Loading...
Search for:
doostmohammadian--mohammad-reza
0.189 seconds
Total 6404 records
Developing Control Strategies for Consensus and Coverage in Multi-Agent Systems
, M.Sc. Thesis Sharif University of Technology ; Sayyaadi, Hassan (Supervisor)
Abstract
Over the past few years there has been a rapidly growing interest in analysis, design and optimization of various types of collective behaviors in networked dynamic systems. Collective phenomena (such as flocking, schooling, rendezvous, synchronization, and agreement) have been studied in a diverse set of disciplines. In many applications involving multi-agent systems, groups of agents are required to agree on certain quantities of interest; in other words, it is important to develop information consensus protocols for networks of dynamic agents. There are many practical situations where it is desirable or even required to achieve stable convergence in finite-time domain. In this work, a...
A misbehavior‐tolerant multipath routing protocol for wireless Ad hoc networks [electronic resource]
, Article International Journal of Research in Wireless Systems (IJRWS) ; Vol. 2, Issue 9, pp. , Sep. 2013 ; Pakravan, Mohammad Reza ; Aref, Mohammad Reza ; Sharif University of Technology
Abstract
Secure routing is a major key to service maintenance in ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. As a result of the resource limitations in such networks nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a novel data redirection method to mitigate the impact of node misbehavior on network...
Finite-time consensus in undirected/directed network topologies
, Article ASME 2010 10th Biennial Conference on Engineering Systems Design and Analysis, ESDA2010, 12 July 2010 through 14 July 2010, Istanbul ; Volume 5 , 2010 , Pages 1-6 ; 9780791849194 (ISBN) ; Sayyaadi, H ; Sharif University of Technology
2010
Abstract
The main contribution of this paper is to introduce a novel non-Lipschitz protocol that guarantees consensus in finite-time domain. Its convergence in networks with both unidirectional and bidirectional links is investigated via Lyapunov Theorem approach. It is also proved that final agreement value is equal to average of agents' states for the bidirectional communication case. In addition effects of communication time-delay on stability are assessed and two other continuous Lipschitz protocols are also analyzed
On the observability and controllability of large-scale iot networks: reducing number of unmatched nodes via link addition
, Article IEEE Control Systems Letters ; 2020 ; Rabiee, H. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2020
Abstract
In this paper, we study large-scale networks in terms of observability and controllability. In particular, we compare the number of unmatched nodes in two main types of Scale-Free (SF) networks: the Barabási-Albert (BA) model and the Holme-Kim (HK) model. Comparing the two models based on theory and simulation, we discuss the possible relation between clustering coefficient and the number of unmatched nodes. In this direction, we propose a new algorithm to reduce the number of unmatched nodes via link addition. The results are significant as one can reduce the number of unmatched nodes and therefore number of embedded sensors/actuators in, for example, an IoT network. This may significantly...
On the Observability and Controllability of Large-Scale IoT Networks: Reducing Number of Unmatched Nodes via Link Addition
, Article IEEE Control Systems Letters ; Volume 5, Issue 5 , 2021 , Pages 1747-1752 ; 24751456 (ISSN) ; Rabiee, H. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2021
Abstract
In this letter, we study large-scale networks in terms of observability and controllability. In particular, we compare the number of unmatched nodes in two main types of Scale-Free (SF) networks: the Barabási-Albert (BA) model and the Holme-Kim (HK) model. Comparing the two models based on theory and simulation, we discuss the possible relation between clustering coefficient and the number of unmatched nodes. In this direction, we propose a new algorithm to reduce the number of unmatched nodes via link addition. The results are significant as one can reduce the number of unmatched nodes and therefore number of embedded sensors/actuators in, for example, an IoT network. This may significantly...
Network-based control of epidemic via flattening the infection curve: high-clustered vs. low-clustered social networks
, Article Social Network Analysis and Mining ; Volume 13, Issue 1 , 2023 ; 18695450 (ISSN) ; Rabiee, H. R ; Sharif University of Technology
Springer
2023
Abstract
Recent studies in network science and control have shown a meaningful relationship between the epidemic processes (e.g., COVID-19 spread) and some network properties. This paper studies how such network properties, namely clustering coefficient and centrality measures (or node influence metrics), affect the spread of viruses and the growth of epidemics over scale-free networks. The results can be used to target individuals (the nodes in the network) to flatten the infection curve. This so-called flattening of the infection curve is to reduce the health service costs and burden to the authorities/governments. Our Monte-Carlo simulation results show that clustered networks are, in general,...
Analysis and Improvement of Intrusion Detection Methods in Data Network Routers
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
Abstract
High-quality online services demand reliable and fast packet delivery at the network layer. However, clear evidence documents the existence of compromised routers in the ISP and enterprise networks, threatening network availability and reliability. A compromised router can stealthily drop, modify, inject, or delay packets in the forwarding path to launch Denial-of-Service, surveillance, man-in-the-middle attacks, etc. So researches tried to create intrusion detection methods to identify adversarial routers and switches. To this end, data-plane fault localization (FL) aims to identify faulty links and is an effective means of achieving high network availability. FL protocols use...
Topological Defects in Confined Nematics by Planar Anchoring
, M.Sc. Thesis Sharif University of Technology ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Supervisor)
Abstract
Confining nematic liquid crystal between two curved boundary conditions while the nematic molecules have a degenerate planar anchoring leads to complex and beautiful textures of molecular disparagement(defect) in the bulk and on the surfaces. Such the liquid crystal shells are made with double-emulsion techniques in microfluidic devices have provided applications for micro-scale colloidal linkers.In this work, we have numerically minimized the elastic energy in one-constant approximation in present of Fournier’s degenerate surface potential with finite element method. The nematic shell is confined between two spherical surfaces that we have studied the final energies and their related...
Solving Symmetric Nonlinear Equations System Using BFGS Trust Region Quadratic Method
, M.Sc. Thesis Sharif University of Technology ; Razvan, Mohammad Reza (Supervisor) ; Peyghami, Mohammad Reza (Supervisor)Effect of the Geometry of Colloidal Particles on Nematic Liquid Crystals
, Ph.D. Dissertation Sharif University of Technology ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Co-Advisor)
Abstract
A liquid crystal is a state of matter composed of highly anisotropic building blocks. When liquid crystals are exposed to surfaces with given shapes and anchoring conditions, the orientation of their molecules gets spatially disordered and topological defects may form in the system. The interplay between liquid crystals and the geometry and topology of the colloidal particles has motivated extensive recent studies.In this thesis, we present the numerical modeling results for two faceted colloidal particles in a thermotropic nematic liquid crystal. To obtain the equilibrium nematic field with a finiteelement method, we numerically minimize the free energy of the system that based on the...
Design and Implementation of 2.5 Gbps Circuit Switching Fabric
, M.Sc. Thesis Sharif University of Technology ; Pakravan, Mohammad Reza (Supervisor) ; Movahhedy, Mohammad Reza (Supervisor)
Abstract
Providing high bandwidth network infrastructures for ever increasing need of data transport is of great importance. The underling infrastructure for many communication services such as GSM/3G/4G mobile networks and Internet services is Synchronous Digital Hierarchy (SDH) optical transport systems. SDH are standardized protocols that multiplex multiple lower rate digital bit streams, such as E1 and Ethernet, and transfer them synchronously over optical fiber using lasers or LEDs. In addition to high data transfer rates, flexible network management and protection mechanisms have great importance, hence are part of SDH standards. In order to obtain flexible network architecture and protected...
Preserving Privacy in Smart Grid
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
Abstract
Development of Smart Grid and deployment of smart meters in large scale has raised a lot of concerns regarding customers’ privacy. Consequently, several schemes have been proposed to overcome the above mentioned issue. These schemes mainly rely on data aggregation as a method of protecting users’ privacy from the grid operators. However, the main problem with most of these schemes is the fact that they require a large amount of processing power at the meter side. This, together with the fact that smart meters don’t usually have a powerful processor, can cause the unavailability of smart meter data at the required time for operators of the grid, and at the same time disables smart meters from...
Improvement of Routing Security in Ad Hoc Networks Against Several Attacks
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Supervisor)
Abstract
Secure routing is a major key to service maintenance in wireless ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. Wormhole attack is one of the most severe active attacks to mobile ad hoc networks. Noting the resource limitations in such networks, nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a...
Solving Nonlinear Systems of Mixed Iqualities and Inequalities Via Trust Region Quadratic Methods
, M.Sc. Thesis Sharif University of Technology ; Razvan, Mohammad Reza (Supervisor) ; Payghami, Mohammad Reza (Supervisor)Jamming Resilient Algorithms for Rendezvous in Cognitive Radio Networks
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
Abstract
Dynamic spectrum access with the aid of cognitive radio (CR) technology is a viable solution to spectrum scarcity. There are many military and emergency applications that require the use of cognitive radio ad-hoc networks (CRAHNs). In these net- works, nodes must first find each other in a wide spectrum and then exchange their desired data. The process of finding each other in a multichannel environment is a challenging task and is usually known as rendezvous. Since rendezvous is the first step in communication, disrupting will disable the nodes from establishing proper communication sessions. That results in a drastic degrade in the performance of the network. Therefore, it is important to...
Numerical Study of Spray Impingement to Solid Wall
, M.Sc. Thesis Sharif University of Technology ; Morad, Mohammad Reza (Supervisor) ; Jahannama, Mohammad Reza (Co-Supervisor)
Abstract
Spray-wall impingement is one of the phenomenon that associated in different subject such as spray cooling, combustion chamber and gas turbine. With the impingement of spray to the wall, liquid film begins to form. Wall film characteristics is still an important subject to study. Due to the various stages of liquid film formation from injection of spray till spray-wall impingement, the investigation of this phenomenon is far more complicated. This paper is meant to provide detailed data on spray-wall impingement and wall film formation physics with the help of computational analysis of OpenFOAM . A Lagrangian-Eulerian method based on discrete phase model (DPM) was employed to model...
Assessing and Improving Algorithms to Control the Propagation of Light through Scattering Media
, M.Sc. Thesis Sharif University of Technology ; Rahimitabar, Mohammad Reza (Supervisor) ; Nasiriavanaki, Mohammad Reza (Supervisor)
Abstract
Light propagation through turbid media, such as biological tissues, experience scattering due to inhomogeneous distribution of refractive indices of their microscopic structure. Scattering and diffusion of light not only limit many optical imaging techniques, but are also big challenges for telecommunication, spectroscopy, and other optical techniques. Recently many new imaging methods are developed that work in strongly scattering media such as optical coherence tomography, diffusion tomography, and laser speckle velocimetry. In this thesis, we have studied how wavefront shaping techniques can tackle the problem of scattering. By spatially shaping the wavefront of the incident beam, using...
A novel consensus protocol using facility location algorithms
, Article Proceedings of the IEEE International Conference on Control Applications, 8 July 2009 through 10 July 2009, Saint Petersburg ; 2009 , Pages 914-919 ; 9781424446025 (ISBN) ; Sayyaadi, H ; Moarref, M ; Sharif University of Technology
2009
Abstract
This paper introduces a new consensus protocol whose features are different from known consensus protocols available in the literature. The relation between discrete coverage algorithms over a convex polygon for solving a facility location problem (n-median problem) along with some notions in agreement over acyclic digraphs have been used to establish a novel constrained consensus protocol. Its convergence for the special case of acyclic digraphs with switching topology is presented. Extension of the results for other graph topologies and communication links are left for future works. © 2009 IEEE
Sensor selection cost optimisation for tracking structurally cyclic systems: a P-order solution
, Article International Journal of Systems Science ; Volume 48, Issue 11 , 2017 , Pages 2440-2450 ; 00207721 (ISSN) ; Zarrabi, H ; Rabiee, H. R ; Sharif University of Technology
2017
Abstract
Measurements and sensing implementations impose certain cost in sensor networks. The sensor selection cost optimisation is the problem of minimising the sensing cost of monitoring a physical (or cyber-physical) system. Consider a given set of sensors tracking states of a dynamical system for estimation purposes. For each sensor assume different costs to measure different (realisable) states. The idea is to assign sensors to measure states such that the global cost is minimised. The number and selection of sensor measurements need to ensure the observability to track the dynamic state of the system with bounded estimation error. The main question we address is how to select the state...
Photocatalytic mechanism of action of apatite-coated Ag=AgBr=TiO 2 on phenol and Escherichia coli and Bacillus subtilis bacteria under various conditions
, Article Progress in Reaction Kinetics and Mechanism ; Vol. 1 , Vol.36 (1) , 2011 , pp.38-52 ; Gholami, M. R. (Mohammad Reza) ; Rahimnejad, S. (Sara) ; Pourbaba, R. (Reza) ; Haghighi, S.(Saeed) ; Sharif University Of Technology
2011
Abstract
Multi-component photocatalysts based on apatite-coated Ag/AgBr/TiO(2) were prepared by the deposition method. The effects of various kinds of apatites, with hydroxyl and fluoro substituents, on photocatalytic activity were investigated. The antibacterial processes in the dark, and under visible light, on two types of bacteria indicate that the multi-composites can inhibit the growth of bacteria by two different mechanisms. TEM images and optical microscopic data demonstrate that by attaching the nanosize catalyst to the outer membrane of the cell, the bacteria could not derive nourishment from surrounding media, i.e. this component acts as bacteria-static. The mechanism for deactivation of...