Loading...
Search for: izadi--m
0.165 seconds

    Using type-2 fuzzy function for diagnosing brain tumors based on image processing approach

    , Article 2010 IEEE World Congress on Computational Intelligence, WCCI 2010, 18 2010 through 23 July 2010 ; July , 2010 ; 9781424469208 (ISBN) Fazel Zarandi, M. H ; Zarinbal, M ; Zarinbal, A ; Turksen, I. B ; Izadi, M ; Sharif University of Technology
    2010
    Abstract
    Fuzzy functions are used to identify the structure of system models and reasoning with them. Fuzzy functions can be determined by any function identification method such as Least Square Estimates (LSE), Maximum Likelihood Estimates (MLE) or Support Vector Machine Estimates (SVM). However, estimating fuzzy functions using LSE method is structurally a new and unique approach for determining fuzzy functions. By using this approach, there is no need to know or to develop an in-depth understanding of essential concepts for developing and using the membership functions and selecting the t-norms, co-norms and implication operators. Furthermore, there is no need to apply fuzzification and... 

    Bus measurements protection against bad data injection in electric power grids

    , Article 2017 25th Iranian Conference on Electrical Engineering, ICEE 2017, 2 May 2017 through 4 May 2017 ; 2017 , Pages 1210-1215 ; 9781509059638 (ISBN) Izadi, M ; Hosseini, S. H ; Farajollahi, M ; Safdarian, A ; Sharif University of Technology
    2017
    Abstract
    System security indices play a crucial role with regard to monitoring system statues. These indices are derived from system measurements which are prone to either intentional or unintentional noises. To alleviate the effect of intentional noises, it is required to protect measurements data from bad data injection. In this regard, this paper intends to propose an approach to determine priority order of protected bus measurements in order to negate the effects of bad data injection on security indices. With this in mind, two security severity indices, the over loading risk index and the under voltage risk index, are considered. Genetic algorithm serves to find the highest deteriorating effect... 

    Impacts of bad data injection on power systems security: intruder point of view

    , Article 2017 IEEE Smart Grid Conference, SGC 2017, 20 December 2017 through 21 December 2017 ; Volume 2018-January , March , 2018 , Pages 1-6 ; 9781538642795 (ISBN) Gharebaghi, S ; Hosseini, S. H ; Izadi, M ; Safdarian, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Nowadays communication and monitoring systems play an important role in power systems security. However, these systems are exposed to bad data injection through attackers. This paper is aimed to propose a priority order list of attacked buses in order to be fully informed about the attacker decision. To do so, system security is evaluated through two well-known risk indices including under voltage risk index and overloading risk index. A genetic algorithm (GA) is employed to determine the most severe attack for each of the security indices. The effectiveness and accuracy of the proposed model are scrutinized through simulations on the IEEE 30-bus network. The paper reveals that knowing the... 

    Production and characterization of UHMWPE/fumed silica nanocomposites

    , Article Polymer Composites ; Volume 33, Issue 10 , 2012 , Pages 1858-1864 ; 02728397 (ISSN) Ramazani, A ; Saremi, M. G ; Amoli, B. N ; Izadi, H ; Sharif University of Technology
    Wiley  2012
    Abstract
    Ultrahigh-molecular-weight polyethylene (UHMWPE)/fumed silica nanocomposites were prepared via in situ polymerization using a bi-supported Ziegler-Natta catalytic system. Nanocomposites with different nanoparticle weight fractions were produced in order to investigate the effect of fumed silica on thermal and mechanical properties of UHMWPE/fumed silica nanocomposites. The viscosity average molecular weight (M) of all samples including pure UHMWPE as the reference sample and nanocomposites were measured. Scanning electron microscope (SEM) images showed the homogenous dispersion of nanoparticles throughout the UHMWPE matrix while no nanoparticle cluster has been formed. Crystallization... 

    Pragmatic Semantics

    , M.Sc. Thesis Sharif University of Technology Sarvi, Ali (Author) ; Izadi, Mohammad (Supervisor)
    Abstract
    Three distinct areas in linguistic studies are typically considered, namely, syntax, semantics and pragmatics. Each category has a specific realm and deals with special linguistic phenomena. Presenting exact definition and clarification of the corresponding boundaries of each area is considered in both linguistics and philosophy of language. In order to explain the “meaning” for sentences of a language, this issue turns out to be vital. Representing the definition and evaluating the domain of each area, is the objective of the first chapter. In chapter two, some important semantic theories have been investigated. Since at first one semantic theory ought to clear its position about reference,... 

    Efficient Algorithm for Network Motifs Discovery

    , M.Sc. Thesis Sharif University of Technology Hazrati, Sattar (Author) ; Izadi, Mohammad (Supervisor)
    Abstract
    Network Motifs are subgraphs that appear more frequently in real networks than randomize networks. Frequent replication of a subgraph could imply evolution, network performance or some other particular reasons. From algorithmic perspective, network motif discovery in a graph is a difficult problem. Since, at least it includes the whole graph isomorphism. Hence, for solving this problem in practice, we need computable graphs. The existing algorithms so far, have high running times and memory usages. In this thesis, we present a new algorithm called CGQ. Within this algorithm, we use both QuateXelero and G-Trie algorithms which respectively have better performance in census of real networks... 

    Formal Verification of Timed Security Protocols

    , M.Sc. Thesis Sharif University of Technology Ganji, Reza (Author) ; Izadi, Mohammad (Supervisor)
    Abstract
    Security protocols assure the security of the communications in computer systems using techniques such as cryptographic primitives. However, the usage of such protocols is faced by the lack of fault tolerance, where a minor disruption could cause a destructive damage. Therefore, there is a requirement to assess the reliability of these protocols. In this thesis model checking of timed security protocols is done. Model checking process includes steps that will be modeling protocol with high level and human readable specification language named THLPSL and converting this specification to special kind of timed automata named XTA and model checking will be done with UPPAAL verification tool. We... 

    A Logic For Ambient Intelligence

    , M.Sc. Thesis Sharif University of Technology Torkaman, Maryam (Author) ; Izadi, Mohammad (Supervisor)
    Abstract
    Monitoring of activities of elderly and intelligent decisions about their living environment is a key challenge in smart environments. In the case of such challenges, correctness of system performance is highly dependent on how the model is designed. In the ambient intelligence (AMI) modeling, formal modeling is one of the best approaches because it supports certainty. In addition, time, location and mobility in AMI are crucial requirements, particularly in emergency treatment services. Ambient calculus is a formalism for describing mobility, process migration and message transfer, but it cannot express metric time duration. In this paper we propose an extension of ambient calculus with time... 

    Persian Sentence Compression Using Constituency Analysis of Sentences

    , M.Sc. Thesis Sharif University of Technology Tavakoli, Mohammad (Author) ; Izadi, Mohammad (Supervisor)
    Abstract
    The amount of ever-growing generated data increases the need for automatic methods in text processing. As a solution, sentence compression and text summarization are considered as methods of managing and dealing with this huge amount of data. Additionally, Sentence compression is also useful in different text processing systems such as text summarization, news condensation, information extraction and question-answering systems. A sentence compression system takes a long sentence as input and returns a shorter form of the sentence in a way that its important information and grammaticality is preserved. In this thesis, we devise a rule-based extractive sentence compression method. This... 

    Using Automata of Records as the Semantics of BIP Coordination Model

    , M.Sc. Thesis Sharif University of Technology Mirahmadi, Mitra (Author) ; Izadi, Mohammad (Supervisor)
    Abstract
    In component-based design, each system consists of a set of heterogeneous components that are in interaction with each other. In this approach of design, computation is executed by the components, and their interactions are considered individually. BIP and Reo are coordination languages implemented in component-based modeling of systems. The BIP framework has a layered structure to separate interactions from the calculations. There are several approachesfor the formal definition of BIP layers. There are also semantics for BIP, based on two data-based and data-agnostic approaches. On the other hand, automata of records of a model is an operational semantics for Reo coordination language, one... 

    Persian Paraphrases Recognition Using Meaning Representation

    , M.Sc. Thesis Sharif University of Technology Javanmardi, Kamyar (Author) ; Izadi, Mohammad (Supervisor)
    Abstract
    Paraphrases are sentences or phrases, which convey the same meaning using different words. There are different definitions for paraphrasing and most linguists believe that, paraphrases approximately equivalent in meaning. Paraphrase recognition is useful in different natural language processing areas such as question answering, information extraction, plagiarism recognition and machine translation. In this thesis, the purpose is to present a method for paraphrase recognition, using deep semantic analysis and meaning representation of sentences. To achieve this purpose first, meaning features were defined for every syntactic category and semantic analysis of sentences alongside mapping of... 

    Checking the Compliance of Software Architecture Evolution with its Rules

    , M.Sc. Thesis Sharif University of Technology Liaghat, Zainab (Author) ; Izadi, Mohammad (Supervisor)
    Abstract
    With long-term evolution of large scale software systems, the study and engineering of architectural evolution becomes more and more important. In order to manage high level changes, the architects should plan the architecture evolution in a series of releases. Planning and analysis of architectural evolution is a challenge and plays a significant role in evolution management. An assessment solution could promote overall accuracy and quality of the evolution process. Compliance checking with expert-defined rules is a well-known assessment solution and could be applied in the field of architectural evolution. In this thesis, a solution is proposed in order to compliance check these evolution... 

    Code Generation of AKKA Actors from Reo Coordination Models

    , M.Sc. Thesis Sharif University of Technology Sanginian, Reza (Author) ; Izadi, Mohammad (Supervisor)
    Abstract
    Developing distributed systems is always harder than centralized systems, because in distributed systems there are problems like how nodes must collaborate with each other, throughput, latency and so on, that is not concerned in centralized systems. For solving this problem, It's better to have an abstract view of system to show this concerns. one of the coordination languages to have that abstract view of system, is Reo language. Reo language is a coordination language that describe how components of systems, can coordinate with each other. This project is built to decrease the distance between designing and implementing. In this project an abstract view of system which is in Reo language,... 

    Electrowetting of power-law fluids in microgrooved channels

    , Article Physics of Fluids ; Volume 32, Issue 7 , July , 2020 Izadi, R ; Moosavi, A ; Sharif University of Technology
    American Institute of Physics Inc  2020
    Abstract
    Studying the dynamic behavior of droplets is of great importance in the electrowetting phenomena. However, despite the widespread use of non-Newtonian fluids in industry and daily life including medicine, food, petroleum, environmental biomass, and lab on a chip, most studies have focused on Newtonian fluids. In this study, a power-law fluid is considered as a typical example of non-Newtonian fluids and its dynamic behavior is investigated within a microchannel, and the results are compared with those of the Newtonian fluids. Both the grooved and non-grooved substrates are considered. For this purpose, the governing equations for the two phase fluid flow are solved using the finite element... 

    Failure-based equivalence of constraint automata

    , Article International Journal of Computer Mathematics ; Volume 87, Issue 11 , 2010 , Pages 2426-2443 ; 00207160 (ISSN) Izadi, M ; Movaghar, A ; Sharif University of Technology
    2010
    Abstract
    Constraint automata are the first-proposed operational semantics of Reo coordination language. They can be composed not only by all well-defined composition operators of labeled transition systems but also by two new operators. The new operators are joining of constraint automata with respect to their common port names and hiding a port name in all transition labels. The operations of these two extra operators depend on the internal structures of the transition labels, while in the others each transition label is considered as a simple entity. An equivalence relation between transition systems is a congruence relation if the replacement of the components of a model by the equivalent ones... 

    Financial risk constrained remote controlled switch deployment in distribution networks

    , Article IET Generation, Transmission and Distribution ; Volume 12, Issue 7 , 2018 , Pages 1547-1553 ; 17518687 (ISSN) Izadi, M ; Safdarian, A ; Sharif University of Technology
    Institution of Engineering and Technology  2018
    Abstract
    Recently, diverse technologies and apparatus are launched to enhance service reliability in the distribution level. In this regard, remote controlled switches (RCSs) can play a prominent role in declining interruption durations and costs. The stochastic nature of contingencies, however, imposes considerable uncertainty on the achievements of RCS deployment. This study presents a model to consider the financial risk induced by the uncertainty in an RCS placement problem. The risk awareness of distribution companies is scrutinised through an effective risk measure, i.e. conditional value at risk. In the model, the number and location of RCSs are determined such that the system expected cost is... 

    Minimum Dilation Triangulation in the Plane

    , Ph.D. Dissertation Sharif University of Technology Sattari, Sattar (Author) ; Izadi, Mohammad (Supervisor)
    Abstract
    If we consider a point set on the plane as the vertices and straight-line segments between them as the edges of a graph, and weight of each edge is equal to its Euclidean length, from this kind of graphs, triangulation is the graph with maximum number of the edges. In a triangulation, dilation of any two vertices is equal to the ratio of their shortest path length to their Euclidean distance, and dilation of the triangulation is defined as the maximum dilation of any pair of its vertices. Dilation is a characteristic that shows how much a triangulation approximates a complete graph. In the minimum dilation triangulation problem, the objective is to find a triangulation of a given set of... 

    A MIP model for risk constrained switch placement in distribution networks

    , Article IEEE Transactions on Smart Grid ; 2018 ; 19493053 (ISSN) Izadi, M ; Safdarian, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    The great share of interruptions in distribution networks motivates distribution decision makers to establish various reliability enhancement strategies. Amongst, deploying remote controlled switch (RCS) can make a crucial contribution to the reduction of interruption costs. Nevertheless, the stochastic nature of contingencies affects the RCS worth and imposes substantial financial risk to RCS deployment projects. This paper proposes a mathematical model to consider the risk in the optimal RCS deployment problem. The model determines the number and location of RCSs such that the expected profit is maximized while financial risk is minimized. The risk is modeled through conditional... 

    Sectionalizing Switch Placement Considering Financial Risk Undergone by Distribution Company

    , M.Sc. Thesis Sharif University of Technology Izadi, Milad (Author) ; Safdarian, Amir (Supervisor)
    Abstract
    By intertwining community daily life to electricity, high reliability and quality, safe, and low-cost services become among common expectations of electric energy customers. The substantial sources of fault events, however, lead to unexpected service interruptions. The exhaustion of existing devices, radial structure of current distribution networks, and lack of sufficient control and monitoring systems even worsen the situation. Therefore, investing in distribution systems in order to improve the service reliability and quality has been deemed as a proper strategy for electricity planners and operators. Various approaches have been proposed to achieve this aim. Among them, implementing... 

    Compositional failure-based equivalence of constraint automata

    , Article Electronic Notes in Theoretical Computer Science ; Volume 250, Issue 1 , 2009 , Pages 105-122 ; 15710661 (ISSN) Izadi, M ; Movaghar, A ; Sharif University of Technology
    2009
    Abstract
    Reo is a coordination language for modeling component connectors of component-based computing systems. Constraint automaton, as an extension of finite automaton, has been proposed as the operational semantics of Reo. In this paper, we introduce an extended definition of constraint automaton by which, every constraint automaton can be considered as a labeled transition system and each labeled transition system can be translated into a constraint automaton. We show that failure-based equivalences CFFD and NDFD are congruences with respect to composition of constraint automata using their join (production) and hiding operators. Based on these congruency results and by considering the temporal...