Loading...
Search for:
shakeri--a
0.134 seconds
Total 13822 records
Generation and compression of dissipative soliton using fiber arrays
, Article Optical Fiber Technology ; Volume 33 , 2017 , Pages 1-6 ; 10685200 (ISSN) ; Niknafs, A ; Rooholamininejad, H ; Bahrampour, A ; Sharif University of Technology
Academic Press Inc
2017
Abstract
Compression of dissipative soliton (DS) and dissipative soliton resonance (DSR) have attracted considerable attention for generation of short pulse lasers. Generation of DS/DSR is investigated numerically in circular fiber array with optical central fiber. Parameter management can generate the DS and DSR in circular fiber array with central optical fiber and in normal or anomalous dispersion. The nonlinear circular fiber arrays can be used as an optical pulse compressor. In this paper, compression of DS and DSR versus the nonlinearity and dispersion parameters in circular fiber array with central fiber, are taken into investigation. © 2016 Elsevier Inc
Nonreciprocal behaviour between photon and phonon in coupled optomechanical systems
, Article Journal of Modern Optics ; Volume 64, Issue 5 , 2017 , Pages 507-514 ; 09500340 (ISSN) ; Zandi, M. H ; Bahrampour, A ; Sharif University of Technology
Taylor and Francis Ltd
2017
Abstract
It is shown that the asymmetry coupling between two coupled optomechanical cavities leads to special class of PT-symmetric model for optomechanical structure. Under these conditions, Hamiltonian is considered in blue and red sideband regime. In these cases, the asymmetric coupling between two cavities has been transferred such that the asymmetric beam-splitter or squeezing interaction is generated between optical and mechanical modes. Then, the amount of entanglement between the different optical and mechanical modes is calculated. The results define that PT-symmetry can improve the entanglement in special conditions. The proposed system provides good condition to investigate the...
Tunable photon statistics in a non-Hermitian system
, Article Journal of the Optical Society of America B: Optical Physics ; Volume 34, Issue 3 , 2017 , Pages 566-573 ; 07403224 (ISSN) ; Zandi, M. H ; Bahrampour, A ; Sharif University of Technology
OSA - The Optical Society
2017
Abstract
In the present study, the antibunching effect is considered in a parity time (PT)-symmetric system, using the recently proposed non-Hermitian model for resonant cavities. The model consists of a cavity coupled to an optomechanical system by a chiral mirror, with both cavities being driven coherently. The nonreciprocal coupling strength between the two cavities leads to the generation of the non-Hermitian but PT-symmetric model. The optimal conditions of strong antibunching are calculated in this system, and then the antibunching effect is considered using the two-photon correlation function and the Wigner function. The results showed that this model presented the best control over the strong...
A parametric study using two design methodologies for pressure jet and swirl injectors
, Article IEEE Aerospace Conference Proceedings ; 2012 ; 1095323X (ISSN) ; 9781457705564 (ISBN) ; Morad, M. R ; Shakeri, A. R ; Sharif University of Technology
2012
Abstract
One of the most important subsystems in the air-breathing engines is the atomizers, which break the fuel into many droplets. It is well known that atomization quality has a significant influence on combustion characteristics such as stability limits, efficiency, and pollutant emission. Both jet and swirl injectors are applicable in gas turbine engines. The latter have been widely used for combustion chambers and the former are usually employed for fuel injection in the afterburner part. Since experimental and numerical study of atomizers could be complex and costly, a design methodology of atomizers based on empirical relations is still very advantageous and effective in reducing...
Transportation Problem of Hub Network with Direct Links
, M.Sc. Thesis Sharif University of Technology ; Haji, Rasoul (Supervisor)
Abstract
Hub and Spoke networks come into play when considering direct link between all origins and destinations is either impossible or expensive in a transportation system. In this kind of problems, some nodes are chosen as hub from all origin and destination nodes to collect flows and then distribute them. Implementing hub network leads to minimizing transportation cost, sorting flows and conveying them in economies of scale. Otherwise, shipping flows directly may cause decreasing the travelling distance and the delivery time consequently. In this dissertation, combination of hub network and direct shipment is investigated. To obtain the optimal hub locations and direct links between non-hub nodes...
Analyzing Cost Engineering Along With Presenting A Model To Reduce Cost Of industrial Products
, M.Sc. Thesis Sharif University of Technology ; Mostafavi, Mostafa (Supervisor)
Abstract
Lack of financial sources for production and performing projects has been an effective issue in all governmental and non-governmental organizations. So, using a structure with capability of detecting and forecasting all expenses and costs, and being able to convert the mass of data into useful and instrumental reports for managerial decision such as estimating total cost, selecting the syntax of production and etc is obvious for recourse management of every organization. Among the various components of the cost engineering system, cost management system by recording and allocating cost is an important issue in efficiency of every cost engineering system.In this thesis, Automotive Industrial...
A robust zero-watermarking scheme using Canny edge detector
, Article International Journal of Electronic Security and Digital Forensics ; Volume 5, Issue 1 , 2013 , Pages 25-44 ; 1751911X (ISSN) ; Jamzad, M ; Sharif University of Technology
2013
Abstract
By expansion of digital multimedia and networking technology, the problem of ownership protection has become increasingly important. Digital watermarking is an efficient way for copyright protection of digital images. Traditional watermarking techniques degrade the quality of host image by embedding a watermark logo. Facing this problem, a new watermarking approach called zero-watermarking has been proposed. In zero-watermarking methods, the watermark does not require to be embedded into the protected image but it uses both the watermark and the protected image to generate a verification map which is registered to a trusted authority for further protection. In this paper we propose a robust...
A robust zero-watermark copyright protection scheme based on DWT and image normalization
, Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 20 November 2011 through 23 November 2011 ; Volume 7088 LNCS, Issue PART 2 , November , 2011 , Pages 359-370 ; 03029743 (ISSN) ; 9783642253454 (ISBN) ; Jamzad, M ; Sharif University of Technology
2011
Abstract
Recently, protecting the copyright of digital media has become an imperative issue due to the growing illegal reproduction and modification of digital media. A large number of digital watermarking algorithms have been proposed to protect the integrity and copyright of images. Traditional watermarking schemes protect image copyright by embedding a watermark in the spatial or frequency domain of an image. However, these methods degrade the quality of the original image in some extend. In recent years, a new approach called zero-watermarking algorithms is introduced. In these methods, the watermark does not require to be embedded into the protected image but is used to generate a verification...
A robust copyright protection scheme based on discrete cosine transform and image normalization
, Article 2011 7th Iranian Conference on Machine Vision and Image Processing, MVIP 2011 - Proceedings ; 2011 ; 9781457715358 (ISBN) ; Jamzad, M ; Sharif University of Technology
2011
Abstract
Watermarking is a way that is used to protect the copyright of images. As the existing watermarking methods are not robust enough a new novel scheme is needed. In this paper, we propose a zero-watermark discrete cosine transformation-based copyright protection scheme, in which a normalization procedure is applied in both watermark embedding and extraction to make our scheme more robust to geometric distortions. This method is resistant to malicious signal processing and geometric attacks such as blurring, JPEG compression, noise adding, sharpening, scaling, rotation and cropping. Experimental results on images with different complexity show that our proposed scheme outperforms related...
An efficient feature extraction methodology for blind image steganalysis using contourlet transform and zernike moments
, Article 2013 10th International ISC Conference on Information Security and Cryptology, ISCISC 2013 ; Aug , 2013 , Page(s): 1 - 6 ; Ghaemmaghami, S ; Sharif University of Technology
IEEE Computer Society
2013
Abstract
We propose an effective blind image steganalysis based on contourlet transform and Zernike moments that improves the detection accuracy of universal image steganalysis methods. The proposed method examines randomness in the test image to distinguish between the stego and non-stego images. The suspicious image is decomposed by contourlet transform, and then the absolute Zernike moments of contourlet subbands coefficients of the image and linear prediction error of each contourlet subband are extracted as features for steganalysis. These features are fed to a nonlinear SVM classifier with an RBF kernel to distinguish between cover and stego images. Experimental results show that the proposed...
Integrated procedure, using differential evolution optimization of rate parameters, for design of small and accurate multistep global chemical mechanisms
, Article Industrial and Engineering Chemistry Research ; Volume 57, Issue 10 , March , 2018 , Pages 3530-3544 ; 08885885 (ISSN) ; Mazaheri, K ; Sharif University of Technology
American Chemical Society
2018
Abstract
Three-dimensional analysis of combustion chambers in industrial gas turbines suffers from lack of simple and accurate reduced mechanisms for oxidation of hydrocarbon fuels. Here, an integrated procedure is introduced based on a differential evolution optimization technique. The procedure is flexible and modular and allows optimization of many rate parameters of a multistep global mechanism based on many different combustion criteria and inlet or operational conditions. The procedure uses any selected chemical reactor model and any reference combustion mechanism provided. Sample design criteria used here are flame temperature, ignition delay time, and concentration of selected species,...
Chemical kinetics Optimization for a DLE Combustor Optimization Using Numerical Method
, Ph.D. Dissertation Sharif University of Technology ; Mazaheri, Karim (Supervisor)
Abstract
Control and reduction of gas turbines pollutants emissions are increasingly of major concern. Here we introduce and apply new algorithms for derivation of accurate and low cost skeletal chemical kinetics, optimization of global multi-step chemical kinetics, and optimization of geometry of Lean Premixed (LPM) dry low emission (DLE) combustors.A new reduction algorithm called SA-GEIE, based on sensitivity analysis of reaction mechanisms respect to ignition delay, flame temperature and pollutants concentration (NO and CO), is introduced. This algorithm is implemented to GRI-3.0 to produce a low cost methane oxidation skeletal mechanism with 118 reactions and 39 specie. The accuracy is assessed...
Optimal Assignment of Patients from Emergency Department to Inpatient Hospital Wards
, M.Sc. Thesis Sharif University of Technology ; Haji, Babak (Supervisor)
Abstract
Emergency Department (ED) overcrowding is one the most problems and challenges that every Emergency Department all over the world is facing with. This problem leads to some problems like prolonged waiting times and Length of Stay in Emergency Department. “Boarding time” is one of the most important ones, which is the time a patient spend for being transferred from Emergency Department to one of the Hospital Inpatient Wards. One important solution to this problem is “overflowing”, and it means allocating patients to an alternative ward rather than their primary ward. In practice, the overflowing process usually controlled in a myopic manner. Limited number of researches that focus in this...
An experimental study on mechanical behavior of a calcite cemented gravelly sand
, Article Geotechnical Testing Journal ; Volume 41, Issue 3 , May , 2018 , Pages 494-507 ; 01496115 (ISSN) ; Haeri, S. M ; Shahrabi, M. M ; Khosravi, A ; Sajadi, A. A ; Sharif University of Technology
ASTM International
2018
Abstract
In the study presented herein, a simple method for laboratory calcite cementation of a reconstituted gravelly sand was presented. This method was used to prepare cemented gravelly sand specimens, which have similar natural characteristics to alluvial deposit of the city of Tehran. The formation and distribution of calcite bonds, as well as the effectiveness of the presented calcite cementation method in increasing interparticle cohesion, as observed in weakly to moderately cemented soil in Tehran, were evaluated by means of chemical analysis, X-ray diffraction technique, and unconfined compressive strength tests. The cementation technique was used to prepare triaxial specimens with calcite...
Enhancing tool support for situational engineering of agile methodologies in eclipse
, Article Studies in Computational Intelligence ; Volume 430 , 2012 , Pages 141-152 ; 1860949X (ISSN) ; 9783642304590 (ISBN) ; Alipour, A ; Ramsin, R ; Lee R ; Sharif University of Technology
2012
Abstract
In recent years, with the growth of software engineering, agile software development methodologies have also grown substantially, replacing plan-driven approaches in many areas. Although prominent agile methodologies are in wide use today, there is no method which is suitable for all situations. It has therefore become essential to apply Situational Method Engineering (SME) approaches to produce agile methodologies that are tailored to fit specific software development situations. Since SME is a complex process, and there is a vast pool of techniques, practices, activities, and processes available for composing agile methodologies, tool support-in the form of Computer Aided Method...
Degrees of freedom in a three-user cognitive interference channel
, Article 2013 Iran Workshop on Communication and Information Theory ; May , 2013 , Page(s): 1 - 6 ; 9781467350235 (ISBN) ; Chaghooshi, A. F ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
2013
Abstract
We study the degrees of freedom of the three-user Gaussian interference channel under the circumstance where one or more transmitters are non-causally cognitive, meaning they are aware of the messages of one or more transmitters in a non-causal manner. Our focus is on the total degrees of freedom of the three-user cognitive interference channel. Our first case is when only one of the transmitters is fully cognitive and knows the messages of the other users. We prove that using interference alignment and interference cancellation, the achievable total degrees of freedom is 11/6 and does not coincide with the calculated total degrees of freedom upper bound which is 2. In the second and third...
Two mode mechanical non-Gaussian squeezed number state in a two-membrane optomechanical system
, Article Optics Communications ; Volume 370 , 2016 , Pages 55-61 ; 00304018 (ISSN) ; Mahmoudi, Z ; Zandi, M. H ; Bahrampour, A. R ; Sharif University of Technology
Elsevier
2016
Abstract
We consider an optomechanical system with two membranes when a bichromatic laser field with red-sideband and blue-sideband frequencies is applied in the single photon strong coupling regime. It is shown that using the mode selecting method and under the Lamb-Dicke approximation, motion of membranes can evolve to single or two mode squeezed number states. By considering the environmental effect, a Wigner function is plotted for understanding the conditions that lead to the generation of non-Gaussian states. The results show that, in this system, initial states of membranes are important to generation of non-Gaussian mechanical squeezed number states. © 2016 Elsevier B.V. All rights reserved
Improving the Robustness of Image Watermarking for Publicly Copyright-Proving
, M.Sc. Thesis Sharif University of Technology ; Jamzad, Mansour (Supervisor)
Abstract
The advent of Internet and advancement of computer technologies have enabled convenient and fast exchange of multimedia so the illegal reproduction and modification of digital media has become increasingly serious. Hence, how to protect the intellectual property rights of digital multimedia is an imperative issue. Digital watermarking is one of the solutions to prevent unauthorized use of images. Traditional digital watermarking techniques embed a watermark such as logo, trademark, or copyright information into a host image so that it is not perceptible. These techniques, depending on the amount of embedded data, will distort the content of host image which results in quality degradation of...
Incorporating Three Echelon Location, Routing and Inventory Decisions in Supply Chain Network Design with Heterogeneous Vehicle
, M.Sc. Thesis Sharif University of Technology ; Shadrokh, Shahram (Supervisor)
Abstract
A key driver of the overall productivity and profitability of a supply chain is its distribution network which can be used to achieve a variety of the supply chain objectives ranging from low cost to high responsiveness. Designing a distribution network consists of three subproblems: location–allocation problem, vehicle routing problem, and inventory control problem. Because of high dependency among these problems, in the literature there are several papers integrating two of the above problems: location–routing problems, inventory–routing problems, and location–inventory problems.
The three echelon location routing inventori problem (LRIP) is raised by the design of transportation...
The three echelon location routing inventori problem (LRIP) is raised by the design of transportation...
Improve Performance of Higher Order Statistics in Spatial and Frequency Domains in Blind Image Steganalysis
, M.Sc. Thesis Sharif University of Technology ; Ghaemmaghami, Shahrokh (Supervisor)
Abstract
Blind image steganalysis is a technique used to, which require no prior information about the steganographic method applied to the stego im- age, determine whether the image contains an embedded message or not. The basic idea of blind steganalysis is to extract some features sensitive to information hiding, and then exploit classifiers for judging whether a given test image contains a secret message.The main focus of this research is to design an choose features sen-sitive to the embedding changes. In fact, we use high order moments in different domains, such as spatial, DCT and multi-resolution do-main, in order to improve the performance of existing steganalyzers.Accordingly, First, we...