Loading...
Search for: bayat-mazlaghani--mohammad
0.135 seconds

    Investigation And Fabrication Super Hydrophobic Coating On Building Facades

    , M.Sc. Thesis Sharif University of Technology Bayat Mazlaghani, Mohammad (Author) ; Afshar, Abdullah (Supervisor)
    Abstract
    According to the creation of high-rise buildings and structures due to the increase in urbanization and population concentration in cities and attention to the beauty of these structures and the impact of this beauty on the morale of urban people, owners or municipalities costs a lot of money for cleaning the building facade every year. On the other hand, removing contaminants from high-rise buildings facades is difficult and lifethreatening. Today, with the advancement of science and the use of self-cleaning super hydrophobic coatings, many of these costs, as well as threats to life, can be prevented. On the other hand, protection of ancient structures as a cultural capital of a country,... 

    Designing of Magnetic Nanocatalyst and their Application in Oxidation of Alcohols and Other Functional Groups

    , Ph.D. Dissertation Sharif University of Technology Bayat, Ahmad (Author) ; Mahmoodi Hashemi, Mohammad (Supervisor)
    Abstract
    In this thesis, heterogenous catalysts based on magnetic nanoparticles were synthesized. In these catalysts, magnetic nanoparticles were coated with defferent fuctional groups to produce a catalyst with magnetic properties which is easily separated from the reaction medium. The structure of synthesized catalyst was characterized using techniques such as transmission electron microscopy (TEM), scanning electron microscope (SEM), Fourier transform infrared spectroscopy (FTIR), and CHNS elemental analysis. Easy preparation, low cost, biodegradability and high thermal stability are advantages of these catalysts. At the end, the catalytic properties of resulted catalysts were investigated in many... 

    Post-Fault Control of Fault-Tolerant Active Neutral Point Clamped Inverter

    , M.Sc. Thesis Sharif University of Technology Bayat, Yasin (Author) ; Zolghadri, Mohammad Reza (Supervisor)
    Abstract
    The reliability of power converters in various applications, including industrial, military, aerospace, and commercial applications, is of great importance. For this reason, the development of fault-tolerant power converters is crucial from the perspective of system availability and the prevention of adverse consequences. Tolerating various types of faults, maintaining full output capacity after a fault, and cost-effectiveness are the primary challenges for many existing solutions. In this thesis, a fault tolerance solution is presented for a five-level active-neutral-point-clamped converter. The proposed approach enhances fault-tolerant control for the older version of this converter by... 

    Secure Implementation of Cryptographic Algorithms on FPGA

    , M.Sc. Thesis Sharif University of Technology Farzam, Mohammad-Hossein (Author) ; Bayat-Sarmadi, Siavash (Supervisor)
    Abstract
    Security of cryptographic devices lies amongst the most important issues in the field of hardware security. It is frequently seen that in the process of designing cryptographic systems insufficient attention is paid to the physical implementation details. This is happening while a lot of secret information is known to be leaked through side-channels such as power consumption, electromagnetic emission and execution time. Side-channel attacks are able to reveal secret keys by using these side-channel leakages. Additionally, side-channel attacks are one of the most powerful but low-cost attacks that put the security of cryptographic systems in vain. It can be claimed that the most dangerous... 

    Intrusion Detection in Wireless Sensor Networks Using Incremental Emotional Intelligence Models

    , M.Sc. Thesis Sharif University of Technology Bayat, Firoozeh (Author) ; Hashemi Mohammad Abad, Saeid (Supervisor)
    Abstract
    Wireless Sensor Networks (WSNs) are rapidly emerging as an important area in mobile computing research. Applications of WSNs are numerous and growing, some of them are even highly critical, like military or safety applications. Security measures must be applied to protect the network from a variety of attacks. Since no intrusion prevention measure is perfect, intrusion detection becomes an important second wall to protect the network. WSNs have unique nature which is different from other kinds of networks. In this project, we examine the characteristics and vulnerabilities of WSNs and propose a new intrusion detection model to protect the network security. In this work we have not only... 

    Implementing a Variant of Hyperledger Fabric with Post-Quantum Digital Signature

    , M.Sc. Thesis Sharif University of Technology Ziraki, Mohammad Reza (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    Hyperledger Fabric is an open-source modular platform to launch permissioned-blockchains for use cases like banking and supply chains. This system uses the elliptic curve digital signature algorithm to authenticate transactions. The advent and progress of quantum computers have threatened the security of classical cryptographic schemes; therefore, the process of re- placing these schemes with post-quantum alternatives has gained considerable importance.This research intends to replace the elliptic curve digital signature algorithm with post-quantum digital signatures by using the algorithms passed to the third round of the National Institute of Science and Technologies (NIST) post- quantum... 

    High-Performance Architecture for Post-Quantum Cryptography Based on Elliptic Curve Isogeny

    , Ph.D. Dissertation Sharif University of Technology Farzam, Mohammad Hossein (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    Public-key cryptography is vital to secure digital communication. The classic instances of these cryptosystems are insecure against large-scale quantum computers. As a result, post-quantum cryptography has emerged as a replacement, which includes different categories. Isogeny-based schemes are one of the promising candidates mainly because of their smaller public key length. Due to high computational cost of such schemes, efficient implementations are significantly important. In this thesis, we have presented various solutions at three different abstraction layers. At the lowest layer, which deals with modular arithmetic, two hardware architectures are presented to perform modular... 

    Evaluating and Detecting Timing Sid-Channel Attacks on Javascript and Web Acsembly

    , M.Sc. Thesis Sharif University of Technology Mazahery, Mohammad Erfan (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    Side-channel attacks are one of the strongest attacks in hardware security. They exploits the information leaked from the implementation of cryptography systems. One of the most common side channel attacks is Timing-side-channel attacks that exploit the time difference to transmit the information. In recent years, considerable researches have been done on memory-based attacks include DRAM-based attacks and cache attacks as two sub-categories of timing-side-channel attacks. The constraint of these attacks is that adversary must be in the vicinity of the victim system. Since 2015, to overcome this constraint, the researches on implementing timing-side-channel attacks remotely using Javascript... 

    Exploring the Impact of Vegetation Type and Plant Growth Cycle on the Evapotranspiration Storage Selection Function Using Particle Tracking Approach

    , M.Sc. Thesis Sharif University of Technology Bayat Afshary, Nooshdokht (Author) ; Danesh Yazdi, Mohammad (Supervisor)
    Abstract
    StorAge selection (SAS) functions describe the mechanism by which water particles with different ages exit a hydrological system through outfluxes such as streamflow and evapotranspiration (ET). The shape of the ET SAS functions affects the storage residence time distributions, ET travel time distributions, and discharge travel time distributions that control the hydrochemical dynamics of water. They also carry fundamental information to understand the response behavior of the system, and are affected by processes such as precipitation, outflow, ET, as well as the physical properties of the system. To better understand the shape of these functions, other important factors such as the type... 

    An Efficient Secure Function Evaluation by Reducing Data Transfer

    , M.Sc. Thesis Sharif University of Technology Bar Bar Yalame, Mohammad Hossein (Author) ; Bayat-Sarmadi, Siavash (Supervisor)
    Abstract
    Secure computation has obtained significant attention in the literature recently. Classic architectures usually use either the Garbled Circuit (GC) or the Goldreich-Micali-Wigderson (GMW) protocols. The GC and GMW protocols are applied to functions which are represented as a Boolean circuits. So far, to reduce the complexity of communications in these protocols, various methods have been proposed. The best known work in both methods reduces the communication up to almost 2k-bits (k is the symmetric security parameter) for each AND gate, and using XOR gate is free. In this paper, by combining GC and GMW, we propose a scheme that requires an Oblivious Transfer (OT) and a 2-bit data transfer... 

    A method for automatic tuning the memristance of memristive devices with the capacity of applying to memristive memories

    , Article 2012 International Conference on Computer Systems and Industrial Informatics, ICCSII 2012, 18 December 2012 through 20 December 2012 ; December , 2012 ; 9781467351577 (ISBN) Merrikh Bayat, F ; Merrikh Bayat, F ; Mirebrahimi, N ; Sharif University of Technology
    2012
    Abstract
    Memristor is the fourth fundamental passive circuit element which has potential applications in development of analog memristive memories, neuroscience, and brain simulation. In all of these applications the memristance of the device should be adjusted to the desired value, which is currently performed by trial and error. The aim of this paper is to propose a new method and develop a circuit for automatic adjustment of the memristance of memristive devices. The proposed method is based on the sliding mode control and numerical simulations show that it can be used for tuning the memristance of such devices with a high accuracy  

    The neuro-fuzzy computing system with the capacity of implementation on a memristor crossbar and optimization-free hardware training

    , Article IEEE Transactions on Fuzzy Systems ; Vol. 22, Issue. 5 , 2014 , Pages 1272-1287 ; ISSN: 10636706 Merrikh-Bayat, F ; Merrikh-Bayat, F ; Shouraki, S. B ; Sharif University of Technology
    2014
    Abstract
    In this paper, first we present a new explanation for the relationship between logical circuits and artificial neural networks, logical circuits and fuzzy logic, and artificial neural networks and fuzzy inference systems. This shows us that neural networks are working in the same way as logical circuits when the connection between them is through the fuzzy logic. However, themain difference between them is that logical circuits can be constructed without using any kind of optimization-based learning methods. Based on these results, we propose a new neuro-fuzzy computing system. As verified by simulation results, it can effectively be implemented on the memristor crossbar structure and... 

    Memristive fuzzy edge detector

    , Article Journal of Real-Time Image Processing ; Vol. 9, issue. 3 , September , 2014 , pp. 479-489 ; Online ISSN: 1861-8219 Merrikh-Bayat, F ; Bagheri Shouraki, S ; Merrikh-Bayat, F ; Sharif University of Technology
    2014
    Abstract
    Fuzzy inference systems always suffer from the lack of efficient structures or platforms for their hardware implementation. In this paper, we tried to overcome this difficulty by proposing a new method for the implementation of the fuzzy rule-based inference systems. To achieve this goal, we have designed a multi-layer neuro-fuzzy computing system based on the memristor crossbar structure by introducing a new concept called the fuzzy minterm. Although many applications can be realized through the use of our proposed system, in this study we only show how the fuzzy XOR function can be constructed and how it can be used to extract edges from grayscale images. One main advantage of our... 

    Memristor crossbar-based hardware implementation of fuzzy membership functions

    , Article Proceedings - 2011 8th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2011, 26 July 2011 through 28 July 2011 ; Volume 1 , July , 2011 , Pages 645-649 ; 9781612841816 (ISBN) Merrikh Bayat, F ; Shouraki, S. B ; Merrikh Bayat, F ; Sharif University of Technology
    2011
    Abstract
    In May 1, 2008, researchers at Hewlett Packard (HP) announced the first physical realization of a fundamental circuit element called memristor that attracted so much interest worldwide. This newly found element can easily be combined with crossbar interconnect technology which this new structure has opened a new field in designing configurable or programmable electronic systems. These systems in return can have applications in signal processing and artificial intelligence. In this paper, based on the simple memristor crossbar structure, we propose new and simple circuits for hardware implementation of fuzzy membership functions. In our proposed circuits, these fuzzy membership functions can... 

    Joint Channel and Power Allocation in Energy Harvesting-aided D2D Wireless Communication Using Matching Theory

    , M.Sc. Thesis Sharif University of Technology Soleimani, Masoumeh (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor) ; Bayat, Siavash (Co-Supervisor)
    Abstract
    Device to device communication (D2D) in cellular networks is seen as a promising thechnology to assist local communication services. It offers several gains including cellular traffic offloading gain and proximity gain of devices that allows high data rate, low power consumption, low delays and the reuse gain when cellular and D2D links are allowed to utilize same radio resources simultaneously. D2D communication is one of the key enabler for fifth generation (5G) networks. Major bottleneck in the operation of D2D communication is energy. The direct D2D communication can result in energy inefficiency as the battery powered devices are required to perform energy consuming tasks on their own... 

    Numerical Analysis of Hydeogen Producrion with Electrolysis cell, Using Solar Energy

    , M.Sc. Thesis Sharif University of Technology Bayat, Amir Hossein (Author) ; Hakkaki Fard, Ali (Supervisor) ; Bijarchi, Mohammad Ali (Supervisor)
    Abstract
    Hydrogen can serve as a green alternative to fossil fuels and contribute to improving environmental conditions. In this context, reducing the cost of hydrogen production is of fundamental importance. It is necessary to examine the impact of influential environmental parameters on hydrogen production cost reduction. In this study, a relationship for optimizing hydrogen production in two scenarios, with constant anode pressure and variable cathode pressure, as well as both variable anode and cathode pressures, has been presented. Furthermore, the effect of various parameters, including temperature, pressure, proton exchange membrane thickness, and solar cell efficiency, on hydrogen production... 

    Investigation of the scavenging mechanism of tyrosyl radical by hydroxybenzohydroxamic acid derivatives: A DFT study

    , Article Computational and Theoretical Chemistry ; Volume 1018 , 2013 , Pages 35-44 ; 2210271X (ISSN) Bayat, A ; Fattahi, A ; Sharif University of Technology
    2013
    Abstract
    The free radical scavenging activity of a series of hydroxybenzohydroxamic acid derivatives have been studied in gas phase, water and benzene environments, using the density functional theory. Different mechanisms of reactions have been considered: single electron transfer (SET), hydrogen atom transfer (HAT). Rate constants were determined to know if the radical scavenging activity of these compounds proceeds via an H-atom or an electron-transfer mechanism. Calculations showed that the presence of the adjacent hydroxyl groups on phenyl ring increases the radical stability through intramolecular hydrogen bonds. The calculated bond dissociation enthalpy (BDE) values for hydroxyl groups on... 

    A quantum chemical study on the OH radical quenching by natural antioxidant fisetin

    , Article Journal of Physical Organic Chemistry ; Volume 30, Issue 11 , 2017 ; 08943230 (ISSN) Bayat, A ; Fattahi, A ; Sharif University of Technology
    2017
    Abstract
    In this work, the antioxidant ability of fisetin was explored toward hydroxyl (•OH) radical in aqueous and lipid solution using density functional level of theory. Different reaction mechanisms have been studied: hydrogen atom transfer, single electron transfer followed by proton transfer, and radical adduct formation, and sequential proton loss electron transfer. Rate constants for all possible reaction sites have been calculated using conventional transition state theory in conjunction with the Collins-Kimball theory. Branching ratios for the different channels of reaction are reported for the first time. Results show that the reactivity of fisetin toward hydroxyl (•OH) radical takes place... 

    Influence of remote intramolecular hydrogen bonding on the acidity of hydroxy-1,4-benzoquinonederivatives: A DFT study

    , Article Journal of Physical Organic Chemistry ; Volume 32, Issue 4 , 2019 ; 08943230 (ISSN) Bayat, A ; Fattahi, A ; Sharif University of Technology
    John Wiley and Sons Ltd  2019
    Abstract
    In this study, the effects of the remote intramolecular hydrogen bonding on the acidity of hydroxy-1,4-benzoquinone derivatives have been investigated ab initio by employing density functional theory (DFT) methods. The computational studies were performed for both gas and solution (H 2 O, DMSO, and MeCN solutions) phases. Our results indicated that remote hydrogen bonding could play an important role in increasing the acidity of hydroxy-1,4-benzoquinone. Noncovalent interaction reduced density gradient (NCI-RDG) methods were used to visualize the attractive and repulsive interactions in the studied acids and their conjugate bases. Natural bond orbital (NBO) analysis was performed to confirm... 

    An optimal hybrid nuclear norm regularization for matrix sensing with subspace prior information

    , Article IEEE Access ; Volume 8 , 2020 , Pages 130937-130946 Bayat, S ; Daei, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Matrix sensing refers to recovering a low-rank matrix from a few linear combinations of its entries. This problem naturally arises in many applications including recommendation systems, collaborative filtering, seismic data interpolation and wireless sensor networks. Recently, in these applications, it has been noted that exploiting additional subspace information might yield significant improvements in practical scenarios. This information is reflected by two subspaces forming angles with column and row spaces of the ground-truth matrix. Despite the importance of exploiting this information, there is limited theoretical guarantee for this feature. In this work, we aim to address this issue...