Loading...
Search for:
rahnama--javad
0.191 seconds
Total 229 records
Modeling of Energy Harvesting Systems from Shell Structures
,
M.Sc. Thesis
Sharif University of Technology
;
Sayyadi, Hassan
(Supervisor)
Abstract
The electrical voltage, current and power output is calculated due to harmonic forced vibration of shell energy harvester. So five electromechanical equation together with Gauss equation is solved for doubly curve shell harvester in steady state condition in order to derive voltage, current and electric power output. The effect of shell curvature in cylindrical and spherical shells, the harvester series or parallel connection of layers and thickness of substrate and piezoelectric layer, is also considered in order to obtain maximum power output. The results show for small shell curvatures a high frequency load is needed to obtain maximum power and when the shell arc length is three times to...
Evaluation complexity problem in agent based software development methodology
, Article ICIIS 2007 - 2nd International Conference on Industrial and Information Systems 2007, Peradeniya, 9 August 2007 through 11 August 2007 ; 2007 , Pages 577-584 ; 1424411521 (ISBN); 9781424411528 (ISBN) ; Esmaeili, M ; Rahnama, M ; Sharif University of Technology
2007
Abstract
Several methodologies with their own characteristics have been proposed in the area of agent-oriented software engineering. Consequently, deciding which methodology to select in a specific case is an important issue and it can lead to decrease software development cost and effort. Thus, importance of evaluation of methodologies will be highlighted in choosing the appropriate methodology in the development process of an application. It can also help in developing new methodologies and improving existing ones. In this paper, we are going to provide an evaluation framework of agent oriented methodologies. To demonstrate the usage of the suggested framework, it is applied to evaluate two...
Semantic HyperCup
, Article 39th Annual Hawaii International Conference on System Sciences, HICSS'06, Kauai, HI, 4 January 2006 through 7 January 2006 ; Volume 9 , 2006 , Pages - ; 15301605 (ISSN) ; 0769525075 (ISBN); 9780769525075 (ISBN) ; Habibi, J ; Rahnama, A ; Sharif University of Technology
2006
Abstract
Peer-to-peer networks are beginning to form the infrastructure of future applications. One of the problems with non structured peer-to-peer networks is their scalability limitation. These networks can't contain a large number of nodes because of the large amount of traffic that they have to handle. HyperCup is a structured overlay network that solves the scalability problem for message broadcasts. This overlay broadcasts search queries throughout the entire network and all nodes receive broadcasted messages. In this paper we introduce Semantic HyperCup, an extension of HyperCup which uses semantic data to route messages and reduce overlay network traffic through search queries. © 2006 IEEE
Single image super resolution by adaptive K-means clustering
, Article 10th Iranian Conference on Machine Vision and Image Processing, MVIP 2017, 22 November 2017 through 23 November 2017 ; Volume 2017-November , April , 2018 , Pages 209-214 ; 21666776 (ISSN) ; 9781538644041 (ISBN) ; Shirpour, M ; Manzuri, M. T ; Sharif University of Technology
IEEE Computer Society
2018
Abstract
In recent days imaging systems have seen considerable extended usage due to their ease of use and reasonable price. However, they have weaknesses lies in image resolution. In order to increase the quality of the images, due to the technical limitations and costs of hardware parts, software techniques like the super-resolution is used, which means increasing the density of pixels in the image. The super-resolution is broken down into two categories; super-resolution using a single image and super-resolution using multiple images. In this paper, a method for increasing image quality, based on the Dong method has been proposed. In the proposed method, which is based on only one image, tries to...
A combined cooling and power transcritical CO2 cycle for waste heat recovery from gas turbines
, Article Thermal Science and Engineering Progress ; Volume 34 , 2022 ; 24519049 (ISSN) ; Morad, M. R ; Ebrahimi Rahnama, H ; Sharif University of Technology
Elsevier Ltd
2022
Abstract
A transcritical carbon dioxide (T-CO2) cycle is analyzed for waste heat recovery from a gas turbine. The cycle is proposed to produce combined power and cooling using carbon dioxide as a single pure working fluid. Simple, cascade and split cycle configurations are compared for power generation using a recuperator while a low-temperature loop is added for the cascade and split cycles. In a previous report in the literature the power generation part alone was presented for the three configurations and it was concluded that the split cycle can produce the highest power among the three systems. Here, the same configurations are studied combined with a compression refrigeration cooling effect...
Image Improvement Using Sepuer-Resolution Method
, M.Sc. Thesis Sharif University of Technology ; Manzuri Shalmani, Mohamad Taghi (Supervisor)
Abstract
Today digital imaging systems have been widely used due to their ease of use and proper costs, but still they suffer from low contrast and resolution. Because of technical limits and expensiveness of hardware, software techniques like super resolution have been used. By super resolution we mean increasing the density of an image’s pixels. Super resolution can be categorized as “single image super resolution” and “multi-image super resolution”. Single image super resolution is applied on a low quality image which has blur and/or noise of environment and imaging system and increases its quality and density to an acceptable level. In multi-image super resolution some auxiliary images captured...
A fuzzy random minimum cost network flow programming problem [electronic resource]
, Article Journal of Industrial and Systems Engineering (JISE)-Iranian Institute of Industrial Engineering ; Article 3, Volume 6, Issue 1, Spring 2012, Page 34-47 ; Eshghi, Kourosh ; Sharif University of Technology
Abstract
In this paper, a fuzzy random minimum cost flow problem is presented. In this problem, cost parameters and decision variables are fuzzy random variables and fuzzy numbers respectively. The object of the problem is to find optimal flows of a capacitated network. Then, two algorithms are developed to solve the problem based on Er-expected value of fuzzy random variables and chance-constrained programming. Furthermore, the results of two algorithms will be compared. An illustrative example is also provided to clarify the concept
Special classes of mathematical programming models with fuzzy random variables [electronic resource]
, Article Journal of Intelligent and Fuzzy Systems, Published In: IOS Press ; Volume 19, Number 2, 2008 ; Nematian, Javad ; Sharif University of Technology
Abstract
In this paper, we will discuss two special classes of mathematical programming models with fuzzy random variables. In the first model, a linear programming problem with fuzzy decision variables and fuzzy random coefficients is introduced. Then an algorithm is developed to solve the model based on fuzzy optimization method and fuzzy ranking method. In the second model, a fuzzy random quadratic spanning tree problem is presented. Then the proposed problem is formulated and solved by using the scalar expected value of fuzzy random variables. Furthermore, illustrative numerical examples are also given to clarify the methods discussed in this paper
A special class of fuzzy integer programming model with all different constraints [electronic resource]
, Article Scientia Iranica ; Vol. 16, No. 1, pp. 1-10, 2009 ; Nematian, Javad ; Sharif University Of Technology
Abstract
In this paper, a fuzzy approach is applied to special classes of integer programming problems with all diierent constraints. In the rst model, a fuzzy integer programming model is developed to represent the all-diierent constraints in mathematical programming. In order to solve the proposed model, a new branching scheme for the Branch and Bound algorithm is also presented. In the second model, a special class of large-scale multi-objective fuzzy integer programming problems with all-diierent constraints is introduced. A solution method for the proposed model is also developed by using the decomposition technique, weighting method and Branch and Bound algorithm. An illustrative numerical...
Fuzzy random minimum cost network problem [electronic resource]
, Article Journal of Industrial and Systems Engineering ; Vol. 6, No. 1, pp 34-47, 2012 ; Eshghi, Kourosh ; Sharif University of Technology
Abstract
In this paper, a fuzzy random minimum cost flow problem is presented. In this problem, cost parameters and decision variables are fuzzy random variables and fuzzy numbers respectively. The object of the problem is to find optimal flows of a capacitated network. Then, two algorithms are developed to solve the problem based on Er-expected value of fuzzy random variables and chance-constrained programming. Furthermore, the results of two algorithms will be compared. An illustrative example is also provided to clarify the concept
An investigation of fracture geometry in hydraulic fracturing on a gas reservoir well production enhancement
, Article Petroleum Science and Technology ; Vol. 32, issue. 2 , 2014 , pp. 150-157 ; ISSN: 10916466 ; Parvazdavani, M ; Abbasi, S ; Rahnama, A. R ; Sharif University of Technology
2014
Abstract
Utilizing improved production methods have been always challenging in upstream industries. Nowadays, hydraulic fracturing is one of the most prestigious mechanical methods. Application of this method is in wells with low productivity index. Hydraulic fracturing efficiency depends on various factors, such as fracture geometry, fluid composition, and stress distribution. But some of them would be ignored, such as fracture geometry, which is neglected due to nongravity and lack of investigation of DFN statistical population assumption. The authors develop a more comprehensive methodology based on fracture geometry and aim to model one of the gas reservoirs in Iran that is naturally fractured by...
An ultra-lightweight RFID mutual authentication protocol
, Article 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2019, 28 August 2019 through 29 August 2019 ; 2019 , Pages 27-32 ; 9781728143736 (ISBN) ; Beheshti Atashgah, M ; Eghlidos, T ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2019
Abstract
In some applications of the Internet of Things (IoT), for privacy preserving and authentication of entities, it is necessary to use ultra-lightweight cryptographic algorithms. In this paper, we propose a new ultra-lightweight authentication protocol between RFID components, in which only simple operations are used. In this protocol, the server has access to the data gathered by the tag in the same authentication phase through the reader interface, instead of sharing a secret key. The proposed protocol is secure against several attacks, such as replay attacks, denial of service, offline guessing attacks, modification attacks, full disclosure attacks and impersonation attacks, in addition to...
A lightweight anonymous authentication protocol for IoT wireless sensor networks
, Article 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2019, 28 August 2019 through 29 August 2019 ; 2019 , Pages 39-44 ; 9781728143736 (ISBN) ; Beheshti Atashgah, M ; Eghlidos, T ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2019
Abstract
Lightweight authentication protocols are crucial for privacy preserving in Internet of Things (IoT). Authentication protocols should be implementable for devices with constrained memory and computational power in this area, in addition to resistance against cryptographic threats. On the other hand, these protocols should not impose a heavy computational load on such devices. In this paper we proposed an authentication protocol that properly meets these features. Our protocol is suitable for wireless sensor networks (WSNs). In this protocol, authentication is fulfilled with low communication and computational loads between sensors and users through the gateway interface using a hash function...
An ontology based local index in P2P networks
, Article 2006 2nd International Conference on Semantics Knowledge and Grid, SKG, Guilin Guangxi, 1 November 2006 through 3 November 2006 ; 2006 , Pages 11-16 ; 0769532055 (ISBN); 9780769532059 (ISBN) ; Habibi, J ; Abolhassani, H ; Amirkhani, M ; Rahnama, A ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2006
Abstract
Peer-to-peer networks (P2P) are beginning to form the infrastructure of future applications. One of the problems with unstructured P2P networks is their scalability limitation. This is also the problem in structured P2P networks that use broadcasting to find objects. These networks can't contain a large number of nodes because of the large amount of traffic that they have to handle. Local indexing is a method to reduce this traffic. But local indexes tend to become large with the growth of the network. Also limiting the size of these indexes causes loss of indexing information. In this paper we introduce a novel ontology based local index which limits the size of the local indexes without...
S494 O-glycosylation site on the SARS-CoV-2 RBD affects the virus affinity to ACE2 and its infectivity; a molecular dynamics study
, Article Scientific Reports ; Volume 11, Issue 1 , 2021 ; 20452322 (ISSN) ; Azimzadeh Irani, M ; Amininasab, M ; Ejtehadi, M. R ; Sharif University of Technology
Nature Research
2021
Abstract
SARS-CoV-2 is a strain of Coronavirus family that caused the ongoing pandemic of COVID-19. Several studies showed that the glycosylation of virus spike (S) protein and the Angiotensin-Converting Enzyme 2 (ACE2) receptor on the host cell is critical for the virus infectivity. Molecular Dynamics (MD) simulations were used to explore the role of a novel mutated O-glycosylation site (D494S) on the Receptor Binding Domain (RBD) of S protein. This site was suggested as a key mediator of virus-host interaction. By exploring the dynamics of three O-glycosylated models and the control systems of unglcosylated S4944 and S494D complexes, it was shown that the decoration of S494 with elongated O-glycans...
Designing a Lightweight and an Ultra-lightweight Authentication Protocols for Internet of Things
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Eghlidos, Taraneh (Co-Supervisor)
Abstract
The Internet of Things is one of the most common technologies in today's world where its security is an important issue. Lightweight authentication protocols are crucial for privacy preserving in Internet of Things (IoT). IoT authentication protocols must meet security requirements and resist against cryptographic threats. On the other hand, these protocols should be implementable for devices with constrained memory and computational power in this area and should not impose a heavy computational load on such devices. In some IoT devices, such as RFIDs, resource constraints are critical, such that using standard hash functions is not practical. In this applications, security requirements is...
A 6-bit digital phase shifter by using HEMT technology
, Article Proceedings - 2012 IEEE 8th International Colloquium on Signal Processing and Its Applications, CSPA 2012 ; 2012 , Pages 29-32 ; 9781467309615 (ISBN) ; Sabaghi, M ; Pourhossien, A ; Kouchaki, M ; Rahnama, M ; Sharif University of Technology
2012
Abstract
A 6-bit passive phase shifter for S frequency band has been designed in a standard HEMT technology. A new switched-network topology has been proposed for implementing the 5.625 phase shift step which these digital bits are series with each other. We used Advanced Design System (ADS2010) to perform simulations. These digital bits will produce 64 different mode phase shift of -177.15 to +177.15 degree. In all cases simulation obtained less than 1 % error
Relative permeability measurement in carbonate rocks, the effects of conventional surfactants vs. Ionic liquid-based surfactants
, Article Journal of Dispersion Science and Technology ; Volume 41, Issue 12 , 2020 , Pages 1797-1811 ; Faraji, D ; Rahnama, Y ; Zeinolabedini Hezave, A ; Ayatollahi, S ; Sharif University of Technology
Bellwether Publishing, Ltd
2020
Abstract
In the present study, the effect of two different kinds of surfactants namely conventional (Sodium dodecyl benzene sulfonate (SDBS)) and ionic liquid (IL)-based surfactants are investigated on the tertiary oil recovery using relative permeability concept. In this way, besides the Amott wettability index measurement, unsteady state core flooding tests are performed to not only find the effect of surfactant injection on tertiary oil recovery, but also to investigate their effects on relative permeability of carbonate rocks. In addition, for more reliable conclusions regarding the possible mechanisms, interfacial tension (IFT), compatibility and emulsification tests are carried out as a...
Optimization of Valve Setting in Smart Wells Using Multi-Segment Well Model
,
M.Sc. Thesis
Sharif University of Technology
;
Massihi, Mohsen
(Supervisor)
;
Pishvaie, Mahmoud Reza
(Supervisor)
Abstract
Smart wellsareunconventional wells with down-hole devices installed on their production tubing. Such wells allow us to continuouslymonitor flow rates, pressures, temperature and periodically adjust down-holevalves setting without any production intervention. This makes smart well technology to be considered as one of the most significantbreakthroughs in reservoir management technologies. So, modeling and simulating smart wellsautomated action represents a challenge in forecastingtheir performances.One of the easiest ways to model such wells is to transform theminto a multi-segment well with the ability tocontrol each segment independently. By using the commercial reservoir simulator,...
Production of Uranium Dioxide Nano Powder With Hydrothermal Method in Supercritical Water Reactor
, M.Sc. Thesis Sharif University of Technology ; Outokesh, Mohammad (Supervisor) ; Ahmadi, Javad (Supervisor) ; Karimi Sabet, Javad (Co-Advisor)
Abstract
Hydrothermal supercritical method is one of the most suitable methods for metal oxide nano powder, ceramics and mineral catalyst synthesis. Metal oxides nanopowder in its pure or mixed form has wide potential application as chemical industrial catalyst, hot Superconductors, magnetic material, gas sensors and car catalyst convertors. One of the most important metal oxides aspects of application is uranium oxide as nuclear reactor fuel is used. In addition, UO2 is selective catalyst for converting methane to methanol process and Decomposition of organic Chlorine material. In Supercritical hydrothermal method done in high pressure reactor with critical to fluid, is new method for the...