Loading...
Search for:
baradaran-mohajeri--saha
0.118 seconds
Total 117 records
, M.Sc. Thesis Sharif University of Technology ; Dolati, Abolghasem (Supervisor)
Abstract
Electrodeposition of composite coatings containing nano particles is very important because this technique is simple and economic. In this research, in order to produce a coating with high hardness and wear resistance, Ni-Co/WC nano composite was co-deposited. Watt’s based bath containing cobalt and tungsten carbide was used and parameters such as preparation of solution, concentration of ingredients and current density were controlled and adjusted. Surface morphology, microstructure and mechanical properties of coatings were studied by SEM and AFM microscopes. Mechanism of electrodeposition was investigated by cyclic voltametry, cronoamperometry and cronopotentiometry techniques and...
An Investigation on the Pulse Electrodeposition of Ni-TiO2/TiO2 Multilayer Structures
, Ph.D. Dissertation Sharif University of Technology ; Dolati, Abolghasem (Supervisor) ; Ghorbani, Mohammad (Supervisor)
Abstract
Electrocodeposition of Ni-TiO2 nanocomposite single layers and Ni-TiO2/TiO2 multilayers from Watts bath containing TiO2 sol has been carried out on copper substrate. Cyclic voltammetry and chronoamperometry techniques were applied to study the influence of nickel sulfate and TiO2 sol concentrations on the electrochemical behavior of Ni-TiO2 deposition by direct current. The results clearly showed that at lower sulfate concentrations, the electrodepostion is a diffusion controlled process. Besides, the nucleation mechanism of the nanocomposites at low overpotentials followed the progressive system while at higher overpotentials, it was found to be instantaneous with three-dimensional growth...
Utilizing Gaussian Processes to Learn Dynamics of Unknown Torques Acting on a Spacecraft
, M.Sc. Thesis Sharif University of Technology ; Kiani, Maryam (Supervisor)
Abstract
Accurate and fast attitude estimation of a rigid body plays an essential role in the performance of a vehicle’s control system, especially aerospace vehicles. Ample works have been done to increase the accuracy and speed of the attitude estimation process, but all have been developed according to a model-based approach. This approach assumes that the torques acting on the body have a known dynamical model that is used for the attitude estimation. The purpose of the present research is to estimate the attitude via a model-free approach, i. e. dynamics of the torques acting on the body are no longer assumed to be known, and its learning is the next step. Thus, the problem formulation of this...
Proposing a Combined BTB and Data Cache Architecture for Modern Processors
, M.Sc. Thesis Sharif University of Technology ; Sarbazi Azad, Hamid (Supervisor)
Abstract
Modern pipelined processors use a memory array named Branch Target Buffer (BTB) to reduce the performance penalty due to conditional braches by predicting path of the branch and keeping useful history-based information for future accesses. Today BTB is a fixed size and small memory array located near the processor. By the way, BTB, in the best case, should be large enough to accommodate all conditional branches throughout the running program. Moreover, small size BTB presents much fast access and is practical on-chip storage for a system with limited power budget.
Considering role in the memory hierarchy, on the other hand, the system performance is highly correlated to the L1 data cache...
Considering role in the memory hierarchy, on the other hand, the system performance is highly correlated to the L1 data cache...
Fuzzy system design for automatic irrigation of agricultural fields
, Article Expert Systems with Applications ; Volume 210 , 2022 ; 09574174 (ISSN) ; Tavazoei, M. S ; Sharif University of Technology
Elsevier Ltd
2022
Abstract
One of the main challenges in arid and semi-arid regions is the lack of water for various purposes such as industrial and agricultural applications. The problem is even more significant in traditional agriculture. The geographical location, climatic conditions, average annual rainfall, vegetation, air pollution and turbidity, and canopy of plants are important and lead to different water consumption in plants. Therefore, proper water consumption in agriculture in most countries leads to food security and a better supply of crops. In this research, we propose a fuzzy system that has eight inputs and seven outputs. Inputs include soil moisture, relative humidity, air temperature, wind speed,...
Numerical Solution of 2D Incompressible Flow Using Spectral Difference Method
, M.Sc. Thesis Sharif University of Technology ; Hejranfar, Kazem (Supervisor)
Abstract
In this study, an accurate numerical solution of the two-dimensional incompressible viscous flows is performed by using the spectral difference method on structured grids. The system of equations to be solved here is the preconditioned incompressible Navier-Stokes equations in the primitive variable formulation with the artificial compressibility approach. In the spectral difference method, two sets of the structured points, namely, “solution points” and “flux points” are defined in each cell for supporting the reconstruction of desirable order of accuracy. Here, the formulation of the spectral difference method is derived and the representative form of the solution and flux points for...
Design of Artificial Retina Chip With Incident Light Based Stimulation and Supply
, M.Sc. Thesis Sharif University of Technology ; Fardmanesh, Mehdi (Supervisor)
Abstract
Blindness is one of the destructive results of retinal diseases. Artificial retina is a device which can help blind people with AMD and RP diseases to restore their vision. Prevalent approaches to artificial retina use an external power supply and processor which the data and energy is transmitted to eye through an inductive link. Taking advantages of solar power, in this project we proposed a design which the required stimulation data and energy is produced internally so the patients don’t have to carry the processor and external power supply that is of major concern for them. This is the most important advantage of this device which doesn’t need any maintenance or battery either. In this...
Security Evaluation of Public Key Based Key Management in MANET
, M.Sc. Thesis Sharif University of Technology ; Mohajeri, Javad (Supervisor)
Abstract
Due to popularity of mobile wireless devices, security of mobile ad hoc networks (MANETs) being more important than before. Traditional key management schemes based on symmetric key cryptography are became ineffective because of dynamic and infrastructureless nature of these networks.Recent studies are mainly based on traditional public key cryptography schemes and ID-based cryptography schemes. On the other hand, Contributory schemes seem suitable for MANETs because of their inherent self-organize property. Key update and Key revocation are the fundamental issues of key management schemes in mobile ad hoc networks. Certificateless public key cryptography, in addition to solve those issues,...
Design and Security Analysis of Broadcast Authentication Schemes
, M.Sc. Thesis Sharif University of Technology ; Mohajeri, Javad (Supervisor)
Abstract
With the increase in the usage of wireless networks and smart grid networks and their applications, need for broadcast transmission has been increased dramatically. In order to use these communication, first we need to secure them by cryptographic methods. As authentication is one of the most important aspect of security, introducing secure broadcast authentication schemes are critical. Because of the resources constrainted nodes of these network, it is important to use light cryptographic methods with high security in these schemes. In this work, after analyzing related works, we introduce a new symmetric broadcast authentication scheme which is more efficient in term of memory consumption...
Design and Fabrication of a Free-membrane Type High-Tc Superconducting Wide Band Detector for THz Detection
, Ph.D. Dissertation Sharif University of Technology ; Fardmanesh, Mehdi (Supervisor)
Abstract
A free-membrane superconducting transition edge detector was designed and fabricared for IR and THz detection. YBCO superconducting thin films was grown on SrTiO3 (STO) and Yttria Stabilized Zirconia (YSZ) crystalline substrates using RF magnetron sputtering technique and Metal Organic Deposition method. The electrical and optical characterization of the fabricated transition-edge detectors was carried out in a liquid nitrogen based cooling system. The voltage response of the detector was studied in relation to the thermal parameters and the biasing parameters of the device for optimal design of the transition edge detector. Analytical simulations conducted by applying a one-dimensional...
Modeling the Dynamic Contact with Large Deformations Using the G-ALE-FEM Method
, M.Sc. Thesis Sharif University of Technology ; Khoei, Amir Reza (Supervisor)
Abstract
Contact between different parts of a system and their interactions on each other is one of the most important phenomena that we face in modeling a variety of mechanical issues which should be carefully considered. Sometimes, this phenomenon occurs between different components in a phase and some other times between several phases, which, causes changes in the performance and response of the system. Therefore, in order to investigate its effect in particular on dynamic problems that are subject to severe changes over a short period of time, and to provide more effective methods for dealing with it, the subject of this research has been devoted to dynamic contact modeling with large...
A robust sparse representation based face recognition system for smartphones
, Article 2015 IEEE Signal Processing in Medicine and Biology Symposium - Proceedings, 12 December 2015 ; 2015 ; 9781509013500 (ISBN) ; Joneidi, M ; Rezaeifar, S ; Baradaran Shokouhi, S ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2015
Abstract
Many research works have been done in face recognition during the last years that indicates the importance of face recognition systems in many applications including identity authentication. In this paper we propose an approach for face recognition which is suitable for unconstrained image acquisition and has a low computational cost. Since in practical applications such as in smartphones, imaging conditions are not limited to existing images in the database, robustness of the recognition algorithm is very important. Here a sparse representation framework is proposed which achieves some degree of robustness. Using double sparse representation the high computational cost of sparsity-based...
Layout-Based modeling and mitigation of multiple event transients
, Article IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ; Volume 35, Issue 3 , 2016 , Pages 367-379 ; 02780070 (ISSN) ; Asadi, H ; Bishnoi, R ; Baradaran Tahoori, M ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2016
Abstract
Radiation-induced multiple event transients (METs) are expected to become more frequent than single event transients (SETs) at nanoscale CMOS technology nodes. In this paper, a fast and accurate layout-based soft error rate (SER) assessment technique with consideration of both SET and MET fault models is presented. Despite existing techniques in which the adjacent MET sites are extracted from a logic-level netlist, we conduct a comprehensive layout analysis to obtain MET adjacent cells. Experimental results reveal that the layout-based technique is the only viable solution for identification of the adjacent cells as netlist-based techniques considerably underestimate the overall SER....
Similarity solutions for flow and heat transfer of non-newtonian fluid over a stretching surface
, Article Journal of Applied Mathematics ; Vol. 2014 , 2014 ; Mazloomi, A ; Saha, S. C ; Gu, Y. T ; Sharif University of Technology
2014
Abstract
Similarity solutions are carried out for flow of power law non-Newtonian fluid film on unsteady stretching surface subjected to constant heat flux. Free convection heat transfer induces thermal boundary layer within a semi-infinite layer of Boussinesq fluid. The nonlinear coupled partial differential equations (PDE) governing the flow and the boundary conditions are converted to a system of ordinary differential equations (ODE) using two-parameter groups. This technique reduces the number of independent variables by two, and finally the obtained ordinary differential equations are solved numerically for the temperature and velocity using the shooting method. The thermal and velocity boundary...
On the security of an ECC based RFID authentication protocol
, Article 2012 9th International ISC Conference on Information Security and Cryptology, ISCISC 2012 ; 2012 , Pages 111-114 ; 9781467323864 (ISBN) ; Delavar, M ; Mohajeri, J ; Sharif University of Technology
2012
Abstract
Following the fact that there are some efficient implementations of ECC-based RFID authentication protocols on RFID tags, a new family of RFID authentication protocols known as EC-RAC family has been introduced. However, it has been shown that all the versions of EC-RAC protocols are exposed to privacy and/or security threats. In this paper we analyzed a version of the EC-RAC RFID authentication protocol as well as a version of Schnorr protocol which were presented in a recent work and are claimed to have the demanding requirements. We demonstrated an impersonation attack on the claimed improved EC-RAC, and consequently showed that it would not satisfy the tag authentication property. Also,...
Superpoly algebraic normal form monomial test on Trivium
, Article IET Information Security ; Volume 7, Issue 3 , 2013 , Pages 230-238 ; 17518709 (ISSN) ; Salmasizadeh, M ; Mohajeri, J ; Sharif University of Technology
2013
Abstract
Recently, AIDA/cube testers have been revealed to be useful in building distinguishers for several cryptography schemes. χ2 tests, on the other hand, are well known and extensively used for distinguishing purposes. In this study, the notion of multi-χ2 test and AIDA/cube testers are utilised to introduce the superpoly algebraic normal form monomial test through which the output of reduced round Trivium is distinguished from being random. The test successfully distinguishes the keystream of Trivium with 830 out of 1152 initialisation rounds with a complexity of 239 operations, which is the most effective distinguisher on reduced Trivium thus far. Applying algebraic IV differential attack...
Secure untraceable off-line electronic cash system
, Article Scientia Iranica ; Volume 20, Issue 3 , 2013 , Pages 637-646 ; 10263098 (ISSN) ; Takhtaei, B ; Mohajeri, J ; Sharif University of Technology
2013
Abstract
Eslami and Talebi (2011) [25] proposed an untraceable electronic cash scheme and claimed that their scheme protects the anonymity of customers, detects the identity of double spenders and provides the date attachability of coins to manage the bank database. In this paper, illustrating Eslami and Talebi's scheme, as one of the latest untraceable electronic cash schemes, and showing its weaknesses (in fulfilling the properties of perceptibility of double spender, unforgeability and date attainability of coins) and its faults (related to exchange protocol), we propose a new untraceable electronic cash scheme which is immune to the weaknesses of the former. Our scheme contains anonymity,...
A related key attack on the feistel type block ciphers
, Article German Journal of Agricultural Economics ; Volume 62, Issue SUPPL.1 , 2013 , Pages 221-226 ; 00021121 (ISSN) ; Salmasizadeh, M ; Mohajeri, J ; Sharif University of Technology
2013
Abstract
In this paper we show that Biham's chosen key attack can be generalized to include any block cipher and we give a low complexity chosen key attack on any Feistel type ci-pher. Then we show that the irregularities in the shift pattern of DES key schedule algorithm is not sufficient for the cryptosystem to resist against related key attacks. We have realized our proposition by a counter example in which the E-box of DES is slightly modified whiles other components and among those, the shift pattern in key schedule algorithm is kept unchanged. We have ap-plied a new related key attack on the resulting DES-like cryptosystem and demonstrated that the security of the system decreases drastically
Multiple-chi-square tests and their application on distinguishing attacks
, Article 2011 8th International ISC Conference on Information Security and Cryptology, ISCISC 2011, 14 September 2011 through 15 September 2011, Mashhad ; 2011 , Pages 55-60 ; 9781467300773 (ISBN) ; Salmasizadeh, M ; Mohajeri, J ; Sharif University of Technology
2011
Abstract
Chi-square tests are vastly used for distinguishing random distributions, but extra care must be taken when using them on several independent variables. We noticed, the chisquare statistics, in some previous works, was computed half of its real value. Thus, to avoid possible future confusions, we formulize multiple-chi-square tests. To show the application of multiple-chi-square tests, we introduce two new tests and apply them to Trivium as a special case. These tests are modifications of ANF monomial test and, when applied to Trivium with the same number of rounds, the data complexity of them is roughly 24 times smaller than that of previous ANF monomial test
Electrodeposition of Ni/WC nano composite in sulfate solution
, Article Materials Chemistry and Physics ; Volume 129, Issue 3 , 2011 , Pages 746-750 ; 02540584 (ISSN) ; Dolati, A ; Rezagholibeiki, S ; Sharif University of Technology
2011
Abstract
Metal matrix composite coatings have gained great attention due to their exclusive properties. They have shown the properties of a metallic host material modified by addition of a second phase. In electrodeposition of Ni/WC nano composite, nickel was deposited on the substrates by DC electrodeposition in Watt's based bath containing nickel sulfate, nickel chloride, boric acid and sodium dodecyl sulfate. WC content in the coating was determined by different parameters such as current density, powder content and surfactant amount. Mechanism of electrodeposition was analyzed by cyclic voltammetry and was confirmed by Guglielmi model. Surface morphology was studied by scanning electron...