Loading...
Search for: behrouzi--hamid
0.13 seconds

    Improve the Quality of DOA Estimation by Hankel Matrix Completing

    , M.Sc. Thesis Sharif University of Technology Bokaei, Moahammad (Author) ; Behrouzi, Hamid (Supervisor) ; Amini, Arash (Supervisor)
    Abstract
    In this thesis, we deal with the problem of direction of arrival (DOA) using single-snapshot samples taken from multiple source signals by an array of sensors. The array we are looking for in this work is a uniform linear array. There are many ways to solve this problem, including MUSIC and Prony. But one of the few methods that are able to estimate correctly with single-snapshot samples with incomplete uniform linear arrays in compressed sensing base algorithms. In the first step, we can estimate the data of a incomplete uniform linear array by arranging them in the form of low-rank Hankel matrices and using leverage scores and minimizing the weight nuclear norm. If the weight matrices are... 

    DOA Estimation in Communication Systems Using Deep Neural Networks

    , M.Sc. Thesis Sharif University of Technology Alikhani, Morteza (Author) ; Behrouzi, Hamid (Supervisor) ; Karbasi, Mohammad (Supervisor)
    Abstract
    The purpose of Direction-of-arrival(DOA) estimation in MIMO communication networks is to find the direction of signals that are mixed together and mixed with noise by using an array of multiple receiving antennas. DOA estimation is an important issue in array signal processing. The traditional methods for DOA estimation try to solve this problem with mathematical algorithms. For example, some of these methods are based on parameter estimation; such as DOA estimation methods using maximum likelihood estimation methods. Some of other traditional methods are based on subspace decomposition; Like the famous MUSIC method. The traditional methods of DOA estimation usually have a drawback, and that... 

    Analysis of Synchronization Schemes in OFDM-Based Cellular Cooperative Networks

    , M.Sc. Thesis Sharif University of Technology Sharifi, Shahrouz (Author) ; Hossein Khalaj, Babak (Supervisor) ; Behrouzi, Hamid (Co-Advisor)
    Abstract
    In this thesis, the impact of both time offsets (TOs) and carrier frequency offsets (CFOs) on the average output signal-to-interference-plus-noise ratio (SINR) of OFDM systems is investigated with a novel and simple approach. First, TOs are partitioned into five cases based on how they occur. Then the mathematical models for different cases are derived. Considering CFOs and benefiting from the obtained models, closed-form expression for the SINR in each case is derived. It is proved that, SINR is independent of the observed subcarrier for the given TO and CFO. Besides, it is shown that the performance of the affected system deteriorates rapidly as the number of subcarriers increases. It is... 

    Analysis of Resource Allocation Methods in Massive MIMO Systems using Game Theory

    , M.Sc. Thesis Sharif University of Technology Sadeghi, Ehsan (Author) ; Behrouzi, Hamid (Supervisor) ; Nasiri Kenari, Masoumeh (Co-Supervisor)
    Abstract
    Nowadays increasing demands of Bandwidth, higher data rate and efficiency cause a huge and novel challenges in communicational systems. One of the recent innovative idea to satisfy these increasing demands is Heterogeneous Networks. Compressive deployment of small cell in Heterogeneous Networks can fulfill a large number of satisfactory parameters in wireless networks. After first Presentation of Heterogeneous Networks idea, loads of structure based on them was proposed.In this Research we consider two outstanding and common structure for this technology and analyze the user association and resource allocation problem at their specific structure. The first one is equipped with simple... 

    Using Reinforcement Learning (RL)for Rate Splitting Multi Access (RSMA) assisted Integrated Sensing and Communication (ISAC)System

    , M.Sc. Thesis Sharif University of Technology Ayoubi, Bahare (Author) ; Behrouzi, Hamid (Supervisor) ; Hossein Khalaj, Babak (Supervisor)
    Abstract
    Rate splitting multiple access (RSMA) is an efficient approach that divides massages in space and power domain in specific time and frequency in order to control interference. Therefore, in this approach, the goal is linear precoding and power allocation on the transmitter side and successful interference cancellation (SIC) on the receiver side. On the other hand, integrated sensing and communication (ISAC) is an emerging technology in the new generation of communications (six generation) in which the process of sensing and communication can be done by same hardware and in a same frequency band so it can be more cost-effective. we can use RSMA in ISAC system in the applications which we aim... 

    Multi-cell Cooperative Networks with Limited Cooperation

    , M.Sc. Thesis Sharif University of Technology Barzegar Estanjin, Morteza (Author) ; Hossein Khalaj, Babak (Supervisor) ; Behrouzi, Hamid (Co-Advisor)
    Abstract
    In recent years, base station coordination (also known as network MIMO) has been analyzed as a means of handling inter cell interference. In principle, all base stations might share their CSI and data through backhaul links. Unfortunately, the demands on backhaul capacity and computational power scale rapidly with the number of cells, which makes this approach unsuitable for practical systems. And these problems shift the researches to find ways for turning this idea to an idea that can be used in practical systems. One of the major changes to this idea can be dealing with local CSIT that there would be no need to exchanging CSIT among BSs. The other change that can make the idea to a more... 

    Ranking Farsi Web Pages using Deep Neural Networks

    , M.Sc. Thesis Sharif University of Technology Zinvandi, Erfan (Author) ; Behrouzi, Hamid (Supervisor) ; Mohammadzadeh, Narjes Alhoda (Co-Supervisor) ; Kazemi, Reza (Co-Supervisor)
    Abstract
    The purpose of ranking Persian web pages is to retrieve the highest number of relevant documents related to the search query of Persian language users, with the minimum number of documents returned from the web. Information retrieval is one of the key issues in search engines. In this study, billions of documents were collected from Persian web pages, and due to infrastructure limitations, a few hundred million documents were indexed in a database like Elastic. Now, considering the user’s actual query, relevant documents should be retrieved from the indexed documents. To achieve this goal, a large Persian language model was needed. Existing large language models for Persian were not usable... 

    Analysis of Fuel Gas Distribution in Ethane Cracking Furnace

    , M.Sc. Thesis Sharif University of Technology Behrouzi, Zargham (Author) ; Moosavi, Ali (Supervisor)
    Abstract
    Ethylene process is one of the most complex systems in petrochemical industries.The first section of the ethylene plant is the cracking furnace.The radiant section of predicted olefin furnaces is symmetrical with respect to a plane through the center line of the furnace and at an angle of 90° with the side walls. There are a total of 24 vertical radiant coils located centrally in the firebox wherein, bottom andside wall burners supply the heat necessary. Each four coils known as a ZONE so, as a result there are six zones, called zone A through F. Failures(rapture, creep, material degradation) rate on the coils decreases from zone A to zone F (A, B, C, D, E and F) respectively.From... 

    Extreme Points and Isometries on Vector-Valued Lipschitz Spaces

    , M.Sc. Thesis Sharif University of Technology Behrouzi, Shadi (Author) ; Ranjbar-Motlagh, Alireza (Supervisor)
    Abstract
    For a Banach space E and a compact metric space (X, d), a function F : X → E is a Lipschitz function if there exists k > 0 such that ∥F (x) − F (y)∥ ≤ kd(x, y) for all x, y ∈ X.The smallest such k is called the Lipschitz constant L(F ) for F . The space Lip(X, E) of all Lipschitz functions from X to E is a Banach space under the norm defined by ∥F ∥ = max{L(F ), ∥F ∥∞}, where ∥F ∥∞ = sup{∥F (x)∥ : x ∈ X}.Recent results characterizing isometries on these vector-valued Lipschitz spaces require the Banach space E to be strictly convex. We inves- tigate the nature of the extreme points of the dual ball for Lip(X, E) and use the information to describe the surjective isometries on Lip(X, E) under... 

    Predicting Research Trends by Using Link Prediction in Keywords Network

    , M.Sc. Thesis Sharif University of Technology Behrouzi, Saman (Author) ; Hajsadeghi, Khosrow (Supervisor) ; Kavousi, Kaveh (Co-Advisor)
    Abstract
    The rapid development of scientific areas in this modern era makes the process of finding new field of research slow and laborious for prospective scholars. Thus, having a vision of the future could be helpful to pick a right path for doing researches and ensuring that it is worth to invest in. This thesis seeks to predict research trends by using link prediction approaches on keywords network and discusses about the performance of various algorithms in different situations. Moreover, for the last part of the experiments, novel link prediction algorithms are proposed by the author, enhances the accuracy of prediction results. The data set collected from Sciencedirect and Scopus by a strong... 

    Predicting scientific research trends based on link prediction in keyword networks

    , Article Journal of Informetrics ; Volume 14, Issue 4 , 2020 Behrouzi, S ; Shafaeipour Sarmoor, Z ; Hajsadeghi, K ; Kavousi, K ; Sharif University of Technology
    Elsevier Ltd  2020
    Abstract
    The rapid development of scientific fields in this modern era has raised the concern for prospective scholars to find a proper research field to conduct their future studies. Thus, having a vision of future could be helpful to pick the right path for doing research and ensuring that it is worth investing in. In this study, we use article keywords of computer science journals and conferences, assigned by INSPEC controlled indexing, to construct a temporal scientific knowledge network. By observing keyword networks snapshots over time, we can utilize the link prediction methods to foresee the future structures of these networks. We use two different approaches for this link prediction problem.... 

    Optimizing Transmisson from Distant Wind Farms

    , M.Sc. Thesis Sharif University of Technology Abdollahi Mansourkhani, Hamid Reza (Author) ; Hosseini, Hamid (Supervisor)
    Abstract
    Wind power is site dependent and is by nature partially dispatchable. Furthermore, good wind sites are far from grid. Due to these problems, and along with the existing limitations in the transmission networks, a comprehensive analysis over an extended time is needed to properly explore all potential wind sites for wind capacity allocation. This problem is computationally expensive and decomposition methods are required to break down this problem. Here Benders decomposition approach is used, which is a popular technique for solving large-scale problems, to decompose the original problem into a master and a subproblem. The master problem is a linear problem, which allocates wind capacity to... 

    Synthesis & Characterization of Au-HKUST-1 Nanocomposite and Evaluation of Plasmonic Properties of Gold Nanoparticles in this Nanocomposite

    , M.Sc. Thesis Sharif University of Technology Moazzeni, Hamid Reza (Author) ; Madaah Hosseini, Hamid Reza (Supervisor)
    Abstract
    In the past few years, many research works on the controllable integration of metal nanoparticles and metal-organic frameworks were done, since the obtained composite material shows a synergism effect in catalysis and photocatalysis, drug delivery applications, gas, and energy storage, as well as sensing. For the first time, in this study, we employed template-assisted growth to synthesize Au-HKUST-1 Nanocomposite. XRD analysis entirely confirms that employing this strategy in synthesizing Au-HKUST-1 was wholly successful, and the plasmonic properties of this nanostructure were studied via UV-visible spectroscopy. In the course of synthesis, gold nanoparticles with 70nm diameter were... 

    Identification of the Set of Single Nucleotide Variants in Genome Responsible for the Differentiation of Expression of Genes

    , M.Sc. Thesis Sharif University of Technology Khatami, Mahshid (Author) ; Rabiee, Hamid Reza (Supervisor) ; Beigi, Hamid (Supervisor)
    Abstract
    Single nucleotide polymorphs, There are changes caused by a mutation in a nucleotide in the Dena sequence. Mononucleotide polymorphisms are the most common type of genetic variation. Some of these changes have little or no effect on cells, while others cause significant changes in the expression of cell genes that can lead to disease or resistance to certain diseases. Because of the importance of these changes and their effect on cell function, the relationships between these changes are also important. Over the past decade, thousands of single disease-related mononucleotide polymorphisms have been identified in genome-related studies. Studies in this field have shown that the expression of... 

    Synthesis of Magnetite (Fe3O4)-Avastin Nanocomposite as a Potential Drug for AMD Treatment

    , M.Sc. Thesis Sharif University of Technology Zargarzadeh, Mehrzad (Author) ; Maddah Hosseini, Hamid Reza (Supervisor) ; Delavary, Hamid (Co-Advisor)
    Abstract
    Age-related macular degeneration (AMD) is the most common cause of vision loss in those aged over 50. There are two main types of AMD, Wet and Dry form. Wet AMD is more severe though more treatable. There are three conventional treatments for AMD including laser therapy, surgery and intravitreal injection of anti-VEGF into the eye. Delivery of drugs to the posterior segment of the eye is still challenging and several implants and devices are currently under investigation for their ability to stimulate the retina, producing visual percepts. The application of intravitreal bevacizumab (Avastin) has expanded tremendously from the time of its introduction into ophthalmic care since 3 years ago.... 

    Detection of Central Nodes in Social Networks

    , Ph.D. Dissertation Sharif University of Technology Mahyar, Hamid Reza (Author) ; Movaghar, Ali (Supervisor) ; Rabiee, Hamid Reza (Supervisor)
    Abstract
    In analyzing the structural organization of many real-world networks, identifying important nodes has been a fundamental problem. The network centrality concept deals with the assessment of the relative importance of network nodes based on specific criteria. Central nodes can play significant roles on the spread of influence and idea in social networks, the user activity in mobile phone networks, the contagion process in biological networks, and the bottlenecks in communication networks. High computational cost and the requirement of full knowledge about the network topology are the most significant obstacles for applying the general concept of network centrality to large real-world social... 

    Analysis of Gene Expression Data in Bioinformatics Data Sets Using Machine Learning Approaches

    , M.Sc. Thesis Sharif University of Technology Bagherian, Misagh (Author) ; Beigy, Hamid (Supervisor)
    Abstract
    As a robust and accurate classification of tumors is necessary for successful treatment of cancer, classification of DNA microarray data has been widely used in successful diagnosis of cancers and some other biological diseases. But the main challenge in classification of microarray data is the extreme asymmetry between the dimensionality of features (usually thousands or even tens of thousands of genes) and that of tissues (few hundreds of samples). Because of such curse of dimensionality, a class prediction model could be very successful in classifying one type of dataset but may fail to perform well in some other ones. Overfitting is another problem that prevents conventional learning... 

    Incremental Learning Approach in Spam Detection

    , M.Sc. Thesis Sharif University of Technology Ghanbari, Elham (Author) ; Beygi, Hamid (Supervisor)
    Abstract
    Studies show that a large proportion of sent emails are spam. Spam is one of the major problems of e-mail users that result in wasting time and cost. To overcome this problem different ways are used, one of the best ways is detecting spam based on their contents. Separating legitimate e-mails and spam within their contents can be categorized as text classification. So machine-learning approaches are extremely applied in text classification, that machine-learning algorithms can be used for spam classification. However, in the majority of these algorithms, training phase is in a batch. Whereas using incremental learning algorithms is preferred in many applications, especially spam detections.... 

    Comparision of Single Service Call Admission Control Schemes in Cellular Mobile Networks

    , M.Sc. Thesis Sharif University of Technology Firouzi, Zahra (Author) ; Beigy, Hamid (Supervisor)
    Abstract
    In single service wireless cellular networks, two types of call are defined; new call and handoff call. New call blocking probability and handoff call dropping probability are two major parameters of QoS. Some call admission control schemes are proposed for handling new and handoff calls in the cell for keeping these QoS parameters under suitable values. In this work, we will introduce some call admission control schemes and will show performance analysis, advantages and disadvantages of them (under different channel holding times and same channel holding times for new calls and handoff calls). Then we will focus on two schemes and based on their ideas, we will propose a new call admission... 

    Cost-Sensitive Classifiers and Their Applications

    , M.Sc. Thesis Sharif University of Technology Ahmadi, Zahra (Author) ; Beigy, Hamid (Supervisor)
    Abstract
    Decision making often has different effects and results with unequal importance. Most of classifiers try to minimize the rate of misclassified instances. These classifiers assume equal costs for different misclassification types. However, this assumption is not true in many real world problems and different misclassification types have different costs. These differences can be applied by introducing the cost in the process of learning. In this manner, total cost of misclassification will be the evaluation metric of classification. In order to apply this metric to the problems, new learning algorithms are needed. Cost-sensitive learning is the related area of machine learning which deals with...