Loading...
Search for: safi-samghabadi--farshad
0.136 seconds

    Performance Optimization of SBR Reactors Using Fluidized Media (Conversion of SBR to SMBBR)

    , M.Sc. Thesis Sharif University of Technology Safi Samghabadi, Farshad (Author) ; Borghei, Mehdi (Supervisor)
    Abstract
    In recent years, utilization of hybrid attached and suspended growth system for modification of conventional activated sludge systems has attracted a lot of attentions. Nowadays, with development of urban areas and also introducing new emerging contaminants and as a result an increase in the influent loading of wastewater treatment facilities, the importance of upgrading and retrofitting available facilities have been highlighted. Conversion of Sequencing Batch Reactors to Sequencing Batch Biofilm Reactors is a viable solution for overcoming these problems. Eventhough several researches have been conducted on removal of different contaminants through these systems, the information about the... 

    Fabrication of Superstrate Copper Indium Sulfide Solar Cell Avoiding Titanium Dioxide Blocking Layer

    , M.Sc. Thesis Sharif University of Technology Safi Samghabadi, Farnaz (Author) ; Taghavinia, Nima (Supervisor)
    Abstract
    During recent years, thin-film solar cells based on chalcogenide light absorbers with CuInxGa1-xS(Se)2 compound have attracted considerable attraction due to their desirable band gaps and demonstrated high power conversion efficiencies. These solar cells are fabricated under two categories named as ‘substrate’ and ‘superstrate’, generally. The best reported energy conversion efficiency belongs to substrate type (sodalime glass/Mo/absorber layer/buffer layer/window layer) CIGS solar cells, most have been fabricated with vacuum processes. In spite of this, superstrate solar cells (transparent conducting oxide/blocking layer/buffer layer/absorber layer/back contact) provide easier and cheaper... 

    Investigation of Flooding Phenomena in Gas-liquid Flow

    , M.Sc. Thesis Sharif University of Technology Safi Samghabadi, Mohsen (Author) ; Nouri-Broujerdi, Ali (Supervisor)
    Abstract
    In a counter current two phase flow systems that liquid flows downward due to gravity on the pipe wall and gas flows upward due to pressure gradient in the pipe core, Flooding and reversal Flooding are important phenomena. Flooding is beginning of velocity direction change of liquid from downward to upward that with zero axial velocity of liquid in interface, liquid is on verge of moving upward. When mass flow rate of liquid or gas increase, some part of liquid film are separated and enter the gas stream. With further increase in mass flow rate of liquid or gas in flooding point, reversal flooding occurs that cause to all liquid film flows upward. Flooding and reversal flooding phenomena are... 

    Effect of SiO2 content on Y-TZP/Al2O3 ceramic-nanocomposite properties as potential dental applications

    , Article Ceramics International ; Volume 46, Issue 8 , 2020 , Pages 10910-10916 Rahimi, S ; SharifianJazi, F ; Esmaeilkhanian, A ; Moradi, M ; Safi Samghabadi, A. H ; Sharif University of Technology
    Elsevier Ltd  2020
    Abstract
    Yttria-stabilized tetragonal zirconia polycrystals (Y-TZP) have been widely applied in fixed partial prostheses as well as dental uses i.e. a substructure for crowns. However, Y-TZP has limited applications, which is due to the presence of defects in its microstructure introduced during the manufacturing process. Accordingly, due to Y-TZP limitations, the novel (X)Y-TZP- 20Al2O3-(80-X) SiO2 (X = 65, 70 and 75) ceramic nanocomposites were successfully fabricated via the powder metallurgy method. X-ray diffraction (XRD) patterns of commercial powders showed the stabilization of monoclinic zirconia (ZM) by increasing the silica content. In order to determine the fracture load and micro-bending... 

    A Framework for Users' Privacy Preserving of Instant Messaging on Mobile Social Networks

    , Ph.D. Dissertation Sharif University of Technology Safi, Mohammad (Author) ; Movaghar, Ali (Supervisor)
    Abstract
    In recent years, mobile social networks have largely been developed and gained considerable popularity. With the development of smartphones, the growth rate of users on mobile social networks has dramatically increased, with users constantly interacting and sharing their various private and public data. Such volume of information can be used for profitable purposes and may affect the users' privacy. However, due to the limitations of smartphones and the trivial and costly encryption, entrusting the encryption to the user, both for users and for the service provider will be challenging, thus, social network providers themselves take charge that can compromise the privacy. In this... 

    A service based approach to self-adaptive software systems based on constructing a group of autonomic elements

    , Article Proceedings of the 7th IEEE International Conference and Workshop on Engineering of Autonomic and Autonomous Systems, EASe 2010, 22 March 2010 through 26 March 2010 ; March , 2010 , Pages 101-105 ; 9780769540047 (ISBN) Safi, G ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
    2010
    Abstract
    As requirements and environments become much more complex, the need for self-adaptive and self-healing software system grows. There are several existing works which present such systems by using different approaches. Using alternative solutions to provide a service or requirement is one of the most important approaches among existing works. In this paper an alternative-based approach for adding self-adaptive capabilities to software systems is proposed. In this approach a group of autonomic elements will be constructed based on different design or implementations that could be considered for a specific service or requirement. By using this approach, a highly adaptive software system could be... 

    A novel approach for avoiding wormhole attacks in VANET

    , Article 1st South Central Asian Himalayas Regional IEEE/IFIP International Conference on Internet, AH-ICI 2009, 3 November 2009 through 5 November 2009, Kathmundu ; 2009 ; 9781424445707 (ISBN) Safi, S. M ; Movaghar, A ; Mohammadizadeh, M ; Sharif University of Technology
    2009
    Abstract
    Different attacks on routing protocols in ad hoc networks occur that one of the most dangerous types is called wormhole attack. This attack happens with the assistance of at least two or more malicious nodes. In this attack nodes create a private tunnel which if a packet comes to one of them, it will be guided to other pair of these malicious nodes by this tunnel and that node broadcasts it into network. This action provides a short connection in the network that is controlled by these malicious nodes. Hence they control all Packets that come to them and threaten the security of data within packets or delete them. Totally, what a wormhole does is an incorrect understanding of network... 

    SEAODV: Secure efficient AODV routing protocol for MANETs networks

    , Article ACM International Conference Proceeding Series, 24 November 2009 through 26 November 2009, Seoul ; Volume 403 , 2009 , Pages 940-944 ; 9781605587103 (ISBN) Mohammadizadeh, M ; Movaghar, A ; Safi, S. M ; Sharif University of Technology
    2009
    Abstract
    Secure routing is one of the most important topics in the wireless MANETs networks. MANETs networks don't have a central infrastructure for the management of routing in the networks. Each node independently routes and sends packets, so many attacks such as forging, modifying, and denial of service (DoS), Occur in these networks. In this paper, we present the new protocol, SEAODV; Secure Efficient Ad-hoc on Demand Routing Protocol for MANETs networks. SEAODV is based on the AODV algorithm and in comparison with existing secure AODV protocols such as SAODV, ARAN and SEAR have improved security and performances. SEAODV uses HEAP authentication Scheme with symmetric cryptography and one-way hash... 

    A novel approach for avoiding wormhole attacks in VANET

    , Article 2nd International Workshop on Computer Science and Engineering, WCSE 2009, 28 October 2009 through 30 October 2009 ; Volume 2 , 2009 , Pages 160-165 ; 9780769538815 (ISBN) Safi, S. M ; Movaghar, A ; Mohammadizadeh, M ; Sharif University of Technology
    2009
    Abstract
    Different attacks on routing protocols in ad hoc networks occur that one of the most dangerous types is called wormhole attack. This attack happens with the assistance of at least two or more malicious nodes. In this attack nodes create a private tunnel which if a packet comes to one of them, it will be guided to other pair of these malicious nodes by this tunnel and that node broadcasts it into network. This action provides a short connection in the network that is controlled by these malicious nodes. Hence they control all Packets that come to them and threaten the security of data within packets or delete them. Totally, what a wormhole does is an incorrect understanding of network... 

    Privacy protection scheme for mobile social network

    , Article Journal of King Saud University - Computer and Information Sciences ; Volume 34, Issue 7 , 2022 , Pages 4062-4074 ; 13191578 (ISSN) Mohammad Safi, S ; Movaghar, A ; Ghorbani, M ; Sharif University of Technology
    King Saud bin Abdulaziz University  2022
    Abstract
    In the recent years, popularity and number of users of mobile social networks have grown significantly. Due to different types of communication on these networks, users share a lot of information with each other. One of the most critical challenges of social networks is disclosure and unauthorized access to information, data, and communication between users that is a kind of violation of their privacy, which can be done by social network providers, especially unauthorized users. One way to protect one's privacy is using encryption. Therefore, in the present paper, an improved secure design was presented for mobile social network using ciphertext-policy attribute-based encryption (CP-ABE) and... 

    Fabrication of selenization-free superstrate-type CuInS2 solar cells based on all-spin-coated layers

    , Article Materials Chemistry and Physics ; Volume 186 , 2017 , Pages 446-455 ; 02540584 (ISSN) Cheshme khavar, A. H ; Mahjoub, A ; Samghabadi, F. S ; Taghavinia, N ; Sharif University of Technology
    Elsevier Ltd  2017
    Abstract
    Today manufacturing of high efficiency chalcogenide thin film solar cells is based on high cost vacuum-based deposition processes at high temperature (>500 °C) and in chalcogen -containing atmosphere. In this paper, we introduce a simple vacuum-free and selenization-free, solution processing for fabricating a superstrate-type CuInS2 (CIS) solar cell. The absorber, buffer and blocking layers were all deposited by spin coating of molecular precursor inks. We demonstrate the deposition of In2S3 buffer layer by sol-gel spin casting for the first time. The rapid sintering process of CIS layer was carried out at 250 °C that is considered a very low temperature in CIGS thin-film technologies. A... 

    A framework for protecting privacy on mobile social networks

    , Article Mobile Networks and Applications ; Volume 26, Issue 3 , 2021 , Pages 1281-1299 ; 1383469X (ISSN) Safi, S. M ; Movaghar, A ; Safikhani Mahmoodzadeh, K ; Sharif University of Technology
    Springer  2021
    Abstract
    In recent years, mobile social networks have largely been developed and gained considerable popularity. An approach to protecting privacy on mobile social networks is the use of encryption and access control. Good alternatives for use on mobile social networks are the Public Broadcast Encryption approach for appropriate concordance and consistency with the structure of social networks as well as the Attribute-Based Encryption owing to its capability and proper implementation of the access control policy. Accordingly, in this paper, a framework was presented based on the Public Broadcast Encryption and Attribute-Based Encryption. Using proxies, we outsourced some of these operations in the... 

    Analysing the Effects of Monetizing Energy Carriers Subsidy on Expenditures and Welfare Criteria of Iranian Households

    , M.Sc. Thesis Sharif University of Technology Einian, Majid (Author) ; Fatemi, Farshad (Supervisor)
    Abstract
    In this thesis, with a review on policy simulation and economic reform analysis literature, we design a suitable method to analyze the effects of monetizing energy carriers subsidy on welfare criteria of Iranian households. The selected method is limited general equilibrium that needs demand estimates of goods, services and energy. In firs step,based on 13 years of data on “Iranian Households’ Expenditures and Income” surveys, data are provided as a pseudo-panel. Demand equations are estimated using “Seemingly Unrelated Regressions” for panel data, and elasticities are calculated. In the next step, we evaluated the equivalent variation and equivalent gain measures in each price scenarios.... 

    Adverse Selection in Iranian Life Insurance Market

    , M.Sc. Thesis Sharif University of Technology Mirtaher, Abdolkarim (Author) ; Fatemi, Farshad (Supervisor)
    Abstract
    This thesis finds evidence for the presence of adverse selection in the Iranian life insurance market. We use a unique dataset including more than one million policyholders’ profile information alongside their chosen life insurance coverage from the largest Iranian insurance company. Our results not only find evidence in support of adverse selection in this market, but also consider the magnitude of adverse selection relatively notable. Moreover, we found that in addition to the coverage, the other dimensions of contract could be the potential source of adverse selection. Particularly, we focused on the insurance duration and the payment method (monthly, annually, all-in-advance).... 

    Analyses of Effect of Bank Branching on Deposit Market Share and Market Size in Iran Banking Industry

    , M.Sc. Thesis Sharif University of Technology Yousefi, Fateme (Author) ; Fatemi, Farshad (Supervisor)
    Abstract
    This thesis aim to the study of the effect of bank’s branching decisions on deposit market. Using panel data banks from Iran, we study effect of branching on market share and market size. In theoretical part, we assume that banks maximize discounted flow of the profits. We also assume that the banks take into account the reaction from rival banks in setting number of branches. Banks are assumed to expect the rival banks react by a lag of one period. In empirical part, in order to distinguish between aggregate market size effect and market share effect, we rewrite quantity of deposit in banks as the product of aggregate deposit and market share. We specify deposit market share function with... 

    Investigation of Hamrahe-Aval Demand Services

    , M.Sc. Thesis Sharif University of Technology Hosseinabadi, Mahsa (Author) ; Fatemi, Farshad (Supervisor)
    Abstract
    In the past few years mobile usage is increasing in Iran. Since mobile industry is growing and new innovations are presented, the competition between operators is rising. Although this competition has a great influence on the mobile demand for each operator, lack of the data of the all operators made us to use the data of one of the operators to investigate the demand. Based on the subscriber’s data of Hamrahe-Aval company, it has been introduced an estimation of a demand system for customers of this company by using AIDS model in this essay. This model includes three groups of services: sending short messages, calling to mobile numbers and calling to fixed numbers.
    This study has two... 

    The Static and Dynamic Relationship between Monetary and Multidimensional Poverty Approaches

    , M.Sc. Thesis Sharif University of Technology Goodarzi, Marzieh (Author) ; Fatemi Ardestani, Farshad (Supervisor)
    Abstract
    The identification of the poor and the elimination of their poverty always has been the subject of discussion among researchers and policymakers. Today, most researchers consider poverty as a multidimensional phenomenon, and in addition to income indicator, it has indicators related to the level of knowledge, awareness, well-being and the health of individuals. The study of multidimensional poverty and the search for the discovery of its static and dynamic relationship with income-based poverty is the subject of this research. The analysis shows that both statically and dynamically, there is a substantial mismatch in the identification of the poor households according to these two... 

    Does Childbearing Behavior of the Parents Confirm the Existence of Gender Preference in Iran?

    , M.Sc. Thesis Sharif University of Technology Hassanshahi, Hanieh (Author) ; Fatemi, Farshad (Supervisor)
    Abstract
    Since the mid-twentieth century, the issue of gender preference has always been of interest to economists. This preference is demonstrated by sex-selection methods such as differential stopping behavior and sex-selective abortion. While it is almost impossible to look directly into abortion behavior in Iran, due to religious beliefs and illegality, we can investigate gender preference by calculating to what extent parents adapt their fertility behavior to ensure the birth of preferred sex. For this purpose, we use “Households Income and Expenditure Survey of 2019” data from the Statistical Center of Iran. Our results indicate that when Iranian parents are deciding to have second child, they... 

    An evaluation method for aspectual modeling of distributed software architectures

    , Article 6th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2008, Doha, 31 March 2008 through 4 April 2008 ; 2008 , Pages 903-908 ; 9781424419685 (ISBN) Bagheri, H ; Montaghami, V ; Safi, G ; Mirian Hosseinabadi, S. H ; Sharif University of Technology
    2008
    Abstract
    Dealing with crosscutting requirements in software development usually makes the process more complex. Modeling and analyzing of these requirements in the software architecture facilitate detecting architectural risks early. Distributed systems have more complexity and so these facilities are much useful in development of such systems. Aspect oriented Architectural Description Languages(ADL) have emerged to represent solutions for discussed problems; nevertheless, imposing radical changes to existing architectural modeling methods is not easily acceptable by architects. Software architecture analysis methods, furthermore, intend to verify that the quality requirements have been addressed... 

    Investigating Sex Preferences in Iran

    , M.Sc. Thesis Sharif University of Technology Khatib Shahidi, Milad (Author) ; Fatemi, Farshad (Supervisor)
    Abstract
    The question of whether sex preferences are present in a certain country has long been of interest for economists and demographers. This study first investigates the existence of these preferences among Iranian parents. Next, if any preference are present, it turns to the task of inferring the quality of the observed preferences. There are two widely used methods for addressing these issues in the literature. The first method is to estimate a Logit model which relates the probability of a mother giving birth to a new child, to the sexes of her previous children. The second one is to estimate a Proportional Hazard model in order to investigate the relationship of the time interval between...