Loading...
Search for:
hashemi-rafsanjani--ebrahim
0.094 seconds
Total 542 records
Numerical Modeling of In-plane Behavior of Adobe Walls Strengthened by Various Retrofitting Methods Under Cyclic Loading
, M.Sc. Thesis Sharif University of Technology ; Bakhshi, Ali (Supervisor) ; Ghannad, Mohammad Ali (Supervisor)
Abstract
Adobe structures are considered as masonry structures which are out of scope of 2800 Iranian code. Due to this code, since these structures are made of weak materials, they do not have a considerable resistance to earthquakes. Since these structures can be found all around Iran; therefore, seismic study of walls as an important component of these structures, is, indeed, necessary. During this study, cyclic tests on three types of adobe walls, without opening, with window-opening, and with door-and-window-opening with a scale of 2:3 were done to study their in-plane behavior and also their failure modes. Based on our observations, in these walls, because of small ratio of height to length,...
Identifying monitoring nodes in MANET by detecting unauthorized and malicious nodes
, Article International Symposium on Information Technology 2008, ITSim, Kuala Lumpur, 26 August 2008 through 29 August 2008 ; Volume 3 , 2008 ; 9781424423286 (ISBN) ; Movaghar, A ; Sharif University of Technology
2008
Abstract
Mobile ad hoc networks have different characteristics from wired networks. There are new challenges related to security issues that need to be addressed. In this paper, first, critical nodes and authentication in mobile ad hoc networks are discussed. Then, a monitoring nodes selection method with high battery power in these networks is presented. We propose a three-phase detection scheme. In the first phase, unauthorized nodes and in the second phase, malicious nodes are detected. Finally in the third phase, nodes with the largest battery power as monitoring nodes are considered. In the first and the second phases, detection scheme uses non-interactive zero knowledge technique in order to...
A model-driven approach to semi-structured database design
, Article Frontiers of Computer Science ; Volume 9, Issue 2 , 2015 , Pages 237-252 ; 20952228 (ISSN) ; Mirian Hosseinabadi, S ; Sharif University of Technology
Higher Education Press
2015
Abstract
Recently XML has become a standard for data representation and the preferred method of encoding structured data for exchange over the Internet. Moreover it is frequently used as a logical format to store structured and semi-structured data in databases. We propose a model-driven and configurable approach for modeling hierarchical XML data using object role modeling (ORM) as a flat conceptual model. First a non-hierarchical conceptual schema of the problem domain is built using ORM and then different hierarchical views of the conceptual schema or parts of it are specified by the designer using transformation rules. A hierarchical modeling notation called H-ORM is proposed to show these...
Frequency response calculation of non-linear torsional vibration in gear systems
, Article Proceedings of the Institution of Mechanical Engineers, Part K: Journal of Multi-body Dynamics ; Volume 222, Issue 1 , 2008 , Pages 49-60 ; 14644193 (ISSN) ; Moeenfard, H ; Rafsanjani, A ; Sharif University of Technology
2008
Abstract
The current paper focuses on the non-linear torsional vibration of a one-stage transmission gear system. Four different methods have been applied for solution of the equation of motion; the discretization method, the perturbation method, the Ritz method, and the stepwise time integration of the equation of motion. The time and frequency results from these analyses have been compared with each other, as well as those reported in literatures. Although all of these methods are accurate and computationally effective for finding the main spectral contribution, however, only the discretization method and the step-wise time-integration model are able to identify the other frequency components. ©...
Lightweight formalization and validation of ORM models
, Article Journal of Logical and Algebraic Methods in Programming ; Volume 84, Issue 4 , July , 2015 , Pages 534-549 ; 23522216 (ISSN) ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
Elsevier Inc
2015
Abstract
Abstract ORM (Object Role Modeling) is a rich and popular conceptual modeling method. ORM has been used for data modeling, ontology engineering, modeling business rules, XML-Schemes and data warehouses, requirements engineering and web forms. Automated reasoning like satisfiability testing allows developers to detect modeling mistakes in the early stages of development. In this paper we propose a lightweight formalization of the ORM meta-model in Alloy. Using this meta-model as a toolkit one can easily specify ORM models in Alloy and verify various properties on them using the Alloy Analyzer. In order to achieve scalability, we use the cardinality of concepts to model their population. This...
A top down approach to semi-structured database design
, Article 2nd International Conference on the Applications of Digital Information and Web Technologies, ICADIWT 2009 ; 2009 , Pages 26-31 ; 9781424444571 (ISBN) ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
2009
Abstract
XML has become the preferred format for representing and exchanging structured and semi-structured data on the web. The XML Schema language is widely used for defining and validating highly structured XML instance documents. While text-based languages, such as XML-Schema, offer great advantages for data interchange on the Internet, graphical modeling languages are widely accepted as a more visually effective means of specifying and communicating data requirements for a human audience. This paper uses Object-Relationship-Attribute model (ORA-SS) as a conceptual graphical model for designing XML-Schemas. To facilitate this process we introduce an xml representation for ORA-SS Schema Diagram...
RIAL: Redundancy reducing inlining algorithm to map XML DTD to relations
, Article 2008 International Conference on Computational Intelligence for Modelling Control and Automation, CIMCA 2008, Vienna, 10 December 2008 through 12 December 2008 ; July , 2008 , Pages 25-30 ; 9780769535142 (ISBN) ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
2008
Abstract
XML has emerged as a common standard for data exchange over the World Wide Web. One way to manage XML data is to use the power of relational databases for storing and querying them. So the hierarchical XML data should be mapped into flat relational structure. In this paper we propose an algorithm which maps DTD to relational schema and as well as content and structure it preserves the functional dependencies during the mapping process in order to produce relations with less redundancy. This is done by categorizing functional dependencies and introducing four rules to be applied to the relations created by the hybrid inlining algorithm according to each category. These rules will reduce...
Cost-Benefit analysis of Iran-Europe Natural gas pipeline in the field of Economics, Environment and Energy Security
, M.Sc. Thesis Sharif University of Technology ; Maleki, Abbas (Supervisor)
Abstract
The intermediary between Consumer and market of Natural gas is long transportation pipeline. Analysis of different dimension is a prerequisite for constructing these infrastructures. This study has been done in the fields of economics, environment and energy security. The proposed pipeline, which is called Islamic pipeline, passes through different countries, Iraq, Syria, Greece and Italy. It carries natural gas and feeds Europe gas requirements, also passes the Mediterranean Sea, which includes underwater pipe-laying technology that has been considered. Economic analysis of this project calculated, using Cost-Benefit analysis. Environmental issues has been identified and classified,...
Dissatisfaction of some Eminent Contemporary Physicist with the Standard Quantum Theory and Studying Bohmian Quantum Mechanics as an Alternative
, M.Sc. Thesis Sharif University of Technology ; Golshani, Mehdi (Supervisor)
Abstract
In recent decades, the growing number of eminent contemporary physicists, including Weinberg, Penrose, Isham, Susskind and etc. have doubted about the durability of quantum theory, and in the last year Weinberg, after analyzing the well-known interpretations of Standard quantum theory sees all of them as difficult and concludes that quantum theory needs to be replaced by a more comprehensive theory. The purpose of this dissertation is to analyze the critiques of Weinberg and others to the standard quantum theory and to study some of the alternative theories proposed, including the Bohemian quantum theory and the holographic universe
Home Healthcare Routing and Scheduling Problem During the Covid-19 Pandemic with Uncertainties
, M.Sc. Thesis Sharif University of Technology ; Rafiee, Majid (Supervisor)
Abstract
In summary, this thesis presents a new mathematical model for Home Health Care (HHC) services during the Corona era, which aims to increase the efficiency and quality of services provided by these organizations while ensuring compliance with quarantine protocols. The model is an extension of the VRPPDTW formulation and considers relevant features such as patient classification, caregiver classification, work and break regulations, workload balancing, and multi-depot capabilities. The optimization can be performed with two separate objective functions, one to minimize traveling and idle costs and the other to minimize the total working time of caregivers. The contradictions between two...
A Z approach to formalization and validation of ORM models
, Article Communications in Computer and Information Science, 20 July 2011 through 22 July 2011 ; Volume 194 CCIS , July , 2011 , Pages 513-526 ; 18650929 (ISSN) ; 9783642226021 (ISBN) ; Mirian Hosseinabadi, S. H ; Springer ; Sharif University of Technology
2011
Abstract
In this paper we present a formal definition of the basic concepts and notations of Object Role Modeling (ORM) using the Z formal specification language. Most of ORM concepts such as object and relationship types, value types, objectification, reference schemes, sub-types, roles and constraints such as uniqueness, mandatory, cardinality, subset, equality, exclusive and ring constraints are specified formally. Population is specified as objects, relationships and roles instances. These are specified using Z axioms and diagram instances are specified using Z schemas. This would enable validation and reasoning on the formal properties of ORM diagrams such as detecting constraint contradictions...
An efficient method for identifying IDS agent nodes by discovering compromised nodes in MANET
, Article 2009 International Conference on Computer and Electrical Engineering, ICCEE 2009, 28 December 2009 through 30 December 2009, Dubai ; Volume 1 , 2009 , Pages 625-629 ; 9780769539256 (ISBN) ; Khavasi, A. A ; Movaghar, A ; Sharif University of Technology
2009
Abstract
Intrusion Detection Systems (IDS) for Mobile Ad hoc NETworks (MANETs) are necessary when they are deployed in reality. In This paper, we have presented a combined method of selecting IDS agent nodes in mobile ad hoc networks. Since, the IDS agents in MANET due to more activities need to more battery power. In our method, first, compromised nodes are detected and then the nodes with the highest energy power from among valid nodes as IDS agent nodes are considered. So, with this method, some valid nodes contribute in intrusion detection activities and costs of the network monitoring will be reduced and the network lifetime will be increased. © 2009 IEEE
An effective approach for determining IDS agent nodes in manet
, Article Proceedings of the 3rd International Conference on Internet Technologies and Applications, ITA 09, 8 September 2009 through 11 September 2009, Wrexham, Wales ; 2009 , Pages 458-465 ; 9780946881659 (ISBN) ; Khavasi, A. A ; Movaghar, A ; Sharif University of Technology
2009
Abstract
Mobile Ad hoc NETworks (MANET) due to different characteristics from wired networks are more vulnerable to security attacks. Construction of Intrusion Detection Systems (IDS) for MANETs is complicated by the fact that they are lack of fixed infrastructure and lack of central management for authentication and distribution of cryptographic keys. On the other hand, the network lifetime is an important issue in MANETs because of the energy power of mobile nodes is limited. In this paper is presented a proposed Method that in the first step, authorized nodes are detected by non-interactive zero knowledge technique and in the second step, nodes with the highest battery power from among authorized...
Nonlinear dynamic modeling of surface defects in rolling element bearing systems
, Article Journal of Sound and Vibration ; Volume 319, Issue 3-5 , 2009 , Pages 1150-1174 ; 0022460X (ISSN) ; Abbasion, S ; Farshidianfar, A ; Moeenfard, H ; Sharif University of Technology
2009
Abstract
In this paper an analytical model is proposed to study the nonlinear dynamic behavior of rolling element bearing systems including surface defects. Various surface defects due to local imperfections on raceways and rolling elements are introduced to the proposed model. The contact force of each rolling element described according to nonlinear Hertzian contact deformation and the effect of internal radial clearance has been taken into account. Mathematical expressions were derived for inner race, outer race and rolling element local defects. To overcome the strong nonlinearity of the governing equations of motion, a modified Newmark time integration technique was used to solve the equations...
Investigating the Modal Status and the Epistemological Status of Identity Propositions of Proper Names According to the Kripke’s Doctrines
, M.Sc. Thesis Sharif University of Technology ; Azadegan, Ebrahim (Supervisor)
Abstract
In Naming and Necessity and Identity and Necessity, Kripke convinced many that there are necessary propositions which are knowable only a posteriori. Kripke’s examples of these propositions can be placed into three categories: 1) Some mathematical propositions like Goldbach’s conjecture (the conjecture that every even integer greater than 2 can be expressed as the sum of two primes) 2) Scientific truths like “Water is H2O”, “Gold has the atomic number 79”, etc. 3) Identity statements flanked on both sides with proper names; like “Hesperus is Phosphorus”, “Cicero is Tully” and the like (in the rest of this article, these three categories will be called, respectively, the first, the second and...
Mind-Body Problem From Swinburne’s Point of View
, M.Sc. Thesis Sharif University of Technology ; Azadegan, Ebrahim (Supervisor)
Abstract
In his Mind, Brain and Free Will, Swinburne introduces a new argument for substance dualism based on the synchronic unity of humans’ conscious experiences. He argues that the human body cannot be the substance of such a synchronic unity, and that this coexperiencing property, which is a mental property, is the essential property of the human substance: hence our substance is a mental substance. After providing a careful explanation of Swinburne’s subtle argument, I first try to demonstrate that it is metaphysically possible that the brain itself could instantiate such a synchronic unity without the need to presume another substance. Then I shall argue that it is unclear how to infer the...
Scientific and Philosophical Challenges of Theory of Evolution
, M.Sc. Thesis Sharif University of Technology ; Azadegan, Ebrahim (Supervisor)
Abstract
This dissertation consists of three chapters. In the first chapter, a description of formation of Darwin's theory of Evolution is expressed. After that, the process of formation of modern theory of Evolution, along with an explanation of the theory of evolution and the evidence for it was mentioned. In the second season, which is responsible for the scientific study of the theory, at some point the evidence of this theory has been reviewed. After that, some of the challenges raised against this theory have been studied. The major scientific challenges described in this chapter is based on recent advances made in biology, based on that, the mechanism of theory can’t explain the complex...
Wilfrid Sellars on Science and Reality
, M.Sc. Thesis Sharif University of Technology ; Azadegan, Ebrahim (Supervisor)
Abstract
Wilfrid Stalker Sellars (1912-1989) is an analytic philosopher whose philosophy is famous for being deep, systematic and extremely influential and notorious for being difficult to read. Although he has many original and interconnected ideas in different branches of philosophy- including metaphysics, epistemology, philosophy of mind, ethics, philosophy of language and meta-philosophy- the place of science in his system is completely indispensable. In his meta-philosophy, Sellars defines his philosophical project as an attempt to reconcile two distinct world-views of humanity in the modern word; scientific image and manifest image. Approaching Sellars’ philosophy by placing science at the...
Living with Uncertainty
, M.Sc. Thesis Sharif University of Technology ; Azadegan, Ebrahim (Supervisor)
Abstract
Michael Zimmerman in his book Living with Uncertainty has objected to two views of moral obligation, namely objective and subjective view. Two overcome these problems he suggests a third view which he calls prospective view and tells us that our moral obligation is determined by the prospection that each of our choices give us. In this thesis first I review Zimmerman’s objections to objective and subjective view. Then I try to suggest a solution for the objective view
Deep analysis of Growth’s Pattern of Technological Capabilities in Knowledge-based Companies: Case Studies in Four Different Sectors
, M.Sc. Thesis Sharif University of Technology ; Souzanchi, Ebrahim (Supervisor)
Abstract
Technological capabilities as one of the growth’s aspects in developing countries have gained focus for research in last years. This study attempt to analyze the pattern of technological capabilities in four different sectors including Optic, Aerospace, Pharmaceutical and Biotechnology. In each sectors four Iranian companies as the case studies are selected. After deep interviews with key people in each company, required data is gathered. Data in each company is analyzed. The results of analysis for companies in one sector are gathered for analyzing each sector. In order to evaluate technological capabilities, the time required to improve, lead-lag relationship for gaining higher levels of...