Loading...
Search for: ashtiani--mohammad-reza
0.218 seconds

    Design and Simulation of Manufacturing of Hip Prosthesis

    , M.Sc. Thesis Sharif University of Technology Ashtiani Araghi, Abbas (Author) ; Movahedi, Mohammad Reza (Supervisor)
    Abstract
    Nowadays, with a constant increase in life expectancy, joints pain and deficiencies have become a major problem and the use of prosthesis is increasing. One of the most important joint in human body is the hip joint which bear a major share of forces in daily activities. Hip joint is a cup-sphere joint with 3 degrees of freedom (DOF). Therefore, design and manufacturing of such prosthesis is very important. The objective of this thesis is to develop the know how for manufacturing of a standard hip prosthesis by hot forging of Ti6Al4V alloy. First a review of kinematics of bones and joints and forces on hip joint is presented, then the proper process for manufacturing of the hip prosthesis... 

    Analysis of Side Information in Series Relay Network

    , M.Sc. Thesis Sharif University of Technology Iraji, Mohammad Bagher (Author) ; Aref, Mohammad Reza (Supervisor) ; Ashtiani, Farid (Supervisor)
    Abstract
    In this dissertation we discuss various results presented in the literature on single user channels with causal or noncausal side information and multiuser channels with side information such as multiple access channel and broadcast channel. The Series Relay Networks (SRN) with delays, with and without channel state information (CSI) are investigated from an information theoretic point of view. For SRN with unlimited look ahead where the relays can use the whole received block to encode, upper and lower bounds on the capacity are derived which are tight for the degraded case. For SRN without-delay where the relays have access to the present received symbols in addition to the past symbols,... 

    Security in Network Coding from an Information Theoretic Point of View

    , M.Sc. Thesis Sharif University of Technology Haghi, Ali (Author) ; Aref, Mohammad Reza (Supervisor) ; Ashtiani, Farid (Supervisor)
    Abstract
    Network coding generalizes conventional routing algorithms. It considers data streams as mathematical entities which can be processed in the nodes of networks. In this work, after a concise introduction to network coding, we focus on security issues in network coding form an information theoretic point of view. First we introduce fundamental concepts of network coding such as linear network coding and random network coding. Then, we accentuate the advantages and disadvantages of network coding. To investigate security in network coding, we introduce perfect security and weak security as two different levels of security against wire tapper. Then we scrutinize the prerequisite for reaching... 

    A misbehavior‐tolerant multipath routing protocol for wireless Ad hoc networks [electronic resource]

    , Article International Journal of Research in Wireless Systems (IJRWS) ; Vol. 2, Issue 9, pp. , Sep. 2013 Sedghi, H. (Haniyeh) ; Pakravan, Mohammad Reza ; Aref, Mohammad Reza ; Sharif University of Technology
    Abstract
    Secure routing is a major key to service maintenance in ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. As a result of the resource limitations in such networks nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a novel data redirection method to mitigate the impact of node misbehavior on network... 

    Crack Detection in a Rotor using Traditional Mode Shape Based Modal Analysis Methods and Experimental Evaluation

    , M.Sc. Thesis Sharif University of Technology Ashtiani, Mohammad Reza (Author) ; Mohammad Navazi, Hossein (Supervisor)
    Abstract
    Fatigue crack growth can have harmful effects on the reliability rotary machine. While an early warning to crack, can be used to extend the life of these expensive machines and increase reliability.Structural Vibration Condition Monitoring as a primary fault detection method, achieved to a lot amazing result and for this reason studies vibration behavior of cracked rotational shaft is a big issue for engineers of dynamic machine.In this research, first check the fault detection methods based on structural vibration condition monitoring, mode shape methods were extracted. Then by modeling rotational shaft in computer and creation of crack on it, fault detection quality of these methods have... 

    Throughput Analysis of Secondary Users Cooperating with Primary Users in Wireless Networks

    , M.Sc. Thesis Sharif University of Technology Nazari, Mohammad Ali (Author) ; Ashtiani, Farid (Supervisor)
    Abstract
    Cooperative coexistence of two kinds of users with different priorities in random access wireless networks has been studied in this thesis. Source burstiness, a phenomenon in data communication networks, allows using silence periods of primary users (PUs) to have a better spectrum utilization. In this respect, new users, known as secondary users (SUs), are considered to exploit the resources opportunistically. In usual spectrum sharing systems, SUs have to act in a way to be transparent for the PUs. Therefore, they are allowed to access the common spectrum band only when PUs are silent. However, seeking such opportunities needs sensing capability of secondary nodes.In this thesis, sensing... 

    News-based Stock Forecasting Using Text Mining Methods

    , M.Sc. Thesis Sharif University of Technology Ashtiani, Mohammad Hossein (Author) ; Rafiee, Majid (Supervisor)
    Abstract
    Predicting the trend of stock prices is always one of the concerns that stock market analysts and investors face with, which plays a critical role in maximizing the profit from investing in stocks. Past stock price charts, raw material prices, the value of the company's assets, the impact of global markets, the company's products, the organization's development plans, and the same other factors influencing the stock price. News reports are an important source of information for people. Recently, a lot of research has been done to examine the impact of news on stock price trends. This research has two research phases. In the first phase, a text mining method is presented which is using... 

    Modeling and Analysis of Network Coding in Wireless Communication Networks

    , Ph.D. Dissertation Sharif University of Technology Amerimehr, Mohammad Hossein (Author) ; Ashtiani, Farid (Supervisor)
    Abstract
    Network coding, as a promising method for data exchange in wireless communication network, is investigated by many researchers. However, the random nature of packet generation and transmission as well as the collision among transmitted packets have not been fully addressed in network codingrelated literature. In this dissertation, we analyze the network coding-based wireless network from this point of view. In order to achieve this goal, we apply mathematical tools such as probability theory and queuing theory. In the first part of this dissertation, we address the interaction between MAC and network coding. In this respect, we consider a multihop tandem wireless network, where each node is... 

    Analysis and Improvement of Intrusion Detection Methods in Data Network Routers

    , M.Sc. Thesis Sharif University of Technology Jamshidi, Mohammad Ali (Author) ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
    Abstract
    High-quality online services demand reliable and fast packet delivery at the network layer. However, clear evidence documents the existence of compromised routers in the ISP and enterprise networks, threatening network availability and reliability. A compromised router can stealthily drop, modify, inject, or delay packets in the forwarding path to launch Denial-of-Service, surveillance, man-in-the-middle attacks, etc. So researches tried to create intrusion detection methods to identify adversarial routers and switches. To this end, data-plane fault localization (FL) aims to identify faulty links and is an effective means of achieving high network availability. FL protocols use... 

    Correction of Time-Dependent Origin-Destination Demand in Dynamic Traffic Assignment

    , M.Sc. Thesis Sharif University of Technology Shafiei, Mohammad Sajjad (Author) ; Zakaei Ashtiani, Hedayat (Supervisor)
    Abstract
    Time-dependent origin-destination demand is a key input in dynamic traffic assignment in advanced traffic management systems, and the result of dynamic traffic assignment is dependent on the accuracy of this information. One method to achieve time dependent demand matrices is using a primary demand matrix and volume traffic counts in some links of network. In this thesis a bi-level model is used to correct the demand matrix and the extended gradient method is suggested to solve the problem. The extended gradient is an iterative method that in each iteration, corrects the demand matrix in a way that the estimated traffic flow be close to the observed traffic flow. Execution of this method in... 

    Solving Network Toll Pricing Problem with Minimum Tollbooth

    , M.Sc. Thesis Sharif University of Technology Fotovati, Mohammad Hadi (Author) ; Zokaie Ashtiani, Hedayat (Supervisor)
    Abstract
    Pricing problem in transportation networks focuses on determining tolls that cause travellers, motivated only by their travel costs, to choose routes that would collectively benefit all travellers and results in optimal utilization of transport network resources.This thesis addresses the toll pricing problem in which the objective is to minimize the number of required toll facilities in a transportation network. Minimum tollbooth problem (MINTB) has binary variables and is very difficult to solve. In this thesis a new heuristic approach has been presented for solving MINTB problem. The results show that, this approach is much faster than the existing algorithms and is able to solve real size... 

    Uncertainty Analysis and Inverse Modeling of Seawater Intrusion in Coastal Aquifers

    , Ph.D. Dissertation Sharif University of Technology Rajabi, Mohammad Mahdi (Author) ; Ataei Ashtiani, Behzad (Supervisor)
    Abstract
    Groundwater is the primary source of freshwater in many coastal areas and small islands around the world. The most important hazard to groundwater quality in coastal aquifers is seawater intrusion (SWI) resulting from over pumping, prolonged drought conditions and sea level rise due to climate change impacts. Numerical models of SWI are an important tool in the management of coastal aquifers. However, numerical modeling of SWI is one of the most challenging problems in groundwater hydrology. One of the reasons for the challenging nature of SWI numerical modeling is the relatively large level of uncertainty associated with the estimation of the model input parameters. This study focused on... 

    Three Dimensional Numerical Simulation of Fresh Water Lens in Small Islands (Case Study: Kish Island)

    , M.Sc. Thesis Sharif University of Technology Rajabi, Mohammad Mehdi (Author) ; Ataei Ashtiani, Behzad (Supervisor)
    Abstract
    Sensitive ecosystem and scarcity of freshwater are the main characteristics of small islands. These islands have small catchments and usually lack tangible surface water resources. As a result these islands are dependent almost entirely on groundwater. Groundwater on small islands usually occurs in the form of a freshwater lens floating on the more dense saline water. The freshwater lens is highly sensitive to various stresses such as drought, pumping, sea tide, etc. Due to the importance of freshwater lens in islands, proper and optimal use of this vital resource should be studied. Kish island`s freshwater lens was three dimensionally simulated using the numerical model SUTRA. The aim was... 

    A Solution Approach for Routing of Carriers of Hazardous Materials Problem Based on Risk and Time

    , M.Sc. Thesis Sharif University of Technology Kazemi Ashtiani, Mohammad Reza (Author) ; Kianfar, Farhad (Supervisor)
    Abstract
    Due to the importance of hazardous materials (hazmat) transportation, this problem should be programmed and solved appropriately. Hazardous materials are substances that may endanger the health of humans, animals and the environment. One of the most important parameters in hazmat transportation problem is risk, since other routing researches don’t involve risk as an influencing parameter. In the scientific literature of the transport of hazardous materials, the risk is defined by the calculation of the probability and severity of damage to the endangered recipient through unwanted warnings from hazardous substances. In the model of this research, the accident rate is considered as the... 

    Topological Defects in Confined Nematics by Planar Anchoring

    , M.Sc. Thesis Sharif University of Technology Seyed Nejad, Reza (Author) ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Supervisor)
    Abstract
    Confining nematic liquid crystal between two curved boundary conditions while the nematic molecules have a degenerate planar anchoring leads to complex and beautiful textures of molecular disparagement(defect) in the bulk and on the surfaces. Such the liquid crystal shells are made with double-emulsion techniques in microfluidic devices have provided applications for micro-scale colloidal linkers.In this work, we have numerically minimized the elastic energy in one-constant approximation in present of Fournier’s degenerate surface potential with finite element method. The nematic shell is confined between two spherical surfaces that we have studied the final energies and their related... 

    Solving Symmetric Nonlinear Equations System Using BFGS Trust Region Quadratic Method

    , M.Sc. Thesis Sharif University of Technology Salimi, Samira (Author) ; Razvan, Mohammad Reza (Supervisor) ; Peyghami, Mohammad Reza (Supervisor)

    Effect of the Geometry of Colloidal Particles on Nematic Liquid Crystals

    , Ph.D. Dissertation Sharif University of Technology Hashemi, Masoumeh (Author) ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Co-Advisor)
    Abstract
    A liquid crystal is a state of matter composed of highly anisotropic building blocks. When liquid crystals are exposed to surfaces with given shapes and anchoring conditions, the orientation of their molecules gets spatially disordered and topological defects may form in the system. The interplay between liquid crystals and the geometry and topology of the colloidal particles has motivated extensive recent studies.In this thesis, we present the numerical modeling results for two faceted colloidal particles in a thermotropic nematic liquid crystal. To obtain the equilibrium nematic field with a finiteelement method, we numerically minimize the free energy of the system that based on the... 

    Design and Implementation of 2.5 Gbps Circuit Switching Fabric

    , M.Sc. Thesis Sharif University of Technology Jahani, Sohrab (Author) ; Pakravan, Mohammad Reza (Supervisor) ; Movahhedy, Mohammad Reza (Supervisor)
    Abstract
    Providing high bandwidth network infrastructures for ever increasing need of data transport is of great importance. The underling infrastructure for many communication services such as GSM/3G/4G mobile networks and Internet services is Synchronous Digital Hierarchy (SDH) optical transport systems. SDH are standardized protocols that multiplex multiple lower rate digital bit streams, such as E1 and Ethernet, and transfer them synchronously over optical fiber using lasers or LEDs. In addition to high data transfer rates, flexible network management and protection mechanisms have great importance, hence are part of SDH standards. In order to obtain flexible network architecture and protected... 

    Preserving Privacy in Smart Grid

    , M.Sc. Thesis Sharif University of Technology Vahedi, Erfaneh (Author) ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
    Abstract
    Development of Smart Grid and deployment of smart meters in large scale has raised a lot of concerns regarding customers’ privacy. Consequently, several schemes have been proposed to overcome the above mentioned issue. These schemes mainly rely on data aggregation as a method of protecting users’ privacy from the grid operators. However, the main problem with most of these schemes is the fact that they require a large amount of processing power at the meter side. This, together with the fact that smart meters don’t usually have a powerful processor, can cause the unavailability of smart meter data at the required time for operators of the grid, and at the same time disables smart meters from... 

    Improvement of Routing Security in Ad Hoc Networks Against Several Attacks

    , M.Sc. Thesis Sharif University of Technology Sedghi, Hanie (Author) ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Supervisor)
    Abstract
    Secure routing is a major key to service maintenance in wireless ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. Wormhole attack is one of the most severe active attacks to mobile ad hoc networks. Noting the resource limitations in such networks, nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a...