Loading...
Search for: attari-dezfuli--m
0.197 seconds

    Coreless self-centering braces as retrofitting devices in steel structures

    , Article Journal of Constructional Steel Research ; Volume 133 , 2017 , Pages 485-498 ; 0143974X (ISSN) Attari Dezfuli, M ; Dolatshahi, K. M ; Mofid, M ; Sadeghi Eshkevari, S ; Sharif University of Technology
    Elsevier Ltd  2017
    Abstract
    Conventional lateral resisting systems can provide sufficient strength and ductility for design based earthquakes, although the considerable residual deformation remaining in the plasticized regions undermines the resiliency of the structures. In order to resolve this problem, various self-centering systems have been proposed and tested in recent years, most of which are specified for new buildings and are not simply suitable for retrofitting applications. Moreover, the available self-centering systems are costly and complex to assemble, which can be considered as a serious barrier for practical application. To address these drawbacks, an innovative Core-Less Self-Centering (CLSC) brace is... 

    Introduction of Coreless Self-Centering Braces and Optimized Design Method

    , M.Sc. Thesis Sharif University of Technology Attari Dezfuli, Mohammad (Author) ; Mofid, Masoud (Supervisor) ; Mohtasham Dolatshahi, Kiarash (Supervisor)
    Abstract
    Conventional lateral resisting systems can provide sufficient strength and ductility for design based earthquakes, although the considerable residual deformation remaining in the plasticized regions undermines the resiliency of the structures. In order to resolve this problem, various self-centering systems have been proposed and tested in recent years, most of which are specified for new buildings and are not simply suitable for retrofitting applications. Moreover, the available self-centering systems are costly and complex to assemble, which can be considered as a serious barrier for practical application. To address these drawbacks, an innovative core-less self-centering (CLSC) brace is... 

    Hydrothermal synthesis of TiO2 nanorod for using as an electron transport material in perovskite solar cells

    , Article 6th International Biennial Conference on UltraFine Grained and Nanostructured Materials, UFGNSM 2017, 12 November 2017 through 13 November 2017 ; Volume 1920 , 2018 ; 0094243X (ISSN); 9780735416123 (ISBN) Attari Navab, A ; Nemati, A ; Attari Navab, A ; Abad, H. M. M ; Sharif University of Technology
    American Institute of Physics Inc  2018
    Abstract
    Now days titanium dioxide is used in different applications because of its good electrical properties, optical stability and cost savings. According to their different nanoscale TiO2 structures, it has been determined that 1D structures such as nanorods, nanotubes and nanowires has better properties than the other structures, including enhancing electron transport and create an offered directional way of transporting of the electrons. However, the grain boundaries in polycrystalline TiO2 nanowires or nanotubes cause electron scattering or trapping, which limit their application in optoelectronics. From these TiO2 structures, TiO2 nanorods have special importance because of less defects... 

    Embedded SI partial transmit sequence with improved bit error rate

    , Article 2nd International Conference on Electrical Engineering, ICEE, Lahore, 25 March 2008 through 26 March 2008 ; 2008 ; 9781424422937 (ISBN) Reisi, N ; Ahmadian Attari, M ; Reisi, N
    2008
    Abstract
    OFDM is a multicarrier modulation scheme with high bandwidth efficiency and robustness to multipath environment used in high data rate transmission. However, a drawback of this system is the large Peak-to-Average-Power Ratio (PAR) of the transmit signal which makes its straightforward implementation quite costly. PAR in an OFDM based system can be reduced significantly by PTS method for which data recovery requires side information (SI) about the phases used at transmitter. Sending SI, not only reduces the rate, but also increases BER, for any error in SI detection can damage a large amount of transmitted information. By introducing a new phase set, we propose a PTS based method for MPSK... 

    A new protocol for the preparation of aminals from aromatic aldehydes and their facile conversion to phosphonates

    , Article Phosphorus, Sulfur and Silicon and the Related Elements ; Volume 179, Issue 1 , 2004 , Pages 89-96 ; 10426507 (ISSN) Karimi Dezfuli, M ; Saidi, M. R ; Sharif University of Technology
    2004
    Abstract
    A new and fast method for the preparation of aminals is reported from the reaction of aromatic aldehydes and secondary amines in the presence of potassium carbonate in high yields. The aminal can be converted to the corresponding iminum salt in reaction with acetyl chloride very easily and in very short time with high yield. Addition of trialkylphosphite, as one possible nucleophile, to the prepared iminium salt produces the α-amino phosphonate in very high yield  

    Evaluation and prediction of rise velocity and drag coefficient of an ascending bubble affected by the impurity in continuous and discrete phases, distinctly and concurrently

    , Article Chemical Engineering Journal ; Volume 464 , 2023 ; 13858947 (ISSN) Lotfi, M ; Rajabzadeh Dezfuli, M ; Bastani, D ; Sharif University of Technology
    Elsevier B.V  2023
    Abstract
    Obtaining a deep knowledge about the bubbly flow systems, which are widely applied in various chemical and industrial processes, is crucial for scholars and engineers to achieve more accurate equipment design and processes control. This paper is dedicated to experimentally investigate the distinctly and concurrently effects of fumed silica nanoparticles (NPs) and hexane vapor molecules as impurities in continuous and discrete phases, respectively, on the terminal velocity and drag coefficient of a single rising bubble in aqueous solutions. The obtained experimental data were compared to the calculated data by derived correlations in literatures. As a result, none of those can predict the... 

    Analysis of a fractional order Van der Pol-like oscillator via describing function method

    , Article Nonlinear Dynamics ; Volume 61, Issue 1-2 , 2010 , Pages 265-274 ; 0924090X (ISSN) Attari, M ; Haeri, M ; Tavazoei, M. S ; Sharif University of Technology
    2010
    Abstract
    In this paper, the behavior of a fractional order Van der Pol-like oscillator is investigated using a describing function method. A parametric function for the boundary between oscillatory and nonoscillatory regions of this system is extracted. The analytical results are evaluated by numerical simulations which demonstrate sufficient reliability of the proposed analyzing method  

    Design and Hardware Implementation of Optical Character Recognition

    , M.Sc. Thesis Sharif University of Technology Dezfuli, Sina (Author) ; Hashemi, Matin (Supervisor)
    Abstract
    The objective of OCR systems is to retrieve machine-encoded text from a raster image. Despite the abundance of powerful OCR algorithms for English, there are not many for Farsi. Our proposed algorithm is comprised of pre-processing, line detection, sub-word detection and segmentation, feature extraction and classification. Furthermore, hardware implementation and acceleration of this system on a GPGPU is presented. This algorithm was tested on 5 fonts including Titr, Lotus,Yekan, Koodak and Nazanin and an average accuracy above 90% was achieved  

    Three dimensional pressure transient behavior study in stress sensitive reservoirs

    , Article Journal of Petroleum Science and Engineering ; Volume 152 , 2017 , Pages 204-211 ; 09204105 (ISSN) Moradi, M ; Shamloo, A ; Asadbegi, M ; Dezfuli, A. D ; Sharif University of Technology
    Elsevier B.V  2017
    Abstract
    Stress sensitivity is a phenomenon that affects reservoir rock properties, such as permeability and therefore changes the well pressure transient behavior. This paper aims to study these behaviors in stress sensitive reservoirs and evaluate the pressure loss in such reservoirs during the process of hydrocarbon production. A power model is used to correlate the changes in permeability with pore pressure. A novel semi-implicit three-dimensional finite element method has been employed to numerically solve the flow problem. The numerical results have been validated by analytical results obtained in a non-sensitive reservoir. Pressure drawdown test for different scenarios has been studied. The... 

    Cooperative relay cognitive interference channel

    , Article Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, 17 December 2010 through 19 December 2010, Beijing ; 2010 , Pages 1064-1069 ; 9781424469406 (ISBN) Kazemi, M ; Aref, M. R ; Ahmadian Attari, M ; Sharif University of Technology
    2010
    Abstract
    The cooperative relay cognitive interference channel (RCIC) is a four-node network with two source nodes (primary source and cognitive source) and two destination nodes, in which sources try to communicate at certain rates with their corresponding destinations simultaneously through a common medium and each destination can act as a relay to assist the other one. For the partially cooperative RCIC (PC-RCIC), in which only one of the destinations (corresponding to the cognitive source) acts as a relay, we derive an achievable rate region based on using rate splitting and superposition coding at the cognitive source, and using decode-and-forward scheme at the relay. For the degraded PC-RCIC, we... 

    A probe into the fatigue crack growth in mechanical systems with hyperchaotic/chaotic dynamics

    , Article Mechanical Systems and Signal Processing ; Volume 191 , 2023 ; 08883270 (ISSN) Dezfuli, M. A ; Zeinoddini, M ; Nazari, S. A ; Pasand, M. S ; Harati, R. M ; Sharif University of Technology
    Academic Press  2023
    Abstract
    This study presents experimental and analytical fatigue frameworks for the dynamic fatigue life prediction of nonlinear mechanical systems under hyperchaotic oscillations. Fatigue in aluminium notched beams under hyperchaotic/chaotic vibrations is studied using a time-based analytical model. The fatigue lives obtained by the analytical model provided satisfactory correlations with those acquired by the dynamic fatigue experiments conducted on cracked aluminium beams. The model is then used to study the fatigue under Duffing chaotic, Duffing hyperchaotic, and periodic dynamic forcing. Results indicate that the classic linear cumulative damage rule delivers inaccurate high cycle fatigue (HCF)... 

    More details on analysis of fractional-order Van der Pol oscillator

    , Article JVC/Journal of Vibration and Control ; Volume 15, Issue 6 , 2009 , Pages 803-819 ; 10775463 (ISSN) Tavazoei, M. S ; Haeri, M ; Attari, M ; Bolouki, S ; Siami, M ; Sharif University of Technology
    2009
    Abstract
    This paper is devoted to the analysis of fractional order Van der Pol system studied in the literature. Based on the existing theorems on the stability of incommensurate fractional order systems, we determine parametric range for which a fractional order Van der Pol system with a specific order can perform as an undamped oscillator. Numerical simulations are presented to support the given analytical results. These results also illuminate a main difference between oscillations in a fractional order Van der Pol oscillator and its integer order counterpart. We show that contrary to integer order case, trajectories in a fractional Van der Pol oscillator do not converge to a unique cycle. © 2009... 

    Robust relay beamforming against jamming attack

    , Article IEEE Communications Letters ; 2017 ; 10897798 (ISSN) Maleki Sadr, M. A ; Ahmadian Attari, M ; Amiri, R ; Sharif University of Technology
    2017
    Abstract
    In this letter, we surpass the jamming effect and also estimate the jamming channel state information by using Kalman filtering (KF) approach. Furthermore, we design a closed-form beamforming weight for maximizing the achievable rate subject to the condition that the total relays power transmission would be below a predefined threshold level, which is formulated as a Quadratically Constrained Quadratic Program (QCQP). Simulation results show efficient performance of the proposed method for different destruction powers of jammer by achieving the Cramer Rao Lower Bound (CRLB). IEEE  

    Provably secure strong designated verifier signature scheme based on coding theory

    , Article International Journal of Communication Systems ; Volume 30, Issue 7 , 2017 ; 10745351 (ISSN) Koochak Shooshtari, M ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
    John Wiley and Sons Ltd  2017
    Abstract
    Strong Designated Verifier Signature (SDVS) provides authentication for the signer and the verifier such that the signer is assured that what s/he has signed, is only verified by the designated verifier. Currently, the security of most of the SDVS schemes is based on hard problems in the number theory. As it is proved that all kinds of cryptosystems which are based on the number theory will not tolerate quantum attacks, here, an SDVS scheme based on hard problems in coding theory is presented. We have proved that the suggested scheme is unforgeable under a chosen message attack in Random Oracle Model. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd  

    Robust relay beamforming against jamming attack

    , Article IEEE Communications Letters ; Volume 22, Issue 2 , February , 2018 , Pages 312-315 ; 10897798 (ISSN) Maleki Sadr, M. A ; Ahmadian Attari, M ; Amiri, R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    In this letter, we surpass the jamming effect and also estimate the jamming channel state information by using the Kalman filtering approach. Furthermore, we design a closed-form beamforming weight for maximizing the achievable rate subject to the condition that the total relays power transmission would be below a predefined threshold level, which is formulated as a quadratically constrained quadratic program. Simulation results show the efficient performance of the proposed method for different destruction powers of the jammer by achieving the Cramér-Rao lower bound. © 1997-2012 IEEE  

    Comments on a lightweight cloud auditing scheme: Security analysis and improvement

    , Article Journal of Network and Computer Applications ; Volume 139 , 2019 , Pages 49-56 ; 10848045 (ISSN) Rabaninejad, R ; Ahmadian Attari, M ; Rajabzadeh Asaar, M ; Aref, M. R ; Sharif University of Technology
    Academic Press  2019
    Abstract
    In a cloud storage service, public auditing mechanisms allow a third party to verify integrity of the outsourced data on behalf of data users without the need to retrieve data from the cloud server. Recently, Shen et al. proposed a new lightweight and privacy preserving cloud data auditing scheme which employs a third party medium to perform time-consuming operations on behalf of users. The authors have claimed that the scheme meets the security requirements of public auditing mechanisms. In this paper, we show that Shen et al.'s scheme is insecure by proposing two attacks on the scheme. In the first attack, an outside adversary can modify some messages in transmission to the cloud server... 

    An identity-based online/offline secure cloud storage auditing scheme

    , Article Cluster Computing ; Volume 23, Issue 2 , 2020 , Pages 1455-1468 Rabaninejad, R ; Rajabzadeh Asaar, M ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
    Springer  2020
    Abstract
    Cloud storage has significantly reduced data management costs for data owners. However, loss of physical control over the data after outsourcing, triggers some security concerns such as data integrity. Provable Data Possession (PDP) protocols, enable data owners to audit the integrity of their outsourced data without the need to retrieve the file from cloud server. However, most existing PDP schemes require resource-constrained users to perform costly operations for generating metadata on file blocks. In online/offline PDP mechanisms introduced most recently, the user’s computation is divided into online/offline phases, where the costly operations are allowed to be carried out in the offline... 

    An id-based privacy-preserving integrity verification of shared data over untrusted cloud

    , Article 25th International Computer Conference, Computer Society of Iran, CSICC 2020, 1 January 2020 through 2 January 2020 ; 2020 Rabaninejad, R ; Sedaghat, S. M ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Data sharing is considered as a favorite service provided by cloud storage servers in which the stored data is shared among a group of users. However, auditing such shared data is a big security issue for cloud users. In this paper, we propose an ID-Based public shared data integrity auditing scheme, in which all the group users are able to update, delete or insert new blocks into the shared data. Besides, the cloud server can revoke a misbehaving user with a minimum overhead. The scheme is secure against an untrusted cloud server and also preserves data privacy against the public verifier. Furthermore, overhead analysis shows the efficiency of proposed scheme in comparison to the existing... 

    A lightweight identity-based provable data possession supporting users’ identity privacy and traceability

    , Article Journal of Information Security and Applications ; Volume 51 , 2020 Rabaninejad, R ; Ahmadian Attari, M ; Rajabzadeh Asaar, M ; Aref, M. R ; Sharif University of Technology
    Elsevier Ltd  2020
    Abstract
    Cloud storage auditing is considered as a significant service used to verify the integrity of data stored in public cloud. However, most existing auditing protocols suffer form complex certificate management/verification since they rely on expensive Public Key Infrastructure (PKI). On the other hand, most cloud users have constrained computational resources. The few existing ID-based storage auditing protocols in the literature, require resource-constrained users to perform costly operations for generating metadata on file blocks. In this paper, we propose a storage auditing protocol which benefits from ID-based structure and lightweight user computations, simultaneously. Our construction... 

    Fabrication of biocompatible titanium scaffolds using space holder technique

    , Article Journal of Materials Science: Materials in Medicine ; Volume 23, Issue 10 , 2012 , Pages 2483-2488 ; 09574530 (ISSN) Dezfuli, S. N ; Sadrnezhaad, S. K ; Shokrgozar, M. A ; Bonakdar, S ; Sharif University of Technology
    Springer  2012
    Abstract
    Open-pore titanium scaffolds were fabricated by sintering of compressed mixtures of TiH1.924 and urea. Spherical and irregular shaped space holders were used to investigate the effect of pore shape on cellular behavior. After removal of the space holder, the shape of the spacers was replicated to the pores. Average diameter of the pores was in the range of 300-600 lm. SEM images showed that titanium hydride resulted in higher surface roughness and larger micro porosities than pure titanium. In vitro evaluationswere carried out by using MTT assay, measuring alkaline phosphatase activity and alizarin red staining in flow perfusion bioreactor for cell culture. Observations revealed excellent...