Loading...
Search for: salami--rasool
0.192 seconds

    Micro Arc Oxidation Coating on Magnesium Alloy AZ31 and Study its CorrosionBehavior in Physiological Solution

    , M.Sc. Thesis Sharif University of Technology Salami, Behrooz (Author) ; Afshar, Abdollah (Supervisor)
    Abstract
    Magnesium and its alloys have been used as biodegradable implements in recent years. However Magnesium implements may corrode in the body before the natural healing process of the damaged tissue. MAO process was studied in order to reduce primary corrosion of Magnesium alloy in Simulated Body Fluid (SBF). MAO coating was created on AZ31 alloy in a nontoxic alkaline-silicate solution at DC current densities of 5, 10, 15 and 20 mA/cm2 for 30 minutes and the current was in form of 20-10-5 mA/cm2 steps that each were applied for 10 minutes. The maximum corrosion resistance was observed for the mentioned step applied current in a 30g/l Sodium Silicate solution. Furthermore the effects of adding... 

    , M.Sc. Thesis Sharif University of Technology Salami, Rasool (Author) ; Bagherzadeh, Reza (Supervisor)
    Abstract
    catalyzed oxidation of organic compounds such as olefins, sulfides, benzylics alcohols and phenolics. Cyanide-catalyzed aldimine coupling was employed to senthesize compounds with a-imineamine structural motifs : 2,3-di-(2-hydroxyphenyl)-1,2-dihydroquinoxaline, that way for synthesized NONO tetra-dentate Schiff-base ligands. With attention to solid geometry these ligands are possible to synthesize homo and hetronuclear mixed-ligand complexes. we are also synthesized homonuclear mixed-ligand Mn(III) and hetronuclear Mn(III)-Fe(III) with tetradentate Schiff-base ligand quinoxaline and acetyl acetone ligand. These complexes and ligands are characterized by FT-IR, 1H NMR, 13C NMR, UV and... 

    Compressive Sensing PAPR Mitigation in OFDM Systems

    , M.Sc. Thesis Sharif University of Technology Salami Kavaki, Hassan (Author) ; Mashhadi, Saeed (Supervisor)
    Abstract
    Orthogonal Frequency Division Multiplexing (OFDM) is a digital transmission method developed to meet the increasing demand for higher data rates in communications which can be used in both wired and wireless environments. This thesis describes the issue of the Peak to Average Power Ratio (PAPR) in OFDM system, based on compressed sensing at the receiver of a peak-reducing sparse clipper applied to an OFDM signal at the transmitter. By choosing proper clipping threshold, clipping signal will be sparse so locations, magnitudes, and phases of the clipping signal can be recovered by compressed sensing method. We demonstrate that in the absence of optimization algorithms at the transmitter,... 

    Polyoxometalate-supported Pd nanoparticles as efficient catalysts for the Mizoroki-Heck cross-coupling reactions in PEG medium

    , Article Applied Organometallic Chemistry ; Volume 34, Issue 1 , 2020 Bagherzadeh, M ; Hosseini, H ; Salami, R ; Sharif University of Technology
    John Wiley and Sons Ltd  2020
    Abstract
    Palladium nanoparticles supported on polyoxometalate as a solid carrier were successfully prepared and evaluated as a heterogeneous nanocatalyst for the Mizoroki-Heck cross-coupling reactions. This supported catalyst was characterized by a set of techniques, including XRD, chemical analysis (ICP-OES), IR spectroscopy, TEM and FE-SEM analyses. Poly (ethylene glycol) was employed as an environmentally friendly solvent for coupling reactions. The various fundamental reaction parameters that influence the efficiency of the reaction and yield of the desired reaction products were optimized. This catalytic system showed good activities and evolve a strategy for achieving five times catalyst and... 

    Source Localization of EEG in Early Alzheimer’s Disease

    , M.Sc. Thesis Sharif University of Technology Salami, Mohsen (Author) ; Manzuri Shalmani, Mohammad Taghi (Supervisor)
    Abstract
    Localization of electrical activity in the brain is one of the major problems in cognitive science and neuroscience. Indeed, Source localization is the inverse processing procedure on brain signals to estimate the location and position of resources in the human brain. Current technics for neurological imaging is included fMRI، PET، MEG and ERP. These methods is not appropriated to answer the question that when does each of different components of the brain begin their activity. The EEG signals could be useful to eliminate some of limitations of above methods. The problem with EEG signals collected from the skull is that they don’t refer directly to the location of active neurons. The... 

    Vanadium supported on spinel cobalt ferrite nanoparticles as an efficient and magnetically recoverable catalyst for oxidative degradation of methylene blue

    , Article Applied Organometallic Chemistry ; Volume 33, Issue 10 , 2019 ; 02682605 (ISSN) Salami, R ; Amini, M ; Bagherzadeh, M ; Hosseini, H ; Sharif University of Technology
    John Wiley and Sons Ltd  2019
    Abstract
    Vanadium supported on spinel cobalt ferrite nanoparticles was synthesized and characterized using Fourier transform infrared spectroscopy, X-ray diffraction, energy-dispersive X-ray analysis and transmission electron microscopy. For the first time, the prepared material was used for the catalytic degradation of methylene blue as an organic dye in the presence of hydrogen peroxide as a green oxidant and NaHCO3 as a co-reagent at room temperature. The dependency of removal percentage on various parameters such as amount of catalyst, pH, reaction time and temperature and the effect of radical scavenging agents were studied. Finally, recoverability and reusability of the vanadium supported on... 

    Aperiodic perforated graphene in optical nanocavity absorbers

    , Article Materials Science and Engineering B: Solid-State Materials for Advanced Technology ; Volume 276 , 2022 ; 09215107 (ISSN) Bidmeshkipour, S ; Akhavan, O ; Salami, P ; Yousefi, L ; Sharif University of Technology
    Elsevier Ltd  2022
    Abstract
    Aperiodic perforated graphene layers were synthesized and used in fabrication of optical nanocavity absorbers. Chemical vapor deposition-grown graphene (Gr) layers were exposed to oxygen plasma etching to obtain the perforated graphene (pGr). The fabricated pGr/SiO2 (68 nm)/Ag (150 nm) nanocavity could present significant higher optical absorption, especially at around 530 nm wavelength region, as compared to a benchmark Gr/SiO2 (68 nm)/Ag (150 nm) sample. The effect of pore size of the pGr layer on the absorption property of the nanocavity has been studied by both experimental and numerical methods. The dependence of the absorption property of the nanocavity on the incident angles of... 

    A Method for Querying on Encrypted XML Data

    , M.Sc. Thesis Sharif University of Technology Karimi, Maryam (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    When organizations prefer to outsource their data, security protection of data will be more important. Using cryptography in addition to access control techniques is a natural way for saving confidentiality of data against untrusted server. However, encryption and decryption of data result in database performance degradation. In such a situation all the information stored in encrypted form, one cannot make the selection on the database content any more. Data should be decrypted first, so an unwilling tradeoff between the security and performance is normally forced. The appropriate approaches to increase the performance are methods to deal directly with the encrypted data without firstly... 

    Toward A Safe, Assured, and Dynamic Communication Protocol Stack

    , Ph.D. Dissertation Sharif University of Technology Niamanesh, Mahdi (Author) ; Jalili, Rasool (Supervisor)

    A Method for Searching on Encrypted Data

    , M.Sc. Thesis Sharif University of Technology Mansoori, Fatemeh (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Using database encryption to protect data in some situations where access control is not soleley enough is inevitable. Database encryption provides an additional layer of protecton to conventional access control techniques. It prevents unauthorized users, including intruders breaking into a network, from viewing the sensitive data. As a result data remains protected even in the event that database is successfully attacked or stolen. However, encryption and decryption of data result in database performance degradation. In the situation where all the information is stored in encrypted form, one cannot make the selection on the database content any more. Data should be decrypted first, so an... 

    An Intrusion Detection System for the Grid Environment

    , M.Sc. Thesis Sharif University of Technology Movahed, Amirvala (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Existing Intrusion Detection Systems (IDSs) are not designed to deal with all categories of processing environments. This thesis focuses on IDSs for the Grid computing environment, and concentrates on feature selection and performance. An existing framework, Globus, is used as the basis for the consideration and development of the research issue in Grid computing. The system is based on two engine designs: (a) Signature and (b) Support Vector Machine; SVM has been selected for pattern discovery in traffic analysis. We found that the performance of the system greatly depends on the efficiency of the underlying framework and the number of Intrusion Detection System instances. We demonstrate... 

    Alert Correlation Analysis For Intrusion Detection

    , M.Sc. Thesis Sharif University of Technology Farhadi, Hamid (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    While intrusion detection systems (IDSs) are widely used, large number of alerts as well as high rate of false positive events make such a security mechanism insufficient. Accordingly, a track of recent security research, focused on alert correlation. This thesis proposes a Hidden Markov Model (HMM) based correlation method of intrusion alerts which have been fired from different IDS sensors across an enterprise. We used HMM to predict the next attack class of the intruder that is also known as plan recognition. Our method has two advantages. Firstly, it does not require any usage or modeling of network topology, system vulnerabilities, and system configurations. Secondly, as we perform high... 

    Security in Concurrent Execution of an Authentication Protocol

    , M.Sc. Thesis Sharif University of Technology Sobhdel, Yasser (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Today many communications take place over asynchronous insecure networks which do not provide any guarantee of security (as Internet); hence there is a must in authenticating party or parties with which we are going to interact. In many cases, more than two parties (entities) are going to interact, resulting in need of group authentication. Since authentication is inseparable from key exchange, we are going to introduce a new authenticated group key exchange protocol in this thesis which benefits from all known features for such a protocol in the literature such as contributiveness and deniability. To overcome the problem of concurrency, we use a framework dedicated to security in concurrent... 

    Providing Confidentiality of Outsourced Data through Fragmentation

    , M.Sc. Thesis Sharif University of Technology Dodangeh, Peyman (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Data outsourcing is considered as a promising approach in today computing and connected world. This approach enables organizations to outsource their data to anexternal third party server which is responsible for storing and propagation of outsourced data. Although data outsourcing offers many benefits, especially for those organizations with limited resources and increaseing data volume, but this approach in security aspects like providing confidentiality and privacy about curious external third party or other threats, is faced by serious challenges. In the recent decade many approaches for solving or at least decreasing the potential threats over providing confidentiality of outsourced... 

    Evaluation of Security Features of an E-voting Protocol in a Semi-operational Environment

    , M.Sc. Thesis Sharif University of Technology Es'haghi, Mahdi (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Electronic voting refers to voting methods that is done using electronic devices or via the Internet or Web. Helios and Civitas protocols are among the recent protocols introduced in this field. Importance and high sensitivity of electronic voting protocols has led researchers to pay high attention about their security analysis. In recent years, different approaches have been used to inspect and analyze electronic voting protocols. In many of such approaches, analysis had been done in a very abstract environment and without considering the operational requirements.The purpose of this thesis is to evaluate the security features of electronic voting protocols, considering their operational and... 

    Optimizing the Total Cost of Inventory Control System in Integrated Multi-Echelon Supply Chain With Time-sensitive Deteriorating Rates

    , M.Sc. Thesis Sharif University of Technology Mohammadi, Vahid (Author) ; hajji, Rasool (Supervisor)
    Abstract
    In this paper, we consider a three-echelon supply chain consisting of a producer, a distributor and a retailer. Generally each echelon tends to minimize his own inventory costs. On the other hand, competitive environment of business market, force companies to develop strategic alliances. In order to boost their partnership, separated echelons must integrate their policies, so that the total cost of the system be minimized. The model, extends the research of Wang et al.(2011) by changing the No shortage assumption into backlog shortage model.
    This study assumes different deterioration rates among different echelons, and deterioration rates are time-sensitive, which is very helpful in... 

    Inventory Ordering System with Fuzzy Parameters in Supply Chain

    , M.Sc. Thesis Sharif University of Technology Nasiri, Mohsen (Author) ; Hajji, Rasool (Supervisor)
    Abstract
    Inventory control has been always considered important due to its prominent role in managing and better application of resources in the field of operational systems. Ordering system or review stock policy in supply chain management can be mentioned as one of the inventory control study fields of management. A lot of researches have been done in investigating ordering system in supply chain under certainty conditions; however, since the real world is full of uncertainties, parameters such as demand cannot be predicted exactly and we encounter with ambiguity. In this case, using crisp (exact) values can cause to decide wrongly (a wrong decision). On the other hand, due to absence of sufficient... 

    Analysis of End-to-End Electronic Voting Systems

    , M.Sc. Thesis Sharif University of Technology Takhtaei, Benyamin (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    End-to-end electronic voting protocols for electronic voting systems are used to hold a secure election with the two features of anonymity and verifiability. Verifiable mixnets are a fundamental element of electronic voting systems, which can keep the voters anonymous by mixing their votes, and provide a verifiability mechanism to prove their performance correctness. As the design of electronic voting protocols is error-prone, researchers consider the use of mathematics-based and systematic methods for their analysis. Therefore, based on formal methods and the process algebra approach, several studies have been conducted to analyze these systems, but none have properly analyzed verifiable... 

    Optimization of Raw Material Inventory Control System in Khorramshahr Oil Extraction Company Based on ( r,Q ) Optimal Inventory Policy

    , M.Sc. Thesis Sharif University of Technology Rezaie, Mojtaba (Author) ; Hajji, Rasool (Supervisor)
    Abstract
    This thesis is related to applying survey of scientific inventory control methods in Khoramshahr Oil Extraction Company (KHOEC). KHOEC is the producer of edible oils in I.R of Iran and is a subset of E.T.K.A holding organization. The inventory costs of high consuming items are studied and optimized based on the optimal ordering policy (r, Q). First, the company raw materials are identified and classified based on ABC analysis method. For developing the new method of inventory control, the demand for each item is predicted, and the probability distribution of demand during the lead time is determined. Then according to this information and the desired service level of management, order point... 

    Development of Location-Inventory Model in Dual Channel Supply Chain and Solving the Model by Tabu Search Algorithm

    , M.Sc. Thesis Sharif University of Technology Baghestani, Hamideh (Author) ; Hajji, Rasool (Supervisor)
    Abstract
    This thesis presents a location- inventory model for dual-channel supply chains .Dual-channel supply chains have two channels for sale the traditional in-store (retail) channel and the online (retail) channel.The model assigns online demands to the capacitated stores currently serving in-store demands. Keeping the delivery network of the in-store demands unchanged, the model aims at minimizing the summation of transportation cost, inventory cost, and fixed handling cost in the system while assigning the online demands. We assume that at the beginning of each period a distribution center which just distributes products to the stores, follows an order-up-to policy which increases the total...