Loading...
Search for: information-networking
0.008 seconds

    A network information gathering (NIG) protocol and energy-aware load balancing algorithm for wireless sensor network

    , Article 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, Penang, 14 May 2007 through 17 May 2007 ; February , 2007 , Pages 407-412 ; 1424410940 (ISBN); 9781424410941 (ISBN) Taifeh Aliverdi, M ; Pakravan, M. R ; Sharif University of Technology
    2007
    Abstract
    In this paper, we propose an energy-aware node-eentric load balancing algorithm that constructs a load balanced tree in sensor networks of asymmetric architecture. We show that the proposed energy-aware algorithm creates routing trees with better load balancing across the network and longer network life time compared to the other proposed algorithms. We also introduce a network information gathering (NIG) protocol that can collect the required information (load and neighboring information) from nodes and forward them to the base station. This protocol can be used by all centralized systems that require some additional information about nodes in the network. ©2007 IEEE  

    Representation Learning for Heterogeneous Information Networks

    , M.Sc. Thesis Sharif University of Technology Mirzaie, Mohammad Ali (Author) ; Beigy, Hamid (Supervisor)
    Abstract
    Around world and the networks within it can be modeled in various templates. Graph structure is one of those templates in which objects and relations may have more than one types. We call this phenomenon "heterogeneity".Heterogeneity makes the networks hard to model and that is why the proposed methods for modeling the networks assumed the network structures homogeneous. This assumption may cause data loss due to ignoring the variety of types in network objects and relations and this loss can lessen the accuracy of data mining tasks.To tackle the challenge of data loss in the mentioned assumption, learning representations for heterogeneous information networks (HINs) was introduced. HINs... 

    DNE: A method for extracting cascaded diffusion networks from social networks

    , Article Proceedings - 2011 IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on Social Computing, PASSAT/SocialCom 2011, 9 October 2011 through 11 October 2011 ; October , 2011 , Pages 41-48 ; 9780769545783 (ISBN) Eslami, M ; Rabiee, H. R ; Salehi, M ; Sharif University of Technology
    2011
    Abstract
    The spread of information cascades over social networks forms the diffusion networks. The latent structure of diffusion networks makes the problem of extracting diffusion links difficult. As observing the sources of information is not usually possible, the only available prior knowledge is the infection times of individuals. We confront these challenges by proposing a new method called DNE to extract the diffusion networks by using the time-series data. We model the diffusion process on information networks as a Markov random walk process and develop an algorithm to discover the most probable diffusion links. We validate our model on both synthetic and real data and show the low dependency... 

    Evidence-based mixture of MLP-experts

    , Article Proceedings of the International Joint Conference on Neural Networks, 18 July 2010 through 23 July 2010 ; July , 2010 ; 9781424469178 (ISBN) Masoudnia, S ; Rostami, M ; Tabassian, M ; Sajedin, A ; Ebrahimpour, R ; Sharif University of Technology
    2010
    Abstract
    Mixture of Experts (ME) is a modular neural network architecture for supervised learning. In this paper, we propose an evidence-based ME to deal with the classification problem. In the basic form of ME the problem space is automatically divided into several subspaces for the experts and the outputs of experts are combined by a gating network. Satisfactory performance of the basic ME depends on the diversity among experts. In conventional ME, different initialization of experts and supervision of the gating network during the learning procedure, provide the diversity. The main idea of our proposed method is to employ the Dempster-Shafer (D-S) theory of evidence to improve determination of... 

    Inferring dynamic diffusion networks in online media

    , Article ACM Transactions on Knowledge Discovery from Data ; Volume 10, Issue 4 , 2016 ; 15564681 (ISSN) Tahani, M ; Hemmatyar, A. M. A ; Rabiee, H. R ; Ramezani, M ; Sharif University of Technology
    Association for Computing Machinery 
    Abstract
    Online media play an important role in information societies by providing a convenient infrastructure for different processes. Information diffusion that is a fundamental process taking place on social and information networks has been investigated in many studies. Research on information diffusion in these networks faces two main challenges: (1) In most cases, diffusion takes place on an underlying network, which is latent and its structure is unknown. (2) This latent network is not fixed and changes over time. In this article, we investigate the diffusion network extraction (DNE) problem when the underlying network is dynamic and latent. We model the diffusion behavior (existence... 

    3MOKAN: A novel mobility management mechanism based on keeping alternative nodes

    , Article 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008, Gino-wan, Okinawa, 25 March 2008 through 28 March 2008 ; 2008 , Pages 756-761 ; 1550445X (ISSN) ; 0769530966 (ISBN); 9780769530963 (ISBN) Hasanlou, M ; Fazli, E ; Movaghar, A ; Mohammadi, H ; Sharif University of Technology
    2008
    Abstract
    A mobile ad hoc network (MANET) is a network without any predefined infrastructure in which every node not only enjoys the services from the network, but serves the network as a relaying router. Because of nodes mobility, these kinds of networks are highly dynamic. Therefore, link failure is so frequent. In this paper we propose a novel mobility management method which is independent of underlying routing protocol. Based on this mechanism, a node tries to keep an alternate node for its next hop and when a link breakage occurs, simply node uses its alternate node as next hop. Simulation results show that this mechanism can reduce average number of hop counts, number of selected routes and... 

    An adaptive approach to manage the number of virtual channels

    , Article 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008, Gino-wan, Okinawa, 25 March 2008 through 28 March 2008 ; 2008 , Pages 353-358 ; 1550445X (ISSN) ; 0769530966 (ISBN); 9780769530963 (ISBN) Mirza Aghatabar, M ; Koohi, S ; Hessabi, S ; Rahmati, D ; Sharif University of Technology
    2008
    Abstract
    Network-on-Chip (NoC) is a precious approach to handle huge number of transistors by virtue of technology scaling to lower than 50nm. Virtual channels have been introduced in order to improve the performance according to a timing multiplexing concept in each physical channel. The incremental effect of virtual channels on power consumption has been shown in literatures. The issue of power saving has always been controversial to many designers. In this paper, we introduce a new technique which tries to adaptively mange the number of virtual channels in order to reduce the power consumption while not degrading the performance of the network without any reconfiguration. Our experimental results... 

    Empirical performance evaluation of stretched hypercubes

    , Article 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008, Gino-wan, Okinawa, 25 March 2008 through 28 March 2008 ; 2008 , Pages 75-79 ; 1550445X (ISSN) ; 0769530966 (ISBN); 9780769530963 (ISBN) Meraji, S ; Sarbazi Azad, H ; IEEE Computer Society ; Sharif University of Technology
    2008
    Abstract
    Stretched hypercube has recently been introduced as an attractive alternative to the well-known hypercube. Previous research on this network topology has mainly focused on topological properties and VLSI aspects of this network In this paper, we propose some deterministic and adaptive routing algorithms for the stretched hypercubes. The performance of stretched hypercubes using the proposed routing algorithms is then evaluated by means of simulation experiments. Experiments are reahzed under different working loads and for different network actors. © 2008 IEEE  

    Resource placement in the edge product of graphs

    , Article 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, Gino-wan, Okinawa, 25 March 2008 through 28 March 2008 ; 2008 , Pages 212-218 ; 1550445X (ISSN) ; 0769530958 (ISBN); 9780769530956 (ISBN) Moinzadeh, P ; Sarbazi Azad, H ; Sharif University of Technology
    2008
    Abstract
    In a large system, it is neither economical nor efficient to equip each node with a copy of the resource, and it is desirable to distribute the copies of the resource so that certain performance measure is obtained. In this paper we consider the problem of distributing resources in the edge product of networks. The algorithms presented in this paper make use of the known placements for the basic graphs composing the product graph. Therefore, in these placements we avoid the additional costs needed for deploying and rescaling the network. © 2008 IEEE  

    Viral cascade probability estimation and maximization in diffusion networks

    , Article IEEE Transactions on Knowledge and Data Engineering ; 28 May , 2018 ; 10414347 (ISSN) Sepehr, A ; Beigy, H ; Sharif University of Technology
    IEEE Computer Society  2018
    Abstract
    People use social networks to share millions of stories every day, but these stories rarely become viral. Can we estimate the probability that a story becomes a viral cascade If so, can we find a set of users that are more likely to trigger viral cascades These estimation and maximization problems are very challenging since both rare-event nature of viral cascades and efficiency requirement should be considered. Unfortunately, this problem still remains largely unexplored to date. In this paper, given temporal dynamics of a network, we first develop an efficient viral cascade probability estimation method, VICE, that leverages an special importance sampling approximation to achieve high... 

    Steering social activity: a stochastic optimal control point of view

    , Article Journal of Machine Learning Research ; Volume 18 , 2018 , Pages 1-35 ; 15324435 (ISSN) Zarezade, A ; De, A ; Upadhyay, U ; Rabiee, H.R ; Gomez Rodriguez, M ; Sharif University of Technology
    Microtome Publishing  2018
    Abstract
    User engagement in online social networking depends critically on the level of social activity in the corresponding platform-the number of online actions, such as posts, shares or replies, taken by their users. Can we design data-driven algorithms to increase social activity? At a user level, such algorithms may increase activity by helping users decide when to take an action to be more likely to be noticed by their peers. At a network level, they may increase activity by incentivizing a few influential users to take more actions, which in turn will trigger additional actions by other users. In this paper, we model social activity using the framework of marked temporal point processes,... 

    Viral cascade probability estimation and maximization in diffusion networks

    , Article IEEE Transactions on Knowledge and Data Engineering ; Volume 31, Issue 3 , 2019 , Pages 589-600 ; 10414347 (ISSN) Sepehr, A ; Beigy, H ; Sharif University of Technology
    IEEE Computer Society  2019
    Abstract
    People use social networks to share millions of stories every day, but these stories rarely become viral. Can we estimate the probability that a story becomes a viral cascade? If so, can we find a set of users that are more likely to trigger viral cascades? These estimation and maximization problems are very challenging since both rare-event nature of viral cascades and efficiency requirement should be considered. Unfortunately, this problem still remains largely unexplored to date. In this paper, given temporal dynamics of a network, we first develop an efficient viral cascade probability estimation method, ViCE, that leverages an special importance sampling approximation to achieve high... 

    PTO: A trust ontology for pervasive environments

    , Article 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008, Gino-wan, Okinawa, 25 March 2008 through 28 March 2008 ; 2008 , Pages 301-306 ; 1550445X (ISSN) ; 0769530966 (ISBN); 9780769530963 (ISBN) Taherian, M ; Jaili, R ; Amini, M ; Sharif University of Technology
    2008
    Abstract
    Traditionally, to handle security for stand-alone computers and small networks, user authentication and access control mechanisms would be almost enough. However, considering distributed networks such as the Internet and pervasive environments, these kinds of approaches confront with flexibility challenges and scalability problems. This is mainly because of that open environments lack a central control, and users in them are not predetermined, in such ubiquitous computing environments, issues concerning security and trust become crucial. Adding trust to the existing security infrastructures would enhance the security of these environments. Although many trust models have been proposed to... 

    Analysis of k-Neigh topology control protocol for wireless networks

    , Article 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008, Gino-wan, Okinawa, 25 March 2008 through 28 March 2008 ; 2008 , Pages 904-909 ; 1550445X (ISSN) ; 0769530966 (ISBN); 9780769530963 (ISBN) Nayebi, A ; Sarbazi Azad, H ; Alishahi, K ; Sharif University of Technology
    2008
    Abstract
    k-Neigh is a basic neighbor-based topology control protocol based on the construction of k-neighbor graph as logical communication graph. Although k-Neigh is based on a connectivity theory, several topological aspects of the constructed topology are not yet analytically investigated. In this paper, several topological properties of the constructed topology after execution of the protocol, including probability density function of the distance between each node to its ith neighbor, probability of unidirectional links after execution of the first phase of the protocol, average logical degree, and average final transmission range, are investigated analytically. Moreover, an extensive simulation... 

    A new supply chain distribution network design for two classes of customers using transfer recurrent neural network

    , Article International Journal of System Assurance Engineering and Management ; Volume 13, Issue 5 , 2022 , Pages 2604-2618 ; 09756809 (ISSN) Najjartabar Bisheh, M ; Nasiri, G. R ; Esmaeili, E ; Davoudpour, H ; Chang, S. I ; Sharif University of Technology
    Springer  2022
    Abstract
    Supply chain management integrates planning and controlling of materials, information, and finances in a process which begins from suppliers and ends with customers. Optimal planning decisions made in such a distribution network usually include transportation, facilities location, and inventory. This study presents a new approach for considering customers’ differentiation in an integrated location-allocation and inventory control model using transfer recurrent neural network (RNN). In this study, a location and allocation problem is integrated with inventory control decisions considering two classes of strategic and non-strategic customers. For the first time, a novel transfer RNN is applied...