Loading...
Search for: embedding
0.006 seconds
Total 417 records

    An example of non-embeddability of the Ricci flow

    , Article Annals of Global Analysis and Geometry ; Volume 55, Issue 4 , 2019 , Pages 681-685 ; 0232704X (ISSN) Safdari, M ; Sharif University of Technology
    Springer Netherlands  2019
    Abstract
    For an evolution of metrics (M, g t ) there is a t-smooth family of embeddings e t : M→ R N inducing g t , but in general there is no family of embeddings extending a given initial embedding e. We give an example of this phenomenon when g t is the evolution of g under the Ricci flow. We show that there are embeddings e inducing g which do not admit of t-smooth extensions to e t inducing g t for any t> 0. We also find hypersurfaces of dim > 2 that will not remain a hypersurface under Ricci flow for any positive time. © 2019, Springer Nature B.V  

    On the links of vertices in simplicial d-complexes embeddable in the euclidean 2d-space

    , Article Discrete and Computational Geometry ; 2017 , Pages 1-17 ; 01795376 (ISSN) Parsa, S ; Sharif University of Technology
    Abstract
    We consider d-dimensional simplicial complexes which can be PL embedded in the 2d-dimensional Euclidean space. In short, we show that in any such complex, for any three vertices, the intersection of the link-complexes of the vertices is linklessly embeddable in the (Formula presented.)-dimensional Euclidean space. In addition, we use similar considerations on links of vertices to derive a new asymptotic upper bound on the total number of d-simplices in an (continuously) embeddable complex in 2d-space with n vertices, improving known upper bounds, for all (Formula presented.). Moreover, we show that the same asymptotic bound also applies to the size of d-complexes linklessly embeddable in the... 

    On the links of vertices in eimplicial d-complexes embeddable in the euclidean 2d-space

    , Article Discrete and Computational Geometry ; Volume 59, Issue 3 , 2018 , Pages 663-679 ; 01795376 (ISSN) Parsa, S ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    We consider d-dimensional simplicial complexes which can be PL embedded in the 2d-dimensional Euclidean space. In short, we show that in any such complex, for any three vertices, the intersection of the link-complexes of the vertices is linklessly embeddable in the (2 d- 1 ) -dimensional Euclidean space. In addition, we use similar considerations on links of vertices to derive a new asymptotic upper bound on the total number of d-simplices in an (continuously) embeddable complex in 2d-space with n vertices, improving known upper bounds, for all d≥ 2. Moreover, we show that the same asymptotic bound also applies to the size of d-complexes linklessly embeddable in the (2 d+ 1 ) -dimensional... 

    A non-existence theorem for isometric immersions

    , Article Journal of Geometry and Physics ; Volume 59, Issue 3 , 2009 , Pages 263-266 ; 03930440 (ISSN) Ranjbar Motlagh, A ; Sharif University of Technology
    2009
    Abstract
    Let f : M {long rightwards arrow} over(M, -) be an isometric immersion between Riemannian manifolds. For certain conditions on M and over(M, -) in terms of curvatures and external diameter, we extend the non-embedding theorem of Chern and Kuiper to the isometric immersions of non-compact manifolds. Also, our results generalize and improve the main results of Jorge and Koutroufiotis [L. Jorge, D. Koutroufiotis, An estimate for the curvature of bounded submanifolds, Amer. J. Math. 103 (4) (1981) 711-725] and Veeravalli [A. R. Veeravalli, A sharp lower bound for the Ricci curvature of bounded hypersurfaces in space forms, Bull. Austral. Math. Soc. 62 (1) (2000) 165-170]. © 2008 Elsevier B.V.... 

    A Comparative study of joint power and reliability management techniques in multicore embedded systems

    , Article 3rd CSI/CPSSI International Symposium on Real-Time and Embedded Systems and Technologies, RTEST 2020, 10 June 2020 through 11 June 2020 ; 2020 Yari Karin, S ; Sahraee, A ; Saber Latibari, J ; Ansari, M ; Rohbani, N ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Low power consumption and high-reliability are often major objectives in the design of embedded systems. To reduce power consumption, embedded systems usually employ system-level power management techniques, e.g. Dynamic Voltage Scaling (DVS) and Dynamic Power Management (DPM). To achieve high reliability, embedded systems often exploit fault-tolerant techniques. Fault-tolerant techniques are in a trade-off with energy consumption, peak-power consumption, and temperature. Thus, different methods have been introduced that simultaneously consider reliability and power consumption as the system constraints. Several novel methods have been proposed in previous works to reduce the power... 

    Besov type function spaces defined on metric-measure spaces

    , Article Journal of Mathematical Analysis and Applications ; Volume 505, Issue 2 , 2022 ; 0022247X (ISSN) Ranjbar Motlagh, A ; Sharif University of Technology
    Academic Press Inc  2022
    Abstract
    The purpose of this article is to study the Besov type function spaces for maps which are defined on abstract metric-measure spaces. We extend some of the embedding theorems of the classical Besov spaces to the setting of abstract spaces. © 2021 Elsevier Inc  

    Steganographic schemes with multiple q-ary changes per block of pixels

    , Article Signal Processing ; Vol. 108, issue , 2014 , pp. 206-219 Gholampour, I ; Khosravi, K ; Sharif University of Technology
    Abstract
    A family of matrix embedding steganographic schemes for digital images is investigated. The target schemes are applied to blocks of n pixels in a cover image. In every block, at most m pixels are allowed to change with q-ary steps. We have derived some upper bounds on the embedding efficiency of these schemes for different values on m. It is also shown that these upper bounds approach the general upper bound on the embedding efficiency of q-ary steganography. For the case of q=3, we have shown that there is no feasible optimum member of the family for m=2, although for m=1, a well-known example exists. Instead, for m=2, a new close-to-bound scheme in the family is presented which exploits... 

    A new scheme on recovery from failure in NICE overlay protocol

    , Article 1st International Conference on Scalable Information Systems, InfoScale '06, Hong Kong, 30 May 2006 through 1 June 2006 ; Volume 152 , 2006 ; 1595934286 (ISBN); 9781595934284 (ISBN) Abdolhosseini Moghadam, A. R ; Barghi, S ; Rabiee, H. R ; Ghanbari, M ; Sharif University of Technology
    2006
    Abstract
    Overlay networks have been an active area of research for the past few years. The control overhead and the recovery from failure are the two important issues in the topology aware embedded overlay networks. In this research, we have introduced an enhanced version of the NICE protocol, called resilient NICE (R-NICE) that reduces the control overhead significantly. Furthermore, by saving the join path for an end host, the time and overhead of rejoining for isolated nodes have also been reduced. This will cause the clusters and consequently the overall network to become more stable and the effect of a node failure become localized. Our experimental results have confirmed the superior... 

    In-scratchpad memory replication: Protecting scratchpad memories in multicore embedded systems against soft errors

    , Article ACM Transactions on Design Automation of Electronic Systems ; Volume 20, Issue 4 , 2015 ; 10844309 (ISSN) Delshadtehrani, L ; Farbeh, H ; Miremadi, S. G ; Sharif University of Technology
    Association for Computing Machinery  2015
    Abstract
    Scratchpad memories (SPMs) are widely employed inmulticore embedded processors. Reliability is one of the major constraints in the embedded processor design, which is threatened with the increasing susceptibility of memory cells to multiple-bit upsets (MBUs) due to continuous technology down-scaling. This article proposes a low-cost and efficient data replication mechanism, called In-Scratchpad Memory Replication (ISMR), to correct MBUs in SPMs of multicore embedded processors. The main feature of ISMR is a smart controller, called Replication Management Unit (RMU), which is responsible for dynamically analyzing the activity of the SPM blocks at runtime and efficiently replicating the... 

    Steganographic schemes with multiple q-ary changes per block of pixels

    , Article Signal Processing ; Volume 108 , 2015 , Pages 206-219 ; 01651684 (ISSN) Gholampour, I ; Khosravi, K ; Sharif University of Technology
    Elsevier  2015
    Abstract
    A family of matrix embedding steganographic schemes for digital images is investigated. The target schemes are applied to blocks of n pixels in a cover image. In every block, at most m pixels are allowed to change with q-ary steps. We have derived some upper bounds on the embedding efficiency of these schemes for different values on m. It is also shown that these upper bounds approach the general upper bound on the embedding efficiency of q-ary steganography. For the case of q=3, we have shown that there is no feasible optimum member of the family for m=2, although for m=1, a well-known example exists. Instead, for m=2, a new close-to-bound scheme in the family is presented which exploits... 

    ROSE: Role-based Signed Network Embedding

    , Article 29th International World Wide Web Conference, WWW 2020, 20 April 2020 through 24 April 2020 ; 2020 , Pages 2782-2788 Javari, A ; Derr, T ; Esmailian, P ; Tang, J ; Kevin Chen-C. C ; Chunghwa Telecom; et al.; Microsoft; Quanta Computer; Taiwan Mobile; ZOOM ; Sharif University of Technology
    Association for Computing Machinery, Inc  2020
    Abstract
    In real-world networks, nodes might have more than one type of relationship. Signed networks are an important class of such networks consisting of two types of relations: positive and negative. Recently, embedding signed networks has attracted increasing attention and is more challenging than classic networks since nodes are connected by paths with multi-types of links. Existing works capture the complex relationships by relying on social theories. However, this approach has major drawbacks, including the incompleteness/inaccurateness of such theories. Thus, we propose network transformation based embedding to address these shortcomings. The core idea is that rather than directly finding the... 

    LSB ++: An improvement to LSB + steganography

    , Article IEEE Region 10 Annual International Conference, Proceedings/TENCON, 21 November 2011 through 24 November 2011, Bali ; 2011 , Pages 364-368 ; 9781457702556 (ISBN) Ghazanfari, K ; Ghaemmaghami, S ; Khosravi, S. R ; Sharif University of Technology
    Abstract
    The Least Significant Bit (LSB) substitution is an old and simple data hiding method that could almost effortlessly be implemented in spatial or transform domain over any digital media. This method can be attacked by several steganalysis methods, because it detectably changes statistical and perceptual characteristics of the cover signal. A typical method for steganalysis of the LSB substitution is the histogram attack that attempts to diagnose anomalies in the cover image's histogram. A well-known method to stand the histogram attack is the LSB + steganography that intentionally embeds some extra bits to make the histogram look natural. However, the LSB + method still affects the perceptual... 

    Opportunities for embedded software power reductions

    , Article Canadian Conference on Electrical and Computer Engineering ; 2011 , Pages 000763-000766 ; 08407789 (ISSN) ; 9781424497898 (ISBN) Assare, O ; Goudarzi, M ; Sharif University of Technology
    2011
    Abstract
    While performance and power consumption of processors present a classic trade-off in designing embedded hardware, software can be optimized in favor of both performance and energy. We evaluate the impact of optimizations at different stages of designing embedded software. We show that algorithm choice and compiler optimizations aimed at improving performance can also reduce energy consumption of an embedded processor. We also propose energy-aware compilation guidelines which can further reduce energy consumption without performance penalties. Our experimental results show that up to 85% energy reduction and 89% performance improvement can be achieved by these techniques  

    A fast and accurate multi-cycle soft error rate estimation approach to resilient embedded systems design

    , Article Proceedings of the International Conference on Dependable Systems and Networks, 28 June 2010 through 1 July 2010 ; June , 2010 , Pages 131-140 ; 9781424475018 (ISBN) Fazeli, M ; Miremadi, S. G ; Asadi, H ; Nematollah Ahmadian, S ; Sharif University of Technology
    2010
    Abstract
    In this paper, we propose a very fast and accurate analytical approach to estimate the overall SER and to identify the most vulnerable gates,flip-flops, and paths of a circuit. Using such information, designers can selectively protect the vulnerable parts resulting in lower power and area overheads that are the most important factors in embedded systems. Unlike previous approaches, the proposed approach firstly does not rely on fault injection or fault simulation; secondly it measures the SER for multi cycles of circuit operation; thirdly, the proposed approach accurately computes all three masking factors, namely, logical, electrical, and timing masking; fourthly, the effects of error... 

    High performance and predictable memory controller for multicore mixed-criticality real-time systems

    , Article IET Computers and Digital Techniques ; Volume 13, Issue 5 , 2019 ; 17518601 (ISSN) Dabaghi, A ; Farbeh, H ; Sharif University of Technology
    Institution of Engineering and Technology  2019
    Abstract
    Multicore processors are widely used in today's real-time embedded systems to satisfy the performance and predictability requirements as well as reduce cost. A vast majority of multicore embedded systems are running several tasks with mixed-criticality, in which the non-functional requirements of the tasks are different or even conflicting. A major challenge in mixed-criticality systems is to maximise the efficiency of shared resources while satisfying the criticality requirements. Shared memory is a key component that should be well managed and memory controller plays the main role in this case. Several memory controllers have been introduced in the literature for multicore processors. In... 

    MGCN: Semi-supervised classification in multi-layer graphs with graph convolutional networks

    , Article 11th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2019, 27 August 2019 through 30 August 2019 ; 2019 , Pages 208-211 ; 9781450368681 (ISBN) Ghorbani, M ; Baghshah, M. S ; Rabiee, H. R ; Sharif University of Technology
    Association for Computing Machinery, Inc  2019
    Abstract
    Graph embedding is an important approach for graph analysis tasks such as node classification and link prediction. The goal of graph embedding is to find a low dimensional representation of graph nodes that preserves the graph information. Recent methods like Graph Convolutional Network (GCN) try to consider node attributes (if available) besides node relations and learn node embeddings for unsupervised and semi-supervised tasks on graphs. On the other hand, multi-layer graph analysis has been received attention recently. However, the existing methods for multi-layer graph embedding cannot incorporate all available information (like node attributes). Moreover, most of them consider either... 

    Discovering associations among technologies using neural networks for tech-mining

    , Article IEEE Transactions on Engineering Management ; Volume 69, Issue 4 , 2022 , Pages 1394-1404 ; 00189391 (ISSN) Azimi, S ; Veisi, H ; Fateh-Rad, M ; Rahmani, R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    In both public and private sectors, critical technology-based tasks, such as innovation, forecasting, and road-mapping, are faced with unmanageable complexity due to the ever-expanding web of technologies which can range into thousands. This context cannot be easily handled manually or with efficient speed. However, more precise and insightful answers are expected. These answers are the fundamental challenge addressed by tech-mining. For tech-mining, discovering the associations among them is a critical task. These associations are used to form a weighted directed graph of technologies called 'association tech-graph' which is used for technology development, trend analysis, policymaking,... 

    , M.Sc. Thesis Sharif University of Technology Samei, Farzad (Author) ; Ejlali, Alireza (Supervisor)
    Abstract
    With new technologies, processor power density is dramatically increased which results in high temperature. Temperature has significant impact on reliability, performance, power consumption and cooling costs. This alarming trend underscores the importance of temperature management methods in system design. Recently, various research efforts have been focused on addressing thermal issues. Due to mobility, cost and size constraints and reliability requirements, the embedded systems do not warrant use of modern cooling mechanisms such as heat sink and fan. This caused the thermal issues to be more prominent in embedded domain. This study aims at introducing thermal management techniques for... 

    Reducing the Energy Overhead of Replication Mechanisms in Distributed Embedded Systems

    , M.Sc. Thesis Sharif University of Technology Salehi Khanghahbar, Mohammad (Author) ; Ejlali, Alireza (Supervisor)
    Abstract
    Distributed embedded systems are widely used in safety-critical applications, such as avionics platform and flight control system. Faults in such applications may cause catastrophic effect. Therefore, these systems must be fault-tolerant and must be designed not only to detect faults but also to recover from faults. Fault tolerance is normally realized on multi-processor system via temporal duplication (time-redundancy) or spatial duplication (hardware-redundancy) depending on the availability of the slack time. Slack time is defined as the difference between the deadline and execution time. Duplication is a common technique to achieve fault tolerance in safety-critical applications, but may... 

    , Ph.D. Dissertation Sharif University of Technology Fazeli, Mahdi (Author) ; Miremadi, Ghasem (Supervisor)
    Abstract

    In this thesis, we intend to propose low cost SED-tolerant techniques for different compo­ nents of embedded processors core including data path components such as register file and ALU as well as control path components such as control unit. Since the reliability es­ timation is the essential step in design of a fault-tolerant system, we propose fast and accu­ rate analytical soft error rate (SER) estimation techniques in Section 4. The proposed techniques have the ability to measure: 1) the SER of a design; 2) the SER of each indi­ vidual gate and FF, and 3) the SER of a specific path in the design. Using such infor­ mation, designers can selectively protect the vulnerable parts...