Loading...
Search for: noroozi-rasool-abadi--mozhdeh
0.102 seconds

    The Planning and Scheduling of Operating Rooms under the Open Scheduling Strategy and Uncertainty

    , M.Sc. Thesis Sharif University of Technology Noroozi Rasool Abadi, Mozhdeh (Author) ; Rafiee, Majid (Supervisor)
    Abstract
    Operating rooms has always been considered as one of the most expensive, yet most profitable part of a hospital. Since many units in the hospitals are related to the operating room, improving efficiency in the operating room will result in increased efficiency in other units, so offering proper solutions in this area is very important. Suitable Planning and scheduling has a great impact on increasing the level of service and efficiency of the hospital. in this thesis, a mixed integer programming model for scheduling weekly elective patients in the surgical theater with the objective of maximizing the number of elective patients for the surgery and also the workload of the operating room... 

    An isolated three-phase three-switch buck rectifier with inrush current limiting

    , Article 6th Annual International Power Electronics, Drive Systems, and Technologies Conference ; 2015 , Pages 480-485 ; 9781479976539 (ISBN) Noroozi, N ; Zolghadri, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    In this paper a single stage structure is proposed for realizing a three-phase unity power factor rectifier. This topology utilizes a forward/flyback transformer to allow the high-frequency isolation. The principle of the operation and the applied control concept is discussed. Space vector modulation is used in order to achieve unity power factor and to have the output voltage be regulated. Furthermore, the system transient is analyzed during turn-on and a novel method is applied to the control system in order to limit inrush current during startup. The proper operation of the soft-start method is confirmed by numerical simulation of a 6KW, 380V/48Vdc. The stability of the closed-loop as... 

    Three-phase quasi-Z-source inverter with constant common-mode voltage for photovoltaic application

    , Article IEEE Transactions on Industrial Electronics ; 2017 ; 02780046 (ISSN) Noroozi, N ; Zolghadri, M. R ; Sharif University of Technology
    2017
    Abstract
    In trasformerless grid-connected photovoltaic (PV) systems, common-mode voltage (CMV) fluctuations cause leakage current flow through the stray capacitance of the PV panels. Shoot-through (SH) states in a quasi-Z-source inverter (q-ZSI), increase the amplitude of high order harmonics of CMV. In this paper, by using the modulation technique based on odd PWM (OPWM) and minor change in the Z network of the three-phase q-ZSI, the leakage current is blocked. No extra semiconductor element is added. By the proposed technique, CMV is kept nearly constant during switching cycles. The experimental results for CMV analysis in a 1kW prototype are presented to verify the theoretical analysis. IEEE  

    Three-Phase quasi-Z-source inverter with constant common-mode voltage for photovoltaic application

    , Article IEEE Transactions on Industrial Electronics ; Volume 65, Issue 6 , 2018 , Pages 4790-4798 ; 02780046 (ISSN) Noroozi, N ; Zolghadri, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    In trasformerless grid-connected photovoltaic (PV) systems, common-mode voltage (CMV) fluctuations cause leakage current flow through the stray capacitance of the PV panels. Shoot-through states in a quasi-Z-source inverter (q-ZSI) increase the amplitude of high-order harmonics of CMV. In this paper, by using the modulation technique based on odd pulse width modulation and minor change in the Z network of the three-phase q-ZSI, the leakage current is blocked. No extra semiconductor element is added. By the proposed technique, CMV is kept nearly constant during switching cycles. The experimental results for CMV analysis in a 1kW prototype are presented to verify the theoretical analysis. ©... 

    Microscopic structure and solubility predictions of multifunctional solids in supercritical carbon dioxide: a molecular simulation study

    , Article Journal of Physical Chemistry B ; Volume 121, Issue 7 , 2017 , Pages 1660-1674 ; 15206106 (ISSN) Noroozi, J ; Paluch, A. S ; Sharif University of Technology
    2017
    Abstract
    Molecular dynamics simulations were employed to both estimate the solubility of nonelectrolyte solids, such as acetanilide, acetaminophen, phenacetin, methylparaben, and lidocaine, in supercritical carbon dioxide and understand the underlying molecular-level driving forces. The solubility calculations involve the estimation of the solute's limiting activity coefficient, which may be computed using conventional staged free-energy calculations. For the case of lidocaine, wherein the infinite dilution approximation is not appropriate, we demonstrate how the activity coefficient at finite concentrations may be estimated without additional effort using the dilute solution approximation and how... 

    An isolated three-phase soft-switched buck rectifier

    , Article 2010 IEEE International Conference on Power and Energy, PECon2010, Kuala Lumpur, 29 November 2010 through 1 December 2010 ; 2010 , Pages 813-818 ; 9781424489466 (ISBN) Noroozi, N ; Zolghadri, M.R ; Haghi, R ; Sharif University of Technology
    2010
    Abstract
    In this paper a novel soft switching isolated buck rectifier is proposed. Various switching state sequences of a three-phase three-switch buck-type unity power factor rectifier are reviewed and the value of switching power loss in each state transition is investigated. The switching power loss of the converter is decreased by using zero current switching (ZCS) method. The operation modes of the converter are explained and analyzed. By using an auxiliary circuit with a simple method of energy recovery, the current is diverted away from the main power switches before they are turned off; so, switching losses in the converter are reduced. In this topology, the power transformer has only the... 

    An efficient estimator for tdoa-based source localization with minimum number of sensors

    , Article IEEE Communications Letters ; 2018 ; 10897798 (ISSN) Amiri, R ; Behnia, F ; Noroozi, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    In this letter, the problem of source localization using time difference of arrival (TDOA) is investigated. Then, a closedform two-stage solution is proposed based on estimation of the range nuisance parameter in the first stage and refinement of initial solution in the next stage. The proposed solution is shown analytically and verified by simulations to be an efficient estimate, which can attain the CRLB performance under mild Gaussian noise assumption. This method is able to locate the source with the minimum number of sensors required for N-dimensional localization. Numerical simulations demonstrate significant performance improvement of the proposed method compared with the... 

    Efficient algebraic solution for elliptic target localisation and antenna position refinement in multiple-input-multiple-output radars

    , Article IET Radar, Sonar and Navigation ; Volume 13, Issue 11 , 2019 , Pages 2046-2054 ; 17518784 (ISSN) Amiri, R ; Behnia, F ; Noroozi, A ; Sharif University of Technology
    Institution of Engineering and Technology  2019
    Abstract
    In this study, an algebraic closed-form method for jointly locating the target and refining the antenna positions in multiple-input-multiple-output radar systems is proposed. First, a set of linear equations is formed by non-linear transformation and nuisance parameters elimination, and then, an estimate of the target position is obtained by employing a weighted least-squares estimator. To jointly refine the target and antenna positions, the associated error terms are estimated in the sequence. The proposed method is shown analytically and confirmed by simulations to attain the Cramér-Rao lower bound performance under small-error conditions. Numerical simulations are given to support the... 

    Efficient joint moving target and antenna localization in distributed MIMO radars

    , Article IEEE Transactions on Wireless Communications ; Volume 18, Issue 9 , 2019 , Pages 4425-4435 ; 15361276 (ISSN) Amiri, R ; Behnia, F ; Noroozi, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, a novel solution for the problem of joint moving target and antenna localization in the distributed multiple-input multiple-output (MIMO) radar systems is proposed. The localization problem in the presence of antenna location uncertainty is formulated as a maximum likelihood (ML) estimation problem, which is then recast into convex form by defining some auxiliary variables and applying semidefinite relation (SDR) technique. Next, an algebraic closed-form estimator is proposed to jointly estimate the target and the antennas error terms and refine their uncertain values. The proposed method is shown analytically and verified by the numerical simulations to be an efficient... 

    A modulation method for leakage current reduction in a three-phase grid-tie quasi-Z-source inverter

    , Article IEEE Transactions on Power Electronics ; 2018 ; 08858993 (ISSN) Noroozi, N ; Yaghoubi, M ; Zolghadri, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    The leakage current originated from the fluctuations of the common-mode voltage (CMV) is an issue in a transformerless grid-connected photovoltaic (PV) system. In this paper, a modified space vector modulation based on the Fourier transform analysis is proposed to reduce the leakage current in a three-phase quasi-Z-source inverter (qZSI). The CMV harmonic content in a qZSI contains low and high-frequency harmonics which cause safety and EMI problems respectively. By implementing the proposed modulation in a three-phase qZSI, the low-frequency harmonics of the CMV are mainly reduced. The distribution of the high-frequency harmonics is also modified in a way they can be simply filtered.... 

    Mobility in file sharing

    , Article 11th International Conference on Distributed Multimedia Systems, DMS 2005, 5 September 2005 through 7 September 2005 ; 2005 , Pages 155-160 ; 1891706179 (ISBN) Sheikhattar, H ; Haghighat, A ; Noroozi, N ; Sharif University of Technology
    Knowledge Systems Institute Graduate School  2005
    Abstract
    New advances in technology of mobile computers along with advent of wireless and mobile networking bring new capabilities, applications and concerns to the computer world. In this paper, we discussed on file sharing requirements in a mobile environment. Then, we proposed an architecture that supports mobility of hardware, data and software over the environment. Finally a sample implementation of the suggested architecture is presented. © 2005 by Knowledge Systems Institute Graduate School  

    Efficiency Improvement of a Three-Phase Telecom Rectifier with Single-Stage Structure and Power Factor Correction

    , M.Sc. Thesis Sharif University of Technology Noroozi, Negar (Author) ; Zolghadri, Mohammad Reza (Supervisor)
    Abstract
    The objective of this project is to design and control and optimize a single-stage three-phase three-switch unity power factor telecom rectifier. For this purpose, the topology of three-phase three-switch converter has been investigated for both isolated and un-isolated converters. Following a comprehensive investigation on the converter structure, the power dissipation factors have been detected and the quantity of the power dissipation has been calculated by analytical methods and it confirmed by simulation results. To avoid extra power losses some novel soft-switched structures for three-phase three-switched converters have been introduced. the proper operation of the soft-switched... 

    Performance Improvement of Grid-connected Quasi-Z-Source Photovoltaic Inverter to Reduce Leakage Currents

    , Ph.D. Dissertation Sharif University of Technology Noroozi, Negar (Author) ; Zolghadri, Mohammad Reza (Supervisor)
    Abstract
    A quasi-Z-source inverter is a beneficial structure in photovoltaic applications. In a transformerless grid-connected inverter system, the common-mode voltage fluctuations cause the leakage current flow through the ground. The low-frequency harmonics of the common-mode voltage results in the malfunction of the residual current device. On the other hand, the high-frequency harmonics of the common-mode voltage cause EMI problems, additional loss and disturbance in the output currents. In this thesis, some methods are presented to reduce the leakage current in a three-phase quasi-Z-source inverter. First, different shoot-through implementation methods are investigated. By modifying the number... 

    Optimization of nonlinear unbalanced flexible rotating shaft passing through critical speeds

    , Article International Journal of Structural Stability and Dynamics ; Volume 22, Issue 1 , 2022 ; 02194554 (ISSN) Amirzadegan, S ; Rokn Abadi, M ; Firouz Abadi, R. D ; Sharif University of Technology
    World Scientific  2022
    Abstract
    This work studies the nonlinear oscillations of an elastic rotating shaft with acceleration to pass through the critical speeds. A mathematical model incorporating the Von-Karman higher-order deformations in bending is developed to investigate the nonlinear dynamics of rotors. A flexible shaft on flexible bearings with springs and dampers is considered as rotor system for this work. The shaft is modeled as a beam and the Euler-Bernoulli beam theory is applied. The kinetic and strain energies of the rotor system are derived and Lagrange method is then applied to obtain the coupled nonlinear differential equations of motion for 6 degrees of freedom. In order to solve these equations... 

    An Intrusion Detection System for the Grid Environment

    , M.Sc. Thesis Sharif University of Technology Movahed, Amirvala (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Existing Intrusion Detection Systems (IDSs) are not designed to deal with all categories of processing environments. This thesis focuses on IDSs for the Grid computing environment, and concentrates on feature selection and performance. An existing framework, Globus, is used as the basis for the consideration and development of the research issue in Grid computing. The system is based on two engine designs: (a) Signature and (b) Support Vector Machine; SVM has been selected for pattern discovery in traffic analysis. We found that the performance of the system greatly depends on the efficiency of the underlying framework and the number of Intrusion Detection System instances. We demonstrate... 

    A Method for Querying on Encrypted XML Data

    , M.Sc. Thesis Sharif University of Technology Karimi, Maryam (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    When organizations prefer to outsource their data, security protection of data will be more important. Using cryptography in addition to access control techniques is a natural way for saving confidentiality of data against untrusted server. However, encryption and decryption of data result in database performance degradation. In such a situation all the information stored in encrypted form, one cannot make the selection on the database content any more. Data should be decrypted first, so an unwilling tradeoff between the security and performance is normally forced. The appropriate approaches to increase the performance are methods to deal directly with the encrypted data without firstly... 

    Providing Confidentiality of Outsourced Data through Fragmentation

    , M.Sc. Thesis Sharif University of Technology Dodangeh, Peyman (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Data outsourcing is considered as a promising approach in today computing and connected world. This approach enables organizations to outsource their data to anexternal third party server which is responsible for storing and propagation of outsourced data. Although data outsourcing offers many benefits, especially for those organizations with limited resources and increaseing data volume, but this approach in security aspects like providing confidentiality and privacy about curious external third party or other threats, is faced by serious challenges. In the recent decade many approaches for solving or at least decreasing the potential threats over providing confidentiality of outsourced... 

    Evaluation of Security Features of an E-voting Protocol in a Semi-operational Environment

    , M.Sc. Thesis Sharif University of Technology Es'haghi, Mahdi (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Electronic voting refers to voting methods that is done using electronic devices or via the Internet or Web. Helios and Civitas protocols are among the recent protocols introduced in this field. Importance and high sensitivity of electronic voting protocols has led researchers to pay high attention about their security analysis. In recent years, different approaches have been used to inspect and analyze electronic voting protocols. In many of such approaches, analysis had been done in a very abstract environment and without considering the operational requirements.The purpose of this thesis is to evaluate the security features of electronic voting protocols, considering their operational and... 

    Security in Concurrent Execution of an Authentication Protocol

    , M.Sc. Thesis Sharif University of Technology Sobhdel, Yasser (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Today many communications take place over asynchronous insecure networks which do not provide any guarantee of security (as Internet); hence there is a must in authenticating party or parties with which we are going to interact. In many cases, more than two parties (entities) are going to interact, resulting in need of group authentication. Since authentication is inseparable from key exchange, we are going to introduce a new authenticated group key exchange protocol in this thesis which benefits from all known features for such a protocol in the literature such as contributiveness and deniability. To overcome the problem of concurrency, we use a framework dedicated to security in concurrent... 

    Analysis of End-to-End Electronic Voting Systems

    , M.Sc. Thesis Sharif University of Technology Takhtaei, Benyamin (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    End-to-end electronic voting protocols for electronic voting systems are used to hold a secure election with the two features of anonymity and verifiability. Verifiable mixnets are a fundamental element of electronic voting systems, which can keep the voters anonymous by mixing their votes, and provide a verifiability mechanism to prove their performance correctness. As the design of electronic voting protocols is error-prone, researchers consider the use of mathematics-based and systematic methods for their analysis. Therefore, based on formal methods and the process algebra approach, several studies have been conducted to analyze these systems, but none have properly analyzed verifiable...