Loading...
Search for:
shahriari--esmaeel
0.064 seconds
Investigation and Implementation of Ultra High Speed Algorithms for Frequency Measurement
, M.Sc. Thesis Sharif University of Technology ; Pezeshk, Amirmansour (Supervisor) ; Sanaei, Esmaeel (Supervisor)
Abstract
The purpose of this project is to detect the instantaneous frequency of an unknown signal which has a frequency range from 2GHz to 18GHz, and its amplitude is limited. In the first step, this signal is amplified, and its amplitude is limited and then it is converted to a digital sequence using a mono-bit scheme and entered the FPGA through an ultra-fast serial port. After that, the algorithm of this project is supposed to do two main processing stages on the received stream of pulses. Detection should be performed in the first phase. It means that it should be determined whether the received pulse sequence is a random sequence made by noise or an almost regular sequence due to a sinusoidal...
Analytical modeling of a Minimally Invasive Surgery grasper actuated by shape memory alloy wires
, Article International Conference on Robotics and Mechatronics, ICRoM 2013 ; Feb , 2013 , Pages 147-151 ; 9781467358118 (ISBN) ; Zabihollah, A ; Sharif University of Technology
2013
Abstract
Minimally Invasive Surgery (MIS) is getting common these days. MIS robots using special tools can perform surgery precisely as humans. This is only possible with dexterous end-effectors and a well-controlled system. Local, lightweight and powerful actuators positioned at end-effectors provide the ability to decrease the degrees of freedom and simplify the design. This paper discusses a grasper design actuated by Shape Memory Alloy (SMA) wires that can be used in MIS robotics. The properties of a commercially available shape memory alloy are explored and analytical formulations for the actuation procedure are developed. The grasper actuated by SMA wires is studied and the procedure of...
Vorticity-Bases Adaptive Mesh Refinement for Upscaling of Highly Heterogeneous Porous Media
, M.Sc. Thesis Sharif University of Technology ; Firoozabadi, Bahar (Supervisor)
Abstract
The results of numerical simulation of underground flows are greatly affected not only by the discretization method of flow equations, but also by the way that the geological domain is upscaled. Including the detailed knowledge of heterogeneous permeability distribution is mostly neither feasible nor computationally efficient. So it is important to develop efficient grid generation and upscaling methods to simplify the fine-scale flow model while still including the impact of the heterogeneities as far as possible. Thus regions where parameters of interest have larger values or higher changes require finer grid blocks and regions with lower values or minor changes should have coarser grid...
Consequence Modelling of Ethylene Oxide Reactor of Morvarid Petrochemical Co
, M.Sc. Thesis Sharif University of Technology ; Rashtchian, Davood (Supervisor)
Abstract
As Ethylene Oxide is a highly toxic, flammable, and hazardous material, the consequences of any malfunction in an Ethylene Oxide reactor may be irreparable. The aim of this thesis is to evaluate the probable consequences of an accident in Morvarid Petrochemical Co.’s Ethylene Oxide Reactor in order to find probable hazardous scenarios. In this project, probable accidents were modelled and evaluated by Phast software in different scenarios, and the outcomes were investigated. In addition, if necessary, a set of solutions were proposed to decrease casualties in hazardous scenarios. The results may be used to change layouts according to Consequence Modelling. Results illustrated that...
Control of Three-phase UPS with Nonlinear Load Using Disturbance Observer Considering Transformer Concerns
, M.Sc. Thesis Sharif University of Technology ; Tahami, Farzad (Supervisor)
Abstract
Nowadays, non-linear loads comprise an important part of electrical grids. One of the most essential sources of nonlinear loads is switching power supplies, which mainly include power electronic rectifiers. When power outage occurs, Uninterruptible Power Supplies (UPS) must be able to supply these loads. The nonlinearity of the load has a significant effect on the Total Harmonic Distortion (THD) of the output voltage, which may not be easily reduced, especially in three-phase inverters. Furthermore, the presence of isolating transformers in these power supplies limits the control of harmonics and intensifies the nonlinear effects of the system.In this Master Thesis, a disturbance observer is...
Constructive Mathematics and Quantum Mechanics
, M.Sc. Thesis Sharif University of Technology ; Ardeshir, Mohammad (Supervisor)
Abstract
In constructive mathematics, one has to construct a mathematical object in order to show that it exists. Consequently, some of classical theorems are not acceptable from a constructive point of view. In particular, the constructive validity of the parts of mathematics that play a role in forming physical theories is of interest. Here, we want to examine the constructive provability of some theorems related to quantum mechanics
High Speed Digital Receiver, Design and Implementation
, M.Sc. Thesis Sharif University of Technology ; Sanaei, Esmaeel (Supervisor) ; Pezeshk, Amir Mansoor (Supervisor)
Abstract
Nowadays, increasingly improvements in the digital technology and the advantages of using digital signal processing methods lead engineers to use digital signal processing instead of analog processing in variant domains. However, speed limitations in analog to digital converters (ADCs) and data transfer ports prevent its penetration to high frequency signals region. In this thesis, an Instantaneous Frequency Measurement (IFM) system that can measure frequency in the range of 2-18 GHz is implemented fully digital (DIFM) on FPGA. To do so, monobit sampling technique with the sampling rate of 10 GHz is selected, and GTX high speed serial port is configured to transfer digital data into FPGA....
Study and Implementation of ERP Protocol
, M.Sc. Thesis Sharif University of Technology ; Sanaei, Esmaeel (Supervisor) ; Pakravan, Mohammad Reza (Supervisor)
Abstract
One of the major Ethernet challenges for entering the communication networking infrastructure, is the problem of damage prevention caused by the loop formation in the network. Since for offering many of the new services and such required for data it is necessary to provide features such as the ability of protection with short recovery time in service. ITU-T G.8032 Recommendation by providing Ethernet Ring Protection Protocol (ERP) could reduce the recovery time of failure to 50ms, while it takes a few seconds for other protocols. This protocol is one of the optimal solutions to respond these challenges and to complete the benefits of Ethernet as the best technology infrastructure. In this...
Gait analysis of a six-legged walking robot using fuzzy reward reinforcement learning
, Article 13th Iranian Conference on Fuzzy Systems, IFSC 2013 ; August , 2013 , Page(s): 1 - 4 ; ISBN: 9781479912278 ; Khayyat, A. A ; Sharif University of Technology
IEEE Computer Society
2013
Abstract
Free gait becomes necessary in walking robots when they come to walk over discontinuous terrain or face some difficulties in walking. A basic gait generation strategy is presented here using reinforcement learning and fuzzy reward approach. A six-legged (hexapod) robot is implemented using Q-learning algorithm. The learning ability of walking in a hexapod robot is explored considering only the ability of moving its legs and using a fuzzy rewarding system telling whether and how it is moving forward. Results show that the hexapod robot learns to walk using the presented approach properly
Vulnerability take grant (VTG): an efficient approach to analyze network vulnerabilities
, Article Computers and Security ; Volume 26, Issue 5 , 2007 , Pages 349-360 ; 01674048 (ISSN) ; Jalili, R ; Sharif University of Technology
2007
Abstract
Modeling and analyzing information system vulnerabilities help predict possible attacks to computer networks using vulnerabilities information and the network configuration. In this paper, we propose a comprehensive approach to analyze network vulnerabilities in order to answer the safety problem focusing on vulnerabilities. The approach which is called Vulnerability Take Grant (VTG) is a graph-based model consists of subject/objects as nodes and rights/relations as edges to represent the system protection state. Each node may have properties including single vulnerabilities such as buffer overflow. We use the new concept of vulnerability rewriting rule to specify the requirements and...
Using CSP to model and analyze transmission control protocol vulnerabilities within the broadcast network
, Article Proceedings - 2004 International Networking and Communication Conference, INCC 2004, Lahore, 11 June 2004 through 13 June 2004 ; 2004 , Pages 42-47 ; 0780383257 (ISBN) ; Jalili, R ; Sharif University of Technology
2004
Abstract
Spreading networks and increasing their complexity has complicated the task of security analysis. Accordingly, automatic verification approaches have received more attention recently. In this paper, we modeled a network including a set of hosts (clients and servers) using the process algebra CSP in order to verify the Transmission Control Protocol (TCP) behavior against an active intruder. The model is verified using the FDR tool and as a result, some attack scenarios violating the security are found. The scenarios showes how an intruder can compromise the server trust to its clients. As the model is modular, extendable, and scalable, more complex attack scenarios (combination of simple...
Modeling of network security-related behaviours using NVML
, Article 8th International Multitopic Conference, INMIC 2004, 24 December 2004 through 26 December 2004 ; 2004 , Pages 506-511 ; 0780386809 (ISBN); 9780780386808 (ISBN) ; Jalili, R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2004
Abstract
Nowadays, security has become an important issue for organizations especially in e-commerce applications. The spreading of networks and increasing of their complexity has complicated the task of security analysis, therefore automatic approaches have received more attention recently. This paper proposes a model-based approach to analyze the overall security of a network, based on the interaction of hosts within the network. A simple language is introduced far modeling securityrelated behaviours of networks and systems. Using the language, a case study is described and its formal model and security properties are presented. © 2004 IEEE
Qos Improvement for Building Automation Systems Using WSN
, M.Sc. Thesis Sharif University of Technology ; Sanaei, Esmaeel (Supervisor) ; Jahangir, Amir Hossein (Supervisor)
Abstract
Implement of smart grid has three mail reasons: Energy crisis caused by lake of traditional fuels, climate changes that can bring a lot of difficulties for human and great potentials of renewable energies. There are many diverse concepts in smart grid. Increase power quality, decrease power cuts, increase active consumer participations, effective way r of using distribution generation units are most important advantages of smart grid.I I;.Emerging new technologies are forced smart grid operators using this new technologies. Wireless Sensor Networks are one of these new technologies that can be used in smart gird. In this thesis we are going to study the rule of wireless sensor networks in...
A counterexample to polynomially bounded realizability of basic arithmetic
, Article Notre Dame Journal of Formal Logic ; Volume 60, Issue 3 , 2019 , Pages 481-489 ; 00294527 (ISSN) ; Khaniki, E ; Shahriari, M ; Sharif University of Technology
Duke University Press
2019
Abstract
We give a counterexample to the claim that every provably total function of Basic Arithmetic is a polynomially bounded primitive recursive function. © 2019 by University of Notre Dame
A counterexample to polynomially bounded realizability of basic arithmetic
, Article Notre Dame Journal of Formal Logic ; Volume 60, Issue 3 , 2019 , Pages 481-489 ; 00294527 (ISSN) ; Khaniki, E ; Shahriari, M ; Sharif University of Technology
Duke University Press
2019
Abstract
We give a counterexample to the claim that every provably total function of Basic Arithmetic is a polynomially bounded primitive recursive function. © 2019 by University of Notre Dame
Simulation of NO Production Process from Endothelial Cells and its Effect on Coronary Artery Flow Field
, M.Sc. Thesis Sharif University of Technology ; Firoozabadi, Bahar (Supervisor)
Abstract
Endothelial derived nitric oxide (NO) and its role in regulating the physiological conditions of blood vessels is one of the favorite topics among researchers. The majority of previous studies have focused on nitric oxide transport in blood vessels, less attention has been paid to its vasodilative effects in blood vessels. The main aim of this study is to propose an integrated model to study the effects of endothelial-derived nitric oxide on hemodynamic conditions of blood vessels. Nitric oxide is produced by endothelial cells upon exposure to mechanical forces such as hemodynamic shear stress. The synthesized nitric oxide then diffuses into the neighboring vascular smooth cells, where it...
An integrated approach for enhancing the quality of the product by combining robust design and customer requirements
, Article Quality and Reliability Engineering International ; Vol. 30, Issue. 8 , 2014 , pp. 1285-1292 ; ISSN: 07488017 ; Haji, M. J ; Eslamipoor, R ; Sharif University of Technology
2014
Abstract
Enhancing the quality of the product has always been one considerable concern of production process management, and this subject gave way to implementing so many methods including robust design. In this paper, robust design utilizes response surface methodology (RSM) considering the mean and variance of the response variable regarding system design, parameter design, and tolerance design. In this paper, customer requirements and robust design are regarded simultaneously to achieve enriched quality. Subsequently, with a non-linear programming, a novel method for integrating RSM and quality function deployment has been proposed to achieve robustness in design. The customer requirements are...
γ' Precipitate dissolution during heat treatment of nimonic 115 superalloy
, Article Materials and Manufacturing Processes ; Volume 24, Issue 5 , 2009 , Pages 559-563 ; 10426914 (ISSN) ; Sadeghi, M. H ; Akbarzadeh, A ; Sharif University of Technology
2009
Abstract
In precipitation hardenable materials, it is desirable to determine the precipitate dissolution temperature for homogenizing the microstructure by controlling the size and distribution of the precipitates. In this research, differential thermal analysis, dilatometry technique, heat treatments followed by microstructure evaluation were used to determine the -γ' dissolution temperature of Nimonic 115. It is assumed that the variation of enthalpy is governed by the changes in y volume fraction and γ concentration with time and temperature, and any contribution of the coarsening of γ' is neglected. The values obtained for the solvus temperature of γ precipitates by the three methods are all in...
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks
, Article Computers and Security ; Volume 25, Issue 6 , 2006 , Pages 459-468 ; 01674048 (ISSN) ; Jalili, R ; Shahriari, H. R ; Sharif University of Technology
2006
Abstract
With the growing rate of network attacks, intelligent methods for detecting new attacks have attracted increasing interest. The RT-UNNID system, introduced in this paper, is one such system, capable of intelligent real-time intrusion detection using unsupervised neural networks. Unsupervised neural nets can improve their analysis of new data over time without retraining. In previous work, we evaluated Adaptive Resonance Theory (ART) and Self-Organizing Map (SOM) neural networks using offline data. In this paper, we present a real-time solution using unsupervised neural nets to detect known and new attacks in network traffic. We evaluated our approach using 27 types of attack, and observed...
Discrete formulation for two-dimensional multigroup neutron diffusion equations
, Article Annals of Nuclear Energy ; Volume 31, Issue 3 , 2004 , Pages 231-253 ; 03064549 (ISSN) ; Salehi, A. A ; Shahriari, M ; Sharif University of Technology
2004
Abstract
The objective of this paper is to introduce a new numerical method for neutronic calculation in a reactor core. This method can produce the final finite form of the neutron diffusion equation by classifying the neutronic variables and using two kinds of cell complexes without starting from the conventional differential form of the neutron diffusion equation. The method with linear interpolation produces the same convergence as the linear continuous finite element method. The quadratic interpolation is proven; the convergence order depends on the shape of the dual cell. The maximum convergence order is achieved by choosing the dual cell based on two Gauss' points. The accuracy of the method...