Loading...
Search for: evaluation-results
0.009 seconds
Total 42 records

    Cepstral-domain HMM-based speech enhancement using vector Taylor series and parallel model combination

    , Article 2012 11th International Conference on Information Science, Signal Processing and their Applications, ISSPA 2012, 2 July 2012 through 5 July 2012 ; July , 2012 , Pages 298-303 ; 9781467303828 (ISBN) Veisi, H ; Sameti, H ; Sharif University of Technology
    2012
    Abstract
    Speech enhancement problem using hidden Markov model (HMM) and minimum mean square error (MMSE) in cepstral domain is studied. This noise reduction approach can be considered as weighted-sum filtering of the noisy speech signal in which the filters weights are estimated using the HMM of noisy speech. To have an accurate estimation of the noisy speech HMM, vector Taylor series (VTS) is proposed and compared with the parallel model combination (PMC) technique. Furthermore, proposed cepstral-domain HMM-based speech enhancement systems are compared with the renowned autoregressive HMM (AR-HMM) approach. The evaluation results confirm the superiority of the cepstral domain approach in comparison... 

    3D-DPS: An efficient 3D-CAC for reliable data transfer in 3D ICs

    , Article Proceedings - 2016 12th European Dependable Computing Conference, EDCC 2016, 5 September 2016 through 9 September 2016 ; 2016 , Pages 97-107 ; 9781509015825 (ISBN) Shirmohammadi, Z ; Rohbani, N ; Miremadi, S. G ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Migration to Three Dimensional Integrated Circuits (3D ICs) can provide higher scalability, higher throughput, and lower power consumption with respect to Two Dimensional Integrated Circuits (2D ICs). Also, the latency bottleneck of interconnections in 2D ICs is efficiently solved in 3D ICs. This is due to the use of Through-Silicon-Vias (TSVs) in the communication structure of 3D ICs. TSVs are among the efficient fabrication mechanisms that connect stacked layers in 3D ICs. However, proximity and large size of TSVs make them highly prone to crosstalk faults. Crosstalk faults can cause mutual undesired influences between TSVs and thus seriously threat the reliability of data transfer on... 

    An efficient numerical-based crosstalk avoidance codec design for NoCs

    , Article Microprocessors and Microsystems ; Volume 50 , 2017 , Pages 127-137 ; 01419331 (ISSN) Shirmohammadi, Z ; Mozafari, F ; Miremadi, S .G ; Sharif University of Technology
    Elsevier B.V  2017
    Abstract
    With technology scaling, crosstalk fault has become a serious problem in reliable data transfer through Network on Chip (NoC) channels. The effects of crosstalk fault depend on transition patterns appearing on the wires of NoC channels. Among these patterns, Triplet Opposite Direction (TOD) imposes the worst crosstalk effects. Crosstalk Avoidance Codes (CACs) are the overhead-efficient mechanisms to tackle TODs. The main problem of CACs is their high imposed overheads to NoC routers. To solve this problem, this paper proposes an overhead-efficient coding mechanism called Penultimate-Subtracted Fibonacci (PS-Fibo) to alleviate crosstalk faults in NoC wires. PS-Fibo coding mechanism benefits... 

    An efficient and low power one-lambda crosstalk avoidance code design for network on chips

    , Article Microprocessors and Microsystems ; Volume 63 , 2018 , Pages 36-45 ; 01419331 (ISSN) Shirmohammadi, Z ; Mahdavi, Z ; Sharif University of Technology
    Abstract
    Crosstalk faults occurring in wires of Networks on Chip (NoCs) can seriously threaten the reliability of data transfer. One efficient way to tackle crosstalk faults is numeral-based Crosstalk Avoidance Codes (CACs). Numeral-based CACs reduce crosstalk faults by preventing specific transition patterns to occur. One-Lambda Codes (OLCs) are the most efficient types of CACs. However, the codec of OLCs imposes overheads including power consumption, critical path and area occupation to the routers of NoCs. To find overhead-efficient OLCs, this paper proposes an Algorithm for Generating OLC Numeral systems (AGON). AGON provides a tradeoff for designers in selecting overhead-efficient OLCs. Using... 

    Noise reduction of speech signal using bayesian state-space Kalman filter

    , Article 2013 19th Asia-Pacific Conference on Communications, APCC 2013 ; August , 2013 , Pages 545-549 ; 9781467360500 (ISBN) Sarafnia, A ; Ghorshi, S ; Sharif University of Technology
    IEEE Computer Society  2013
    Abstract
    The noise exists in almost all environments such as cellular mobile telephone systems. Various types of noise can be introduced such as speech additive noise which is the main factor of degradation in perceived speech quality. At some applications for example at the receiver of a telecommunication system, the direct value of interfering noise is not available and there is just access to noisy speech. In these cases the noise cannot be cancelled totally but it may be possible to reduce the noise in a sensible way by utilizing the statistics of the noise and speech signal. In this paper the proposed method for noise reduction is Bayesian recursive state-space Kalman filter, which is a method... 

    PLCDefender: Improving remote attestation techniques for PLCs using physical model

    , Article IEEE Internet of Things Journal ; 2020 Salehi, M ; Bayat Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    In order to guarantee the security of industrial control system (ICS) processes, the proper functioning of the programmable logic controllers (PLCs) must be ensured. In particular, cyber-attacks can manipulate the PLC control logic program and cause terrible damage that jeopardize people’s life when bringing the state of the critical system into an unreliable state. Unfortunately, no remote attestation technique has yet been proposed that can validate the PLC control logic program using a physics-based model that demonstrates device behavior. In this paper, we propose PLCDefender, a mitigation method that combines hybrid remote attestation technique with a physics-based model to preserve the... 

    HAL-RD: Cross-correlating heterogeneous alerts and logs using resource dependencies

    , Article 35th Annual ACM Symposium on Applied Computing, SAC 2020, 30 March 2020 through 3 April 2020 ; 2020 , Pages 1726-1735 Safarzadeh, M ; Abadi, M ; Nowroozi, A ; ACM Special Interest Group on Applied Computing (SIGAPP) ; Sharif University of Technology
    Association for Computing Machinery  2020
    Abstract
    Many organizations today use a variety of security and monitoring tools at various levels of defense. These tools often generate heterogeneous alerts and logs when an attack occurs. Because of the large volume and dispersion of these alerts and logs, the manual cross-correlation of them is a time-consuming and labor-intensive task. The main challenge is that heterogeneous alerts and logs generated as a result of an attack stage do not necessarily have common features, or there are no explicit relationships between them that can be used for cross-correlation. In this paper, we overcome this deficiency by presenting HAL-RD, a novel technique that uses resource dependencies to cross-correlate... 

    Objective function: a key contributor in internet of things primitive properties

    , Article CSI International Symposium on Real-Time and Embedded Systems and Technologies, RTEST 2018 ; 26 June , 2018 , Pages 39-46 ; 9781538614754 (ISBN) Safaei, B ; Hosseini Monazzah, A. M ; Shahroodi, T ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    With the widespread use of Internet of Things (IoT) in every aspect of human's daily life, communications of such an enormous amount of existing embedded devices in these systems arise many new challenges from power consumption, performance, and reliability perspectives. Communications in an IoT infrastructure are managed by a set of policies which are determined by Objective Functions (OFs). Thus, OFs are the most important contributors in facing with the mentioned challenges. In this paper, due to the lack of information on how OFs affect the primary properties of an IoT infrastructure, we have compared three well-known OFs (OF0, MRHOF, and OFFL) from power consumption, performance, and... 

    Pedal: Power-delay product objective function for internet of things applications

    , Article 34th Annual ACM Symposium on Applied Computing, SAC 2019, 8 April 2019 through 12 April 2019 ; Volume Part F147772 , 2019 , Pages 892-895 ; 9781450359337 (ISBN) Safaei, B ; Mohammad Salehi, A. A ; Shirbeigi, M ; Hosseini Monazzah, A. M ; Ejlali, A ; ACM Special Interested Group on Applied Computing ; Sharif University of Technology
    Association for Computing Machinery  2019
    Abstract
    The increasing trend in the number of smart connected devices has turned the routing procedure as one of the major challenges in IoT infrastructures. The Routing Protocol for Low Power and Lossy Networks (RPL) was introduced to satisfy different IoT application requirements through Objective Functions (OF). Although there have been several studies on introducing new OFs in order to fulfill specific IoT characteristics, e.g., energy and delay efficiency, reliability, and stability, but still there is a lack of novel OFs which fulfill the IoT application requirements in terms of both, the performance and the power consumption simultaneously. In this paper, we have proposed PEDAL, an OF which... 

    Pedal: Power-delay product objective function for internet of things applications

    , Article 34th Annual ACM Symposium on Applied Computing, SAC 2019, 8 April 2019 through 12 April 2019 ; Volume Part F147772 , 2019 , Pages 892-895 ; 9781450359337 (ISBN) Safaei, B ; Mohammad Salehi, A. A ; Shirbeigi, M ; Hosseini Monazzah, A. M ; Ejlali, A ; ACM Special Interested Group on Applied Computing ; Sharif University of Technology
    Association for Computing Machinery  2019
    Abstract
    The increasing trend in the number of smart connected devices has turned the routing procedure as one of the major challenges in IoT infrastructures. The Routing Protocol for Low Power and Lossy Networks (RPL) was introduced to satisfy different IoT application requirements through Objective Functions (OF). Although there have been several studies on introducing new OFs in order to fulfill specific IoT characteristics, e.g., energy and delay efficiency, reliability, and stability, but still there is a lack of novel OFs which fulfill the IoT application requirements in terms of both, the performance and the power consumption simultaneously. In this paper, we have proposed PEDAL, an OF which... 

    ELITE: An elaborated cross-layer rpl objective function to achieve energy efficiency in internet-of-things devices

    , Article IEEE Internet of Things Journal ; Volume 8, Issue 2 , 2021 , Pages 1169-1182 ; 23274662 (ISSN) Safaei, B ; Hosseini Monazzah, A. M ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Energy consumption is a major challenge in IoT devices, which was aimed to be improved by employing energy-efficient objective functions (OFs) in the structure of the RPL routing protocol. Meanwhile, the majority of the existing OFs mainly perform the parent selection based on the gathered information from the routing layer. Nevertheless, based on our investigations, there exists a series of transmission operations in the medium access control (MAC) layer, which significantly affects the energy consumption in IoT devices. Therefore, in this article, we propose ELITE, an energy-efficient cross-layer OF, which introduces a novel routing metric, called strobe per packet ratio (SPR). SPR... 

    Improving MLC PCM performance through relaxed write and read for intermediate resistance levels

    , Article ACM Transactions on Architecture and Code Optimization ; Volume 15, Issue 1 , 2018 ; 15443566 (ISSN) Rashidi, S ; Jalili, M ; Sarbazi Azad, H ; Sharif University of Technology
    Association for Computing Machinery  2018
    Abstract
    Phase Change Memory (PCM) is one of the most promising candidates to be used at the main memory level of the memory hierarchy due to poor scalability, considerable leakage power, and high cost/bit of DRAM. PCM is a new resistive memory that is capable of storing data based on resistance values. The wide resistance range of PCM allows for storing multiple bits per cell (MLC) rather than a single bit per cell (SLC). Unfortunately, higher density of MLC PCM comes at the expense of longer read/write latency, higher soft error rate, higher energy consumption, and earlier wearout compared to the SLC PCM. Some studies suggest removing the most error-prone level to mitigate soft error and write... 

    Coincidence based mapping extraction with genetic algorithms

    , Article 3rd International Conference on Web Information Systems and Technologies, Webist 2007, Barcelona, 3 March 2007 through 6 March 2007 ; Volume WIA , 2007 , Pages 176-183 Qazvinian, V ; Abolhassani, H ; Haeri, S. H ; Sharif University of Technology
    2007
    Abstract
    Ontology Aligning is an answer to the problem of handling heterogenous information on different domains. After application of some measures, one reaches a set of similarity values. The final goal is to extract mappings. Our contribution is to introduce a new genetic algorithm (GA) based extraction method. The GA, employs a structured based weighting model, named "coincidence based model", as its fitness function. In the first part of the paper, some preliminaries and notations are given and then we introduce the coincidence based weighting. In the second part the paper discusses the details of the devised GA with the evaluation results for a sample dataset  

    Markhor: malware detection using fuzzy similarity of system call dependency sequences

    , Article Journal of Computer Virology and Hacking Techniques ; Volume 18, Issue 2 , 2022 , Pages 81-90 ; 22638733 (ISSN) Mohammadzade Lajevardi, A ; Parsa, S ; Amiri, M. J ; Sharif University of Technology
    Springer-Verlag Italia s.r.l  2022
    Abstract
    Static malware detection approaches are time-consuming and cannot deal with code obfuscation techniques. Dynamic malware detection approaches, on the other hand, address these two challenges, however, suffer from behavioral ambiguity, such as the system calls obfuscation. In this paper, we introduce Markhor, a dynamic and behavior-based malware detection approach. Markhor uses system call data dependency and system call control dependency sequences to create a weighted list of malicious patterns. The list is then used to determine the malicious processes. Next, the similarity of a file system call sequences to a malicious pattern is extracted based on a fuzzy algorithm and the file nature is... 

    Dynamic time warping-based features with class-specific joint importance maps for action recognition using kinect depth sensor

    , Article IEEE Sensors Journal ; Volume 21, Issue 7 , 2021 , Pages 9300-9313 ; 1530437X (ISSN) Mohammadzade, H ; Hosseini, S ; Rezaei Dastjerdehei, M. R ; Tabejamaat, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    This paper proposes a novel 3D action recognition technique that uses time-series information extracted from depth image sequences for use in systems of human daily activity monitoring. To this end, each action is represented as a multi-dimensional time series, where each dimension represents the position variation of one skeleton joint over time. The time series is then mapped onto a vector space using Dynamic Time Warping (DTW) distance. Furthermore, to employ the correlation-distinctiveness relationship of the sequences in recognition, this vector space is remapped onto a discriminative space using the regularized Fisher method, where final decisions about the actions are made. Unlike... 

    3D hand pose estimation using RGBD images and hybrid deep learning networks

    , Article Visual Computer ; 2021 ; 01782789 (ISSN) Mofarreh Bonab, M ; Seyedarabi, H ; Mozaffari Tazehkand, B ; Kasaei, S ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2021
    Abstract
    Hand pose estimation is one of the most attractive research areas for image processing. Among the human body parts, hands are particularly important for human–machine interactions. The advent of commercial depth cameras along with the rapid growth of deep learning has made great progress in all image processing fields, especially in hand pose estimation. In this study, using depth data, we introduce two hybrid deep neural networks to estimate 3D hand poses with fewer computations and higher accuracy compared with their counterparts. Due to the fact that the dimensions of data are reduced while passing through successive layers of networks, which causes data to be lost, we use the concept of... 

    3D hand pose estimation using RGBD images and hybrid deep learning networks

    , Article Visual Computer ; Volume 38, Issue 6 , 2022 , Pages 2023-2032 ; 01782789 (ISSN) Mofarreh Bonab, M ; Seyedarabi, H ; Mozaffari Tazehkand, B ; Kasaei, S ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2022
    Abstract
    Hand pose estimation is one of the most attractive research areas for image processing. Among the human body parts, hands are particularly important for human–machine interactions. The advent of commercial depth cameras along with the rapid growth of deep learning has made great progress in all image processing fields, especially in hand pose estimation. In this study, using depth data, we introduce two hybrid deep neural networks to estimate 3D hand poses with fewer computations and higher accuracy compared with their counterparts. Due to the fact that the dimensions of data are reduced while passing through successive layers of networks, which causes data to be lost, we use the concept of... 

    Reconfigurable cluster-based networks-on-chip for application-specific MPSoCs

    , Article Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors ; 9-11 July , 2012 , pp. 153-156 ; ISSN: 10636862 ; ISBN: 9780769547688 Modarressi, M ; Sarbazi-Azad, H ; Sharif University of Technology
    Abstract
    In this paper, we propose a reconfigurable NoC in which a customized topology for a given application can be implemented. In this NoC, the nodes are grouped into some clusters interconnected by a reconfigurable communication infrastructure. The nodes inside a cluster are connected by a fixed topology. From the traffic management perspective, this structure benefits from the interesting characteristics of the mesh topology (efficient handling of local traffic where each node communicates with its neighbors), while avoids its drawbacks (the lack of short paths between remotely located nodes). We then present a design flow that maps the frequently communicating tasks of a given application into... 

    Reconfigurable cluster-based networks-on-chip for application-specific MPSoCs

    , Article 2012 IEEE 23rd International Conference on Application-Specific Systems, Architectures and Processors, ASAP 2012, Delft, 9 July 2012 through 11 July 2012 ; 2012 , Pages 153-156 ; 10636862 (ISSN) ; 9780769547688 (ISBN) Modarressi, M ; Sarbazi Azad, H
    2012
    Abstract
    In this paper, we propose a reconfigurable NoC in which a customized topology for a given application can be implemented. In this NoC, the nodes are grouped into some clusters interconnected by a reconfigurable communication infrastructure. The nodes inside a cluster are connected by a fixed topology. From the traffic management perspective, this structure benefits from the interesting characteristics of the mesh topology (efficient handling of local traffic where each node communicates with its neighbors), while avoids its drawbacks (the lack of short paths between remotely located nodes). We then present a design flow that maps the frequently communicating tasks of a given application into... 

    Improving the performance of packet-switched networks-on-chip by SDM-based adaptive shortcut paths

    , Article Integration, the VLSI Journal ; Volume 50 , 2015 , Pages 193-204 ; 01679260 (ISSN) Modarressi, M ; Teimouri, N ; Sarbazi Azad, H ; Sharif University of Technology
    Elsevier  2015
    Abstract
    Abstract Reducing the NoC power is critical for scaling up the number of nodes in future many-core systems. Most NoC designs adopt packet-switching to benefit from its high throughput and excellent scalability. These benefits, however, come at the price of the power consumption and latency overheads of routers. Circuit-switching, on the other hand, enjoys a significant reduction in power and latency of communication by directing data over pre-established circuits, but the relatively large circuit setup time and low resource utilization of this switching mechanism is often prohibitive. In this paper, we address one of the major problems of circuit-switching, i.e. the circuit setup time...