Loading...
Search for:
abdolmaleki--b
0.102 seconds
Total 3074 records
Performance analysis of elliptic-profile airfoil cascade for designing reversible axial flow fans
, Article AIAA Journal ; Volume 57, Issue 4 , 2019 , Pages 1492-1501 ; 00011452 (ISSN) ; Afshin, H ; Farhanieh, B ; Sharif University of Technology
American Institute of Aeronautics and Astronautics Inc
2019
Abstract
Because reversible fans must be able to provide similar performance in either rotation direction, they need to have completely symmetrical blades. In the present study, an elliptic profile with itsmaximum thickness of 8%chord length at themiddle of the chord line is studied. For verification, theNACA0012 airfoilwas once analyzed two-dimensionally in the isolatedformationandonce in cascade formation with0.55 and 0.83 solidities, andthe obtainedresultswere comparedwith numerical and experimental results. Three well-known Reynolds-averaged Navier-Stokes turbulence models including Spalart-Allmaras, realizable κ-ϵ, and shear-stress transport κ-ω were used to find the suitable turbulence method....
Performance analysis of elliptic-profile airfoil cascade for designing reversible axial flow fans
, Article AIAA Journal ; Volume 57, Issue 4 , 2019 , Pages 1492-1501 ; 00011452 (ISSN) ; Afshin, H ; Farhanieh, B ; Sharif University of Technology
American Institute of Aeronautics and Astronautics Inc
2019
Abstract
Because reversible fans must be able to provide similar performance in either rotation direction, they need to have completely symmetrical blades. In the present study, an elliptic profile with itsmaximum thickness of 8%chord length at themiddle of the chord line is studied. For verification, theNACA0012 airfoilwas once analyzed two-dimensionally in the isolatedformationandonce in cascade formation with0.55 and 0.83 solidities, andthe obtainedresultswere comparedwith numerical and experimental results. Three well-known Reynolds-averaged Navier-Stokes turbulence models including Spalart-Allmaras, realizable κ-ϵ, and shear-stress transport κ-ω were used to find the suitable turbulence method....
Cryptanalysis of two EPC-based RFID security schemes
, Article 12th International ISC Conference on Information Security and Cryptology, 8 September 2015 through 10 September 2015 ; 2015 , Pages 116-121 ; 9781467376099 (ISBN) ; Baghery, K ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2015
Abstract
Radio Frequency Identification (RFID) is an easy to use technology for quick and low-cost identification and authentication. Since RFID systems have found in various parts of our daily lives, security awareness about these systems has become one of the prominent topics for researchers. In this study, we investigate two RFID security schemes which both are under Electronic Product Code (EPC) standard. It is shown that both the analyzed protocols have some drawbacks and are vulnerable to several security attacks including secret parameters reveal, impersonation, reader forward secrecy and also one of them does not provide date integrity. In addition, in order to overcome all the discovered...
Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standard
, Article 2016 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 111-116 ; 9781509034345 (ISBN) ; Baghery, K ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2017
Abstract
Recently, different RFID authentication protocols conforming to EPC Class 1 Generation 2 (EPC C1 G2) standard have been proposed. In 2013, Xiao et al. have proposed an improved mutual authentication protocol which claimed to eliminate the weaknesses of Yoon's protocol that has been proposed in 2012. In this paper, we study the security and the privacy of Xiao et al.'s protocol. It is shown that their protocol suffers from secret parameters reveal, tag impersonation attack, backward and forward traceability attacks. Then, in order to enhance the security and the privacy of this protocol, a modified version is proposed. In order to evaluate our proposed protocol, its security and privacy are...
Numerical and experimental study of a reversible axial flow fan
, Article International Journal of Computational Fluid Dynamics ; Volume 34, Issue 3 , 2020 , Pages 173-186 ; Mohammadian Bishe, E ; Afshin, H ; Farhanieh, B ; Sharif University of Technology
Taylor and Francis Ltd
2020
Abstract
Reversible axial flow fans, used in tunnel ventilation systems are designed in a way that as the direction of impeller rotation changes, suction and discharge directions change without any sensible change in flow rate and pressure. Also, their reversibility must be higher than 90%. Therefore, the blade profiles of these fans (S-shaped or elliptic) are designed symmetrically. In the current work, a reversible axial flow fan was studied experimentally and numerically in various ambient conditions and blade positions. Additionally, the experimental test of the fan was performed according to the AMCA-210 standard. Comparison of simulation and experimental results indicated the acceptable...
Traceability analysis of recent RFID authentication protocols
, Article Wireless Personal Communications ; Volume 83, Issue 3 , 2015 , Pages 1663-1682 ; 09296212 (ISSN) ; Baghery, K ; Abdolmaleki, B ; Aref, M. R ; Sharif University of Technology
2015
Abstract
Radio frequency identification (RFID) technology is a prominent technology which has been used in most authentication and identification applications. Above all, recently RFID systems have got more attention as an interesting candidate to implement in the internet of things systems. Although RFID systems provide useful and interest services to users, they can also threat the security and the privacy of the end-users. In order to provide the security and the privacy of RFID users, different authentication protocols have been proposed. In this study, we analyze the privacy of three RFID authentication protocols that proposed recently. For our privacy analysis, we use a formal RFID privacy...
Securing key exchange and key agreement security schemes for RFID passive tags
, Article 24th Iranian Conference on Electrical Engineering, ICEE 2016, 10 May 2016 through 12 May 2016 ; 2016 , Pages 1475-1480 ; 9781467387897 (ISBN) ; Baghery, K ; Akhbari, B ; Alavi, S. M ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2016
Abstract
In the last decade, various types of RFID security schemes have been proposed which have tried to provide all security and privacy requirements of end-users. In this paper, we cryptanalyze two new-found key exchange and key agreement security schemes which are proposed by Zhang et al. and Kim in 2012 and 2013 respectively. We present the reveal secret parameter, tag impersonation and traceability attacks on Zhang et al's protocol with success probability '1', and also we show that an attacker can impersonate the tag and the reader of Kim's protocol both with success probabilities '1/4'. We also present some modifications on the structure of studied schemes and propose two modified schemes...
Synthesis of Porous Nitrogen-Doped Carbon materials from Sugarcane Bagasse Wastes and Investigation of its Applications
, M.Sc. Thesis Sharif University of Technology ; Pourjavadi, Ali (Supervisor)
Abstract
Reprocessing of different industrial and agricultural wastes become very Important in today’s world because it reduces the environmental pollution arising from waste accumulation as well as providing cheap and sustainable raw material for industries.Among different wastes, sugarcane bagasse is produced in large quantities in Iran specially in Khuzestan province. Bagasse is mainly consists of 3 natural polymers;cellulose, hemicellulose and lignin and can be used for production of chipboard and MDFs, activated carbon, bioethanol and acid citric The purpose of this research is the synthesis of porous nitrogen-doped carbon materials from bagasse wastes and investigate the use of these compounds...
Surface Modification of UF Membrane by Cationic Polymers
, M.Sc. Thesis Sharif University of Technology ; Mousavi, Abbas (Supervisor)
Abstract
One of the most efficient and effective methods of water and wastewater treatment is the use of membranes and can be a good alternative to traditional methods such as adsorption, chemical coagulation and .... One of the limitations of this method is membrane fouling, which limits its use in industry.In this study, ultrafiltration membrane made by phase inversion method from a combination of PVDF and SPES polymers and surface modified with hyperbranched polyethylene imine and its performance in cationic coating paint purification was investigated. Also, the performance of this membrane has been investigated by calculating the separation rate, pure water flux, contact angle and specifications...
A robust fuzzy logic adaptive PI controller for hydro power plants
, Article SICE Annual Conference, SICE 2007, Takamatsu, 17 September 2007 through 20 September 2007 ; 2007 , Pages 2592-2595 ; 4907764286 (ISBN); 9784907764289 (ISBN) ; Ansarimehr, P ; Ranjbar, A. M ; Sharif University of Technology
2007
Abstract
The governor of hydro power plants should track frequency variations and at the same time provide good response to load disturbances. These two functions are contradictory and the system model changes with the operating point. This paper presents a robust fuzzy logic adaptive load-frequency controller for hydro power plants. The case study is Abbaspour power plant in Iran. © 2007 SICE
Design, Simulation, Performance Analysis, Optimization, Fabrication and Experimental Test of a Large Scale Reversible Axial Flow Fan
, M.Sc. Thesis Sharif University of Technology ; Farhanieh, Bijan (Supervisor) ; Afshin, Hossein (Co-Advisor)
Abstract
During fires, smoke particles are emitted in the air and the oxygen content of it rapidly drops. In order to tackle these two challenges which are among the main human life threatening factors, there is a need for a proper ventilation system. Ventilation is also one of the most sensitive and vital technical aspects in construction of tunnels and mines. Ventilation fans are tasked with two main objectives which are diluting the air inside the tunnel, parking, etc. and the timely discharge of smoke in case of fire. Hence, they should have similar operation in suctioning and discharge and supply the required flow rate in both directions. This is the reason the fans are reversible. Reversible...
Game-based privacy analysis of RFID security schemes for confident authentication in IoT
, Article Wireless Personal Communications ; Volume 95, Issue 4 , 2017 , Pages 5057-5080 ; 09296212 (ISSN) ; Baghery, K ; Khazaei, S ; Aref, M. R ; Sharif University of Technology
2017
Abstract
Recently, Radio Frequency Identification (RFID) and Near Field Communication systems are found in various user-friendly services that all of us deal with in our daily lives. As these systems are ubiquitously deployed in different authentication and identification applications, inferring information about our behavior will be possible by monitoring our use of them. In order to provide privacy and security requirements of RFID users in novel authentication applications, lots of security schemes have been proposed which have tried to provide secure and untraceable communication for end-users. In this paper, we investigate the privacy of three RFID security schemes which have been proposed...
Fabrication of in Situ Forming Bioadhesive Hydrogel for Cartilage Tissue Engineering
, M.Sc. Thesis Sharif University of Technology ; Mashayekhan, Shohreh (Supervisor) ; Hasanzadeh, Zabihollah (Supervisor)
Abstract
In recent years, many efforts have been made in tissue engineering and new methods for the treatment of cartilage damage, with an emphasis on their non-invasive and less aggressive nature. Meanwhile, injectable and in situ forming hydrogels have been considered as a less invasive nature. On the other hand, lack of enough mechanical properties in these hydrogels is one of their main problem. In this study, gelatin and alginate was used to fabricate hydrogel as interpenetrating network (IPN) hydrogel and silica nano particles were also used to increase mechanical properties in the fabricating of hydrogels. Gelatin is also combined with dopamine in order to induce bio adhesive properties of...
Numerical-Experimental geometric optimization of the ahmed body and analyzing boundary layer profiles
, Article Journal of Optimization Theory and Applications ; 2021 ; 00223239 (ISSN) ; Mashhadian, A ; Amiri, S ; Esfahanian, V ; Afshin, H ; Sharif University of Technology
Springer
2021
Abstract
The trade-off between the fuel consumption and drag coefficient makes the investigations of drag reduction of utmost importance. In this paper, the rear-end shape optimization of Ahmed body is performed. Before changing the geometry, to identify the suitable simulation method and validate it, the standard Ahmed body is simulated using k − ω shear stress transport (SST) and k-epsilon turbulence models. The slant angle, rear box angle, and rear box length as variables were optimized simultaneously. Optimizations conducted by genetic algorithm (GA) and particle swarm optimization (PSO) methods indicate a 26.3% decrease in the drag coefficient. To ensure the validity of the results, a...
Optimal tuning of temporary droop structure governor in the hydro power plant
, Article 2008 IEEE 2nd International Power and Energy Conference, PECon 2008, Johor Baharu, 1 December 2008 through 3 December 2008 ; 2008 , Pages 100-105 ; 9781424424054 (ISBN) ; Ranjbar, A. M ; Ansarimehr, P ; Borjian Boroujeni, S ; Sharif University of Technology
2008
Abstract
Load-frequency control is the intrinsic function of the governor in the power plants. It would be used in variant structures depend on the controller type such as PID, adaptive, fuzzy or robust. Temporary droop structure governor (TDSG) was commonly used in Hydro power plants (HPP). After representation of TDSG, this paper is dedicated to introducing a procedure for tuning TDSG parameters. The technique is based on pole placement for the closed loop poles of the system. These poles correspond to the TDSG parameters that by accurate tuning of them, pole placement is accomplished. The results for tuning TDSG of Abbaspour HPP have been presented as well. © 2008 IEEE
Numerical-Experimental geometric optimization of the Ahmed body and analyzing boundary layer profiles
, Article Journal of Optimization Theory and Applications ; 2021 ; 00223239 (ISSN) ; Mashhadian, A ; Amiri, S ; Esfahanian, V ; Afshin, H ; Sharif University of Technology
Springer
2021
Abstract
The trade-off between the fuel consumption and drag coefficient makes the investigations of drag reduction of utmost importance. In this paper, the rear-end shape optimization of Ahmed body is performed. Before changing the geometry, to identify the suitable simulation method and validate it, the standard Ahmed body is simulated using k − ω shear stress transport (SST) and k-epsilon turbulence models. The slant angle, rear box angle, and rear box length as variables were optimized simultaneously. Optimizations conducted by genetic algorithm (GA) and particle swarm optimization (PSO) methods indicate a 26.3% decrease in the drag coefficient. To ensure the validity of the results, a...
Numerical-Experimental geometric optimization of the Ahmed body and analyzing boundary layer profiles
, Article Journal of Optimization Theory and Applications ; Volume 192, Issue 1 , 2022 ; 00223239 (ISSN) ; Mashhadian, A ; Amiri, S ; Esfahanian, V ; Afshin, H ; Sharif University of Technology
Springer
2022
Abstract
The trade-off between the fuel consumption and drag coefficient makes the investigations of drag reduction of utmost importance. In this paper, the rear-end shape optimization of Ahmed body is performed. Before changing the geometry, to identify the suitable simulation method and validate it, the standard Ahmed body is simulated using k − ω shear stress transport (SST) and k-epsilon turbulence models. The slant angle, rear box angle, and rear box length as variables were optimized simultaneously. Optimizations conducted by genetic algorithm (GA) and particle swarm optimization (PSO) methods indicate a 26.3% decrease in the drag coefficient. To ensure the validity of the results, a...
On uniquely k-list colorable planar graphs, graphs on surfaces, and regular graphs
, Article Graphs and Combinatorics ; Volume 34, Issue 3 , May , 2018 , Pages 383-394 ; 09110119 (ISSN) ; Hutchinson, J. P ; Ilchi, S. G ; Mahmoodian, E. S ; Matsumoto, N ; Shabani, M. A ; Sharif University of Technology
Springer Tokyo
2018
Abstract
A graph G is called uniquelyk-list colorable (UkLC) if there exists a list of colors on its vertices, say L= { Sv∣ v∈ V(G) } , each of size k, such that there is a unique proper list coloring of G from this list of colors. A graph G is said to have propertyM(k) if it is not uniquely k-list colorable. Mahmoodian and Mahdian (Ars Comb 51:295–305, 1999) characterized all graphs with property M(2). For k≥ 3 property M(k) has been studied only for multipartite graphs. Here we find bounds on M(k) for graphs embedded on surfaces, and obtain new results on planar graphs. We begin a general study of bounds on M(k) for regular graphs, as well as for graphs with varying list sizes. © 2018, Springer...
The effects of smoking on female sexual dysfunction: a systematic review and meta-analysis
, Article Archives of Women's Mental Health ; Volume 25, Issue 6 , 2022 , Pages 1021-1027 ; 14341816 (ISSN) ; Hasheminezhad, R ; Abdolmaleki, A ; Kiaei, A ; Shohaimi, S ; Akbari, H ; Nankali, A ; Mohammadi, M ; Sharif University of Technology
Springer
2022
Abstract
The increased number of female smokers is considered a global health challenge in recent years. One of the detrimental effects of smoking is sexual hormone fluctuation causing female sexual dysfunction (FSD). This systematic review and meta-analysis aimed to investigate the effects of smoking leading to FSD. Electronic databases (PubMed, Scopus, Web of Science, Embase, Science Direct, and Google Scholar) were hired for systematic searching. Until June 2022, whole qualified studies reporting the consequences of smoking on FSD were gathered for data analysis based on the random effects model (CMA software, v.2). Study heterogeneity and publication bias were also assessed using I2 index and...
Investigation of Ionic Diffusion and Mixing Phenomena in Polymer-Enhanced Low-Salinity Waterflooding Using Molecular Dynamics Simulation
, M.Sc. Thesis Sharif University of Technology ; Ayatollahi, Shahaboddin (Supervisor) ; Mahani, Hassan (Supervisor) ; Esmaeilbeig, Mohammad Amin (Co-Supervisor) ; Pourkhiabani, Nahid (Co-Supervisor)
Abstract
Various studies have confirmed that water salinity and its composition significantly affect the efficiency of the waterflooding process. Field-scale operation of low-salinity water injection has been proven to be a cost-effective enhanced oil recovery (EOR) method which is also compatible with the environmental regulations. Although this method has satisfactory results, it faces some challenges, such as in-situ mixing of the injection low-salinity water with the saline water in the host reservoir. The salinity of the injected water increases, as it contacts the high-salinity reservoir brine in the pores. This phenomenon significantly impairs the efficiency of this technique, and increases...