Loading...
Search for:
nadi--elahe
0.232 seconds
Accelerating Multi-Agent Motion Planning in Complex Environments
, M.Sc. Thesis Sharif University of Technology ; Babazadeh, Maryam (Supervisor)
Abstract
This study investigates the motion planning problem for multiple agents with nonlinear dynamics in environments with static obstacles. Designing safe, smooth, and optimal trajectories for a group of agents operating concurrently in a shared space is a critical challenge in robotics, multi-agent systems, and autonomous navigation. Traditional methods often rely on initial guesses close to the optimal solution or become computationally inefficient at large scales. To address these challenges, this thesis proposes a novel computational framework based on the Alternating Direction Method of Multipliers (ADMM) and the Convex Feasible Set (CFS) algorithm. The framework decomposes the overall...
Analyzing the Interplay of Power Management and Communication Reliability of Wireless Networks in Embedded Applications
, M.Sc. Thesis Sharif University of Technology ; Ejlali, Alireza (Supervisor)
Abstract
Due to safety critical applications of the embedded systems, reliability is one of the most important properties of these systems. Wireless networks also have error prone data transmission channels and limited power consumption. Therefore reliability and power conservation are two vital characteristics of the wireless network especially in embedded applications. Since achieving to a desirable level of data reliability is power consuming, we must consider a trade-off between power consumption and data reliability. In wireless networks power consumption can be categorized into: power consumption in wireless devices and power consumption in data transmission. For decrement of wireless devices...
Delamination Modeling In Composite Material Under The First Failure Mode
, M.Sc. Thesis Sharif University of Technology ; Hosseini Kordkheyli, Ali (Supervisor)
Abstract
In this research, delamination in compound laminated materials under the I mode loading is studied. In this way, a Double Cantilever Beam is investigated, which is the only experiment to study delamination in standard compound laminated materials. At first, a survey and comprehension of the failure of these materials is performed and the major mode of failure, which is named Delamination Mode is understood. Next, a survey on the possible methods of investigating the delamination phenomena is presented. In the next chapter, possible numerical methods are analysed, and the better performance of Cohesive Zone Model and Virtual Crack Closure Technique is studied. In this research, using the...
Clean-Label Data Poisoning Attack Methods Enhancement in Deep Learning Models
, M.Sc. Thesis Sharif University of Technology ; Rohban, Mohammad Hossein (Supervisor)
Abstract
In recent years, deep learning models have become one of the most widely used models in the field of artificial intelligence by showing high accuracy in various applications, in some of which the accuracy and correctness of the output of the models are very important, and in case of an error, there will be a possibility of chaotic events. Along with the progress of deep learning models, attacks have also been introduced in this field that severely compromises the security of such models and affects the accuracy and correctness of their output. Data poisoning is an attack on deep learning models wherein the attacker manipulates some data examples and adds these poisoned data to the victim's...
Confidential Access to the Outsourced Relational Data
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
In recent years, there has been a trend toward outsourcing data to the cloud provider. These companies must tackle the data security challenges. Generally these parties are assumed to be honest but curious. In past years, the research communities have been investigating different solution to ensure confidentiality.
In addition to data confidentiality access and pattern confidentiality is a high-priority issue in some cases so. potential adversary should be unable to drive information from the observed access pattern to the outsourced data. Despite the fact that there are more investigation in the field of data confidentiality, concern over data security are the rise in outsourcing data,...
In addition to data confidentiality access and pattern confidentiality is a high-priority issue in some cases so. potential adversary should be unable to drive information from the observed access pattern to the outsourced data. Despite the fact that there are more investigation in the field of data confidentiality, concern over data security are the rise in outsourcing data,...
Investigation on the Influence of Cooling Rate on Microstructure of CuCr25% Melt-spun Alloy
, M.Sc. Thesis Sharif University of Technology ; Varahram, Nasser (Supervisor) ; Davami, Parviz (Supervisor)
Abstract
The Cu-Cr10% ingots were prepared in induction furnace and these ingots were used to prepare CuCr25% in VAR. The percentages of elements were checked by chemical analysis. The ingots were divided to slices with 20gr mass and these slices were put in quartz tubes. The quartz tubes were assembled in melt spinning machine and the ribbons were quenched onto a rotating copper wheel. Three different wheel speeds, 8, 16, 36 m/s were chosen. The microstructure of the ribbons was examined using a scanning electron microscopy (SEM). The relationship between wheel speed and thickness of the ribbons were compared with mathematical modeling. The disk of ribbons with thickness of 0.5mm and radius of 5mm...
Centrality-based group formation in group recommender systems
, Article 26th International World Wide Web Conference, WWW 2017 Companion, 3 April 2017 through 7 April 2017 ; 2019 , Pages 1187-1196 ; 9781450349147 (ISBN) ; Khalili, S ; Elahe Ghalebi, K ; Grosu, R ; Mojde Morshedi, S ; Movaghar, A ; Sharif University of Technology
International World Wide Web Conferences Steering Committee
2019
Abstract
Recommender Systems have become an attractive field within the recent decade because they facilitate users' selection process within limited time. Conventional recommender systems have proposed numerous methods focusing on recommendations to individual users. Recently, due to a significant increase in the number of users, studies in this field have shifted to properly identify groups of people with similar preferences and provide a list of recommendations for each group. Offering a recommendations list to each individual requires significant computational cost and it is therefore often not efficient. So far, most of the studies impose four restrictive assumptions: (1) limited number of...
Investigate Laboratory Production of Hydroxyurea
, M.Sc. Thesis Sharif University of Technology ; Bastani, Dariush (Supervisor) ; Seifkordi, Ali Akbar (Supervisor) ; Zegordi, Elahe (Co-Advisor)
Abstract
Hydroxyurea is an anticancer drug that is commonly used to treat chronic myeloid leukemia (white blood cell cancer in bone marrow), polycythemia vera (red blood cell cancer), sickle cell anemia, solid tumors, and in particular leukemia. In this research, in addition to analyzing all available methods for synthesis of hydroxyurea, the most economical method for synthesis of hydroxyurea which is Hantzsch method was chosen; then we synthesized hydroxyurea crystals using a precipitation or crystallization process. To do so, two hydroxylamine hydrochloride and potassium cyanate reactants have been used in the semi batch reactor. Since the reaction efficiency and purity of the synthesized...
Observations on using probabilistic c-means for solving a typical bioinformatics problem
, Article EMS 2008, European Modelling Symposium, 2nd UKSim European Symposium on Computer Modelling and Simulation, Liverpool, 8 September 2008 through 10 September 2008 ; 2008 , Pages 236-239 ; 9780769533254 (ISBN) ; Ghazinezhad, A ; Rasooli Valaghozi, A ; Nadi, A ; Asgarian, E ; Salmani, V ; Najafi Ardabili, A ; Moeinzadeh, M. H ; Sharif University of Technology
2008
Abstract
Recently, there has been great interest in Bio informatics among researches from various disciplines such as computer science, mathematics, statistics and artificial intelligence. Bioinformatics mainly deals with solving biological problems at molecular levels. One of the classic problems of bioinformatics which has gain a lot attention lately is Haplotyping, the goal of which is categorizing SNP-fragments into two clusters and deducing a haplotype for each. Since the problem is proved to be NP-hard, several computational and heuristic methods have addressed the problem seeking feasible answers. In this work it is shown that using PCM to solve Haplotyping problem in DALY dataset yields...