Loading...
Search for:
darzi-bourkhani--rasool
0.147 seconds
Total 102 records
Investigation of the Relationship between Microstructure and Mechanical Properties of High Density Polyethylene Film (HDPE) with Bimodal Weight Distribution
, M.Sc. Thesis Sharif University of Technology ; Pircheraghi, Gholamreza (Supervisor)
Abstract
Polymeric film for packaging applications are commonly made from a variety of polyethylenes using a blown film process. Nowadays high density polyethylene with bimodal molecular weight distributions are used to improve the performance and the final properties. In the present study samples with different bimodal molecular weight distribution in a similar film preparation are developed. The EX5 sample from the Jam Petrochemical showed microstructure with heavily oriented stack of lamellae in the machine direction. In contrast, the 7000F sample from the Mehr Petrochemical presented a microstructure with a lower degree of lamellae, containing lamella twist and more link between the crystalline...
Quantitative Evaluation of Seismic Vulnerability of Reinforced Concrete Bridges Pier's Using the Theory of Distributed Plasticity, Plastic Hinges and C/D Methods and Compare their
, M.Sc. Thesis Sharif University of Technology ; Vafaei, Abolhassan (Supervisor)
Abstract
Performance based design was first introduced in order to evaluate seismic vulnerability of structures in retrofitting topic and was rapidly implemented in new design codes. The main cause conducting widely developing of performance based design methods, has been accurate estimation of seismic demand parameters. Since seismic structural members displacement during earthquake has a direct effect on the amount of sustained damages, displacement index has always been a key concept in performance based design. The main goal followed by this research is comparing the results obtained from the standard pushover method (with two theorems of distributed plasticity and plastic hinges) and the...
Developing a Model for Vehicle-kilometer Traveled Estimation in Urban Network: Case Study of Shiraz
, M.Sc. Thesis Sharif University of Technology ; Kermanshah, Mohammad (Supervisor)
Abstract
One of the most important criteria in travel analysis is the vehicle kilometer traveled (VKT). The distance which personal cars, vans or other automobiles travel is measured through this criterion. In addition, the VKT is used in transportation planning, accident analysis, transportation budgets assignment, and estimation of automobile pollutions. In this work we process origin-destination data gathered in Shiraz, Iran to estimate the VKT. To this end, we incorporate the linear regression and geographically weighted regression (GWR) methods. Through this research, data from origin-destination statistics of Shiraz, gathered by the transportation institute of Sharif University of Technology in...
The Study of Currents Caused by the Sunlight in Coastal Areas with Submerged and Emergent Vegetation
, M.Sc. Thesis Sharif University of Technology ; Jamali, Mirmosadegh (Supervisor)
Abstract
Aqueous environment with vegetation in coastal areas plays important role in ecologic systems. The plants in aqueous environment caused to vertical and lateral changes of flow velocity profile. When sunlight penetrates the water, it will turns into heat energy. The plants caused to blocking the light path, to make a difference in temperature and thus the density differences on the horizon. This density gradient will lead to the gravity flow. Due to the observations, in coastal wetlands, beside the plants the emerged from the water, there are some completely submerged plants that their root in the soil and shallow layer of fluid covered on them. This study to approaching the conditions, is...
Development of a New Analytical Model based on Soil-water Retention Curve Microstructure Considering the Effects of Osmotic Potential
, M.Sc. Thesis Sharif University of Technology ; Sadeghi, Hamed (Supervisor)
Abstract
The soil-water retention curves (SWRC) is an unsaturated soil mechanics hydro chemical state surface, which expresses the relationship between the soil suction and water content. The soil-water retention curve could describe the water adsorption and desorption process that happened in soils. The difference between the desorption or drying retention curve and the adsorption or wetting retention curves in a specific soil specimen indicates the hydraulic hysteresis phenomenon. Generally, the amount of water remaining in the drying process is greater than the amount of water adsorbed in the wetting process at a certain amount of suction. Suction due to the combined effects of capillary and...
Incorporation of strong motion duration in incremental-based seismic assessments
, Article Engineering Structures ; Volume 223, Issue 15 , November , 2020 ; Harati, M ; Darzi, A ; Estekanchi, H. E ; Sharif University of Technology
Elsevier Ltd
2020
Abstract
This study proposes a new approach to incorporate motion duration in incremental dynamic assessments. In the proposed methodology, at each intensity level, a simulation-based approach which is verified with actual data is employed to determine the median duration and the median acceleration spectra of ground motions expected to occur at the site. Afterward, at each intensity level, artificial or spectrally matched motions are produced based on the median acceleration spectra and the median duration, indicating that different intensity levels are directly covered by the generated artificial or adjusted motions rather than just scaling up and down a set of recorded ground motions. In the...
A Method for Querying on Encrypted XML Data
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
When organizations prefer to outsource their data, security protection of data will be more important. Using cryptography in addition to access control techniques is a natural way for saving confidentiality of data against untrusted server. However, encryption and decryption of data result in database performance degradation. In such a situation all the information stored in encrypted form, one cannot make the selection on the database content any more. Data should be decrypted first, so an unwilling tradeoff between the security and performance is normally forced. The appropriate approaches to increase the performance are methods to deal directly with the encrypted data without firstly...
Toward A Safe, Assured, and Dynamic Communication Protocol Stack
, Ph.D. Dissertation Sharif University of Technology ; Jalili, Rasool (Supervisor)A Method for Searching on Encrypted Data
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
Using database encryption to protect data in some situations where access control is not soleley enough is inevitable. Database encryption provides an additional layer of protecton to conventional access control techniques. It prevents unauthorized users, including intruders breaking into a network, from viewing the sensitive data. As a result data remains protected even in the event that database is successfully attacked or stolen. However, encryption and decryption of data result in database performance degradation. In the situation where all the information is stored in encrypted form, one cannot make the selection on the database content any more. Data should be decrypted first, so an...
An Intrusion Detection System for the Grid Environment
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
Existing Intrusion Detection Systems (IDSs) are not designed to deal with all categories of processing environments. This thesis focuses on IDSs for the Grid computing environment, and concentrates on feature selection and performance. An existing framework, Globus, is used as the basis for the consideration and development of the research issue in Grid computing. The system is based on two engine designs: (a) Signature and (b) Support Vector Machine; SVM has been selected for pattern discovery in traffic analysis. We found that the performance of the system greatly depends on the efficiency of the underlying framework and the number of Intrusion Detection System instances. We demonstrate...
Alert Correlation Analysis For Intrusion Detection
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
While intrusion detection systems (IDSs) are widely used, large number of alerts as well as high rate of false positive events make such a security mechanism insufficient. Accordingly, a track of recent security research, focused on alert correlation. This thesis proposes a Hidden Markov Model (HMM) based correlation method of intrusion alerts which have been fired from different IDS sensors across an enterprise. We used HMM to predict the next attack class of the intruder that is also known as plan recognition. Our method has two advantages. Firstly, it does not require any usage or modeling of network topology, system vulnerabilities, and system configurations. Secondly, as we perform high...
Security in Concurrent Execution of an Authentication Protocol
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
Today many communications take place over asynchronous insecure networks which do not provide any guarantee of security (as Internet); hence there is a must in authenticating party or parties with which we are going to interact. In many cases, more than two parties (entities) are going to interact, resulting in need of group authentication. Since authentication is inseparable from key exchange, we are going to introduce a new authenticated group key exchange protocol in this thesis which benefits from all known features for such a protocol in the literature such as contributiveness and deniability. To overcome the problem of concurrency, we use a framework dedicated to security in concurrent...
Providing Confidentiality of Outsourced Data through Fragmentation
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
Data outsourcing is considered as a promising approach in today computing and connected world. This approach enables organizations to outsource their data to anexternal third party server which is responsible for storing and propagation of outsourced data. Although data outsourcing offers many benefits, especially for those organizations with limited resources and increaseing data volume, but this approach in security aspects like providing confidentiality and privacy about curious external third party or other threats, is faced by serious challenges. In the recent decade many approaches for solving or at least decreasing the potential threats over providing confidentiality of outsourced...
Evaluation of Security Features of an E-voting Protocol in a Semi-operational Environment
,
M.Sc. Thesis
Sharif University of Technology
;
Jalili, Rasool
(Supervisor)
Abstract
Electronic voting refers to voting methods that is done using electronic devices or via the Internet or Web. Helios and Civitas protocols are among the recent protocols introduced in this field. Importance and high sensitivity of electronic voting protocols has led researchers to pay high attention about their security analysis. In recent years, different approaches have been used to inspect and analyze electronic voting protocols. In many of such approaches, analysis had been done in a very abstract environment and without considering the operational requirements.The purpose of this thesis is to evaluate the security features of electronic voting protocols, considering their operational and...
Optimizing the Total Cost of Inventory Control System in Integrated Multi-Echelon Supply Chain With Time-sensitive Deteriorating Rates
, M.Sc. Thesis Sharif University of Technology ; hajji, Rasool (Supervisor)
Abstract
In this paper, we consider a three-echelon supply chain consisting of a producer, a distributor and a retailer. Generally each echelon tends to minimize his own inventory costs. On the other hand, competitive environment of business market, force companies to develop strategic alliances. In order to boost their partnership, separated echelons must integrate their policies, so that the total cost of the system be minimized. The model, extends the research of Wang et al.(2011) by changing the No shortage assumption into backlog shortage model.
This study assumes different deterioration rates among different echelons, and deterioration rates are time-sensitive, which is very helpful in...
This study assumes different deterioration rates among different echelons, and deterioration rates are time-sensitive, which is very helpful in...
Inventory Ordering System with Fuzzy Parameters in Supply Chain
, M.Sc. Thesis Sharif University of Technology ; Hajji, Rasool (Supervisor)
Abstract
Inventory control has been always considered important due to its prominent role in managing and better application of resources in the field of operational systems. Ordering system or review stock policy in supply chain management can be mentioned as one of the inventory control study fields of management. A lot of researches have been done in investigating ordering system in supply chain under certainty conditions; however, since the real world is full of uncertainties, parameters such as demand cannot be predicted exactly and we encounter with ambiguity. In this case, using crisp (exact) values can cause to decide wrongly (a wrong decision). On the other hand, due to absence of sufficient...
Analysis of End-to-End Electronic Voting Systems
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
End-to-end electronic voting protocols for electronic voting systems are used to hold a secure election with the two features of anonymity and verifiability. Verifiable mixnets are a fundamental element of electronic voting systems, which can keep the voters anonymous by mixing their votes, and provide a verifiability mechanism to prove their performance correctness. As the design of electronic voting protocols is error-prone, researchers consider the use of mathematics-based and systematic methods for their analysis. Therefore, based on formal methods and the process algebra approach, several studies have been conducted to analyze these systems, but none have properly analyzed verifiable...
Optimization of Raw Material Inventory Control System in Khorramshahr Oil Extraction Company Based on ( r,Q ) Optimal Inventory Policy
, M.Sc. Thesis Sharif University of Technology ; Hajji, Rasool (Supervisor)
Abstract
This thesis is related to applying survey of scientific inventory control methods in Khoramshahr Oil Extraction Company (KHOEC). KHOEC is the producer of edible oils in I.R of Iran and is a subset of E.T.K.A holding organization. The inventory costs of high consuming items are studied and optimized based on the optimal ordering policy (r, Q). First, the company raw materials are identified and classified based on ABC analysis method. For developing the new method of inventory control, the demand for each item is predicted, and the probability distribution of demand during the lead time is determined. Then according to this information and the desired service level of management, order point...
Development of Location-Inventory Model in Dual Channel Supply Chain and Solving the Model by Tabu Search Algorithm
,
M.Sc. Thesis
Sharif University of Technology
;
Hajji, Rasool
(Supervisor)
Abstract
This thesis presents a location- inventory model for dual-channel supply chains .Dual-channel supply chains have two channels for sale the traditional in-store (retail) channel and the online (retail) channel.The model assigns online demands to the capacitated stores currently serving in-store demands. Keeping the delivery network of the in-store demands unchanged, the model aims at minimizing the summation of transportation cost, inventory cost, and fixed handling cost in the system while assigning the online demands. We assume that at the beginning of each period a distribution center which just distributes products to the stores, follows an order-up-to policy which increases the total...
A Trust-based Approach for Correctness Verification of Query Results in Data Outsourcing Scenario
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
One of the security issues in database outsourcing scenario is the correctness of the query results. Correctness verification includes integrity, completeness and freshness of the results. Most of the proposed approaches for correctness verification impose high overhead on the components of the scenario which prevents the scenario to implemented in practical applications. In this thesis, we have proposed a probabilistic approach which imposes acceptable overhead for correctness verification of returned results of service provider. The approach uses the previous behavior of the service provider to calculate a trust value toward it which is used to adjust the imposed overhead. In other words,...