Loading...
Search for:
amini--jila
0.137 seconds
Total 364 records
Copper(II) acetate
, Article Synlett ; Volume 23, Issue 13 , 2012 , Pages 1995-1996 ; 09365214 (ISSN) ; Sharif University of Technology
2012
Abstract
(A) Chakraborty and co-workers have developed a green method for the bulk ring-opening polymerization of lactides in the presence of Cu(OAc)2 as a good catalyst to synthesize polymers with different end-terminal groups.3 These polymerizations are highly controlled leading to the formation of polymers with the expected number of average molecular weights and narrow molecular weight distribution. (B) Garden and co-workers have found that the oxidative addition of anilines with 1,4-naphthoquinone to give N-aryl-2-amino-1,4-naphthoquinones can be performed in the presence of catalytic amounts of copper(II) acetate.4 All the reactions are generally more efficient in that they are cleaner, higher...
Solving rank one revised linear systems by the scaled ABS method
, Article ANZIAM Journal ; Volume 46, Issue 2 , 2004 , Pages 225-236 ; 14461811 (ISSN) ; Sharif University of Technology
2004
Abstract
In mathematical programming, an important tool is the use of active set strategies to update the current solution of a linear system after a rank one change in the constraint matrix. We show how to update the general solution of a linear system obtained by use of the scaled ABS method when the matrix coefficient is subjected to a rank one change. © Australian Mathematical Society 2004
Dextran-graft-poly(hydroxyethyl methacrylate) gels: A new biosorbent for fluoride removal of water
, Article Designed Monomers and Polymers ; Volume 16, Issue 2 , 2013 , Pages 127-136 ; 1385772X (ISSN) ; Mousavi, S. A ; Amini Fazl, A ; Amini Fazl, M. S ; Ahmari, R ; Sharif University of Technology
2013
Abstract
Synthesis of dextran-graft-poly(hydroxyethyl methacrylate) gels as a new fluoride biosorbent was considered in this work. For this propose, the Taguchi experimental design method was used for optimizing the synthetic conditions of the gels to reach high level of fluoride absorbency. The effects of three main parameters including concentrations of monomer (hydroxyethyl methacrylate), crosslinking agent (ethylene glycol dimethacrylate), and initiator (ammonium persulfate) on the final properties of the prepared gels were investigated. The proposed mechanism for grafting and chemically crosslinking reactions was proved with equilibrium water absorption, Fourier-transformed infrared, scanning...
Optimization of synthetic conditions of a novel collagen-based superabsorbent hydrogel by Taguchi method and investigation of its metal ions adsorption
, Article Journal of Applied Polymer Science ; Volume 102, Issue 5 , 2006 , Pages 4878-4885 ; 00218995 (ISSN) ; Salimi, H ; Amini Fazl, M. S ; Kurdtabar, M ; Amini Fazl, A. R ; Sharif University of Technology
2006
Abstract
A novel biopolymer-based superabsorbent hydrogel was synthesized through chemical crosslinking by graft copolymerization of partially neutralized acrylic acid onto the hydrolyzed collagen, in the presence of a crosslinking agent and a free radical initiator. The Taguchi method, a robust experimental design, was employed for the optimization of the synthesis reaction based on the swelling capacity of the hydrogels. This method was applied for the experiments and standard L16 orthogonal array with three factors and four levels were chosen. The critical parameters that have been selected for this study are crosslinker (N,N′-methylene bisacrylamide), initiator (potassium persulfate), and monomer...
A Semantic-Aware Authorization Model Based on Deontic Logic
, Ph.D. Dissertation Sharif University of Technology ; Jalili, Rasoul (Supervisor)
Abstract
Semantic technology provides an abstraction layer above existing computational environments, especially the Web, to give information a well-defined meaning. Moving toward semantic-aware environments imposes new security requirements. One of the most important requirement is the authorization and security policy inference based on the existing semantic relationships in the abstract (conceptual) layer. Most of the authorization models proposed for these environments so far are incomplete and their inference rules are not guaranteed to be consistent, sound, and complete. To have a sound and complete system for policy specification and inference, in this thesis, a family of modal logics, called...
Deterministic Compressed Sensing
, Ph.D. Dissertation Sharif University of Technology ; Marvasti, Farrokh (Supervisor)
Abstract
The emerging field of compressed sensing deals with the techniques of combining the two blocks of sampling and compression into a single unit without compromising the performance. Clearly, this is not feasible for any general signal; however, if we restrict the signal to be sparse, it becomes possible. There are two main challenges in compressed sensing, namely the sampling process and the reconstruction methods. In this thesis, we will focus only on the deterministic sampling process as opposed to the random sampling. The sampling methods discussed in the literature are mainly linear, i.e., a matrix is used as the sampling operator. Here, we first consider linear sampling methods and...
Interpretation of the Seven Errors in Bulk Material Sampling with the Aim of Providing a Guideline (Protocol) for Sampling From Liquids - Case of Edible Oil
, M.Sc. Thesis Sharif University of Technology ; Mahlooji, Hashem (Supervisor)
Abstract
Sampling is so deep-rooted in our habits that it usually takes place unconsciously. A large number of books and articles have been published in this field. The connection between sampling and quality control is the reason that many industries have focused their attention on sampling; however, only a few numbersare familiar with bulk material sampling related issues. Describing this theory along with its seven errors is the main object of this research. Using this theory, characteristics of the lot of interest was analyzed. Creating necessary conditions for assuring sampling correctness is very critical and if these conditions cannot be provided, implementing some part of the theory issues...
Synthesis and Characterization of Various Transition Metal Complexes and the Application in Oxidation, Heck, Suzuki, Sonogashira and Olefin Metathesis
, Ph.D. Dissertation Sharif University of Technology ; Bagherzadeh, Mojtaba (Supervisor)
Abstract
In nature, catalysis is of vital importance in a wide variety of biochemical processes catalyzed by metalloenzymes. The functions performed by the metalloenzymes and their significance have inspired a range of biomimetic studies, and intense efforts have been concentrated on the synthesis of low molecular weight complexes to model the spectroscopic features of such enzymes. Concomitantly, a challenging frontier in the field of biomimetic chemistry is the development of highly reactive model compounds that are able to effect rapid and selective substrate conversion. Some important catalytic transformations that have gained attention in recent years involve the carbon-carbon coupling, olefin...
Database Schema Extraction Prevention Through DBMS Error Handling
, M.Sc. Thesis Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
Nowadays large volume of sensitive data of organizations are stored in the databases. Thus, databases are attractive to the attackers to execute different types of attacks with different purposes. The useful information that attackers try to achieve in the preliminary steps of the attacks against the databases, is the database structure or schema. One of the popular approach to extract the schema of a database is to analyze the returned error messages from its DBMS. Hence, a solution to prevent schema disclosure via the error messages is customizing and modifying them. To achieve this goal, in this thesis, we propose a framework to handle and customize the error messages automatically and...
Privacy Preserving Access Control for Service Composition in Cloud Computing
, M.Sc. Thesis Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
Cloud computing is a new computing environment where computing infrastructure, platform and software are provided as a service. Rapid growth of cloud environments has increased the importance of security requirements and challenges for both service providers and users in cloud. Two main security issues in software as a service (SaaS) delivery model are access control and privacy preserving in basic web services and also in composite services obtaining through the automatic composition and inference of policies from the ones specified for basic services. In this thesis, we present a privacy preserving access control model and framework for service composition in SaaS delivery model of cloud...
Sparsity and infinite divisibility
, Article IEEE Transactions on Information Theory ; Volume 60, Issue 4 , 2014 , Pages 2346-2358 ; ISSN: 00189448 ; Unser, M ; Sharif University of Technology
2014
Abstract
We adopt an innovation-driven framework and investigate the sparse/compressible distributions obtained by linearly measuring or expanding continuous-domain stochastic models. Starting from the first principles, we show that all such distributions are necessarily infinitely divisible. This property is satisfied by many distributions used in statistical learning, such as Gaussian, Laplace, and a wide range of fat-tailed distributions, such as student's-t and α-stable laws. However, it excludes some popular distributions used in compressed sensing, such as the Bernoulli-Gaussian distribution and distributions, that decay like exp (-O(|x|p)) for 1 < p < 2. We further explore the implications of...
An Access Control System for Time Series Data in NoSQL Databases
, M.Sc. Thesis Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
An important class of applications which have been rapidly growing recently is the one that create and use time series data. These types of data sets are ordered based on the timestamps associated to their data items. In practice, traditional relational databases are unable to satisfy the requirements of these data sets; however, NoSQL databases with column-wide data structure are appropriate infrastructure for them. These databases are very efficient in read and write operations (especially for time series data, which are ordered) and are able to store unstructured data. Time series data may contain valuable and sensitive information; hence, they should be protected from the information...
Deterministic construction of binary, bipolar, and ternary compressed sensing matrices
, Article IEEE Transactions on Information Theory ; Volume 57, Issue 4 , April , 2011 , Pages 2360-2370 ; 00189448 (ISSN) ; Marvasti, F ; Sharif University of Technology
2011
Abstract
In this paper, we establish the connection between the Orthogonal Optical Codes (OOC) and binary compressed sensing matrices. We also introduce deterministic bipolar m × n RIP fulfilling ± 1 matrices of order k such that m ≤ script O sign (k(log2 n) log2 k/ln log2 k). The columns of these matrices are binary BCH code vectors where the zeros are replaced by -1. Since the RIP is established by means of coherence, the simple greedy algorithms such as Matching Pursuit are able to recover the sparse solution from the noiseless samples. Due to the cyclic property of the BCH codes, we show that the FFT algorithm can be employed in the reconstruction methods to considerably reduce the computational...
Information-flow Analysis in Android Apps for Protecting User Privacy
, M.Sc. Thesis Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
The rapid growth of Android operating system alongside its open-source nature has made it as the most popular operating system of mobile devices. On the other hand, regarding the increasing computational power of mobile devices, a wide variety of applications are coming to this type of devices. Meanwhile unfortunately many malicious softwares trying to keep up with other applications, are targeting this popular operating system. Therefore with regard to the fact that this type of devices usually store private and sensitive information of their users, security of mobile operating systems is considered very important. Having this matter in mind, the goal of this research work has been...
Novel View Synthesis Using Light Field Camera
, M.Sc. Thesis Sharif University of Technology ; Amini, Arash (Supervisor)
Abstract
In the last two decades, novel view synthesis has become increasingly important in the movie and game industries. The new generated views correspond to virtual viewpoints, where no real camera has taken snapshot. Depending on the amount of available information from the scene, different approaches have been proposed to create novel views. If the depth information is available, then by knowing camera relative motion, novel views can be constructed. The conventional cameras only record the intensity of the captured scene, and discard the depth information. In the recent concept of light field cameras, by locating an array of micro-lenses between the camera sensor and the main lens, one can...
Secure- multiparty Computation Protocol for Privacy Preserving Data Mining
, M.Sc. Thesis Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
Privacy preserving data mining helps organizations and companies not only to deal with privacy concerns of customers and regular limitations, but also to benefit from collaborative data mining. Utilizing cryptographic techniques and secure multiparty computation (SMC) are among widely employed approaches for preserving privacy in distributed data mining. The general purpose of secure multiparty computation protocols to compute specific functions on private inputs of parties in a collaborative manner and without revealing their private inputs. Providing rigorous security proof of secure multiparty computation makes it a good choice for privacy preservation, despite of its cryptographic...
Multi-level authorisation model and framework for distributed semantic-aware environments
, Article IET Information Security ; Volume 4, Issue 4 , 2010 , Pages 301-321 ; 17518709 (ISSN) ; Jalili, R ; Sharif University of Technology
2010
Abstract
Semantic technology is widely used in distributed computational environments to increase interoperability and machine readability of information through giving semantics to the underlying information and resources. Semantic-awareness, distribution and interoperability of new generation of distributed systems demand an authorisation model and framework that satisfies essential authorisation requirements of such environments. In this study, the authors propose an authorisation model and framework based on multi-security-domain architecture for distributed semantic-aware environments. The proposed framework is founded based on the MA(DL)2 logic, which enables policy specification and inference...
Phase Extraction in Segmented Flow
, M.Sc. Thesis Sharif University of Technology ; Moosavi, Ali (Supervisor)
Abstract
The formation of droplets at a T-junction in a micro channel network is primarily influenced by the pressure difference across the interface in the squeezing regime. Accurate measurements of droplet velocity and pressure profiles are difficult to obtain experimentally, yet these are the basic parameters required. Droplet micro fluidics has shown great potential for biological assays, chemical reactions and polymer emulsions. High stability allows the droplets to work as stable and isolated reactors that open up for parallel and serial reactions where each droplet can be screened individually. The purpose was to fabricate such systems, establish stable droplet generation where droplet volumes...
Alert Correlation in Cellular Mobile Nework
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
As mobile networks have been expanded, the importance of subscribers' information security has become more and more evident. Despite mitigating known vulnerabilities of older mobile networks in newer generations, there are still some security flaws that can be exploited. In particular, as a common scenario, attackers can exploit "Use 2G mobile network if 3G/4G is unavailable" setting in order to force a subscriber to downgrade his/her mobile network to 2G; hence becoming vulnerable to known 2G attacks. Mobile networks have a heterogeneous and distributed architecture which make intrusion detection systems incapable of covering the entire network. In this dissertation, alongside with the...
Application of Mathematical Programming in Graceful and a-Valuation of Quadratic Graphs
, M.Sc. Thesis Sharif University of Technology ; Eshghi, Kourosh (Supervisor)
Abstract
Graceful and α-valuation are the first labeling methods which was introduce in the late 1960. α-Vaulation of a graph is a special cases of graceful labeling. Despite of the large number of papers published on this subject, in literature, there are few particular techniques to find labeling of graphs. There are still many open problems on this subject ,some of which are well-known in graph theory. In this research, a new mathematical integer model and two constraint programming models are presented for the graph valuation problem in the case of quadratic graphs. Then, a comparision between their results are discussed. The advantages of this model is linearity, independence from graph...