Loading...
Search for: babaei--mohammad-reza
0.198 seconds

    Transportation Planning in the Product Distribution Chain According to Traffic Criteria

    , Ph.D. Dissertation Sharif University of Technology Babaei, Ardavan (Author) ; Akbari Jokar, Mohammad Reza (Supervisor) ; Khedmati, Majid (Supervisor)
    Abstract
    Increased costs due to fuel consumption by vehicles, air pollution and greenhouse gas emissions, safety concerns in accidents, social concerns regarding the satisfaction of the users of roads and routes, and increased delivery time of goods are among the important issues that highlight the need to consider traffic congestion in the supply chain planning. In addition, in supply chains goods are generally transported by medium and heavy transportation vehicles. Their higher weights, bigger sizes and lower speeds are among the characteristics of these vehicles that cause traffic congestion. Therefore, it is necessary to address the topic of traffic congestion in the supply chain planning.... 

    Molecular Dynamic Simulation of Metal and Ceramic Nanopowder Compaction Process and Investigation on Effective Factors

    , M.Sc. Thesis Sharif University of Technology Babaei, Mahnoosh (Author) ; Khoei, Amir Reza (Supervisor)
    Abstract
    In present research forming process of nanopowders, which is a part of powder metallurgy was investigated by molecular dynamics method. Powder metallurgy is a relatively new method for production of industrial parts by pouring powder into die and compaction to desired density. One can reach parts with higher quality and strength by decreasing size of powder’s particles and entering the nano scale. Particle with smaller size have higher specific surface and due more intensity to react. Classic methods for investigation of this process don’t cover the atomic scale effects, so using newer procedures such as molecular dynamics is highly recommended. In present research, at first compaction of... 

    Synchronization of Two Chemical Reactors

    , M.Sc. Thesis Sharif University of Technology Babaei Pourkargar, Davood (Author) ; Shahrokhi, Mohammad (Supervisor)
    Abstract
    Chaotic behavior takes place in different physical systems such as chemical reactors. In this thesis, dynamical behavior of chemical reactors in which polymerization or series reactions take place has been considered. It has been shown that these reactors have chaotic dynamics under special condition. Two reactors of the second type (with series reactions) for cases of known and unknown parameters have been synchronized by a control method and stability of the proposed scheme has been established by the Lyapunov stability theorem. Simulation results show the effectiveness of proposed method. Since concentration measurement is difficult and expensive, an observer has been used for... 

    Numerical Simulation to Improve the Efficiency of a Combined Cycle Incorporating a J-Class Gas Turbine Equipped with a Water Fogging System at Its Inlet

    , M.Sc. Thesis Sharif University of Technology Babaei, Mohammad Aref (Author) ; Darbandi, Masoud (Supervisor)
    Abstract
    One way to increase the power and efficiency of the gas turbines is to cool their incoming air. There are different methods to cool down the inlet air. One of the most widely used and suitable method is spraying or fogging the water droplets into the air at the gas turbine air inlet. In this research and for the first time, the effect of fogging system on the performance of a combined cycle incorporated with a J-class gas turbine (M-501J) is investigated using the computational fluid dynamics (CFD). There are so many parameters, which affect the amount of achieved efficiency. A few of them includes the average temperature and humidity at the outlet, the evaporation efficiency of the water... 

    A misbehavior‐tolerant multipath routing protocol for wireless Ad hoc networks [electronic resource]

    , Article International Journal of Research in Wireless Systems (IJRWS) ; Vol. 2, Issue 9, pp. , Sep. 2013 Sedghi, H. (Haniyeh) ; Pakravan, Mohammad Reza ; Aref, Mohammad Reza ; Sharif University of Technology
    Abstract
    Secure routing is a major key to service maintenance in ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. As a result of the resource limitations in such networks nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a novel data redirection method to mitigate the impact of node misbehavior on network... 

    Analysis the Effect of Structure on Spreading Information in Social Networks

    , M.Sc. Thesis Sharif University of Technology Babaei, Mahmoud Reza (Author) ; Safari, Mohammad Ali (Supervisor)
    Abstract
    The dynamic behavior of networks largely depends on their structural properties. The information or failures can spread through the links of complex networks constructed by people or agents, and their physical and informational contacts. In this research, the process of network diffusion was investigated in different model and real networks. In particular, we focused on ”cascaded failure” and ”viral marketing” which are among the major topics that have attracted much attention in this context. Firstly, we investigated the robustness of modular complex networks against random and systematic component failures. Many real-world networks have modular structure and they may undergo random errors... 

    Analitical and Numerical Investigation of Mechanical Response of Steel Cable

    , M.Sc. Thesis Sharif University of Technology Babaei Darabad, Saman (Author) ; Kazemi, Mohammad Taghi (Supervisor)
    Abstract
    Although many aspects of helical strand have been carried out, there are still some situations which need more studies. Based on previous studies of wire rope the constitutive equations regarding the rope tension and torque to the rope deformations are carried out. In which constitutive constants depend on both the rope material and geometry of the rope. Equations of motion for straghit rope loaded simultaneously in tension and torque are derived, and with using extensional-torsional deformations in both side of the rope, dynamic stiffness matrix is derived. Some experimental results and currently models are compared with my research model numerically. Finally, mechanic response of helically... 

    The Detection of False Data Injection Attacks in Large-Scale Residential Energy Grids

    , M.Sc. Thesis Sharif University of Technology Babaei Ghazvini, Hamid Reza (Author) ; Haeri, Mohammad (Supervisor)
    Abstract
    This dissertation investigates the detection of false data injection attacks in largescale residential energy grids. A typical multi-micro-grid framework is investigated by considering the geographical dispersion of equivalent models, wherein each microgrid is assumed as an agent and managed by a local aggregator. Furthermore, a fully distributed Nash equilibrium seeking algorithm in the partial-decision information scenario is proposed, where each microgrid estimates the actions of all the microgrids by relying only on the information exchanged with some neighbors over a communication network. To effectively reduce unnecessary signal transmission among the agents, an adaptive algorithm,... 

    Development of a Real Time System Identifier for Interconnected Systems

    , M.Sc. Thesis Sharif University of Technology Babaei, Mohammad Reza (Author) ; Bozorgmehri Boozarjomehri, Ramin (Supervisor)
    Abstract
    Access to a reduced and fast mathematical model that can predict the input-output behavior of interconnected systems with acceptable accuracy and in a short time is crucial. The purpose of this project is to provide an object-oriented platform for identifying a model based on input-output data of interconnected systems in real-time. On this basis, in the case of developing fast estimation algorithms and updating the model quickly (in case of extensive changes in the system), good predictions of the model can be used for various applications. In this research, machine learning and data analysis methods are used to extract useful features and relations from data. Then, taken advantage of this... 

    Development of An Agent-based Framework For Optimization of Water and Energy Network Structure

    , Ph.D. Dissertation Sharif University of Technology Babaei, Farshid (Author) ; Bozrogmehry Boozarjomehry, Ramin (Supervisor) ; Pishvaie, Mahmoud Reza (Supervisor)
    Abstract
    Information and Communication Technology and Artificial Intelligence (AI) can support the transition from traditional practices toward smart supply chain coordination schemes. Such a direction allows for integrating organizational levels of natural gas transportation enterprises, comprising Location, Inventory, and Routing Problem (LIRP) decisions. Specific works have investigated the LIRP of natural gas-to-product and energy networks. However, due to the absence of a systematic ICT-assisted mindset, no study has been oriented from the perspective of the dynamic inventory management and geographic data-driven features of land resources. To handle these challenges, this study partially... 

    Analysis and Improvement of Intrusion Detection Methods in Data Network Routers

    , M.Sc. Thesis Sharif University of Technology Jamshidi, Mohammad Ali (Author) ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
    Abstract
    High-quality online services demand reliable and fast packet delivery at the network layer. However, clear evidence documents the existence of compromised routers in the ISP and enterprise networks, threatening network availability and reliability. A compromised router can stealthily drop, modify, inject, or delay packets in the forwarding path to launch Denial-of-Service, surveillance, man-in-the-middle attacks, etc. So researches tried to create intrusion detection methods to identify adversarial routers and switches. To this end, data-plane fault localization (FL) aims to identify faulty links and is an effective means of achieving high network availability. FL protocols use... 

    Topological Defects in Confined Nematics by Planar Anchoring

    , M.Sc. Thesis Sharif University of Technology Seyed Nejad, Reza (Author) ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Supervisor)
    Abstract
    Confining nematic liquid crystal between two curved boundary conditions while the nematic molecules have a degenerate planar anchoring leads to complex and beautiful textures of molecular disparagement(defect) in the bulk and on the surfaces. Such the liquid crystal shells are made with double-emulsion techniques in microfluidic devices have provided applications for micro-scale colloidal linkers.In this work, we have numerically minimized the elastic energy in one-constant approximation in present of Fournier’s degenerate surface potential with finite element method. The nematic shell is confined between two spherical surfaces that we have studied the final energies and their related... 

    Solving Symmetric Nonlinear Equations System Using BFGS Trust Region Quadratic Method

    , M.Sc. Thesis Sharif University of Technology Salimi, Samira (Author) ; Razvan, Mohammad Reza (Supervisor) ; Peyghami, Mohammad Reza (Supervisor)

    Effect of the Geometry of Colloidal Particles on Nematic Liquid Crystals

    , Ph.D. Dissertation Sharif University of Technology Hashemi, Masoumeh (Author) ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Co-Advisor)
    Abstract
    A liquid crystal is a state of matter composed of highly anisotropic building blocks. When liquid crystals are exposed to surfaces with given shapes and anchoring conditions, the orientation of their molecules gets spatially disordered and topological defects may form in the system. The interplay between liquid crystals and the geometry and topology of the colloidal particles has motivated extensive recent studies.In this thesis, we present the numerical modeling results for two faceted colloidal particles in a thermotropic nematic liquid crystal. To obtain the equilibrium nematic field with a finiteelement method, we numerically minimize the free energy of the system that based on the... 

    Design and Implementation of 2.5 Gbps Circuit Switching Fabric

    , M.Sc. Thesis Sharif University of Technology Jahani, Sohrab (Author) ; Pakravan, Mohammad Reza (Supervisor) ; Movahhedy, Mohammad Reza (Supervisor)
    Abstract
    Providing high bandwidth network infrastructures for ever increasing need of data transport is of great importance. The underling infrastructure for many communication services such as GSM/3G/4G mobile networks and Internet services is Synchronous Digital Hierarchy (SDH) optical transport systems. SDH are standardized protocols that multiplex multiple lower rate digital bit streams, such as E1 and Ethernet, and transfer them synchronously over optical fiber using lasers or LEDs. In addition to high data transfer rates, flexible network management and protection mechanisms have great importance, hence are part of SDH standards. In order to obtain flexible network architecture and protected... 

    Preserving Privacy in Smart Grid

    , M.Sc. Thesis Sharif University of Technology Vahedi, Erfaneh (Author) ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
    Abstract
    Development of Smart Grid and deployment of smart meters in large scale has raised a lot of concerns regarding customers’ privacy. Consequently, several schemes have been proposed to overcome the above mentioned issue. These schemes mainly rely on data aggregation as a method of protecting users’ privacy from the grid operators. However, the main problem with most of these schemes is the fact that they require a large amount of processing power at the meter side. This, together with the fact that smart meters don’t usually have a powerful processor, can cause the unavailability of smart meter data at the required time for operators of the grid, and at the same time disables smart meters from... 

    Improvement of Routing Security in Ad Hoc Networks Against Several Attacks

    , M.Sc. Thesis Sharif University of Technology Sedghi, Hanie (Author) ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Supervisor)
    Abstract
    Secure routing is a major key to service maintenance in wireless ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. Wormhole attack is one of the most severe active attacks to mobile ad hoc networks. Noting the resource limitations in such networks, nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a... 

    Optimization of Vehicle Routing Problem with Self-pickup-delivery and Option Delivery Locations

    , Ph.D. Dissertation Sharif University of Technology Pour Mohammad Reza, Nima (Author) ; Akbari Jokar, Mohammad Reza (Supervisor)
    Abstract
    With the increasing tendency of consumers to purchase from online stores and the remarkable growth of this industry in recent years, timely and cost-efficient delivery of goods to the final customer has become one of its major challenges. Accordingly, last-mile delivery has attracted significant attention from both researchers and practitioners. This study addresses a vehicle routing problem that considers customers’ ability to pick up their orders from selected centers and their possible presence at different locations within the planning horizon. This thesis aims to enhance customer satisfaction and reduce distribution costs by employing two innovative vehicle routing approaches. The first... 

    Solving Nonlinear Systems of Mixed Iqualities and Inequalities Via Trust Region Quadratic Methods

    , M.Sc. Thesis Sharif University of Technology Ghasemi, Shojaeddin (Author) ; Razvan, Mohammad Reza (Supervisor) ; Payghami, Mohammad Reza (Supervisor)

    Jamming Resilient Algorithms for Rendezvous in Cognitive Radio Networks

    , M.Sc. Thesis Sharif University of Technology Rezaei, Roohollah (Author) ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
    Abstract
    Dynamic spectrum access with the aid of cognitive radio (CR) technology is a viable solution to spectrum scarcity. There are many military and emergency applications that require the use of cognitive radio ad-hoc networks (CRAHNs). In these net- works, nodes must first find each other in a wide spectrum and then exchange their desired data. The process of finding each other in a multichannel environment is a challenging task and is usually known as rendezvous. Since rendezvous is the first step in communication, disrupting will disable the nodes from establishing proper communication sessions. That results in a drastic degrade in the performance of the network. Therefore, it is important to...