Loading...
Search for:
feghhi--amir-hossein
0.135 seconds
Total 2214 records
Short Term and Long Term Analysis of Radiation Damage in Carbon Based Steels with Emphasis on Reactor Pressure Vessel
, Ph.D. Dissertation Sharif University of Technology ; Samadfam, Mohammad (Supervisor) ; Feghhi, Amir Hossein (Supervisor)
Abstract
Steels as structural materials of pressure vessels of nuclear reactors, in addition to high temperatures and pressures, are exposed to ionizing radiation such as neutrons. The primary effects of damage caused by exposing these solids to radiation are the displacement of atoms from their equilibrium positions and the formation of point defects and damage clusters caused by damage accumulation due to displacement cascades produced by transmitting the energy of the incident particle to an atom by interactions such as elastic and inelastic scatterings neutrons with the nucleus. These microstructural changes cause large structural defects such as swelling, cracking, cracking, creep, reducing...
Development a Computer Program for Burn-Up Calculation Using Monte-Carlo Method
, M.Sc. Thesis Sharif University of Technology ; Ghofrani, Mohammad Bagher (Supervisor) ; Feghhi, Amir Hossein (Supervisor)
Abstract
Burnup calculations based on the Monte Carlo method have been developed in line with the improvements in computing technology. Nowadays, in the field of nuclear reactor physics, it is possible to perform burnup calculation in a detailed 3D geometry and continuous energy description by the Monte Carlo method. COMB is a fully automated code in DELPHI 7 that links the MCNP4C Monte Carlo transport code with the radioactive decay and burnup calculation code system, ORIGEN2.1. The principal function of COMB is first to transfer one-group cross sections and fluxes from MCNP4C to ORIGEN2.1, and then transfer the resulting material compositions (after irradiation and/or decay) from ORIGEN2.1 back to...
Feasibility Study and Conceptual Design of A Radioisotope Thermoelectric Generator
,
M.Sc. Thesis
Sharif University of Technology
;
Vosoughi, Naser
(Supervisor)
;
Feghhi, Amir Hosain
(Supervisor)
Abstract
Radioisotope thermoelectric generator (RTG) is a kind of nuclear batteries, in which thermal energy resulting from the discharge of charged particles decayed of radioisotope, using thermoelectric arrays, can be converted to electrical energy. In this study, the different kinds of RTGs introduced and applications of them have been expressed. All types of radioisotopes used in RTGs have been reviewed and the most suitable of them in terms of maximum thermal power density and minimum dose rate have been selected. All types of thermoelectrics used in RTGs have been reviewed and the most suitable of them in terms of the range of temperature and maximum efficiency have been selected.
In this...
In this...
Graph homomorphisms through random walks [electronic resource]
, Article Journal of Graph Theory ; 2003, Volume 44, Issue 1, pages 15–38 ; Hajiabolhassan, Hossein ; Sharif University of Technology
Abstract
In this paper we introduce some general necessary conditions for the existence of graph homomorphisms, which hold in both directed and undirected cases. Our method is a combination of Diaconis and Saloff–Coste comparison technique for Markov chains and a generalization of Haemers interlacing theorem. As some applications, we obtain a necessary condition for the spanning subgraph problem, which also provides a generalization of a theorem of Mohar (1992) as a necessary condition for Hamiltonicity. In particular, in the case that the range is a Cayley graph or an edge-transitive graph, we obtain theorems with a corollary about the existence of homomorphisms to cycles. This, specially, provides...
Unique list-colourability and the fixing chromatic number of graphs [electronic resource]
, Article Discrete Applied Mathematics ; Volume 152, Issues 1–3, 1 November 2005, Pages 123–138 ; Hajiabolhassan, Hossein ; Sharif University of Technology
Abstract
In this paper we introduce a chromatic parameter, called the fixing chromatic number, which is related to unique colourability of graphs, in the sense that it measures how one can embed the given graph G in G∪Kt by adding edges between G and Kt to make the whole graph uniquely t-colourable. We study some basic properties of this parameter as well as its relationships to some other well-known chromatic numbers as the acyclic chromatic number. We compute the fixing chromatic number of some graph products by applying a modified version of the exponential graph construction
Circular colouring and algebraic no-homomorphism theorems
, Article European Journal of Combinatorics ; Volume 28, Issue 6, August 2007, Pages 1843–1853 ; Hajiabolhassan, Hossein ; Sharif University of Technology
Abstract
In this paper, we apply some new algebraic no-homomorphism theorems in conjunction with some new chromatic parameters to estimate the circular chromatic number of graphs. To show the applicability of the general results, as a couple of examples, we generalize a well known inequality for the fractional chromatic number of graphs and we also show that the circular chromatic number of the graph obtained from the Petersen graph by excluding one vertex is equal to 3. Also, we focus on the Johnson–Holroyd–Stahl conjecture about the circular chromatic number of Kneser graphs and we propose an approach to this conjecture. In this regard, we introduce a new related conjecture on Kneser graphs and we...
Density and power graphs in graph homomorphism problem
, Article Discrete Mathematics ; Volume 308, Issue 17, 6 September 2008, Pages 4027–4030 ; Hajiabolhassan, Hossein ; Sharif University of Technology
Abstract
We introduce two necessary conditions for the existence of graph homomorphisms based on the concepts of density and power graph. As corollaries, we obtain a lower bound for the fractional chromatic number, and we set forward elementary proofs of the facts that the circular chromatic number of the Petersen graph is equal to three and the fact that the Coxeter graph is a core
On the isoperimetric spectrum of graphs and its approximations [electronic resource]
, Article Journal of Combinatorial Theory, Series B ; Volume 100, Issue 4, July 2010, Pages 390–412 ; Hajiabolhassan, Hossein ; Javadi, Ramin ; Sharif University of Technology
Abstract
In this paper1 we consider higher isoperimetric numbers of a (finite directed) graph. In this regard we focus on the nth mean isoperimetric constant of a directed graph as the minimum of the mean outgoing normalized flows from a given set of n disjoint subsets of the vertex set of the graph. We show that the second mean isoperimetric constant in this general setting, coincides with (the mean version of) the classical Cheeger constant of the graph, while for the rest of the spectrum we show that there is a fundamental difference between the nth isoperimetric constant and the number obtained by taking the minimum over all n-partitions. In this direction, we show that our definition is the...
Structural Health Monitoring Using Optimal Finite Element Model Based on Digital Image Correlation
, M.Sc. Thesis Sharif University of Technology ; Khaloo, Alireza (Supervisor)
Abstract
The purpose of this research is to monitor the health of structures using the updated finite element model, in which digital images are used to optimize the numerical model. Structural Health Monitoring (SHM) is always an important and significant issue that has attracted the attention of many researchers in recent years. In general, some researches have been conducted in this field using physical sensors that provide discrete data to the system for analysis. Using cameras to monitor the structure makes it possible to extract continuous and integrated data from the structure using digital images, which is a significant advantage compared to physical sensors.In this research, a steel...
Semisolid Stir Joining of As-Cast Silicon-Aluminum Bronze
, M.Sc. Thesis Sharif University of Technology ; Kokabi, Amir Hossein (Supervisor) ; Ashuri, Hossein (Supervisor)
Abstract
Aluminum Bronzes have many applications in marine environments. These alloys suffer from both hot cracking and cold cracking. In order to overcome the hot cracking and cold cracking, Semisolid Stir Joining method and a proper thermal cycle was used respectively. Effects of temperature, stirring rate, and tool type were investigated in Semisolid Stir joining method. In this method, butt joint design was used in order to place specimens, and the specimens were heated up to specific temperatures (920, 925, 930°C). A stirrer (Cylindrical and Grooved tool) with three rotational speeds (800, 1200, 1600 RPM) was introduced into the stir weld seam. Welded specimens were cooled to the 900°C...
Analysis and Evaluation of Routing Protocols Conformance Test
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Nowadays, one of the problems of network designers and users is the correctness of network equipment functionality. Since routers play an important role in information transfer between various networks and communicate with each other through a routing protocol, any violation of such protocol can result in the network's failure or defective transfer of data. Thus, being assured of the conformance of the implemented protocol in a router with what has been defined in the protocol's standard is of great significance. To this end, before using or exposing a router, network equipment testers should run protocol conformance tests on it and insure its correct functionality. This brings up the...
Network Traffic Analyzer
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
In order to increase the network performance, to discover network security threats, to guarantee the quality of services, to simulate networks and develop new network protocols, network designers and operators need software tools to analyze the network traffic. The first step to do this analysis is network monitoring. This can be done by using various software and hardware tools.
In this research we developed a tool which analyzes the network traffic using appropriate statistical methods. The models which are analyzed in this application are: Poisson, Self-similar and Weibull. This application analyzes the network traffic based on this statistical models and calculates their parameters....
In this research we developed a tool which analyzes the network traffic using appropriate statistical methods. The models which are analyzed in this application are: Poisson, Self-similar and Weibull. This application analyzes the network traffic based on this statistical models and calculates their parameters....
Analysis and Evaluation of Real Timeliness and Safety of VANET
,
M.Sc. Thesis
Sharif University of Technology
;
Jahangir, Amir Hossein
(Supervisor)
Abstract
The increasing number of road accidents and fatalities have yielded the introduction of several solutions by related industries such as automobile manufacture. Proposed solutions can be classified into two categories: passive, such as airbags, and active such as ABS ad ITS-based technologies. Inter vehicles communication let the communication between vehicles(V2V) or between vehicles and road infrastructure (V2I) by relying on DSRC technology and standards. Intelligent Transportation System (ITS) has three main types of applications namely safety, traffic and commercial. Safety applications are the main goal of vehicular communication, and real time guarantee in safety applications is so...
An Efficient Approach for Improving the Performance of Real-time Flow Routing in SDN Controllers
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
In real-time systems, jobs that miss their deadline are considered worthless or ineffective. Nowadays, real-time applications (such as multimedia) that communicate through software-defined networks (SDN) are widely used and will continue to expand in the future. SDN is an emerging network architecture in which control plane is separated from data plane to manage it directly. In this research, we make changes to the controller and the switch used in such network to deliver real time packets or real-time flows (such as video) on time, as much as possible. As missed deadline packets are worthless and they waste bandwidth, dropping them is a solution. Moreover, the controller can drop flows that...
Packet Processing Acceleration for Virtualized Network Functions
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Network Function Virtualization (NFV) is a new paradigm in computer networks for implementing network functions on general-purpose common-of-the-shelf processors. The revolutionized NFV architecture has shown to be a suitable replacement for hardware middleboxes. NFV is in high demand because of its lower costs, increased flexibility, and more scalability. However, the ever-growing volume of network traffic and increased data transfer speed in computer networks have made achieving high performance the major issue in this area. With thousands of processing cores and high memory bandwidth, Graphical Processing Units (GPUs) are potentially an appropriate solution to accelerate network...
Punishment Normative Systems
, M.Sc. Thesis Sharif University of Technology ; Ramezanian, Rasoul (Supervisor)
Abstract
In real life, we can not always expect agents and authorities to have the same desires. Also when it comes to conflicts, agents always tend to break the authorities’ norms to follow their own strategies. Hence we can not expect strict norms to model an actual real life situation.In this article we introduce punishment normative systems, based on multi-agent Marokov chain processes (MMDPs). We try to extend the punishment idea to be also applicable on long-run and infinite strategies. We consider a version of the multi-agent model that is widely used in different situations and then provide an algorithm to find a fair normative system that distributes obligations equally on the agents, while...
Computational Design of Novel Medicines as Inhibitors in Case of Cancer and Autoimmune Disease Treatment Based on Amino Acid and Sugar
, M.Sc. Thesis Sharif University of Technology ; Fattahi, Alireza (Supervisor)
Abstract
SHP2 has been reported as a critical non-receptor phosphatase enzyme that plays crucial roles in numerous disorders like cancer. The previous studies on this enzyme showed that inhibiting the action of the enzyme comes as a way of controlling enzyme activity. SHP099 was discovered as an Allosteric inhibitor of the enzyme with the most inhibitory effect among all of the studied compounds. In this study we aimed to design novel dipeptide-and sugar-based inhibitors for the allosteric binding site of this enzyme with in-silico studies including docking, molecular dynamic simulation, and free binding energy analysis. Our novel designed drugs possess enough binding properties, low toxicity, and...
Reconfigurable Architecture For Cryptanalysis Applications
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Nowadays, the significance of securing data and information is undeniable. Cryptography is being used to provide data security. In addition, cryptanalysis is required to evaluate the effectiveness of cryptography methods, and hence, it is an essential concept for securing data. In general, the cryptography functions shall be designed in a way to impose a high load of time-intensive operations to prevent an adversary from accessing the main data from the encrypted data. As a result, cryptography and cryptanalysis algorithms need high performance computations. So far, a number of methods have been proposed to support the required performance. These methods include: distributed computing and...
Performance Ehancement of Congestion Control Algorithm Through Traffic Flow Istinction
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Congestion is an important issue in the network environment. To keep stable the perfor-mance of the network, congestion control algorithms have been extensively studied. Queue management method employed by the routers is one of the important issues in the congestion control study. Active Queue Management (AQM) has been proposed for early detection of congestion inside the network. AQM mechanisms control the queue length in a router by dropping arriving packets. The Random Early Detection (RED) is the most popular AQM mechanism used in routers on the Intenet to allow network users to simultaneously achieve high throughput and low average delay. The RED algorithm may cause heavy oscillation of...
Modeling and Analysis of Real-time Behaviour of Wireless Sensor Networks
,
Ph.D. Dissertation
Sharif University of Technology
;
Jahangir, Amir Hossein
(Supervisor)
Abstract
Nowadays, information gathering based on wireless sensor network (WSN) has formed various applications and it also seems to be spreading more in future. Wireless sensor network, is a network composed of multiple nodes, without any infrastructure, each having one or more sensors, wireless communications unit, processing unit, memory, and power supply. Memory capacity, computation power, and power supply are usually considered as valuable resources and limited in nodes. Most of sensor nodes are located in a dense mode and they are susceptible to failure. Therefore network topology may vary dynamically. A sensor network can support real-time communications independent of its type of structure...