Loading...
Search for:
heidari--mohammad-reza
0.162 seconds
Total 6532 records
Covalent Attachment of Lysozyme Enzyme to Sulfur-Glycerol Copolymer for the Preparation of Proteinosome as a Hierarchical Structure
, M.Sc. Thesis Sharif University of Technology ; Kalhor, Hamid Reza (Supervisor)
Abstract
Hyperbranched copolymers are highly attractive due to their unique properties, such as tunable structure and surface functionality, making them versatile for applications in biotechnologies, pharmaceuticals, and materials engineering. Glycidol, as a reactive monomer with excellent biocompatibility, combined with sulfur, which enhances mechanical and chemical properties, represents a promising combination for hyperbranched copolymer synthesis. In this study, hyperbranched glycidol-sulfur copolymers were synthesized using cationic and anionic ring-opening polymerization methods. FT-IR analysis confirmed the successful incorporation of S-S bonds and sulfur-containing functional groups into the...
A Constitutive Model to Predict the Strain Rate Dependent Behavior of Auxetic Materials
, M.Sc. Thesis Sharif University of Technology ; Arghavani, Jamal (Supervisor) ; Naghdabadi, Reza (Supervisor)
Abstract
A new types of architected cellular materials are those with negative poisoon’s ratio named auxetic. This materials indicate unormal behavior under different loads as if they were stretched in one direction, they also expanded in other directions and if pressure is exerted in one direction, they are compressed in all directions. Auxetic materials can improve mechanical properties such as shear strength, strength to weight ratio, thoghness, energy and vibration dissipation and crack expansion due to fatigue.The useful features of this material have been taken into account in a variety of industries, including the automotive industry, in the manufacture of parts such as body and bumper,...
Kinetics of Incomplete Reduction of Hematite Low Grade Iron Ore to Magnetite Using Mixture of CO and CO2
, M.Sc. Thesis Sharif University of Technology ; Halali, Mohammad (Supervisor)
Abstract
In this research the process of incomplete reduction of hematite low iron ore to magnetite in a fluidized bed reactor was investigated. Temperature, composition of reduction air, particle size, and stay time were investigated as effective parameters. In this way, temperatures of 560, 580, 600, 620 and 640 degrees of centigrade, input air with flows of 1.2, 1.3 and 1.4 l/s, particles size of 425-850 µm, 850 µm-1.4 mm, and 1.4-2 mm, stay times of 4, 8, 12, 16, and 20 min were used in this research. The reduced specimens were analyzed by XRD and chemical analysis. The results illustrated that increase of temperature, decrease of input air flow, decrease of particles size, and increase of stay...
Flood Routing Studies, Dambreak Modeling – Case Study: Shahrchay Dam
, M.Sc. Thesis Sharif University of Technology ; Jafarzadeh, Fardin (Supervisor)
Abstract
Due to several reasons such as water deficiency and gradual reduce in water resources, dams had always been prominent during past centuries. Most of the dams have been built proximate to cities to provide water for drinking and industries thus, it’s vital to examine them in the aspects of safety factor and capacity to contain overflow. Failure of the dames should also studied considering different features such for instance sudden increment of stored water behind the dam as a result of gigantic floods, leakage in the body of soil dams, overflow in the dam crest due to insufficient functionality of spillway and etc. which could cause the failure of dams.
The main purpose of this thesis...
The main purpose of this thesis...
Consequence Modelling and Probabilistic Risk Assessment of Oil Spills in the Marine Waters
, Ph.D. Dissertation Sharif University of Technology ; Raie, Mohammad (Supervisor)
Abstract
Different causes in the exploration, production and transport of oil in the marine environment result in oil spill events. Since elimination of the probability of occurrence of spills is not possible, it is important to have a plan to control the risk of oil spills by optimal response. In this research, a general stucture is presented for the DSS required for oil spill response planning. This system can be used for evaluation of the effectiveness of response drills, and risk-based ranking of receptor areas and spill sources. Ranking based on risk is realized through probabilistic or stochastic risk assessment. The applicability of the proposed system is examined in differnet case studies in...
A misbehavior‐tolerant multipath routing protocol for wireless Ad hoc networks [electronic resource]
, Article International Journal of Research in Wireless Systems (IJRWS) ; Vol. 2, Issue 9, pp. , Sep. 2013 ; Pakravan, Mohammad Reza ; Aref, Mohammad Reza ; Sharif University of Technology
Abstract
Secure routing is a major key to service maintenance in ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. As a result of the resource limitations in such networks nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a novel data redirection method to mitigate the impact of node misbehavior on network...
Lateral Buckling Analysis of Offshore Pipelines
, M.Sc. Thesis Sharif University of Technology ; Ghoreishi, Reza (Supervisor) ; Abbaspour, Madjid (Supervisor)
Abstract
This project deals with the global buckling in high pressure/high temperature (HP/HT) subsea pipelines. Some subsea pipelines are laid directly on the seabed. Large axial forces will generally cause an exposed pipeline to buckle sideways, or laterally, on the seabed. Pipelines may significantly expand during start-up and shutdown cycles, resulting in global buckle formation with high out-of-straightness (OOS).This global buckling behavior may be unacceptable if it is not properly managed. Global buckling mitigation can be achieved by providing controlled lateral movements of pipeline. Buckle mitigation devices are installed along the pipeline to provide buckle initiation sites, there by...
Modeling of Connections in the Cold formed Steel Structures
, M.Sc. Thesis Sharif University of Technology ; Kazemi, Mohammad Taghi (Supervisor)
Abstract
Cold-formed steel sections are lightweight materials and suitable for building construction owing to their high structural performance. Conventionally, they are used as purlins and side rails in the building envelopes of industrial buildings. The most common sections are lipped C and Z sections, and the thickness typically ranges from 1.2 to 3.2 mm, and sections with yield strengths at 280, 350 and 450 MPa are commonly available. For connection design, codes of practice for design of cold-formed steel structures only provide design rules for the load carrying capacities of individual fastenings with bolts, screws and welds while no guidance on the structural behavior of connectors such as...
Characterization of Additive Maps on Rings Behaving Like Derivations at Idempotent-Product Elements
, M.Sc. Thesis Sharif University of Technology ; Mahdavi Hezavehi, Mohammad (Supervisor)
Abstract
Defining the structure of maps using local features is among the popular fields of study in mathematics. Therefore determining the structure of maps on rings which behave like derivations at idempotent-product elements has been getting attention recently. This subject is useful for examining the structure of rings and algebraic operators in both algebra and analysis as well. Suppose that R is a ring, d : R ! R is an additive map, z 2 R and d meets the condition below: 8a; b 2 R : d(ab) = ad(b) + d(a)b Therefore d is called a derivation on R. If for every a; b 2 R where ab = z, d(ab) = ad(b) + d(a)b then d behaves like a derivation at idempotent-product elements of ab = z. The main challenge...
Preparation of Nano Adsorbent from Cellulose-based Material for Gas Storage
, M.Sc. Thesis Sharif University of Technology ; Kazemeini, Mohammad (Supervisor) ; Rashidi, Alimorad (Co-Advisor)
Abstract
Natural gas (NG) has emerged as an alternative energy source in transportation sector as it provides clean combustion and hence lowers exhaust pollution. NG can be stored as an adsorbed phase in porous materials and is referred to ANG. The use of adsorbent materials for storing NG, at relatively low pressure (3.5–4 MPa), is a possibility for making ANG technology competitive with CNG. Among all adsorbents, carbon nanostructures with pore diameter (0.8-1.4 nm) has shown the highest adsorption capacity of natural gas. In the present study, cellulose has been used as the carbonaceous precursor and Activated Carbon (AC) has been prepared using hydrothermal carbonization of cellulose followed by...
Analysis and Improvement of Intrusion Detection Methods in Data Network Routers
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
Abstract
High-quality online services demand reliable and fast packet delivery at the network layer. However, clear evidence documents the existence of compromised routers in the ISP and enterprise networks, threatening network availability and reliability. A compromised router can stealthily drop, modify, inject, or delay packets in the forwarding path to launch Denial-of-Service, surveillance, man-in-the-middle attacks, etc. So researches tried to create intrusion detection methods to identify adversarial routers and switches. To this end, data-plane fault localization (FL) aims to identify faulty links and is an effective means of achieving high network availability. FL protocols use...
Topological Defects in Confined Nematics by Planar Anchoring
, M.Sc. Thesis Sharif University of Technology ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Supervisor)
Abstract
Confining nematic liquid crystal between two curved boundary conditions while the nematic molecules have a degenerate planar anchoring leads to complex and beautiful textures of molecular disparagement(defect) in the bulk and on the surfaces. Such the liquid crystal shells are made with double-emulsion techniques in microfluidic devices have provided applications for micro-scale colloidal linkers.In this work, we have numerically minimized the elastic energy in one-constant approximation in present of Fournier’s degenerate surface potential with finite element method. The nematic shell is confined between two spherical surfaces that we have studied the final energies and their related...
Solving Symmetric Nonlinear Equations System Using BFGS Trust Region Quadratic Method
, M.Sc. Thesis Sharif University of Technology ; Razvan, Mohammad Reza (Supervisor) ; Peyghami, Mohammad Reza (Supervisor)Effect of the Geometry of Colloidal Particles on Nematic Liquid Crystals
, Ph.D. Dissertation Sharif University of Technology ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Co-Advisor)
Abstract
A liquid crystal is a state of matter composed of highly anisotropic building blocks. When liquid crystals are exposed to surfaces with given shapes and anchoring conditions, the orientation of their molecules gets spatially disordered and topological defects may form in the system. The interplay between liquid crystals and the geometry and topology of the colloidal particles has motivated extensive recent studies.In this thesis, we present the numerical modeling results for two faceted colloidal particles in a thermotropic nematic liquid crystal. To obtain the equilibrium nematic field with a finiteelement method, we numerically minimize the free energy of the system that based on the...
Design and Implementation of 2.5 Gbps Circuit Switching Fabric
, M.Sc. Thesis Sharif University of Technology ; Pakravan, Mohammad Reza (Supervisor) ; Movahhedy, Mohammad Reza (Supervisor)
Abstract
Providing high bandwidth network infrastructures for ever increasing need of data transport is of great importance. The underling infrastructure for many communication services such as GSM/3G/4G mobile networks and Internet services is Synchronous Digital Hierarchy (SDH) optical transport systems. SDH are standardized protocols that multiplex multiple lower rate digital bit streams, such as E1 and Ethernet, and transfer them synchronously over optical fiber using lasers or LEDs. In addition to high data transfer rates, flexible network management and protection mechanisms have great importance, hence are part of SDH standards. In order to obtain flexible network architecture and protected...
Preserving Privacy in Smart Grid
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
Abstract
Development of Smart Grid and deployment of smart meters in large scale has raised a lot of concerns regarding customers’ privacy. Consequently, several schemes have been proposed to overcome the above mentioned issue. These schemes mainly rely on data aggregation as a method of protecting users’ privacy from the grid operators. However, the main problem with most of these schemes is the fact that they require a large amount of processing power at the meter side. This, together with the fact that smart meters don’t usually have a powerful processor, can cause the unavailability of smart meter data at the required time for operators of the grid, and at the same time disables smart meters from...
Improvement of Routing Security in Ad Hoc Networks Against Several Attacks
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Supervisor)
Abstract
Secure routing is a major key to service maintenance in wireless ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. Wormhole attack is one of the most severe active attacks to mobile ad hoc networks. Noting the resource limitations in such networks, nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a...
Determination of Correlation between Phase Amplitude Coupling and Surprise in Brain
, M.Sc. Thesis Sharif University of Technology ; Karblaei Aghajan, Hamid (Supervisor)
Abstract
The human brain needs to create a model of data surrounding it continuously. To do so, handling the dynamics of information through communication between the brain regions is a critical step. Having a model of this procedure in the brain not only provides a clear explanation of how cognition occurs in the brain, but also enables us to have a better view of the cognition impairments in the brain. Surprise is a process in the brain that brings various cognitive abilities, including attention and memory, into practical use. Furthermore, these abilities are about manipulating the input information in an optimized way. Memory is the ability to store information arriving at a specific time....
Solving Nonlinear Systems of Mixed Iqualities and Inequalities Via Trust Region Quadratic Methods
, M.Sc. Thesis Sharif University of Technology ; Razvan, Mohammad Reza (Supervisor) ; Payghami, Mohammad Reza (Supervisor)Jamming Resilient Algorithms for Rendezvous in Cognitive Radio Networks
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
Abstract
Dynamic spectrum access with the aid of cognitive radio (CR) technology is a viable solution to spectrum scarcity. There are many military and emergency applications that require the use of cognitive radio ad-hoc networks (CRAHNs). In these net- works, nodes must first find each other in a wide spectrum and then exchange their desired data. The process of finding each other in a multichannel environment is a challenging task and is usually known as rendezvous. Since rendezvous is the first step in communication, disrupting will disable the nodes from establishing proper communication sessions. That results in a drastic degrade in the performance of the network. Therefore, it is important to...