Loading...
Search for:
rahmanifar--mohammad-safi
0.136 seconds
Total 5373 records
Preparation and Properties of PZT-PMN Ceramics using nano PZT Particles Obtained from Microemulsion Method
, M.Sc. Thesis Sharif University of Technology ; Nemati, Ali (Supervisor) ; Rahmanifar, Mohammad Safi (Supervisor)
Abstract
Microemulsion is one of the major processing techniques to synthesize a nano, homogeneous, and almost agglomerate-free powders. Any kind of oxide ceramics such as piezoelectric ceramics can be synthesis via this method in nano scale without the formation of any intermediate phase. In this study, Lead zirconate titanate (PZT) powders with composition near the morphotropic phase boundary (MPB) have been synthesized via a microemulsion processing route. This emulsion system is a thermodynamically stable mixture of oil (cyclohexane), nonionic surfactant (Triton X100), and an aqueous solution containing specific amount of Pb2+, Zr4+ and Ti4+. The ratio of these ions was adjusted with using ICP....
Privacy protection scheme for mobile social network
, Article Journal of King Saud University - Computer and Information Sciences ; Volume 34, Issue 7 , 2022 , Pages 4062-4074 ; 13191578 (ISSN) ; Movaghar, A ; Ghorbani, M ; Sharif University of Technology
King Saud bin Abdulaziz University
2022
Abstract
In the recent years, popularity and number of users of mobile social networks have grown significantly. Due to different types of communication on these networks, users share a lot of information with each other. One of the most critical challenges of social networks is disclosure and unauthorized access to information, data, and communication between users that is a kind of violation of their privacy, which can be done by social network providers, especially unauthorized users. One way to protect one's privacy is using encryption. Therefore, in the present paper, an improved secure design was presented for mobile social network using ciphertext-policy attribute-based encryption (CP-ABE) and...
A Framework for Users' Privacy Preserving of Instant Messaging on Mobile Social Networks
, Ph.D. Dissertation Sharif University of Technology ; Movaghar, Ali (Supervisor)
Abstract
In recent years, mobile social networks have largely been developed and gained considerable popularity. With the development of smartphones, the growth rate of users on mobile social networks has dramatically increased, with users constantly interacting and sharing their various private and public data. Such volume of information can be used for profitable purposes and may affect the users' privacy. However, due to the limitations of smartphones and the trivial and costly encryption, entrusting the encryption to the user, both for users and for the service provider will be challenging, thus, social network providers themselves take charge that can compromise the privacy. In this...
A service based approach to self-adaptive software systems based on constructing a group of autonomic elements
, Article Proceedings of the 7th IEEE International Conference and Workshop on Engineering of Autonomic and Autonomous Systems, EASe 2010, 22 March 2010 through 26 March 2010 ; March , 2010 , Pages 101-105 ; 9780769540047 (ISBN) ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
2010
Abstract
As requirements and environments become much more complex, the need for self-adaptive and self-healing software system grows. There are several existing works which present such systems by using different approaches. Using alternative solutions to provide a service or requirement is one of the most important approaches among existing works. In this paper an alternative-based approach for adding self-adaptive capabilities to software systems is proposed. In this approach a group of autonomic elements will be constructed based on different design or implementations that could be considered for a specific service or requirement. By using this approach, a highly adaptive software system could be...
Performance Optimization of SBR Reactors Using Fluidized Media (Conversion of SBR to SMBBR)
, M.Sc. Thesis Sharif University of Technology ; Borghei, Mehdi (Supervisor)
Abstract
In recent years, utilization of hybrid attached and suspended growth system for modification of conventional activated sludge systems has attracted a lot of attentions. Nowadays, with development of urban areas and also introducing new emerging contaminants and as a result an increase in the influent loading of wastewater treatment facilities, the importance of upgrading and retrofitting available facilities have been highlighted. Conversion of Sequencing Batch Reactors to Sequencing Batch Biofilm Reactors is a viable solution for overcoming these problems. Eventhough several researches have been conducted on removal of different contaminants through these systems, the information about the...
A novel approach for avoiding wormhole attacks in VANET
, Article 1st South Central Asian Himalayas Regional IEEE/IFIP International Conference on Internet, AH-ICI 2009, 3 November 2009 through 5 November 2009, Kathmundu ; 2009 ; 9781424445707 (ISBN) ; Movaghar, A ; Mohammadizadeh, M ; Sharif University of Technology
2009
Abstract
Different attacks on routing protocols in ad hoc networks occur that one of the most dangerous types is called wormhole attack. This attack happens with the assistance of at least two or more malicious nodes. In this attack nodes create a private tunnel which if a packet comes to one of them, it will be guided to other pair of these malicious nodes by this tunnel and that node broadcasts it into network. This action provides a short connection in the network that is controlled by these malicious nodes. Hence they control all Packets that come to them and threaten the security of data within packets or delete them. Totally, what a wormhole does is an incorrect understanding of network...
SEAODV: Secure efficient AODV routing protocol for MANETs networks
, Article ACM International Conference Proceeding Series, 24 November 2009 through 26 November 2009, Seoul ; Volume 403 , 2009 , Pages 940-944 ; 9781605587103 (ISBN) ; Movaghar, A ; Safi, S. M ; Sharif University of Technology
2009
Abstract
Secure routing is one of the most important topics in the wireless MANETs networks. MANETs networks don't have a central infrastructure for the management of routing in the networks. Each node independently routes and sends packets, so many attacks such as forging, modifying, and denial of service (DoS), Occur in these networks. In this paper, we present the new protocol, SEAODV; Secure Efficient Ad-hoc on Demand Routing Protocol for MANETs networks. SEAODV is based on the AODV algorithm and in comparison with existing secure AODV protocols such as SAODV, ARAN and SEAR have improved security and performances. SEAODV uses HEAP authentication Scheme with symmetric cryptography and one-way hash...
A novel approach for avoiding wormhole attacks in VANET
, Article 2nd International Workshop on Computer Science and Engineering, WCSE 2009, 28 October 2009 through 30 October 2009 ; Volume 2 , 2009 , Pages 160-165 ; 9780769538815 (ISBN) ; Movaghar, A ; Mohammadizadeh, M ; Sharif University of Technology
2009
Abstract
Different attacks on routing protocols in ad hoc networks occur that one of the most dangerous types is called wormhole attack. This attack happens with the assistance of at least two or more malicious nodes. In this attack nodes create a private tunnel which if a packet comes to one of them, it will be guided to other pair of these malicious nodes by this tunnel and that node broadcasts it into network. This action provides a short connection in the network that is controlled by these malicious nodes. Hence they control all Packets that come to them and threaten the security of data within packets or delete them. Totally, what a wormhole does is an incorrect understanding of network...
Fabrication of Superstrate Copper Indium Sulfide Solar Cell Avoiding Titanium Dioxide Blocking Layer
, M.Sc. Thesis Sharif University of Technology ; Taghavinia, Nima (Supervisor)
Abstract
During recent years, thin-film solar cells based on chalcogenide light absorbers with CuInxGa1-xS(Se)2 compound have attracted considerable attraction due to their desirable band gaps and demonstrated high power conversion efficiencies. These solar cells are fabricated under two categories named as ‘substrate’ and ‘superstrate’, generally. The best reported energy conversion efficiency belongs to substrate type (sodalime glass/Mo/absorber layer/buffer layer/window layer) CIGS solar cells, most have been fabricated with vacuum processes. In spite of this, superstrate solar cells (transparent conducting oxide/blocking layer/buffer layer/absorber layer/back contact) provide easier and cheaper...
A framework for protecting privacy on mobile social networks
, Article Mobile Networks and Applications ; Volume 26, Issue 3 , 2021 , Pages 1281-1299 ; 1383469X (ISSN) ; Movaghar, A ; Safikhani Mahmoodzadeh, K ; Sharif University of Technology
Springer
2021
Abstract
In recent years, mobile social networks have largely been developed and gained considerable popularity. An approach to protecting privacy on mobile social networks is the use of encryption and access control. Good alternatives for use on mobile social networks are the Public Broadcast Encryption approach for appropriate concordance and consistency with the structure of social networks as well as the Attribute-Based Encryption owing to its capability and proper implementation of the access control policy. Accordingly, in this paper, a framework was presented based on the Public Broadcast Encryption and Attribute-Based Encryption. Using proxies, we outsourced some of these operations in the...
Microemulsion synthesis of nanoparticle PZT powder
, Article AIP Conference Proceedings, 24 October 2010 through 27 October 2010 ; Volume 1315 , 2010 , Pages 265-270 ; 0094243X (ISSN) ; 9780735408715 (ISBN) ; Nemati, Z. A ; Rahmanifar, M. S ; Ramesh, S ; Meenaloshini, S ; Tolouei, R ; Sharif University of Technology
2010
Abstract
Nanocrystalline lead zirconate titanate (PZT) powders have been synthesized using microemulsion processing route. Microemulsion is one of the major processing techniques to synthesize a nanosize, homogenous, and almost agglomerate free ceramic powders. The ternary microemulsion system is consisted of cyclohexane as the oil phase, Triton X100 as the nonionic surfactant phase, and an aqueous phase containing 0.619MPb 2+, 0.325MZr 4+, and 0.3MTi 4+, representing a Pb 2+: Zr 4+: Ti 4+ molar ratio of 1:0.52:0.48. The ratio of these cations has been adjusted using Inductively Coupled Plasma (ICP) technique. After coprecipitation of metallic hydroxides by adding ammonia solution in microemulsion...
Investigation of Flooding Phenomena in Gas-liquid Flow
, M.Sc. Thesis Sharif University of Technology ; Nouri-Broujerdi, Ali (Supervisor)
Abstract
In a counter current two phase flow systems that liquid flows downward due to gravity on the pipe wall and gas flows upward due to pressure gradient in the pipe core, Flooding and reversal Flooding are important phenomena. Flooding is beginning of velocity direction change of liquid from downward to upward that with zero axial velocity of liquid in interface, liquid is on verge of moving upward. When mass flow rate of liquid or gas increase, some part of liquid film are separated and enter the gas stream. With further increase in mass flow rate of liquid or gas in flooding point, reversal flooding occurs that cause to all liquid film flows upward. Flooding and reversal flooding phenomena are...
An evaluation method for aspectual modeling of distributed software architectures
, Article 6th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2008, Doha, 31 March 2008 through 4 April 2008 ; 2008 , Pages 903-908 ; 9781424419685 (ISBN) ; Montaghami, V ; Safi, G ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
2008
Abstract
Dealing with crosscutting requirements in software development usually makes the process more complex. Modeling and analyzing of these requirements in the software architecture facilitate detecting architectural risks early. Distributed systems have more complexity and so these facilities are much useful in development of such systems. Aspect oriented Architectural Description Languages(ADL) have emerged to represent solutions for discussed problems; nevertheless, imposing radical changes to existing architectural modeling methods is not easily acceptable by architects. Software architecture analysis methods, furthermore, intend to verify that the quality requirements have been addressed...
Study of microstructure and dielectric properties of PMN-PZT ceramics via a mixed powder method including microemulsion derived PZT powder
, Article Malaysian Journal of Microscopy ; Volume 7, Issue 1 , 2011 , Pages 43-47 ; 18237010 (ISSN) ; Nemati, Z. A ; Meenaloshini, S ; Sankar, U ; Tolouei, R ; Rahmanifar, M. S ; Ramesh, S ; Sharif University of Technology
2011
Abstract
In this research, (X)PZT-(1-X)PMN ceramics (where X is 0.25, 0.5 and 0.75) were achieved from a conventional mixed-oxide method. Lead Zirconate titanate (PZT) powders with composition near the morphotropic phase boundary have been synthesized via a microemulsion processing route. Modified mixed oxides method was used for obtaining single phase Lead Magnesium niobate (PMN) powder with high relative density (98% of T.D.) and good electrical properties (dielectric constant of ≈10 4 at room temperature). Two-step sintering (TSS) has been applied to suppress the accelerated grain growth of PZT-PMN composite compacts in the last sintering stage. The produced samples with high PZT content showed...
Improvement of size-based particle separation throughput in slanted spiral microchannel by modifying outlet geometry
, Article Electrophoresis ; Volume 41, Issue 5-6 , February , 2020 , Pages 353-359 ; Maleki Jirsaraei, N ; Rouhani, S ; Safi, S ; Alizadeh, M ; Sharif University of Technology
Wiley-VCH Verlag
2020
Abstract
The inertial microfluidic technique, as a powerful new tool for accurate cell/particle separation based on the hydrodynamic phenomenon, has drawn considerable interest in recent years. Despite numerous microfluidic techniques of particle separation, there are few articles in the literature on separation techniques addressing external outlet geometry to increase the throughput efficiency and purity. In this work, we report on a spiral inertial microfluidic device with high efficiency (>98%). Herein, we demonstrate how changing the outlet geometry can improve the particle separation throughput. We present a complete separation of 4 and 6 μm from 10 μm particles potentially applicable to...
Effect of SiO2 content on Y-TZP/Al2O3 ceramic-nanocomposite properties as potential dental applications
, Article Ceramics International ; Volume 46, Issue 8 , 2020 , Pages 10910-10916 ; SharifianJazi, F ; Esmaeilkhanian, A ; Moradi, M ; Safi Samghabadi, A. H ; Sharif University of Technology
Elsevier Ltd
2020
Abstract
Yttria-stabilized tetragonal zirconia polycrystals (Y-TZP) have been widely applied in fixed partial prostheses as well as dental uses i.e. a substructure for crowns. However, Y-TZP has limited applications, which is due to the presence of defects in its microstructure introduced during the manufacturing process. Accordingly, due to Y-TZP limitations, the novel (X)Y-TZP- 20Al2O3-(80-X) SiO2 (X = 65, 70 and 75) ceramic nanocomposites were successfully fabricated via the powder metallurgy method. X-ray diffraction (XRD) patterns of commercial powders showed the stabilization of monoclinic zirconia (ZM) by increasing the silica content. In order to determine the fracture load and micro-bending...
Construction of an Experimental Device for Foaming Agent and an Experimental Study of the Properties of Foaming Agent
, M.Sc. Thesis Sharif University of Technology ; Bazargan, Mohammad (Supervisor)
Abstract
The primary purpose of acidizing operations in the oil and gas industry is to enhance hydrocarbon production. Acidizing has been a common and conventional method for years, especially when production engineers face issues like declining reservoir pressure leading to reduced production rates. Initially, the treatment solution is referred to as matrix acidizing. In acidizing operations, different additives are combined with the acid to control its behavior in the reservoir. These additives may include iron control agents, corrosion inhibitors, friction reducers, and more. Incompatibility among these additives, the acid, and reservoir fluids can lead to severe damage to the reservoir....
Numerical Analysis of An Annular Gas Turbine Combustor
, M.Sc. Thesis Sharif University of Technology ; Farshchi, Mohammad (Supervisor)
Abstract
The goal of this research is the simulation of the annular combustion chamber of the turbine engine utilized by liquid fuel. The achievement to this goal will lead to create numerical tools for parametric study, analysis and combustion chamber designing.For this reason simple geometry has been considered. This simplicity of geometry causes to facilitate in parametric study and decrease in saving time for modeling and meshing. This combustion chamber is a simplified model of engine CF6. In recent study, the k – ε realizable model has been used for turbulence modeling. For non-adiabatic condition, chemical reaction is dissolved by utilizing probability density function along with laminar...
A misbehavior‐tolerant multipath routing protocol for wireless Ad hoc networks [electronic resource]
, Article International Journal of Research in Wireless Systems (IJRWS) ; Vol. 2, Issue 9, pp. , Sep. 2013 ; Pakravan, Mohammad Reza ; Aref, Mohammad Reza ; Sharif University of Technology
Abstract
Secure routing is a major key to service maintenance in ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. As a result of the resource limitations in such networks nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a novel data redirection method to mitigate the impact of node misbehavior on network...