Loading...
Search for: rajabzadeh-dezfuli--mehdi
0.147 seconds

    Evaluation of Exerted Drag Force on Alkane Saturated Air Bubbles in Aqueous Solutions by Experimental Studies

    , M.Sc. Thesis Sharif University of Technology Rajabzadeh Dezfuli, Mehdi (Author) ; Bastani, Dariush (Supervisor) ; Lotfi, Marzieh (Supervisor)
    Abstract
    Interfacial phenomena and properties of interphase surfaces in dynamic mode play an important role in industrial processes that include gas-liquid and liquid-liquid multiphase flows. As well as, interface knowledge leads to better understanding of natural and fundamental phenomena. The present study has been performed for understanding about dynamic behavior of interphase surfaces in the presence of nanoparticles and hexane vapor in gas-liquid dispersion systems. In this research, rising bubble method has been used as one of the most conventional techniques. Accordingly, aqueous solutions of nanosilica were prepared in concentrations of 50, 100, 200, 400 and 1200 ppm as continuous phase... 

    Design and Hardware Implementation of Optical Character Recognition

    , M.Sc. Thesis Sharif University of Technology Dezfuli, Sina (Author) ; Hashemi, Matin (Supervisor)
    Abstract
    The objective of OCR systems is to retrieve machine-encoded text from a raster image. Despite the abundance of powerful OCR algorithms for English, there are not many for Farsi. Our proposed algorithm is comprised of pre-processing, line detection, sub-word detection and segmentation, feature extraction and classification. Furthermore, hardware implementation and acceleration of this system on a GPGPU is presented. This algorithm was tested on 5 fonts including Titr, Lotus,Yekan, Koodak and Nazanin and an average accuracy above 90% was achieved  

    A new protocol for the preparation of aminals from aromatic aldehydes and their facile conversion to phosphonates

    , Article Phosphorus, Sulfur and Silicon and the Related Elements ; Volume 179, Issue 1 , 2004 , Pages 89-96 ; 10426507 (ISSN) Karimi Dezfuli, M ; Saidi, M. R ; Sharif University of Technology
    2004
    Abstract
    A new and fast method for the preparation of aminals is reported from the reaction of aromatic aldehydes and secondary amines in the presence of potassium carbonate in high yields. The aminal can be converted to the corresponding iminum salt in reaction with acetyl chloride very easily and in very short time with high yield. Addition of trialkylphosphite, as one possible nucleophile, to the prepared iminium salt produces the α-amino phosphonate in very high yield  

    Analysis of RC Structural Frames Strengthened by Steel Bracing

    , M.Sc. Thesis Sharif University of Technology Abbasi Dezfuli, Elena (Author) ; Khaloo, Alireza (Supervisor)
    Abstract
    Concentric steel braces and brace-type dampers are often applied to the upgrading of reinforced concrete frames subjected to lateral loads. These braces may develop High axial tension forces, and transferring them appropriately to the existing beam– Column joints is a key challenge. This paper investigates a solution for connecting the end-plate of the steel brace with the frame, using shear-key plates fixed to the concrete with anchor bolts, and a low friction material inserted between the end-plates and the shear-key plates. The presence of the low friction material impedes the development of tension forces in the anchor bolts and ensures that they are basically subjected to shear forces.... 

    Vibration Control of Micro-Satellite Shelves Using Shpae Memory Alloy

    , M.Sc. Thesis Sharif University of Technology Hedayati Dezfuli, Farshad (Author) ; Abedian, Ali (Supervisor)
    Abstract
    Dynamic properties such as the natural frequency of a structure have a significant role in the design process. The importance of this consideration is because of resonance. In this case, the amplitude of the vibration is magnified to levels that may lead to a catastrophic event. While the usual design process depends on the collected experiences and statistical data, a developing trend is to implement smart technologies to develop smart structures that are capable of self-monitoring, diagnostics and repair. Smart material components such as shape memory alloys (SMAs) and piezoelectric ceramics are increasingly being used by vibration control practitioners. Shape memory alloys are applied as... 

    Evaluation of seepage problem under a concrete dam with finite volume method

    , Article Proceedings of the 7th IASME / WSEAS International Conference on Fluid Mechanics and Aerodynamics, FMA '09, 20 August 2009 through 22 August 2009 ; 2009 , Pages 34-40 ; 9789604741069 (ISBN) Shamsai, A ; Abdi Dezfuli, E ; Zebardast, A ; Sharif University of Technology
    2009
    Abstract
    In most of countries, underground waters are the most important sources to provide drinking water. So it is necessary to make scheme and to do high protection of to achieve maximum beneficiary. Necessity of this management is going to be felt by developing these sources and human's interference. However, in the past overtopping phenomenon was the first reason of dam's destruction, but nowadays by increasing of spate design's period, the significant problem that researchers are interfere with, is seepage problem. The purpose of solving the underground problems is to procure height of water as a function of coordinate and time. In observation of practical industries, we can use the... 

    A sequential implicit discrete fracture model for three-dimensional coupled flow-geomechanics problems in naturally fractured porous media

    , Article Journal of Petroleum Science and Engineering ; Volume 150 , 2017 , Pages 312-322 ; 09204105 (ISSN) Moradi, M ; Shamloo, A ; Dezfuli, A. D ; Sharif University of Technology
    2017
    Abstract
    A sequential implicit numerical method based on discrete-fracture model and the Galerkin Finite Element method, for time-dependent coupled fluid flow and geomechanics problems in fractured subsurface formations is presented. Discrete-fracture model has been used to explicitly represent the fracture network inside porous media. The Galerkin Finite Element method with adaptive unstructured gridding is implemented to numerically solve the spatially three-dimensional and time-dependent problem. The presented method is validated with previously obtained solutions. Two problems are numerically solved by applying the presented methodology in a three-dimensional fractured petroleum reservoir under... 

    Evaluation and prediction of rise velocity and drag coefficient of an ascending bubble affected by the impurity in continuous and discrete phases, distinctly and concurrently

    , Article Chemical Engineering Journal ; Volume 464 , 2023 ; 13858947 (ISSN) Lotfi, M ; Rajabzadeh Dezfuli, M ; Bastani, D ; Sharif University of Technology
    Elsevier B.V  2023
    Abstract
    Obtaining a deep knowledge about the bubbly flow systems, which are widely applied in various chemical and industrial processes, is crucial for scholars and engineers to achieve more accurate equipment design and processes control. This paper is dedicated to experimentally investigate the distinctly and concurrently effects of fumed silica nanoparticles (NPs) and hexane vapor molecules as impurities in continuous and discrete phases, respectively, on the terminal velocity and drag coefficient of a single rising bubble in aqueous solutions. The obtained experimental data were compared to the calculated data by derived correlations in literatures. As a result, none of those can predict the... 

    Feature specific control flow checking in COTS-based embedded systems

    , Article Proceedings - 3rd International Conference on Dependability, DEPEND 2010, 18 July 2010 through 25 July 2010 ; July , 2010 , Pages 58-63 ; 9780769540900 (ISBN) Rajabzadeh, A ; Miremadi, S.G ; IARIA ; Sharif University of Technology
    2010
    Abstract
    While the Control Flow Checking (CFC) methods are using the ordinary instruction set and general Arithmetic and Logic Unit (ALU) features to protect the programs against the transient faults, this paper presents a new kind of CFC method, called feature specific CFC. The idea behind this method is using a specific internal hardware in modern processors which provides the ability to monitor internal various parameters of the program. This method is a pure software method and the external hardware overhead is zero. Other overheads have been measured experimentally by executing the workloads on a Pentium system. The execution time overhead is between 42% and 67% and the program size overhead is... 

    Transient detection in COTS processors using software approach

    , Article Microelectronics Reliability ; Volume 46, Issue 1 , 2006 , Pages 124-133 ; 00262714 (ISSN) Rajabzadeh, A ; Miremadi, S. G ; Sharif University of Technology
    2006
    Abstract
    This paper presents a software-based error detection scheme called enhanced committed instructions counting (ECIC) for embedded and real-time systems using commercial off-the-shelf (COTS) processors. The scheme uses the internal performance monitoring features of a processor, which provides the ability to count the number of committed instructions in a program. To evaluate the ECIC scheme, 6000 software induced faults are injected into a 32-bit Pentium® processor. The results show that the error detection coverage varies between 90.52% and 98.18%, for different workloads. © 2004 Elsevier Ltd. All rights reserved  

    CFCET: A hardware-based control flow checking technique in COTS processors using execution tracing

    , Article Microelectronics Reliability ; Volume 46, Issue 5-6 , 2006 , Pages 959-972 ; 00262714 (ISSN) Rajabzadeh, A ; Miremadi, S. G ; Sharif University of Technology
    2006
    Abstract
    This paper presents a behavioral-based error detection technique called control flow checking by execution tracing (CFCET) to increase concurrent error detection capabilities of commercial off-the-shelf (COTS) processors. This technique traces the program jumps graph (PJG) at run-time and compares it with the reference jumps graph to detect possible violations caused by transient faults. The reference graph is driven by a preprocessor from the source program. The idea behind the CFCET is based on using an external watchdog processor (WDP) and also the internal execution tracing feature available in COTS processors to monitor the addresses of taken branches in a program, externally. This is... 

    A hardware approach to concurrent error detection capability enhancement in COTS processors

    , Article 11th Pacific Rim International Symposium on Dependable Computing, PRDC 2005, Changsha, Hunan, 12 December 2005 through 14 December 2005 ; Volume 2005 , 2005 , Pages 83-90 ; 0769524923 (ISBN); 9780769524924 (ISBN) Rajabzadeh, A ; Miremadi, S. G ; Sharif University of Technology
    2005
    Abstract
    To enhance the error detection capability in COTS (commercial off-the-shelf) -based design of safety-critical systems, a new hardware-based control flow checking (CFC) technique will be presented. This technique, Control Flow Checking by Execution Tracing (CFCET), employs the internal execution tracing features available in COTS processors and an external watchdog processor (WDP) to monitor the addresses of taken branches in a program. This is done without any modification of application programs, therefore, the program overhead is zero. The external hardware overhead is about 3.5% using an Altera Flex 10K30 FPGA. For different workload programs, the execution time overhead and the error... 

    Three dimensional pressure transient behavior study in stress sensitive reservoirs

    , Article Journal of Petroleum Science and Engineering ; Volume 152 , 2017 , Pages 204-211 ; 09204105 (ISSN) Moradi, M ; Shamloo, A ; Asadbegi, M ; Dezfuli, A. D ; Sharif University of Technology
    Elsevier B.V  2017
    Abstract
    Stress sensitivity is a phenomenon that affects reservoir rock properties, such as permeability and therefore changes the well pressure transient behavior. This paper aims to study these behaviors in stress sensitive reservoirs and evaluate the pressure loss in such reservoirs during the process of hydrocarbon production. A power model is used to correlate the changes in permeability with pore pressure. A novel semi-implicit three-dimensional finite element method has been employed to numerically solve the flow problem. The numerical results have been validated by analytical results obtained in a non-sensitive reservoir. Pressure drawdown test for different scenarios has been studied. The... 

    Error detection enhancement in COTS superscalar processors with event monitoring features

    , Article Proceedings - 10th IEEE Pacific Rim International Symposium on Dependable Computing, Papeete Tahiti, 3 March 2004 through 5 March 2004 ; 2004 , Pages 49-54 ; 0769520766 (ISBN); 9780769520766 (ISBN) Rajabzadeh, A ; Mohandespour, M ; Miremadi, G ; Sharif University of Technology
    2004
    Abstract
    Increasing use of commercial off-the-shelf (COTS) superscalar processors in industrial, embedded, and real-time systems necessitates the development of error detection mechanisms for such systems. This paper presents an error detection scheme called Committed Instructions Counting (CIC) to increase error detection in such systems. The scheme uses internal Performance Monitoring features and an external watchdog processor (WDP). The Performance Monitoring features enable counting the number of committed instructions in a program. The scheme is experimentally evaluated on a 32-bit Pentium® processor using software implemented fault injection (SWIFI). A total of 8181 errors were injected into... 

    A provably secure identity-based proxy ring signature based on RSA

    , Article Security and Communication Networks ; Volume 8, Issue 7 , July , 2015 , Pages 1223-1236 ; 19390114 (ISSN) Rajabzadeh Asaar, M ; Salmasizadeh, M ; Susilo, W ; Sharif University of Technology
    John Wiley and Sons Inc  2015
    Abstract
    Proxy ring (anonymous proxy) signatures allow an entity to delegate its signing capability to a group of entities (proxy group) such that only one of the members in the proxy group can generate a proxy signature on behalf of the delegator, while privacy of the proxy signer is protected. Identity-based versions of proxy ring signatures employ identity strings in place of randomly generated public keys. Our contribution is twofold. First, we formalize a security model for identity-based proxy ring signatures. We note that there exists no formal security model for identity-based proxy ring signatures prior to our work. Second, we present the first provably secure identity-based proxy ring... 

    A short identity-based proxy ring signature scheme from RSA

    , Article Computer Standards and Interfaces ; Volume 38 , February , 2015 , Pages 144-151 ; 09205489 (ISSN) Rajabzadeh Asaar, M ; Salmasizadeh, M ; Susilo, W ; Sharif University of Technology
    Elsevier  2015
    Abstract
    Identity-based proxy ring signature concept was introduced by Cheng et al. in 2004. This primitive is useful where the privacy of proxy signers is required. In this paper, the first short provably secure identity-based proxy ring signature scheme from RSA assumption has been proposed. In addition, the security of the proposed scheme tightly reduces to the RSA assumption, and therefore, the proposed scheme has a proper advantage in security reduction compared to the ones from RSA. The proposed scheme not only outperforms the existing schemes in terms of efficiency and practicality, but also does not suffer from the proxy key exposure attack due to the use of the sequential aggregation... 

    Identity-based proxy signatures: A generic construction and a concrete scheme from RSA

    , Article Security and Communication Networks ; Volume 8, Issue 18 , May , 2015 , Pages 3602-3614 ; 19390114 (ISSN) Rajabzadeh asaar ,M ; Salmasizadeh, M ; Boyd, C ; Sharif University of Technology
    John Wiley and Sons Inc  2015
    Abstract
    Proxy signatures allow an entity to delegate its signing capability to a proxy which can sign messages on behalf of the delegator. We examine identity-based versions of proxy signatures which employ identity strings in place of randomly generated public keys. First, we give a new generic construction of identity-based proxy signatures from identity-based standard signatures and show that our generic construction is secure if the underlying identity-based standard signature is secure. In addition, we present the first identity-based proxy signature from Rivest, Shamir and Adleman (RSA), secure under the one-wayness of RSA in the random oracle model. We should highlight that the proxy key... 

    A short ID-based proxy signature scheme

    , Article International Journal of Communication Systems ; Volume 29, Issue 5 , 2016 , Pages 859-873 ; 10745351 (ISSN) Rajabzadeh Asaar, M ; Salmasizadeh, M ; Susilo, W ; Sharif University of Technology
    John Wiley and Sons Ltd  2016
    Abstract
    The notion of identity-based proxy signature with message recovery feature has been proposed to shorten identity-based proxy signatures and improve their communication overhead because signed messages are not transmitted with these kinds of signatures. There are a few schemes for this notion: the schemes of Singh and Verma and Yoon et al. Unfortunately, Tian et al., by presenting two forgery attacks, show that Singh and Verma scheme is not secure, and also, the scheme of Yoon et al. does not support provable security. The contributions of this paper are twofold. First, we review the scheme by Yoon et al. and discuss why it does not have message recovery property, and consequently, it is not... 

    Another security improvement over the Lin et al.'s electronic-voting scheme

    , Article International Journal of Electronic Security and Digital Forensics ; Volume 1, Issue 4 , 2008 , Pages 413-422 ; 1751911X (ISSN) Rajabzadeh Asaar, M ; Mohajeri, J ; Salmasizadeh, M ; Sharif University of Technology
    Inderscience Publishers  2008
    Abstract
    Lin, Hwang and Chang (2003) have proposed an electronic-voting scheme which can be utilised in large-scale elections, and claimed that it detects double voting. In this article, by presenting an attack, we show that voters can successfully vote more than once without being detected. Then, we propose a new modified scheme based on the Lin, Hwang and Chang's (2003) scheme with the same efficiency to solve this weakness and analyse its security. © 2008, Inderscience Publishers  

    Experimental evaluation of Master/Checker architecture using power supply- and software-based fault injection

    , Article Proceedings - 10th IEEE International On-Line Testing Symposium, IOLTS 2004, Madeira Island, 12 July 2004 through 14 July 2004 ; 2004 , Pages 239-244 ; 0769521800 (ISBN); 9780769521800 (ISBN) Rajabzadeh, A ; Miremadi, S. G ; Mohandespour, M ; Sharif University of Technology
    2004
    Abstract
    This paper presents an experimental evaluation of the effectiveness of the Master/Checker (M/C) architecture in a 32-bit Pentium® processor system using both power-supply disturbance (PSD) fault injection and software-implemented fault injection (SWIFI) methods. A total of 6000 faults were injected in the Master processor to measure the error detection coverage of the Checker processor. The results of the experiments with PSD fault injection show that the error detection coverage of the M/C architecture is about 66.13%, which is not quite effective. This low coverage depends on the high rate of Master processor hangs because of voltage fluctuation. The coverage increased to about 99.73% when...