Loading...
Search for: jalili-sadr-abad--mohammad
0.138 seconds

    Comparative Study on Stability of Concrete Gravity Dams Using Rigid and Flexible Approach

    , M.Sc. Thesis Sharif University of Technology jalili Sadr Abad, Mohammad (Author) ; Ghaemian, Mohsen (Supervisor)
    Abstract
    One of most important type of dams are concrete gravity dams, This structures maintain their stability against the load from their weight. The study of stability of dams is very important issue because Iran is placed on a seismic zone and instability of constructed dams will cause many problems for us. There are two method in study of concrete gravity dams: in first method which is named rigid approach the body of dam consider as a rigid body and by equilibrium equations and traditional strength of material concepts the safety factors of stability and stresses are determined. In second method that is named flexible approach, we should prepare a finite element method from the dam, reservoir... 

    Intrusion Detection in Wireless Sensor Networks Using Incremental Emotional Intelligence Models

    , M.Sc. Thesis Sharif University of Technology Bayat, Firoozeh (Author) ; Hashemi Mohammad Abad, Saeid (Supervisor)
    Abstract
    Wireless Sensor Networks (WSNs) are rapidly emerging as an important area in mobile computing research. Applications of WSNs are numerous and growing, some of them are even highly critical, like military or safety applications. Security measures must be applied to protect the network from a variety of attacks. Since no intrusion prevention measure is perfect, intrusion detection becomes an important second wall to protect the network. WSNs have unique nature which is different from other kinds of networks. In this project, we examine the characteristics and vulnerabilities of WSNs and propose a new intrusion detection model to protect the network security. In this work we have not only... 

    Formal Analysis of Security Properties of Homomorphic-Cryptography-Based E-voting Protocols using µCRL

    , M.Sc. Thesis Sharif University of Technology Haghighat, Mohammad Hashem (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    With fast improvements of technology in advances in electronic voting systems, has been very effective in substantially reducing the disadvantages of traditional elections and thus enhancing the legitimacy of those being elective. These systems, to be effective,
    ought to be designed based on several security factors such as eligibility, correctness, voters' privacy, verifiability and receipt-freeness. One of the most important issues in this concept is ensuring the satisfaction of these properties. Using an incomplete and vulnerable system may cause negative consequences. Therefore, it is necessary to evaluate the system before implementation. Using formal methods for verification of... 

    An Efficient and Light Provably Secure Identification Protocol

    , M.Sc. Thesis Sharif University of Technology Kargar, Mohammad Ali (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Identification protocols facilitates two participants A and B to identify themselves to each other. Beside identification, A and B can exchange a secret value along with the identification process as the key exchange identification protocol.A secure key exchange identification protocol hould utilize perfect forward secrecy (PFS) property. PFS means if an attacker could compromise an entity in future and gain its long-term key, he cannot succeed to extract previous session keys. So, he will be unable to decrypt previous messages and they will remain secure. Because of the low power and storage of light devices, updating secret shared keys is a solution to reach PFS in such protocols. A major... 

    Conceptual Analysis and Extension of Zero-Knowledge Models & Definitions

    , Ph.D. Dissertation Sharif University of Technology Dousti, Mohammad Sadeq (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Zero-knowledge proofs are one of the most useful constructions of modern cryptography. Their invention has greatly affected both cryptography and complexity theories. The seemingly paradoxical characteristic of zero-knowledge proofs is that they convince the verifier of the validity of the proposition being proved, yet they yield to further knowledge to him. Two primary applications of zero-knowledge proofs are authentication protocols, as well as sub-protocols which prove that parties involved in some main protocol have acted honestly. In this research, we will survey the models and definitions of zero-knowledge, and analyze their relationship. We then pertain to the interplay between... 

    Detecting Voice in Encrypted Traffic

    , M.Sc. Thesis Sharif University of Technology Sharafi, Mohammad Hossein (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Today, smartphones became a universal technology, and mobile networks speed and bandwidth have increased. Additionally, some of the messengers support voice call services that are easy to use and economical. Many of the VoIP servers provide encrypted VoIP service. On the other side, ISPs need to recognize the VoIP flows to enforce their policies. In some case, ISPs should block illegal VoIP calls or fix a specific charge for them. Also, for providing a better quality of service, it’s necessary to decrease the delay of VoIP packets. Most related works have concentrated on the methods of detecting VoIP traffic that just worked on a specific application. Some other works detect VoIP by using IP... 

    Defending Traffic Unobservability through Thwarting Statistical Features

    , M.Sc. Thesis Sharif University of Technology Karimi, Mohammad Reza (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Governments and organizations need to classify network trac using deep packet inspection systems, by protocols, applications, and user’s behavior, to monitor, control, and enforce law and governance to the online behavior of its citizens and human resources. The high capacity of machine learning in the classication problem has led trac monitoring systems to use machine learning.The development of machine learning-based trac monitoring systems in the eld of research has reached relative maturity and has reached the border of industrial, commercial and governmental use. In the latest trac classi-cation studies using neural networks, as the most ecient machine learning methods, the classication... 

    Kinetic Modeling of Dimehtyl Ether Production from Synthesis Gas

    , M.Sc. Thesis Sharif University of Technology Kargar Sharif Abad, Monireh (Author) ; Kazemeini, Mohammad (Supervisor) ; Aghaziarati, Mahmoud (Supervisor)
    Abstract
    In view of environmental problems and the limited energy supply, synthesis of new liquid fuel from coal or natural gas is becoming a hot research in recent years. Dimethyl ether (DME) is one of the most promising alternates of such synthetic fuels. In this project the kinetics of direct DME synthesis from syngas (H2 and CO) over the new bifunctional catalyst has been investigated in slurry reactor system. A new mechanism and rate law expression were established. The kinetic model has been fitted the experimental data, which has been obtained by other researchers. The new bifunctional catalyst was composed of Cu/ZnO/ZrO2 and Al-modified H-Mordenite zeolite. The calculated apparent... 

    Numerical Electromagnetic Simulation of Millimeter Wave Imaging System and Comparison to Experimental Results

    , M.Sc. Thesis Sharif University of Technology Sadr, Fatemeh (Author) ; Khavasi, Amin (Supervisor)
    Abstract
    Millimeter wave imaging systems have unique features and have been used extensively in a variety of applications including medical imaging, construction operations, places with high security such as airports, Nondestructive testing and etc. These systems provide high resolution, due to the order of wavelength which is several millimeter or centimeter in this band. Also in places with high security and for detecting the concealed objects under people’s clothing, these waves can easily pass through the materials and investigate the person’s body without causing health problems. A wide variety of these imaging systems , each with different design parameters and resolutions, have been proposed.... 

    Design of a High Pressure Centrifugal Compressor Impeller of an Aviation Turboshaft Engine

    , M.Sc. Thesis Sharif University of Technology Sadr, Motahareh (Author) ; Ghorbanian, Kaveh (Supervisor)
    Abstract
    The purpose of this study is developing the design means of a high pressure centrifugal compressor impeller for aviational applications i.e. turboshaft engines. The logic and constraints of designing a high pressure centrifugal impeller for a turboshaft engine is different from those of low pressure aerial or high speed industrial ones. This kind of impeller is deployed in a number of advanced generation of aero engines. In this study, the centrifugal impeller design tools are developed using two design methods. Then, the results are compared, validated and corrected with an existing high pressure impeller data. A number of impellers with pressure ratios ranging from 6 to 11 are designed and... 

    Enⅽrypteⅾ Traffiⅽ Anaⅼysis through Expⅼainabⅼe Ⅿaⅽhine Ⅼearning

    , M.Sc. Thesis Sharif University of Technology Moghaddas Esfahani, Mohammad Reza (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Impressive progress in hardwares and developing encryption algorithms in last two decades are caused increase in using encryption protocols in network communications. In last decade, users use privacy preserving networks like Jap and Tor to protect their privacy. These networks protect users' data from eavesdroppers by using three-layer encryption and intermediate nodes between user and target website. Recent researches show that Deep Neural Networks can predict websites viewed by users with high accuracy. In other words, privacy preserving networks suffer from information leakage. In this research, we introduced some of the most powerful methods in encrypted traffic classification and then... 

    Design of Neural Networks by Using Multiplexed Optical Neurons

    , M.Sc. Thesis Sharif University of Technology Jalili, Sajjad (Author) ; Mehrany, Khashayar (Supervisor) ; Memarian, Mohammad (Co-Supervisor)
    Abstract
    Electronic processors have encountered Moore’s limitations and they can not meet expectations following computer science advances in new algorithms such as neural networks. These limitations have brought research to focus on light as a high-capacity carrier of information. Light’s degrees of freedom can be exploited whenever the structure has devices able to carry, keep, manipulate and detect each DoF's information but this exploitation may itself lead to either a large footprint or more power consumption. Moreover, there are some scientific and technological difficulties in matching different computational algorithms to these DoF’s requirements. As a result, one must consider all advantages... 

    Investigating Effect of Data Features on Robustness of Deep Neural Networks Against Adversarial Attacks

    , M.Sc. Thesis Sharif University of Technology Rastegari Nejad, Mohammad Javad (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    The impressive performance of deep neural networks in various fields has led to the spread of this technology in various organizations and businesses. Training a neural network is a costly process due to the need of collecting relevant data and high computational cost; in this sense, a trained network is considered a valuable asset to any organization. One of the most important attacks against these networks is model extraction attacks. Model extraction attacks are implemented with the aim of training an surrogate model for the target learning model, and in addition to violating the intellectual property of the target model, they can be the basis of other attacks such as an adversarial... 

    Scaling of macroscopic superpositions close to a quantum phase transition

    , Article Physical Review B - Condensed Matter and Materials Physics ; Volume 93, Issue 19 , 2016 ; 10980121 (ISSN) Abad, T ; Karimipour, V ; Sharif University of Technology
    American Physical Society  2016
    Abstract
    It is well known that in a quantum phase transition (QPT), entanglement remains short ranged [Osterloh et al., Nature (London) 416, 608 (2005)NATUAS0028-083610.1038/416608a]. We ask if there is a quantum property entailing the whole system which diverges near this point. Using the recently proposed measures of quantum macroscopicity, we show that near a quantum critical point, it is the effective size of macroscopic superposition between the two symmetry breaking states which grows to the scale of system size, and its derivative with respect to the coupling shows both singular behavior and scaling properties  

    Critical slowing down of multiatom entanglement by Rydberg blockade

    , Article Physical Review A ; Volume 98, Issue 2 , 2018 ; 24699926 (ISSN) Abad, T ; Mølmer, K ; Sharif University of Technology
    American Physical Society  2018
    Abstract
    Laser excitation pulses that lead to perfect adiabatic state transfer in an ensemble of three-level ladder atoms lead to highly entangled states of many atoms if their highest excited state is subject to Rydberg blockade. Solution of the Schrödinger equation shows that it is increasingly difficult to ensure the adiabatic evolution as the number of atoms increases. A diminishing energy gap, significant variations in collective observables, and increased work fluctuations link the critical slowing down of the adiabatic evolution with a quantum-phase-transition-like behavior of the system. © 2018 American Physical Society  

    Application of Composite FRP Decks in Building Structures

    , M.Sc. Thesis Sharif University of Technology Sadr Ara, Ali (Author) ; Mofid, Masood (Supervisor)
    Abstract
    This study is devoted to the analysis and design of a recently proposed steel-FRP deck system. A methodology is being proposed to analysis the elastic behavior of the proposed deck. In this method the deck is modeled as an equivalent orthotropic plate which is constrained by rotational springs along its edges. An analytical model of the proposed deck is derived by using Rayleigh-Ritz method where the primary Rayleigh-Ritz shape functions are generated from orthonormal polynomials by using Gram-Schmidt procedure. The results of the proposed methodology show good agreement with finite element analysis results. In order to test the applicability of the proposed deck as buildings flooring... 

    Robustness enhancement of content-based watermarks using entropy masking effect

    , Article 4th International Workshop on Digital Watermarking, IWDW 2005, Siena, 15 September 2005 through 17 September 2005 ; Volume 3710 LNCS , 2005 , Pages 444-458 ; 03029743 (ISSN); 354028768X (ISBN); 9783540287681 (ISBN) Sadr, A. H ; Ghaemmaghami, S ; Sharif University of Technology
    2005
    Abstract
    Image-Adaptive watermarking systems exploit visual models to adapt the watermark to local properties of the host image. This leads to a watermark power enhancement, hence an improved resilience against different attacks, while keeping the mark imperceptible. Visual models consider different properties of the human visual system, such as frequency sensitivity, luminance sensitivity and contrast masking. Entropy masking is another human visual system's characteristic, which rarely has been addressed in visual models. In this paper we have utilized this masking effect to improve the robustness of Image-Adaptive watermarks while keeping their transparency. Experimental results show a significant... 

    Failure analysis of a gas turbine compressor in a thermal power plant

    , Article Journal of Failure Analysis and Prevention ; Volume 13, Issue 3 , 2013 , Pages 313-319 ; 15477029 (ISSN) Masoumi Khalil Abad, E ; Farrahi, G. H ; Masoumi Khalil Abad, M ; Zare, A. A ; Parsa, S ; Sharif University of Technology
    2013
    Abstract
    This study presents the results of failure analysis of a 28 MW gas turbine at the Rei electrical power plant. The gas turbine failed during the shutdown period and near its second natural frequency at 4200 rpm. Initial inspections revealed that the compressor disk of stage 15 was fractured, and all of the stationary and rotary blades of stages 14-18 of the compressor had been detached or broken from the dovetail region of the disks. The fracture roots were investigated by performing finite element modeling and fractography analysis. It was shown that a crack was initiated from the disk edge on its interface with the rotor shaft and was propagated under cyclic loading. As a result of the... 

    Macroscopic Superposition in Quantum Systems

    , Ph.D. Dissertation Sharif University of Technology Abad, Tahereh (Author) ; Karimipour, Vahid (Supervisor)
    Abstract
    Quantum mechanics provides a deep understanding of atoms and their interaction with light. As long as we consider only microscopic systems on the scale of an atomic radius, objections to quantum properties such as quantum superposition are nevertheless rare, mainly because of the overwhelming experimental evidence. When it comes to macroscopic systems, many things are not clear anymore. For example,everyday objects of macroscopic size do not exist in superposition of their different states. The reason is that a quantum system interacts with its environment locally,which destroys non-local quantum correlation within the system, larger objects interact with the environment more intensively and... 

    Design and Manufacturing of Atmospheric Water Generation in Hot and Humid Area

    , M.Sc. Thesis Sharif University of Technology Rastegari, Amin (Author) ; Sadr Hosseini, Hani (Supervisor)
    Abstract
    This experimental study evaluates the implementation of atmospheric water generator (AWG) apparatus for rural households to supply the needed water. Humid (atmospheric) air is sucked into the condenser and passed through an air filter by a fan; since the temperature of the condenser is lower than the ambient air temperature (dew point temperature), the moist in the atmospheric air is condensed and freshwater is collected which is stored in a tank and after 7 stages of purification will be ready to drink.Data of this project is obtained from Kish Island’s weather station to find the average temperature and humidity. Kish Island is chosen for this project because of its high humidity and...