Loading...
Search for: soltani--narges
0.155 seconds

    Synthesis and Characterization of Vanadium (IV)-SNO & ONO Tridentate Schiff-Base Complexes and Their Applications in Sulfide and Alcohol Oxidation in Ionic Liquid Media

    , M.Sc. Thesis Sharif University of Technology Mousavi, Narges Sadat (Author) ; Bagherzadeh, Mojtaba (Supervisor)
    Abstract
    In recent years, application of transition metal biphasic catalytic systems for different reactions is an area of intense research activity. Among these reactions, oxidation of sulfides to sulfoxides and sulfones due to their importance as an intermediate in synthesis of organic compounds is a center of interest. Also, the catalytic conversion of alcohols to the corresponding aldehydes or ketones is a fundamental transformation in both laboratory and industrial synthetic chemistry. From environmental perspectives, the development of new catalytic oxidation systems with molecular oxygen as green oxidant is particularly attractive. In recent years, ionic liquids have been extensively studied... 

    Agent-based Programming and it's Application Using GOAL

    , M.Sc. Thesis Sharif University of Technology Hosseinian, Narges Sadat (Author) ; Ramezanian, Rasoul (Supervisor)
    Abstract
    With the significant advances in software engineering and developing complicated systems, it’s important to investigate the interaction between systems. Agentoriented software engineering is a new paradigm for developing distributed intelligent systems. Agent technology currently plays an important role in complex software development. The underlying paradigm offers a large repertoire of original concepts, architectures, interaction protocols, and methodologies for the analysis and the specification of complex systems built as Multi-Agent Systems (MAS). Several efforts, originating from academia, industry, and several standardisation consortium, have been made in order to provide new tools,... 

    Auto-selection of space-time Interest Points for Action Recognition
    Application in Fisherposes Method

    , M.Sc. Thesis Sharif University of Technology Ghojogh, Benyamin (Author) ; Mohammadzadeh, Narges Hoda (Supervisor)
    Abstract
    In this project, a novel action recognition method, named Fisherposes, is proposed, which is improved by several space-time (spatio-temporal) methods afterwards. The proposed method utilizes skeleton data obtained from Kinect sensor. First, pre-processing is performed in which the scales of bodies are canceled and the skeletons become aligned in order to make the method robust to location, orientation, and scale of people. In Fisherposes method, every action is defined as a sequence of body poses. Using the training samples for the poses, a Fisher subspace is created which we name it Fisherposes. Moreover, a novel distance measuring function, named regularized Mahalanobis distance, is... 

    Null Controllability and Stabilizability of Compressible Navier-stokes System in One Dimension

    , M.Sc. Thesis Sharif University of Technology Hosseini Khajouei, Narges Sadat (Author) ; Hesaraki, Mahmoud (Supervisor)
    Abstract
    In this thesis we study the exponential stabilization of the one dimensional compressible Navier-Stokes system, in a bounded interval locally around a constant steady state by a localized distributed control acting only in the velocity equation. In fact this is an analysis of a paper that published by Shirshendu Chowdhury, Debayan Maity, Mithily Ramaswamy and Jean-Pierre Raymond in Journal of Differential Equations. We determine a linear feedback law able to stabilize a nonlinear transformed system. Coming back to the original nonlinear system, we obtain a nonlinear feedback law able to stabilize locally this nonlinear system. The result is providing feedback control laws stabilizing... 

    Analysis of People Appearance Variation in Multi-Camera Networks

    , M.Sc. Thesis Sharif University of Technology Moradipour, Mostafa (Author) ; Behroozi, Hamid (Supervisor) ; Mohammadzadeh, Narges Hoda (Co-Supervisor)
    Abstract
    Analysis of people appearance variation in multi-camera networks for person re-identification or person retrieval is a very challenging problem due to the many intra-class variations between different cameras. Like any problem in the field of machine vision, it is generally divided into two parts. The first part is feature extraction and the second part is feature matching for person retrieval. So far, various methods have been proposed for the extraction of discriminative features, which are generally divided into three categories: stripe-based, patch-based, and body-based methods. However, methods based on stripes, although simpler, have performed better due to their greater compatibility... 

    Software Product Line Testing Optimization Based on Regression Test Techniques

    , M.Sc. Thesis Sharif University of Technology Mousavi Khoshdel, Narges Sadat (Author) ; Mirian Hosseinabadi, Hassan (Supervisor)
    Abstract
    A software product line is a set of products with common features. The design of this set is such that the core assets that are common features between products are implemented only once. All products in the product line use the core assets to reduce development costs. The number of products that can be produced in a software product line is exponential to the number of capabilities in the core assets and the set is very large, so the cost of testing the software product line will be very high. In the software product line testing, various methods have been provided to reduce costs, among which we can mention product prioritization and regression test techniques. In prioritization, the... 

    Diverse Video Captioning Using Recurrent Neural Networks and Part of Speech

    , M.Sc. Thesis Sharif University of Technology Arefipour, Amir Hossein (Author) ; Mohammadzadeh, Narges Al Hoda (Supervisor) ; Behroozi, Hamid (Co-Supervisor)
    Abstract
    In recent years, the simultaneous analysis of image and text by artificial intelligence has gained much attention. Video description is one of the topics used to help the blind, automate video content analysis, and more. This issue is usually examined in the context of supervised learning and is very similar to image description and machine translation.The proposed solutions to this problem are mainly in the framework of encoder-decoder and attention-based neural networks. Selection of various pre-trained networks to extract 2D and 3D visual features (description of objects and actions in the image), various hierarchical structures and different teaching methods (based on reinforcement... 

    Modeling of Fischer-Tropsch Synthesis Reactor for GTL Process

    , M.Sc. Thesis Sharif University of Technology Al Taha Motahar, Narges Khatoon (Author) ; Khorasheh, Farhad (Supervisor) ; Taghikhani, Vahid (Supervisor)
    Abstract
    There is a need from the natural gas and energy industries to seek for an economically attractive way of converting remote gas reserves into transportable products, such as high quality fuels or petrochemicals. A possible way for the conversion of natural gas to middle distillates is based on a three-step process. Firstly, production of syngas from natural gas. Secondly,catalytic conversion of syngas into hydrocarbons, mostly parafins from C5 to C100. (Fischer-Tropsch (F-T) synthesis). Thirdly, hydrocracking of the heavy paraffinic hydrocarbons to middle distillates. The F-T synthesis step is highly exothermic. In order to control the temperature within the reactor, when considering high... 

    Design and Simulation (& Manufacturing) of A Micro-Gyroscope

    , M.Sc. Thesis Sharif University of Technology Soltani, Arman (Author) ; Akbari, Javad (Supervisor)
    Abstract
    Nowadays, microgyroscopes are among the most important products of MEMS. The production of small, precise and inexpensive gyroscopes has become possible as the result of recent developments in fabrication technology. In this thesis it is intended to introduce a new method for manufacturing more precise microgyroscopes regarding manufacture facilities. Using this new method, sensitivity and resistance of microgyroscopes are increased against noises which are primarily caused by vibration and rotation about undesirable axes. The rotational movement imposed on the gyro is detected through fluid flow within its torus channel. This transformation facilitates the measurement of the initial motion.... 

    Water Quality Modeling of Urban Streams

    , M.Sc. Thesis Sharif University of Technology Soltani, Maryam (Author) ; Tajrishy, Masoud (Supervisor)
    Abstract
    With altering natural state and increasing impervious surfaces, traditional urbanization leads to deteriorating the environment and water catchments. During the years most efforts in order to control the urban runoff outflow, have been focused on quantity; and awareness about improving water quality has been raised just in the last few years and, which emphasizes on pollution source control. Standard water quality sampling methods are time consuming, expensive and because of sampling in broad geographic areas, difficult; however modeling is a more efficient way in assessing water quality and as worries about non-point source pollution grows, different kinds of models have been used to... 

    Control Algorithm of Multi-agent Systems in Special Paths With an Applied Consideration in Biomechanical Engineering to Perform Operations of Interior Treatments

    , M.Sc. Thesis Sharif University of Technology Soltani, Ali (Author) ; Sayyadi, Hassan (Supervisor)
    Abstract
    In this project Deployment of multi-agent systems was studied. Maximum coverage over a point or curve or area is desired in deployment of multi-agent systems. A facility location optimization function was derived from geometrical concepts such as voronoi, n- geometric median and fermat-weber problem by optimization of which the deployment of multi-agent systems is performed. First, it is assumed that dynamic of agents is first order and second order .Next, it is assumed that agents are in a fluid. In all situations a suitable control algorithm was derived to optimize the facility location function to perform deployment. Next, another facility location function was derived by optimization... 

    Compressive Response of Cylindrical Concrete Columns Confined with Steel Spirals and GFRP Composites

    , M.Sc. Thesis Sharif University of Technology Soltani, Hesam (Author) ; Khalu, Alireza (Supervisor)
    Abstract
    Concrete structures require reinforcement and retrofitting because of possible mistakes in design or calculation, inconformity between plan and implementation, change in occupancy or applied loads, and decay. Development in technology, production of materials, and new methods play important roles in development of structure construction and reinforcement methods. Emerge of new materials creates great demand in studying, surveying, and determining design characteristic and criteria for these materials. One of these materials is FRP composite which is used in concrete structure reinforcement in different ways. In this laboratory research, the effect of external wrapping by GFRP composite... 

    Structural Health Monitoring of composite Plates with Piezoelectric WaferActive Sensors

    , M.Sc. Thesis Sharif University of Technology Soltani, Zahra (Author) ; Abedian, Ali (Supervisor)
    Abstract
    Cost-effective and reliable damage detection is critical for utilization of composite materials. This research investigates a wavelet-based approach for SHM and detection of through-thickness crack in different lengths and angles in [0/45/-45/90]s CF/EP composite plate utilizing ANSYS finite element method (FEM) software and digital signal processing technique utilizing MATLAB software. To this end, a dual-PZT actuation scheme is applied, aimed at generating the S0 mode at a square composite plate. This study contributes to the damage detection by developing an improved wavelet-based signal processing technique that enhances the visibility and interpretation of the Lamb wave signals related... 

    A Protocol to Improve Privacy and Security of Anonymity Networks

    , M.Sc. Thesis Sharif University of Technology Soltani, Mahdi (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    In recent two decades, different anonymous communication systems has been proposed. These systems are interested by journalists, bank employees, military forces, and human rights advocates. Tor is one of the most popular anonymous communication systems. Tor uses onion routing for privacy preserving. Re-cently, many attacks has been introduced against the anonymity of Tor users.In these attacks entry and exit nodes are compromised. One of these malicious nodes, makes the attack on the intented flow and the other one recognizes the flow. All these attacks admit their vulnerability against dummy messages. They state that, because of dynamics of onion’s keys, any dummy injection will dis-turb... 

    Enforcing Access Control Policies over Data Stored on Untrusted Server

    , M.Sc. Thesis Sharif University of Technology Soltani, Naeimeh (Author) ; Jalili, Rasoul (Supervisor)
    Abstract
    Recently many organizations outsource their data to an external server due to easier data maintenance. One of the security issues in data outsourcing scenario is the enforcement of data owner’s access control policies. This includes some challenges; namely, the number of keys needed to access authorized resources, efficient policy updating, write access control enforcement, user and data owner overhead, and preserving confidentiality of data and policies . Most of the existing proposed solutions address only some of these challenges, while they impose high overhead on both the data owner and users. Moreover, most of them address enfrocement of policies in form of access control matrix and... 

    Deployment of multi-agent robotic systems in presence of obstacles

    , Article ASME 2010 10th Biennial Conference on Engineering Systems Design and Analysis, ESDA2010, 12 July 2010 through 14 July 2010, Istanbul ; Volume 5 , 2010 , Pages 7-12 ; 9780791849194 (ISBN) Soltani, A ; Sayyaadi, H ; Sharif University of Technology
    2010
    Abstract
    The deployment of multi-agent systems in presence of obstacle deals with autonomous motion of agents toward a specified target by sensing each other and boundaries of obstacles. In this paper, asynchronous, scalable, distributed algorithm is used to deploy agents. Boundaries of obstacles are modeled by virtual agents. Algorithm was implemented by solving continuous n-median problem called generalized Fermat-Weber problem. It is shown that deployment is performed when position of real agents are the geometric median of their Voronoi cells. Simulation results show the validity of the proposed algorithm very well  

    Synthesis, Characterization and Photocatalytic Application of ZnO/g- C3N4 Composite Nanorods Fabricated by Combined Sol Gel-Hydrothermal Methods

    , M.Sc. Thesis Sharif University of Technology Soltani, Mojtaba (Author) ; Moshfegh, Alireza (Supervisor)
    Abstract
    Because of the working conditions of semiconductors at ambient temperature and pressure, degradation of organic pollutants through semiconductors photocatalysis has attracted the interest of many researchers. Because of its large exciton binding energy,high chemical and physical stability,high electron and hole mobility, and low cost; zinc oxide, an n-type semiconductor with 3.2 eV direct band gap, is widely used in applications such as photocatalysts, solar cells, and light-emitting diodes. Among various morphologies of ZnO, 1D nanostructures such as nanowires and nanorods have recieved much attention due to their high surface to volume ratio. However, the application of ZnO as a... 

    Control of a Distributed Multi-agent System of Quadrotors for Transportation of a Shared Load

    , Ph.D. Dissertation Sharif University of Technology Soltani, Ali (Author) ; Sayyadi, Hassan (Supervisor)
    Abstract
    Nowadays, multi-agent robotic systems are implemented to perform various operations such as military mission, search and rescue operations, etc. One of the most interested robotic platforms for multi-agent systems is quadrotor aerial robot. In this paper, a team of quadrotors is prepared to perform a formation flight toward a specified target in order to catch and transport it on a desired path. Therefore, at first, trajectory tracking control of the quadrotor has been studied and two types of controllers have been introduced: Hierarchical controller and Non-hierarchical controller. Coordinate free structure of the hierarchical controller provides distinctive properties and guarantees... 

    Comparison of Activated Carbon from Cellulose Resources in Separating Oil Pollutants from Contaminated Water (Case Study: Benzene)

    , M.Sc. Thesis Sharif University of Technology Soltani, Samira (Author) ; Borgheie, Mehdi (Supervisor)
    Abstract
    Activated carbon, as an adsorbent with a high adsorption capacity and low cost, has many applications in liquid and gas adsorption processes. Among the adsorption of liquid phase, there are examples of drinking water purification, wastewater treatment, food industry, brewery, chemical separation (acids, amines, glycerin and glycols), enzymes ... and in adsorption from the gas phase there are examples of removing toxic compounds Containing sulfur and recycling sulfur, purifying biogas, use in gas masks, etc. Various materials can be used as raw material to make activated carbon. Materials such as walnut, almonds, coconut, pine, corn, etc. In this thesis, a feasibility study on the production... 

    Enforcing access control policies over data stored on untrusted server

    , Article 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, 6 September 2017 through 7 September 2017 ; 2018 , Pages 54-57 ; 9781538665602 (ISBN) Soltani, N ; Jalili, R ; Sharif University of Technology
    2018
    Abstract
    One of the security issues in data outsourcing scenario is the enforcement of data owner's access control policies. This includes some challenges; namely, the number of keys required to access authorized resources, efficient policy updating, write access control enforcement, user and data owner overhead, and preserving confidentiality of data and policies. Most of the existing solutions address only some of the challenges, while they impose high overhead on both the data owner and users. Though, policy management in the Role-Based Access Control (RBAC) model is easier and more efficient due to the existence of role hierarchical structure and role inheritance; most of the existing solutions...