Loading...
Search for: shams--mohammad-reza
0.218 seconds

    Conformational Substates of Wild Type and Mutant (V68N) Myoglobin-CO

    , M.Sc. Thesis Sharif University of Technology Shams, Hengameh (Author) ; Ejtehadi, Mohammad Reza (Supervisor)
    Abstract
    Folded protein experience several conformational substates. Each substate reperesents a minimum in the free energy surface of the system. Since Myoglobin is the smallest protein that can reversibly bind to gas molecules and, it can be used as prototype for more complex systems.IR pecrtum of CO inside of myolgobin shows that distinct conformational substates can occur. It was shown that Histidine residue inside heme pocket plays an essential rolle in structural properties of substates. In this study, we used molecular dynamice simulation together with umbrella sampling method to obtain free energy profile of MbCO system. The configuration of distal Histidine (His64), CO and Heme is studied... 

    Properties Evaluation of Self-Consolidating Concrete Containing Rice Husk Ash

    , M.Sc. Thesis Sharif University of Technology Nourbakhsh, Ali (Author) ; Jahanshahi, Mohsen (Supervisor) ; Shams, Mohammad Reza (Co-Advisor)
    Abstract
    The Self-Consolidating (Compacting) Concrete (SCC) is a high performance concrete. Due to preventing it from segregation, SCC is known by its need to higher dosage of super plasticizer and viscose modifying agents. This increases the cost and reduces the popularity of SCC in construction industry. In this thesis, the production of Rice Husk Ash (RHA) from a controlled burning process using a special designed furnace, and cement replacement feasibility in the concrete mixture by low cost RHA, as an active pozzulanic additive have been investigated. Finding an appropriate ratio of replacement with cement for RHA and further effects on mechanical properties of SCC have been evaluated. The... 

    Corrosion Resistance of Steel Reinforcement in Concrete Using Cellulose and Carbon Fiber Materials in Persian Gulf Water

    , M.Sc. Thesis Sharif University of Technology Gharaei, Pedram (Author) ; Zabihollah, Abolghasem (Supervisor) ; Shams, Mohammad Reza (Supervisor)
    Abstract
    Corrosion study of the reinforced concrete is one of the most commonly investigation for the construction in civil engineering. The corrosion of embedded steel for the structures in the marine area like the Persian Gulf Sea Water needed considerable attentions. Presence of chlorides and decrease of pH in pores reinforcement depth of concrete is a serious problem. Research the corrosion rate in reinforced concrete system using fibers with a rebar is investigated. Cellulose and Carbon fiber materials are used as inhibitors. The addition of small quantities of these materials into the concrete mixture, will change the concrete permeability and the corrosion resistance rate. Tests demonstrate... 

    Numerical Study of Nonlinear Ship Rolling and Anti-Roll Tank Effect

    , M.Sc. Thesis Sharif University of Technology Shams, Shahab (Author) ; Saif, Mohammad Saeed (Supervisor)
    Abstract
    This thesis investigates nonlinear rolling of ships and effect of anti-rolling tanks. For this purpose numerical method is used. For studying this phenomenon, a program was developed in Simulink module of commercial software, MATLAB and roll motion has been simulated. The program has been developed so it can be used for displacement commercial vessels with a typical hull form and the simulated tank is a U-shape type tank. Simulation is 1-DOF and for rolling in regular waves with different encounter angel except for head sea and following sea. Results are included of roll degree, angular velocity and acceleration of ship and tanks fluid roll, encounter wave moment on ship and moment imposed... 

    A misbehavior‐tolerant multipath routing protocol for wireless Ad hoc networks [electronic resource]

    , Article International Journal of Research in Wireless Systems (IJRWS) ; Vol. 2, Issue 9, pp. , Sep. 2013 Sedghi, H. (Haniyeh) ; Pakravan, Mohammad Reza ; Aref, Mohammad Reza ; Sharif University of Technology
    Abstract
    Secure routing is a major key to service maintenance in ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. As a result of the resource limitations in such networks nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a novel data redirection method to mitigate the impact of node misbehavior on network... 

    Investigation and Simulation of near Wellbore Damage Effect on Reservoir Fluid Flow

    , M.Sc. Thesis Sharif University of Technology Shams, Mosayeb (Author) ; Jamshidi, Saeed (Supervisor) ; Pishvaei, Mahmood Reza (Co-Advisor)
    Abstract
    Many petroleum engineering operations, such as drilling, well completions, and workover, may cause an alteration in the properties of hydrocarbon-bearing formations, including porosity and permeability. Solid and fluid influx into the reservoir in an overbalanced pressure condition can cause permeability reduction from formation damage in the invaded zone. While the solid invasion is limited to a few inches away from the wellbore, the fluids will invade significantly deeper into the formation. Therefore, the invasion of fluids may be considered as the primary mechanism that causes the near-wellbore damage. Correct quantification of the damage is an important component for predicting well... 

    Non-Reciprocity in Transmission Line Resonator with Time Varying Boundary Condition

    , M.Sc. Thesis Sharif University of Technology Shams, Raheleh (Author) ; Mehrany, Khashayar (Supervisor) ; Memarian, Mohammad (Supervisor)
    Abstract
    Structures with time-varying electromagnetic properties can potentially yield non-reciprocity, amplification, harmonic generation, and other interesting wave propagation phenomena. To date, some studies have dealt with time-varying media and circuits, including time-varying optical ring resonators having degenerate travelling wave resonances. In time-varying ring resonators, the clockwise and counter clockwise resonances lose their degeneracy, and non-reciprocity is observed. One of the main challenges of such research is the need to induce time-variations in the entirety of the resonator or structure, which makes their implementation very limited or impossible in practice. The purpose of... 

    Design and Analysis of Breast Cancer Detection System using Ultrasound Imaging and Deep Learning

    , M.Sc. Thesis Sharif University of Technology Shams, Morteza (Author) ; Fakharzadeh, Mohammad (Supervisor) ; Kavehvash, Zahra (Co-Supervisor)
    Abstract
    One of the most important factors that make breast cancer such a dangerous and deadly disease is its hidden. One of the most important methods of revealing this disease is imaging. There are different types of imaging to reveal cancerous tissues (tumors), such as ultrasound, mammography, X-ray, etc. Ultrasound imaging is a cheap, convenient and accessible imaging. The aim of this project is to provide a breast cancer detection system that uses the images taken with this method according to the characteristics of ultrasonic imaging. Regarding cancer diagnosis, doctors identify the tumor with the help of their personal experience, which is based on the characteristics of the tumor image. In... 

    Numerical Modeling of Pile Bearing Capacity and Group Efficiency under Axial Loading

    , M.Sc. Thesis Sharif University of Technology Mahvelati Shams Abadi, Siavash (Author) ; Ahmadi, Mohammad Mehdi (Supervisor)
    Abstract
    Bearing capacity of piles depends on many factors among which geometrical properties of piles, soil type, and strength properties of soil are of great importance. Based on these parameters, several approaches have been developed in order to overcome the uncertainty in the prediction of pile bearing capacity. Studies carried out in this area or research can be divided into two main categories: first, laboratory based approaches, and second, numerically based approaches. The research followed in the present study is based on numerical modeling. In this study, a single pile is initially modeled in the axisymmetric configuration and its bearing capacity is determined. The results of the model... 

    Separation of Plasma from Blood Using a Dielectrophoresis-Assisted Microfluidic Device

    , M.Sc. Thesis Sharif University of Technology Shams, Mehran (Author) ; Mohammadi, Ali Asghar (Supervisor) ; Soltanieh, Mohammad (Supervisor)
    Abstract
    % of human blood makes up of plasma, that this plasma is a rich source of proteins that can be used as biomarkers for a variety of clinical diseases and laboratory research, therefore, it is necessary that the plasma be separate by a high purity percentage. Using a centrifuge It is a common method used to separate plasma from blood, but because it requires large equipment and a large volume of blood, as well as stress caused by centrifugal force, increases the probability of damage to the biomarkers, so it has been tried today that Use methods that are easy to transport and require a small amount of blood. The idea of using the microfluidic device has been put forward for the purpose of... 

    Analysis and Improvement of Intrusion Detection Methods in Data Network Routers

    , M.Sc. Thesis Sharif University of Technology Jamshidi, Mohammad Ali (Author) ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
    Abstract
    High-quality online services demand reliable and fast packet delivery at the network layer. However, clear evidence documents the existence of compromised routers in the ISP and enterprise networks, threatening network availability and reliability. A compromised router can stealthily drop, modify, inject, or delay packets in the forwarding path to launch Denial-of-Service, surveillance, man-in-the-middle attacks, etc. So researches tried to create intrusion detection methods to identify adversarial routers and switches. To this end, data-plane fault localization (FL) aims to identify faulty links and is an effective means of achieving high network availability. FL protocols use... 

    Prediction of Lumbar Muscle Forces Due to Applied Externally Moment and Analaysing Coactivation Between Lumbar Muscles

    , M.Sc. Thesis Sharif University of Technology Khodadad Kani, Hadi (Author) ; Parnianpour, Mohammad (Supervisor) ; Shams Al-Allahi, Mohammad Bagher (Co-Advisor)
    Abstract
    The role of the lumbar muscles in maintaining posture and balancing externally applied loads has been studied for many years.preliminary studies used electromyograpy (EMG) to establish a relationship between trunk posture and muscle ativity.so developing a better undrestanding of the functional role of those muscles. Determination of lumbar muscle forces, will have an important role in reducing low back pain I future.For this reason,reaserchers have done many studies for understanding the resistence and function on the musulosketal system bye using of various protocls and have utilized of various biomechanical models for determining the effects of applied externally loads on lumbar... 

    Topological Defects in Confined Nematics by Planar Anchoring

    , M.Sc. Thesis Sharif University of Technology Seyed Nejad, Reza (Author) ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Supervisor)
    Abstract
    Confining nematic liquid crystal between two curved boundary conditions while the nematic molecules have a degenerate planar anchoring leads to complex and beautiful textures of molecular disparagement(defect) in the bulk and on the surfaces. Such the liquid crystal shells are made with double-emulsion techniques in microfluidic devices have provided applications for micro-scale colloidal linkers.In this work, we have numerically minimized the elastic energy in one-constant approximation in present of Fournier’s degenerate surface potential with finite element method. The nematic shell is confined between two spherical surfaces that we have studied the final energies and their related... 

    Solving Symmetric Nonlinear Equations System Using BFGS Trust Region Quadratic Method

    , M.Sc. Thesis Sharif University of Technology Salimi, Samira (Author) ; Razvan, Mohammad Reza (Supervisor) ; Peyghami, Mohammad Reza (Supervisor)

    Effect of the Geometry of Colloidal Particles on Nematic Liquid Crystals

    , Ph.D. Dissertation Sharif University of Technology Hashemi, Masoumeh (Author) ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Co-Advisor)
    Abstract
    A liquid crystal is a state of matter composed of highly anisotropic building blocks. When liquid crystals are exposed to surfaces with given shapes and anchoring conditions, the orientation of their molecules gets spatially disordered and topological defects may form in the system. The interplay between liquid crystals and the geometry and topology of the colloidal particles has motivated extensive recent studies.In this thesis, we present the numerical modeling results for two faceted colloidal particles in a thermotropic nematic liquid crystal. To obtain the equilibrium nematic field with a finiteelement method, we numerically minimize the free energy of the system that based on the... 

    Design and Implementation of 2.5 Gbps Circuit Switching Fabric

    , M.Sc. Thesis Sharif University of Technology Jahani, Sohrab (Author) ; Pakravan, Mohammad Reza (Supervisor) ; Movahhedy, Mohammad Reza (Supervisor)
    Abstract
    Providing high bandwidth network infrastructures for ever increasing need of data transport is of great importance. The underling infrastructure for many communication services such as GSM/3G/4G mobile networks and Internet services is Synchronous Digital Hierarchy (SDH) optical transport systems. SDH are standardized protocols that multiplex multiple lower rate digital bit streams, such as E1 and Ethernet, and transfer them synchronously over optical fiber using lasers or LEDs. In addition to high data transfer rates, flexible network management and protection mechanisms have great importance, hence are part of SDH standards. In order to obtain flexible network architecture and protected... 

    Preserving Privacy in Smart Grid

    , M.Sc. Thesis Sharif University of Technology Vahedi, Erfaneh (Author) ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
    Abstract
    Development of Smart Grid and deployment of smart meters in large scale has raised a lot of concerns regarding customers’ privacy. Consequently, several schemes have been proposed to overcome the above mentioned issue. These schemes mainly rely on data aggregation as a method of protecting users’ privacy from the grid operators. However, the main problem with most of these schemes is the fact that they require a large amount of processing power at the meter side. This, together with the fact that smart meters don’t usually have a powerful processor, can cause the unavailability of smart meter data at the required time for operators of the grid, and at the same time disables smart meters from... 

    Improvement of Routing Security in Ad Hoc Networks Against Several Attacks

    , M.Sc. Thesis Sharif University of Technology Sedghi, Hanie (Author) ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Supervisor)
    Abstract
    Secure routing is a major key to service maintenance in wireless ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. Wormhole attack is one of the most severe active attacks to mobile ad hoc networks. Noting the resource limitations in such networks, nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a... 

    Solving Nonlinear Systems of Mixed Iqualities and Inequalities Via Trust Region Quadratic Methods

    , M.Sc. Thesis Sharif University of Technology Ghasemi, Shojaeddin (Author) ; Razvan, Mohammad Reza (Supervisor) ; Payghami, Mohammad Reza (Supervisor)

    Jamming Resilient Algorithms for Rendezvous in Cognitive Radio Networks

    , M.Sc. Thesis Sharif University of Technology Rezaei, Roohollah (Author) ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
    Abstract
    Dynamic spectrum access with the aid of cognitive radio (CR) technology is a viable solution to spectrum scarcity. There are many military and emergency applications that require the use of cognitive radio ad-hoc networks (CRAHNs). In these net- works, nodes must first find each other in a wide spectrum and then exchange their desired data. The process of finding each other in a multichannel environment is a challenging task and is usually known as rendezvous. Since rendezvous is the first step in communication, disrupting will disable the nodes from establishing proper communication sessions. That results in a drastic degrade in the performance of the network. Therefore, it is important to...