Loading...
Search for:
amiri--aref
0.183 seconds
Total 829 records
Multi-facility location problems in the presence of a probabilistic line barrier: A mixed integer quadratic programming model
, Article International Journal of Production Research ; Volume 50, Issue 15 , Jul , 2012 , Pages 3988-4008 ; 00207543 (ISSN) ; Mahdavi, I ; Amiri Aref, M ; Mohammadnia Otaghsara, M ; Mahdavi Amiri, N ; Sharif University of Technology
T&F
2012
Abstract
We consider a multi-facility location problem in the presence of a line barrier with the starting point of the barrier uniformly distributed. The objective is to locate n new facilities among m existing facilities minimising the summation of the weighted expected rectilinear barrier distances of the locations of new facilities and new and existing facilities. The proposed problem is designed as a mixed-integer nonlinear programming model, conveniently transformed into a mixed-integer quadratic programming model. The computational results show that the LINGO 9.0 software package is effective in solving problems with small sizes. For large problems, we propose two meta-heuristic algorithms,...
A simple method for pulse repetition interval estimation and tracking radar pulse trains with complex pulse repetition interval modulations
, Article Advanced Science Letters ; Volume 19, Issue 8 , 2013 , Pages 2262-2265 ; 19366612 (ISSN) ; Keshavarzi, M ; Amiri, K ; Sharif University of Technology
2013
Abstract
In an electronic warfare environment, an electronic support system receives signals emitted by different radars. One of the key tasks in an electronic support system is PRI estimation tracking Pulse Trains using Pulse Repetition Interval (PRI) of these signals. In this paper we present a simple method for PRI estimation and tracking radar pulse trains with complex PRI Modulations. This method uses nonlinear least square, Pisarenko and innovative methods for PRI estimation and tracking pulse train. Simulation results show high robustness of the proposed method against noise (spurious and missing pulses)
Heuristic Hybrid Genetic and Simulated Annealing Algorithms with Neural Networks for Task Assignment in Heterogeneous Computing Systems
, M.Sc. Thesis Sharif University of Technology ; Mahdavi Amiri, Nezamoddin (Supervisor)
Abstract
In this thesis, we want to present methods that are able to solve the assignment tasks problem in a heterogeneous computing system. These methods are two hybrid methods that are constructed by composing Hopefield Neural Networks with Genetic Algorithms and the Simulated Annealing. First, we solve the relaxed problem by applying Genetic Algorithms and the Simulated Annealing and we compare the results of these ways with other traditional methods. Then, we solve the constrained problem with mentioned hybrid methods. The definition of the problem is as following: Consider a distributed computing system which is comprised of set of processors with different speeds but the same structure. We want...
Diagrammatic approach for constructing multiresolution of primal subdivisions
, Article Computer Aided Geometric Design ; Volume 51 , 2017 , Pages 4-29 ; 01678396 (ISSN) ; Mahdavi Amiri, A ; Samavati, F ; Mahdavi Amiri, N ; Sharif University of Technology
Elsevier B.V
2017
Abstract
It is possible to define multiresolution by reversing the process of subdivision. One approach to reverse a subdivision scheme appropriates pure numerical algebraic relations for subdivision using the interaction of diagrams (Bartels and Samavati, 2011; Samavati and Bartels, 2006). However, certain assumptions carried through the available work, two of which we wish to challenge: (1) the construction of multiresolutions for irregular meshes are reconsidered in the presence of any extraordinary vertex rather than being prepared beforehand as simple available relations and (2) the connectivity graph of the coarse mesh would have to be a subgraph of the connectivity graph of the fine mesh. 3...
New Achievable Rates In Frequency Hopped Spread Spectrum Systems
, M.Sc. Thesis Sharif University of Technology ; Marvasti, Farrokh (Supervisor)
Abstract
In this dissertation, we investigate the frequency hopped spread spectrum systems which are extensively used in many communication systems. We derive the capacity region of Synchronous Frequency Hopped Multiple Access (FHMA) channels (for any kind of noisy or nonselective fading environment) by using the side information which exists in the multi‐user detection. We assume that random hopping patterns are used by all the transmitters, and the common receiver knows the hopping patterns. We also compute the capacities of FHMA with and without power control for AWGN and noiseless MFSK (in particular BFSK) modulated systems and compare the ...
Quantum computers
, Article IEEE Potentials ; Volume 21, Issue 5 , 2002 , Pages 6-9 ; 02786648 (ISSN) ; Sharif University of Technology
2002
A Secure and Efficient Digital Signature Based on Polar Codes
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor)
Abstract
Regarding to the emergence of quantum computers and advances in the large scale implementation of them, exploiting hard problems of coding theory is of great importance.This family of problems, like those of lattices, has an acceptable resistance against classic and quantum attacks. Thus, they can be replaced with hard problems in number theory and algebra. Increasing dominance of cyberspace made us highly dependent to it. Consequently, preparing tools and methods to mitigate future threats is necessary. Digital signatures constitute an important family of cryptographic primitives. Code-based digital signatures are mostly suffering from two main drawbacks: large public key and long time of...
A misbehavior‐tolerant multipath routing protocol for wireless Ad hoc networks [electronic resource]
, Article International Journal of Research in Wireless Systems (IJRWS) ; Vol. 2, Issue 9, pp. , Sep. 2013 ; Pakravan, Mohammad Reza ; Aref, Mohammad Reza ; Sharif University of Technology
Abstract
Secure routing is a major key to service maintenance in ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. As a result of the resource limitations in such networks nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a novel data redirection method to mitigate the impact of node misbehavior on network...
Intra-Operative Registration of Non-Rigid Tissue for Image-Guided Surgery
, M.Sc. Thesis Sharif University of Technology ; Kasaei, Shohreh (Supervisor)
Abstract
Image Registration is a fundamental task in numerous applications in medical image processing and is defined as the process of determining the correspondence of between images collected at different times or using different imaging modalities. This correspondence can be used for aligning images so that the pair can be directly compared, combined or analyzed. Image-guided surgery systems use registration for establishing an accurate relation between preoperative and intraoperative image space. There have been several methods for rigid registration which are not easily applicable for soft tissues. Indeed, nonrigid deformation of soft tissues will endanger the accuracy of rigid methods, so it...
Simulating Firefighting Scenarios in Enclosures
, M.Sc. Thesis Sharif University of Technology ; Farhanieh, Bijan (Supervisor)
Abstract
Fire in enclosures is one of the most important disasters due to the presence of human and physical risks, so, investigation of the firefighting scenarios in this case has much importance. In the present study, novel enclosures fire suppression scenarios are simulated using computational fluid dynamics (CFD). The simulations have two major categories. In the first part, performance of different natural ventilation, positive pressure ventilation (PPV) and negative pressure ventilation (NPV) scenarios, which are new methods in firefighting, are evaluated and compared. In this part, the influence of different parameters like geometry, position of inlet and outlets and fire heat release rate...
Quantum Renormalization Group of alternating Ising Model with Dzyaloshinski - Moriya Interaction: Phase Diagram and Quantum Information Properties
, M.Sc. Thesis Sharif University of Technology ; Langari, Abdollah (Supervisor)
Abstract
In this thesis, we have implemented the quantum renormalization group method to study quantum spin systems. We reviewed the recent progress to calculate the quantum information properties of these models. The recent investigations show that concurrence and entanglement are two quantities which can show quantum critical properties of the quantum systems. More specifically, the derivative of entanglement and the second derivative of ground state energy show divergent behavior at the quantum critical point. Moreover, the ground state fidelity for two different parameters close to quantum critical point shows a drop which leads to a divergent behavior in its corresponding susceptibility. We have...
An Investigation on Zirconia Nano-particles Coating Deposited on Magnesium AZ91 alloy Using Electrodeposition Method
, M.Sc. Thesis Sharif University of Technology ; Afshar, Abdollah (Supervisor)
Abstract
Recently magnesium alloys have shown great potential as biodegradable metallic implants. However, due to high corrosion rate in the body environment, these alloys would be degraded before the tissue healing time period. Therefore corrosion resistance of these alloys has to be improved in order to be used in biological environments. In the present work, supposing improvement of corrosion properties of magnesium AZ91D alloy, the alloy has been coated with biocompatible nano-Zirconia particles using Electrophoretic deposition method and the effects of deposition parameters such as bath agitation, Zirconia concentration, current density and duration of deposition process on the properties of the...
Optimal Strategies for Price and Warranty over the Product Life Cycle
, M.Sc. Thesis Sharif University of Technology ; Haji, Alireza (Supervisor)
Abstract
Price and warranty are two powerful marketing tool that can stimulate consumers’ purchase willingness. Therefore, producers must choose the appropriate price and warranty that can stimulate customers to purchase the quantity that will achieve the maximum profit. This study investigates optimal strategies for price and warranty length of a new product to maximize profit of a producer during lifecycle of the product. We consider both durable products and non-durable ones. Customers buy non-durable products many times but if we consider the planning horizon relatively short, each customer buys one product during the period. So, the market for non-durable products is static and for durable ones...
Quantum critical phase diagram of bond alternating Ising model with Dzyaloshinskii-Moriya interaction: Signature of ground state fidelity
, Article Physica Status Solidi (B) Basic Research ; Volume 250, Issue 3 , 2013 , Pages 537-541 ; 03701972 (ISSN) ; Langari, A ; Sharif University of Technology
2013
Abstract
We present the zero temperature phase diagram of the bond alternating Ising chain in the presence of Dzyaloshinskii-Moriya interaction. An abrupt change in ground state fidelity is a signature of quantum phase transition. We obtain the renormalization of fidelity in terms of quantum renormalization group without the need to know the ground state. We calculate the fidelity susceptibility and its scaling behavior close to quantum critical point (QCP) to find the critical exponent which governs the divergence of correlation length. The model consists of a long range antiferromagnetic order with nonzero staggered magnetization which is separated from a helical ordered phase at QCP. Our results...
An algorithm for modeling print and scan operations used for watermarking
, Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10 November 2008 through 12 November 2008 ; Volume 5450 LNCS , 2009 , Pages 254-265 ; 03029743 (ISSN) ; 3642044379 (ISBN); 9783642044373 (ISBN) ; Jamzad, M ; Sharif University of Technology
2009
Abstract
Watermarking is a suitable approach for digital image authentication. Robustness regarding attacks that aim to remove the watermark is one of the most important challenges in watermarking, in general. Several different attacks are reported that aim to make it difficult or impossible for the real owner of the digital watermarked image to extract the watermark. Some of such common attacks are noise addition, compression, scaling, rotation, clipping, cropping, etc. In this paper we address the issue of print and scan attack by introducing a method to model the scanner and printer. Then we will simulate the print and scan attack on the digital images to evaluate its robustness. In addition, we...
A robust image watermarking method in wavelet domain using genetic algorithm
, Article Proceedings - International Conference on Availability, Reliability and Security, ARES 2009, 16 March 2009 through 19 March 2009, Fukuoka, Fukuoka Prefecture ; 2009 , Pages 612-617 ; 9780769535647 (ISBN) ; Jamzad, M ; Sharif University of Technology
2009
Abstract
Robustness against attacks is an important requirement in image watermarking. This paper presents a robust watermarking algorithm in wavelet transform domain. Firstly, original image is decomposed into its subbands using three level wavelet transform, then, significant coefficients with the same position in HL, LH and HH subbands of the last level are extracted to make a triplet. To embed a watermark bit into a triplet, the standard deviation of triplet coefficients magnitude is set to zero for zero bit or increased for a one bit. Three constant are used to increase the standard deviations of a triplet coefficients. The value of these constants affects the robustness of algorithm and the...
An efficient weighted least squares estimator for elliptic localization in distributed mimo radars
, Article IEEE Signal Processing Letters ; Volume 24, Issue 6 , 2017 , Pages 902-906 ; 10709908 (ISSN) ; Behnia, F ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2017
Abstract
Elliptic localization is an active range-based positioning technique that employs multiple transmitter-receiver pairs, each of which is able to provide separate bistatic range (BR) measurement. In this letter, an algebraic closed-form method for locating a single target from BR measurements using a distributed multiple-input multiple-output (MIMO) radar system is proposed. First, a set of linear equations is established by eliminating the nuisance parameters, and then, a weighted least squares estimator is employed to obtain the target position estimate. To refine the localization performance, the error in the initial solution is estimated in the sequence. The proposed method is shown...
Study of Rocking of Shallow Foundations Subjected to Dynamic Loading by Consideration of Soil-Structure Interaction
, M.Sc. Thesis Sharif University of Technology ; Haeri, Mohsen (Supervisor)
Abstract
Foundation which is lowest load-bearing part of structure, transfers load of superstructure to substructure. Because structures are usually placed on soils, the response of the soils influences the motion of the structures and the motion of structures affects the response of the soils. This phenomenon is termed Soil Structure Interaction (SSI). One of these mutual effects is the rocking of shallow foundations in which the base of the foundation under dynamic loading may separate from the underlying ground, by rotating about the longitudinal axis. This rotational mode elongates natural period of the soil-structure system and decreases the base shear demands of the superstructure. Indeed...
Learning-based Control System Design for the Bipedal Running Robot and Development of a Two-layer Framework for Generating the Optimal Paths in Various Movement Maneuvers
, M.Sc. Thesis Sharif University of Technology ; Salarieh, Hassan (Supervisor)
Abstract
Foot movement is one of the most powerful and adaptable methods of movement in nature. Inspired by humans, the most intelligent creatures on earth, bipedal robots have many uses. In this research, a control method for running a bipedal robot has been designed. In the simulation part of the five-link model, the robot's motion equations for running and walking at different levels are extracted by the Lagrange method. In path generation, using the two-layer optimization method and holonomic and dynamic constraints, optimal paths are produced which are kinematically and dynamically possible (feasible). Additionally, path generation is facilitated by an invariant impact constraint to ensure the...
Application of Reinforcement Learning in Railway Track Maintenance Management and Renewal
, M.Sc. Thesis Sharif University of Technology ; Shafahi, Yusof (Supervisor)
Abstract
The significance of the rail transportation system in the economic, political, and social realms of countries, along with the high costs of managing and maintaining its infrastructure, are among the most significant reasons for the importance of a railway track maintenance management system. Such a system is crucial to maintaining service levels, ensuring reliability and safety of the tracks to an acceptable level, and minimizing maintenance costs. This research focuses is on identifying the optimal maintenance policy for Iranian railway tracks, considering the budget constraints in the maintenance planning. For this purpose, the output of the EM120 machine, which was obtained from the...