Papers by Mohammad Eslami
Journal of Thermal Stresses, 2005
The linear theory of thermoelasticity of Green-Naghdi (GN) types II and III for homogeneous and i... more The linear theory of thermoelasticity of Green-Naghdi (GN) types II and III for homogeneous and isotropic materials are employed to study the thermal and mechanical waves in an annulus domain. The disturbances are generated by sudden application of temperature to the boundary. The nondimensional form of the governing equations are solved utilizing the Laplace transform method. Locally transversal linearization (LTL)
This paper addresses the effect of the wind power units into the classical Environment/Economic D... more This paper addresses the effect of the wind power units into the classical Environment/Economic Dispatch (EED) model which called hereafter as Wind/Environment/Economic Dispatch (WEED) problem. The optimal dispatch between thermal and wind units so that minimized the total generating costs are considered as multi objective model. Normally, the nature of the wind energy as a renewable energy sources has uncertainty in generation. Therefore, in this paper, use a practical model known as 2 m-point to estimate the uncertainty of wind power. To solve the WEED problem, this paper proposed a new meta-heuristic optimization algorithm that uses online learning mechanism. Honey Bee Mating Optimization (HBMO), a moderately new population-based intelligence algorithm, shows fine performance on optimization problems. Unfortunately, it is usually convergence to local optima. Therefore, in the proposed Online Learning HBMO (OLHBMO), two neural networks are trained when reached to the predefined threshold by current and previous position of solutions and their fitness values. Moreover, Chaotic Local Search (CLS) operator is use to develop the local search ability and a new data sharing model determine the set of non-dominated optimal solutions and the set of non-dominated solutions to kept in the external memory. Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) as a decision-making technique is employed to find the best solution from the set of Pareto solutions. The proposed model has been individually examined and applied on the IEEE 30-bus 6-unit, the IEEE 118-bus 14-unit, and 40-unit with valve point effect test systems. The robustness and effectiveness of this algorithm is shows by these test systems compared to other available algorithms.
Applied Soft Computing, 2016
This paper addresses the effect of the wind power units into the classical Environment/Economic D... more This paper addresses the effect of the wind power units into the classical Environment/Economic Dispatch (EED) model which called hereafter as Wind/Environment/Economic Dispatch (WEED) problem. The optimal dispatch between thermal and wind units so that minimized the total generating costs are considered as multi objective model. Normally, the nature of the wind energy as a renewable energy sources has uncertainty in generation. Therefore, in this paper, use a practical model known as 2 m-point to estimate the uncertainty of wind power. To solve the WEED problem, this paper proposed a new meta-heuristic optimization algorithm that uses online learning mechanism. Honey Bee Mating Optimization (HBMO), a moderately new population-based intelligence algorithm, shows fine performance on optimization problems. Unfortunately, it is usually convergence to local optima. Therefore, in the proposed Online Learning HBMO (OLHBMO), two neural networks are trained when reached to the predefined threshold by current and previous position of solutions and their fitness values. Moreover, Chaotic Local Search (CLS) operator is use to develop the local search ability and a new data sharing model determine the set of non-dominated optimal solutions and the set of non-dominated solutions to kept in the external memory. Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) as a decision-making technique is employed to find the best solution from the set of Pareto solutions. The proposed model has been individually examined and applied on the IEEE 30-bus 6-unit, the IEEE 118-bus 14-unit, and 40-unit with valve point effect test systems. The robustness and effectiveness of this algorithm is shows by these test systems compared to other available algorithms.
Cloud computing is a newfound service that has a rapid growth in IT industry during recent years.... more Cloud computing is a newfound service that has a rapid growth in IT industry during recent years. Despite the several advantages of this technology there are some issues such as security and privacy that affect the reliability of cloud computing models. Access control and user authentication are the most important security issues in cloud computing. Therefore, the research has been prepared to provide the overall information about this security concerns and specific details about the identified issues in access control and user authentication researches. Therefore, cloud computing benefits and disadvantages have been explained in the first part. The second part reviewed some of access control and user authentication algorithms and identifying benefits and weaknesses of each algorithm. The main aim of this survey is considering limitations and problems of previous research in the research area to find out the most challenging issue in access control and user authentication algorithms.
The approval rating of cloud computing as an emerging technology has been enhanced significantly ... more The approval rating of cloud computing as an emerging technology has been enhanced significantly and these days, there are many cloud storage and computing providers who offer their services regarding IaaS, PaaS, and SaaS. Despite these considerable benefits, there are serious concerns and challenges about this new technology. The most important issue is related to security and privacy subjects in cloud-based environments. Furthermore, resource allocation, load balancing, data management, data availability, scalability, compatibility and interoperability are the other challenges in cloud-based environments that decrease efficiency and reliability of this technology. In this paper, challenges and concerns related to cloud-based environments have been identified and most appropriate current solutions for each challenge have been described.
Archive of Applied Mechanics, 2012
In this paper the equations for The generalized coupled thermoelasticity based on the extended Lo... more In this paper the equations for The generalized coupled thermoelasticity based on the extended Lord-Shulman (LS), Green-Lindsay(GL) and Green-Naghdi type II models that admits the second sound effect are solved to study the dynamic thermoelastic response of a 1-Dimensional functionality graded (FG) layer by employing finite element method using the theory of virtual displacement and the implicit Newmark algorithm. The layer material is considered to be graded along wave propagation direction and the element takes into account the variation of thermal and mechanical properties along its depth, which can be modeled by explicit distribution law like the power law distribution. A Heaviside input signal of thermal shock load, heat flux and displacement exerted to the boundary. The effects of thermoelastic coupling factor and the volume fraction on the thermoelastic waves are investigated. Propagation of stress, temperature and displacement wave with time is presented. A comparison is made with results obtained in case of homogenous material in the literatures.
Cloud computing is the realization for a long-held dream of computing as utility of establishment... more Cloud computing is the realization for a long-held dream of computing as utility of establishment of on-demand IT services. The considerable specifications of this emerging technology have attracted attentions of many users and enterprises in various industries. However, there are some considerable concerns that reduce reliability of cloud-based services. Managing user identities in clouds is one of the most challenging security issues that has led to many performed researches in this area. Hence, an agent-based user authentication model has been presented in this paper to enhance security of cloud computing environments. A unique extension has been provided in the proposed model is to identify the ownership of private individual devices and to establish a reasonable and logical dependency between cloud servers and clients. Furthermore, a provisional access permission algorithm has been presented for un-registered devices to investigate and verify authenticity and correctness of one-time access requests by a higher level of security in comparison with current models. The proposed model has been introduced and evaluated regarding to three main parameters: performance, security, and scalability. The analysis of user authentication agent shows that this model enhances the rate of security and reliability in cloud computing environments without affecting the rate of energy and time consumption, and scalability.
The current power systems have works near to the marginal voltage stability due to the market per... more The current power systems have works near to the marginal voltage stability due to the market performance as well as their weightier operation loadings along with consideration of environmental constraints of transmission as well as generation capacity enlargement. In other words, at the present time wind power has confirmed to be one of the most efficient and competitive renewable resources and therefore, its use is indeed continually growing. Little wind power infiltration planes are generally contained in the current grid networks in view of that it is passively controlled and operated. On the other hand, this statement is no more suitable for immediately after the wind power energy infiltration commences
Books by Mohammad Eslami
The current power systems have works near to the marginal voltage stability due to the market per... more The current power systems have works near to the marginal voltage stability due to the market performance as well as their weightier operation loadings along with consideration of environmental constraints of transmission as well as generation capacity enlargement. In other words, at the present time wind power has confirmed to be one of the most efficient and competitive renewable resources and therefore, its use is indeed continually growing. Little wind power infiltration planes are generally contained in the current grid networks in view of that it is passively controlled and operated. On the other hand, this statement is no more suitable for immediately after the wind power energy infiltration commences
Uploads
Papers by Mohammad Eslami
Books by Mohammad Eslami