Loading...
Search for:
benchmarking
0.011 seconds
Total 190 records
Control of the Activated Sludge System Using Neural Network Model Predictive Control
, M.Sc. Thesis Sharif University of Technology ; Shaygan Salek, Jalaloddin (Supervisor)
Abstract
Activated sludge systems are widespread biological wastewater treatment systems that have a very complex and nonlinear dynamics with a wide range of time constants and, as a consequence, are difficult to model and control. On the other hand, using neural networks as function approximators has provided a reliable tool for modeling complex dynamic systems like activated sludge. In this study a multi-input multi-output neural network model predictive controller (NNMPC) is developed and tested based on the basic control strategy of a benchmark simulation model (called BSM1) suggested by european co-operation in the field of science and technical research (COST) actions 682/624. The controller...
, M.Sc. Thesis Sharif University of Technology ; Bakhshi, Ali (Supervisor)
Abstract
To verify most of the numerical and analytical developments in the structural and earthquake engineering techniques, experimental methods have been considered by many researchers. For instance, numerical simulations in structural health monitoring, structural control and energy dissipation systems need to be verified and compared with experimental results. Consequently, research organizations spend substantial budgets on assessing and updating these experimental methods. Many of these experimental tests are essentially conducted on the benchmark structures with specific technical characteristics; these properties should not be changed after each experiment. Therefore, the tests on these...
New Generation of On-purpose Attacks for Evaluating Digital Image Watermarking Methods by Preserving the Image Quality
, Ph.D. Dissertation Sharif University of Technology ; Jamzad, Mansour (Supervisor)
Abstract
Up to now, compared with the comprehensive research for developing robust watermarking algorithms, no equal attention has been devoted to the proposition of benchmarks tailored to assess the watermark robustness. In addition, almost all the state of the art benchmarks only integrate a number of common image processing operations like geometrical transformations to remove watermarks. However, the quality of the processed image is often too degraded to permit further commercial exploitation. Moreover, to the best of our knowledge, the design of these tools does not take into account the statistical properties of the images and watermarks in the design of attacks. In spite of the significant...
Single-Cell RNA-seq Dropout Imputation and Noise Reduction by Machine Learning
, M.Sc. Thesis Sharif University of Technology ; Soleymani Baghshah, Mahdih (Supervisor) ; Sharifi Zarchi, Ali (Supervisor) ; Goodarzi, Hani (Co-Supervisor)
Abstract
Single-cell RNA sequencing (scRNA-seq) technologies have empowered us to study gene expressions at the single-cell resolution. These technologies are developed based on barcoding of single cells and sequencing of transcriptome using next-generation sequencing technologies. Achieving this single-cell resolution is specially important when the target population is complex or heterogeneous, which is the case for most biological samples, including tissue samples and tumor biopsies.Single-cell technologies suffer from high amounts of noise and missing values, generally known as dropouts. This complexity can affect a number of key downstream analyses such as differential expression analysis,...
Improving CPU-GPU System Performance Through Dynamic Management of LLC and NoC
, M.Sc. Thesis Sharif University of Technology ; Sarbazi Azad, Hamid (Supervisor)
Abstract
CPU-GPU Heterogeneous System Architectures (HSA) play an important role in today's computing systems. Because of fast-growing in technology and the necessity of high-performance computing, HSAs are widely used platforms. Integrating the multi-core Central Processing Unit (CPU) with many-core Graphics Processing Unit (GPU) on the same die combines the feature of both processors and providing better performance. The capacity of HSAs to provide high throughput of computing led to the widespread use of these systems. Besides the high performance of HSAs, we also face challenges. These challenges are caused by the use of two processors with different behaviors and requirements on the same die....
Yield-driven design-time task scheduling techniques for multi-processor system on chips under process variation: A comparative study
, Article IET Computers and Digital Techniques ; Volume 9, Issue 4 , 2015 , Pages 221-229 ; 17518601 (ISSN) ; Assare, O ; Rahmati, N ; Boroumand, A ; Barati, S ; Goudarzi, M ; Sharif University of Technology
Institution of Engineering and Technology
2015
Abstract
Process variation has already emerged as a major concern in design of multi-processor system on chips (MPSoC). In recent years, there have been several attempts to bring variability awareness into the task scheduling process of embedded MPSoCs to improve performance yield. This study attempts to provide a comparative study of the current variation-aware design-time task and communication scheduling techniques that target embedded MPSoCs. To this end, the authors first use a sign-off variability modelling framework to accurately estimate the frequency distribution of MPSoC components. The task scheduling methods are then compared in terms of both the quality of the final solution and the...
Wind farm power output optimization using cooperative control methods
, Article Wind Energy ; 2020 ; Nobakhti, A ; Abdolahi, A ; Sharif University of Technology
John Wiley and Sons Ltd
2020
Abstract
We study the application of cooperative control and game theoretic approaches to wind farm optimization. The conventional (greedy) wind farm control strategy seeks to individually maximize each turbine power. However, this strategy does not maximize the overall power production of wind farms due to the aerodynamic interactions (wake effect) between the turbines. We formulate the wind farm power optimization problem as an identical interest game which can also be used to solve other cooperative control problems. Two model-free learning algorithms are developed to obtain the optimal axial induction factors of the turbines and maximize power production. The algorithms are simulated for a...
Wind farm power output optimization using cooperative control methods
, Article Wind Energy ; Volume 24, Issue 5 , 2021 , Pages 502-514 ; 10954244 (ISSN) ; Nobakhti, A ; Abdolahi, A ; Sharif University of Technology
John Wiley and Sons Ltd
2021
Abstract
We study the application of cooperative control and game theoretic approaches to wind farm optimization. The conventional (greedy) wind farm control strategy seeks to individually maximize each turbine power. However, this strategy does not maximize the overall power production of wind farms due to the aerodynamic interactions (wake effect) between the turbines. We formulate the wind farm power optimization problem as an identical interest game which can also be used to solve other cooperative control problems. Two model-free learning algorithms are developed to obtain the optimal axial induction factors of the turbines and maximize power production. The algorithms are simulated for a...
Voice quality measurement in a typical router-based network
, Article 32nd IEEE Conference on Local Computer Networks, LCN 2007, Dublin, 15 October 2007 through 18 October 2007 ; 2007 , Pages 274-275 ; 0769530001 (ISBN); 9780769530000 (ISBN) ; Jahangir, A. H ; Sharif University of Technology
2007
Abstract
In this paper, we introduce novel mechanisms for measuring and evaluating the performance of a network and its devices, configured especially for Voice over IP (VoIP). We study the effects of different configurations on final voice quality by enabling or changing the related equipment features. In our study we quantify quality changes based on different router configurations and discuss precisely to what extent and how much this quality is improved versus features or special configurations of network devices. These results can be used for two purposes: compare and benchmark different routers in order to know which one is proper for a typical VoIP network, and select the best configurations....
Vibration suppression of offshore wind turbine foundations using tuned liquid column dampers and tuned mass dampers
, Article Ocean Engineering ; Volume 172 , 2019 , Pages 286-295 ; 00298018 (ISSN) ; Oterkus, E ; Khorasanchi, M ; Sharif University of Technology
Elsevier Ltd
2019
Abstract
Highly dynamic nature of the applied loads on flexible and lightly damped offshore wind turbine (OWT) foundations affects the lifetime and serviceability of the system. In this study, the excessive vibration responses of OWTs are minimized using tuned mass dampers (TMD) and tuned liquid column dampers (TLCD). Due to high efficiency of TLCDs and TMDs for certain loading conditions, a combined TLCD-TMD is also utilized to improve the overall performance in a wide range of loading conditions. First, a parametric study was performed that highlights the sensitivity of these structural control devices. The effect of two devices on fixed offshore wind turbine foundations for the benchmark 5 MW NREL...
Using partial tag comparison in low-power snoop-based chip multiprocessors
, Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 19 June 2010 through 23 June 2010 ; Volume 6161 LNCS , June , 2012 , Pages 211-221 ; 03029743 (ISSN) ; 9783642243219 (ISBN) ; Shahidi, N ; Baniasadi, A ; Sharif University of Technology
Abstract
In this work we introduce power optimizations relying on partial tag comparison (PTC) in snoop-based chip multiprocessors. Our optimizations rely on the observation that detecting tag mismatches in a snoop-based chip multiprocessor does not require aggressively processing the entire tag. In fact, a high percentage of cache mismatches could be detected by utilizing a small subset but highly informative portion of the tag bits. Based on this, we introduce a source-based snoop filtering mechanism referred to as S-PTC. In S-PTC possible remote tag mismatches are detected prior to sending the request. We reduce power as S-PTC prevents sending unnecessary snoops and avoids unessential tag lookups...
Two-phase prediction of L1 data cache misses
, Article IEE Proceedings: Computers and Digital Techniques ; Volume 153, Issue 6 , 2006 , Pages 381-388 ; 13502387 (ISSN) ; Jahangir, A. H ; Sharif University of Technology
2006
Abstract
Hardware prefetching schemes which divide the misses into streams are generally preferred to other hardware based schemes. But, as they do not know when the next miss of a stream happens, they cannot prefetch a block in appropriate time. Some of them use a substantial amount of hardware storage to keep the predicted miss blocks from all streams. The other approaches follow the program flow and prefetch all target addresses including those blocks which already exist in the L1 data cache. The approach presented predicts the stream of next miss and then prefetches only the next miss address of the stream. It offers a general prefetching framework, two-phase prediction algorithm (TPP), that lets...
Towards IoT-driven predictive business process analytics
, Article 2020 International Conference on Omni-layer Intelligent Systems, COINS 2020, 31 August 2020 through 2 September 2020 ; 2020 ; Ansari, A ; Farahani, B ; Aliee, F. S ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2020
Abstract
Predictive business process monitoring is concerned with predicting the process-related Key Performance Indicators (KPIs) and forecasting the future behavior of the process in realtime. Despite the amount of work contributed by researches to this field of research, the performance of existing solutions is not desirable for practical settings. Indeed, these approaches are typically context-unaware and lack generality. However, in real-life use cases, business processes are not isolated from the surrounding working environment, and thus they are influenced by many contextual events, such as events generated by IoT devices. To the best of our knowledge, there is no comprehensive study...
Towards improving robustness of deep neural networks to adversarial perturbations
, Article IEEE Transactions on Multimedia ; Volume 22, Issue 7 , 2020 , Pages 1889-1903 ; Ghaemmaghami, S ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2020
Abstract
Deep neural networks have presented superlative performance in many machine learning based perception and recognition tasks, where they have even outperformed human precision in some applications. However, it has been found that human perception system is much more robust to adversarial perturbation, as compared to these artificial networks. It has been shown that a deep architecture with a lower Lipschitz constant can generalize better and tolerate higher level of adversarial perturbation. Smooth regularization has been proposed to control the Lipschitz constant of a deep architecture and in this work, we show how a deep convolutional neural network (CNN), based on non-smooth regularization...
Towards dark silicon era in FPGAs using complementary hard logic design
, Article Conference Digest - 24th International Conference on Field Programmable Logic and Applications, FPL 2014 ; Sept , 2014 , pp. 1 - 6 ; ISBN: 9783000446450 ; Khaleghi, B ; Ebrahimi, Z ; Asadi, H ; Tahoori, M. B ; Sharif University of Technology
Abstract
While the transistor density continues to grow exponentially in Field-Programmable Gate Arrays (FPGAs), the increased leakage current of CMOS transistors act as a power wall for the aggressive integration of transistors in a single die. One recently trend to alleviate the power wall in FPGAs is to turn off inactive regions of the silicon die, referred to as dark silicon. This paper presents a reconfigurable architecture to enable effective fine-grained power gating of unused Logic Blocks (LBs) in FPGAs. In the proposed architecture, the traditional soft logic is replaced with Mega Cells (MCs), each consists of a set of complementary Generic Reconfigurable Hard Logic (GRHL) and a conventional...
TooT: An efficient and scalable power-gating method for NoC routers
, Article 10th IEEE/ACM International Symposium on Networks-on-Chip, NOCS 2016, 31 August 2016 through 2 September 2016 ; 2016 ; 9781467390309 (ISBN) ; Taram, M ; Khaleghi, B ; Hessabi, S ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2016
Abstract
With the advent in technology and shrinking the transistor size down to nano scale, static power may become the dominant power component in Networks-on-Chip (NoCs). Powergating is an efficient technique to reduce the static power of under-utilized resources in different types of circuits. For NoC, routers are promising candidates for power gating, since they present high idle time. However, routers in a NoC are not usually idle for long consecutive cycles due to distribution of resources in NoC and its communication-based nature, even in low network utilizations. Therefore, power-gating loses its efficiency due to performance and power overhead of the packets that encounter powered-off...
Three self-adaptive multi-objective evolutionary algorithms for a triple-objective project scheduling problem
, Article Computers and Industrial Engineering ; Volume 87 , September , 2015 , Pages 4-15 ; 03608352 (ISSN) ; Najafi, A. A ; Niaki, S. T. A ; Sharif University of Technology
Elsevier Ltd
2015
Abstract
Finding a Pareto-optimal frontier is widely favorable among researchers to model existing conflict objectives in an optimization problem. Project scheduling is a well-known problem in which investigating a combination of goals eventuate in a more real situation. Although there are many different types of objectives based on the situation on hand, three basic objectives are the most common in the literature of the project scheduling problem. These objectives are: (i) the minimization of the makespan, (ii) the minimization of the total cost associated with the resources, and (iii) the minimization of the variability in resources usage. In this paper, three genetic-based algorithms are proposed...
The visual object tracking VOT2013 challenge results
, Article Proceedings of the IEEE International Conference on Computer Vision ; 2013 , Pages 98-111 ; 9781479930227 (ISBN) ; Pflugfelder, R ; Leonardis, A ; Matas, J ; Porikli, F ; Čehovin, L ; Nebehay, G ; Fernandez, G ; Vojíř, T ; Gatt, A ; Khajenezhad, A ; Salahledin, A ; Soltani-Farani, A ; Zarezade, A ; Petrosino, A ; Milton, A ; Bozorgtabar, B ; Li, B ; Chan, C. S ; Heng, C ; Ward, D ; Kearney, D ; Monekosso, D ; Karaimer, H. C ; Rabiee, H. R ; Zhu, J ; Gao, J ; Xiao, J ; Zhang, J ; Xing, J ; Huang, K ; Lebeda, K ; Cao, L ; Maresca, M. E ; Lim, M. K ; ELHelw, M ; Felsberg, M ; Remagnino, P ; Bowden, R ; Goecke, R ; Stolkin, R ; Lim, S. Y. Y ; Maher, S ; Poullot, S ; Wong, S ; Satoh, S ; Chen, W ; Hu, W ; Zhang, X ; Li, Y ; Niu, Z ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2013
Abstract
Visual tracking has attracted a significant attention in the last few decades. The recent surge in the number of publications on tracking-related problems have made it almost impossible to follow the developments in the field. One of the reasons is that there is a lack of commonly accepted annotated data-sets and standardized evaluation protocols that would allow objective comparison of different tracking methods. To address this issue, the Visual Object Tracking (VOT) workshop was organized in conjunction with ICCV2013. Researchers from academia as well as industry were invited to participate in the first VOT2013 challenge which aimed at single-object visual trackers that do not apply...
The ODYSSEY approach to early simulation-based equivalence checking at ESL level using automatically generated executable transaction-level model
, Article Microprocessors and Microsystems ; Volume 32, Issue 7 , 2008 , Pages 364-374 ; 01419331 (ISSN) ; Hessabi, S ; MohammadZadeh, N ; Zainolabedini, N ; Sharif University of Technology
2008
Abstract
Design technology is expected to rise to electronic system-level (ESL). This necessitates new techniques and tools for synthesizing ESL designs and for verifying them before and after ESL synthesis. A promising verification strategy for future very complex designs is to initially verify the design at the highest level of abstraction, and then check the equivalence of the lower level automatically generated models against that initial golden model. We present one such approach to simulation-based functional verification implemented in our ESL design methodology called ODYSSEY. Our ESL synthesis tool generates a transaction-level model (TLM) at TLM level 2 (i.e., design with partial timing)...
The henry problem: New semianalytical solution for velocity-dependent dispersion
, Article Water Resources Research ; Volume 52, Issue 9 , 2016 , Pages 7382-7407 ; 00431397 (ISSN) ; Ataie Ashtiani, B ; Younes, A ; Simmons, C. T ; Ackerer, P ; Sharif University of Technology
Blackwell Publishing Ltd
2016
Abstract
A new semianalytical solution is developed for the velocity-dependent dispersion Henry problem using the Fourier-Galerkin method (FG). The integral arising from the velocity-dependent dispersion term is evaluated numerically using an accurate technique based on an adaptive scheme. Numerical integration and nonlinear dependence of the dispersion on the velocity render the semianalytical solution impractical. To alleviate this issue and to obtain the solution at affordable computational cost, a robust implementation for solving the nonlinear system arising from the FG method is developed. It allows for reducing the number of attempts of the iterative procedure and the computational cost by...