Loading...
Search for: shakeri--hamed
0.125 seconds

    Transportation Problem of Hub Network with Direct Links

    , M.Sc. Thesis Sharif University of Technology Shakeri, Hamed (Author) ; Haji, Rasoul (Supervisor)
    Abstract
    Hub and Spoke networks come into play when considering direct link between all origins and destinations is either impossible or expensive in a transportation system. In this kind of problems, some nodes are chosen as hub from all origin and destination nodes to collect flows and then distribute them. Implementing hub network leads to minimizing transportation cost, sorting flows and conveying them in economies of scale. Otherwise, shipping flows directly may cause decreasing the travelling distance and the delivery time consequently. In this dissertation, combination of hub network and direct shipment is investigated. To obtain the optimal hub locations and direct links between non-hub nodes... 

    Analyzing Cost Engineering Along With Presenting A Model To Reduce Cost Of industrial Products

    , M.Sc. Thesis Sharif University of Technology Shakeri, Ehsan (Author) ; Mostafavi, Mostafa (Supervisor)
    Abstract
    Lack of financial sources for production and performing projects has been an effective issue in all governmental and non-governmental organizations. So, using a structure with capability of detecting and forecasting all expenses and costs, and being able to convert the mass of data into useful and instrumental reports for managerial decision such as estimating total cost, selecting the syntax of production and etc is obvious for recourse management of every organization. Among the various components of the cost engineering system, cost management system by recording and allocating cost is an important issue in efficiency of every cost engineering system.In this thesis, Automotive Industrial... 

    A robust zero-watermarking scheme using Canny edge detector

    , Article International Journal of Electronic Security and Digital Forensics ; Volume 5, Issue 1 , 2013 , Pages 25-44 ; 1751911X (ISSN) Shakeri, M ; Jamzad, M ; Sharif University of Technology
    2013
    Abstract
    By expansion of digital multimedia and networking technology, the problem of ownership protection has become increasingly important. Digital watermarking is an efficient way for copyright protection of digital images. Traditional watermarking techniques degrade the quality of host image by embedding a watermark logo. Facing this problem, a new watermarking approach called zero-watermarking has been proposed. In zero-watermarking methods, the watermark does not require to be embedded into the protected image but it uses both the watermark and the protected image to generate a verification map which is registered to a trusted authority for further protection. In this paper we propose a robust... 

    A robust zero-watermark copyright protection scheme based on DWT and image normalization

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 20 November 2011 through 23 November 2011 ; Volume 7088 LNCS, Issue PART 2 , November , 2011 , Pages 359-370 ; 03029743 (ISSN) ; 9783642253454 (ISBN) Shakeri, M ; Jamzad, M ; Sharif University of Technology
    2011
    Abstract
    Recently, protecting the copyright of digital media has become an imperative issue due to the growing illegal reproduction and modification of digital media. A large number of digital watermarking algorithms have been proposed to protect the integrity and copyright of images. Traditional watermarking schemes protect image copyright by embedding a watermark in the spatial or frequency domain of an image. However, these methods degrade the quality of the original image in some extend. In recent years, a new approach called zero-watermarking algorithms is introduced. In these methods, the watermark does not require to be embedded into the protected image but is used to generate a verification... 

    A robust copyright protection scheme based on discrete cosine transform and image normalization

    , Article 2011 7th Iranian Conference on Machine Vision and Image Processing, MVIP 2011 - Proceedings ; 2011 ; 9781457715358 (ISBN) Shakeri, M ; Jamzad, M ; Sharif University of Technology
    2011
    Abstract
    Watermarking is a way that is used to protect the copyright of images. As the existing watermarking methods are not robust enough a new novel scheme is needed. In this paper, we propose a zero-watermark discrete cosine transformation-based copyright protection scheme, in which a normalization procedure is applied in both watermark embedding and extraction to make our scheme more robust to geometric distortions. This method is resistant to malicious signal processing and geometric attacks such as blurring, JPEG compression, noise adding, sharpening, scaling, rotation and cropping. Experimental results on images with different complexity show that our proposed scheme outperforms related... 

    An efficient feature extraction methodology for blind image steganalysis using contourlet transform and zernike moments

    , Article 2013 10th International ISC Conference on Information Security and Cryptology, ISCISC 2013 ; Aug , 2013 , Page(s): 1 - 6 Shakeri, E ; Ghaemmaghami, S ; Sharif University of Technology
    IEEE Computer Society  2013
    Abstract
    We propose an effective blind image steganalysis based on contourlet transform and Zernike moments that improves the detection accuracy of universal image steganalysis methods. The proposed method examines randomness in the test image to distinguish between the stego and non-stego images. The suspicious image is decomposed by contourlet transform, and then the absolute Zernike moments of contourlet subbands coefficients of the image and linear prediction error of each contourlet subband are extracted as features for steganalysis. These features are fed to a nonlinear SVM classifier with an RBF kernel to distinguish between cover and stego images. Experimental results show that the proposed... 

    Integrated procedure, using differential evolution optimization of rate parameters, for design of small and accurate multistep global chemical mechanisms

    , Article Industrial and Engineering Chemistry Research ; Volume 57, Issue 10 , March , 2018 , Pages 3530-3544 ; 08885885 (ISSN) Shakeri, A ; Mazaheri, K ; Sharif University of Technology
    American Chemical Society  2018
    Abstract
    Three-dimensional analysis of combustion chambers in industrial gas turbines suffers from lack of simple and accurate reduced mechanisms for oxidation of hydrocarbon fuels. Here, an integrated procedure is introduced based on a differential evolution optimization technique. The procedure is flexible and modular and allows optimization of many rate parameters of a multistep global mechanism based on many different combustion criteria and inlet or operational conditions. The procedure uses any selected chemical reactor model and any reference combustion mechanism provided. Sample design criteria used here are flame temperature, ignition delay time, and concentration of selected species,... 

    Chemical kinetics Optimization for a DLE Combustor Optimization Using Numerical Method

    , Ph.D. Dissertation Sharif University of Technology Shakeri, Alireza (Author) ; Mazaheri, Karim (Supervisor)
    Abstract
    Control and reduction of gas turbines pollutants emissions are increasingly of major concern. Here we introduce and apply new algorithms for derivation of accurate and low cost skeletal chemical kinetics, optimization of global multi-step chemical kinetics, and optimization of geometry of Lean Premixed (LPM) dry low emission (DLE) combustors.A new reduction algorithm called SA-GEIE, based on sensitivity analysis of reaction mechanisms respect to ignition delay, flame temperature and pollutants concentration (NO and CO), is introduced. This algorithm is implemented to GRI-3.0 to produce a low cost methane oxidation skeletal mechanism with 118 reactions and 39 specie. The accuracy is assessed... 

    Optimal Assignment of Patients from Emergency Department to Inpatient Hospital Wards

    , M.Sc. Thesis Sharif University of Technology Shakeri, Mahdi (Author) ; Haji, Babak (Supervisor)
    Abstract
    Emergency Department (ED) overcrowding is one the most problems and challenges that every Emergency Department all over the world is facing with. This problem leads to some problems like prolonged waiting times and Length of Stay in Emergency Department. “Boarding time” is one of the most important ones, which is the time a patient spend for being transferred from Emergency Department to one of the Hospital Inpatient Wards. One important solution to this problem is “overflowing”, and it means allocating patients to an alternative ward rather than their primary ward. In practice, the overflowing process usually controlled in a myopic manner. Limited number of researches that focus in this... 

    Improving the Robustness of Image Watermarking for Publicly Copyright-Proving

    , M.Sc. Thesis Sharif University of Technology Shakeri, Mahsa (Author) ; Jamzad, Mansour (Supervisor)
    Abstract
    The advent of Internet and advancement of computer technologies have enabled convenient and fast exchange of multimedia so the illegal reproduction and modification of digital media has become increasingly serious. Hence, how to protect the intellectual property rights of digital multimedia is an imperative issue. Digital watermarking is one of the solutions to prevent unauthorized use of images. Traditional digital watermarking techniques embed a watermark such as logo, trademark, or copyright information into a host image so that it is not perceptible. These techniques, depending on the amount of embedded data, will distort the content of host image which results in quality degradation of... 

    Incorporating Three Echelon Location, Routing and Inventory Decisions in Supply Chain Network Design with Heterogeneous Vehicle

    , M.Sc. Thesis Sharif University of Technology Shakeri, Mohammad Hesam (Author) ; Shadrokh, Shahram (Supervisor)
    Abstract
    A key driver of the overall productivity and profitability of a supply chain is its distribution network which can be used to achieve a variety of the supply chain objectives ranging from low cost to high responsiveness. Designing a distribution network consists of three subproblems: location–allocation problem, vehicle routing problem, and inventory control problem. Because of high dependency among these problems, in the literature there are several papers integrating two of the above problems: location–routing problems, inventory–routing problems, and location–inventory problems.
    The three echelon location routing inventori problem (LRIP) is raised by the design of transportation... 

    Improve Performance of Higher Order Statistics in Spatial and Frequency Domains in Blind Image Steganalysis

    , M.Sc. Thesis Sharif University of Technology Shakeri, Ehsan (Author) ; Ghaemmaghami, Shahrokh (Supervisor)
    Abstract
    Blind image steganalysis is a technique used to, which require no prior information about the steganographic method applied to the stego im- age, determine whether the image contains an embedded message or not. The basic idea of blind steganalysis is to extract some features sensitive to information hiding, and then exploit classifiers for judging whether a given test image contains a secret message.The main focus of this research is to design an choose features sen-sitive to the embedding changes. In fact, we use high order moments in different domains, such as spatial, DCT and multi-resolution do-main, in order to improve the performance of existing steganalyzers.Accordingly, First, we... 

    An efficient tabu search algorithm for the single row facility location problem [electronic resource]

    , Article European Journal Of Operational Research ; Vol. 205, No. 1, pp. 98-105 Samarghandi, H. (Hamed) ; Eshghi, Kourosh ; Sharif University of Technology
    Abstract
    The general goal of the facility layout problem is to arrange a given number of facilities to minimize the total cost associated with the known or projected interactions between them. One of the special classes of the facility layout problem is the Single Row Facility Layout Problem (SRFLP), which consists of finding an optimal linear placement of rectangular facilities with varying dimensions on a straight line. This paper first presents and proves a theorem to find the optimal solution of a special case of SRFLP. The results obtained by this theorem prove to be very useful in reducing the computational efforts when a new algorithm based on tabu search for the SRFLP is proposed in this... 

    Sensitivity analysis of matching pennies game [electronic resource]

    , Article Mathematical and Computer Modelling ; Volume 51, Issues 5–6, March 2010, Pages 722–735 Yarmand, H. (Hamed) ; Eshghi, Kourosh ; Sharif University of Technology
    Abstract
    In this paper, we have discussed the results of sensitivity analysis in a payoff matrix of the Matching Pennies game. After representing the game as a LP model, the sensitivity analysis of the elements of the payoff matrix is presented. The game value and the optimal strategies for different values of parameters are determined and compared  

    Enhancing Scalability in Software-defined Networks

    , M.Sc. Thesis Sharif University of Technology Shakeri, Sara (Author) ; Jahangir, Amir Hossein (Supervisor)
    Abstract
    Software Defined Networking (SDN) is an emerging paradigm which makes the network programmable by separating the control plane from data plane and makes both planes to work independently. There is a centralized controller and a programmable data plane in these networks architecture and forwarding data packets is realized by programming the data plane via an open interface called OpenFlow. OpenFlow is a communication protocol between control and data planes. The centralized architecture of these networks provides a global view of the underlying network to upper applications and brings numerous advantages such as routing, traffic engineering and QoS control. Despite these advantages there are... 

    Using sensitivity analysis and gradual evaluation of ignition delay error to produce accurate low-cost skeletal mechanisms for oxidation of hydrocarbon fuels under high-temperature conditions

    , Article Energy and Fuels ; Volume 31, Issue 10 , 2017 , Pages 11234-11252 ; 08870624 (ISSN) Shakeri, A ; Mazaheri, K ; Owliya, M ; Sharif University of Technology
    2017
    Abstract
    Three-dimensional thermo-hydrodynamic analysis of gas turbine combustion chambers is of great importance in the power generation industry to achieve higher efficiency and reduced emissions. However, it is prohibitive to use a comprehensive full-detailed mechanism in their simulation algorithms because of the huge CPU time and memory space requirements. Many reduction approaches are available in the literature to remedy this problem. Here a new approach is presented to reduce large detailed or skeletal mechanisms of oxidation of hydrocarbon fuels to a low-cost skeletal mechanism. The method involves an integrated procedure including a Sensitivity Analysis (SA) and a procedure of Gradual... 

    Proactive admission control and dynamic resource management in SDN-based virtualized networks

    , Article 8th International Conference on the Network of the Future, NOF 2017, 22 November 2017 through 24 November 2017 ; Volume 2018-January , 2018 , Pages 46-51 ; 9781538605547 (ISBN) Shakeri, S ; Parsaeefard, S ; Derakhshani, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Network virtualization is a promising approach in which common physical resources are shared between service providers. Due to the substrate network limitations such as maximum available memory of each node of the substrate network as well as different service priorities and requirements, resource management in this setup is essential. On the other hand, SDN is bringing a considerable flexibility in resource management by introducing a centralized controller which can monitor all the substrate network states. In this paper, we propose a proactive admission control and dynamic resource management in SDN-based virtualized network in which the number of accepted high-priority virtual network... 

    Clock feed-through analysis in switched-capacitor integrator transmission gates switches

    , Article 2009 6th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, ECTI-CON 2009, Chonburi, 6 May 2009 through 9 May 2009 ; Volume 1 , 2009 , Pages 500-503 ; 9781424433889 (ISBN) Shakeri, M ; Torkzadeh, P ; Shariati Samani, S ; Sharif University of Technology
    2009
    Abstract
    Sigma-Delta modulator ADCs used in signal processing applications are usually implemented by switched-capacitor (SC) circuits and CMOS transmission gates. Clock feed-through effect is one of the main non-ideal parameters existing in SC integrators degrading modulator total SNDR and its linearity. In this paper, a comprehensive analysis of clock feed-through effect on CMOS transmission gates on both rising and falling edges on output node will be presented. The main interferer parameters such as clock signal timing model, input signal level and switch parameters effect on output error will be analyzed. Finally, circuit simulations using 0.18um CMOS technology in ADS environment show the... 

    Nonreciprocal behaviour between photon and phonon in coupled optomechanical systems

    , Article Journal of Modern Optics ; Volume 64, Issue 5 , 2017 , Pages 507-514 ; 09500340 (ISSN) Shakeri, S ; Zandi, M. H ; Bahrampour, A ; Sharif University of Technology
    Taylor and Francis Ltd  2017
    Abstract
    It is shown that the asymmetry coupling between two coupled optomechanical cavities leads to special class of PT-symmetric model for optomechanical structure. Under these conditions, Hamiltonian is considered in blue and red sideband regime. In these cases, the asymmetric coupling between two cavities has been transferred such that the asymmetric beam-splitter or squeezing interaction is generated between optical and mechanical modes. Then, the amount of entanglement between the different optical and mechanical modes is calculated. The results define that PT-symmetry can improve the entanglement in special conditions. The proposed system provides good condition to investigate the... 

    Tunable photon statistics in a non-Hermitian system

    , Article Journal of the Optical Society of America B: Optical Physics ; Volume 34, Issue 3 , 2017 , Pages 566-573 ; 07403224 (ISSN) Shakeri, S ; Zandi, M. H ; Bahrampour, A ; Sharif University of Technology
    OSA - The Optical Society  2017
    Abstract
    In the present study, the antibunching effect is considered in a parity time (PT)-symmetric system, using the recently proposed non-Hermitian model for resonant cavities. The model consists of a cavity coupled to an optomechanical system by a chiral mirror, with both cavities being driven coherently. The nonreciprocal coupling strength between the two cavities leads to the generation of the non-Hermitian but PT-symmetric model. The optimal conditions of strong antibunching are calculated in this system, and then the antibunching effect is considered using the two-photon correlation function and the Wigner function. The results showed that this model presented the best control over the strong...