Loading...
Search for:
esfahani--mohammad-reza
0.17 seconds
Total 6406 records
Study and Fabrication of Flexible and Stretchable Electronic Circuits
, M.Sc. Thesis Sharif University of Technology ; Sarvari, Reza (Supervisor) ; Kolahdouz Esfahani, Mohammad Reza (Supervisor)
Abstract
In recent years, flexible electronics have started to attract a tremendeos amount of attention, partly on its remarkable growth in new technologies like IoT, wearable electronics, personal and health care devices. This emerging field offers many advantages compared to its traditional rigid counterparts, such as bendability, stretchablity, recyclability and biocompatibility. Inkjet printing is one of the most promising method for realizing flexible electronics due to its low-investment cost, fully additive nature, low material westage, relatively low temperature process and non-contact patterning.A printed circuit board (PCB), is undoubtedly a vital part of any electronics systems. So,...
Investigating Distributed Denial of Service Attacks on MQTT Protocol And Proposal of New Attack Scenarios
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Salmasizadeh, Mahmoud (Co-Supervisor)
Abstract
MQTT (Message Queuing Telemetry Transport) is one of the essential and widely used protocols in the Internet of Things (IoT) networks. It operates at the application layer (Layer 7) for data transmission. As IoT applications using this protocol for communication have grown, securing such systems against security attacks has become a significant challenge. One of the important attacks implementable by IoT networks is Distributed Denial of Service (DDoS) attacks. In this thesis, we initially provide a general overview of IoT security and demonstrate how DDoS attacks disrupt the availability feature in these networks. We then examine known types of DDoS attacks to gain a better understanding of...
3D Reconstruction and Extrinsic Parameters Calibration of Non-Overlapping Cameras
, M.Sc. Thesis Sharif University of Technology ; Razvan, Mohammad Reza (Supervisor) ; Moghadasi, Reza (Co-Supervisor) ; Kamali Tabrizi, Mostafa (Co-Supervisor)
Abstract
Non-overlapping Cameras in multi-camera systems have become prevalent in robotics and computer vision research; therefore, it is possible to cover the wide field of view, and researches have been done for computing extrinsic parameters of cameras. These cameras do not have any overlap in their views, so obtaining the corresponding point in their images is somehow impossible. Light and shadow geometry is analogous to Structure from Motion problem. In this thesis,we study Structure from Motion problem and have tried to propose an approach for estimating extrinsic parameters of non-overlapping cameras in Multi-camera systems. We formulate the problem by using light and shadow geometry and...
Effect of Oleuropein as Green Inhibitor on Corrosion Protection of Painted Steel
, M.Sc. Thesis Sharif University of Technology ; Ghorbani, Mohammad (Supervisor)
Abstract
The corrosion rate of steel (EN 10130 DC-04) in the presence of oleuropein in aqueous corrosive solutions (of different concentrations in 1M and 0.5M hydrochloric acid and also 3.5% sodium chloride) evaluated and results was shown that oleuropein can protect steel surfaces and it acts as good inhibitor. This means that the observations of linear polarization and weight loss experiments showed inhibitor efficiency more than 97% in acidic corrosive medium and above 74% for aqueous solution of 3.5% sodium chloride. Adding oleuropein at different concentrations (i.e. 300 ppm, 700 ppm, and 1000 ppm) to three different types of polymeric paint structures (nitrocellulose alkyd base, acrylic base,...
A misbehavior‐tolerant multipath routing protocol for wireless Ad hoc networks [electronic resource]
, Article International Journal of Research in Wireless Systems (IJRWS) ; Vol. 2, Issue 9, pp. , Sep. 2013 ; Pakravan, Mohammad Reza ; Aref, Mohammad Reza ; Sharif University of Technology
Abstract
Secure routing is a major key to service maintenance in ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. As a result of the resource limitations in such networks nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a novel data redirection method to mitigate the impact of node misbehavior on network...
To Investigate Existence of Equity Premium Puzzel in Tehran Stock Exchange By Stochastic Dominance Method
, M.Sc. Thesis Sharif University of Technology ; Keshavarz Haddad, Gholamreza (Supervisor)
Abstract
In the last 4 years, while the annual investment return on 5 years bank deposits was 25 percent; the total index of Tehran Stock Exchange on average grew by 155 percent. Why the investors are not so willing to invest in the stock market? This research deals with existence of equity premium puzzle in Tehran Stock Exchange. Therefore, the Total Price Index of exchange market is considered as a risky asset and the return on long-term (5 years) deposit is a proxy for risk free asset. Data is monthly and covers the first month of 1380 (Persian Calendar) to the beginning of the second month of 1391 (equivalent to Aug 2010 to Jan 2013); which is converted to real term using monthly inflation rate....
Hyperbolic Branching Brownian Motion
, M.Sc. Thesis Sharif University of Technology ; Esfahani Zade, Mostafa (Supervisor)
Abstract
Hyperbolic branching Brownian motion is a branching diffusion process in which individual particles follow independent Brownian paths in the hyperbolic plane H2, and undergo binary fission(s) at rate λ > 0. It is shown that there is a phase transition in λ : For λ ≤ 1/8 the number
of particles in any compact region of H2 is eventually 0, w.p.1, but for λ > 1/8 the number of particles in any open set grows to ∞ w.p.1. In the subcritical case (λ ≤ 1/8) the set Λ of all limit points in ∂H2 (the boundary circle at ∞) of particle trails is a Cantor set, while in the supercritical case (λ > 1/8) the set Λ has full Lebesgue measure. For λ ≤ 1/8 it is shown that w.p.1 the Hausdorff dimension of Λ...
of particles in any compact region of H2 is eventually 0, w.p.1, but for λ > 1/8 the number of particles in any open set grows to ∞ w.p.1. In the subcritical case (λ ≤ 1/8) the set Λ of all limit points in ∂H2 (the boundary circle at ∞) of particle trails is a Cantor set, while in the supercritical case (λ > 1/8) the set Λ has full Lebesgue measure. For λ ≤ 1/8 it is shown that w.p.1 the Hausdorff dimension of Λ...
Enⅽrypteⅾ Traffiⅽ Anaⅼysis through Expⅼainabⅼe Ⅿaⅽhine Ⅼearning
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
Impressive progress in hardwares and developing encryption algorithms in last two decades are caused increase in using encryption protocols in network communications. In last decade, users use privacy preserving networks like Jap and Tor to protect their privacy. These networks protect users' data from eavesdroppers by using three-layer encryption and intermediate nodes between user and target website. Recent researches show that Deep Neural Networks can predict websites viewed by users with high accuracy. In other words, privacy preserving networks suffer from information leakage. In this research, we introduced some of the most powerful methods in encrypted traffic classification and then...
Deep Learning-Based Procedural Content Generation for Video Games
, M.Sc. Thesis Sharif University of Technology ; Hashemi, Matin (Supervisor)
Abstract
Procedural Content Generation (PCG) is a critical challenge in video game design, aimed at automating the creation of complex maps and levels. This thesis presents a novel deep learning-based approach for PCG that integrates transformer architectures with reinforcement learning techniques. Building on previous works, this research seeks to enhance the quality, diversity, and success rate of generated playable levels. The proposed method utilizes transformer architectures to model sequences of actions, states, and rewards, predicting optimal game content based on past trajectories. Offline datasets, generated by semi-expert agents trained in the PCGRL framework, serve as the foundation for...
A FEM-BEM Model for Investigation of Fuel SlushingEffect on the Supersonic Wing Aeroelasticity
, M.Sc. Thesis Sharif University of Technology ; Haddadpour, Hassan (Supervisor)
Abstract
In the present work the stability analysis for the coupled aeroelasticity and fuel sloshing in supersonic wings is represented. The wing and store structure is modeled using the finite element method. The supersonic wing aerodynamic is modeled by the linear piston theory and store aerodynamic is modeled by the semi-stable slender body piston theory. Fuel sloshing in the store with desired geometry is modeled by the boundary element method. The coupled structure, aerodynamic and sloshing governing equations are drawn by using the Galerkin method and reduce order modeling teqnique for them and an effective numerical model was developed that is capable to analyze the stability for...
Analysis and Improvement of Intrusion Detection Methods in Data Network Routers
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
Abstract
High-quality online services demand reliable and fast packet delivery at the network layer. However, clear evidence documents the existence of compromised routers in the ISP and enterprise networks, threatening network availability and reliability. A compromised router can stealthily drop, modify, inject, or delay packets in the forwarding path to launch Denial-of-Service, surveillance, man-in-the-middle attacks, etc. So researches tried to create intrusion detection methods to identify adversarial routers and switches. To this end, data-plane fault localization (FL) aims to identify faulty links and is an effective means of achieving high network availability. FL protocols use...
Gravity in Noncommutative Geometry
, M.Sc. Thesis Sharif University of Technology ; Esfahani Zadeh, Mostafa (Supervisor)
Abstract
In this thesis, the aim is to stating some of the noncommutative geometry(NCG) applications in formulating and describing the gravity. So, in the first chapter, we will work on some of metric aspects of NCG. In this chapter, we will review elements of the spin geometry, specifically we will define the Dirac operator which is the most important object in this thesis. Then, we will try to find counterparts of some of Riemannian geometric notions like integral and distance in the NCG framework. We will define some notions such as noncommutative infinitesimals, Dixmier trace, Wodzicki residue, noncommutative integral and spectral triples. Then, in the second chapter, we will work on some of the...
Micromechanic Failure Analysis of Carbon/Phenolic Composite Conic Structures under Thermal Loading
, M.Sc. Thesis Sharif University of Technology ; Hosseini Kordkheili, Ali (Supervisor)
Abstract
In this study, through explaining a micromechanical model of progressive damage, failure in a composite conical structure under mechanical and thermal loads with 36 layers of carbon/phenolic material have been studied. To this end, first, mechanical behaviors of composite layers in micro and macro scale and their properties via fiber and matrix characterizations are discussed. In the following, selection of a proper RVE along with different types of boundary conditions on RVE are discussed. Then stress reinforcement coefficients in order to convert the mechanical and thermal stresses from macro to micro scale for carbon / phenolic material are extracted through defining appropriate RVE for...
Topological Defects in Confined Nematics by Planar Anchoring
, M.Sc. Thesis Sharif University of Technology ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Supervisor)
Abstract
Confining nematic liquid crystal between two curved boundary conditions while the nematic molecules have a degenerate planar anchoring leads to complex and beautiful textures of molecular disparagement(defect) in the bulk and on the surfaces. Such the liquid crystal shells are made with double-emulsion techniques in microfluidic devices have provided applications for micro-scale colloidal linkers.In this work, we have numerically minimized the elastic energy in one-constant approximation in present of Fournier’s degenerate surface potential with finite element method. The nematic shell is confined between two spherical surfaces that we have studied the final energies and their related...
Solving Symmetric Nonlinear Equations System Using BFGS Trust Region Quadratic Method
, M.Sc. Thesis Sharif University of Technology ; Razvan, Mohammad Reza (Supervisor) ; Peyghami, Mohammad Reza (Supervisor)Effect of the Geometry of Colloidal Particles on Nematic Liquid Crystals
, Ph.D. Dissertation Sharif University of Technology ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Co-Advisor)
Abstract
A liquid crystal is a state of matter composed of highly anisotropic building blocks. When liquid crystals are exposed to surfaces with given shapes and anchoring conditions, the orientation of their molecules gets spatially disordered and topological defects may form in the system. The interplay between liquid crystals and the geometry and topology of the colloidal particles has motivated extensive recent studies.In this thesis, we present the numerical modeling results for two faceted colloidal particles in a thermotropic nematic liquid crystal. To obtain the equilibrium nematic field with a finiteelement method, we numerically minimize the free energy of the system that based on the...
Design and Implementation of 2.5 Gbps Circuit Switching Fabric
, M.Sc. Thesis Sharif University of Technology ; Pakravan, Mohammad Reza (Supervisor) ; Movahhedy, Mohammad Reza (Supervisor)
Abstract
Providing high bandwidth network infrastructures for ever increasing need of data transport is of great importance. The underling infrastructure for many communication services such as GSM/3G/4G mobile networks and Internet services is Synchronous Digital Hierarchy (SDH) optical transport systems. SDH are standardized protocols that multiplex multiple lower rate digital bit streams, such as E1 and Ethernet, and transfer them synchronously over optical fiber using lasers or LEDs. In addition to high data transfer rates, flexible network management and protection mechanisms have great importance, hence are part of SDH standards. In order to obtain flexible network architecture and protected...
Preserving Privacy in Smart Grid
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
Abstract
Development of Smart Grid and deployment of smart meters in large scale has raised a lot of concerns regarding customers’ privacy. Consequently, several schemes have been proposed to overcome the above mentioned issue. These schemes mainly rely on data aggregation as a method of protecting users’ privacy from the grid operators. However, the main problem with most of these schemes is the fact that they require a large amount of processing power at the meter side. This, together with the fact that smart meters don’t usually have a powerful processor, can cause the unavailability of smart meter data at the required time for operators of the grid, and at the same time disables smart meters from...
Improvement of Routing Security in Ad Hoc Networks Against Several Attacks
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Supervisor)
Abstract
Secure routing is a major key to service maintenance in wireless ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. Wormhole attack is one of the most severe active attacks to mobile ad hoc networks. Noting the resource limitations in such networks, nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a...
Banks Money Creation and the Transmission Mechanism of Shocks
, M.Sc. Thesis Sharif University of Technology ; Madanizadeh, Ali (Supervisor) ; Mahmoodzadeh, Amineh (Supervisor)
Abstract
Banks are not only money brokers but also money creators. The ability of a bank to create money is due to its unique feature in issuing debts (deposits) that are accepted as a medium of exchange by economic agents. Although this bank function has been discussed under the "liquidity transformation" heading under the micro-banking literature, it has been less discussed in macro literature. In this study, we want to examine the consequences of the bank's liquidity transformation function by developing a New-Keynesian model in which banks can finance the economy by voluntarily expanding their balance sheet. To identify the mechanisms that the money creator bank creates in the model, we have...