Loading...
Search for: arithmetization
0.013 seconds
Total 65 records

    On The Existence of Arithmetic Progressions In Subsets of Integers

    , M.Sc. Thesis Sharif University of Technology Malekian, Reihaneh (Author) ; Alishahi, Kasra (Supervisor) ; Hatami, Omid (Supervisor)
    Abstract
    Suppose that A is a large subset of N. It is interesting to think about the arithmetic progressions in A.In 1936, Erdos and Turan conjectured that for > 0 and k 2 N, there exists N = N(k; ) that for all subsets A {1; 2; : : : ;N}, if lAl N, A has a nontrivial arithmetic progression of length k. Roth proved the conjecture for k = 3 in 1953. In 1969, Szemeredi proved the case k = 4 and in 1975, he gave a combinatorial proof for the general case. In 1977, using ergodic theory, Furstenberg gave a different proof for the Erdos-Turan conjecture (or Szemeredi Theorem!) and finally Gowers found another proof for the Szemeredi theorem, which was an elegant generalization of the Roth’s proof for k =... 

    The ∑ 1-Provability Logic of Intuitionistic Arithmetic

    , Ph.D. Dissertation Sharif University of Technology Mojtahedi, Mojtaba (Author) ; Ardeshir, Mohammad (Supervisor)
    Abstract
    In this dissertation, we study (first-order) arithmetical interpretations for propositional (modal and non-modal) logics. More precisely, the following results are included in this dissertation: an axiomatization for provability logic of Heyting Arithmetic, HA, and its self-completion HA := HA + PrHA(⌜A⌝) ! A for 1-substitutions is provided, and their arithmetical completeness theorems are proved. We also show that they are decidable. The de Jongh property for Basic Arithmetic BA, HA and HA + □ are proved  

    Aging Mitigation for Arithmetic and Logic Unit of a Processor

    , M.Sc. Thesis Sharif University of Technology Sharifi, Ferdous (Author) ; Hesabi, Shahin (Supervisor)
    Abstract
    Shrinking the dimensions of transistors in recent fabrication technologies has led to an increase in the aging rate of chips, as the most important challenge in reliability of new processors. Bias Temperature Instability (BTI) and Hot Carrier Injection (HCI) are amongst the most important adverse effect of transistor shrinkage. These two effects decrease the switching speed of transistors by increasing its threshold voltage over time. Threshold voltage shift causes timing violation in combinational parts of circuit and decreases the robustness of sequential parts against soft errors. Between different units of a processor, Arithmetic and Logic Unit (ALU) is one of the most susceptible units... 

    Optimization and Verification of Arithmetic Circuits under Different Levels of Abstraction

    , M.Sc. Thesis Sharif University of Technology Sarbishei, Omid (Author) ; Tabandeh, Mahmoud (Supervisor) ; Alizadeh, Bijan (Supervisor)
    Abstract
    Arithmetic circuits are considered as very important blocks of datapaths in microprocessor structures. Due to the high importance of these circuits, several optimization approaches in different levels of abstraction have been proposed for them. These approaches can be implemented by either software or manually by digital logic designers. As within this optimization process, specially, in manual approaches, the probability of introducing logic bugs in the circuit is high, it would then be necessary to make use of verification and debugging techniques for the designed circuits. One of the classic verification methods is simulation. This approach is not suitable for large designs and it does... 

    Existence of Arithmetic Progressions in Subsets of Natural Numbers

    , M.Sc. Thesis Sharif University of Technology Zareh Bidaki, Mojtaba (Author) ; Rastegar, Arash (Supervisor) ; Hatami Varzaneh, Omid (Supervisor)
    Abstract
    Szemeredi's theorem is one of the significant theorems in additive combinatorics which was started by Van Der Waerden's theorem in 1927. Erdos and Turan conjectured generalized versions of Van Der Waerden's theorem in several ways included Szemeredi's theorem. In 1975 Szemeredi proved the conjecture using complicated combinatorial methods. In 1977 H. Furstenberg proved Szemeredi's theorem via the Ergodic theory approach which led to prove polynomial Szemeredi's theorem and multi-dimensional Szemeredi's theorem. The Ergodic approach is the only known approach so far to these generalizations of this theorem which is named Ergodic Ramsey theory and led to some other problems in Ergodic theory... 

    Distributed Verifiable Computing: Algorithms and Analysis

    , M.Sc. Thesis Sharif University of Technology Rahimi, Ali (Author) ; Maddah Ali, Mohammad Ali (Supervisor)
    Abstract
    Zero knowledge proofs allow a person (prover) to convince another person (verifier) that he has performed a specific computation on a secret data correctly, and has obtained a true answer, without having to disclose the secret data. QAP (Quadratic Arithmetic Program) based zkSNARKs (zero knowledge Succinct Non-interactive Argument of Knowledge) are a type of zero knowledge proof. They have several properties that make them attractive in practice, e.g. verifier's work is very easy. So they are used in many areas such as Blockchain and cloud computing. But yet prover's work in QAP based zkSNARKs is heavy, therefore, it may not be possible for a prover with limited processing resource to run... 

    Designing a 32-Bit Fault-Tolerant ALU Using EDAC

    , M.Sc. Thesis Sharif University of Technology (Author) ; Vosughi Vahdat, Bijan (Supervisor) ; Mortazavi, Mohammad (Supervisor)
    Abstract

    Reliable communication has become very crucial in the transmission applications. Hence, to design hardware to handle reliability is the most important part of communication. In this work, we propose a new secured ALU (Arithmetic and Logic Unit) against fault attacks that is used in ARM processor which can correct any 5-bit error in any position of 32-bit input registers of ALU. We also designed a BCH (Bose, Chaudhuri, and Hocquenghem) codec (encoder, decoder) using the prototyping FPGA. Further, in this thesis we designed (63, 36) the BCH encoding and decoding system to tolerate the 5-bit faults. The codec system and ALU system are based on using Verilog description language. Since... 

    Tolerance Analysis of Mechanical Assemblies Based on Fuzzy Logic and Modal Interval Arithmetic

    , Ph.D. Dissertation Sharif University of Technology Khodaygan, Saeed (Author) ; Movahhedy, Mohammad Reza (Supervisor) ; Saadat Foumani, Mahmoud (Supervisor)
    Abstract
    In mechanical products, individual components are placed together in an assembly to deliver a certain function. The performance, quality and cost of product, selection of manufacturing process, measurement and inspection techniques, and the assemblability of the product are significantly affected by part tolerances. The dimensional and geometrical tolerances of individual parts accumulate and affect the functional requirements on the final assembly. Tolerance analysis is a key analytical tool for estimation of accumulating effects of the individual part tolerances on the functional requirements of a mechanical assembly. This thesis presents a new feature based method to tolerance analysis... 

    Frameworks for the Exploration and Implementation of Generalized Carry-Free Redundant Number Systems

    , Ph.D. Dissertation Sharif University of Technology Jaberipur, Ghassem (Author) ; Ghodsi, Mohammad (Supervisor) ; Parhami, Behrooz (Supervisor)
    Abstract
    Redundant number systems provide for carry-free arithmetic, where the result of arithmetic operations is achieved, in redundant format, without the need for latent carry propagation. However conversion of the result to a conventional nonredundant representation, always, requires carry propagation. Therefore, efficient use of redundant number systems is feasible when a series of arithmetic operations is to be performed before the need arises to obtain the result in a nonredundant representation. Redundant number systems have been used in several special purpose integrated designs (e.g., DSP applications) and also as intermediate number representation in complex arithmetic operations... 

    Provability Logic

    , M.Sc. Thesis Sharif University of Technology Aboolian, Narbe (Author) ; Behrostaghi, Mohammad Ardeshir (Supervisor)
    Abstract
    Provability Logic is the study of Peano Arithmetic from the point of provability. The ◻ of modal logic is interpreted as ”Provable in PA ”. Gödel’s technique of proof, in his incompleteness theorems, showed that meta-lingual sentences such as ”A is provable in PA ” can be expressed by sentences of object language. Studying provability in the system K4 will lead us to a soundness theorem but in 1976, Robert Solovay showed that if we add an axiom -known as Löb’s axiom- to the system K4, we will have a completeness theorem as well. So GL = K4 + Löb is the provability logic of PA. In this thesis we will study these theorems  

    Hierarchical set-associate cache for high-performance and low-energy architecture

    , Article Journal of Circuits, Systems and Computers ; Volume 15, Issue 6 , 2006 , Pages 861-880 ; 02181266 (ISSN) Zarandi, H. R ; Miremadi, G ; Sharif University of Technology
    2006
    Abstract
    This paper presents a new cache scheme based on varying the size of sets in the set-associative cache hierarchically. In this scheme, all sets at a hierarchical level have same size but are fc times more than the size of sets in the next level of hierarchy where k is called division factor. Therefore the size of tag fields associated to each set is variable and it depends on the hierarchy level of the set it is in. This scheme is proposed to achieve higher hit ratios with respect to the two conventional schemes namely set-associative and direct mapping. The proposed scheme has been simulated with several standard trace files SPEC 2000 and statistics are gathered and analyzed for different... 

    Investigating different circuit styles for digital circuits using organic transistors

    , Article 2007 International Symposium on Integrated Circuits, ISIC, Singapore, 26 September 2007 through 28 September 2007 ; 2007 , Pages 5-8 ; 1424407974 (ISBN); 9781424407972 (ISBN) Zamanlooy, B ; Ayatollahi, A ; Fakhraie, S. M ; Chahardori, M ; Sharif University of Technology
    2007
    Abstract
    In search of low cost and flexible substrates organic transistors have been suggested as an alternate to silicon transistors. Level 1 model extraction, investigating different circuit styles and proposing two new circuit styles for organic integrated circuits is done in this paper. First, level 1 model of organic transistor is found using ID-VDS characteristics of transistors reported by [9]. After that different design styles used in CMOS digital integrated circuits are reviewed and the functionality of these styles for organic integrated circuits is investigated. Two new circuit styles have been proposed in this section which have better performance for organic circuits comparing with... 

    Compact and secure design of masked AES S-box

    , Article 9th International Conference on Information and Communications Security, ICICS 2007, Zhengzhou, 12 December 2007 through 15 December 2007 ; Volume 4861 LNCS , 2007 , Pages 216-229 ; 03029743 (ISSN); 9783540770473 (ISBN) Zakeri, B ; Salmasizadeh, M ; Moradi, A ; Tabandeh, M ; Manzuri Shalmani, M. T ; Sharif University of Technology
    Springer Verlag  2007
    Abstract
    Composite field arithmetic is known as an alternative method for lookup tables in implementation of S-box block of AES algorithm. The idea is to breakdown the computations to lower order fields and compute the inverse there. Recently this idea have been used both for reducing the area in implementation of S-boxes and masking implementations of AES algorithm. The most compact design using this technique is presented by Canright using only 92 gates for an S-box block. In another approach, IAIK laboratory has presented a masked implementation of AES algorithm with higher security comparing common masking methods using Composite field arithmetic. Our work in this paper is to use basic ideas of... 

    Universal image steganalysis against spatial-domain steganography based on energy distribution of singular values

    , Article 7th International Conference on Information Technology and Application, ICITA 2011 ; 2011 , Pages 179-183 ; 9780980326741 (ISBN) Shojaei Hashemi, A ; Soltanian Zadeh, H ; Ghaemmagham, S ; Kamarei, M ; Sharif University of Technology
    Abstract
    A passive image steganalysis method is proposed to universally detect spatial-domain steganography schemes. It is shown to have better performance than universal steganalyzers known to be powerful in spatial domain, including the WFLogSv and the WAM methods. This level of accuracy is the result of improving the WFLogSv steganalyzer by considering a more comprehensive relationship between the singular values of each image block and the linear correlation of the rows and the columns. That is, instead of the closeness of the lower singular values to zero, the energy distribution of the singular values is investigated. An innovative measure is proposed for this investigation, which is inspired... 

    Aging-Aware context switching in multicore processors based on workload classification

    , Article IEEE Computer Architecture Letters ; Volume 19, Issue 2 , 2020 , Pages 159-162 Sharifi, F ; Rohbani, N ; Hessabi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    As transistor dimensions continue to shrink, long-term reliability threats, such as Negative Bias Temperature Instability, affect multicore processors lifespan. This letter proposes a load balancing technique, based on the rate of integer and floating-point instructions per workloads. This technique classifies workloads into integer-majority and floating-point-majority classes and migrates workloads among cores in order to relax the stressed execution units. The context switching feature of operating system is employed to reduce implementation and performance overheads of the proposed technique. According to the simulations, the proposed technique reduces the aging rate of a multicore... 

    The curious neglect of geometry in modern philosophies of mathematics

    , Article Logic, Epistemology, and the Unity of Science ; Volume 49 , 2021 , Pages 379-389 ; 22149775 (ISSN) Shahshahani, S ; Sharif University of Technology
    Springer Science and Business Media B.V  2021
    Abstract
    From ancient times to 19th century geometry symbolized the essence of mathematical thinking and method, but modern philosophy of mathematics seems to have marginalized the philosophical status of geometry. The roots of this transformation will be sought in the ascendance of logical foundations in place of intuitive primacy as the cornerstone of mathematical certainty in the late 19th century. Nevertheless, geometry and geometrical thinking, in multiple manifestations, have continued to occupy a central place in the practice of mathematics proper. We argue that this, together with advances in the neuroscience of mathematical processes, calls for an expansion of the present limited remit of... 

    A formal approach for debugging arithmetic circuits

    , Article IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ; Volume 28, Issue 1 , 2009 , Pages 742-754 ; 02780070 (ISSN) Sarbishei, O ; Tabandeh, M ; Alizadeh, B ; Fujita, M ; Sharif University of Technology
    2009
    Abstract
    This paper presents a novel automatic debugging algorithm for a postsynthesis combinational arithmetic circuit. The approach is robust under wide varieties of arithmetic circuit architectures and design optimizations. The debugging algorithm in this paper consists of three phases of partial product initialization, XOR extraction, and carry-signalmapping. The run-time complexity of conventional carry-signal-mapping algorithms, such as the approach described by Stoffel and Kunz, is exponential. However, in the proposed algorithm, by making use of some important design issues, we categorize the extracted XORs into half/full-adders to make a very fast debugging algorithm. This approach is robust... 

    A formal approach for debugging arithmetic circuits

    , Article IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ; Volume 28, Issue 5 , 2009 , Pages 742-754 ; 02780070 (ISSN) Sarbishei, O ; Tabandeh, M ; Alizadeh, B ; Fujita, M ; Sharif University of Technology
    2009
    Abstract
    This paper presents a novel automatic debugging algorithm for a postsynthesis combinational arithmetic circuit. The approach is robust under wide varieties of arithmetic circuit architectures and design optimizations. The debugging algorithm in this paper consists of three phases of partial product initialization, xor extraction, and carry-signal mapping. The run-time complexity of conventional carry-signal-mapping algorithms, such as the approach described by Stoffel and Kunz, is exponential. However, in the proposed algorithm, by making use of some important design issues, we categorize the extracted xors into half/full-adders to make a very fast debugging algorithm. This approach is... 

    Arithmetic circuits verification without looking for internal equivalences

    , Article 2008 6th ACM and IEEE International Conference on Formal Methods and Models for Co-Design, MEMOCODE'08, Anaheim, CA, 5 June 2008 through 7 June 2008 ; 2008 , Pages 7-16 ; 9781424424177 (ISBN) Sarbishei, O ; Alizadeh, B ; Fujita, M ; Sharif University of Technology
    2008
    Abstract
    In this paper, we propose a novel approach to extract a network of half adders from the gate-level net-list of an addition circuit while no internal equivalences exist. The technique begins with a gatelevel net-list and tries to map it into word-level adders based on an efficient bit-level adder representation. It will be shown that the proposed technique is suitable for several gate-level architectures of multipliers, as it extracts adder components in a step-wise method. This approach can also be generalized to other arithmetic circuits. In order to evaluate the effectiveness of our approach, we run it on several arithmetic circuits and compare experimental results with those of... 

    Simulation and improvement of two digital adaptive frequency calibration techniques for fast locking wide-band frequency synthesizers

    , Article 2007 International Conference on Design and Technology of Integrated Systems in Nanoscale Era, DTIS 2007, Rabat, 2 September 2007 through 5 September 2007 ; February , 2007 , Pages 136-141 ; 1424412781 (ISBN); 9781424412785 (ISBN) Saadat, M. R ; Momtazpour, M ; Alizadeh, B ; Sharif University of Technology
    2007
    Abstract
    Fast locking PLL-based wide-band frequency synthesizers used in high performance RF transceivers often require multi-band voltage controlled oscillator (VCO). These types of frequency synthesizers employ both discrete and continuous tuning mechanisms to satisfy wide frequency range and low VCO tuning gain simultaneously. To facilitate discrete tuning mechanisms, an auxiliary digital loop is required in order to select proper band of VCO. This digital loop is called adaptive frequency calibration (AFC). In this paper two methods of previous AFC architectures are discussed and improved to gain the minimum possible lock time of PLL. Then, these two methods are simulated and implemented over...