Loading...
Search for:
golzari-oskoui--mohammad-reza
0.139 seconds
Total 6012 records
Using Game Theory to Battle Jammer in Control Channel of Ad-hoc Cognitive Radio Networks
, M.Sc. Thesis Sharif University of Technology ; Salehi, Javad (Supervisor)
Abstract
Due to both dynamic and opportunistic spectrum access, Cognitive radio networks is a promising solution for spectrum scarcity problem. In cognitive radio networks, users need to have a control channels in order to cooperate for sharing the sensing information, channel sharing and etc. In Ad-hoc cognitive radio networks because of the absence of infrastructure and central nodes, every user runs a distributed algorithm to create a common control channel. If the control channel gets jammed, network’s performance degrades dramatically, therefore the jammer’s target in cognitive radio networks is the control channels to disturb the networks’ performance. The traditional solution to confront...
Dynamic Simulation of Molten Carbonate Fuel Cell
, M.Sc. Thesis Sharif University of Technology ; Pishvaie, Mahmoud Reza (Supervisor)
Abstract
In this work, a model was presented for an MCFC fuel cell with internal reforming and combustion chamber. The model consists of mass and heat transfer equations beside the chemical and electrochemical reaction rate equations. Velocity distribution due to reactions and temperature distribution along the cell is considered. The model has been simulated in steady state form using finite difference method in MATLAB package environment accompanied by the analysis of the dynamic behavior of cell using method of lines in Simulink environment. Simulation results have been validated with experimental data extracted from literature. The last part of the work concerns with sensitivity analysis of some...
Energy Harvesting from Cantilever Beam Vibrations in Chaotic State
, M.Sc. Thesis Sharif University of Technology ; Ahmadian, Mohammad Taghi (Supervisor)
Abstract
The need to supply energy of low voltage electronic circuits such as sensors and wireless systems has attracted many researchers in recent years. As a solution to this problem, the energy needed for electronic devices can be obtained from the surrounding environment. An important part of energy harvesters are the systems that use vibrating energy of mechanical devices known as vibration power generators. Most linear vibration generators are systems that operate in resonance mode. As the frequency of the environment moves away from the natural frequency of the generator, the amount of converted energy decreases significantly. For this reason, some solutions are needed to solve this problem. ...
A misbehavior‐tolerant multipath routing protocol for wireless Ad hoc networks [electronic resource]
, Article International Journal of Research in Wireless Systems (IJRWS) ; Vol. 2, Issue 9, pp. , Sep. 2013 ; Pakravan, Mohammad Reza ; Aref, Mohammad Reza ; Sharif University of Technology
Abstract
Secure routing is a major key to service maintenance in ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. As a result of the resource limitations in such networks nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a novel data redirection method to mitigate the impact of node misbehavior on network...
Design and Control of Parallel Hybride Electric Samand Vehicle
, M.Sc. Thesis Sharif University of Technology ; Vossoughi, Gholamreza (Supervisor)
Abstract
The final target of this research is to design an appropriate intelligent control strategy for energy management purposes in a well designed parallel hybrid electric vehicle. In the first step, the conventional “Samand” vehicle has been simulated using real data for vehicle parameters and power train components, has been simulated. Using experimental results, simulation results are validated. In the second step due to the primarily defined parallel electric assist control strategy (PEACS) for the hybrid electric vehicle and performance requirements, components such as engine, electric machine and battery pack were selected and sized. In the final step a Fuzzy Logic Controller (FLC) has been...
Optimal Distributed Generation Allocation Considering Power Qaulity Indices
, M.Sc. Thesis Sharif University of Technology ; Mokhtari, Hossein (Supervisor)
Abstract
The demand for independent power generation has been increased in recent years due to the growing demand in distributed networks, losses and power qaulity in power systems. These losses occur in transmission to distribution networks from the generation sites to the end-user loads which have harmonic losses besides fundamental losses.. The non-linear load makes the harmonics flow in the line and create the harmonic losses. However, in a distributed network with several DGs of different types and with all kinds of variable nature loads, an optimal power balance in the system has to be achieved. This optimal objective, which results in minimal energy losses over a specific period of time,...
Entanglement Hamiltonian of Interacting Systems and its Applications in the Study of Strongly Correlated Systems
, M.Sc. Thesis Sharif University of Technology ; Vaezi, Mir Abolhassan (Supervisor)
Abstract
Recent advances in numerical computations in the field of strongly correlated systems have provided us to calculate the entanglement spectrum and the entanglement entropy for interacting systems. Calculating the explicit form of the entanglement Hamiltonian (a.k.a. the modular Hamiltonian) is considered as a difficult problem.In this dissertation, we intend to introduce a method and by means of the d ensity-matrix-renormalization-group algorithm to obtain for the first time the second quantization form of the entanglement Hamiltonian of interacting systems at zero temperature. We implement our method for one-dimensional Heisenberg spin chain and also Heisenberg model on a square lattice...
Analysis and Improvement of Intrusion Detection Methods in Data Network Routers
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
Abstract
High-quality online services demand reliable and fast packet delivery at the network layer. However, clear evidence documents the existence of compromised routers in the ISP and enterprise networks, threatening network availability and reliability. A compromised router can stealthily drop, modify, inject, or delay packets in the forwarding path to launch Denial-of-Service, surveillance, man-in-the-middle attacks, etc. So researches tried to create intrusion detection methods to identify adversarial routers and switches. To this end, data-plane fault localization (FL) aims to identify faulty links and is an effective means of achieving high network availability. FL protocols use...
Topological Defects in Confined Nematics by Planar Anchoring
, M.Sc. Thesis Sharif University of Technology ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Supervisor)
Abstract
Confining nematic liquid crystal between two curved boundary conditions while the nematic molecules have a degenerate planar anchoring leads to complex and beautiful textures of molecular disparagement(defect) in the bulk and on the surfaces. Such the liquid crystal shells are made with double-emulsion techniques in microfluidic devices have provided applications for micro-scale colloidal linkers.In this work, we have numerically minimized the elastic energy in one-constant approximation in present of Fournier’s degenerate surface potential with finite element method. The nematic shell is confined between two spherical surfaces that we have studied the final energies and their related...
Using game theory to battle jammer in control channels of cognitive radio ad hoc networks
, Article 2016 IEEE International Conference on Communications, ICC 2016, 22 May 2016 through 27 May 2016 ; 2016 ; 9781479966646 (ISBN) ; Khorramshahi, P ; Salehi, J. A ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2016
Abstract
Because of opportunistic spectrum access, cognitive radio networks is a promising solution for spectrum scarcity problem. In cognitive radio networks, users need to communicate through control channels in order to cooperate for sharing sensing information, channel sharing and spectrum management. As a result control channels security is of a great importance. If control channels get jammed, network's performance degrades dramatically; therefore, the jammers primary target in cognitive radio networks is to demolish control channels in order to disturb the network's performance. Traditionally hopping sequences were used to battle this problem but considering cognitive radio networks...
Polysaccharide-Based Nanocomposites as Green Sorbents in Microextraction Methodologies
, Ph.D. Dissertation Sharif University of Technology ; Bagheri, Habib (Supervisor)
Abstract
This thesis is focused on the preparation and use of polysaccharides as extractive phases in various extraction methods, such as the micro solid phase extraction (µ-SPE), needle trap microextraction (NTME) and thin film microextraction (TFME).In the first research, feasibility of the online µ-SPE method using cellulose acetate (CA) fibers was investigated. For this purpose, CA fibers were prepared by electrospinning technique and then placed into µ-SPE cartridge. With this method, it was possible to simultaneously extract the drug compounds in the urine and plasma samples. The enrichment factor and limits of detection (LODs) were obtained in the range of 194-210 and 1.0-2.4 μg L-1,...
Improvement of Routing Security in Ad Hoc Networks Against Several Attacks
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Supervisor)
Abstract
Secure routing is a major key to service maintenance in wireless ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. Wormhole attack is one of the most severe active attacks to mobile ad hoc networks. Noting the resource limitations in such networks, nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a...
Solving Symmetric Nonlinear Equations System Using BFGS Trust Region Quadratic Method
, M.Sc. Thesis Sharif University of Technology ; Razvan, Mohammad Reza (Supervisor) ; Peyghami, Mohammad Reza (Supervisor)Design and Implementation of 2.5 Gbps Circuit Switching Fabric
, M.Sc. Thesis Sharif University of Technology ; Pakravan, Mohammad Reza (Supervisor) ; Movahhedy, Mohammad Reza (Supervisor)
Abstract
Providing high bandwidth network infrastructures for ever increasing need of data transport is of great importance. The underling infrastructure for many communication services such as GSM/3G/4G mobile networks and Internet services is Synchronous Digital Hierarchy (SDH) optical transport systems. SDH are standardized protocols that multiplex multiple lower rate digital bit streams, such as E1 and Ethernet, and transfer them synchronously over optical fiber using lasers or LEDs. In addition to high data transfer rates, flexible network management and protection mechanisms have great importance, hence are part of SDH standards. In order to obtain flexible network architecture and protected...
Preserving Privacy in Smart Grid
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
Abstract
Development of Smart Grid and deployment of smart meters in large scale has raised a lot of concerns regarding customers’ privacy. Consequently, several schemes have been proposed to overcome the above mentioned issue. These schemes mainly rely on data aggregation as a method of protecting users’ privacy from the grid operators. However, the main problem with most of these schemes is the fact that they require a large amount of processing power at the meter side. This, together with the fact that smart meters don’t usually have a powerful processor, can cause the unavailability of smart meter data at the required time for operators of the grid, and at the same time disables smart meters from...
Effect of the Geometry of Colloidal Particles on Nematic Liquid Crystals
, Ph.D. Dissertation Sharif University of Technology ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Co-Advisor)
Abstract
A liquid crystal is a state of matter composed of highly anisotropic building blocks. When liquid crystals are exposed to surfaces with given shapes and anchoring conditions, the orientation of their molecules gets spatially disordered and topological defects may form in the system. The interplay between liquid crystals and the geometry and topology of the colloidal particles has motivated extensive recent studies.In this thesis, we present the numerical modeling results for two faceted colloidal particles in a thermotropic nematic liquid crystal. To obtain the equilibrium nematic field with a finiteelement method, we numerically minimize the free energy of the system that based on the...
Solving Nonlinear Systems of Mixed Iqualities and Inequalities Via Trust Region Quadratic Methods
, M.Sc. Thesis Sharif University of Technology ; Razvan, Mohammad Reza (Supervisor) ; Payghami, Mohammad Reza (Supervisor)Jamming Resilient Algorithms for Rendezvous in Cognitive Radio Networks
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
Abstract
Dynamic spectrum access with the aid of cognitive radio (CR) technology is a viable solution to spectrum scarcity. There are many military and emergency applications that require the use of cognitive radio ad-hoc networks (CRAHNs). In these net- works, nodes must first find each other in a wide spectrum and then exchange their desired data. The process of finding each other in a multichannel environment is a challenging task and is usually known as rendezvous. Since rendezvous is the first step in communication, disrupting will disable the nodes from establishing proper communication sessions. That results in a drastic degrade in the performance of the network. Therefore, it is important to...
Numerical Study of Spray Impingement to Solid Wall
, M.Sc. Thesis Sharif University of Technology ; Morad, Mohammad Reza (Supervisor) ; Jahannama, Mohammad Reza (Co-Supervisor)
Abstract
Spray-wall impingement is one of the phenomenon that associated in different subject such as spray cooling, combustion chamber and gas turbine. With the impingement of spray to the wall, liquid film begins to form. Wall film characteristics is still an important subject to study. Due to the various stages of liquid film formation from injection of spray till spray-wall impingement, the investigation of this phenomenon is far more complicated. This paper is meant to provide detailed data on spray-wall impingement and wall film formation physics with the help of computational analysis of OpenFOAM . A Lagrangian-Eulerian method based on discrete phase model (DPM) was employed to model...
Development of an adaptive surrogate model for production optimization
, Article Journal of Petroleum Science and Engineering ; Volume 133 , September , 2015 , Pages 677-688 ; 09204105 (ISSN) ; Haghighat Sefat, M ; Jamshidi, S ; Sharif University of Technology
Elsevier
2015
Abstract
Recently production optimization has gained increasing interest in the petroleum industry. The most computationally expensive part of the production optimization process is the evaluation of the objective function performed by a numerical reservoir simulator. Employing surrogate models (a.k.a. proxy models) as a substitute for the reservoir simulator is proposed for alleviating this high computational cost.In this study, a novel approach for constructing adaptive surrogate models with application in production optimization problem is proposed. A dynamic Artificial Neural Networks (ANNs) is employed as the approximation function while the training is performed using an adaptive sampling...