Loading...
Search for:
sabzevari--mahtab
0.089 seconds
Dynamics of HIV-1 Infection Models: Saturation Infection, an Eclipse Stage, CTL Immune Response
, M.Sc. Thesis Sharif University of Technology ; Hesaaraki, Mahmoud (Supervisor)
Abstract
In this thesis, three mathematical models are considered for the viral dynamics of HIV-1. The first model is an HIV infection model with saturation infection and intracellular delay, which forms a three-dimensional differential equations system, the second model includes an eclipse stage of infected cells, The viral dynamics of this model is described by four nonlinear ordinary differential equations, and finally, we study a delayed six-dimensional HIV model with CTL immune response, in fact, the main issue is the analysis of the second model (model including an eclipse stage for the infected cells).In this thesis is obtained sufficient conditions for persistence or eradication of the...
Energy Harvesting and Energy Cooperation in Competitive Interference Channel
, M.Sc. Thesis Sharif University of Technology ; Mirmohseni, Mahtab (Supervisor)
Abstract
Energy Harvesting is one of the techniques which can be utilized in Green Communications and increase the wireless networks lifetime. In an EH system, each resource is supplied with the energy harvested from the environment. When we confront with a situation that the users of one channel want to increase their rates and this action negatively affects the other user’s rates, the user’s cooperation problem for obtaining a fair rate will be created. In this study, at first we consider a Multiple Access Channel and we assume that the energy resources of transmitters are harvested according to a known probability. In addition, we assume that the transmitters do not know the instantaneous amount...
Secure Transmission Strategies in Massive MIMO Systems in Presense of a Jammer
, M.Sc. Thesis Sharif University of Technology ; Mirmohseni, Mahtab (Supervisor)
Abstract
Massive MIMO systems are systems, where the base station has many number of antenna so each user’s channel is orthogonal to one another.These systems have some valuable advantages such as reduction of energy needed for transmission and significant improvement in spectral efficiency, which makes them be suitable for next generation of wireless communication systems. Another advantage of Massive MIMO systems is inherent resistance against passive eavsdroppers due to having a directed power radiation in direction of the desired user. However another physical layer attack threat these systems: attacking in pilot phase then eavsdropping in downlink phase which must taken care of in physical...
Time of concentration of surface flow in complex hillslopes
, Article Journal of Hydrology and Hydromechanics ; Volume 61, Issue 4 , 2013 , Pages 269-277 ; 0042790X (ISSN) ; Saghafian, B ; Talebi, A ; Ardakanian, R ; Sharif University of Technology
Versita
2013
Abstract
Time of concentration (TC) of surface flow in watersheds depends on the coupled response of hillslopes and stream networks. The important point in this background is to study the effects of the geometry and the shape of complex hillslopes on the time of concentration considering the degree of flow convergence (convergent, parallel or divergent) as well as the profile curvature (concave, straight or convex). In this research, the shape factor of complex hillslopes as introduced by Agnese et al. (2007) is generalized and linked to the TC. A new model for calculating TC of complex hillslopes is presented, which depends on the plan shape, the type and degree of profile curvature, the Manning...
A steady-state saturation model to determine the subsurface travel time (STT) in complex hillslopes
, Article Hydrology and Earth System Sciences ; Volume 14, Issue 6 , Jun , 2010 , Pages 891-900 ; 10275606 (ISSN) ; Talebi, A ; Ardakanian, R ; Shamsai, A ; Sharif University of Technology
2010
Abstract
The travel time of subsurface flow in complex hillslopes (hillslopes with different plan shape and profile curvature) is an important parameter in predicting the subsurface flow in catchments. This time depends on the hillslopes geometry (plan shape and profile curvature), soil properties and climate conditions. The saturation capacity of hillslopes affect the travel time of subsurface flow. The saturation capacity, and subsurface travel time of compound hillslopes depend on parameters such as soil depth, porosity, soil hydraulic conductivity, plan shape (convergent, parallel or divergent), hillslope length, profile curvature (concave, straight or convex) and recharge rate to the groundwater...
Artificial intelligence evaluation of COVID-19 restrictions and speech therapy effects on the autistic children’s behavior
, Article Scientific Reports ; Volume 13, Issue 1 , 2023 ; 20452322 (ISSN) ; Amelirad, O ; Moradi, Z ; Habibi, M ; Sharif University of Technology
Nature Research
2023
Abstract
In the present study, we aimed to quantify the effects of COVID-19 restrictions and speech treatment approaches during lockdowns on autistic children using CBCL and neuro-fuzzy artificial intelligence method. In this regard, a survey including CBCL questionnaire is prepared using online forms. In total, 87 children with diagnosed Autism spectrum disorders (ASD) participated in the survey. The influences of three treatment approaches of in-person, telehealth and public services along with no-treatment condition during lockdown were the main factors of the investigation. The main output factors were internalized and externalized problems in general and their eight subcategory syndromes. We...
Three-component coupling of boronic acids, amines, and carbon disulfide by a heterogeneous catalyst of copper (II) embedded in a highly porous and magnetic schiff base network of melamine
, Article Research on Chemical Intermediates ; Volume 49, Issue 10 , 2023 , Pages 4423-4441 ; 09226168 (ISSN) ; Kohestanian, M ; Sabzevari, A ; Pourjavadi, A ; Sharif University of Technology
Springer Science and Business Media B.V
2023
Abstract
In this work, the mesoporous magnetic heterogeneous catalyst was synthesized by anchoring copper (II) onto the nitrogen-rich poly (melamine) Schiff base networks magnetic nanocomposite. First, MNP (Fe3O4@SiO2) was functionalized with chlorosilane (CPTS). Then, the chlorine of these functionalized magnetic nanoparticles could react with the –NH2 groups of the melamine through a nucleophilic substitution reaction. Simultaneously, the condensation polymerization of melamine and benzene-1, 3, 5-tricarbaldehyde was carried out in the presence of surface-modified magnetic nanoparticles. Later, Fourier-transform infrared spectroscopy (FT-IR), X-ray diffraction (XRD), thermogravimetric analysis...
Physical Layer Security in Non-Orthogonal Multiple Access (NOMA) Networks
, M.Sc. Thesis Sharif University of Technology ; Mirmohseni, Mahtab (Supervisor)
Abstract
The increasing expansion of wireless communications and the increase in information traffic and the number of communication users, and on the other hand, the frequency and energy frequency limitations have led to the emergence of new generation communications. In the fifth generation of communications, one of the solutions to ensure the optimal use of bandwidth is the use of the non-orthogonal multiple access (NOMA) schema, which of course, the use of such a scheme in the system naturally increases the complexity of the receivers. Unlike most access methods in previous generations of communications, the goal of NOMA is the simultaneous use of multiple users from a frequency band for data...
Information Theoretic Strategies in Private Distributed Hypothesis Testing
, M.Sc. Thesis Sharif University of Technology ; Mirmohseni, Mahtab (Supervisor)
Abstract
The problem of distributed binary hypothesis testing in the Gray-Wyner network with side information is studied in this dissertation. An observer agent has access to a discrete memoryless and stationary source and describes its observation to two detecting agents via one common and two private channels. The channels are considered error-free but rate-limited. Each detecting agent also has access to its own discrete memoryless and stationary source, i.e., the side information. The goal is to perform two distinct binary hypothesis testings on the joint distribution of observations at detecting agents. Additionally, the observing agent aims to keep a correlated latent source private against the...
Targeted Theranostic Delivery System Based on Liposomes Containing Graphene Quantum Dots and Drug Nanoparticles For Monitoring and Treatment of Breast Cancer
, Ph.D. Dissertation Sharif University of Technology ; Simchi, Abdolreza (Supervisor) ; Sabzevari, Omid (Supervisor)
Abstract
Theranostic liposomes have recently found a broad range of applications in nanomedicine due to stability, the high solubility of biomacromolecules, bioavailability, efficacy, and low adverse effects. However, the limitations of liposomes concerning the short systemic circulation in the body, limited controllability of the release rate, and the inability of in vivo imaging remain challenging. Herein, the development of novel hybrid ultrasound-activated piezoelectric nanoparticles based on a hybrid liposome nanocarrier composed of poly(vinylidene fluoride‐trifluoroethylene), graphene quantum dots (GQDs), and Silibinin (a hydrophobic drug) is presented. The hybrid nanoparticles are an...
Production Study of Protease Enzyme by Immobilized Cells
,
M.Sc. Thesis
Sharif University of Technology
;
Yaghmaei, Soheila
(Supervisor)
;
Kazemi, Akhtarelmolook
(Supervisor)
Abstract
Microbial proteases are among the most important hydrolytic enzymes and havebeen studied extensively since the advent of enzymology. They are essentialconstituents of all forms of life on earth, including prokaryotes, fungi, plants andanimals.In recent years there has been a phenomenal increase in the use of alkaline protease asindustrial catalysts. Alkaline proteases (EC.3.4.21–24, 99) are defined as thoseproteases which are active in a neutral to alkaline pH range. Cell immobilization is a technique that restricts the free movements of microorganisms in the process and it has a lot of advantages including this fact that biotechnologists’ dream for using continuous system in fermentation...
Alkaline protease production by immobilized cells using B. licheniformis
, Article Scientia Iranica ; Volume 20, Issue 3 , 2013 , Pages 607-610 ; 10263098 (ISSN) ; Kazemi, A ; Nahid, P ; Yaghmaei, S ; Sabzevari, M. A ; Sharif University of Technology
2013
Abstract
In recent years there has been potential increase in the use of alkaline protease as industrial catalysts. Many major industrial and commercial applications, such as food and textile industries, and medical diagnoses, are highly dependent on the protease enzyme. In the cell immobilization technique, the free movement of microorganisms is restricted in the process, and a continuous system of fermentation can be used. In the present work, this technique has been used for alkaline protease production using different carriers, such as chitosan, corn cob and corn tassel. Enzyme activity before immobilization (72 h) was 78.3 U/ml. Corn cob, with 65% immobilization capacity and the highest enzyme...
Modeling and Analysis of D2D Data Offloading
, M.Sc. Thesis Sharif University of Technology ; Ashtiani, Farid (Supervisor) ; Mirmohseni, Mahtab (Co-Advisor)
Abstract
The increase in mobile data traffic adversely affects the quality of service experienced by mobile users. Moreover, the cost incurred by developing infrastructure exceeds its profit. Therefore, there is a trend toward finding cost effective schemes to cope with increase in mobile data traffic. One of the recent elegant solutions is mobile data offloading based on D2D communications. In this thesis, we propose a new offloading scheme using D2D communications for delay-tolerant services. In this regard, we assume a common file is demanded by a subset of users in different time instances and we accumulate demands to serve them in a scheme where devices are divided into non-overlapping...
Radio Resource Sharing in Wireless Network Virtualization Based on Game Models
, M.Sc. Thesis Sharif University of Technology ; Ashtiani, Farid (Supervisor) ; Mirmohseni, Mahtab (Co-Supervisor)
Abstract
In the next generation of wireless networks, wireless network virtualization is considered as an efficient technology to enhance the network capacity. This technology enables the separation between wireless network infrastructure and the services it provides that enhances some of the existing capabilities and make new capabilities in the network. Spectrum sharing,infrastructure sharing, network sharing, resource slicing are some of these capabilities.Furthermore, the mentioned separation causes the lower entry barriers for small beneficiary entities. The increment in the number of beneficiary entities makes intense competitions among them leading to lower costs for different services. Also,...
Cooperative Relaying in a Multiuser Random Access Network with Energy Harvesting Nodes
, M.Sc. Thesis Sharif University of Technology ; Ashtiani, Farid (Supervisor) ; Mirmohseni, Mahtab (Supervisor)
Abstract
Energy crisis has always been a crucial issue faced by the development of wireless communication techniques. As a more energy-efficient network architecture, green communications and networks (GCNs) have recently attracted significant attention from academia and industry. In order to enable the technical and economical GCNs, several emerging techniques have been proposed including energy-efficient and energy harvesting techniques. Although these emerging techniques have drawn considerable attention and have been studied recently, there are still many open theoretical and practical problems to be addressed. Energy harvesting (EH) is a key technology to achieve the objectives of GCNs. This...
Resource Allocation in Computation Offloading Based on Reinforcement Learning
, M.Sc. Thesis Sharif University of Technology ; Ashtiani, Farid (Supervisor) ; Mirmohseni, Mahtab (Supervisor)
Abstract
Collaborative edge computing (CEC) is a recently popular paradigm enabling sharing of computation resources among different edge devices. In CEC, multiple stakeholders (mobile users, mobile edge computing servers, cloud servers,...) collaborate to provide new computation capacity in order to perform computation-intensive tasks efficiently in the edge. In the thesis, each task, the data that should be computed in the cloud or edge, was modeled as a graph of dependent sub-tasks. Resource allocation for task offloading is an important problem to address in CEC as we need to decide when and where each subtask is executed. In this work, we mathematically formulate the problem of resource...
Physical Layer Security Utilizing Reconfigurable Intelligent Surfaces
, M.Sc. Thesis Sharif University of Technology ; Behroozi, Hamid (Supervisor) ; Mirmohseni, Mahtab (Supervisor)
Abstract
With the increasing use of wireless communications, the need for optimal utilization of bandwidth and energy has become undeniable. Reconfigurable Intelligent Surfaces (RIS) have emerged as a promising technology for the efficient use of telecommunications resources. One proposed model of these surfaces is the Simultaneously Transmitting and Reflecting RIS (STAR-RIS), which, unlike conventional reflective surfaces, can simultaneously reflect part of the incoming waves and transmit part of them. This study examines the potential use of these surfaces in simultaneous wireless information and power transfer networks. In the defined problem, energy receivers are not reliable, and there is a...
Cobalt -mediated radical polymerization of vinyl acetate in a packed column system: simultaneous effective control of molecular weight, separation, and purification
, Article Journal of Polymer Research ; Volume 29, Issue 12 , 2022 ; 10229760 (ISSN) ; Dadkhah, A. S ; Kohestanian, M ; Mahdieh, A ; Semsarzadeh, M. A ; Sharif University of Technology
Springer Science and Business Media B.V
2022
Abstract
The simultaneous control of the molecular weight, separation, and purification of polyvinyl acetate was achieved using a cobalt-mediated radical polymerization (CMRP) in a packed column with silica gel particles (PC-CMRP). The controlled radical polymerization of VAc in the packed columns was evaluated from the linear time dependence of Ln[M]0/[M], linear increase of molecular weight with the increase in conversion, and narrow molecular weight distribution. PC-CMRP method was used to produce high-purity polymers with controlled molecular weight and narrow molecular weight distribution without requiring additional purification steps. The high ability of silica gel particles to adsorb free...
Analysis and Enhancement of Information Transmission in a Cognitive Radio Device-to-Device Network with Full-Duplex Communication Capability
, M.Sc. Thesis Sharif University of Technology ; Ashtiani, Farid (Supervisor) ; Mirmohseni, Mahtab (Supervisor)
Abstract
Increasing demand of bandwidth in wireless communications systems led to excessive congestion in frequency spectrum. Since radio spectrum is an expensive and rare source, its efcient use is an important challenge. These limitations as well as increasing number of communications service users,necessitate the use of newer technologies that work efciently with numerous users. Device-to-Device (D2D) communications, full-duplex capability and cognitive radio systems are introduced for this reason. In the previous technologies, due to excessive self-interference (SI), full-duplex transmission has not been implemented. However nowadays technology allows self-interference to be attenuated up to 100...
Information Theoretic Secret Key Agreement Based on localization
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Mirmohseni, Mahtab (Co-Advisor)
Abstract
Sharing secret key is an essential prerequisite of symmetric key cryptography. So, we consider a source model for information theoretic secret key agreement based on the distance among the nodes. Secret key agreement based on information theory, unlike computational models, guarantee full information secrecy, eavesdropper receives no efficient information. The model is a basic system consisting of two legitimate users and an eavesdropper. The legitimate nodes try to agree on a reliable and secure key based on their noisy observation of distance between them. Eavesdropper observes the distance, too. First, we model distance estimation by the nodes to study performance of the system (secret...