Loading...
Search for: normal-behavior
0.008 seconds

    On pull-in instabilities of microcantilevers

    , Article International Journal of Engineering Science ; Volume 87 , February , 2015 , Pages 23-31 ; 00207225 (ISSN) Rahaeifard, M ; Ahmadian, M. T ; Sharif University of Technology
    Elsevier Ltd  2015
    Abstract
    In this paper the static deflection and pull-in instability of electrostatically actuated microcantilevers is investigated based on the strain gradient theory. The equation of motion and boundary conditions are derived using Hamilton's principle and solved numerically. It is shown that the strain gradient theory predicts size dependent normalized static deflection and pull-in voltage for the microbeam while according to the classical theory the normalized behavior of the microbeam is independent of its size. The results of strain gradient theory are compared with those of classical and modified couple stress theories and also experimental observations. According to this comparison, the... 

    Intrusion detection in computer networks using tabu search based Fuzzy system

    , Article 2008 7th IEEE International Conference on Cybernetic Intelligent Systems, CIS 2008, London, 9 September 2008 through 10 September 2008 ; March , 2008 ; 9781424429141 (ISBN) Mohamadi, H ; Habibi, J ; Saadi, H ; Sharif University of Technology
    2008
    Abstract
    The process of scanning the events occurring in a computer system or network and analyzing them for warning of intrusions is known as intrusion detection system (IDS). This paper presents a new intrusion detection system based on tabu search based fuzzy system. Here, we use tabu search algorithm to effectively explore and exploit the large state space associated with intrusion detection as a complicated classification problem. Experiments were performed on KDD-Cup99 data set which has information about intrusive and normal behaviors on computer networks. Results show that the proposed method obtains notable accuracy and lower cost in comparison with several renowned algorithms  

    Calculation, measurement and sensitivity analysis of kinetic parameters of tehran research reactor

    , Article Annals of Nuclear Energy ; Volume 37, Issue 4 , April , 2010 , Pages 463-470 ; 03064549 (ISSN) Hosseini, S. A ; Vosoughi, N ; Ghofrani, M. B ; Gharib, M ; Sharif University of Technology
    2010
    Abstract
    Effective delayed neutron fraction βeff and neutron generation time Λ are important factors in reactor physics calculation and transient analysis. In the first stage of this research, these kinetic parameters have been calculated for two states of Tehran Research Reactor (TRR), i.e. cold (fuel, clad and coolant temperatures equal to 20 °C) and hot (fuel, clad and coolant temperatures of 65, 49 and 44 °C, respectively) states using MTR_PC code. In the second stage, these parameters have been measured with an experimental method based on Inhour equation. For the cold state, calculated βeff and Λ by MTR_PC code are 0.008315 and 30.190 μs, respectively. In the hot state, these parameters being... 

    Sensitivity analysis of kinetics parameters of Tehran Research Reactor (TRR)

    , Article 17th International Conference on Nuclear Engineering, 12 July 2009 through 16 July 2009 ; Volume 5 , 2009 , Pages 419-423 ; 9780791843550 (ISBN) Hosseini, S. A ; Vosoughi, N ; Nuclear Engineering Division, ASME; The Japan Society of Mechanical Engineers, JSME; The Chinese Nuclear Society, CNS ; Sharif University of Technology
    Abstract
    In this research, effective delayed neutron fraction (βeff) and neutron generation time (A) of the Tehran Research Reactor (TRR) are calculated for different uranium enrichments from 14.84 w/o to 96.56 w/o U 235 in two states of the TRR, (cold fuel, clad and coolant temperature of 20°C; and hot fuel, clad and coolant temperature of 65, 49 and 44°C, respectively) using the MTR-PC computer code. Comparative analysis shows that both βeff and Λ increase as fuel enrichment decreases. However, variation rate βeff is not the same in two conditions. βeff in the hot state is larger than those calculated in the cold state when fuel enrichment goes more than 83.91%, while the situation is reverse for... 

    Virtual address space mapping for IP auto-configuration in MANET with security capability

    , Article Proceedings of the 2008 International Conference on Advanced Infocomm Technology, ICAIT '08, 29 July 2008 through 31 July 2008, Shenzhen ; 2008 ; 9781605580883 (ISBN) Taghiloo, M ; Tajamolian, M ; Dehghan, M ; Mousavi, R ; Sharif University of Technology
    2008
    Abstract
    Mobile Ad Hoc Networks (MANETs) are networks with selforganizing capabilities and without a fixed infrastructure. Wireless nodes communicate among themselves using multi-hop radio relaying, without requiring the packets to pass through a central access point or a base station. In a highly mobile and infrastructure-less scenario, pre-configuration of addresses is not possible. Therefore node addresses need to be configured dynamically with minimum delay and packet loss. Existing solutions for IP address auto-configuration do not address security issues. In this paper we propose a secure address autoconfiguration for Mobile Ad hoc Networks (MANET) based on Virtual Address Space Mapping [1]....