Loading...
Search for: baramaki--morteza
0.12 seconds

    Development of Cement Production Model to Reduce and Capture CO2 Emissions

    , M.Sc. Thesis Sharif University of Technology Baramaki, Morteza (Author) ; Avami, Akram (Supervisor)
    Abstract
    Energy consumption and pollutions especially carbon dioxide emissions are two of the main challenges in the cement industry. 5-7 percent of world’s carbon dioxide emissions is due to cement production while 900 kg of carbon dioxide is emitted for the production of a tone of cement. The main source of carbon dioxide emissions in a cement plant is the combustion of fuel to provide heating demands and also converting the ore into clinker. Therefore, any improvement in energy efficiency in a cement plant could reduce carbon dioxide emissions resulting from the combustion. Important ways of energy recovery in a cement plant are using the energy recovered from the exhaust gas in the preheater... 

    Ant colony algorithm for the shortest loop design problem [electronic resource]

    , Article Computers and Industrial Engineering, Elsevier ; Volume 50, Issue 4, August 2006, Pages 358–366 Eshghi, K. (Kourosh) ; Kazemi, Morteza ; Sharif University of Technology
    Abstract
    In this paper, a new algorithm for solving the shortest loop design problem is presented. The shortest loop design problem is to find the shortest loop for an automated guided vehicle covering at least one edge of each department of a block layout. In this paper, first it is shown that this problem can be represented as a graph model. The properties of the presented model enable us to design a meta-heuristic based on ant colony system algorithm for solving the shortest loop design problem. Computational results show the efficiency of our algorithm in compare to the other techniques  

    Love Wave Propagation in a Functionally Graded Magneto-Electro-Elastic Half-Space with Quadratic Variations

    , M.Sc. Thesis Sharif University of Technology Nobahar, Masoud (Author) ; Eskandari, Morteza (Supervisor)
    Abstract
    The propagation behavior of Love wave in functionally graded magneto-electro-elastic half-spaces with a quadratic variation is addressed. The magneto-electromechanical coupling factor, the dispersion relations, electric potential, magnetic potential and displacement are obtained analytically for both magneto-electrically open and short conditions. The effect of gradient coefficient on phase velocity, group velocity and magneto-electromechanical coupling factor are plotted and discussed. Research on the wave propagation in magneto-electro-elastic materials is still very limited. This work provides us with a theoretical foundation to design and practically apply SAW devices with high... 

    Modeling Reaction and Distribution of Water in Nanopores of the Cathode Catalyst Layer of PEM Fuel Cell

    , M.Sc. Thesis Sharif University of Technology Nushak, Fatemeh (Author) ; baghalha, morteza (Supervisor)
    Abstract
    In the proton exchange membrane fuel cells (PEM, the produced water would be divided into two phases of vapor and liquid. distribution of both liquid and vapor phases in different cell layers affects the performance, the efficiency and the life of a fuel cell significantly. Moreover, Nano pores of the cathode catalyst layer are involved with some phenomena such as electrochemical reaction kinetics, heat and mass transfer and interface phase change. One of the most important problems in the performance of fuel cells is distribution of liquid water in the porous areas. Water flooding in fuel cells causes to delay in oxygen transport to active sites in the catalyst layer because the pores of... 

    Elastic Analysis of a Surface Stiffened Transversely Isotropic Half-space Under a Buried Horizontal Point Load

    , M.Sc. Thesis Sharif University of Technology Naghib, Hamed (Author) ; Eskandari, Morteza (Supervisor)
    Abstract
    In this study, the interaction between thin plate completely bonded to the transversely isotropic halfspace and a concentrated force applied horizontally (Mindlin-type force) are considered. This problem has been solved analytically. This problem is used as sample for thin solid films and surface coating technology, where the surface of solid is covered by thethin plate for increasing its stiffness. Moreover, this problem is a good sample when homogenous solid is subjected to contact loading and can be seen that mechanical properties of material which is near the solid surface varies; consequently, a two-phase solid is created.Because of the influence of noted inhomogeneity, solid is... 

    Modeling and Simulation of the Catalyst Regeneration Process of FCC Unit of Abadan Refinery

    , M.Sc. Thesis Sharif University of Technology Loni, Zahra (Author) ; Baghalha, Morteza (Supervisor)
    Abstract
    Hydrodynamics plays a crucial role in defining the performance of fluidized beds. The numerical simulation of fluidized bed is very important in the prediction of its behaviour. From this point of view, in the present study a dynamic two dimensioanl model is developed for the modeling of regenerator system of a UOP fluid catalytic cracking (FCC) unit of Abadan refinery with a high-efficiency regenerator. Of the various modeling and simulation techniques, computational fluid dynamics (CFD) is employed in this thesis. Effects of gas velocity, the transient local solid volume fraction, pressure drop for gas and solid phase, solid holdup distribution and solid circulation pattern have been... 

    Database Schema Extraction Prevention Through DBMS Error Handling

    , M.Sc. Thesis Sharif University of Technology Naghdi, Sepideh (Author) ; Amini, Morteza (Supervisor)
    Abstract
    Nowadays large volume of sensitive data of organizations are stored in the databases. Thus, databases are attractive to the attackers to execute different types of attacks with different purposes. The useful information that attackers try to achieve in the preliminary steps of the attacks against the databases, is the database structure or schema. One of the popular approach to extract the schema of a database is to analyze the returned error messages from its DBMS. Hence, a solution to prevent schema disclosure via the error messages is customizing and modifying them. To achieve this goal, in this thesis, we propose a framework to handle and customize the error messages automatically and... 

    Privacy Preserving Access Control for Service Composition in Cloud Computing

    , M.Sc. Thesis Sharif University of Technology Osanloo, Farnaz (Author) ; Amini, Morteza (Supervisor)
    Abstract
    Cloud computing is a new computing environment where computing infrastructure, platform and software are provided as a service. Rapid growth of cloud environments has increased the importance of security requirements and challenges for both service providers and users in cloud. Two main security issues in software as a service (SaaS) delivery model are access control and privacy preserving in basic web services and also in composite services obtaining through the automatic composition and inference of policies from the ones specified for basic services. In this thesis, we present a privacy preserving access control model and framework for service composition in SaaS delivery model of cloud... 

    An Access Control System for Time Series Data in NoSQL Databases

    , M.Sc. Thesis Sharif University of Technology Noury, Amir (Author) ; Amini, Morteza (Supervisor)
    Abstract
    An important class of applications which have been rapidly growing recently is the one that create and use time series data. These types of data sets are ordered based on the timestamps associated to their data items. In practice, traditional relational databases are unable to satisfy the requirements of these data sets; however, NoSQL databases with column-wide data structure are appropriate infrastructure for them. These databases are very efficient in read and write operations (especially for time series data, which are ordered) and are able to store unstructured data. Time series data may contain valuable and sensitive information; hence, they should be protected from the information... 

    Numerical Simulation of a Telescopic Metallic Yielding Damper

    , M.Sc. Thesis Sharif University of Technology Davoodi, Vahid (Author) ; Eskandari, Morteza (Supervisor)
    Abstract
    In this study, a new type of metallic yielding damper called Telescopic damper is proposed and analyzed numerically. The damper comprises of three concentric steel tubes connected together by lead shear keys. The relative axial deformation of steel tubes under axial forces results in shear deformation and yielding in lead shear keys and dissipates energy. The inner steel tube has a lock which limits its movement to some certain extent and beyond this limit the outer tube activates. Therefore, a multi-linear force-deformation behavior with two different yield plateaus is expected for the introduced telescopic damper. The multi-level yield plateaus of damper makes it effective in both low and... 

    Information-flow Analysis in Android Apps for Protecting User Privacy

    , M.Sc. Thesis Sharif University of Technology Barkhordari, Alireza (Author) ; Amini, Morteza (Supervisor)
    Abstract
    The rapid growth of Android operating system alongside its open-source nature has made it as the most popular operating system of mobile devices. On the other hand, regarding the increasing computational power of mobile devices, a wide variety of applications are coming to this type of devices. Meanwhile unfortunately many malicious softwares trying to keep up with other applications, are targeting this popular operating system. Therefore with regard to the fact that this type of devices usually store private and sensitive information of their users, security of mobile operating systems is considered very important. Having this matter in mind, the goal of this research work has been... 

    Secure- multiparty Computation Protocol for Privacy Preserving Data Mining

    , M.Sc. Thesis Sharif University of Technology Maftouni, Mahya (Author) ; Amini, Morteza (Supervisor)
    Abstract
    Privacy preserving data mining helps organizations and companies not only to deal with privacy concerns of customers and regular limitations, but also to benefit from collaborative data mining. Utilizing cryptographic techniques and secure multiparty computation (SMC) are among widely employed approaches for preserving privacy in distributed data mining. The general purpose of secure multiparty computation protocols to compute specific functions on private inputs of parties in a collaborative manner and without revealing their private inputs. Providing rigorous security proof of secure multiparty computation makes it a good choice for privacy preservation, despite of its cryptographic... 

    Analysis of Slabs Stiffened by Cables and Pedestals

    , M.Sc. Thesis Sharif University of Technology Mokhberi, Arsalan (Author) ; Eskandari, Morteza (Supervisor)
    Abstract
    In this study, a new concrete slab stiffened by concrete pedestals and steel cables is introduced. The slab system is studied by employing both analytical and numerical methods. The steel cables are connected to the edges of slab and the concrete pedestals mounted at the bottom face of slab act as the middle supports of cables. The tension force in the cable and its inclination results in upward forces acting at the bottom face of slab. With the aims of classical theory of thin plates and the superposition technique, the problem of a simply supported rectangular slab stiffened by cables is studied analytically. The obtained results are verified by a numerical modelling implemented in SAP2000... 

    Parametric Study of Telescopic Metallic Yielding Dampers

    , M.Sc. Thesis Sharif University of Technology Misaghi, Mohammad (Author) ; Eskandari, Morteza (Supervisor)
    Abstract
    The parametric study of a new introduced metallic yielding damper called telescopic damper is addressed. The telescopic damper comprises of three concentric steel pipes connected together by lead shear keys. The inner and outer steel pipes are subjected to axial loading which results in the shear yielding of the embedded lead cylinders. The inner steel pipe has a lock which limits its movement to some certain extent and beyond this limit the outer tube activates. Employing ABAQUS software, the behavior of damper under cyclic loading is studied numerically. The finite element model is verified by available results in the literature. The effects of inner and outer steel pipes thickness,... 

    Static and Dynamic Analysis of Nano Beams based on Second Strain Gradient Theory

    , M.Sc. Thesis Sharif University of Technology Kamali, Farhad (Author) ; Eskandari, Morteza (Supervisor)
    Abstract
    In this thesis, static and dynamic analysis of nano beams based on second strain gradient theory is presented. Due to their small sizes, nano electro mechanical devices (NEMS) hold tremendous promise for novel, versatile and very sensitive devices for different applications ranging from actuators, transducers and also mass, force, light and frequency detectors. Therefore accurate modeling and analysis of such devices has an important role in their design and performance improvement. Neglecting the size effect, traditional theory of elasticity can not be suitable to predict mechanical behavior of these systems and so, it should be used non-classical theories which include size dependency... 

    The Response of Transversely Isotropic Half-Space Stiened by a Surface Thick Plate

    , M.Sc. Thesis Sharif University of Technology Kaveh, Mohammad (Author) ; Eskandari, Morteza (Supervisor)
    Abstract
    In this study the axisymmetric and asymmetric problem of interaction between a transversely isotropic half-space and various rst order shear deformation plate theories including Mindlin, Reissner and Vasil'ev are addressed. In order to improve the accuracy of solution, the surface boundary conditions of the half-space are modied.Moreover, the results compared with the exact solution and the most appropriate result is identied. The displacement Green's functions are obtained for both cases, modied and unmodied boundary conditions which can be expressed in a closed form and a numerically evaluated part. The latter is calculated exploiting Built-in numerical interrelation function of... 

    Detection of Confidentiality Violation by Short Term Advanced Persistent Threats based on Data Stream Correlation

    , M.Sc. Thesis Sharif University of Technology Javadi, Heydar (Author) ; Amini, Morteza (Supervisor)
    Abstract
    Advanced Persistent Threats (APTs) by multi step , low-level and sometimes slowmoving behaviors try to hiding malicious behaviors. These attacks are complex, costly and the attacker violates the security policy explicitly or implicitly by distributing his or her behavior to multi agents and infiltrate trusted subjects. One of the challenges is the discovery of these attacks in the early stages of the attack and before the complete violation of confidentiality. the lack of deep intercepting of events, content with intrusion detection systems warnings, the lack of simultaneous tracking of host and network-level events and the lack of real-time processing is limitations of existing detection... 

    Geometrical Structure of Neuron Morphology

    , Ph.D. Dissertation Sharif University of Technology Farhoodi, Roozbeh (Author) ; Fotouhi, Morteza (Supervisor)
    Abstract
    The tree structure of neuron morphologies has excited neuroscientists since their discovery in the 19-th century. Many theories assign computational meaning to morphologies, but it is still hard to generate realistic looking morphologies. There are a few growth models for generating neuron morphologies that correctly reproduce some features (e.g. branching angles) of morphologies, but they tend to fall short on other features. Here we present an approach that builds a generative model by extracting a set of human-chosen features from a database of neurons by using the naïve Bayes approach. Then by starting from a neuron with a soma we use statistical sampling techniques to generate... 

    User Privacy in Enterprise Mobile Management

    , M.Sc. Thesis Sharif University of Technology Parsafar, Hoda (Author) ; Amini, Morteza (Supervisor)
    Abstract
    The expansion of technology and the increasing use of mobile devices and smartphones have aected various aspects of personal and social life. These include the use of personal mobile devices in enterprise environments called BYODs have a number of positive and negative eects. On the one hand, it would be more cost-eective for an organization or business environment for users to use their own devices, but on the other hand, it poses numerous security and information challenges that are important to manage. These include disrupting the user’s privacy or disseminating organization information to personal devices and thus violating the organization’s security policies. In this study, a model is... 

    Elastic Analysis of a Functionally Graded Solid with Quadratic Variation under Various Types of Loading

    , M.Sc. Thesis Sharif University of Technology Ahmadi, Mahsa (Author) ; Eskandari, Morteza (Supervisor)
    Abstract
    In this study, elastic analysis of a functionally graded full-space with quadratic variations under various types of loading is addressed. The elastic responses of the medium are obtained in closed-form under various types of loading including point load, concentrated moment, distributed patch load of rectangular and circular shape, normal ring load, and concentrated torsion. The displacement fields are derived by virtue of the appropriate Green’s functions corresponding to the FGMs with a quadratic variation of elastic moduli and constant poisons ratio of = 0.25 .For the special case of homogeneous medium, the results are verified with available solutions. Furthermore, effects of degree of...