Loading...
Search for: taherinia--davoud
0.113 seconds

    Synthesis of Earth-Abundant Transition-Metal Based Nanocomposites as Bifunctional Electrocatalysts for the Overall Water Splitting

    , M.Sc. Thesis Sharif University of Technology Hajiloeyan Morafeh, Mojtaba (Author) ; Taherinia, Davoud (Supervisor)
    Abstract
    Sustainable and renewable energy sources are of fundamental importance in the development of strategic and sustainable economies. Therefore, in recent decades, water electrolysis has been widely used to produce pure hydrogen and oxygen without emitting carbon materials and is considered as a method for producing electrical energy alongside other renewable sources (such as wind and solar energy). Here, we report the synthesis of CoFe double-layered hydroxides (CoFe-LDHs) and their application as electrocatalysts for water splitting in alkaline environments. CoFe-LDHs were prepared via a new hydrothermal route from the metal-organic framework MIL-88A (MOF). The Co to Fe ratio in LDHs was... 

    Investigation of the interfacial electron transfer kinetics in ferrocene-terminated oligophenyleneimine self-assembled monolayers

    , Article Langmuir ; Volume 36, Issue 42 , 2020 , Pages 12572-12579 Taherinia, D ; Sharif University of Technology
    American Chemical Society  2020
    Abstract
    In this article, the synthesis, characterization, and cyclic voltammetry (CV) measurements are reported for ferrocene-terminated oligophenyleneimine (OPI_Fc) and ferrocene-terminated conjugation-broken oligophenyleneimine (CB-OPI_Fc) self-assembled monolayers (SAMs) in two different electrolytes, namely, 1-ethyl-3-methylimidazolium-bis (trifluoromethyl-sulfonyl) imide (EMITFSI) ionic liquid and tetrabutylammonium hexafluorophosphate (Bu4NPF6) in acetonitrile (0.1 M solution). The SAMs were synthesized on Au surfaces by the sequential imine condensation reactions. CV was used to investigate the kinetics of electron transfer (ET) to the ferrocene, and it was observed that the standard ET rate... 

    Experimental and Simulation Study of Formation Damage Due to Asphaltene Precipitation under CO2 Injection Condition in One of Iranian Carbonate Oil Reservoirs

    , M.Sc. Thesis Sharif University of Technology Bagherzadeh, Hadi (Author) ; Rashtchian, Davoud (Supervisor)
    Abstract
    Asphaltenedeposition is a major problem during natural depletion and EOR processes due to formation damage issues. It is necessary to reveal asphaltene deposition mechanisms and its effective parameters to prepare an acceptable prevention strategy. Therefore, different natural depletion and EOR experiments must performed on core samples. In this research, Effect of CO2 injection on asphaltene deposition phenomena has been surveyed. Two carbonate core samples and one sandstone core sample was used in experiments. The oil used in these experiments was recombinedoilfrom one of Iranian offshore oilfield.In order to estimate permeability reduction during experiment, injection of oil and CO2 was... 

    To Improve the Methods Using to Distinguish Congested Area in Process Plants by CFD

    , M.Sc. Thesis Sharif University of Technology Rahimi, Farshad (Author) ; Rashtchian, Davoud (Supervisor)
    Abstract
    Among probable hazards in chemical industries: vapor cloud explosion (VCE) is one of the worst and most destructive ones. More than half of the major process inci¬dents, according to the statistics, are VCEs. VCE causes the most serious consequences; therefore, it attracts many attentions to itself. Accordingly, plenty of researches have been done for the purpose of protection against VCE effects. All efforts in this field can be categorized in two different main activities; firstly, prescribing safety distances between groups of hazardous equipment and vulnerable areas, secondly, using facilities which reinforce vulnerable areas against explosion blasts. Regardless to which category is... 

    Inherently Safer Synthesis and Optimization of Chemical Processes

    , M.Sc. Thesis Sharif University of Technology Eini, Saeed (Author) ; Rashtchian, Davoud (Supervisor)
    Abstract
    There are different well-established strategies for making a process plant inherently safer. The benefits of applying these strategies on reducing the overall risk inside a plant are obvious. However, some of these changes are rejected many times because they appear to be too costly. But if the effects of applying inherently safer design strategies are investigated not only on the processing costs of a plant but also on the potential accident costs, the decision would in fact be different. In this paper an optimization procedure is proposed which integrates both processing and accident costs for different design schemes. In this procedure, some of the design variables are chosen with regard... 

    Quantitative Rsk Assessment and Accident Frequency Determination Based on Fuzzy Logic with Shazand Oil Refinery Accident Case Study

    , M.Sc. Thesis Sharif University of Technology Javidi, Majid (Author) ; Rashtchian, Davoud (Supervisor)
    Abstract
    Today, Quantitative Risk Assessment (QRA) has become an efficient tool in decision making for safety and process experts. To assess the risk of any accident scenario, it is necessary that the probability of that event be determined in addition to estimating the probable consequences. Event tree and fault tree analysis are known to be the standard tools for calculating the frequency of incident outcomes.
    In this research, a new method based on Markov chin and Fuzzy theory is presented to estimate the occurrence probability of events. A one of important parameter which has sufficient effect on probability of incident frequency, is inspection and maintenance interval. in this research... 

    A Heuristic Framework with Mathematical Modeling for Inherently Safe Design of Chemical Process with Sustainability Assessment of Case Study

    , M.Sc. Thesis Sharif University of Technology Daliri, Reza (Author) ; Rashtchian, Davoud (Supervisor)
    Abstract
    Inherently safer design is the new approach to maximize the overall safety of a process plant. This approach suggests some risk reduction strategies to be implemented in the early stages of design. There are different well-established strategies for making a process plant inherently safer. The benefits of applying these strategies on reducing the overall risk inside a plant are obvious. However, some of these changes are rejected many times because they appear to be too costly. But if the effects of applying inherently safer design strategies are investigated not only on the processing costs of a plant but also on the potential accident costs, the decision would in fact be different. In this... 

    Inducing high exo selectivity in Diels–Alder reaction by dimethylborane substituent: a DFT study

    , Article Scientific Reports ; Volume 12, Issue 1 , 2022 ; 20452322 (ISSN) Taherinia, D ; Fattahi, A ; Sharif University of Technology
    Nature Research  2022
    Abstract
    In this work, the role of Lewis acid–base (LAB) interaction on the stereoselectivity of the Diels–Alder (DA) reaction has been studied by DFT in gas and solution (dichloromethane) phases. The calculations were performed at the B3LYP/6-311G++ (d, p) level. Two different series of DA reactions were investigated: (1)—three mono-substituted cyclopentadienes + dimethyl(vinyl)borane; (2)—five α,β-unsaturated carbonyl compounds + cyclopenta-2,4-dien-1-yldimethylborane. The reacting diene and dienophile pairs were chosen to restrict LAB interaction to the exo reaction pathway. It was found that in some of the examined cases, the favorable LAB interaction is so strong that it can lead to a completely... 

    A Periodic Time Series Application in Housing Price Analysis (Case Study of Tehran)

    , M.Sc. Thesis Sharif University of Technology Shahhosseini, Mehrnoush (Author) ; Souri, Davoud (Supervisor)
    Abstract
    The seasonal fluctuations in economics variables relate to the different behavior of economic agents across different seasons. In past, seasonality has been viewed as a redundant feature that needs to be removed from data before economic analysis. From 1988, modeling seasonality has become the major concern of many economists; moreover, it was seen that many economic analysis and forecasts could be flawed if seasonality is ignored. In the present research, periodic times series approach is used for the first time in modeling the seasonality feature of the housing market. Regarding the importance of the housing sector in economy from micro and macroeconomic points of view, using a more... 

    Using Student’s t Autoregressive (STAR) to Model Financial Variables of Iran

    , M.Sc. Thesis Sharif University of Technology Fekrazad, Amir (Author) ; Souri, Davoud (Supervisor)
    Abstract
    Time series of asset returns display specific regularities such as bell-shaped distribution, leptokurticity and volatility clustering. Economists have made continuous efforts to develop models that explain these patterns and can be used to predict the return and the risk of holding an asset. These efforts can be classified into 3 eras: Bachelier Era (1900-1960) in which the random walk model was developed for speculative prices. Mandelbrot Era (1960-1980) in which the normality assumption was replaced with the Pareto-Levy family of distributions which are flexible enough to justify leptokurticity and infinite variance. And finally, the Dynamic Volatility era in which the focus was on... 

    Validation of CFD Multiple Pool Fires Model with Experimental Study of Multiple Pool Fires

    , M.Sc. Thesis Sharif University of Technology Beygmohammadi, Farzaneh (Author) ; Rashtchian, Davoud (Supervisor)
    Abstract
    Fire is the most likely type of process accident which occurs in industrial plants. Among all different types of fire, pool fire is the most frequent one, so there are extensive researches done about pool fire. One of the research areas that has drawn a lot of attention in recent years, is pool fire modeling. Results obtained from fire modeling are quite applicable in different fields of safety engineering such as Quantitative Risk Assessment (QRA) or fire proofing studies of process equipment. But fire modeling is an inherently complex process. Because there are several aspects involved such as multi-phase flow, turbulent mixing, combustion and different mechanisms of heat transfer. This... 

    A two-step watermarking attack using long-range correlation image restoration

    , Article Security and Communication Networks ; Volume 5, Issue 6 , AUG , 2012 , Pages 625-635 ; 19390122 (ISSN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2012
    Abstract
    This paper presents an efficient scheme for blind watermark attacking using the concept of matching of the long-range data. The main idea of the proposed attack is to add plenty of noise to the watermarked image and then try to restore an unwatermarked copy of the noisy image. The aim is to destroy the watermark information without accessing the parameters used during the watermark embedding process. So, it allows our approach to be completely free from any pre-assumption on the watermarking algorithm or any other parameters that is used during the watermark embedding procedure. Experimental results show the proposed algorithm's superiority over several other traditional watermarking... 

    Blind dewatermarking method based on wavelet transform

    , Article Optical Engineering ; Volume 50, Issue 5 , 2011 ; 00913286 (ISSN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2011
    Abstract
    Along with the improvement of image watermarking techniques, the necessity for effectively and comprehensively evaluating various algorithms becomes imperative. In this paper, we first propose a new categorization that fits for most of the existing watermarking algorithms that work in the wavelet domain. Then an adaptive watermarking attack for evaluating the robustness of watermarking schemes that are based on the proposed categorization is presented. This attack determines the flat regions, edges, and textures of the watermarked image and based on known features of each region the proposed attack tries to destroy the watermark information. This is done by separately manipulating the... 

    EWA: An exemplar-based watermarking attack

    , Article 2011 International Conference on Information Technology and Multimedia: "Ubiquitous ICT for Sustainable and Green Living", ICIM 2011, 14 November 2011 through 16 November 2011 ; Nov , 2011 , Page(s): 1 - 5 ; 9781457709890 (ISBN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2011
    Abstract
    In this paper, we used image inpainting as a means for reconstruction of small damaged portions of a watermarked image so that the hidden watermark is not detectable afterwards. Our new watermarking attack algorithm extends the exemplar-based inpainting method, and then we apply it to intended noisy watermarked images to alter the watermark detection process. Our approach is completely free from any pre-assumption on the watermarking algorithm or any other parameters that is used during the watermark embedding procedure. The average PSNR/SSIM of the watermarked image after applying the proposed attack is more than 35/0.98 and the average NC for extracted watermark is lowers than 0.5, so... 

    A new spread spectrum watermarking method using two levels DCT

    , Article International Journal of Electronic Security and Digital Forensics ; Volume 3, Issue 1 , 2010 , Pages 1-26 ; 1751911X (ISSN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2010
    Abstract
    In this paper, a discrete cosine transform (DCT) based blind watermarking scheme based on spread spectrum communications is proposed. We perform block-based DCT (BDCT) on the host image; then using the DC coefficients of each block, we construct a low-resolution approximation image. We apply BDCT on this approximation image, then watermark is embedded by adding a pseudo random noise sequence into its high frequencies. In detection stage, we extract the approximation image from the watermarked image, then the same pseudo random noise sequence is generated, and its correlation is computed with high frequencies of the watermarked approximation image. In our method, higher robustness is obtained... 

    A new adaptive watermarking attack in wavelet domain

    , Article 2009 International Multimedia, Signal Processing and Communication Technologies, IMPACT 2009, Aligarh, 14 March 2009 through 16 March 2009 ; 2009 , Pages 320-323 ; 9781424436040 (ISBN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    In this paper, we proposed a categorization for most of the existing watermarking algorithms that work in wavelet domain. Then an adaptive watermarking attack for digital images that is based on the proposed categorization is presented. This attack determines the flat regions, edges and textures of the watermarked image and based on known features of each region the proposed attack tries to destroy the watermark information by manipulating the wavelet coefficients of each region separately such that the least visual distortion will be imposed on the attacked image. We have tested the proposed method to attack two recent and robust watermarking methods and the results sound impressive. The... 

    A new watermarking attack based on content-aware image resizing

    , Article 2009 International Multimedia, Signal Processing and Communication Technologies, IMPACT 2009, Aligarh, 14 March 2009 through 16 March 2009 ; 2009 , Pages 177-180 ; 9781424436040 (ISBN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    In this paper, we propose a new method for damaging and destroying robust invisible watermarks using an image resizing technique which is named seam carving. By using this method we are able to resize watermarked images in a content-aware manner so that the synchronization of the embedder and extractor of watermarking system is broken and the watermark detection becomes impossible. In contrast to the available benchmarks like Stirmark, proposed attack does not severely reduce the quality of the watermarked image. Therefore it maintains the commercial value of the watermarked image. We have tested the proposed method to attack 3 recent and robust watermarking methods and the results sound... 

    A robust spread spectrum watermarking method using two levels DCT

    , Article International Journal of Electronic Security and Digital Forensics ; Volume 2, Issue 3 , 2009 , Pages 280-305 ; 1751911X (ISSN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    In this paper, a DCT-based blind watermarking scheme based on spread spectrum communications is proposed. We perform block-based DCT on the host image; then using the DC coefficients of each block, we construct a low-resolution approximation image. We apply block-based DCT on this approximation image, then watermark is embedded by adding a pseudo random noise sequence into its high frequencies. In detection stage, we extract the approximation image from the watermarked image, then the same pseudo random noise sequence is generated, and its correlation is computed with high frequencies of the watermarked approximation image. In our method, higher robustness is obtained because of embedding... 

    A robust image watermarking using two level DCT and wavelet packets denoising

    , Article International Conference on Availability, Reliability and Security, ARES 2009, Fukuoka, Fukuoka Prefecture, 16 March 2009 through 19 March 2009 ; 2009 , Pages 150-157 ; 9780769535647 (ISBN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    In this paper we present a blind low frequency watermarking scheme on gray level images, which is based on DCT transform and spread spectrum communications technique. We compute the DCT of non overlapping 8x8 blocks of the host image, then using the DC coefficients of each block we construct a low-resolution approximation image. We apply block based DCT on this approximation image, then a pseudo random noise sequence is added into its high frequencies. For detection, we extract the approximation image from the watermarked image, then the same pseudo random noise sequence is generated, and its correlation is computed with high frequencies of the watermarked approximation image. In our method,... 

    Investigation of the Effect of Various Electrolyte Additives to Increase the Overpotential of the Hydrogen and Oxygen Evolution Reactions in Lead-Acid Batteries

    , M.Sc. Thesis Sharif University of Technology Mohammadvand, Ali (Author) ; Taherinia, Davood (Supervisor)
    Abstract
    Lead-acid batteries have been used for over 150 years as a reliable means of storing electrical energy. These batteries have a variety of applications due to their high safety, reliable performance, and relatively easy manufacturing process, including in car starters, car lighting and combustion, electric vehicles (especially electric bicycles), and the resulting electrical energy storage. From renewable sources or pulsed power supplies in hybrid electric vehicles. Despite increasing advances in the performance and design of these batteries, there are still problems in this area. One of the most important of these is the electrolysis of water as a side reaction, which leads to the production...