Loading...
Search for:
hassani-atashgah--milad
0.108 seconds
Total 116 records
Butanol Production from Bagasse Sugarcane Black Liquor by Native Strain and Clostridium Acetobutylicum Species
,
M.Sc. Thesis
Sharif University of Technology
;
Shayegan, Jalaleddin
(Supervisor)
;
Vossoughi, Manouchehr
(Supervisor)
;
Sedighi, Mahsa
(Co-Supervisor)
Abstract
Considering the limitations of fossil fuels in recent years, as well as increasing demand for biofuels, it is anticipated that future attention to biofuels will increase further. Among biofuels, due to some disadvantages of bioethanol and biodiesel fuel, there is a tendency to use biobutanol, which does not have the disadvantages of the mentioned fuels. The cost of chemical production of butanol also led researchers to use biotechnology production of butanol. According to studies, butanol production can be achieved by fermenting some sugars such as glucose, xylose, and ... by anaerobic microorganism, but the cost of using these sugars has resulted in the use of natural sources of these...
Does the short-term boost of renewable energies guarantee their stable long-term growth? Assessment of the dynamics of feed-in tariff policy
, Article Renewable Energy ; Volume 159 , October , 2020 , Pages 1252-1268 ; Hamed Shakouri, G ; Mashayekhi, A. N ; Kazemi, A ; Sharif University of Technology
Elsevier Ltd
2020
Abstract
Feed-in tariff (FiT) is one of the most efficient ways that many governments throughout the world use to stimulate investment in renewable energies (REs) technology. For governments, financial management of the policy could be challenging as it needs a considerable amount of budget to support RE producers during the long remuneration period. In this paper, it has been illuminated that the early growth of REs capacity could be a temporary boost. And the socio-economic structure of the system will backlash the policy if some social mechanisms are not considered. Social tolerance for paying REs tax and potential investors’ trust emanated from budget-related mechanisms -which have rarely been...
Prediction of aerial-image motion blurs due to the flying vehicle dynamics and camera characteristics in a virtual environment
, Article Proceedings of the Institution of Mechanical Engineers, Part G: Journal of Aerospace Engineering ; Volume 227, Issue 7 , 2013 , Pages 1055-1067 ; 09544100 (ISSN) ; Malaek, S. M. B ; Sharif University of Technology
2013
Abstract
This study presents comprehensive studies on practical means to predict aerial-image motion blurs due to the flying vehicle dynamics, including flying altitude; cruising speed; and angular velocities and finally installed camera characteristics; such as, frame rate and image size. The resulting predictions of blur values are in-turn used to generate blurry images to be fed as input data for later use in a de-blurring-in-the-loop of a Mono-simultaneous localization and mapping system. The whole process is coordinated by means of an integrated aerial virtual environment. The integrated aerial virtual environment consists of a three-dimensional graphical engine which could communicate with a...
Nerve retraction during inferior alveolar nerve repositioning procedure: A new simple method and review of the literature
, Article Journal of Oral Implantology ; Volume 41 , Dec , 2015 , Pages 391-394 ; 01606972 (ISSN) ; Saadat, S ; Moshiri, R ; Shahmirzad, S ; Hassani, A ; Sharif University of Technology
Allen Press Inc
2015
Abstract
Nerve repositioning surgery is one of the treatments chosen for the patients with edentulous posterior atrophic mandible. Like any other treatments, this therapy has its advantages and disadvantages, indications and contraindications. The most important complication of this procedure is neurosensory disturbance. This problem may occur at different stages of the treatment. One common time when nerve damage happens is when the nerve is located outside the canal and drilling and insertion of the implant are performed. Accordingly, this report describes a simple and feasible method to retract and protect nerves outside the canal during the treatment of nerve transposition. This will reduce the...
Nerve retraction during inferior alveolar nerve repositioning procedure: a new simple method and review of the literature
, Article The Journal of oral implantology ; Volume 41 , 2015 , Pages 391-394 ; 01606972 (ISSN) ; Saadat, S ; Moshiri, R ; Shahmirzad, S ; Hassani, A ; Sharif University of Technology
2015
Abstract
Nerve repositioning surgery is one of the treatments chosen for the patients with edentulous posterior atrophic mandible. Like any other treatments, this therapy has its advantages and disadvantages, indications and contraindications. The most important complication of this procedure is neurosensory disturbance. This problem may occur at different stages of the treatment. One common time when nerve damage happens is when the nerve is located outside the canal and drilling and insertion of the implant are performed. Accordingly, this report describes a simple and feasible method to retract and protect nerves outside the canal during the treatment of nerve transposition. This will reduce the...
Thermal structure and energy budget for alghadir reservoir, iran
, Article Water Resources ; Volume 40, Issue 6 , 2013 , Pages 621-630 ; 00978078 (ISSN) ; Sharif University of Technology
2013
Abstract
Knowing the rate of evaporation from surface water resources such as channels and reservoirs is essential for precise management of the water balance. Few detailed evaporation studies exist for small lakes or reservoirs in arid regions of the world. In this study, monthly evaporation was determined by Bowen Ratio Energy Budget technique (BREB) for Alghadir reservoir (Saveh, Iran) from 1995-2007 and compared with class-A pan. Daily data were obtained from IMO (Iran Meteorological Organization) weather station, located near the reservoir, for all of these years. Some variations have been observed on the estimated evaporation of the energy budget at different years, ranging from 151 cm for 1997...
An integrated virtual environment for feasibility studies and implementation of aerial MonoSLAM
, Article Virtual Reality ; Volume 16, Issue 3 , September , 2012 , Pages 215-232 ; 13594338 (ISSN) ; Malaek, S. M. B ; Sharif University of Technology
2012
Abstract
This work presents a complete framework of an integrated aerial virtual environment (IAVE), which could effectively help implementing MonoSLAM (single-camera simultaneous localization and mapping) on an aerial vehicle. The developed system allows investigating different flight conditions without using any preloaded maps or predefined features. A 3D graphical engine integrated with a full 6 DOF aircraft dynamic simulator together with its trajectory generator completes the package. The 3D engine generates and accumulates real-time images of a general camera installed on the aerial vehicle. We effectively exploit C++ to develop the 3D graphics engine (3DGE) and all its associated visual...
A simulation environment for path and image generation in an aerial single-camera vision system
, Article Proceedings of the Institution of Mechanical Engineers, Part G: Journal of Aerospace Engineering ; Volume 225, Issue 5 , 2011 , Pages 541-558 ; 09544100 (ISSN) ; Malaek, S. M. B ; Sharif University of Technology
2011
Abstract
This work describes the essential tools and architecture of a simulation environment, which could help enhance general aviation training as well as safety issues, especially while dealing with flights over unfamiliar environments. It also describes how the authors could effectively generate any desired flight path and its associated surrounding images through implementing a virtual single camera with simultaneous localization and mapping (monocular simultaneous localization and mapping) techniques. The overall package enjoys an aerial three-dimensional (3D)/graphical engine integrated with a full six-degrees-of-freedom aircraft dynamics, which serves as its trajectory generator, together...
A secure and efficient chaotic maps based authenticated key-exchange protocol for smart grid
, Article Wireless Personal Communications ; Volume 97, Issue 2 , 2017 , Pages 2551-2579 ; 09296212 (ISSN) ; Beheshti Atashgah, M ; Aref, M. R ; Sharif University of Technology
2017
Abstract
Nicanfar and Leung proposed a multilayer consensus elliptic curve based password authenticated key-exchange (MCEPAK) protocol for smart grid. They claimed that their protocol is secure against possible attacks. In this paper, we show that the MCEPAK protocol is vulnerable to the dictionary attack and an adversary can obtain the passwords of the appliances by eavesdropping the communicated messages in the protocol. Moreover, we state that the passwords can be discovered by curious operators of the building area networks and the neighbor area networks. Theses weaknesses motivated us to introduce a chaotic maps based authenticated key exchange protocol for smart grid. To the best of our...
Aerial Vision-Based Navigation and Monitoring in Special Conditions
, Ph.D. Dissertation Sharif University of Technology ; Malaek, Mohammad Bagher (Supervisor)
Abstract
This research is dedicated to specific issues in the field of Aerial Vision Based Navigation (VBN). It focuses mainly on vehicles with no pilot such as RPVs and small aircraft; having in mind their safety which must be close to commercial applications. Various methods have been studied and the simplest one; which is based on observation, identification and utilization of landmarks is selected for detailed implementation. In this work, we concentrate on using a single-camera while flying in an unknown environment (MonoSLAM). Other available sensors are accelerometer and GPS receiver to keep the cost down. Different studies show that using a low-cost single camera system is much more efficient...
Integration of image de-blurring in an aerial Mono-SLAM
, Article Proceedings of the Institution of Mechanical Engineers, Part G: Journal of Aerospace Engineering ; Vol. 228, issue. 8 , May , 2014 , p. 1348-1362 ; Gholampour, P ; Malaek, S. M. B ; Sharif University of Technology
2014
Abstract
In this article, we discuss the possibility of integrating image de-blurring techniques in an aerial simultaneous localization and mapping by a single camera (monocular simultaneous localization and mapping (Mono-SLAM)). We use an integrated aerial virtual environment together with a six-degree-of-freedom aircraft flight simulator to show the effectiveness of the approach to generate three-dimensional flight trajectories via integration of image de-blurring in the associated loop of the Mono-SLAM. The objective is to increase the overall performance of a flying mission over an unknown area by means of a vision-only method. The integrated aerial virtual environment produces and collects...
A novel lattice-based proxy signature scheme
, Article ICEE 2012 - 20th Iranian Conference on Electrical Engineering, 15 May 2012 through 17 May 2012 ; May , 2012 , Pages 1224-1227 ; 9781467311489 (ISBN) ; Ajori, M ; Gardeshi, M ; Aref, M. R ; Sharif University of Technology
2012
Abstract
In a proxy signature scheme, an original signer delegates his/her signing capability to a proxy signer and then the proxy signer can sign messages on behalf of the original signer. The security of many proxy signature schemes that have been proposed depends, either directly or indirectly, on either the difficulty of big integers factoring problem or the difficulty of finding discrete logarithm in a finite group. These types of schemes cannot resist quantum attacks. In this paper, we propose a new lattice-based proxy signature scheme which can resist quantum attacks. The proposed scheme is based on the GGH-signature scheme and also satisfies all the security requirements of proxy signature...
Improvement on Q. Xie threshold proxy signature scheme against collusion attack
, Article 2011 19th Iranian Conference on Electrical Engineering, ICEE 2011, 17 May 2011 through 19 May 2011 ; May , 2011 , Page(s): 1 - 5 ; ISSN : 21647054 ; 9789644634284 (ISBN) ; Bayat, M ; Gardeshi, M ; Aref, M. R ; Sharif University of Technology
2011
Abstract
In a (t, n) threshold proxy signature scheme, the original signer can delegate the signing power to n proxy signers such that any t or more out of n proxy signers can sign messages on behalf of the original signer, but t -1 or less of the proxy signers cannot generate a proxy signature. In this paper, we will improve the security of Xie's threshold proxy signature scheme against the new types of collusion attack was presented by Liu and Tan in 2007 We also present that our improved scheme is more efficient than Xie's scheme in terms of computational complexities
An ultra-lightweight RFID mutual authentication protocol
, Article 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2019, 28 August 2019 through 29 August 2019 ; 2019 , Pages 27-32 ; 9781728143736 (ISBN) ; Beheshti Atashgah, M ; Eghlidos, T ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2019
Abstract
In some applications of the Internet of Things (IoT), for privacy preserving and authentication of entities, it is necessary to use ultra-lightweight cryptographic algorithms. In this paper, we propose a new ultra-lightweight authentication protocol between RFID components, in which only simple operations are used. In this protocol, the server has access to the data gathered by the tag in the same authentication phase through the reader interface, instead of sharing a secret key. The proposed protocol is secure against several attacks, such as replay attacks, denial of service, offline guessing attacks, modification attacks, full disclosure attacks and impersonation attacks, in addition to...
A lightweight anonymous authentication protocol for IoT wireless sensor networks
, Article 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2019, 28 August 2019 through 29 August 2019 ; 2019 , Pages 39-44 ; 9781728143736 (ISBN) ; Beheshti Atashgah, M ; Eghlidos, T ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2019
Abstract
Lightweight authentication protocols are crucial for privacy preserving in Internet of Things (IoT). Authentication protocols should be implementable for devices with constrained memory and computational power in this area, in addition to resistance against cryptographic threats. On the other hand, these protocols should not impose a heavy computational load on such devices. In this paper we proposed an authentication protocol that properly meets these features. Our protocol is suitable for wireless sensor networks (WSNs). In this protocol, authentication is fulfilled with low communication and computational loads between sensors and users through the gateway interface using a hash function...
ID-based strong designated verifier signature scheme and its applications in internet of things
, Article 27th Iranian Conference on Electrical Engineering, ICEE 2019, 30 April 2019 through 2 May 2019 ; 2019 , Pages 1486-1491 ; 9781728115085 (ISBN) ; Aref, M. R ; Bayat, M ; Barari, M ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2019
Abstract
Strong designated verifier signature scheme is a concept in which a user (signer) can issue a digital signature for a special receiver; i.e. signature is produced in such way that only intended verifier can check the validity of produced signature. Of course, this type of signature scheme should be such that no third party is able to validate the signature. In other words, the related designated verifier cannot assign the issued signature to another third party. This article proposes a new ID-based strong designated verifier signature scheme which has provable security in the ROM (Random Oracle Model) and BDH assumption. The proposed scheme satisfies the all security requirements of an...
Robust Control of Satellites Formation Flying
, M.Sc. Thesis Sharif University of Technology ; Saghafi, Fariborz (Supervisor)
Abstract
Recent developments in space industry and the great tendency for definition of efficient, precise and low cost missions are the main reasons for the growing interest in satellites formation flight. Regarding the aforementioned, the study of the multiple satellite control methods is the subject of the present project. In this project, the governing equations of motion of satellite formation flight are developed. Based on this development, it is shown that the satellite linear equations of motion like many other linear system presentations, can not sufficiently model the real system. Therefore, some of the most famous uncertainties in space dynamics such as semimajor axis and eccentricity...
Data Analysis of MOA for Gravitational Microlensing Events with Durations Less than 2 Days by Using Brown Dwarfs Population
,
M.Sc. Thesis
Sharif University of Technology
;
Rahvar, Sohrab
(Supervisor)
Abstract
Gravitational Microlensing is one of the most powerful methods of detecting very low mass objects like Exoplanets and Brown dwarfs. The most important parameter that we can extract from a microlensing event is Einstein radius crossing time t_E. In this thesis, with performing Monte-Carlo simulation, we will obtain t_E distribution for brown dwarf population. Then we will show that this population can be a good candidate for very short microlensing events with t_E<2 days. The data set used in this analysis was taken in 2006 and 2007 seasons by the MOA-II survey, with the 1.8-m MOA-II telescope located at the Mt. John University Observatory, New Zealand
Micro-modeling of Tehran 4-stroke Gasoline Motorcycle Fleet Emission and Investigating the Effects of Increasing Fueling System and Engine Technology Level
, M.Sc. Thesis Sharif University of Technology ; Hosseini, Vahid (Supervisor)
Abstract
The city of Tehran is dealing with air pollution problems for years. Providing a solution for this problem requires information about different pollutants emission sources. In this subjects, emission factors and emission models are essential tools for decision makers. Among different mobile emission sources in Tehran, motorcycles are of high importance. In this project, for the first time in Iran, exhaust gas pollutants emission of 66 motorcycles with different ages and engine displacement volumes were measured according to Euro-3 standard certification procedure. Measurement results showed that none of the tested motorcycles passed the Euro-3 certification limit on CO emission. Calculations...
An assessment of gasoline motorcycle emissions performance and understanding their contribution to Tehran air pollution
, Article Transportation Research Part D: Transport and Environment ; Volume 47 , 2016 , Pages 1-12 ; 13619209 (ISSN) ; Hosseini, V ; Sharif University of Technology
Elsevier Ltd
2016
Abstract
Motorcycles are the third most common means of transportation in the megacity of Tehran. Hence, measurements of emission factors are essential for Tehran motorcycle fleets. In this study, 60 carburetor motorcycles of various mileages and engine displacement volumes were tested in a chassis dynamometer laboratory according to cold start Euro-3 emissions certification test procedures. For almost all of the tested samples, the average carbon monoxide (CO) emission factors were about seven times higher than the limits for Euro-3 certification. No motorcycle fell within the Euro-3 certification limit on CO emissions. 125 cc engine displacement volume motorcycles, which are dominant in Tehran,...