Loading...
Search for:
nasiri-avanaki--mohammad-reza
0.135 seconds
Total 6622 records
A Deconvolution Method Based on Total Variation Using Spatially Variant PSF Estimation for OCT Image Quality Enhancement
, M.Sc. Thesis Sharif University of Technology ; Fatemizadeh, Emad (Supervisor) ; Nasiri Avanaki, Mohammad Reza (Co-Advisor)
Abstract
Optical Coherence Tomography (OCT) has a great potential to elicit clinically useful information from tissues due to its high axial and transversal resolution. In practice, an OCT setup cannot reach to its theoretical resolution due to imperfections of its components, which make its images blurry. The blurriness is different alongside regions of image, thus they cannot be modeled by a unique point spread function (PSF). In this paper, we investigate the use of solid phantoms to estimate the PSF of each sub-region of imaging system. We then utilize Lucy-Richardson, steepest descent (SD) and total variation (TV) based iterative deconvolution methods for mitigating occurred spatially variant...
Discrimination of Malignant Melanoma by Light-Tissue Interaction Model and Optical Properties Extraction using Optical Coherence Tomography”
, Ph.D. Dissertation Sharif University of Technology ; Fatemizadeh, Emadeddin (Supervisor) ; Nasiri Avanaki, Mohammad Reza (Co-Supervisor)
Abstract
The current gold standard for clinical diagnosis of melanoma is excisional biopsy and histopathologic analysis. Approximately 15–30 benign lesions are biopsied to diagnose each melanoma. In addition, biopsies are invasive and result in pain, anxiety, scarring, and disfigurement of patients, which can add additional burden to the health care system. Among several imaging techniques developed to enhance melanoma diagnosis, optical coherence tomography (OCT), with its highresolution and intermediate penetration depth, can potentially provide required diagnostic information noninvasively.
an image analysis algorithm, "optical radiomic melanoma detection (ORMD)" has been presented which...
an image analysis algorithm, "optical radiomic melanoma detection (ORMD)" has been presented which...
A multi-sender multicast algorithm for media streaming on peer-to-peer networks
, Article Computer Communications ; Volume 30, Issue 10 , July , 2007 , Pages 2191-2200 ; Ronasi, K. (Keivan) ; Pakravan, M. R. (Mohammad Reza) ; Nasiri Avanaki, A. (Alireza) ; Sharif University of Technology
2007
Abstract
Unlike those on Internet, the media providers on P2P networks are ordinary nodes with limited shared resources such as bandwidth. Multi-sender methods are the best existing solutions to video streaming on P2P networks. In this paper, we propose use of a multicast method on the top of an arbitrary multi-sender method so that all requesting peers receive almost the same expected bit-rate. Experimental results, derived from implementation of the proposed algorithm on Pastry P2P network confirm our claim. Another advantage of our method over the existing methods is its scalability with the number of receivers
Hierarchical Enhancement of Optical Coherence Tomography Images
, Article 24th Iranian Conference on Biomedical Engineering and 2017 2nd International Iranian Conference on Biomedical Engineering, ICBME 2017, 30 November 2017 through 1 December 2017 ; 2018 ; 9781538636091 (ISBN) ; Fatemizadeh, E ; Nasiri Avanaki, M ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2018
Abstract
Optical coherence tomography (OCT) is a noninvasive imaging modality that provides cross-sectional images from microstructures of tissues. This optical imaging system works based on Michelson interferometry principle and has intermediate resolution and penetration depth which makes it appropriate for imaging thin tissues such as skin and eye. OCT images suffer from three main artifacts that make images difficult to be analyzed. The first one is small grainy structures called speckle which degrade image quality and decreases axial and lateral resolution. The second one is light intensity attenuation which is a function of depth. It happens because of absorbing and scattering nature of tissue...
3D Numerical Investigation of Elliptical Orifices Effect with Different Aspect Ratios on Liquid Jet Breakup
, M.Sc. Thesis Sharif University of Technology ; Morad, Mohammad Reza (Supervisor)
Abstract
In this research, the numerical simulation of liquid jet ejecting for a series of elliptical orifices into gaseous phase with different aspect ratios, at Rayleigh flow regime and in a range of Weber numbers has been performed.
For simulations, the OpenFoam software was utilized, which its multiphase flow simulation solvers are based on volume of fluid (VOF) method. In order to achieve the most accurate results for axis-switching phenomenon and jet breakup length, the dynamic mesh refinement was used for all the examined cases. The results, which were validated with recent experimental and numerical works, indicate that jet breakup length raises by increasing Weber number from 20 to 300....
For simulations, the OpenFoam software was utilized, which its multiphase flow simulation solvers are based on volume of fluid (VOF) method. In order to achieve the most accurate results for axis-switching phenomenon and jet breakup length, the dynamic mesh refinement was used for all the examined cases. The results, which were validated with recent experimental and numerical works, indicate that jet breakup length raises by increasing Weber number from 20 to 300....
Design and Prototyping of a Continuous Coaxial Nozzle for Uniforml Metal Powder Deposition at Various Angles
, Ph.D. Dissertation Sharif University of Technology ; Movahhedy, Mohammad Reza (Supervisor)
Abstract
Direct metal deposition (DMD) process is an additive manufacturing technology that is rapidly gaining laser importance due to its various capabilities in applications such as coating, repairing high-value damaged parts, rapid prototyping and even production in small quantities. Among the equipment needed for this process, nozzle is perhaps the most important component because its performance affect the efficiency of powders trapped in the molten pool, and is crucial to the quality of the deposited layer. The existing nozzle designs can be categorized in two groups; lateral and coaxial nozzles; and the coaxial ones are divided into continuous and discontinuous types. Coaxial nozzles have...
Wavelet-based unbalanced un-equivalent multiple description coding for P2P networks
, Article 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, Penang, 14 May 2007 through 17 May 2007 ; February , 2007 , Pages 242-247 ; 1424410940 (ISBN); 9781424410941 (ISBN) ; Ronasi, K ; Pakravan, M. R ; Nasiri Avanaki, A ; Sharif University of Technology
2007
Abstract
Almost all existing multi-description coding (MDC) schemes are designed for media streaming over Internet. In this work, a wavelet-based video MDC technique is introduced that fits the criteria of media streaming over peer-to-peer networks. Our proposed method assigns descriptions to the senders due to their characteristic (i.e. bandwidth and availability). In contrast to traditional MDC, different descriptions in the proposed method have different importance in remaking the original media. Our simulation results show considerable improvement of video quality at the receiver (up to 10 dB) as compared to the state-of-the-art. ©2007 IEEE
An enhanced random-walk method for content locating in P2P networks
, Article 27th International Conference on Distributed Computing Systems Workshops, ICDCSW'07, Toronto, ON, 22 June 2007 through 29 June 2007 ; 2007 ; 0769528384 (ISBN); 9780769528380 (ISBN) ; Firooz, M. H ; Pakravan, M. R ; Nasiri Avanaki, A ; Sharif University of Technology
2007
Abstract
The important problem of content location in an unstructured distributed network (such as P2P, with no central searching system, graph construction control or file placement regulation) is addressed. The existing methods that are based on either flooding or random walk impose a large traffic load on the network or require a long time to search. In this work, we propose a method that outperforms the existing methods in both of these measures. These advantages are achieved by publishing traces of the contents of each node in its nearby nodes, so that the closer nodes to the target have a stronger trace of it. Such traces are used to rapidly locate the desired content. The superb performance of...
IPROMISE: Reliable multi-sender algorithm for peer-to-peer networks
, Article 2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007, Bangalore, 7 January 2007 through 12 January 2007 ; 2007 ; 1424406145 (ISBN); 9781424406142 (ISBN) ; Ronasi, K ; Pakravan, M. R ; Nasiri Avanaki, A ; Sharif University of Technology
2007
Abstract
Due to the constraints of P2P networks (such as bandwidth limitation) multiple senders should be employed for reliable multimedia streaming. This paper introduces a mathematic approach to select a set of senders among all available senders to provide the most reliable stream for the receiver. This selection is based on upload bandwidths and availability of peers as well as bandwidth of links connecting the senders and the receiver. Our method is called IPROMISE as it is an improved version of the PROMISE algorithm. Simulation results demonstrate improved media quality delivered to the receiver, while the complexity of sender selection remains the same. © 2007 IEEE
A multi-sender multicast algorithm for media streaming on peer-to-peer networks
, Article Computer Communications ; Volume 30, Issue 10 , 2007 , Pages 2191-2200 ; 01403664 (ISSN) ; Ronasi, K ; Pakravan, M. R ; Nasiri Avanaki, A. R ; Sharif University of Technology
2007
Abstract
Unlike those on Internet, the media providers on P2P networks are ordinary nodes with limited shared resources such as bandwidth. Multi-sender methods are the best existing solutions to video streaming on P2P networks. In this paper, we propose use of a multicast method on the top of an arbitrary multi-sender method so that all requesting peers receive almost the same expected bit-rate. Experimental results, derived from implementation of the proposed algorithm on Pastry P2P network confirm our claim. Another advantage of our method over the existing methods is its scalability with the number of receivers. © 2007 Elsevier B.V. All rights reserved
Design and Optimization of Positioning System for Hull Crawling Robot
, M.Sc. Thesis Sharif University of Technology ; Khorasanchi, Mahdi (Supervisor) ; Tabeshpour, Mohammad Reza (Supervisor)
Abstract
The hulls of various ships are exposed to the problem of biofoulings on the hull after a period of time due to use in the salt water environment of the sea and the existence of suitable conditions for the growth of marine plants, so that the ship after about one month of stopping in the port, in order to start the activity again, it is necessary to clean the hull from these biofoulings. The ship will be transported to the dry dock for cleaning only when it is heavily involved in biofoulings on the hull, and in the meantime, it must be periodically cleaned in water by other systems, including the diver and robotic systems.Using a robotic system to perform this operation has various...
Studying the Wisdom of Crowd Through Large-Scale Experiment & Statistical Simulations
, M.Sc. Thesis Sharif University of Technology ; Ejtehadi, Mohammad Reza (Supervisor) ; Yaseri, Taha (Co-Supervisor)
Abstract
In this thesis, we have tried to study one of the most well known collective behavior phenomena known as the Wisdom of the crowd, from the perspective of statistical physics. In recent decades with the appearance of Social Networks and mass media, collective social phenomena have become a critical topic in the life of every human being. In the Wisdom of crowd phenomenon, the overall process is to ask the crowd’s opinion regarding a special topic and after aggregating the predicted values, the aggregated quantity is declared as the wisdom of the crowd. It has been observed that in some polls and elections, the result of the wisdom of crowd outperforms every individual of the group and in some...
Simulated annealing optimization in wavefront shaping controlled transmission
, Article Applied Optics ; Volume 57, Issue 21 , 2018 , Pages 6233-6242 ; 1559128X (ISSN) ; Mohammadian, N ; Salimi, F ; Fatima, A ; Rahimi Tabar, M. R ; Nasiri Avanaki, M. R ; Sharif University of Technology
OSA - The Optical Society
2018
Abstract
In this research, we present results of simulated annealing (SA), a heuristic optimization algorithm, for focusing light through a turbid medium. Performance of the algorithm on phase and amplitude modulations has been evaluated. A number of tips to tune the optimization parameters are provided. The effect of measurement noise on the performance of the SA algorithm is explored. Additionally, SA performance is compared with continuous sequential and briefly with other optimization algorithms. © 2018 Optical Society of America
A misbehavior‐tolerant multipath routing protocol for wireless Ad hoc networks [electronic resource]
, Article International Journal of Research in Wireless Systems (IJRWS) ; Vol. 2, Issue 9, pp. , Sep. 2013 ; Pakravan, Mohammad Reza ; Aref, Mohammad Reza ; Sharif University of Technology
Abstract
Secure routing is a major key to service maintenance in ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. As a result of the resource limitations in such networks nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a novel data redirection method to mitigate the impact of node misbehavior on network...
Heteroatom Influence on the Basicity of Amines
, M.Sc. Thesis Sharif University of Technology ; Fattahi, Alireza (Supervisor)
Abstract
Present work focuses on the influence of Heteroatom(s) on the bacisity of specific group of amines through the intramolecular hydrogen bonding. This group includes Aza-Crown Ethers specifically. We used Spartan and Gaussian packages to gain optimized structures for all compounds in order to explore the influence of the intramolecular hydrogen bonding on the bacisity of amines. All the gas phase optimizations and energy calculations were performed at the DFT/B3LYP/6-311++G(d,p) level of theory. The Hf/6-31+G(d,p) level was used for all single point calculations in the solution phase. As commonly used solvents in organic and biological reactions, the solution phase calculations were carried...
Identification of Growth Path in Firms And It Required Organizational Capability
,
M.Sc. Thesis
Sharif University of Technology
;
Modarres, Abdolhamid
(Supervisor)
Abstract
Today, the importance of growth and its relation with the survival of the organization is well-known by all managers. However, path selection in this area seems extremely vague and difficult. The present theoretical research, conducted to help further clarify growth dimension characteristics, aims at considering possible growth paths for firms as well as examining required capabilities for each path. In this research, firm growth was studied from three different angles: value chain, product system complexity and the market. A relatively comprehensive categorization was made of organizational capabilities namely technological, managerial and networking and it was examined within dynamic and...
Stability Analysis of Fractional Time Delayed Linear Time Invariant Systems with Infinitesimal Fractions
, M.Sc. Thesis Sharif University of Technology ; Haeri, Mohammad (Supervisor)
Abstract
Time delay generates exponential transcendental terms in characteristic equations. Subsequently, the applied methods are narrow to assess the stability map of delayed fractional-order systems with vanishing fractions. In this case, it is convenient to approximate these equations with its integer-order counterparts to design controllers or investigating features of the systems. But, delay can cause enormous differences between characteristic of these two equations. This study offers a method to survey analytically the stability of fractional-order time delayed linear time invariant systems with infinitesimal fractions. In this method, equations are transferred to an explicit expression which...
Design for Fabrication, Fabrication and Calibration of a Knee Prosthesis Laxity and Stability Test Machine
, M.Sc. Thesis Sharif University of Technology ; Durali, Mohammad (Supervisor)
Abstract
In this project, conceptual and detailed designs of a knee prosthesis constraint testing machine were performed based on ASTM F1223-20 standard. Conceptual and detailed mechanical and electrical design of machine and parts were performed based on common engineering practice and standards. Parts were carefully manufactured and controlled for quality assurance. The machine was then assembled and checked for proof of performance. A plc program was written as machine software. A comprehensive user interface was coded on computer for performing various tests, which can command the machine and view the required data in a graphical environment. Finally, simple experiments were designed and...
Analysis and Improvement of Intrusion Detection Methods in Data Network Routers
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
Abstract
High-quality online services demand reliable and fast packet delivery at the network layer. However, clear evidence documents the existence of compromised routers in the ISP and enterprise networks, threatening network availability and reliability. A compromised router can stealthily drop, modify, inject, or delay packets in the forwarding path to launch Denial-of-Service, surveillance, man-in-the-middle attacks, etc. So researches tried to create intrusion detection methods to identify adversarial routers and switches. To this end, data-plane fault localization (FL) aims to identify faulty links and is an effective means of achieving high network availability. FL protocols use...
Topological Defects in Confined Nematics by Planar Anchoring
, M.Sc. Thesis Sharif University of Technology ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Supervisor)
Abstract
Confining nematic liquid crystal between two curved boundary conditions while the nematic molecules have a degenerate planar anchoring leads to complex and beautiful textures of molecular disparagement(defect) in the bulk and on the surfaces. Such the liquid crystal shells are made with double-emulsion techniques in microfluidic devices have provided applications for micro-scale colloidal linkers.In this work, we have numerically minimized the elastic energy in one-constant approximation in present of Fournier’s degenerate surface potential with finite element method. The nematic shell is confined between two spherical surfaces that we have studied the final energies and their related...