Loading...
Search for:
zolfaghari--mohammad-reza
0.143 seconds
Total 6333 records
Generation of Endurance Time Functions Compatible with Near-Field Ground Motions
, M.Sc. Thesis Sharif University of Technology ; Esmail Pourestekanchi, Homayoon (Supervisor) ; Mashayekhi, Mohammad Reza (Co-Supervisor)
Abstract
In the last few decades, the severe damages caused by near-field earthquakes have made researchers to investigate and study more of these types of earthquakes. The effect of forward directivity, which causes pulses with strong amplitude and long period in the velocity time history, is the main cause of severe damages of these types of earthquakes. The endurance time method is a dynamic analysis method in which the structure is subjected to increasing excitation functions. The purpose of this research is to investigate the effects of near-field earthquakes on structures and also to determine the accuracy of estimating responses caused by near-field earthquakes by the existing endurance time...
The Study of Nanoparticles on the Droplets Hydrodynamics
, M.Sc. Thesis Sharif University of Technology ; Bastani, Dariush (Supervisor)
Abstract
Liquid-liquid extraction is one of the common chemical processes in the industry which its application is increasing day by day. Taking trend of increase of energy resources, chemical materials and industrial system into account, the necessity use of least energy consumption and material for achieving highest output and purity of products in different industries is attracted researches and industerialists.In this research we have studied the effect of presence of nano particles on both disperses and continuous liquids phases on hydrodynamic of deoplets specially their investigated system in this project was watter, toluene and acetone, and chosen nanoparticles wer carbon nanotubes and TiO2....
Simulation of Deposition of Gas in Fluidized Bed
, M.Sc. Thesis Sharif University of Technology ; Roostaazad, Reza (Supervisor)
Abstract
This project related to gas purification according to difference in the deposition point in the fludized bed.The reason for choosing fluidized bed is increasing erosion on wall of bed & increasing on heat transfer compared to other heat exchangers.Separation process, by cooling the wall causes the self- deposition gas phase shifts to solid phase. Solid formed on the wall, act as an insulating layer and greatly reduces the heat transfer therefore part of vessel not used. To solve this problem, the fluidized bed system is offered because the fluid particles can remove the insulating layer beside improving convection heat transfer coefficient. In this work we studied the quantative of erosion...
3D Human pToopsice Estimation
, M.Sc. Thesis Sharif University of Technology ; Manzuri Shalmani, Mohammad Taghi (Supervisor)
Abstract
The purpose of this project is estimating the two-or three-dimensional human condition using existing data(images or video). Human pose estimation can be used in applications، including the detection of human behavior، animation،human computer interaction، physical therapy and، etc . We use sparse representation method to estimating human pose In this project .Sparse representation methods in recent years has been used in many fields and probably in pose estimation can achieve good results with this method
A misbehavior‐tolerant multipath routing protocol for wireless Ad hoc networks [electronic resource]
, Article International Journal of Research in Wireless Systems (IJRWS) ; Vol. 2, Issue 9, pp. , Sep. 2013 ; Pakravan, Mohammad Reza ; Aref, Mohammad Reza ; Sharif University of Technology
Abstract
Secure routing is a major key to service maintenance in ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. As a result of the resource limitations in such networks nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a novel data redirection method to mitigate the impact of node misbehavior on network...
Design of a Robust Active Controller to Suppress the Undesirable Vibration of Power Transmission Lines by Using the Intermediate Actuators and Optimization of Their Locations
, M.Sc. Thesis Sharif University of Technology ; Moradi, Hamed (Supervisor)
Abstract
Power transmission lines, which are responsible for the distribution and transmission of electrical energy from the power plant to the consumer areas, due to their characteristics such as long length and flexibility with low structural damping, face environmental irritations, especially the galloping phenomenon, causing many damages annually. In this study, it has been attempted to reduce the vibrations of power transmission lines by designing a robust active control and by using intermediate actuators in such a way that the failures of these lines can be prevented. For this purpose, linear modeling of the system and designing the controller using the pole replacement method have been done....
Inferring APIs Correct Usage Rules From Their Source Code
, M.Sc. Thesis Sharif University of Technology ; Kharrazi, Mehdi (Supervisor)
Abstract
Researchers show that one of the critical sources of bugs is API incorrect usage which in some cases can cause serious security vulnerabilities. The lack of knowledge about API correct usage rules is one of the main reasons that APIs are employed incorrectly by programmers, however, nding a correct usage rule for an API is time-consuming and error-prone particularly without having access to API documentation in most cases. Existing approaches to automatically extract correct usage rules, consider the majority usages as the correct rule for an API. Although statistically extracting API correct usage rules can achieve reasonable accuracy, it cannot work correctly in the absence of fair amount...
Analysis and Improvement of Intrusion Detection Methods in Data Network Routers
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
Abstract
High-quality online services demand reliable and fast packet delivery at the network layer. However, clear evidence documents the existence of compromised routers in the ISP and enterprise networks, threatening network availability and reliability. A compromised router can stealthily drop, modify, inject, or delay packets in the forwarding path to launch Denial-of-Service, surveillance, man-in-the-middle attacks, etc. So researches tried to create intrusion detection methods to identify adversarial routers and switches. To this end, data-plane fault localization (FL) aims to identify faulty links and is an effective means of achieving high network availability. FL protocols use...
Topological Defects in Confined Nematics by Planar Anchoring
, M.Sc. Thesis Sharif University of Technology ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Supervisor)
Abstract
Confining nematic liquid crystal between two curved boundary conditions while the nematic molecules have a degenerate planar anchoring leads to complex and beautiful textures of molecular disparagement(defect) in the bulk and on the surfaces. Such the liquid crystal shells are made with double-emulsion techniques in microfluidic devices have provided applications for micro-scale colloidal linkers.In this work, we have numerically minimized the elastic energy in one-constant approximation in present of Fournier’s degenerate surface potential with finite element method. The nematic shell is confined between two spherical surfaces that we have studied the final energies and their related...
Recovery of Gold Electronic scraps(PCB) By Hydrometallurgical process
, M.Sc. Thesis Sharif University of Technology ; Yozbashizadeh, Hossain (Supervisor)
Abstract
Increasing demand for Gold in electronic devices and catalysts, and its high cost, makes it crucial to recover the Gold from waste electronic devices such as Printed Circuit Boards. In this research, recovery of Gold by hydrometallurgical process based on heating the scraps along with a strong oxidizing agent, Potassium Persulphate, which is “eco-friendly” or “green”process is concerned. Recovery of Gold achieved by simple filtration process following by washing with water and nitric acid in order to dissolve impurities such as Al and Sn. The systematical and analytical evaluation method of Taguchi quality engineering has been applied for the leaching to evaluate the optimal experimental...
Solving Symmetric Nonlinear Equations System Using BFGS Trust Region Quadratic Method
, M.Sc. Thesis Sharif University of Technology ; Razvan, Mohammad Reza (Supervisor) ; Peyghami, Mohammad Reza (Supervisor)Effect of the Geometry of Colloidal Particles on Nematic Liquid Crystals
, Ph.D. Dissertation Sharif University of Technology ; Ejtehadi, Mohammad Reza (Supervisor) ; Mozaffari, Mohammad Reza (Co-Advisor)
Abstract
A liquid crystal is a state of matter composed of highly anisotropic building blocks. When liquid crystals are exposed to surfaces with given shapes and anchoring conditions, the orientation of their molecules gets spatially disordered and topological defects may form in the system. The interplay between liquid crystals and the geometry and topology of the colloidal particles has motivated extensive recent studies.In this thesis, we present the numerical modeling results for two faceted colloidal particles in a thermotropic nematic liquid crystal. To obtain the equilibrium nematic field with a finiteelement method, we numerically minimize the free energy of the system that based on the...
Design and Implementation of 2.5 Gbps Circuit Switching Fabric
, M.Sc. Thesis Sharif University of Technology ; Pakravan, Mohammad Reza (Supervisor) ; Movahhedy, Mohammad Reza (Supervisor)
Abstract
Providing high bandwidth network infrastructures for ever increasing need of data transport is of great importance. The underling infrastructure for many communication services such as GSM/3G/4G mobile networks and Internet services is Synchronous Digital Hierarchy (SDH) optical transport systems. SDH are standardized protocols that multiplex multiple lower rate digital bit streams, such as E1 and Ethernet, and transfer them synchronously over optical fiber using lasers or LEDs. In addition to high data transfer rates, flexible network management and protection mechanisms have great importance, hence are part of SDH standards. In order to obtain flexible network architecture and protected...
Preserving Privacy in Smart Grid
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
Abstract
Development of Smart Grid and deployment of smart meters in large scale has raised a lot of concerns regarding customers’ privacy. Consequently, several schemes have been proposed to overcome the above mentioned issue. These schemes mainly rely on data aggregation as a method of protecting users’ privacy from the grid operators. However, the main problem with most of these schemes is the fact that they require a large amount of processing power at the meter side. This, together with the fact that smart meters don’t usually have a powerful processor, can cause the unavailability of smart meter data at the required time for operators of the grid, and at the same time disables smart meters from...
Improvement of Routing Security in Ad Hoc Networks Against Several Attacks
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Supervisor)
Abstract
Secure routing is a major key to service maintenance in wireless ad hoc networks. Ad hoc nature exposes the network to several types of node misbehavior or attacks. Wormhole attack is one of the most severe active attacks to mobile ad hoc networks. Noting the resource limitations in such networks, nodes may have a tendency to behave selfishly. Selfish behavior can have drastic impacts on network performance. We have proposed a Misbehavior-Tolerant Multipath Routing protocol (MTMR) which detects and punishes all types of misbehavior such as selfish behavior, wormhole, sinkhole and grey-hole attacks. The protocol utilizes a proactive approach to enforce cooperation. In addition, it uses a...
Solving Nonlinear Systems of Mixed Iqualities and Inequalities Via Trust Region Quadratic Methods
, M.Sc. Thesis Sharif University of Technology ; Razvan, Mohammad Reza (Supervisor) ; Payghami, Mohammad Reza (Supervisor)Jamming Resilient Algorithms for Rendezvous in Cognitive Radio Networks
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Pakravan, Mohammad Reza (Co-Advisor)
Abstract
Dynamic spectrum access with the aid of cognitive radio (CR) technology is a viable solution to spectrum scarcity. There are many military and emergency applications that require the use of cognitive radio ad-hoc networks (CRAHNs). In these net- works, nodes must first find each other in a wide spectrum and then exchange their desired data. The process of finding each other in a multichannel environment is a challenging task and is usually known as rendezvous. Since rendezvous is the first step in communication, disrupting will disable the nodes from establishing proper communication sessions. That results in a drastic degrade in the performance of the network. Therefore, it is important to...
Numerical Study of Spray Impingement to Solid Wall
, M.Sc. Thesis Sharif University of Technology ; Morad, Mohammad Reza (Supervisor) ; Jahannama, Mohammad Reza (Co-Supervisor)
Abstract
Spray-wall impingement is one of the phenomenon that associated in different subject such as spray cooling, combustion chamber and gas turbine. With the impingement of spray to the wall, liquid film begins to form. Wall film characteristics is still an important subject to study. Due to the various stages of liquid film formation from injection of spray till spray-wall impingement, the investigation of this phenomenon is far more complicated. This paper is meant to provide detailed data on spray-wall impingement and wall film formation physics with the help of computational analysis of OpenFOAM . A Lagrangian-Eulerian method based on discrete phase model (DPM) was employed to model...
Inferring API correct usage rules: A tree-based approach
, Article 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2019, 28 August 2019 through 29 August 2019 ; 2019 , Pages 78-84 ; 9781728143736 (ISBN) ; Salimi, S ; Kharrazi, M ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2019
Abstract
The lack of knowledge about API correct usage rules is one of the main reasons that APIs are employed incorrectly by programmers, which in some cases lead to serious security vulnerabilities. However, finding a correct usage rule for an API is a time-consuming and error-prone task, particularly in the absence of an API documentation. Existing approaches to extract correct usage rules are mostly based on majority API usages, assuming the correct usage is prevalent. Although statistically extracting API correct usage rules achieves reasonable accuracy, it cannot work correctly in the absence of a fair amount of sample usages. We propose inferring API correct usage rules independent of the...
Assessing and Improving Algorithms to Control the Propagation of Light through Scattering Media
, M.Sc. Thesis Sharif University of Technology ; Rahimitabar, Mohammad Reza (Supervisor) ; Nasiriavanaki, Mohammad Reza (Supervisor)
Abstract
Light propagation through turbid media, such as biological tissues, experience scattering due to inhomogeneous distribution of refractive indices of their microscopic structure. Scattering and diffusion of light not only limit many optical imaging techniques, but are also big challenges for telecommunication, spectroscopy, and other optical techniques. Recently many new imaging methods are developed that work in strongly scattering media such as optical coherence tomography, diffusion tomography, and laser speckle velocimetry. In this thesis, we have studied how wavefront shaping techniques can tackle the problem of scattering. By spatially shaping the wavefront of the incident beam, using...