Loading...
Search for:
arabali--taraneh
0.111 seconds
Investment Maximization Transmission Expansion Planning
, M.Sc. Thesis Sharif University of Technology ; Hosseini, Hamid (Supervisor)
Abstract
Trasmission system is one of the most important parts of the power system which not only creates an interface between generation and distribution section, but also provides a reliable and non-descriminated environment between them. In recent years, restructuring is introduced in many countries of the world. The competition is begun in generation section while, the transmission section was remained monopoly. Private investors don't have enough incentive to invest in this section, because, the presence of uncertainties have made decision making hard for them and increased the investment risk. On the other hand, with increase in consumption and generation, need to invest in this section seems...
Aza Michael Addition of Amines to α,β-Unsaturated Compounds and Alkene Epoxidation
, M.Sc. Thesis Sharif University of Technology ; Mahmoudi Hashemi, Mohammad (Supervisor)
Abstract
This thesis contains two parts .In the first part a catalyst such as AlCl3/Al20 has been demonstrated to catalyze Michael addition reaction of amines to a,�- unsaturated compounds with high yields , short reaction time and under solvent-free condition.The Michael addition to a,�- unsaturated compounds produces quantitively the mono addition products.The next part is about olefins epoxidation . Alkene epoxidation is a useful reaction in organic synthesis. Epoxides play an important role in industrial intermediates for the production of fine chemicals as well as pharmaceuticals .The hydrogen peroxide has been used as an oxidant because it is considered as an economical and appropriate reagent...
Secret Sharing Schemes for General Access Structures
, M.Sc. Thesis Sharif University of Technology ; Eghlidos, Taraneh (Supervisor)
Abstract
Secret sharing scheme is a method for distributing the secret (secret information) among a set of participants in such a way that only the authorized sets can recover the secret and the unauthorized sets could not. In a perfect secret sharing scheme, unauthorized sets cannot get any additional (i.e. a posteriori) information about the possible value of the secret. In these schemes, to prevent information leakage and increase communication efficiency, the size of the share should be as close to the secret size as possible. In other words, finding the shares with reasonable size which results in an optimal information rate for a given access structure, improves the efficiency of the scheme....
Distance Bounding Authentication Protocols in RFID Systems
, M.Sc. Thesis Sharif University of Technology ; Eghlidos, Taraneh (Supervisor)
Abstract
Ever-encreasing progress in the field of wireless communication has paved the way for utilisation based on radio frequency authentication systems. In recent years, ITU started the scenario of "Internet of Things". RFID systems have an exclusive role in development ofthis idea, since they can make it possible for things which have an ID to be identified automatically in a large scale. The necessity of identification and tracing people and things has caused the deployment of RFID technology. Onthe other hand, these systems communicate via a wireless channel to transmit data, therefore they are vulnerable to eavesdropping and interception. Thus, one of the most important issues in using such...
Design and Analysis of Joint Encoding-Encryption Schemes Based on Polar Codes
, M.Sc. Thesis Sharif University of Technology ; Eghlidos, Taraneh (Supervisor)
Abstract
Wide use of communication systems and transmission of huge data has increased the need for cryptographic and encoding systems with high speed operations and lower energy consumptions. Code based and joint encryption encoding schemes are examples of such systems, which enjoy simultaneously high performance and security against quantum computers. So far, there has not been developed any quantum algorithm which can solve any of the hard instances of coding theory based on which these cryptographic schemes have been designed. That is why such systems are called post quantum cryptosystems. The main disadvantage of such cryptosystems is large size the key which is to be stored or shared. In this...
A Lattice based Threshold Multi-Secret Sharing Scheme and its Application to Threshold Cryptography
, Ph.D. Dissertation Sharif University of Technology ; Eghlidos, Taraneh (Supervisor)
Abstract
Secret sharing schemes are used for storage and management of sensitive data such as cryptographic keys and bank account numbers. These schemes provide both confidentiality and reliability. Advances in quantum computers have threatened the security of currently used public-key cryptographic algorithms. In this thesis, for designing quantum resistant cryptographic schemes, we construct a lattice based threshold multi-stage secret sharing (TMSSS) scheme. Using a lattice based one-way function, even after some secrets are revealed, the computational security of the unrecovered secrets is provided against quantum computers. The scheme is multi-use and verifiable meaning that the participants can...
Quantum Cryptanalysis of SPN Block ciphers
, M.Sc. Thesis Sharif University of Technology ; Eghlidos, Taraneh (Supervisor)
Abstract
Quantum computers can be used to process complex computations much more efficient than their classical counterparts. Cryptanalysis of classical ciphers is no exception to this rule. Most quantum cryptanalysis of symmetric ciphers is based on finding the periodicity, linear structure, and confidential information of the target algorithm. In this thesis, assuming that the attacker has access to the quantum computer, we propose a quantum method for deriving the appropriate differential characteristic of block ciphers, using Simon's quantum algorithm. It is worth noting that, unlike classical methods, where increasing the number of rounds of the target block cipher increases the complexity of...
Designing a Succinct Argument System Based on GKR Protocol Via Polynomial Commitment Schemes
, M.Sc. Thesis Sharif University of Technology ; Eghlidos, Taraneh (Supervisor)
Abstract
With the dramatic advancements in information technology and the industry requirements for security and privacy, proof systems play a crucial role in cryptography. Among the vast variety of proof systems, succinct non-interactive arguments (SNARG) seem to be the most appealing class of proof systems, due to their attractive properties. SNARGs are usually made up of two constructive components, namely the information theoretic part and the cryptographic part. The GKR protocol was introduced as a proof system for a tractable family of languages called “log-Space Uniform Circuits”. The log-space uniformity is a necessary condition for the protocol to be succinct. Hence, it is not possible to...
Cryptanalysis of a Class of McEliece-like Code-Based Signature Schemes
, M.Sc. Thesis Sharif University of Technology ; Eghlidos, Taraneh (Supervisor)
Abstract
With the advent of quantum computers, the security of cryptographic primitives, including digital signature schemes, has been compromised. Therefore, a kind of signature scheme has been introduced to resist these computers. These schemes are based on hard problems that have so far resisted against quantum computers, known as post-quantum schemes. One group of these schemes is based on the hard problems of coding theory, which are called code-based cryptographic schemes. The first code-based cryptosystem was the McEliece encryption scheme. A number of code-based signature schemes are based on the McEliece encryption scheme. Some of these schemes use three matrices including a non-singular...
Designing a Succinct Argument System Based on GKR Protocol Via Polynomial Commitment Schemes
, M.Sc. Thesis Sharif University of Technology ; Eghlidos, Taraneh (Supervisor)
Abstract
With the dramatic advancements in information technology and the industry requirements for security and privacy, proof systems play a crucial role in cryptography. Among the vast variety of proof systems, succinct non-interactive arguments (SNARG) seem to be the most appealing class of proof systems, due to their attractive properties. SNARGs are usually made up of two constructive components, namely the information theoretic part and the cryptographic part. The GKR protocol was introduced as a proof system for a tractable family of languages called “log-Space Uniform Circuits”. The log-space uniformity is a necessary condition for the protocol to be succinct. Hence, it is not possible to...
Pricing of transmission services: An efficient analysis based on fixed and variable imposed costs
, Article 2012 11th International Conference on Environment and Electrical Engineering, EEEIC 2012 - Conference Proceedings, 18 May 2012 through 25 May 2012, Venice ; 2012 , Pages 407-412 ; 9781457718281 (ISBN) ; Hosseini, S. H ; Moeini-Aghtaie, M ; Sharif University of Technology
IEEE
2012
Abstract
Open access to transmission networks as well as designing an efficient cost allocation method are the key points that provide free competition for participants in power market. Restructuring in power systems has created new challenges which emphasize the development and fairness of economical criteria such as pricing of different services in market environment. Besides, the charge of network usage is a controversial subject, itself. To address this problem, many methods for transmission line cost allocation have been proposed. Amongst them, MW-Mile methods are based on the extent of use concept. Inability to take various fixed together with variable imposed costs into account can be...
A framework for compromising between power generation cost and power system security in regulated market using MO-OPF
, Article EPEC 2010 - IEEE Electrical Power and Energy Conference: "Sustainable Energy for an Intelligent Grid", 25 August 2010 through 27 August 2010 ; 2010 ; 9781424481880 (ISBN) ; Sotoodeh, P ; Khosravi, H ; Pishvaie, M ; Sharif University of Technology
2010
Abstract
Transmission line congestion in electricity market is lead to increase the energy cost and change in local marginal prices. So, it is probable that the market power is manifested. Market power may prevent the full competition in Electricity Market. Moreover, in this condition, with operating of power system in its boundary conditions, the system may be damaged and the security of the system may be disturbed. On the other hand, decreasing the line flows from their optimal value, cost and consequently, price of energy are increased. So, there is need to have a compromise between the line flow decrease and the cost those impose. In this paper, a framework for compromising between social cost...
Probabilistic multi-objective transmission investment and expansion planning
, Article International Transactions on Electrical Energy Systems ; Volume 25, Issue 9 , September , 2015 , Pages 1884-1904 ; 20507038 (ISSN) ; Hosseini, S. H ; Moeini Aghtaie, M ; Sharif University of Technology
John Wiley and Sons Ltd
2015
Abstract
In market-based planning studies, the financial aspects of transmission grids have been posed as a major challenge since these are important keys to provide a non-discriminative and competitive environment for energy market participants. In this respect, this paper proposes a probabilistic multi-objective transmission expansion planning algorithm considering private investors' preferences, technical concerns, and random nature of power system uncertainties. The combination of Non-Dominated Sorting Genetic Algorithm II, as a widely-used robust multi-objective optimization technique, and point estimation method is employed to handle non-commensurable probabilistic objective functions. The IEEE...
Private Investor-based Transmission Expansion Planning in Deregulated Environments
, Article Electric Power Components and Systems ; Volume 43, Issue 6 , 2015 , Pages 620-632 ; 15325008 (ISSN) ; Hosseini, S. H ; Moeini Aghtaie, M ; Sharif University of Technology
Taylor and Francis Inc
2015
Abstract
Deregulation in power systems creates new uncertainties and escalates the previous ones. The presence of these uncertainties causes the transmission network to remain a monopoly and the private investors not to be interested in investing in new transmission lines. This article presents a new merchant-based transmission network expansion planning algorithm from the viewpoint of private investors. The point estimation method is used to handle the uncertainties, and the genetic algorithm is used as the optimization tool. The proposed method provides insights for private investors to deal with the uncertainties and to find appropriate transmission projects in which to invest. Copyright
Heuristic Cryptanalysis of Stream Ciphers Based on Connection Equations
, M.Sc. Thesis Sharif University of Technology ; Eghlidos, Taraneh (Supervisor)
Abstract
Stream ciphers are one of the cryptography primitives which have high speed in encryption process and less amount of hardware which they used. Guess and determine attacks are general attacks on stream ciphers which have often been implemented in ad hoc manner. Finding the minimal basis for internal state of a cryptosystem based on connection equations is the main challenge in stream ciphers. In recent years, some efforts for applying this attack in the systematic manner are started. First work in this area is the Simple Guess and Determine attack. The dvanced and Heuristic Guess and Determine attacks then presented, which all of them have heuristic structure. In this thesis, after reviewing...
Designing Post-Quantum Functional Encryption Scheme based on Rank-Metric Codes
, Ph.D. Dissertation Sharif University of Technology ; Eghlidos, Taraneh (Supervisor)
Abstract
Functional Encryption (FE) is an encryption scheme used in cloud computing to enhance data security. When data owners outsource encrypted data to the cloud, they may need to perform computations on the data without decrypting it, as the cloud server is not fully trusted. Functional encryption addresses this challenge by allowing authorized users to compute specific functions on the encrypted data. In FE, the data owner holds a private key associated with a particular function. Using this key, an authorized user can only access the result of the function applied to the original data, without revealing any additional information about the underlying data. In functional encryption, significant...
The impact of dispersed PV generation on ramp rate requirements
, Article 2012 11th International Conference on Environment and Electrical Engineering, EEEIC 2012 - Conference Proceedings, 18 May 2012 through 25 May 2012, Venice ; 2012 , Pages 977-982 ; 9781457718281 (ISBN) ; Dehghanian, P ; Moeini-Aghtaie, M ; Abbaspour, A ; Sharif University of Technology
IEEE
2012
Abstract
PV generation variability and uncertainty significantly influence operation of the power systems with high penetration of PV sources. The potential impact of distributed PV generation on ramp rate requirements in the IEEE 24-bus system is evaluated in this paper. PV generation and load are, here, probabilistically modeled using actual data and curve fitting approach. Probabilistic unit commitment (UC) based on unit de-commitment method combined with two point estimate method (2-PEM) is used to determine the ramp rate required to compensate for the PV power fluctuations. The proposed method considers stochastic factors and their effects on the dispatch results. Two scenarios are studied to...
Optimal siting of DG units in power systems from a probabilistic multi-objective optimization perspective
, Article International Journal of Electrical Power and Energy Systems ; Volume 51 , 2013 , Pages 14-26 ; 01420615 (ISSN) ; Hosseini, S. H ; Moeini Aghtaie, M ; Arabali, A ; Sharif University of Technology
2013
Abstract
Along with the increasing demand for electrical power, distributed generations (DGs) have so far found their pivotal roles in the restructured environment of power distribution systems. As an indispensable step toward a more reliable power system, the DGs optimal allocation strategy, deemed to be the most techno-economically efficient scheme, comes to the play and is profoundly taken under concentration in this study. This paper devises a comprehensive multi-objective (MO) optimization approach by which all the crucial and maybe contradictory aspects of great influence in the placement process can be accounted for. Total imposed costs, total network losses, customer outage costs as well as...
A Lightweight Lattice-Based Searchable Encryption Scheme
, M.Sc. Thesis Sharif University of Technology ; Eghlidos, Taraneh (Supervisor)
Abstract
Many lattice-based public key encryption schemes are forced to use long keys. To deal with this problem, structured lattices such as NTRU can be used. Lattice-based searchable public key encryption schemes are no exception. Furthermore, in most existing searchable public key encryption schemes, it is assumed that the user searches documents with only one keyword. However, using a conjunctive keyword search, we can search for documents containing several keywords by executing the trapdoor generation algorithm only once. On the other hand, in most of the published searchable public key encryption schemes, storing and searching encrypted keywords are responsibility of a central entity called...
Optimum sizing and siting of renewable-energy-based dg units in distribution systems
, Article Optimization in Renewable Energy Systems: Recent Perspectives ; 2017 , Pages 233-277 ; 9780081012093 (ISBN); 9780081010419 (ISBN) ; Ghofrani, M ; Bassett, J. B ; Pham, M ; Moeini Aghtaei, M ; Sharif University of Technology
Elsevier Inc
2017
Abstract
The increasing demand for clean and nonfossil energy has escalated the integration of renewable power sources into the distribution system. Renewable distributed generators (DGs) have the potential to reduce the environmental impact when the integration into the distribution system is carefully optimized. However, serious technical issues will be raised when the integration is not properly implemented. This chapter presents optimal siting and sizing of renewable DG units within distribution systems. Both deterministic and probabilistic models of renewable-based DG units will be discussed in details along with characteristics of well-known renewable generators. The effects of DGs on...