Loading...
Search for:
dousti--mohammad-sadeq
0.137 seconds
Total 5240 records
Probabilistic CFD Computations of the NASA Low-Speed Centrifugal Compressor (LSCC) under Uncertain Operational Conditions
,
M.Sc. Thesis
Sharif University of Technology
;
Karimi, Mohammad Sadeq
(Supervisor)
Abstract
Centrifugal compressors are widely utilized in various industrial systems; however, their performance under uncertain operating conditions is influenced by random variations parameters. This research presents a comprehensive investigation and analysis of uncertainties in the performance of the NASA low-speed centrifugal compressor (LSCC). The primary focus of this study is to analyze the impact of uncertain operating conditions such as total inlet pressure, total inlet temperature, mass flow rate, inlet flow angle, and rotational speed, all of which are modeled using the beta probability distribution. To conduct this analysis, the non-intrusive polynomial chaos expansion method has been...
Conceptual Analysis and Extension of Zero-Knowledge Models & Definitions
, Ph.D. Dissertation Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
Zero-knowledge proofs are one of the most useful constructions of modern cryptography. Their invention has greatly affected both cryptography and complexity theories. The seemingly paradoxical characteristic of zero-knowledge proofs is that they convince the verifier of the validity of the proposition being proved, yet they yield to further knowledge to him. Two primary applications of zero-knowledge proofs are authentication protocols, as well as sub-protocols which prove that parties involved in some main protocol have acted honestly. In this research, we will survey the models and definitions of zero-knowledge, and analyze their relationship. We then pertain to the interplay between...
An efficient statistical zero-knowledge authentication protocol for smart cards
, Article International Journal of Computer Mathematics ; Volume 93, Issue 3 , 2016 , Pages 453-481 ; 00207160 (ISSN) ; Jalili, R ; Sharif University of Technology
Taylor and Francis Ltd
2016
Abstract
We construct an efficient statistical zero-knowledge authentication protocol for smart cards based on general assumptions. We show how it can be instantiated using lattice-based primitives, which are conjectured to be secure against quantum attacks. We illustrate the practicality of our protocol on smart cards in terms of storage, computation, communication, and round complexities. Furthermore, we compare it to other lattice-based authentication protocols, which are either zero-knowledge or have a similar structure. The comparison shows that our protocol improves the best previous protocol in several aspects
In-plane and transverse eigenmodes of high-speed rotating composite disks
, Article Journal of Applied Mechanics, Transactions ASME ; Volume 80, Issue 1 , 2013 ; 00218936 (ISSN) ; Abbas Jalali, M ; Sharif University of Technology
2013
Abstract
We apply Hamilton's principle and model the coupled in-plane and transverse vibrations of high-speed spinning disks, which are fiber-reinforced circumferentially. We search for eigenmodes in the linear regime using a collocation scheme, and compare the mode shapes of composite and isotropic disks. As the azimuthal wavenumber varies, the radial nodes of in-plane waves are remarkably displaced in isotropic disks while they resist such displacements in composite disks. The reverse of this phenomenon happens for transversal waves and the radial nodes move toward the outer disk edge as the azimuthal wavenumber is increased in composite disks. This result is in accordance with the predictions of...
Forsakes: A forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes
, Article Advances in Mathematics of Communications ; Volume 9, Issue 4 , November , 2015 , Pages 471-514 ; 19305346 (ISSN) ; Jalili, R ; Sharif University of Technology
American Institute of Mathematical Sciences
2015
Abstract
This paper suggests a model and a definition for forward-secure authenticated key exchange (AKE) protocols, which can be satisfied without depending on the Diffie–Hellman assumption. The basic idea is to use keyevolving schemes (KES), where the long-term keys of the system get updated regularly and irreversibly. Protocols conforming to our model can be highly efficient, since they do not require the resource-intensive modular exponentiations of the Diffie–Hellman protocol. We also introduce a protocol, called FORSAKES, and prove rigorously that it is a forward-secure AKE protocol in our model. FORSAKES is a very efficient protocol, and can be implemented by merely using hash functions
Minimal assumptions to achieve privacy in e-voting protocols
, Article 2013 10th International ISC Conference on Information Security and Cryptology, ISCISC 2013 ; 29- 30 August , 2013 ; Kargar, M. A ; Dousti, M. S ; Jalili, R ; Sharif University of Technology
IEEE Computer Society
2013
Abstract
Chevallier-Mames et al, proved that in a specific condition (such as the lack of untappable channels and trusted-third parties), the universal verifiability and privacy-preserving properties of e-voting protocols are incompatible (WOTE'06 and TTE'10). In this paper, we first show a flaw in their proof. Then, we prove that even with more assumptions, such as the existence of TTPs and untappable channels between the authorities, an e-voting protocol is unable to preserve privacy, regardless of verifiability. Finally, we demonstrate that preserving privacy in e-voting protocols requires the provision of at least one of the following assumptions: limited computational power of adversary,...
Construction of an Experimental Device for Foaming Agent and an Experimental Study of the Properties of Foaming Agent
, M.Sc. Thesis Sharif University of Technology ; Bazargan, Mohammad (Supervisor)
Abstract
The primary purpose of acidizing operations in the oil and gas industry is to enhance hydrocarbon production. Acidizing has been a common and conventional method for years, especially when production engineers face issues like declining reservoir pressure leading to reduced production rates. Initially, the treatment solution is referred to as matrix acidizing. In acidizing operations, different additives are combined with the acid to control its behavior in the reservoir. These additives may include iron control agents, corrosion inhibitors, friction reducers, and more. Incompatibility among these additives, the acid, and reservoir fluids can lead to severe damage to the reservoir....
Numerical Analysis of An Annular Gas Turbine Combustor
, M.Sc. Thesis Sharif University of Technology ; Farshchi, Mohammad (Supervisor)
Abstract
The goal of this research is the simulation of the annular combustion chamber of the turbine engine utilized by liquid fuel. The achievement to this goal will lead to create numerical tools for parametric study, analysis and combustion chamber designing.For this reason simple geometry has been considered. This simplicity of geometry causes to facilitate in parametric study and decrease in saving time for modeling and meshing. This combustion chamber is a simplified model of engine CF6. In recent study, the k – ε realizable model has been used for turbulence modeling. For non-adiabatic condition, chemical reaction is dissolved by utilizing probability density function along with laminar...
A misbehavior‐tolerant multipath routing protocol for wireless Ad hoc networks [electronic resource]
, Article International Journal of Research in Wireless Systems (IJRWS) ; Vol. 2, Issue 9, pp. , Sep. 2013 ; Pakravan, Mohammad Reza ; Aref, Mohammad Reza ; Sharif University of Technology
Abstract
Secure routing is a major key to service maintenance in ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. As a result of the resource limitations in such networks nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a novel data redirection method to mitigate the impact of node misbehavior on network...
Theoretical and Experimental Study to Conversion of AUC to UO2 by Microwave Heating
, Ph.D. Dissertation Sharif University of Technology ; Otukesh, Mohammad (Supervisor) ; Ghannadi Maragheh, Mohammad (Co-Advisor) ; Ghasemi, Mohammad Reza (Co-Advisor)Estimating Possible Effects of Subsidies in Competition and Development of Fixed Broadband Internet
, M.Sc. Thesis Sharif University of Technology ; Vesal, Mohammad (Supervisor) ; Rahmati, Mohammad Hossein (Supervisor)
Abstract
In this work, the dynamic competition between firms providing internet services is studied. The framework is Markov equilibrium whereby structural parameters are obtained using two-step estimations, allowing for analyzing the situation in case of subsidies for service upgrade. The results show that such subsidy has little effect on the number of firms while increasing the number of fast firms
SAR Imaging Using the TomoSAR Technique to Resolve Multiple Scatterers
, M.Sc. Thesis Sharif University of Technology ; Bastani, Mohammad Hassan (Supervisor) ; Karbasi, Mohammad (Co-Supervisor)
Abstract
During the last few years, the study of urban environment structures is considered as a research field of interest in remote sensing. In satellite observations of the earth's surface, continuous imaging in terms of time and space has caused the remote sensing technique to be proposed as a useful and efficient tool for the analysis of urban areas. Obtaining quantitative spatial information from the urban environment in fields such as determining the height of buildings plays an essential role in urban planning, monitoring damage to buildings, establishing communication bases and digital cities. During the last two decades, the use of Tomosar approach in order to reconstruct the structures of...
Joint Optimization of Computation Offloading and Resource Allocation in Mobile Edge Computing Networks
, M.Sc. Thesis Sharif University of Technology ; Pakravan, Mohammad Reza (Supervisor) ; Hadi, Mohammad (Co-Supervisor)
Abstract
Mobile edge computing (MEC) is a promising technology that aims to resolve cloud computing’s issues by deploying computation resources at the edge of mobile network and in the proximity of users. The advantages of MEC include reduced latency, energy consumption, and load on access and mobile core networks, to name but a few. Despite all the aforementioned advantages, the mobility of mobile network users causes the traditional MEC architecture to suffer from several issues, such as decreased efficiency and frequent service interruption. One of the methods to manage users’ mobility is virtual machine (VM) migration, where the VM containing the user’s task is migrated to somewhere closer to...
Estimating Price Elasticity of Natural Gas Demand in Iran's Residential Sector: A Regression Discontinuity Approach
, M.Sc. Thesis Sharif University of Technology ; Rahmati, Mohammad Hossein (Supervisor) ; Vesal, Mohammad (Supervisor)
Abstract
Estimating the price elasticity of gas demand involves complexities depending on the gas market structure and pricing mechanisms in different countries. Distinguishing between supply and demand shocks and block pricing are among the main challenges that can cause endogeneity in elasticity estimates. Iran's domestic gas network, one of the largest and most extensive household gas markets, is divided into five climatic zones based on weather conditions. The pricing steps for these five climates during the five cold months are such that a customer in a warmer climate pays higher prices. Conversely, the pricing steps for the seven warm months are the same for all climates. This policy creates a...
Estimate the Effect of Religiosity on Voter Turnout
, M.Sc. Thesis Sharif University of Technology ; Rahmati, Mohammad Hossein (Supervisor) ; Vesal, Mohammad (Supervisor)
Abstract
The correlation between religious adherence and voter turnout is widely studied. However, whether the relation is causal is an open question. We use Household Expenditures and Income Survey (HEIS) data in Iran, which encompasses nine distinct religious expenditures. These expenditures have low correlation with each other and represent different aspects of religious adherence. We use Imamzadeh (some historical holy shrines) as Instruments to estimate the causal effect of religious expenditures on voter turnout. The results reveal that religious expenditures influence both presidential and parliamentary voter turnout, with a notably stronger impact on presidential elections
Analyzing Open Source Software Development Networks Using Community Detection Methods
, M.Sc. Thesis Sharif University of Technology ; Khansari, Mohammad (Supervisor)
Abstract
Free and Open-Source Software (FOSS) is grown rapidly and many researches are conducted to study FOSS developments. The studies aim to help FOSS development by finding bugs, analyzing developers, modeling evolution of software and categorizing them. Finding proper developers or key developers of each group is essential in developing software, recommend developers and assigning bugs to proper developers. Community detection detects groups of nodes having dense connections. The groups represent developers which cooperate closely on developing FOSS. The thesis proposes a method based on evolutionary algorithms and topological analysis to detect communities in open-source software development...
Dispersion Modeling of Air Pollutants from Gas Flares
, M.Sc. Thesis Sharif University of Technology ; Arhami, Mohammad (Supervisor)
Abstract
In the current study, the dispersion of four major air pollutants, sulphur dioxide, nitrogen oxide, carbon monoxide, and particulate matter from gas flares of an oil field, in Iran, was investigated for year 2011 by application of a conventional steady state Gaussian dispersion model, AERMOD. Two scenarios were applied in modeling, first application of flare parameters based on technologies that exist and the other one using new technologies in flares such as steam assisted with better combustion efficiency. Due to the complexity of meteorological parameters in modeling area, CALPUFF model was used in this study. CALPUFF which is a more advanced model that considers the effect of...
Synthesis and Characterization of Cu2ZnSnS4 (CZTS)Thin Films Prepared by Pulsed Laser Deposition Technique
, M.Sc. Thesis Sharif University of Technology ; Mahdavi, Mohammad (Supervisor)
Abstract
The Cu2ZnSnS4 (CZTS) quaternary compound, with suitable optical and electrical properties, is one of the most interesting materials for absorber layer of thin film solar cell. Since all constituents of CZTS, are abundant in earth’s crust and non-toxic, it is a proper replacement for the materials like CdTe and CuInSe2. The CZTS pellet was synthesized by the solid-state reaction and deposited on soda lime glass substrates by pulsed laser deposition (PLD) method. PLD technique has the advantages of offering stoichiometric preservation during the materials transformation from target to substrate and good crystallinity due to the highly energetic species. CZTS has was deposited in order to...
Application of Adaptive Fuzzy Logic Systems in Controller Design of Nonlinear Processes
, M.Sc. Thesis Sharif University of Technology ; Shahrokhi, Mohammad (Supervisor)
Abstract
Most of dynamical models in the real world, have various restrictions and complexities in their structures. These constraints make the controller design much more difficult. In this work, it has been tried to design the controller for two kinds of common dynamical systems in the presence of these restriction by using the fuzzy logic systems. Several restrictions are investigated in this project such as unknown dynamic of the model, unmeasured state variables, unknown control directions, existence of time delay in the input and the state variables, input saturation and controller singularity.The backstepping technique and the dynamic surfaces control approach have been used to design the...
Guarding Polygons with Sliding k-modem Cameras
, M.Sc. Thesis Sharif University of Technology ; Ghodsi, Mohammad (Supervisor)
Abstract
In this thesis, we study the problem of guarding art galleries with sliding cameras and k-transmitter. This problem is a new version of classic art gallery problem, which the goal is covering the entire region with minimum number of guards. In early version of art gallery problem, usually point guards with 360 degree vision were used, but in this thesis we use sliding cameras instead. This new guards specified by an orthogonal segment which entirely settled interior of polygon and can see up to k walls. Based on this two notions (sliding camera and k-transmitter) we say that a guard can see point p, if the intersections number of normal segment through p to corresponding segment of guard...