Loading...
Search for:
khanzadi--h--r
0.122 seconds
Total 14545 records
A new strategy for providing QoS in IEEE 802.16 standard
, Article 2007 IEEE International Conference on Signal Processing and Communications, ICSPC 2007, Dubai, 14 November 2007 through 27 November 2007 ; 2007 , Pages 1083-1086 ; 9781424412365 (ISBN) ; Alavi, S. M ; Vosoughi Vahdat, B ; Sanaei, S ; Sharif University of Technology
2007
Abstract
This article presents a new QoS architecture for IEEE 802.16 Broadband Wireless MAN. The newly proposed strategy of providing QoS in packet-based networks via IEEE 802.16 has been analyzed. A mapping rule for providing layer 2.5 (MPLS protocol) and MAC layer has been proposed. A fast signaling mechanism has been designed to provide QoS in Point to Multipoint (PMP) mode. Although IEEE 802.16 standards define different mechanisms to provide Quality of Service requirements, it is the responsibility of the developers to obtain efficient designs. In this paper, we introduce a novel architecture for providing QoS requirements such as bandwidth utilization and delay. Simulation result shows the...
Optimal VM-to-user mapping in cloud environment based on sustainable strategy space theory
, Article Cluster Computing ; Volume 24, Issue 4 , 2021 , Pages 3229-3247 ; 13867857 (ISSN) ; Adabi, S ; Majidi, B ; Movaghar, A ; Sharif University of Technology
Springer
2021
Abstract
According to the previous studies in the field of economics-oriented cloud resource allocation using game theory, finding an equilibrium point for price is difficult in many cases. This is due to the stochastic situations of the cloud market. So, to tackle this problem we should find a space to describe behavior of the players’ strategies that be independent from the equilibrium point. Therefore, a new algorithm for VM-to-user mapping in the cloud market called VMUMA is proposed. For designing VMUMA, the cloud market is modeled by game theory. VMUMA is based on Sustainable Strategy Space Theory (SSST) in which, each stability and instability of the player’s strategies in the game are defined...
Design and manufacturing of High Speed Milling Spindle
, M.Sc. Thesis Sharif University of Technology ; Movahhedy, Mohammad Reza (Supervisor) ; Akbari, Javad (Supervisor)
Abstract
High speed machining is becoming a progressive trend in machining processes. The main part of a high speed machine tool is its spindle. The purpose of this thesis is to design and manufcture a high speed spindle for milling machine that can rotate at speed of 16000 rpm. This spindle can be used as a test bed for experimental parametric study on the effects of spindle design parameters on the performance of spindle bearings. Various components of the spindle is studied and designed. High speed angular contact bearings and roller bearings are used in the spindle to provide high precision as well as good thermal performance. The spindle is built and tested for high precision machining with...
Robust fuzzy rough set based dimensionality reduction for big multimedia data hashing and unsupervised generative learning
, Article Multimedia Tools and Applications ; Volume 80, Issue 12 , 2021 , Pages 17745-17772 ; 13807501 (ISSN) ; Majidi, B ; Adabi, S ; Patra, J. C ; Movaghar, A ; Sharif University of Technology
Springer
2021
Abstract
The amount of high dimensional data produced by visual sensors in the smart environments and by autonomous vehicles is increasing exponentially. In order to search and model this data for real-time applications, the dimensionality of the data should be reduced. In this paper, a novel dimensionality reduction algorithm based on fuzzy rough set theory, called Centralized Binary Mapping (CBM), is proposed. The fuzzy CBM kernel is used for extracting the central elements and the memory cells from the blocks of high dimensional data. The proposed applications of CBM in this paper include hashing and generative modelling of multimedia big data. The robustness of the proposed CBM based hashing...
Using description logics for network vulnerability analysis
, Article International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, ICN/ICONS/MCL'06, Morne, 23 April 2006 through 29 April 2006 ; Volume 2006 , 2006 ; 0769525520 (ISBN); 9780769525525 (ISBN) ; Jalili, R ; Abolhassani, H ; Shahriari, H. R ; Sharif University of Technology
2006
Abstract
The distributed nature and complexity of computer networks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to provide a simple, open communication infrastructure in an academic and collaborative environment, causes this protocol lack of built-in mechanisms for authentication, integrity and privacy. Even though in the last few years a more systematic approach to TCP/IP network security problem has been followed, a formal approach to this problem is lacking. In this paper, we propose using Description Logics as a formal model which could be used to analyze TCP/IP networks against attacks....
The influence of different heat treatment cycles on controlled surface graphitization in CK45 steel
, Article Journal of Alloys and Compounds ; Volume 492, Issue 1-2 , 2010 , Pages 739-744 ; 09258388 (ISSN) ; Kiani Rashid, A. R ; Shishegar, H. R ; Azaat Pour, H. R ; Sharif University of Technology
2010
Abstract
Controlled graphitization has become known as a practical method for improvement of wear resistance and machining properties in steels. In this paper, the effect of heat treatment on microstructure of CK45 steel has been investigated. Austenitising was carried out at 920 °C for 5 h. Besides, isothermal transformation was conducted at 750 °C in the time range of 1-20 h. In this work, full potential carbon resource was tried to be used around samples as a factor to prevent the burning of the limited carbon in steel and also to increase the percentage of sample surface carbon in order to improve wear capability and machining. The microstructure of the steel considerably changes by this heat...
Modified carrageenan. 4. Synthesis and swelling behavior of crosslinked kappa C-g-AMPS superabsorbent hydrogel with antisalt and pH-responsiveness properties [electronic resource]
, Article Journal of Applied Polymer Science ; Vol.98, No.1, 255-263, 2005 ; Hosseinzadeh, H ; Mazidi, R
Abstract
To synthesize a novel biopolymer-based superabsorbent hydrogel, 2-acrylamido-2-methylpropanesulfonic acid (AMPS) was grafted onto kappa-carrageenan (KC) backbones. The graft copolymerization reaction was carried out in a homogeneous medium and in the presence of ammonium persulfate (APS) as an initiator, N,N,N',N'-tetramethyl ethylenediamine (TMEDA) as an accelerator, and N,N'-methylene bisacrylamide (MBA) as a crosslinker. A proposed mechanism for KC-g-AMPS formation was suggested and the hydrogel structure was confirmed using FTIR spectroscopy. The affecting variables on swelling capacity, i.e., the initiator, the crosslinker, and the monomer concentration, as well as reaction temperature,...
Rapid microwave-assisted synthesis of PVP-coated ultrasmall gadolinium oxide nanoparticles for magnetic resonance imaging
, Article Chemical Physics ; Volume 453-454 , May , 2015 , Pages 35-41 ; 03010104 (ISSN) ; Madaah Hosseini, H. R ; Khodaei, A ; Montazerabadi, A. R ; Irajirad, R ; Oghabian, M. A ; Delavari,H. H ; Sharif University of Technology
Elsevier
2015
Abstract
Synthesis of polyvinyl pyrrolidone (PVP) coated ultrasmall Gd2 O3 nanoparticles (NPs) with enhanced T1 -weighted signal intensity and r2 /r1 ratio close to unity is performed by a microwave-assisted polyol process. PVP coated Gd2 O3 NPs with spherical shape and uniform size of 2.5 ± 0.5 nm have been synthesized below 5 min and structure and morphology confirmed by HRTEM, XRD and FTIR. The longitudinal (r1 ) and transversal relaxation (r2 ) of Gd2 O3 NPs is measured by a 3 T MRI scanner. The results showed considerable increasing of relaxivity for Gd2 O3 NPs in...
Improved optimal control technique for control of parallel three- phase inverters
, Article 2009 International Conference on Electric Power and Energy Conversion Systems, EPECS 2009, Sharjah, 10 November 2009 through 12 November 2009 ; 2009 ; 9789948427155 (ISBN) ; Mokhtari, H ; Sharif University of Technology
2009
Abstract
This paper proposes a high performance voltage tracking and current sharing among parallel connected inverters by applying optimal control and minimizing the cost function. The control system forces the voltage of load to track the voltage reference, and the current of all inverters becomes equal. Therefore, both current sharing and voltage tracking are obtained. In addition, the smallest input energy and simplicity in control circuit are the other advantages of the suggested method. To show the performance of the proposed control scheme, the simulations with two-modular practical systems are performed and the results are provided. The results indicate that the control objectives are...
Melting enthalpy and entropy of freestanding metallic nanoparticles based on cohesive energy and average coordination number
, Article Journal of Physical Chemistry C ; Volume 115, Issue 35 , August , 2011 , Pages 17310-17313 ; 19327447 (ISSN) ; Delavari H., H ; Madaah Hosseini, H. R ; Sharif University of Technology
2011
Abstract
An analytical model is proposed to study the effect of particle size on melting enthalpy and entropy of metallic nanoparticles (NPs). The Mott's and Regel's equations for melting entropy in the combination of core average coordination number (CAC) and surface average coordination number (SAC) of freestanding NPs are considered. Clusters of icosahedral (IC), body centered cubic (BCC), and body centered tetragonal (BCT) structure without any vacancies and defects are modeled. Using the variable coordination number made this model to be in good agreement with experimental and molecular dynamic (MD) results of different crystal structures. The model predicts melting entropy and enthalpy of...
A new lattic LP-based post filter for adaptive noise cancellers in mobile and vehicular applications
, Article Proceedings of the 8th IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2008, 16 December 2008 through 19 December 2008, Sarajevo ; 2008 , Pages 407-412 ; 9781424435555 (ISBN) ; Sameti, H ; Veisi, H ; Abutalebi, H. R ; Sharif University of Technology
2008
Abstract
Adaptive Noise Cancellation (ANC) is a well-known technique for background noise reduction in automobile and vehicular environments. The noise fields in automobile and other vehicle interior obey the diffuse noise field model closely. On the other hand, the ANC does not provide sufficient noise reduction in the diffuse noise fields. In this paper, a new multistage post-filter is designed for ANC as a solution to diffuse noise conditions. The designed post-filter is a single channel Linear Prediction (LP) based speech enhancement system. The LP is performed by an adaptive lattice filter and attempts to extract speech components by using intermediate ANC signals. The post-filter has no...
Network vulnerability analysis through vulnerability take-grant model (VTG)
, Article 7th International Conference on Information and Communications Security, ICICS 2005, Beijing, 10 December 2005 through 13 December 2005 ; Volume 3783 LNCS , 2005 , Pages 256-268 ; 03029743 (ISSN); 3540309349 (ISBN); 9783540309345 (ISBN) ; Sadoddin, R ; Jalili, R ; Zakeri, R ; Omidian, A. R ; Sharif University of Technology
2005
Abstract
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a fact, exploiting most of vulnerabilities result in access rights alteration. In this paper, we propose a new vulnerability analysis method based on the Take-Grant protection model. We extend the initial Take-Grant model to address the notion of vulnerabilities and introduce the vulnerabilities rewriting rules to specify how the protection state of the system can be changed by exploiting vulnerabilities. Our analysis is based on a bounded polynomial algorithm, which generates the closure of the Take-Grant graph...
A small signal circuit model of two mode InAs/GaAs quantum dot laser
, Article IEICE Electronics Express ; Volume 8, Issue 4 , 2011 , Pages 245-251 ; 13492543 (ISSN) ; Faez, R ; Hoseini, H. R ; Sharif University of Technology
2011
Abstract
In this paper, for the first time, we present a small signal circuit model of quantum dot laser considering two photon modes, i.e., ground and first excited states lasing. By using the presented model, effect of temperature variations on modulation response of quantum dot laser is investigated. Simulation results of modulation response are in agreement with the numerical and experimental results reported by other researchers
Bioelectricity generation enhancement in a dual chamber microbial fuel cell under cathodic enzyme catalyzed dye decolorization
, Article Bioresource Technology ; Volume 102, Issue 12 , June , 2011 , Pages 6761-6765 ; 09608524 (ISSN) ; Kariminia, H. R ; Roshandel, R ; Sharif University of Technology
2011
Abstract
Enzymatic decolorization of reactive blue 221 (RB221) using laccase was investigated in a dual-chamber microbial fuel cell (MFC). Suspended laccase was used in the cathode chamber in the absence of any mediators in order to decolorize RB221 and also improve oxygen reduction reaction in the cathode. Molasses was utilized as low cost and high strength energy source in the anode chamber. The capability of MFC for simultaneous molasses and dye removal was investigated. A decolorization efficiency of 87% was achieved in the cathode chamber and 84% COD removal for molasses was observed in the anode chamber. Laccase could catalyze the removal of RB221 and had positive effect on MFC performance as...
Investigation of breakdown voltage in InAIAs/InGaAs/InP HEMTs with different structures
, Article IEICE Electronics Express ; Volume 7, Issue 19 , 2010 , Pages 1447-1452 ; 13492543 (ISSN) ; Faez, R ; Hoseini, H. R ; Sharif University of Technology
2010
Abstract
InAlAs/InGaAs/InP high electron mobility transistors have higher mobility comparing to structures without indium. But existence of indium causes smaller Eg and as a result smaller breakdown voltage. However, increasing percentage of indium results in higher mobility and as a result higher current and transconductance. Therefore decreasing percentage of indium causes higher breakdown voltage at the sometime lower transconductance. One of the most important parameters that limit maximum output power of transistor is breakdown voltage. In this paper, InAIAs/InGaAs/InP HEMTs with different structures are simulated and a structure with a good transconductance and breakdown voltage is introduced
A simple label-free electrochemical DNA biosensor based on carbon nanotube-DNA interaction
, Article RSC Advances ; Volume 6, Issue 19 , 2016 , Pages 15592-15598 ; 20462069 (ISSN) ; Salimian, R ; Kalhor, H. R ; Sharif University of Technology
Royal Society of Chemistry
2016
Abstract
A simple platform based on a hairpin oligonucleotide switch and multi-walled carbon nanotubes (MWCNTs) for the ultrasensitive detection of specific DNA sequences has been developed. In this approach, the π-stacking interaction of single-strand DNA-MWCNT was employed to construct an electrochemical DNA biosensor. Changes to the surface conductivity, based on the MWCNT replacement, were monitored by using the electrochemical species [Fe(CN)6]3-/4- as a redox probe. Morphological and voltammetric characterizations of the electrode surface were performed using atomic force microscopy (AFM), energy dispersive spectroscopy (EDS), cyclic voltammetry (CV), differential pulse voltammetry (DPV) and...
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks
, Article Computers and Security ; Volume 25, Issue 6 , 2006 , Pages 459-468 ; 01674048 (ISSN) ; Jalili, R ; Shahriari, H. R ; Sharif University of Technology
2006
Abstract
With the growing rate of network attacks, intelligent methods for detecting new attacks have attracted increasing interest. The RT-UNNID system, introduced in this paper, is one such system, capable of intelligent real-time intrusion detection using unsupervised neural networks. Unsupervised neural nets can improve their analysis of new data over time without retraining. In previous work, we evaluated Adaptive Resonance Theory (ART) and Self-Organizing Map (SOM) neural networks using offline data. In this paper, we present a real-time solution using unsupervised neural nets to detect known and new attacks in network traffic. We evaluated our approach using 27 types of attack, and observed...
Sensor selection cost optimisation for tracking structurally cyclic systems: a P-order solution
, Article International Journal of Systems Science ; Volume 48, Issue 11 , 2017 , Pages 2440-2450 ; 00207721 (ISSN) ; Zarrabi, H ; Rabiee, H. R ; Sharif University of Technology
2017
Abstract
Measurements and sensing implementations impose certain cost in sensor networks. The sensor selection cost optimisation is the problem of minimising the sensing cost of monitoring a physical (or cyber-physical) system. Consider a given set of sensors tracking states of a dynamical system for estimation purposes. For each sensor assume different costs to measure different (realisable) states. The idea is to assign sensors to measure states such that the global cost is minimised. The number and selection of sensor measurements need to ensure the observability to track the dynamic state of the system with bounded estimation error. The main question we address is how to select the state...
Extension of bishop–gromov volume comparison theorem by elliptic operators
, Article Mediterranean Journal of Mathematics ; Volume 20, Issue 5 , 2023 ; 16605446 (ISSN) ; Fanai, H. R ; Fatemi, H ; Sharif University of Technology
Birkhauser
2023
Abstract
In this paper, we apply elliptic second-order differential operators to distance functions. As a result, we extend the mean curvature comparison theorem using lower bounds on the extended Ricci tensor. Then, we extend the Bishop–Gromov volume comparison theorem and some of its consequences on the topology of manifolds. © 2023, The Author(s), under exclusive licence to Springer Nature Switzerland AG
CANCERSIGN: a user-friendly and robust tool for identification and classification of mutational signatures and patterns in cancer genomes
, Article Scientific Reports ; Volume 10, Issue 1 , 2020 ; Rabiee, H. R ; Mehrbod, M ; Vafaee, F ; Ebrahimi, D ; Forrest, A. R. R ; Alinejad Rokny, H ; Sharif University of Technology
Nature Research
2020
Abstract
Analysis of cancer mutational signatures have been instrumental in identification of responsible endogenous and exogenous molecular processes in cancer. The quantitative approach used to deconvolute mutational signatures is becoming an integral part of cancer research. Therefore, development of a stand-alone tool with a user-friendly interface for analysis of cancer mutational signatures is necessary. In this manuscript we introduce CANCERSIGN, which enables users to identify 3-mer and 5-mer mutational signatures within whole genome, whole exome or pooled samples. Additionally, this tool enables users to perform clustering on tumor samples based on the proportion of mutational signatures in...