Loading...
Search for:
behjati--amin
0.163 seconds
Total 278 records
Microstructural characterisation of deformation behaviour of nickel base superalloy IN625
, Article Materials Science and Technology ; Volume 27, Issue 12 , 2011 , Pages 1858-1862 ; 02670836 (ISSN) ; Asgari, S ; Sharif University of Technology
2011
Abstract
Simple compression and microscopy techniques were employed to characterise the microstructural origin of the deformation behaviour of nickel base superalloy IN625 during large strain testing. The alloy exhibited a four-stage strain hardening response similar to that previously reported for low stacking fault energy face centred cubic alloys. At strains lower than about -0.06 (stage A), a falling regime of the hardening rate was observed. This stage was followed by a second stage (stage B) of slow increasing hardening rate, which was found to be coincident with the formation of Lomer-Cottrell locks. The second falling regime of strain hardening (stage C) was seen in the strain range of -0.25...
Biomechanical assessment of the niosh lifting equation in asymmetric load-handling activities using a detailed musculoskeletal model
, Article Human Factors ; Volume 61, Issue 2 , 2019 , Pages 191-202 ; 00187208 (ISSN) ; Arjmand, N ; Sharif University of Technology
SAGE Publications Inc
2019
Abstract
Objective: To assess adequacy of the National Institute for Occupational Safety and Health (NIOSH) Lifting Equation (NLE) in controlling lumbar spine loads below their recommended action limits during asymmetric load-handling activities using a detailed musculoskeletal model, that is, the AnyBody Modeling System. Background: The NIOSH committee employed simplistic biomechanical models for the calculation of the spine compressive loads with no estimates of the shear loads. It is therefore unknown whether the NLE would adequately control lumbar compression and shear loads below their recommended action limits during asymmetric load-handling activities. Method: Twenty-four static stoop lifting...
Improved K2 algorithm for Bayesian network structure learning
, Article Engineering Applications of Artificial Intelligence ; Volume 91 , 2020 ; Beigy, H ; Sharif University of Technology
Elsevier Ltd
2020
Abstract
In this paper, we study the problem of learning the structure of Bayesian networks from data, which takes a dataset and outputs a directed acyclic graph. This problem is known to be NP-hard. Almost most of the existing algorithms for structure learning can be classified into three categories: constraint-based, score-based, and hybrid methods. The K2 algorithm, as a score-based algorithm, takes a random order of variables as input and its efficiency is strongly dependent on this ordering. Incorrect order of variables can lead to learning an incorrect structure. Therefore, the main challenge of this algorithm is strongly dependency of output quality on the initial order of variables. The main...
Spectral Graph Partitioning
, M.Sc. Thesis Sharif University of Technology ; Daneshgar, Amir (Supervisor)
Abstract
Graph partitioning, or graph clustering, is an essential researa problem in many areas. In this thesis, we focus on the partitioning problem of unweighted undirected graph, that is, graphs for which the weight of all edges is 1. We will investigate spectral methods for solving the graph partitioning and we compare them. In addition to theoretical analysis,We also implement some of spectral algorithms in matlab and apply them on standard graph data sets. Finally, the experimental
results obtained are offering
results obtained are offering
Event-Triggered Strategies for Model Predictive Control of Delayed Linear Systems
, M.Sc. Thesis Sharif University of Technology ; Haeri, Mohammad (Supervisor)
Abstract
Delay is an important factor in modeling and describing many chemical processes, mechanical systems, teleoperation and networked control systems. On the other hand, model predictive control is a very useful and powerful tool for handling different types of systems including time delayed systems. The main disadvantage of model predictive control is massive computational load and which may lead to wasting system resources. One of the best options for dealing with this issue is to employ event-triggered strategy in model predictive control. Using this approach can relax computational efforts and save system resources. This thesis is focused on introducing a robust model predictive control using...
Fundamental Bounds for Clustering of Bernoulli Mixture Models
, M.Sc. Thesis Sharif University of Technology ; Motahari, Abolfazl (Supervisor)
Abstract
A random vector with binary components that are independent of each other is referred to as a Bernoulli random vector. A Bernoulli Mixture Model (BMM) is a combination of a finite number of Bernoulli models, where each sample is generated randomly according to one of these models. The important challenge is to estimate the parameters of a Bernoulli Mixture Model or to cluster samples based on their source models. This problem has applications in bioinformatics, image recognition, text classification, social networks, and more. For example, in bioinformatics, it pertains to clustering ethnic groups based on genetic data. Many studies have introduced algorithms for solving this problem without...
Evaluating the NIOSH Equation Performance to Estimate the Risk of Injury to Spine in Asymmetric Lifting
, M.Sc. Thesis Sharif University of Technology ; Arjmand, Navid (Supervisor)
Abstract
The 1991 NIOSH Lifting Equation (NLE) is widely used to assess the risk of injury to the spine by providing estimates of the recommended weight limit (RWL) in hands. The present study uses the AnyBody modeling software to verify whether the RWL generates L5-S1 within the limits (e.g., 3400 N for compression recommended by NIOSH and 1000 N for shear recommended in the literature). Twenty-four symmetric and asymmetric lifting activities were simulated to evaluate the RWL by the NLE and the L5-S1 loads by AnyBody. In two activities, involving large trunk flexion and 30 and 60 degrees of load asymmetry, the estimated RWL generated L5-S1 spine loads exceeding the recommended limits. The NIOSH...
Adversarial Robustness of Deep Neural Networks in Text Domain
, M.Sc. Thesis Sharif University of Technology ; Soleymani Baghshah, Mahdieh (Supervisor)
Abstract
In recent years, neural networks have been widely used in most machine learning domains. However, it has been shown that these networks are vulnerable to adversarial examples. adversarial examples are small and imperceptible perturbations applied to the input which lead to producing wrong output and thus, fooling the network. This will become an important issue in security related applications of deep neural networks, such as self-driving cars and medical diagnostics. Since, in the wort-case scenario, even human lives could be threatened. Although, many works have focused on crafting adversarial examples for image data, only a few studies have been done on textual data due to the existing...
Analysis and Simulation of a Graphene Based Plasmon Laser
, Ph.D. Dissertation Sharif University of Technology ; Faez, Rahim (Supervisor)
Abstract
In the present thesis, the SPASER is investigated, from theory to structure design. SPASER is a counterpart of laser in 3D subwavelength dimentions. In other words, SPASER does not suffer from the diffraction limit of photons which is a drawback in laser technology. It potentially can generate intense coherent dark and bright surface plasmon modes. The small size of SPASER gives it the capability of being integrated with electronic chips. So, the electronic technology will become faster if the SPASER is realized. In this thesis, we intend to use the unique plasmonic properties of graphene in our designs. Plasmons on graphene platforms have longer propagation length and larger lifetime in...
Failure analysis of holding U-bolts of an automobile wheels
, Article Engineering Failure Analysis ; Volume 16, Issue 5 , 2009 , Pages 1442-1447 ; 13506307 (ISSN) ; Etemadi, A. R ; Edris, H ; Sharif University of Technology
2009
Abstract
Holding U-bolts of an automobile wheels are manufactured from 10B21 boron steel rods. Changing the source of the rods from X to Y, with an identical manufacturing procedure, it was observed that parts fracture at the mechanical straightening stage (final stage of the manufacturing line). In this case study, microscopy techniques and mechanical tests were used to identify the cause of this failure. It was shown that higher contents of carbon and boron of the source Y rods promotes precipitation of boron containing carbides along the grain boundaries. These precipitates act as crack nucleation sites and are responsible for the fracture of the parts under the straightening stage stresses. Based...
Introducing a Simulation-Based Model to Improve the Design and Layout of Workstations Inside Airport Terminals in Iran
, M.Sc. Thesis Sharif University of Technology ; Alvanchi, Amin (Supervisor)
Abstract
The airport terminal is difficult to plan and design due to the different components and the intricate complexity of its parts. At the airport terminal, we face a queue system which simulation is always a good way to analyze. In addition, computer simulation using modern softwares with the capability to model different types of systems, including the airport terminal, while being less realistic than analytical models, is less costly than operational Exercise.In this study, a supportive approach for better and specific management of Iranian airport terminal buildings with discrete-event simulation is proposed, considering the need for managing the airport terminals building in the country and...
Effect of microstructure on attenuation mechanism of ultrasonic waves in carbon steels
, Article Materials Science and Technology ; Volume 26, Issue 4 , 2010 , Pages 482-486 ; 02670836 (ISSN) ; Vahid Dastjerdi, H ; Mahdavi, R ; Rasouli, D ; Sharif University of Technology
2010
Abstract
In this paper, fundamental concepts of ultrasonics and characteristics of distinctive microstructures have been used to simply explain the effect of microstructure on the attenuation mechanism of ultrasonic waves in carbon steels. In addition, it has been shown that application of the second medium hardness instead of the bulk hardness is more appropriate to correlate the sound velocity and the microstructure
Assessment of the Motorized Wedge of the Compact Accelerator and Comparison with the Dosimetric Charactristics
, M.Sc. Thesis Sharif University of Technology ; Sohrabpour, Mostafa (Supervisor) ; Bozorgmehri, Ramin (Supervisor)
Abstract
Compact linear accelerator is equipped with a single fixed motorized wedge that produces different wedge angles by combining an open and a wedged field in the appropriate proportions.
In this work, the required data for the Treatment Planning System, TPS were generated for utilizing Compact motorized wedge, MW and was verified by dosimetry. To verify MW, the accumulated wedge profiles at a depth of 10 cm for different wedge angles were measured using 2-D Profiler and were calculated the wedge angles using an analytical formula. The validity of effective wedge angles 2-D Profiler has been done by determining the wedge angles in accordance with ICRU-24 for compact MW and Telecobalt...
In this work, the required data for the Treatment Planning System, TPS were generated for utilizing Compact motorized wedge, MW and was verified by dosimetry. To verify MW, the accumulated wedge profiles at a depth of 10 cm for different wedge angles were measured using 2-D Profiler and were calculated the wedge angles using an analytical formula. The validity of effective wedge angles 2-D Profiler has been done by determining the wedge angles in accordance with ICRU-24 for compact MW and Telecobalt...
Some results on dominating induced matchings
, Article Graphs and Combinatorics ; Volume 38, Issue 3 , 2022 ; 09110119 (ISSN) ; Baktash, H ; Behjati, A ; Behmaram, A ; Roghani, M ; Sharif University of Technology
Springer Japan
2022
Abstract
Let G be a graph, a dominating induced matching (DIM) of G is an induced matching that dominates every edge of G. In this paper we show that if a graph G has a DIM, then χ(G) ≤ 3. Also, it is shown that if G is a connected graph whose all edges can be partitioned into DIM, then G is either a regular graph or a biregular graph and indeed we characterize all graphs whose edge set can be partitioned into DIM. Also, we prove that if G is an r-regular graph of order n whose edges can be partitioned into DIM, then n is divisible by (2r-1r-1) and n=(2r-1r-1) if and only if G is the Kneser graph with parameters r- 1 , 2 r- 1. © 2022, The Author(s), under exclusive licence to Springer Japan KK, part...
, M.Sc. Thesis Sharif University of Technology ; Alvanchi, Amin (Supervisor)
Abstract
Limited water resources in Iran have made dams an important part of the country’s infrastructure. As a result of the large number of in-progress and expected dam projects in the country, consideration of sustainability factors during planning, construction and operation phases of dam projects can create significant economical, social and environmental impacts in the long term. To come up with an inclusive sustainable development, new sustainability assessment approaches seek for sustainable development at the entire project’s life-cycle; they are looking for sustainable development at all design, construction, operation, maintenance and even demolition phases. In this research we have...
Universal adversarial attacks on text classifiers
, Article 44th IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2019, 12 May 2019 through 17 May 2019 ; Volume 2019-May , 2019 , Pages 7345-7349 ; 15206149 (ISSN); 9781479981311 (ISBN) ; Moosavi Dezfooli, S. M ; Baghshah, M. S ; Frossard, P ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2019
Abstract
Despite the vast success neural networks have achieved in different application domains, they have been proven to be vulnerable to adversarial perturbations (small changes in the input), which lead them to produce the wrong output. In this paper, we propose a novel method, based on gradient projection, for generating universal adversarial perturbations for text; namely sequence of words that can be added to any input in order to fool the classifier with high probability. We observed that text classifiers are quite vulnerable to such perturbations: inserting even a single adversarial word to the beginning of every input sequence can drop the accuracy from 93% to 50%. © 2019 IEEE
Effect of joint clearance and post-braze heat treatment on the microstructure of joints with BNi-4 filler metal and 4130 steel
, Article IBSC 2012 - Proceedings of the 5th International Brazing and Soldering Conference ; 2012 , Pages 410-413 ; 9781615039753 (ISBN) ; Kokabi, A. H ; Behjati, P ; Madaah Hosseini, H. R ; Sharif University of Technology
2012
Abstract
In this work, the influence of the clearance and post-braze heat treatment on the microstructure of 4130 steel joint brazed by BNi-4 filler metal was investigated. Samples with different clearances were heated to 1100°C and hold for 9 min. Then, some were reheated to 800°C(2hr) and 800°C(2hr)+1000°C(2hr), cycle 1 and cycle 2, respectively. Microscopy techniques and micro-hardness test were used to evaluate the microstructures. Results suggested that in this case 25μm clearance can be considered as the optimum value. Also, it was found that high temperature post-braze heat treatment can be applied as a useful technique for decreasing the fraction of the brittle phases at the joint main body
The Insider Threat: Analyzing and Modeling
, M.Sc. Thesis Sharif University of Technology ; Hendesi, Faramarz (Supervisor)
Abstract
Nowadays, most of businesses are becoming computer-based. This trend causes the organizations to become more vulnerable to internal and external threats. Internal threats are done through insiders. Insiders unlike outsiders have capabilities which aid them to easily carry out their illicit activities. Unfortunately, most of research in computer security has focused on the outsider threats, whereas the most damaging is the result of insiders’ illicit activities.This dissertation addresses three primary necessities of the research in the area of insider threat: a consistent definition of insider threat, a classification of types of insider threats, and a classification of vulnerabilities which...
Design of a Plantwide Decentrlized Structure Controller for the Tennessee Eastman Challenge Problem
, M.Sc. Thesis Sharif University of Technology ; Nobakhti, Amin (Supervisor)
Abstract
This project focuses on the Tennessee East-man challange problem(TEP) and the impact of setpoint changes and controller tunning on plant performance and profitability. TE has four major units. it is an unstable system due to the reaction within the reactor and a recycle streamcausing snow ball effect. As a result the control of this system is not easy. The study has been conducted along two main directions. First, selecting the optimal values for the setpoints and applying them in the simulation. secondly, try to find better parameter for controller in simulation. Simulation is based on working of Ricker. In TEP like the other multivariable systems, it is ameanable to use a centralized...
Convex Methods for the Design of Low Order Dynamic Pre-Compensators
, M.Sc. Thesis Sharif University of Technology ; Nobakhti, Amin (Supervisor)
Abstract
Decentralized control is a typical method for the design of industrial MIMO control systems. However, in most multivariable systems, the existence of large interactions limit the achievable performance of such controllers. In the Nyquist Array design method proposed by Rosenbrock, the system interactions can be reduced using a precompensator, such that a decentralized controller may be used with acceptable performance. A well designed pre-compensator will effectively decouple the system and the multivariable systems may be considered as a set of SISO systems. It is therefore obvious that the key element in the Nyquist Array design method is the design of the pre-compensator. There are two...