Loading...
Search for:
ghahri-saremi--maysam
0.099 seconds
Manufacturing and Investigation the Properties of Polyethylene/ Fumed Silica Nanocomposites Via in situ Polymerization
, M.Sc. Thesis Sharif University of Technology ; Ramazani Saadatabadi, Ahmad (Supervisor)
Abstract
In this research UHMWPE/FUMED SILICA nanocomposites with different concentrations of nano fumed silica (0.5, 1.5, 2.5, 4.5 wt %) were prepared via in situ polymerization using a novel Bi-supported Ziegler-Natta catalytic systems. Magnesium etoxide and Fumed Silica functionalized by hydroxyl groups were used as supports of catalyst. TiCl4 accompanied by triethylaluminum constituted Ziegler-Natta catalytic system. Preparation of catalyst and polymerization were done in slurry phase under the argon atmosphere. Scanning Electron Microscopy (SEM) images also certified very good dispersion of fumed silica throughout PE matrix. Intrinsic viscosity measurements showed high molecular weight for...
Spatial Artificial Neural Network (SANN) based regional drought analysis
, Article Proceedings - 2012 4th International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2012 ; 2012 , Pages 3-8 ; 9780769548210 (ISBN) ; Saremi, K ; Saremi, A ; Sadeghi, M ; Sharif University of Technology
2012
Abstract
Drought is one of the most serious hazards that has more effect on human societies than the others. Scentific researches have important roles in drought planning and management of water resources, especially in time of crisis and predicted big event by the event that the crisis management turnover. The main objective of this research is to develop an approach to analyze the spatial patterns of meteorological droughts based on annual precipitation data in Iran. By using a nonparametric spatial analysis neural network algorithm, the normalized and standardized precipitation data are classified into certain degrees of drought severity (extreme drought, severe drought, mild drought, and...
CaDSS: A framework for enhancing decision making in pervasive computing environment
, Article EMS 2009 - UKSim 3rd European Modelling Symposium on Computer Modelling and Simulation, 25 November 2009 through 27 November 2009, Athens ; 2009 , Pages 17-22 ; 9780769538860 (ISBN) ; Sharif University of Technology
2009
Abstract
The role of context for better decision-making has been a topic of significant research effort over the years. Context-aware systems are able to adapt their operations to the current context without explicit user intervention and thus aim at increasing usability and effectiveness by taking environmental context into account. These systems exploit information about the context of use, such as the location, tasks and preferences of the user, in order to adapt their behavior in response to change operating environments and user requirements. Pervasive computing sketches a pleasant vision for future computing environments that computing power is present anywhere anytime. Utilizing context,...
Performance optimization of a plasmonic coupler based on a lossy transmission line
, Article Journal of Nanophotonics ; Volume 12, Issue 2 , May , 2018 ; 19342608 (ISSN) ; Faez, R ; Sharif University of Technology
SPIE
2018
Abstract
The modal analysis of a lossy coupled plasmonic waveguide consisting of two graphene sheets sandwiched among three SiO 2 layers is presented. This analysis extracts even and odd complex propagation constants in addition to even and odd characteristic impedances at various Fermi levels. It is shown that the first even mode is lossless in theory, but other modes are very lossy. Taking into account the losses, first, the transmission line (RLCG) model, including self and mutual elements, is constructed for various Fermi levels and frequencies. Then, the length of a lossy plasmonic directional coupler based on the coupled plasmonic waveguide is designed for a variety of Fermi levels. The...
Minimum length modulator design with a graphene-based plasmonic waveguide
, Article Applied Optics ; Volume 56, Issue 17 , 2017 , Pages 4926-4933 ; 1559128X (ISSN) ; Faez, R ; Sharif University of Technology
2017
Abstract
In this study, we simulated and analyzed a plasmonic waveguide modulator based on a single layer of graphene. It includes a graphene sheet, which sandwiches between two layers of silicon dioxide. Then, some gates are arranged on either side of the waveguide on a periodic structure. When an electric field is applied perpendicular to the waveguide plate, the Fermi level of graphene under the gates changes. Detailed analysis is performed by the method of lines based on Maxwell's equations along the propagation direction of the waveguide. Computation of the multi-gate device starts by examining the effect of the Fermi level. The transmission coefficient of the magnetic-field norms of the...
Analysis and Design of a Graphene-based Plasmonic Modulator
, Ph.D. Dissertation Sharif University of Technology ; Faez, Rahim (Supervisor)
Abstract
In this study, we simulated and analyzed a plasmonic waveguide modulator based on single layer graphene. It includes a graphene sheet, which sandwiches between two layers of silicon dioxide. Then, some gates are arranged on either side of the waveguide on a periodic structure. When an electric field is applied perpendicular to the waveguide plate, the Fermi level of graphene under the gates, changes. Detailed analysis is performed by the method of lines based on Maxwell's equations along the propagation direction of the waveguide. Computation of the multi-gate device starts by examining the effect of Fermi level. Transmission coefficient of the magnetic-field norms of the modulator is...
Hubert Dreyfus on the Impossibility of Artificial Intelligence: Consequences and Implications
, M.Sc. Thesis Sharif University of Technology ; Sefidkhosh, Maysam (Supervisor) ; Taqavi, Mostafa ($item.subfieldsMap.e)
Abstract
Hubert Dreyfus other than being a prominent philosopher is amongst early critics of classical artificial intelligence project which was initialized during 1955-1960. Challenging the rationalist presuppositions of this paradigm, he foresaw various situations where mechanical artificial intelligence based upon modeling the world through symbolic representation and mimicking reason by formalized rules would fail to deliver even remotely similar outputs in digital computers as in human though process and problem solving ability.Twenty years later it became obvious for AI researchers that obstacles like frame problem or lack of common sense would follow their projects no matter what computing...
Effect of different retrofitting techniques on in-plane behavior of masonry wallettes
, Article Construction and Building Materials ; Volume 169 , 2018 , Pages 578-590 ; 09500618 (ISSN) ; Jafari, A ; Bazli, M ; Ghahri, R ; Sharif University of Technology
Elsevier Ltd
2018
Abstract
This paper presents the results of diagonal compression tests conducted on a series of un-reinforced and reinforced masonry specimens. Reinforced specimens were strengthened by using three types of mortar coating (with and without inner reinforcement), mesh reinforcement, and PP-band reinforcement. In particular, four different reinforcement methods with mortar coating (bare mortar coating, coating with steel mesh, coating with polymer reinforcement, and coating with GFRP mesh reinforcement), three different mesh-only reinforcement (steel mesh, polymer mesh with larger grids, and polymer mesh with smaller grids), and 2 different arrangements of PP-bands (4 × 4 and 6 × 6) were tested. Also,...
Effect of the FRP sheet's arrays and NSM FRP bars on in-plane behavior of URM walls
, Article Journal of Building Engineering ; Volume 20 , 2018 , Pages 679-695 ; 23527102 (ISSN) ; Vatani Oskouei, A ; Bazli, M ; Ghahri, R ; Sharif University of Technology
Elsevier Ltd
2018
Abstract
This paper studies the results of compression diagonal tests conducted on a series of retrofitted and non-retrofitted small-scale masonry walls (which are also known as wallettes). Wallettes with the same characteristics and mechanical properties of large masonry walls were retrofitted by using two arrays of glass fiber reinforcement polymer (GFRP) sheets (grid and diagonal), two arrays of carbon fiber reinforcement polymer (CFRP) sheets (grid and diagonal), and near surface mounted bars (steel and GFRP). FRP sheets were applied to both surfaces of the wallettes, and rebar was mounted onto one of the surfaces in two horizontal and two vertical arrangements. All of the methods significantly...
WT-SOBI Method Towards Blind System Identification of Structures
, M.Sc. Thesis Sharif University of Technology ; Kazemi , Mohammad Taghi (Supervisor)
Abstract
Blind source separation methods such as independent component analysis (ICA) and second order blind identification (SOBI) have shown considerable potential in the area of ambient vibration system identification. The objective of these methods is to separate the modal responses, or sources, from the measured output responses, without the knowledge of excitation. Several frequency domain and time domain methods have been proposed and successfully implemented in the literature. Whereas frequency-domain methods pose several challenges typical of dealing with signals in the frequency-domain, popular time domain methods such as NExT/ERA and SSI pose limitations in dealing with noise, low sensor...
Evaluation complexity problem in agent based software development methodology
, Article ICIIS 2007 - 2nd International Conference on Industrial and Information Systems 2007, Peradeniya, 9 August 2007 through 11 August 2007 ; 2007 , Pages 577-584 ; 1424411521 (ISBN); 9781424411528 (ISBN) ; Esmaeili, M ; Rahnama, M ; Sharif University of Technology
2007
Abstract
Several methodologies with their own characteristics have been proposed in the area of agent-oriented software engineering. Consequently, deciding which methodology to select in a specific case is an important issue and it can lead to decrease software development cost and effort. Thus, importance of evaluation of methodologies will be highlighted in choosing the appropriate methodology in the development process of an application. It can also help in developing new methodologies and improving existing ones. In this paper, we are going to provide an evaluation framework of agent oriented methodologies. To demonstrate the usage of the suggested framework, it is applied to evaluate two...
A new routing protocol in mobile ad hoc networks with selfish nodes
, Article SoftCom 2008: 16th International Conference on Software, Telecommuncations and Computer Networks, Split-Dubrovnik, 25 September 2008 through 27 September 2008 ; 2008 , Pages 114-118 ; 9789532900071 (ISBN) ; Mousavi, H ; Movaghar, A ; Sharif University of Technology
2008
Abstract
Mobile Ad hoc Networks (MANETs) are based on the assumption of that all participants in the network cooperate and forward packets towards the destinations. However, due to the limited nature of the nodes' resources, a node may decide not to cooperate to save its resources while still using the network. Such behavior of some nodes may degrade the whole network performance. To cope with such a situation, we propose a Stable path, Low overhead, Truthful, and Cost efficient (SLTC) routing protocol which stimulates nodes to cooperate. SLTC utilizes the game theoretic notion of mechanism design. To the best of our knowledge, SLTC is the first protocol attaining the message complexity of O(nd),...
Performance analysis of SLTC - A table path, low overhead, truthful, and cost efficient routing protocol in MANETs with selfish nodes
, Article 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, 9 December 2008 through 12 December 2008 ; 2008 , Pages 243-250 ; 9780769534732 (ISBN) ; Mousavi, H ; Movaghar, A ; Sharif University of Technology
IEEE Computer Society
2008
Abstract
In New applications of Mobile Ad hoc Networks (MANETs), nodes may decide not to cooperate in routing protocols in order to save their limited resources while still using the network to relay their own traffic. Exhibiting such a selfish behavior by even a few nodes may degrade network performance and other cooperating nodes may find themselves unfairly loaded. To cope with such a situation, we propose a Stable path, Low overhead, Truthful, and Cost efficient (SLTC) routing protocol which stimulates nodes to cooperate and act truthfully by utilizing the game theoretic notion of mechanism design. To the best of our knowledge, SLTC is the first protocol attaining the message complexity of O(nd),...
CEBAC: A decentralized cooperation enforcement based access control framework in MANETs
, Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 427-434 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) ; Mashayekhi, H ; Movaghar, A ; Jalili, R ; Sharif University of Technology
2008
Abstract
Prevention of unauthorized access to services in mobile ad hoc networks is a more sophisticated problem than access control in other networks, due to interconnection facilities and lack of any fixed network infrastructure in such networks. Therefore regarding the nature of these networks, controlling access to services should be in a decentralized manner providing good performance and preserving network security. In this paper, we propose a decentralized Cooperation Enforcement Based Access Control (CEBAC) framework for mobile ad hoc networks. CEBAC comprises several groups of Service Authorizers, each issuing Credentials for access to a specific kind of services. The User Authorization for...
O2DSS: A framework for ontology-based decision support systems in pervasive computing environment
, Article 2nd Asia International Conference on Modelling and Simulation, AMS 2008, Kuala Lumpur, 13 May 2008 through 15 May 2008 ; 2008 , Pages 41-45 ; 9780769531366 (ISBN) ; Esmaeili, M ; Habibi, J ; Ghaffari, A ; Sharif University of Technology
2008
Abstract
Applications in pervasive computing environment exploit information about the context of use, such as the location, tasks and preferences of the user, in order to adapt their behavior in response to changing operating environments and user requirements. Utilizing context with aid of ontology in data and model, decision support systems can provide better and more desirable support to their users. The effects and advantages of exploiting ontology in user modeling and DSS is discussed. We propose a framework of a Ontology-based Decision Support System (O2DSS), including ontology in model base, database and their advantages. © 2008 IEEE
Implementation of Building Information Modeling (BIM) Using Hybrid Z-DEMATEL-ISM Approach
, Article Advances in Civil Engineering ; Volume 2021 , 2021 ; 16878086 (ISSN) ; Ahmadi, E ; Saremi, P ; BagherPour, M ; Sharif University of Technology
Hindawi Limited
2021
Abstract
Due to the shortcomings of the traditional construction project management system, there is a feeling among those involved in this industry that new tools and approaches should be used to facilitate simple and complex operations. On the contrary, there is no integrated database for all construction sectors, and of course the relationship between these sectors is a major problem for any construction project. The technology and tool that overcomes many of these shortcomings is BIM technology. This paper seeks to identify all the challenges that hinder the successful implementation of BIM and determine important challenges based on Z-DEMATEL-ISM Hybrid approaches. The DEMATEL method is used to...
A Travelling Salesman Problem with Multi-Visit Drone
, M.Sc. Thesis Sharif University of Technology ; Akbari Jokar, Mohammad Reza (Supervisor)
Abstract
Using drones in a synchronized last-mile delivery system with trucks has garnered attention in recent years. Due to various upsides of employing drones in delivery systems (namely, high speed and low environmental impact, etc.), it is considered a remarkable competitive advantage by many household brand in the E-commerce as well as urban logistics’ world. Furthermore, thanks to recent technological advances in producing higher capacity drones with longer flight range, this mode of delivery could now effectively exist alongside classic delivery means. A synchronized truck and drone problem, which was first introduced by Murray and Chu in 2015, has been exploited from various angles in the...
A three-stage scenario based operational performance test approaches for production capacity enhancement: Case study on the 5th refinery of South Pars Gas Complex in Iran
, Article Journal of Natural Gas Science and Engineering ; Volume 27,Part 3 , November , 2015 , Pages 1758-1770 ; 18755100 (ISSN) ; Farzad, S ; Moghaddam, S. N ; Saremi, H. S ; Sharif University of Technology
Elsevier
2015
Abstract
In this work, the possibility of capacity enhancement in the South Pars Gas Complex of Iran has been studied. Mass balance is studied and data validation and reconciliation have been carried out in 5th refinery of South Pars Gas Complex in order to achieve the reliable data of the plant. Then the possibility of capacity increase has been studied, taking into account the important parameters such as alteration of the plant pressure profile. Calculation of the key parameters for different equipment at higher feed rate, specified the unit of operations which may have trouble during the capacity enhancement. The performance of export gas compressors, dehydration unit and High-Integrity Pressure...
Intrusion detection via fuzzy-genetic algorithm combination with evolutionary algorithms
, Article 6th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2007; 1st IEEE/ACIS International Workshop on e-Activity, IWEA 2007, Melbourne, VIC, 11 July 2007 through 13 July 2007 ; July , 2007 , Pages 587-591 ; 0769528414 (ISBN); 9780769528410 (ISBN) ; Esmaeili, M ; Saremi, A ; Mousavi, V. R ; Sharif University of Technology
2007
Abstract
In this paper with the use of fuzzy genetic algorithm combination with evolutionary algorithms, as a method for local searching, it has been tried to exploit high capabilities of genetic algorithm, as a search algorithm, beside to other evolutionary algorithms, as local search algorithms, in order to increase efficiency of a rule learning system. For this purpose three hybrid algorithms have been used for solving the intrusion detection problem. These three algorithms are combination of genetic algorithm and SFL and PSO as three evolutionary algorithms which try to introduce efficient solutions for complex optimization problems by patterning from natural treatments. © 2007 IEEE
An overlay multicast protocol for multimedia applications in mobile ad-hoc networks
, Article 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, 9 December 2008 through 12 December 2008 ; 2008 , Pages 162-167 ; 9780769534732 (ISBN) ; Rabiee, H. R ; Saremi, F ; Iranmanesh, Z ; Sharif University of Technology
IEEE Computer Society
2008
Abstract
Overlay multicast has gained much attention in recent years as an alternative method to network layer multicast, especially for mobile ad hoc networks (MANETs). In this paper, we propose a new overlay multicast protocol to achieve simplicity of deployment, rapid adaptation of overlay structure when nodes move, and reduced delay. In our algorithm, to join or leave a multicast group, it is only sufficient for a member node to inform its first upstream member node. This updates the tree structure more rapidly when nodes move. In addition, join and leave delays are reduced and this makes the protocol suitable for multimedia multicasting in MANETs. Simulation results compared to that of ODMRP and...