Loading...
Search for: shahriari--d
0.099 seconds

    Modular framework kinematic and fuzzy reward reinforcement learning analysis of a radially symmetric six-legged robot

    , Article Life Science Journal ; Volume 10, Issue SUPPL 8 , 2013 , Pages 120-129 ; 10978135 (ISSN) Shahriari, M ; Osguie, K. G ; Khayyat, A. A. A ; Sharif University of Technology
    2013
    Abstract
    Hexapod robots gives us the ability to study walking robots without facing problems such as stability in many aspects. It has a great deal of flexibility in movement even if a leg becomes malfunctioned. Radially symmetric (hexagonal) hexapods have more flexibility in movement than rectangular leg alignments. Because of symmetry they can move in any direction and time efficiently. Inverse kinematic problem of this kind of hexapods is solved through a modular mobile view considering six degrees of freedom for the trunk. Then typical tripod and wave gaits are analyzed and simulated through the presented formulation. In Reinforcement Learning algorithm for walking it is important how to make... 

    The influence of heat treatment and hot deformation conditions on γ′ precipitate dissolution of Nimonic 115 superalloy

    , Article International Journal of Advanced Manufacturing Technology ; Volume 45, Issue 9-10 , 2009 , Pages 841-850 ; 02683768 (ISSN) Shahriari, D ; Sadeghi, M. H ; Akbarzadeh, A ; Cheraghzadeh, M ; Sharif University of Technology
    2009
    Abstract
    In precipitation hardenable materials, it is desirable to determine the precipitate dissolution temperature for homogenizing the microstructure by controlling the size and distribution of the precipitates. In this research, the influence of various heat treatment and hot deformation conditions on the kinetics of γ ′ dissolution and its morphological evolution in Nimonic 115 was studied. In addition, hot deformation behavior of the material was investigated using hot compression experiments at varying temperature (between 1,050°C and 1,175°C) and strain rates (between 0.01 and 1 s-1) up to a true strain of 0.8. The values obtained for the solvus temperature of γ ′ precipitates by two methods... 

    Topological analysis of multi-phase attacks using expert systems

    , Article Journal of Information Science and Engineering ; Volume 24, Issue 3 , 2008 , Pages 743-767 ; 10162364 (ISSN) Shahriari, H. R ; Ganjisaffar, Y ; Jalili, R ; Habibi, J ; Sharif University of Technology
    2008
    Abstract
    With the increasing number and complexity of network attacks, the demand for automatic vulnerability analysis tools has increased. The prerequisite of making these tools is to have a formal and precise model of network configurations and vulnerabilities. Utilizing this model, network administrators can analyze the effects of vulnerabilities on the network and complex attack scenarios can be detected before happening. In this paper, we present a general logic-based framework for modeling network configurations and topologies. Then, a number of important and wide-spread network vulnerabilities are modeled as general inference rules based on the framework definitions. We implemented the... 

    Direct Discrete Method (DDM) and its application to neutron transport problems

    , Article Scientia Iranica ; Volume 14, Issue 1 , 2007 , Pages 78-85 ; 10263098 (ISSN) Vosoughi, N ; Salehi, A. A ; Shahriari, M ; Heshmatzadeh, M ; Sharif University of Technology
    Sharif University of Technology  2007
    Abstract
    The objective of this paper is to introduce a new direct method for neutronic calculations. This method, called Direct Discrete Method (DDM), is simpler than the Neutron Transport Equation and more compatible with the physical meanings of the problem. The method, based on the physics of the problem, initially-runs through meshing of the desired geometry. Next, the balance equation for each mesh interval is written. Considering the connection between the mesh intervals, the final discrete equation series are directly obtained without the need to first pass through the set-up of the neutron transport differential equation. In this paper, a single and multigroup neutron transport discrete... 

    Using description logics for network vulnerability analysis

    , Article International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, ICN/ICONS/MCL'06, Morne, 23 April 2006 through 29 April 2006 ; Volume 2006 , 2006 ; 0769525520 (ISBN); 9780769525525 (ISBN) Zakeri, R ; Jalili, R ; Abolhassani, H ; Shahriari, H. R ; Sharif University of Technology
    2006
    Abstract
    The distributed nature and complexity of computer networks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to provide a simple, open communication infrastructure in an academic and collaborative environment, causes this protocol lack of built-in mechanisms for authentication, integrity and privacy. Even though in the last few years a more systematic approach to TCP/IP network security problem has been followed, a formal approach to this problem is lacking. In this paper, we propose using Description Logics as a formal model which could be used to analyze TCP/IP networks against attacks.... 

    The application of proportional hazards and frailty models to multistage processes surveillance

    , Article International Journal of Advanced Manufacturing Technology ; Volume 74, Issue 1-4 , September , 2014 , Pages 461-470 ; ISSN: 02683768 Asadzadeh, S ; Aghaie, A ; Shahriari, H ; Niaki, S. T. A ; Sharif University of Technology
    2014
    Abstract
    Monitoring industrial and service processes with the purpose of improving the product reliability has been largely addressed in the literature. The surveillance procedures have been proposed with the concentration on single-stage processes with independent quality characteristics. However, the cascade property in multistage processes entails specific monitoring methods which take into account the dependency structure among quality variables in successive stages of a process. This is referred to as regression-adjustment that justifies the heterogeneity in the study population and thus leads to optimal monitoring of multistage processes. In general, it is not straightforward to adjust a... 

    Design, Implementation and Control of A Hexapod Robot Using Reinforcement Learning Approach

    , M.Sc. Thesis Sharif University of Technology Shahriari, Mohammad Ali (Author) ; Khayyat, Amir Ali Akbar (Supervisor)
    Abstract
    Hexapod Robots give us the ability to study walking robots without facing problems such as stability. It has a great deal of exibility in movement even if some legs become malfunctioned or face some diculties. Control of legged robots compared to other kind of locomotions is di- cult and requires fairly heavy on-line computations to be done in real time. Therefore, a machine-learning solution may be more convenient in such prob- lems. One method of machine-learning which is used for legged robots with outstanding potential is Reinforcement Learning (RL). RL is a promising ap- proach for achieving complex robots control in dynamic environments. RL techniques are interesting subjects in... 

    Improving reliability in multistage processes with autocorrelated observations

    , Article Quality Technology and Quantitative Management ; Volume 12, Issue 2 , 2015 , Pages 143-157 ; 16843703 (ISSN) Asadzadeh, S ; Aghaie, A ; Shahriari, H ; Akhavan Niaki, S. T ; Sharif University of Technology
    2015
    Abstract
    Multistage process surveillance is considered to effectively improve the product reliability in manufacturing or service operations. To this end, the process output is commonly inspected under specific conditions and the values of the reliability-related quality characteristic are measured. However, in some cases, the observations from the process output are autocorrelated. This brings about the situation where the use of existing monitoring schemes is futile. Therefore, a class of survival analysis regression models called the proportional hazards (PH) model has been modified to justify the effect of cascade property in line with the autocorrelation issue. Subsequently, three monitoring... 

    New dictionary learning methods for two-dimensional signals

    , Article 28th European Signal Processing Conference, EUSIPCO 2020, 24 August 2020 through 28 August 2020 ; Volume 2021-January , 2021 , Pages 2021-2025 ; 22195491 (ISSN); 9789082797053 (ISBN) Shahriari Mehr, F ; Parsa, J ; Babaie Zadeh, M ; Jutten, C ; Sharif University of Technology
    European Signal Processing Conference, EUSIPCO  2021
    Abstract
    By growing the size of signals in one-dimensional dictionary learning for sparse representation, memory consumption and complex computations restrict the learning procedure. In applications of sparse representation and dictionary learning in two-dimensional signals (e.g. in image processing), if one opts to convert two-dimensional signals to one-dimensional ones, and use the existing one-dimensional dictionary learning and sparse representation techniques, too huge signals and dictionaries will be encountered. Two-dimensional dictionary learning has been proposed to avoid this problem. In this paper, we propose two algorithms for two-dimensional dictionary learning. According to our... 

    Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks

    , Article First International Conference on Information Security, Practice and Experience, ISPEC 2005, 11 April 2005 through 14 April 2005 ; Volume 3439 , 2005 , Pages 192-203 ; 03029743 (ISSN) Jalili, R ; Imani Mehr, F ; Amini, M ; Shahriari, H. R ; Sharif University of Technology
    Springer Verlag  2005
    Abstract
    Although the prevention of Distributed Denial of Service (DDoS) attacks is not possible, detection of such attacks plays main role in preventing their progress. In the flooding attacks, especially new sophisticated DDoS, the attacker floods the network traffic toward the target computer by sending pseudo-normal packets. Therefore, multi-purpose IDSs do not offer a good performance (and accuracy) in detecting such kinds of attacks. In this paper, a novel method for detection of DDoS attacks has been introduced based on a statistical pre-processor and an unsupervised artificial neural net. In addition, SPUNNID system has been designed based on the proposed method. The statistical... 

    Experimental study and mathematical modeling of partitioning of β-amylase and amyloglucosidase in PEG-salt aqueous two-phase systems

    , Article Journal of Chemical and Engineering Data ; Volume 55, Issue 11 , 2010 , Pages 4968-4975 ; 00219568 (ISSN) Shahriari, S ; Vossoughi, M ; Taghikhani, V ; Safekordi, A. A ; Alemzadeh, I ; Sharif University of Technology
    2010
    Abstract
    In this study, the partitioning of β-amylase in aqueous two-phase systems (ATPS) containing polyethylene glycol (PEG) with a molar mass of 6000 and 10 000 and KH 2PO 4 at T = (301.65 and 304.65) K was experimentally studied. In addition, the partitioning of amyloglucosidase in ATPS containing polyethylene glycol with molar mass of 4000, 6000, and 10 000 in the presence of Na 2SO 4 at T = (301.65 and 305.65) K was investigated. The effects of molar mass of PEG, temperature, mass fractions of salt, and the length of the tie line on partition coefficients of the enzymes were also studied. The experimental results showed that while the partition coefficients of enzymes decrease with increasing... 

    Vulnerability analysis of networks to detect multiphase attacks using the actor-based language Rebeca

    , Article Computers and Electrical Engineering ; Volume 36, Issue 5 , 2010 , Pages 874-885 ; 00457906 (ISSN) Shahriari, H. R ; Makarem, M. S ; Sirjani, M ; Jalili, R ; Movaghar, A ; Sharif University of Technology
    2010
    Abstract
    Increasing use of networks and their complexity make the task of security analysis more and more complicated. Accordingly, automatic verification approaches have received more attention recently. In this paper, we investigate applying of an actor-based language based on reactive objects for analyzing a network environment communicating via Transport Protocol Layer (TCP). The formal foundation of the language and available tools for model checking provide us with formal verification support. Having the model of a typical network including client and server, we show how an attacker may combine simple attacks to construct a complex multiphase attack. We use Rebeca language to model the network... 

    Network vulnerability analysis through vulnerability take-grant model (VTG)

    , Article 7th International Conference on Information and Communications Security, ICICS 2005, Beijing, 10 December 2005 through 13 December 2005 ; Volume 3783 LNCS , 2005 , Pages 256-268 ; 03029743 (ISSN); 3540309349 (ISBN); 9783540309345 (ISBN) Shahriari, H. R ; Sadoddin, R ; Jalili, R ; Zakeri, R ; Omidian, A. R ; Sharif University of Technology
    2005
    Abstract
    Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a fact, exploiting most of vulnerabilities result in access rights alteration. In this paper, we propose a new vulnerability analysis method based on the Take-Grant protection model. We extend the initial Take-Grant model to address the notion of vulnerabilities and introduce the vulnerabilities rewriting rules to specify how the protection state of the system can be changed by exploiting vulnerabilities. Our analysis is based on a bounded polynomial algorithm, which generates the closure of the Take-Grant graph... 

    Plastic injection molding dies using hybrid additively manufactured 420/CX stainless steels: electrochemical considerations

    , Article npj Materials Degradation ; Volume 6, Issue 1 , 2022 ; 23972106 (ISSN) Shahriari, A ; Samei, J ; Sanjari, M ; Jahanbakht, M ; Amirkhiz, B. S ; Mohammadi, M ; Sharif University of Technology
    Nature Publishing Group  2022
    Abstract
    This research focused on the corrosion resistance and microstructure of hybrid additively manufactured (HAM) samples of AISI 420/CX (420/CX SS) stainless steels. Potentiodynamic polarization, electrochemical impedance spectroscopy (EIS), and Mott–Schottky analyses as well as the electrochemical noise (EN) technique were used to evaluate the electrochemical behavior of the as-built and heat-treated HAM parts in NaCl solution. The results showed a more protective passive layer formed on the CX SS side. The distribution of Cr-rich M23C6 carbides in matrix of 420 SS side resulted in a lower corrosion resistance compared to the CX SS side. The noise data analysis confirmed an increase in the... 

    Author Correction: Plastic injection molding dies using hybrid additively manufactured 420/CX stainless steels: electrochemical considerations (npj Materials Degradation, (2022), 6, 1, (70), 10.1038/s41529-022-00280-y)

    , Article npj Materials Degradation ; Volume 6, Issue 1 , 2022 ; 23972106 (ISSN) Shahriari, A ; Samei, J ; Sanjari, M ; Jahanbakht, M ; Amirkhiz, B. S ; Mohammadi, M ; Sharif University of Technology
    Nature Publishing Group  2022

    Numerical Study of Induced-charge Electroosmotic (ICEO)Flow Effects on Mixing Phenomena in a Porous Media, Using Lattice Boltzmann Method

    , M.Sc. Thesis Sharif University of Technology Shahriari Darabad, Zahra (Author) ; Taeibi Rahni, Mohammad (Supervisor) ; Salimi, Mohammad Reza (Co-Supervisor)
    Abstract
    Rapid preparation of a homogeneous mixture is essential for many chemical and biological applications, such as micro-scale biological-chemical agent detection, drug delivery, and DNA hybridization. Some mixing systems have a micro-scale geometry, which results in a very slow mixing process, mainly due to laminar flow in these systems. Mixing in a slow flow is performed only by molecular diffusion. In the absence of any disturbances, increased mixing is not possible simply by diffusion. Accordingly, a suitable and innovative method to improve mixing for such systems is required. Induced charge electro-osmosis is a new field of electro-osmotic flow, which performs better than conventional... 

    Measurement of partition coefficients of β-amylase and amyloglucosidase enzymes in aqueous two-phase systems containing poly(ethylene glycol) and Na2SO4/KH2PO4 at different temperatures

    , Article Fluid Phase Equilibria ; Volume 292, Issue 1-2 , May , 2010 , Pages 80-86 ; 03783812 (ISSN) Shahriari, Sh ; Taghikhani, V ; Vossoughi, M ; Safe kordi, A. A ; Alemzadeh, I ; Pazuki, G. R ; Sharif University of Technology
    2010
    Abstract
    In this research, partitioning of β-amylase and amyloglucosidase was investigated in polymer-salt aqueous two-phase systems containing poly(ethylene glycol) (PEG) with different molecular weights such as 4000, 6000 and 10,000 and Na2SO4 or KH2PO4. The experimental partition coefficients were measured at T = (298.5, 301.5, 303.5, 305.5 and 308) K. The results showed that the concentration of salt in feed had more effect on partition coefficients of β-amylase and amyloglucosidase in aqueous two-phase systems than the concentration of polymer in initial feed. Also, the results indicated that temperature had a small effect on partitioning of β-amylase and amyloglucosidase enzymes. The partition... 

    MicroRNA profiling reveals important functions of miR-125b and let-7a during human retinal pigment epithelial cell differentiation

    , Article Experimental Eye Research ; Volume 190 , 2020 Shahriari, F ; Satarian, L ; Moradi, S ; Sharifi Zarchi, A ; Günther, S ; Kamal, A ; Totonchi, M ; Mowla, S. J ; Braun, T ; Baharvand, H ; Sharif University of Technology
    Academic Press  2020
    Abstract
    Retinal pigment epithelial (RPE) cells are indispensable for eye organogenesis and vision. To realize the therapeutic potential of in vitro-generated RPE cells for cell-replacement therapy of RPE-related retinopathies, molecular mechanisms of RPE specification and maturation need to be investigated. So far, many attempts have been made to decipher the regulatory networks involved in the differentiation of human pluripotent stem cells into RPE cells. Here, we exploited a highly-efficient RPE differentiation protocol to determine global expression patterns of microRNAs (miRNAs) during human embryonic stem cell (hESC) differentiation into RPE using small RNA sequencing. Our results revealed a... 

    Data science and predictive analytics : biomedical and health applications using R

    , Book Dinov, Ivo D
    Springer International Publishing AG  2018

    Synergistic effect of MEHPA on co-extraction of zinc and cadmium with DEHPA

    , Article Minerals Engineering ; Volume 17, Issue 1 , 2004 , Pages 89-92 ; 08926875 (ISSN) Keshavarz Alamdari, E ; Moradkhani, D ; Darvishi, D ; Askari, M ; Behnian, D ; Sharif University of Technology
    2004
    Abstract
    Simultaneous extraction of zinc and cadmium by a mixture of di-2-ethyl hexyl phosphoric acid (DEHPA) and mono-2-ethyl hexyl phosphoric acid (MEHPA), and the synergistic effect of MEHPA on co-extraction of zinc and cadmium with DEHPA have been investigated. It was shown that the extraction of zinc and cadmium by DEHPA and/or MEHPA can be increased by an increase of pH. The results also illustrate that the pH0.5 of zinc, by increase in MEHPA from 0.1 to 8 vol%, did not vary significantly while that of cadmium varies from 0.63 to 2.4. In other words MEHPA prevents selective extraction of zinc from aqueous media containing both zinc and cadmium. Studies on the selective separation parameter...