Loading...
Search for: soltani--hesam
0.098 seconds

    Dynamic modeling and sensitivity analysis of atomic force microscope pushing force in nanoparticle manipulation on a rough substrate [electronic resource]

    , Article Journal of Advanced Science, Engineering and Medicine ; 2013, Vol. 5, pp. 1-10 Babahosseini, H. (Hesam) ; Mahboobi, Seyed Hanif ; Meghdari, Ali ; Sharif University of Technology
    Abstract
    An Atomic Force Microscope (AFM) is a capable tool to manipulate nanoparticles by exerting pushing force on the nanoparticles located on the substrate. In reality, the substrate cannot be considered as a smooth surface particularly at the nanoscale. Hence, the particle may encounter a step on the substrate during a manipulation. In this study, dynamics of the nanoparticle on a stepped substrate and critical pushing force in the manipulation are investigated. There are two possible dynamic modes that may happen in the manipulation on the stepped substrate. In one mode, the nanoparticle may slide on the step edge and then climb up to the step which is a desired mode. Another possible mode is... 

    Classification of vascular function in upper limb using bilateral photoplethysmographic signals

    , Article Physiological Measurement ; Volume 29, Issue 3 , 2008 , Pages 365-374 ; 09673334 (ISSN) Hesam Shariati, N ; Zahedi, E ; Jajai, H. M ; Sharif University of Technology
    2008
    Abstract
    Bilateral PPG signals have been used for comparative study of two groups of healthy (free from any cardiovascular risk factors) and diabetic (as cardiovascular disease risk group) subjects in the age-matched range 40-50 years. The peripheral blood pulsations were recorded simultaneously from right and left index fingers for 90 s. Pulses have been modeled with the ARX440 model in the interval of 300 sample points with 100 sample points overlap between segments. Model parameters of three segments based on the highest fitness (higher than 80%) of modeled segments were retained for each subject. Subsequently, principal component analysis (PCA) was applied to the parameters of retained segments... 

    VoIP users’ Quality of Experience (QoE)Evaluation

    , Ph.D. Dissertation Sharif University of Technology Hesam Mohseni, Abdorreza (Author) ; Jahangir, Amir Hossein (Supervisor)
    Abstract
    Quality of Experience (QoE) indicates the overall quality of one service such as Voice over IP (VoIP) from users' point of view by considering several systems, human, and contextual factors. QoE measurement and prediction are more challenging than Quality of Service (QoS) which is only related to network parameters. There exist various objective and subjective methods for QoE prediction. This research investigates various features affecting QoE by proposing a comprehensive subjective evaluation by employing a large number of users. We show that many unconsidered factors including speaker specifications and signal properties, such as signal-to-noise ratio (SNR), can affect QoE so that the SNR... 

    Toward a comprehensive subjective evaluation of VoIP users’ quality of experience (QoE): a case study on Persian language

    , Article Multimedia Tools and Applications ; Volume 80, Issue 21-23 , 2021 , Pages 31783-31802 ; 13807501 (ISSN) Hesam Mohseni, A ; Jahangir, A. H ; Hosseini, S. M ; Sharif University of Technology
    Springer  2021
    Abstract
    Quality of Experience (QoE) measures the overall quality of a service from users’ point of view by considering several system, human, and contextual factors. There exist various objective and subjective methods for QoE prediction. Although the subjective approach is more expensive and challenging than the objective approach, QoE’s level can be more accurately determined by a subjective test. This paper investigates various features affecting QoE by proposing a comprehensive subjective evaluation. First, we show that many unconsidered factors can significantly affect QoE. We have generated voice samples featuring different values for novel factors related to the speaker, signal, and network.... 

    Prediction of Rolling Element Bearings Degradation Trend Using Limited Data

    , M.Sc. Thesis Sharif University of Technology Tajdini, Jalal (Author) ; Behzad, Mehdi (Supervisor) ; Arghand, Hesam Al-din (Co-Supervisor)
    Abstract
    Condition monitoring of machinery is of significant economic importance to mitigate production losses resulting from downtimes. Unforeseen failure of roller element bearings is the most common issue observed in industrial units. However, detecting and tracking the progression of these failures through machine vibration monitoring and predicting the deterioration of these rotating components are viable solutions. Numerous studies have focused on using laboratory accelerated life test data for fault detection and remaining useful life prediction of these components. While online monitoring of all equipment in the industry may not be feasible, and conditions in the field differ from laboratory... 

    Intelligent Fault Diagnosis using Multiple Sensor Data Fusion for Detecting Misalignment and Unbalance

    , M.Sc. Thesis Sharif University of Technology Yadegari, Mohammad Erfan (Author) ; Behzad, Mehdi (Supervisor) ; Arghand, Hesam Al-Din (Co-Supervisor)
    Abstract
    Intelligent predictive maintenance is recognized as a cornerstone of Industry 4.0, where intelligent software is employed for the early detection of faults and the prevention of unexpected failures. Recent research indicates that the integration of multi-sensor data for fault diagnosis of gearboxes and bearings, using artificial intelligence models, has been successful. However, conventional methods face several challenges. These include an over-reliance on the signal characteristics of a single sensor and the impracticality of applying intelligent learning methods, particularly deep learning, despite their high potential, due to the unavailability of sufficiently large and diverse... 

    Deployment of multi-agent robotic systems in presence of obstacles

    , Article ASME 2010 10th Biennial Conference on Engineering Systems Design and Analysis, ESDA2010, 12 July 2010 through 14 July 2010, Istanbul ; Volume 5 , 2010 , Pages 7-12 ; 9780791849194 (ISBN) Soltani, A ; Sayyaadi, H ; Sharif University of Technology
    2010
    Abstract
    The deployment of multi-agent systems in presence of obstacle deals with autonomous motion of agents toward a specified target by sensing each other and boundaries of obstacles. In this paper, asynchronous, scalable, distributed algorithm is used to deploy agents. Boundaries of obstacles are modeled by virtual agents. Algorithm was implemented by solving continuous n-median problem called generalized Fermat-Weber problem. It is shown that deployment is performed when position of real agents are the geometric median of their Voronoi cells. Simulation results show the validity of the proposed algorithm very well  

    Enforcing access control policies over data stored on untrusted server

    , Article 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, 6 September 2017 through 7 September 2017 ; 2018 , Pages 54-57 ; 9781538665602 (ISBN) Soltani, N ; Jalili, R ; Sharif University of Technology
    2018
    Abstract
    One of the security issues in data outsourcing scenario is the enforcement of data owner's access control policies. This includes some challenges; namely, the number of keys required to access authorized resources, efficient policy updating, write access control enforcement, user and data owner overhead, and preserving confidentiality of data and policies. Most of the existing solutions address only some of the challenges, while they impose high overhead on both the data owner and users. Though, policy management in the Role-Based Access Control (RBAC) model is easier and more efficient due to the existence of role hierarchical structure and role inheritance; most of the existing solutions... 

    Experimental investigation of unsteady wake behind a section of a wind turbine blade

    , Article 25th AIAA Applied Aerodynamics Conference, 2007, Miami, FL, 25 June 2007 through 28 June 2007 ; Volume 2 , 2007 , Pages 870-876 ; 10485953 (ISSN) ; 1563478986 (ISBN); 9781563478987 (ISBN) Soltani, M.R ; Mahmoudi, M ; Sharif University of Technology
    2007
    Abstract
    A series of experiments were carried out to study the unsteady wake phenomenon behind an oscillating airfoil. The airfoil is a section of a wind turbine blade oscillating in pitch about the quarter chord axis at various reduced frequencies, oscillation amplitude and mean angles of attack. Streamwise velocity profiles were obtained by real time and instantaneous measurements at 35 vertically aligned points behind the airfoil via two similar rakes. One of rakes has only static pressure probes and the other is equipped with total pressure ones. An estimation of the variation of linear momentum defect during the oscillation is obtained and has been compared with the corresponding static one. The... 

    Water Quality Modeling of Urban Streams

    , M.Sc. Thesis Sharif University of Technology Soltani, Maryam (Author) ; Tajrishy, Masoud (Supervisor)
    Abstract
    With altering natural state and increasing impervious surfaces, traditional urbanization leads to deteriorating the environment and water catchments. During the years most efforts in order to control the urban runoff outflow, have been focused on quantity; and awareness about improving water quality has been raised just in the last few years and, which emphasizes on pollution source control. Standard water quality sampling methods are time consuming, expensive and because of sampling in broad geographic areas, difficult; however modeling is a more efficient way in assessing water quality and as worries about non-point source pollution grows, different kinds of models have been used to... 

    Structural Health Monitoring of composite Plates with Piezoelectric WaferActive Sensors

    , M.Sc. Thesis Sharif University of Technology Soltani, Zahra (Author) ; Abedian, Ali (Supervisor)
    Abstract
    Cost-effective and reliable damage detection is critical for utilization of composite materials. This research investigates a wavelet-based approach for SHM and detection of through-thickness crack in different lengths and angles in [0/45/-45/90]s CF/EP composite plate utilizing ANSYS finite element method (FEM) software and digital signal processing technique utilizing MATLAB software. To this end, a dual-PZT actuation scheme is applied, aimed at generating the S0 mode at a square composite plate. This study contributes to the damage detection by developing an improved wavelet-based signal processing technique that enhances the visibility and interpretation of the Lamb wave signals related... 

    Compressive Response of Cylindrical Concrete Columns Confined with Steel Spirals and GFRP Composites

    , M.Sc. Thesis Sharif University of Technology Soltani, Hesam (Author) ; Khalu, Alireza (Supervisor)
    Abstract
    Concrete structures require reinforcement and retrofitting because of possible mistakes in design or calculation, inconformity between plan and implementation, change in occupancy or applied loads, and decay. Development in technology, production of materials, and new methods play important roles in development of structure construction and reinforcement methods. Emerge of new materials creates great demand in studying, surveying, and determining design characteristic and criteria for these materials. One of these materials is FRP composite which is used in concrete structure reinforcement in different ways. In this laboratory research, the effect of external wrapping by GFRP composite... 

    Enforcing Access Control Policies over Data Stored on Untrusted Server

    , M.Sc. Thesis Sharif University of Technology Soltani, Naeimeh (Author) ; Jalili, Rasoul (Supervisor)
    Abstract
    Recently many organizations outsource their data to an external server due to easier data maintenance. One of the security issues in data outsourcing scenario is the enforcement of data owner’s access control policies. This includes some challenges; namely, the number of keys needed to access authorized resources, efficient policy updating, write access control enforcement, user and data owner overhead, and preserving confidentiality of data and policies . Most of the existing proposed solutions address only some of these challenges, while they impose high overhead on both the data owner and users. Moreover, most of them address enfrocement of policies in form of access control matrix and... 

    Synthesis, Characterization and Photocatalytic Application of ZnO/g- C3N4 Composite Nanorods Fabricated by Combined Sol Gel-Hydrothermal Methods

    , M.Sc. Thesis Sharif University of Technology Soltani, Mojtaba (Author) ; Moshfegh, Alireza (Supervisor)
    Abstract
    Because of the working conditions of semiconductors at ambient temperature and pressure, degradation of organic pollutants through semiconductors photocatalysis has attracted the interest of many researchers. Because of its large exciton binding energy,high chemical and physical stability,high electron and hole mobility, and low cost; zinc oxide, an n-type semiconductor with 3.2 eV direct band gap, is widely used in applications such as photocatalysts, solar cells, and light-emitting diodes. Among various morphologies of ZnO, 1D nanostructures such as nanowires and nanorods have recieved much attention due to their high surface to volume ratio. However, the application of ZnO as a... 

    A Protocol to Improve Privacy and Security of Anonymity Networks

    , M.Sc. Thesis Sharif University of Technology Soltani, Mahdi (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    In recent two decades, different anonymous communication systems has been proposed. These systems are interested by journalists, bank employees, military forces, and human rights advocates. Tor is one of the most popular anonymous communication systems. Tor uses onion routing for privacy preserving. Re-cently, many attacks has been introduced against the anonymity of Tor users.In these attacks entry and exit nodes are compromised. One of these malicious nodes, makes the attack on the intented flow and the other one recognizes the flow. All these attacks admit their vulnerability against dummy messages. They state that, because of dynamics of onion’s keys, any dummy injection will dis-turb... 

    Design and Simulation (& Manufacturing) of A Micro-Gyroscope

    , M.Sc. Thesis Sharif University of Technology Soltani, Arman (Author) ; Akbari, Javad (Supervisor)
    Abstract
    Nowadays, microgyroscopes are among the most important products of MEMS. The production of small, precise and inexpensive gyroscopes has become possible as the result of recent developments in fabrication technology. In this thesis it is intended to introduce a new method for manufacturing more precise microgyroscopes regarding manufacture facilities. Using this new method, sensitivity and resistance of microgyroscopes are increased against noises which are primarily caused by vibration and rotation about undesirable axes. The rotational movement imposed on the gyro is detected through fluid flow within its torus channel. This transformation facilitates the measurement of the initial motion.... 

    Control Algorithm of Multi-agent Systems in Special Paths With an Applied Consideration in Biomechanical Engineering to Perform Operations of Interior Treatments

    , M.Sc. Thesis Sharif University of Technology Soltani, Ali (Author) ; Sayyadi, Hassan (Supervisor)
    Abstract
    In this project Deployment of multi-agent systems was studied. Maximum coverage over a point or curve or area is desired in deployment of multi-agent systems. A facility location optimization function was derived from geometrical concepts such as voronoi, n- geometric median and fermat-weber problem by optimization of which the deployment of multi-agent systems is performed. First, it is assumed that dynamic of agents is first order and second order .Next, it is assumed that agents are in a fluid. In all situations a suitable control algorithm was derived to optimize the facility location function to perform deployment. Next, another facility location function was derived by optimization... 

    Secure Transmission Strategies in Massive MIMO Systems in Presense of a Jammer

    , M.Sc. Thesis Sharif University of Technology Soltani, Marziyeh (Author) ; Mirmohseni, Mahtab (Supervisor)
    Abstract
    Massive MIMO systems are systems, where the base station has many number of antenna so each user’s channel is orthogonal to one another.These systems have some valuable advantages such as reduction of energy needed for transmission and significant improvement in spectral efficiency, which makes them be suitable for next generation of wireless communication systems. Another advantage of Massive MIMO systems is inherent resistance against passive eavsdroppers due to having a directed power radiation in direction of the desired user. However another physical layer attack threat these systems: attacking in pilot phase then eavsdropping in downlink phase which must taken care of in physical... 

    Dynamic Performance Enhancement of RC Slabs by Steel Fibers vs. Externally Bonded GFRP Sheets under Impact Loading

    , Ph.D. Dissertation Sharif University of Technology Soltani, Hesam (Author) ; Khaloo, Alireza (Supervisor)
    Abstract
    Recently, to improve the dynamic behavior of Reinforced Concrete (RC) slabs under impact load, the methods of externally bonding Glass Fiber Reinforced Polymer (GFRP) sheets to slab and internally reinforcing concrete by steel fibers have been proposed. Nevertheless, it is required to investigate the comparison between these two methods on response of RC slabs under impact loads. In this study, the influence of volume fraction of steel fibers, the number of GFRP sheet layers (one or two) and the arrangement of GFRP sheets (covering the whole or parts of surface), are examined. Performance of fourteen mm concrete slabs including one plain slab, one steel RC slab, three steel RC slabs... 

    Control of a Distributed Multi-agent System of Quadrotors for Transportation of a Shared Load

    , Ph.D. Dissertation Sharif University of Technology Soltani, Ali (Author) ; Sayyadi, Hassan (Supervisor)
    Abstract
    Nowadays, multi-agent robotic systems are implemented to perform various operations such as military mission, search and rescue operations, etc. One of the most interested robotic platforms for multi-agent systems is quadrotor aerial robot. In this paper, a team of quadrotors is prepared to perform a formation flight toward a specified target in order to catch and transport it on a desired path. Therefore, at first, trajectory tracking control of the quadrotor has been studied and two types of controllers have been introduced: Hierarchical controller and Non-hierarchical controller. Coordinate free structure of the hierarchical controller provides distinctive properties and guarantees...