Loading...
Search for:
baghbani-juybari--rasoul
0.11 seconds
Total 107 records
Synthesis of AgI Nanoparticle in a New SDR
, M.Sc. Thesis Sharif University of Technology ; Molaei Dehkordi, Asghar (Supervisor)
Abstract
In this study, low-cost and simple method of precipitation or reactive crystallization was used to synthesize nanoparticles of silver iodide. For this purpose, the reaction of silver nitrate and potassium iodide along with several surfactants in a rotating disk reactor at ambient temperature and pressure was applied. In addition, the effects of hydrodynamic conditions such as diameter and rotating speed of the disk, feed flow rate, and feed injection location, with some of the effective kinetic parameters in the synthesis such as the concentration of the reactants, type and concentration of the surfactants and free ion ratio and aging time of solutions using dynamic light scattering analysis...
Optimal sensor placement for source localization in nlos conditions
, Article 26th Iranian Conference on Electrical Engineering, ICEE 2018, 8 May 2018 through 10 May 2018 ; 2018 , Pages 435-439 ; 9781538649169 (ISBN) ; Behnia, F ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2018
Abstract
The problem of sensor placement for passive source localization under the non-line of sight signal propagation is considered in this paper. To this end, first we derive the Cramer-Rao lower bound for the time of arrival based source localization under non-line of sight conditions. Then, the optimal arrangement of sensors to achieve this lower bound is obtained in the two important cases with all of the receivers being non line of sight ones in the first case and a combination of line of sight and non-line of sight receivers in the 2nd case. © 2018 IEEE
Computing the Shortest Path on Weighted Triangulated Irregular Networks by Multicore Algorithms
, M.Sc. Thesis Sharif University of Technology ; Ghodsi, Mohammad (Supervisor)
Abstract
Shortest path computation is one the fundamental problems in computer science. Triangulated Irregular Networks (TINs) are used in computational geometry to represent terrians and geometric surfaces. One of the most efficient mothods to solve the shortest path problem on a TIN is reducing it to shortest path problem on a graph. This reduction from continuous space to discrete space results in approximate solutions, but acceptable in real applications. In real applications we still encounter a large graph and using the simple Dijkstra algorithm consumes a lot of times. Memory shortage is another issue. Parallel processing could be a solution in this case. Multicore industry caused a...
Sensor placement in AOA localization of multiple sources in the presence of distance dependent noise
, Article 27th Iranian Conference on Electrical Engineering, ICEE 2019, 30 April 2019 through 2 May 2019 ; 2019 , Pages 1233-1238 ; 9781728115085 (ISBN) ; Hamdollahzadeh, M ; Behnia, F ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2019
Abstract
In this paper, we consider the problem of sensor placement for passive source localization under conditions where there are multiple sources and noise measurement is distance dependent. To this end, first we derive the Cramer-Rao bound for the angle of arrival (AOA) based source localization for distance-dependent noise model and existence of multiple sources. Then, the optimal arrangement of sensors to achieve this bound is obtained
Experimental Investigation of Using Preformed Particle Gels (PPG) in order to Water Shut Off (WSO)
, M.Sc. Thesis Sharif University of Technology ; Ayatollahi, Shahaboden (Supervisor)
Abstract
Excessive water production is one of the common problems during oil recovery that causes the production to decline, the operating cost to increase, and the well to shut in. The heterogeneities such as fractures in the reservoirs causes waterfingering and decrease waterflood efficiency, recovery factor and increase production costs and lead to high watercut. On of the methods used to prevent producing undesireable water from reservoirs is using Preformed Particle Gels (PPGs) that is known as plugging agent. These particles are injected into the hydrocarbon reservoirs and plugged the flow of water and prevent the production of water.In recent years, it has been recognized that the use of...
Supervised classification of sleep events suitable for a minimized home-operated recording system
, Article 2023 30th National and 8th International Iranian Conference on Biomedical Engineering, ICBME 2023 ; 2023 , Pages 313-320 ; 979-835035973-2 (ISBN) ; Shahrbabak, Z. M ; Jahed, M ; Baghbani, R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2023
Abstract
In this paper, we present a novel approach that uses a non-invasive recording device based on the respiratory rate, SpO2 (oxygen saturation), and heart rate (HR) to represent respiratory effort and function. We also use these signals to classify apnea, arousal, and hypopnea events. In addition to event classification, proposed machine learning models demonstrate the potential to estimate the heterogeneous Apnea-Hypopnea Index (AHI), which plays a pivotal role in designing the proposed novel recording device based on the respiratory rate, SpO2 (oxygen saturation), and heart rate (HR) signals. We based our recording device on the APPLES dataset, a publicly available dataset from which a set of...
The Relationship between Dividend Policy and Stock Price Volatility
, M.Sc. Thesis Sharif University of Technology ; Keshavarz Haddad, Gholam Reza (Supervisor) ; Abdoh Tabrizi, Hossein (Supervisor)
Abstract
The objective of this study is to explore the relationship between the stock price volatility and dividend policy (dividend yield and dividend payout ratio) for the Iranian stock market. According to the studies of Baskin (1989) and Allen and Rachim (1996), the fixed effect and random effect regression models are applied in this research. The sample of data is composed of 200 public firms which are listed on the Tehran Stock Exchange (TSE) and paid dividends continuously from 2010 to 2020. The results indicate that the dividend policy has a significantly negative relationship with the stock price volatility. In addition, the Size of the company is negatively related to the stock price...
Economic Batch Quantity (EBQ) for a Single-Stage Production System with Rework and Scrapping
, M.Sc. Thesis Sharif University of Technology ; Haji, Rasoul (Supervisor)
Abstract
The classical economic batch quantity (EBQ) model assumes that all produced items have a perfect quality. But in real-life production systems, generation of defective items is inevitable. A portion of these defective items is considered to be scrap , while the other is assumed to be reworkable and reworking them can reduce costs and increase productivity. In this thesis we have studied the economic batch quantity for a single stage production system with rework and scrapping . We want to satisfy the customer demand and minimize total costs of the system like set up costs , production costs , rework costs , holding costs , shortage costs and scrapping costs . In the first chapter of this...
Systematic Planned (Preventive) Maintenance in Hospitals And Medical Centers of Iran
,
M.Sc. Thesis
Sharif University of Technology
;
Haji, Rasoul
(Supervisor)
Abstract
Based on the latest statistical figures, more than 50 billion Rials worth of medical equipment exists in Iran’s medical centers. In spite of this, Breakdown maintenance is used in all hospitals, which means that the equipment is utilized as long as it is not out of order and only in such a situation, i.e. a breakdown, the necessary repair operation is conducted on the equipment. In fact, no maintenance is carried out to prevent a breakdown, while the “prevention from breakdown” concept has long been introduced in the majority of industries in many countries including Iran and its positive impacts are undisputable. This thesis aims at proposing a solution for the implementation of a “planned...
Analysis of Non-monotonicity Property in Access Control for Pervasive Computing Environment
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasoul (Supervisor)
Abstract
Access control, which is the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied, plays an important role in the system security. The existing of non-monotonicity property in a deduction and decision making process means that some of the previous deductions or decisions may be retracted by adding new information and premises. Based on the definition, in a non-monotonic access control system, adding new information or access control rules may invalidate some of the previous conclusions (permissions/prohibitions). The requirements such as decision making based on the imperfect information, supporting...
Transportation Problem of Hub Network with Direct Links
, M.Sc. Thesis Sharif University of Technology ; Haji, Rasoul (Supervisor)
Abstract
Hub and Spoke networks come into play when considering direct link between all origins and destinations is either impossible or expensive in a transportation system. In this kind of problems, some nodes are chosen as hub from all origin and destination nodes to collect flows and then distribute them. Implementing hub network leads to minimizing transportation cost, sorting flows and conveying them in economies of scale. Otherwise, shipping flows directly may cause decreasing the travelling distance and the delivery time consequently. In this dissertation, combination of hub network and direct shipment is investigated. To obtain the optimal hub locations and direct links between non-hub nodes...
Punishment Normative Systems
, M.Sc. Thesis Sharif University of Technology ; Ramezanian, Rasoul (Supervisor)
Abstract
In real life, we can not always expect agents and authorities to have the same desires. Also when it comes to conflicts, agents always tend to break the authorities’ norms to follow their own strategies. Hence we can not expect strict norms to model an actual real life situation.In this article we introduce punishment normative systems, based on multi-agent Marokov chain processes (MMDPs). We try to extend the punishment idea to be also applicable on long-run and infinite strategies. We consider a version of the multi-agent model that is widely used in different situations and then provide an algorithm to find a fair normative system that distributes obligations equally on the agents, while...
Optimum Ordering Policy in Vendor Managed Inventory (VMI) with Discrete Demand and Backorder
, M.Sc. Thesis Sharif University of Technology ; Haji, Rasoul (Supervisor)
Abstract
This research deals with a supply chain consisting of one vendor and several retailers. Every retailer orders a fixed discrete quantity in fixed discrete time intervals. Order quantity and order cycle of each retailer could be different from the others. The vendor orders the required quantity to a supplier to fulfill the received demands. Also the vendor orders a discrete quantity, which will be immediately received at the vendor’s warehouse. In this supply chain system, the lead-time is assumed to be zero and shortage is allowed for vendor. The aim is to find minimum vendor’s inventory cost. We proposed a backward Dynamic Programming algorithm for the model. The algorithm creates vendor’s...
A Semantic-Aware Authorization Model Based on Deontic Logic
, Ph.D. Dissertation Sharif University of Technology ; Jalili, Rasoul (Supervisor)
Abstract
Semantic technology provides an abstraction layer above existing computational environments, especially the Web, to give information a well-defined meaning. Moving toward semantic-aware environments imposes new security requirements. One of the most important requirement is the authorization and security policy inference based on the existing semantic relationships in the abstract (conceptual) layer. Most of the authorization models proposed for these environments so far are incomplete and their inference rules are not guaranteed to be consistent, sound, and complete. To have a sound and complete system for policy specification and inference, in this thesis, a family of modal logics, called...
Query Correctness Assurance for Outsourced Databases
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasoul (Supervisor)
Abstract
In the secure data outsourcing scenario, verification of the reply of an unreliable server includes assessing the authenticity, completeness and it’s integrity. In this thesis, an efficient method, with emphasis on freshness, has been introduced to evaluate the correctness of the replies from a server. It takes in hand different application needs, inherent differences in the data, and different update mechanisms. This method evaluates freshness by using timestamps alongside the data being out sourced. Due to the requirement of verifying not only the freshness of the response, but the correctness of the timestamps as well, two general methods for evaluating and verifying the responses were...
Access Control in Semantic Social Network
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasoul (Supervisor)
Abstract
Growth of tools that ease sharing information and resources in social networks can cause privacy issues for the users. Protecting user’s personal information against unauthorized access is a crucial task, and it is considered as a first step for preserving user’s privacy in such networks. Policies, access control rules, and the way rules are applied to online social networks are issues that are less investigated and most existing frameworks have used simple models. Growth of users joining social networks and significant volume of resources shared in these networks make such environments suitable for using semantic technology. Semantic technology is used for modeling various resources, users,...
Selecting and Optimizing Portfolio Using Methaheuristic Methods
, M.Sc. Thesis Sharif University of Technology ; Rmezanian, Rasoul (Supervisor)
Abstract
Portfolio is a collection of different stocks for investment. The investors' objectives in portfolio formation are to get the highest return against exposure to the lowest risk. Portfolio Optimization Problem is one of the most complicated problems in investment and finance. It may be simply explained as follows: Let's imagine a set of N stocks for selection. We would like to see what percentage of the total amount of investment should be dedicated to each stock to maximize portfolio's total return and minimize its total risk.
Portfolio Optimization Problem is a NP-Hard problem and generally there exists no polynomial-time deterministic algorithm to find a precise solution to such a...
Portfolio Optimization Problem is a NP-Hard problem and generally there exists no polynomial-time deterministic algorithm to find a precise solution to such a...
“Determination of Economic Order and Production Quantity in Inventory System Regarding the Quality of Items”
, M.Sc. Thesis Sharif University of Technology ; Haji, Rasoul (Supervisor)
Abstract
EOQ and EPQ models have been among the most important and commonly used techniques for about 100 and 60 years respectively .But, they are involved in some assumptions that sometimes prevent them from being implemented in real situation of industry and production. One of these unrealistic assumptions is that all of items received or produced are of perfect quality. In order to overcome this constraint and make the mentioned models closer to the real environmentsome researches have been done. To this end,following the previous attemptsin this project we assumed to have destructive inspections and existence of imperfect and rejected items after rework. In our models, considering 3 circumstances...
Formal Verification of Privacy Property Using Applied Pi Calculus and Epistemic Logic
, M.Sc. Thesis Sharif University of Technology ; Ramezanian, Rasoul (Supervisor)
Abstract
Applied pi calculus is a variant of the pi calculus with extensions for modeling cryptographic protocols. In such a calculus, the security guarantees are usually stated as equivalences. While process calculi provide a natural means to describe the protocols themselves, epistemic logics are often better suited for expressing certain security properties such as secrecy and anonymity. These methods studied in this work to investigation the verification of privacy properties in security protocols. And finally, a new approach is introduced to bridge the gap between these two approaches: using the set of traces generated by a process as models. In this method an epistemic logic has constructs for...
Developing Inventory Control Policies with No Ordering Costs in Two-Echelon Supply Chains
, Ph.D. Dissertation Sharif University of Technology ; Haji, Rasoul (Supervisor)
Abstract
This dissertation attempts to develop four inventory control models for two-echelon supply chains. For the all models, the retailers face Poisson demand and lost sales during a stockout. There is also a time-dependent holding cost and a cost per unit of lost sales. However, there is no (or negligible) cost associated with placing an order.
For the first model, we consider a two-echelon inventory system with one central warehouse and a number of retailers. The central warehouse applies (R, Q) policy and retailers apply base stock policy. In this model, we approximate the arrival process of the central warehouse and obtain the total cost of the system, as well as the optimal solution....
For the first model, we consider a two-echelon inventory system with one central warehouse and a number of retailers. The central warehouse applies (R, Q) policy and retailers apply base stock policy. In this model, we approximate the arrival process of the central warehouse and obtain the total cost of the system, as well as the optimal solution....