Loading...
Search for:
rahimi--morteza
0.092 seconds
Total 551 records
Low Grade Heat Driven Multi-Effect Distillation and Desalination
, Book ; Chua, Hui Tong
Elsevier
2017
Abstract
Low Grade Heat Driven Multi-effect Distillation and Desalination describes the development of advanced multi-effect evaporation technologies that are driven by low grade sensible heat, including process waste heat in refineries, heat rejection from diesel generators or microturbines, and solar and geothermal energy. The technologies discussed can be applied to desalination in remote areas, purifying produced water in oil-and-gas industries, and to re-concentrate process liquor in refineries.
This book is ideal for researchers, engineering scientists, graduate students, and industrial practitioners working in the desalination, petrochemical, and mineral refining sectors, helping them...
This book is ideal for researchers, engineering scientists, graduate students, and industrial practitioners working in the desalination, petrochemical, and mineral refining sectors, helping them...
Ant colony algorithm for the shortest loop design problem [electronic resource]
, Article Computers and Industrial Engineering, Elsevier ; Volume 50, Issue 4, August 2006, Pages 358–366 ; Kazemi, Morteza ; Sharif University of Technology
Abstract
In this paper, a new algorithm for solving the shortest loop design problem is presented. The shortest loop design problem is to find the shortest loop for an automated guided vehicle covering at least one edge of each department of a block layout. In this paper, first it is shown that this problem can be represented as a graph model. The properties of the presented model enable us to design a meta-heuristic based on ant colony system algorithm for solving the shortest loop design problem. Computational results show the efficiency of our algorithm in compare to the other techniques
Analysis and data-based reconstruction of complex nonlinear dynamical systems : using the methods of stochastic processes
, Book
Springer International Publishing
2019
Abstract
This book focuses on a central question in the field of complex systems: Given a fluctuating (in time or space), uni- or multi-variant sequentially measured set of experimental data (even noisy data), how should one analyse non-parametrically the data, assess underlying trends, uncover characteristics of the fluctuations (including diffusion and jump contributions), and construct a stochastic evolution equation?
Here, the term "non-parametrically" exemplifies that all the functions and parameters of the constructed stochastic evolution equation can be determined directly from the measured data.
The book provides an overview of methods that have been developed for the analysis of...
Here, the term "non-parametrically" exemplifies that all the functions and parameters of the constructed stochastic evolution equation can be determined directly from the measured data.
The book provides an overview of methods that have been developed for the analysis of...
Tipping Cascades in Complex Networks: Dynamics and Control
, M.Sc. Thesis Sharif University of Technology ; Rahimi Tabar, Mohammad Reza (Supervisor)
Abstract
Tipping points occur in diverse systems in various disciplines such as ecology, climate science, economy, sociology, and engineering. Critical thresholds in system parameters or state variables at which a tiny perturbation can lead to a qualitative change in the system exist in many subsystems in complex systems. These thresholds are called tipping points, and these subsystems are called tipping elements. Additionally, many systems with tipping points can be modeled as networks of coupled multistable subsystems. Domino-like tippings are called tipping cascades. Considering that these tipping cascades are primarily unprecedented, it is essential to study the dynamics and control of these...
Love Wave Propagation in a Functionally Graded Magneto-Electro-Elastic Half-Space with Quadratic Variations
, M.Sc. Thesis Sharif University of Technology ; Eskandari, Morteza (Supervisor)
Abstract
The propagation behavior of Love wave in functionally graded magneto-electro-elastic half-spaces with a quadratic variation is addressed. The magneto-electromechanical coupling factor, the dispersion relations, electric potential, magnetic potential and displacement are obtained analytically for both magneto-electrically open and short conditions. The effect of gradient coefficient on phase velocity, group velocity and magneto-electromechanical coupling factor are plotted and discussed. Research on the wave propagation in magneto-electro-elastic materials is still very limited. This work provides us with a theoretical foundation to design and practically apply SAW devices with high...
Modeling Reaction and Distribution of Water in Nanopores of the Cathode Catalyst Layer of PEM Fuel Cell
, M.Sc. Thesis Sharif University of Technology ; baghalha, morteza (Supervisor)
Abstract
In the proton exchange membrane fuel cells (PEM, the produced water would be divided into two phases of vapor and liquid. distribution of both liquid and vapor phases in different cell layers affects the performance, the efficiency and the life of a fuel cell significantly. Moreover, Nano pores of the cathode catalyst layer are involved with some phenomena such as electrochemical reaction kinetics, heat and mass transfer and interface phase change. One of the most important problems in the performance of fuel cells is distribution of liquid water in the porous areas. Water flooding in fuel cells causes to delay in oxygen transport to active sites in the catalyst layer because the pores of...
Elastic Analysis of a Surface Stiffened Transversely Isotropic Half-space Under a Buried Horizontal Point Load
, M.Sc. Thesis Sharif University of Technology ; Eskandari, Morteza (Supervisor)
Abstract
In this study, the interaction between thin plate completely bonded to the transversely isotropic halfspace and a concentrated force applied horizontally (Mindlin-type force) are considered. This problem has been solved analytically. This problem is used as sample for thin solid films and surface coating technology, where the surface of solid is covered by thethin plate for increasing its stiffness. Moreover, this problem is a good sample when homogenous solid is subjected to contact loading and can be seen that mechanical properties of material which is near the solid surface varies; consequently, a two-phase solid is created.Because of the influence of noted inhomogeneity, solid is...
Modeling and Simulation of the Catalyst Regeneration Process of FCC Unit of Abadan Refinery
, M.Sc. Thesis Sharif University of Technology ; Baghalha, Morteza (Supervisor)
Abstract
Hydrodynamics plays a crucial role in defining the performance of fluidized beds. The numerical simulation of fluidized bed is very important in the prediction of its behaviour. From this point of view, in the present study a dynamic two dimensioanl model is developed for the modeling of regenerator system of a UOP fluid catalytic cracking (FCC) unit of Abadan refinery with a high-efficiency regenerator. Of the various modeling and simulation techniques, computational fluid dynamics (CFD) is employed in this thesis. Effects of gas velocity, the transient local solid volume fraction, pressure drop for gas and solid phase, solid holdup distribution and solid circulation pattern have been...
Database Schema Extraction Prevention Through DBMS Error Handling
, M.Sc. Thesis Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
Nowadays large volume of sensitive data of organizations are stored in the databases. Thus, databases are attractive to the attackers to execute different types of attacks with different purposes. The useful information that attackers try to achieve in the preliminary steps of the attacks against the databases, is the database structure or schema. One of the popular approach to extract the schema of a database is to analyze the returned error messages from its DBMS. Hence, a solution to prevent schema disclosure via the error messages is customizing and modifying them. To achieve this goal, in this thesis, we propose a framework to handle and customize the error messages automatically and...
Privacy Preserving Access Control for Service Composition in Cloud Computing
, M.Sc. Thesis Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
Cloud computing is a new computing environment where computing infrastructure, platform and software are provided as a service. Rapid growth of cloud environments has increased the importance of security requirements and challenges for both service providers and users in cloud. Two main security issues in software as a service (SaaS) delivery model are access control and privacy preserving in basic web services and also in composite services obtaining through the automatic composition and inference of policies from the ones specified for basic services. In this thesis, we present a privacy preserving access control model and framework for service composition in SaaS delivery model of cloud...
An Access Control System for Time Series Data in NoSQL Databases
, M.Sc. Thesis Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
An important class of applications which have been rapidly growing recently is the one that create and use time series data. These types of data sets are ordered based on the timestamps associated to their data items. In practice, traditional relational databases are unable to satisfy the requirements of these data sets; however, NoSQL databases with column-wide data structure are appropriate infrastructure for them. These databases are very efficient in read and write operations (especially for time series data, which are ordered) and are able to store unstructured data. Time series data may contain valuable and sensitive information; hence, they should be protected from the information...
Numerical Simulation of a Telescopic Metallic Yielding Damper
, M.Sc. Thesis Sharif University of Technology ; Eskandari, Morteza (Supervisor)
Abstract
In this study, a new type of metallic yielding damper called Telescopic damper is proposed and analyzed numerically. The damper comprises of three concentric steel tubes connected together by lead shear keys. The relative axial deformation of steel tubes under axial forces results in shear deformation and yielding in lead shear keys and dissipates energy. The inner steel tube has a lock which limits its movement to some certain extent and beyond this limit the outer tube activates. Therefore, a multi-linear force-deformation behavior with two different yield plateaus is expected for the introduced telescopic damper. The multi-level yield plateaus of damper makes it effective in both low and...
Information-flow Analysis in Android Apps for Protecting User Privacy
, M.Sc. Thesis Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
The rapid growth of Android operating system alongside its open-source nature has made it as the most popular operating system of mobile devices. On the other hand, regarding the increasing computational power of mobile devices, a wide variety of applications are coming to this type of devices. Meanwhile unfortunately many malicious softwares trying to keep up with other applications, are targeting this popular operating system. Therefore with regard to the fact that this type of devices usually store private and sensitive information of their users, security of mobile operating systems is considered very important. Having this matter in mind, the goal of this research work has been...
Secure- multiparty Computation Protocol for Privacy Preserving Data Mining
, M.Sc. Thesis Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
Privacy preserving data mining helps organizations and companies not only to deal with privacy concerns of customers and regular limitations, but also to benefit from collaborative data mining. Utilizing cryptographic techniques and secure multiparty computation (SMC) are among widely employed approaches for preserving privacy in distributed data mining. The general purpose of secure multiparty computation protocols to compute specific functions on private inputs of parties in a collaborative manner and without revealing their private inputs. Providing rigorous security proof of secure multiparty computation makes it a good choice for privacy preservation, despite of its cryptographic...
Analysis of Slabs Stiffened by Cables and Pedestals
, M.Sc. Thesis Sharif University of Technology ; Eskandari, Morteza (Supervisor)
Abstract
In this study, a new concrete slab stiffened by concrete pedestals and steel cables is introduced. The slab system is studied by employing both analytical and numerical methods. The steel cables are connected to the edges of slab and the concrete pedestals mounted at the bottom face of slab act as the middle supports of cables. The tension force in the cable and its inclination results in upward forces acting at the bottom face of slab. With the aims of classical theory of thin plates and the superposition technique, the problem of a simply supported rectangular slab stiffened by cables is studied analytically. The obtained results are verified by a numerical modelling implemented in SAP2000...
Parametric Study of Telescopic Metallic Yielding Dampers
, M.Sc. Thesis Sharif University of Technology ; Eskandari, Morteza (Supervisor)
Abstract
The parametric study of a new introduced metallic yielding damper called telescopic damper is addressed. The telescopic damper comprises of three concentric steel pipes connected together by lead shear keys. The inner and outer steel pipes are subjected to axial loading which results in the shear yielding of the embedded lead cylinders. The inner steel pipe has a lock which limits its movement to some certain extent and beyond this limit the outer tube activates. Employing ABAQUS software, the behavior of damper under cyclic loading is studied numerically. The finite element model is verified by available results in the literature. The effects of inner and outer steel pipes thickness,...
Static and Dynamic Analysis of Nano Beams based on Second Strain Gradient Theory
, M.Sc. Thesis Sharif University of Technology ; Eskandari, Morteza (Supervisor)
Abstract
In this thesis, static and dynamic analysis of nano beams based on second strain gradient theory is presented. Due to their small sizes, nano electro mechanical devices (NEMS) hold tremendous promise for novel, versatile and very sensitive devices for different applications ranging from actuators, transducers and also mass, force, light and frequency detectors. Therefore accurate modeling and analysis of such devices has an important role in their design and performance improvement. Neglecting the size effect, traditional theory of elasticity can not be suitable to predict mechanical behavior of these systems and so, it should be used non-classical theories which include size dependency...
The Response of Transversely Isotropic Half-Space Stiened by a Surface Thick Plate
, M.Sc. Thesis Sharif University of Technology ; Eskandari, Morteza (Supervisor)
Abstract
In this study the axisymmetric and asymmetric problem of interaction between a transversely isotropic half-space and various rst order shear deformation plate theories including Mindlin, Reissner and Vasil'ev are addressed. In order to improve the accuracy of solution, the surface boundary conditions of the half-space are modied.Moreover, the results compared with the exact solution and the most appropriate result is identied. The displacement Green's functions are obtained for both cases, modied and unmodied boundary conditions which can be expressed in a closed form and a numerically evaluated part. The latter is calculated exploiting Built-in numerical interrelation function of...
Detection of Confidentiality Violation by Short Term Advanced Persistent Threats based on Data Stream Correlation
, M.Sc. Thesis Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
Advanced Persistent Threats (APTs) by multi step , low-level and sometimes slowmoving behaviors try to hiding malicious behaviors. These attacks are complex, costly and the attacker violates the security policy explicitly or implicitly by distributing his or her behavior to multi agents and infiltrate trusted subjects. One of the challenges is the discovery of these attacks in the early stages of the attack and before the complete violation of confidentiality. the lack of deep intercepting of events, content with intrusion detection systems warnings, the lack of simultaneous tracking of host and network-level events and the lack of real-time processing is limitations of existing detection...
Geometrical Structure of Neuron Morphology
, Ph.D. Dissertation Sharif University of Technology ; Fotouhi, Morteza (Supervisor)
Abstract
The tree structure of neuron morphologies has excited neuroscientists since their discovery in the 19-th century. Many theories assign computational meaning to morphologies, but it is still hard to generate realistic looking morphologies. There are a few growth models for generating neuron morphologies that correctly reproduce some features (e.g. branching angles) of morphologies, but they tend to fall short on other features. Here we present an approach that builds a generative model by extracting a set of human-chosen features from a database of neurons by using the naïve Bayes approach. Then by starting from a neuron with a soma we use statistical sampling techniques to generate...