Loading...
Search for: evaluation-results
0.011 seconds
Total 42 records

    Reconfigurable cluster-based networks-on-chip for application-specific MPSoCs

    , Article Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors ; 9-11 July , 2012 , pp. 153-156 ; ISSN: 10636862 ; ISBN: 9780769547688 Modarressi, M ; Sarbazi-Azad, H ; Sharif University of Technology
    Abstract
    In this paper, we propose a reconfigurable NoC in which a customized topology for a given application can be implemented. In this NoC, the nodes are grouped into some clusters interconnected by a reconfigurable communication infrastructure. The nodes inside a cluster are connected by a fixed topology. From the traffic management perspective, this structure benefits from the interesting characteristics of the mesh topology (efficient handling of local traffic where each node communicates with its neighbors), while avoids its drawbacks (the lack of short paths between remotely located nodes). We then present a design flow that maps the frequently communicating tasks of a given application into... 

    Audio-visual speech recognition techniques in augmented reality environments

    , Article Visual Computer ; Vol. 30, issue. 3 , March , 2014 , pp. 245-257 ; ISSN: 01782789 Mirzaei, M. R ; Ghorshi, S ; Mortazavi, M ; Sharif University of Technology
    Abstract
    Many recent studies show that Augmented Reality (AR) and Automatic Speech Recognition (ASR) technologies can be used to help people with disabilities. Many of these studies have been performed only in their specialized field. Audio-Visual Speech Recognition (AVSR) is one of the advances in ASR technology that combines audio, video, and facial expressions to capture a narrator's voice. In this paper, we combine AR and AVSR technologies to make a new system to help deaf and hard-of-hearing people. Our proposed system can take a narrator's speech instantly and convert it into a readable text and show the text directly on an AR display. Therefore, in this system, deaf people can read the... 

    Performability guarantee for periodic tasks in real-time systems

    , Article Scientia Iranica ; Vol. 21, issue. 6 , 2014 , p. 2127-2137 ; 1026-3098 Bashiri, M ; Miremadi, S. G ; Sharif University of Technology
    Abstract
    Performability is an important parameter in safety-critical real-time systems. This parameter is defined as the joint consideration of two other important parameters, i.e., reliability and performance. This paper proposes a schedulability condition that guarantees a desired level of performability under various working conditions for real-time systems. The basic idea underlining this condition is to select a subset of schedulable tasks and manage their slack times to satisfy a desired performability level. The proposed condition is evaluated on a hard real-time system that employs the Rate-Monotonic (RM) scheduling algorithm and uses the re-execution mechanism to improve the reliability.... 

    Noise reduction of speech signal using bayesian state-space Kalman filter

    , Article 2013 19th Asia-Pacific Conference on Communications, APCC 2013 ; August , 2013 , Pages 545-549 ; 9781467360500 (ISBN) Sarafnia, A ; Ghorshi, S ; Sharif University of Technology
    IEEE Computer Society  2013
    Abstract
    The noise exists in almost all environments such as cellular mobile telephone systems. Various types of noise can be introduced such as speech additive noise which is the main factor of degradation in perceived speech quality. At some applications for example at the receiver of a telecommunication system, the direct value of interfering noise is not available and there is just access to noisy speech. In these cases the noise cannot be cancelled totally but it may be possible to reduce the noise in a sensible way by utilizing the statistics of the noise and speech signal. In this paper the proposed method for noise reduction is Bayesian recursive state-space Kalman filter, which is a method... 

    Reconfigurable cluster-based networks-on-chip for application-specific MPSoCs

    , Article 2012 IEEE 23rd International Conference on Application-Specific Systems, Architectures and Processors, ASAP 2012, Delft, 9 July 2012 through 11 July 2012 ; 2012 , Pages 153-156 ; 10636862 (ISSN) ; 9780769547688 (ISBN) Modarressi, M ; Sarbazi Azad, H
    2012
    Abstract
    In this paper, we propose a reconfigurable NoC in which a customized topology for a given application can be implemented. In this NoC, the nodes are grouped into some clusters interconnected by a reconfigurable communication infrastructure. The nodes inside a cluster are connected by a fixed topology. From the traffic management perspective, this structure benefits from the interesting characteristics of the mesh topology (efficient handling of local traffic where each node communicates with its neighbors), while avoids its drawbacks (the lack of short paths between remotely located nodes). We then present a design flow that maps the frequently communicating tasks of a given application into... 

    A novel approach to design reversible counter rotating propeller fans

    , Article ASME 2012 Gas Turbine India Conference, GTINDIA 2012, 1 December 2012 through 1 December 2012 ; December , 2012 , Pages 265-270 ; 9780791845165 (ISBN) Abbaszadeh, M ; Parizi, P. N ; Taheri, R ; Sharif University of Technology
    2012
    Abstract
    Because of their high performance and unique abilities like producing none-rotating wake, Counter Rotating Propellers (C.R.P.) are being used in many advanced propulsion or ventilation systems. But due to complicated design procedure of C.R.P. fans up to now it was not possible to apply the concept in reversible systems. For the first time in this research, a new method presented to design a reversible counter rotating propeller system. This method is based on designing a basic C.R.P. by a reliable edition of blade element theory to achieve maximum performance in main rotating course and then to optimize it in order to have almost same performance in reverse rotating course. After expressing... 

    A Kalman filter approach to packet loss replacement in presence of additive noise

    , Article 2012 11th International Conference on Information Science, Signal Processing and their Applications, ISSPA 2012 ; 2012 , Pages 310-314 ; 9781467303828 (ISBN) Miralavi, S. R ; Ghorshi, S ; Tahaei, A ; Sharif University of Technology
    2012
    Abstract
    A major problem in real-time packet-based communication systems, is misrouted or delayed packet which results in degraded perceived voice quality. If packets are not available on time, the packets are considered lost. The easiest solution in a network terminal receiver is to replace silence for the duration of lost speech segments. In a high quality communication system, to avoid degradation in speech quality due to packet loss, a suitable method or algorithm is needed to replace the missing segments of speech. In this paper, we introduce an adaptive filter for replacement of lost speech segment. In this method Kalman filter as a state-space based method will be used to predict the clean... 

    Cepstral-domain HMM-based speech enhancement using vector Taylor series and parallel model combination

    , Article 2012 11th International Conference on Information Science, Signal Processing and their Applications, ISSPA 2012, 2 July 2012 through 5 July 2012 ; July , 2012 , Pages 298-303 ; 9781467303828 (ISBN) Veisi, H ; Sameti, H ; Sharif University of Technology
    2012
    Abstract
    Speech enhancement problem using hidden Markov model (HMM) and minimum mean square error (MMSE) in cepstral domain is studied. This noise reduction approach can be considered as weighted-sum filtering of the noisy speech signal in which the filters weights are estimated using the HMM of noisy speech. To have an accurate estimation of the noisy speech HMM, vector Taylor series (VTS) is proposed and compared with the parallel model combination (PMC) technique. Furthermore, proposed cepstral-domain HMM-based speech enhancement systems are compared with the renowned autoregressive HMM (AR-HMM) approach. The evaluation results confirm the superiority of the cepstral domain approach in comparison... 

    Using RLS adaptive algorithm for packet loss replacement in VOIP

    , Article Proceedings of the 2011 International Conference on Image Processing, Computer Vision, and Pattern Recognition, IPCV 2011, 18 July 2011 through 21 July 2011 ; Volume 2 , July , 2011 , Pages 753-756 ; 9781601321916 (ISBN) Miralavi, S.R ; Ghorshi, S ; Mortazavi, M ; Sharif University of Technology
    2011
    Abstract
    In this paper, a low order recursive linear prediction method and recursive least square as an adaptive filter (LP-RLS) are introduced to predict the speech and the excitation signals. In real-time packet-based communication systems, one major problem is misrouted or delayed packets which results in degraded perceived voice quality. If packets are not available on time, the packet is known as lost packet. The easiest task of a network terminal receiver is to replace silence for the duration of lost speech segments. In a high quality communication system, to avoid quality reduction due to packet loss, a suitable method and/or algorithm is needed to replace the missing segments of speech. The... 

    LSB ++: An improvement to LSB + steganography

    , Article IEEE Region 10 Annual International Conference, Proceedings/TENCON, 21 November 2011 through 24 November 2011, Bali ; 2011 , Pages 364-368 ; 9781457702556 (ISBN) Ghazanfari, K ; Ghaemmaghami, S ; Khosravi, S. R ; Sharif University of Technology
    Abstract
    The Least Significant Bit (LSB) substitution is an old and simple data hiding method that could almost effortlessly be implemented in spatial or transform domain over any digital media. This method can be attacked by several steganalysis methods, because it detectably changes statistical and perceptual characteristics of the cover signal. A typical method for steganalysis of the LSB substitution is the histogram attack that attempts to diagnose anomalies in the cover image's histogram. A well-known method to stand the histogram attack is the LSB + steganography that intentionally embeds some extra bits to make the histogram look natural. However, the LSB + method still affects the perceptual... 

    Packet loss replacement in VoIP using a low-order recursive linear prediction method

    , Article Canadian Conference on Electrical and Computer Engineering, 8 May 2011 through 11 May 2011 ; May , 2011 , Pages 000292-000295 ; 08407789 (ISSN) ; 9781424497898 (ISBN) Miralavi, S. R ; Ghorshi, S ; Mortazavi, M ; Pasha, S ; Sharif University of Technology
    2011
    Abstract
    In real-time packet-based communication systems, one major problem is misrouted or delayed packets which results in degraded perceived voice quality. If packets are not available on time, the packet is known as lost packet. The easiest task of a network terminal receiver is to replace silence for the duration of lost speech segments. In a high quality communication system, to avoid quality reduction due to packet loss, a suitable method and/or algorithm is needed to replace the missing segments of speech. In this paper, we introduce a low order recursive linear prediction method for replacement of lost speech segment. In this method a normalized least mean square (NLMS) as an adaptive filter... 

    Tomographical medical image reconstruction using Kalman filter technique

    , Article Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011, 26 May 2011 through 28 May 2011 ; May , 2011 , Pages 61-65 ; 9780769544298 (ISBN) Goliaei, S ; Ghorshi, S ; Sharif University of Technology
    2011
    Abstract
    In this paper, a Kalman filter technique which is operated in time is introduced for noise reduction on CT set of projections to reconstruct medical images. The experiments were done on medical image of kidneys and the simulated projections are captured by CT scanner. Evaluation results indicated that as the number of projections increase in the collected ray sums corrupted by noise the quality of reconstructed image becomes better in terms of contrast and transparency. However, for the comparison issue, the same conditions are applied for reconstruction of medical image in frequency domain using filter back projection technique. It observes that filter back projection technique does not... 

    Using intra-line level pairing for graceful degradation support in PCMs

    , Article Proceedings of IEEE Computer Society Annual Symposium on VLSI, ISVLSI, 8 July 2015 through 10 July 2015 ; Volume 07-10-July-2015 , 2015 , Pages 527-532 ; 21593469 (ISSN) ; 9781479987184 (ISBN) Asadinia, M ; Sarbazi Azad, H ; Sharif University of Technology
    IEEE Computer Society  2015
    Abstract
    In Phase-Change Memory (PCM), the number of writes a cell can take before wearing-out is limited and highly varied due to unbalanced write traffic and process variation. After the failure of weak cells and in presence of large number of failed lines, some techniques have been proposed to further prolong the lifetime of a PCM device by remapping failed lines to spares and salvage a PCM device with graceful degradation. Others rely on handling failures through inter-line pairing. Observations reveal that most of cells in a line are healthy when the line is marked as faulty by any of these proposals. To overcome this deficiency, we propose Intra-line Level Pairing(ILP), a technique that... 

    An energy-efficient virtual channel power-gating mechanism for on-chip networks

    , Article Proceedings -Design, Automation and Test in Europe, DATE, 9 March 2015 through 13 March 2015 ; Volume 2015-April , March , 2015 , Pages 1527-1532 ; 15301591 (ISSN) ; 9783981537048 (ISBN) Mirhosseini, A ; Sadrosadati, M ; Fakhrzadehgan, A ; Modarressi, M ; Sarbazi Azad, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Power-gating is a promising method for reducing the leakage power of digital systems. In this paper, we propose a novel power-gating scheme for virtual channels in on-chip networks that uses an adaptive method to dynamically adjust the number of active VCs based on the on-chip traffic characteristics. Since virtual channels are used to provide higher throughput under high traffic loads, our method sets the number of virtual channel at each port selectively based on the workload demand, thereby do not negatively affect performance. Evaluation results show that by using this scheme, about 40% average reduction in static power consumption can be achieved with negligible performance overhead  

    Improving the performance of packet-switched networks-on-chip by SDM-based adaptive shortcut paths

    , Article Integration, the VLSI Journal ; Volume 50 , 2015 , Pages 193-204 ; 01679260 (ISSN) Modarressi, M ; Teimouri, N ; Sarbazi Azad, H ; Sharif University of Technology
    Elsevier  2015
    Abstract
    Abstract Reducing the NoC power is critical for scaling up the number of nodes in future many-core systems. Most NoC designs adopt packet-switching to benefit from its high throughput and excellent scalability. These benefits, however, come at the price of the power consumption and latency overheads of routers. Circuit-switching, on the other hand, enjoys a significant reduction in power and latency of communication by directing data over pre-established circuits, but the relatively large circuit setup time and low resource utilization of this switching mechanism is often prohibitive. In this paper, we address one of the major problems of circuit-switching, i.e. the circuit setup time... 

    Elitist continuous ant colony optimization algorithm for optimal management of coastal aquifers

    , Article Water Resources Management ; Volume 25, Issue 1 , 2010 , Pages 165-190 ; 09204741 (ISSN) Ataie Ashtiani, B ; Ketabchi, H ; Sharif University of Technology
    2010
    Abstract
    This paper presents an evolutionary based approach to achieve optimal management of a coastal aquifer to control saltwater intrusion. An improved Elitist Continuous Ant Colony Optimization (ECACO) algorithm is employed for optimal control variables setting of coastal aquifer management problem. The objectives of the optimal management are; maximizing the total water-pumping rate, while controlling the drawdown limits and protecting the wells from saltwater intrusion. Since present work is one of the first efforts towards the application of an ECACO algorithm, sharp interface solution for steady state problem is first exploited. The performance of the developed optimization model is evaluated... 

    Symmetry and partial order reduction techniques in model checking Rebeca

    , Article Acta Informatica ; Volume 47, Issue 1 , 2010 , Pages 33-66 ; 00015903 (ISSN) Jaghoori, M.M ; Sirjani, M ; Mousavi, M.R ; Khamespanah, E ; Movaghar, A ; Sharif University of Technology
    2010
    Abstract
    Rebeca is an actor-based language with formal semantics which is suitable for modeling concurrent and distributed systems and protocols. Due to its object model, partial order and symmetry detection and reduction techniques can be efficiently applied to dynamic Rebeca models. We present two approaches for detecting symmetry in Rebeca models: One that detects symmetry in the topology of inter-connections among objects and another one which exploits specific data structures to reflect internal symmetry in the internal structure of an object. The former approach is novel in that it does not require any input from the modeler and can deal with the dynamic changes of topology. This approach is... 

    3D-DPS: An efficient 3D-CAC for reliable data transfer in 3D ICs

    , Article Proceedings - 2016 12th European Dependable Computing Conference, EDCC 2016, 5 September 2016 through 9 September 2016 ; 2016 , Pages 97-107 ; 9781509015825 (ISBN) Shirmohammadi, Z ; Rohbani, N ; Miremadi, S. G ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Migration to Three Dimensional Integrated Circuits (3D ICs) can provide higher scalability, higher throughput, and lower power consumption with respect to Two Dimensional Integrated Circuits (2D ICs). Also, the latency bottleneck of interconnections in 2D ICs is efficiently solved in 3D ICs. This is due to the use of Through-Silicon-Vias (TSVs) in the communication structure of 3D ICs. TSVs are among the efficient fabrication mechanisms that connect stacked layers in 3D ICs. However, proximity and large size of TSVs make them highly prone to crosstalk faults. Crosstalk faults can cause mutual undesired influences between TSVs and thus seriously threat the reliability of data transfer on... 

    Efficient processor allocation in a reconfigurable CMP architecture for dark silicon era

    , Article Proceedings of the 34th IEEE International Conference on Computer Design, ICCD 2016, 2 October 2016 through 5 October 2016 ; 2016 , Pages 336-343 ; 9781509051427 (ISBN) Aghaaliakbari, F ; Hoveida, M ; Arjomand, M ; Jalili, M ; Sarbazi Azad, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    The continuance of Moore's law and failure of Dennard scaling force future chip multiprocessors (CMPs) to have considerable dark regions. How to use up available dark resources is an important concern for computer architects. In harmony with these changes, we must revise processor allocation schemes that severely affect the performance of a parallel on-chip system. A suitable allocation algorithm should reduce runtime and increase the power efficiency with proper thermal distribution to avoid hotspots. With this motivation, this paper proposes a power-efficient and high performance general purpose infrastructure for which a Dark Silicon Aware Processor Allocation (DSAPA) scheme is proposed... 

    LATED: lifetime-aware tag for enduring design

    , Article Proceedings - 2015 11th European Dependable Computing Conference, EDCC 2015, 7 September 2015 through 11 September 2015 ; 2015 , Pages 97-107 ; 9781467392891 (ISBN) Ghaemi, S. G ; Hosseini Monazzah, A. M ; Farbeh, H ; Miremadi, S. G ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Nowadays, leakage energy constitutes up to 80% of total cache energy consumption and tag array is responsible for a considerable fraction of static energy consumption. An approach to reduce static energy consumption is to replace SRAMs by STT-RAMs with near zero leakage power. However, a problem of an STT-RAM cell is its limited write endurance. In spite of previous studies which have targeted the data array, in this study STT-RAMs are used in the L1 tag array. To solve the write endurance problem, this paper proposes an STTRAM/SRAM tag architecture. Considering the spatial locality of memory references, the lower significant bitlines of the tag update more. The SRAM part handles the updates...