbitrary small neighborhood of the equilibrium point of the system. Numerical examples confirm the obtained analytical... 

    Event-Triggered control of a class of nonlinear systems on the basis of indefinite lyapunov theory

    , Article IEEE Transactions on Circuits and Systems II: Express Briefs ; Volume 67, Issue 10 , 2020 , Pages 2104-2108 Ghazisaeedi, H. R ; Tavazoei, M. S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    This brief proposes event-Triggered rules for stabilizing the equilibrium point of a class of nonlinear systems, on the basis of indefinite Lyapunov theory. Unlike the traditional event-Triggered control methods, which have been constructed based on the Lyapunov theory, the time-derivative of the corresponding Lyapunov function can be positive in some time periods by using the proposed event-Triggered rules. For a class of uncertain nonlinear systems with matched uncertainty, the proposed event-Triggered controller guarantees that the trajectories of the system tend to an arbitrary small neighborhood of the equilibrium point of the system. Numerical examples confirm the obtained analytical... 

    A novel analytical model for a circularly-polarized, ferrite-based slot antenna by solving an integral equation for the electric field on the circular slot

    , Article Waves in Random and Complex Media ; 19 June , 2020 Heydari, M. B ; Ahmadvand, A ; Sharif University of Technology
    Taylor and Francis Ltd  2020
    Abstract
    We propose and analyze a circularly polarized slot antenna built on a ferrite substrate which is saturated normal to its plane and metalized on both sides. The antenna is built by etching a circular slot in the top metal layer. The antenna operates in the frequency range where the effective permeability of ferrite is negative. An accurate analytical model is derived for the antenna by solving the integral equation for the electric field on the circular slot. The results obtained are in good agreement with numerical simulations. Using the analytical results, a practical antenna is designed that uses a microstrip feed line. For an antenna with inner and outer radii of 4.9 and 5.9 mm, the... 

    A low cost Hydrokinetic Wells turbine system for oceanic surface waves energy harvesting

    , Article Renewable Energy ; Volume 156 , 2020 , Pages 610-623 Valizadeh, R ; Abbaspour, M ; Taeibi Rahni, M ; Sharif University of Technology
    Elsevier Ltd  2020
    Abstract
    This paper provides a feasibility study on a low cost system called Hydrokinetic Wells turbine for surface wave energy conversion without using plenum chambers. The elimination of the plenum chamber and its complicated valve systems can reduce the expenses of wave energy conversion up to 23%.The feasibility process were done for high and low frequency conditions. For the low frequency waves, we offer the 300 rpm angular velocity as an optimum selection for further studies. For the high frequency condition a reliable analytical approach based on validated methods was developed. The analytical results indicate that a wells turbine with 60 cm diameter could produce up to 1600 Watts power in... 

    Analysis of k-Neigh topology control protocol for wireless networks

    , Article 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008, Gino-wan, Okinawa, 25 March 2008 through 28 March 2008 ; 2008 , Pages 904-909 ; 1550445X (ISSN) ; 0769530966 (ISBN); 9780769530963 (ISBN) Nayebi, A ; Sarbazi Azad, H ; Alishahi, K ; Sharif University of Technology
    2008
    Abstract
    k-Neigh is a basic neighbor-based topology control protocol based on the construction of k-neighbor graph as logical communication graph. Although k-Neigh is based on a connectivity theory, several topological aspects of the constructed topology are not yet analytically investigated. In this paper, several topological properties of the constructed topology after execution of the protocol, including probability density function of the distance between each node to its ith neighbor, probability of unidirectional links after execution of the first phase of the protocol, average logical degree, and average final transmission range, are investigated analytically. Moreover, an extensive simulation...