Loading...
Search for: evaluation-results
0.011 seconds
Total 42 records

    Virtual point-to-point links in packet-switched NoCs

    , Article IEEE Computer Society Annual Symposium on VLSI: Trends in VLSI Technology and Design, ISVLSI 2008, Montpellier, 7 April 2008 through 9 April 2008 ; 2008 , Pages 433-436 ; 9780769531700 (ISBN) Modarressi, M ; Sarbazi Azad, H ; Tavakkol, A ; Sharif University of Technology
    2008
    Abstract
    A method to setup virtual point-to-point links between the cores of a packet-switched network-on-chip is presented in this paper which aims at reducing the NoC power consumption and delay. The router architecture proposed in this paper provides packet-switching, as well as a number of virtual point-to-point, or VIP (VIrtual Point-to-point) for short, connections. This is achieved by designating one virtual channel at each physical channel of a router to bypass the router pipeline. The mapping and routing algorithm exploits these virtual channels and tries to virtually connect the source and destination nodes of high-volume communication flows during task-graph mapping and route selection... 

    Using RLS adaptive algorithm for packet loss replacement in VOIP

    , Article Proceedings of the 2011 International Conference on Image Processing, Computer Vision, and Pattern Recognition, IPCV 2011, 18 July 2011 through 21 July 2011 ; Volume 2 , July , 2011 , Pages 753-756 ; 9781601321916 (ISBN) Miralavi, S.R ; Ghorshi, S ; Mortazavi, M ; Sharif University of Technology
    2011
    Abstract
    In this paper, a low order recursive linear prediction method and recursive least square as an adaptive filter (LP-RLS) are introduced to predict the speech and the excitation signals. In real-time packet-based communication systems, one major problem is misrouted or delayed packets which results in degraded perceived voice quality. If packets are not available on time, the packet is known as lost packet. The easiest task of a network terminal receiver is to replace silence for the duration of lost speech segments. In a high quality communication system, to avoid quality reduction due to packet loss, a suitable method and/or algorithm is needed to replace the missing segments of speech. The... 

    Using intra-line level pairing for graceful degradation support in PCMs

    , Article Proceedings of IEEE Computer Society Annual Symposium on VLSI, ISVLSI, 8 July 2015 through 10 July 2015 ; Volume 07-10-July-2015 , 2015 , Pages 527-532 ; 21593469 (ISSN) ; 9781479987184 (ISBN) Asadinia, M ; Sarbazi Azad, H ; Sharif University of Technology
    IEEE Computer Society  2015
    Abstract
    In Phase-Change Memory (PCM), the number of writes a cell can take before wearing-out is limited and highly varied due to unbalanced write traffic and process variation. After the failure of weak cells and in presence of large number of failed lines, some techniques have been proposed to further prolong the lifetime of a PCM device by remapping failed lines to spares and salvage a PCM device with graceful degradation. Others rely on handling failures through inter-line pairing. Observations reveal that most of cells in a line are healthy when the line is marked as faulty by any of these proposals. To overcome this deficiency, we propose Intra-line Level Pairing(ILP), a technique that... 

    Tomographical medical image reconstruction using Kalman filter technique

    , Article Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011, 26 May 2011 through 28 May 2011 ; May , 2011 , Pages 61-65 ; 9780769544298 (ISBN) Goliaei, S ; Ghorshi, S ; Sharif University of Technology
    2011
    Abstract
    In this paper, a Kalman filter technique which is operated in time is introduced for noise reduction on CT set of projections to reconstruct medical images. The experiments were done on medical image of kidneys and the simulated projections are captured by CT scanner. Evaluation results indicated that as the number of projections increase in the collected ray sums corrupted by noise the quality of reconstructed image becomes better in terms of contrast and transparency. However, for the comparison issue, the same conditions are applied for reconstruction of medical image in frequency domain using filter back projection technique. It observes that filter back projection technique does not... 

    Symmetry and partial order reduction techniques in model checking Rebeca

    , Article Acta Informatica ; Volume 47, Issue 1 , 2010 , Pages 33-66 ; 00015903 (ISSN) Jaghoori, M.M ; Sirjani, M ; Mousavi, M.R ; Khamespanah, E ; Movaghar, A ; Sharif University of Technology
    2010
    Abstract
    Rebeca is an actor-based language with formal semantics which is suitable for modeling concurrent and distributed systems and protocols. Due to its object model, partial order and symmetry detection and reduction techniques can be efficiently applied to dynamic Rebeca models. We present two approaches for detecting symmetry in Rebeca models: One that detects symmetry in the topology of inter-connections among objects and another one which exploits specific data structures to reflect internal symmetry in the internal structure of an object. The former approach is novel in that it does not require any input from the modeler and can deal with the dynamic changes of topology. This approach is... 

    Scalable speech coding at rates below 900 BPS

    , Article 2008 IEEE International Conference on Multimedia and Expo, ICME 2008, Hannover, 23 June 2008 through 26 June 2008 ; 2008 , Pages 85-88 ; 9781424425716 (ISBN) Jahangiri, E ; Ghaemmaghami, S ; Sharif University of Technology
    2008
    Abstract
    This paper introduces a novel scalable speech coding scheme based on embedded matrix quantization of LSF parameters in an LPC model. In the proposed quantizer, codewords are organized based on a tree structure through a cell-merging process, which leads to a fine-grain scalable coder at rates below 900 bps. Near natural sounding is achieved at very low rates by employing an efficient adaptive dual-band scheme to approximate the LPC excitation signals. Evaluation results, obtained from both overall quality measurement and intelligibility assessment, show that the proposed coder could be a reasonable choice for improving the bottom-line speech quality in low bit rates. © 2008 IEEE  

    Reconfigurable cluster-based networks-on-chip for application-specific MPSoCs

    , Article Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors ; 9-11 July , 2012 , pp. 153-156 ; ISSN: 10636862 ; ISBN: 9780769547688 Modarressi, M ; Sarbazi-Azad, H ; Sharif University of Technology
    Abstract
    In this paper, we propose a reconfigurable NoC in which a customized topology for a given application can be implemented. In this NoC, the nodes are grouped into some clusters interconnected by a reconfigurable communication infrastructure. The nodes inside a cluster are connected by a fixed topology. From the traffic management perspective, this structure benefits from the interesting characteristics of the mesh topology (efficient handling of local traffic where each node communicates with its neighbors), while avoids its drawbacks (the lack of short paths between remotely located nodes). We then present a design flow that maps the frequently communicating tasks of a given application into... 

    Reconfigurable cluster-based networks-on-chip for application-specific MPSoCs

    , Article 2012 IEEE 23rd International Conference on Application-Specific Systems, Architectures and Processors, ASAP 2012, Delft, 9 July 2012 through 11 July 2012 ; 2012 , Pages 153-156 ; 10636862 (ISSN) ; 9780769547688 (ISBN) Modarressi, M ; Sarbazi Azad, H
    2012
    Abstract
    In this paper, we propose a reconfigurable NoC in which a customized topology for a given application can be implemented. In this NoC, the nodes are grouped into some clusters interconnected by a reconfigurable communication infrastructure. The nodes inside a cluster are connected by a fixed topology. From the traffic management perspective, this structure benefits from the interesting characteristics of the mesh topology (efficient handling of local traffic where each node communicates with its neighbors), while avoids its drawbacks (the lack of short paths between remotely located nodes). We then present a design flow that maps the frequently communicating tasks of a given application into... 

    PLCDefender: Improving remote attestation techniques for PLCs using physical model

    , Article IEEE Internet of Things Journal ; 2020 Salehi, M ; Bayat Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    In order to guarantee the security of industrial control system (ICS) processes, the proper functioning of the programmable logic controllers (PLCs) must be ensured. In particular, cyber-attacks can manipulate the PLC control logic program and cause terrible damage that jeopardize people’s life when bringing the state of the critical system into an unreliable state. Unfortunately, no remote attestation technique has yet been proposed that can validate the PLC control logic program using a physics-based model that demonstrates device behavior. In this paper, we propose PLCDefender, a mitigation method that combines hybrid remote attestation technique with a physics-based model to preserve the... 

    Performance and power efficient on-chip communication using adaptive virtual point-to-point connections

    , Article 2009 3rd ACM/IEEE International Symposium on Networks-on-Chip, NoCS 2009, San Diego, CA, 10 May 2009 through 13 May 2009 ; 2009 , Pages 203-212 ; 9781424441433 (ISBN) Modarressi, M ; Sarbazi Azad, H ; Tavakkol, A ; IEEE Circuits and Systems Society; Council for EDA; ACM Special Interest Group on Computer Architecture (SIGARCH); ACM Special Interest Group on Embedded Systems (SIGBED); ACM Special Interest Group on Design Automation (SIGDA); Silistix, Inc ; Sharif University of Technology
    2009
    Abstract
    In this paper, we propose a packet-switched network-on-chip (NoC) architecture which can provide a number of low-power, low-latency virtual point-to-point connections for communication flows. The work aims to improve the power and performance metrics of packet-switched NoC architectures and benefits from the power and resource utilization advantages of NoCs and superior communication performance of point-to-point dedicated links. The virtual point-to-point connections are set up by bypassing the entire router pipeline stages of the intermediate nodes. This work addresses constructing the virtual point-to-point connections at run-time using a light-weight setup network. It involves monitoring... 

    Performability guarantee for periodic tasks in real-time systems

    , Article Scientia Iranica ; Vol. 21, issue. 6 , 2014 , p. 2127-2137 ; 1026-3098 Bashiri, M ; Miremadi, S. G ; Sharif University of Technology
    Abstract
    Performability is an important parameter in safety-critical real-time systems. This parameter is defined as the joint consideration of two other important parameters, i.e., reliability and performance. This paper proposes a schedulability condition that guarantees a desired level of performability under various working conditions for real-time systems. The basic idea underlining this condition is to select a subset of schedulable tasks and manage their slack times to satisfy a desired performability level. The proposed condition is evaluated on a hard real-time system that employs the Rate-Monotonic (RM) scheduling algorithm and uses the re-execution mechanism to improve the reliability.... 

    Pedal: Power-delay product objective function for internet of things applications

    , Article 34th Annual ACM Symposium on Applied Computing, SAC 2019, 8 April 2019 through 12 April 2019 ; Volume Part F147772 , 2019 , Pages 892-895 ; 9781450359337 (ISBN) Safaei, B ; Mohammad Salehi, A. A ; Shirbeigi, M ; Hosseini Monazzah, A. M ; Ejlali, A ; ACM Special Interested Group on Applied Computing ; Sharif University of Technology
    Association for Computing Machinery  2019
    Abstract
    The increasing trend in the number of smart connected devices has turned the routing procedure as one of the major challenges in IoT infrastructures. The Routing Protocol for Low Power and Lossy Networks (RPL) was introduced to satisfy different IoT application requirements through Objective Functions (OF). Although there have been several studies on introducing new OFs in order to fulfill specific IoT characteristics, e.g., energy and delay efficiency, reliability, and stability, but still there is a lack of novel OFs which fulfill the IoT application requirements in terms of both, the performance and the power consumption simultaneously. In this paper, we have proposed PEDAL, an OF which... 

    Pedal: Power-delay product objective function for internet of things applications

    , Article 34th Annual ACM Symposium on Applied Computing, SAC 2019, 8 April 2019 through 12 April 2019 ; Volume Part F147772 , 2019 , Pages 892-895 ; 9781450359337 (ISBN) Safaei, B ; Mohammad Salehi, A. A ; Shirbeigi, M ; Hosseini Monazzah, A. M ; Ejlali, A ; ACM Special Interested Group on Applied Computing ; Sharif University of Technology
    Association for Computing Machinery  2019
    Abstract
    The increasing trend in the number of smart connected devices has turned the routing procedure as one of the major challenges in IoT infrastructures. The Routing Protocol for Low Power and Lossy Networks (RPL) was introduced to satisfy different IoT application requirements through Objective Functions (OF). Although there have been several studies on introducing new OFs in order to fulfill specific IoT characteristics, e.g., energy and delay efficiency, reliability, and stability, but still there is a lack of novel OFs which fulfill the IoT application requirements in terms of both, the performance and the power consumption simultaneously. In this paper, we have proposed PEDAL, an OF which... 

    Packet loss replacement in VoIP using a low-order recursive linear prediction method

    , Article Canadian Conference on Electrical and Computer Engineering, 8 May 2011 through 11 May 2011 ; May , 2011 , Pages 000292-000295 ; 08407789 (ISSN) ; 9781424497898 (ISBN) Miralavi, S. R ; Ghorshi, S ; Mortazavi, M ; Pasha, S ; Sharif University of Technology
    2011
    Abstract
    In real-time packet-based communication systems, one major problem is misrouted or delayed packets which results in degraded perceived voice quality. If packets are not available on time, the packet is known as lost packet. The easiest task of a network terminal receiver is to replace silence for the duration of lost speech segments. In a high quality communication system, to avoid quality reduction due to packet loss, a suitable method and/or algorithm is needed to replace the missing segments of speech. In this paper, we introduce a low order recursive linear prediction method for replacement of lost speech segment. In this method a normalized least mean square (NLMS) as an adaptive filter... 

    Objective function: a key contributor in internet of things primitive properties

    , Article CSI International Symposium on Real-Time and Embedded Systems and Technologies, RTEST 2018 ; 26 June , 2018 , Pages 39-46 ; 9781538614754 (ISBN) Safaei, B ; Hosseini Monazzah, A. M ; Shahroodi, T ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    With the widespread use of Internet of Things (IoT) in every aspect of human's daily life, communications of such an enormous amount of existing embedded devices in these systems arise many new challenges from power consumption, performance, and reliability perspectives. Communications in an IoT infrastructure are managed by a set of policies which are determined by Objective Functions (OFs). Thus, OFs are the most important contributors in facing with the mentioned challenges. In this paper, due to the lack of information on how OFs affect the primary properties of an IoT infrastructure, we have compared three well-known OFs (OF0, MRHOF, and OFFL) from power consumption, performance, and... 

    Noise reduction of speech signal using bayesian state-space Kalman filter

    , Article 2013 19th Asia-Pacific Conference on Communications, APCC 2013 ; August , 2013 , Pages 545-549 ; 9781467360500 (ISBN) Sarafnia, A ; Ghorshi, S ; Sharif University of Technology
    IEEE Computer Society  2013
    Abstract
    The noise exists in almost all environments such as cellular mobile telephone systems. Various types of noise can be introduced such as speech additive noise which is the main factor of degradation in perceived speech quality. At some applications for example at the receiver of a telecommunication system, the direct value of interfering noise is not available and there is just access to noisy speech. In these cases the noise cannot be cancelled totally but it may be possible to reduce the noise in a sensible way by utilizing the statistics of the noise and speech signal. In this paper the proposed method for noise reduction is Bayesian recursive state-space Kalman filter, which is a method... 

    Markhor: malware detection using fuzzy similarity of system call dependency sequences

    , Article Journal of Computer Virology and Hacking Techniques ; 2021 ; 22638733 (ISSN) Lajevardi, A. M ; Parsa, S ; Amiri, M. J ; Sharif University of Technology
    Springer-Verlag Italia s.r.l  2021
    Abstract
    Static malware detection approaches are time-consuming and cannot deal with code obfuscation techniques. Dynamic malware detection approaches, on the other hand, address these two challenges, however, suffer from behavioral ambiguity, such as the system calls obfuscation. In this paper, we introduce Markhor, a dynamic and behavior-based malware detection approach. Markhor uses system call data dependency and system call control dependency sequences to create a weighted list of malicious patterns. The list is then used to determine the malicious processes. Next, the similarity of a file system call sequences to a malicious pattern is extracted based on a fuzzy algorithm and the file nature is... 

    Markhor: malware detection using fuzzy similarity of system call dependency sequences

    , Article Journal of Computer Virology and Hacking Techniques ; Volume 18, Issue 2 , 2022 , Pages 81-90 ; 22638733 (ISSN) Mohammadzade Lajevardi, A ; Parsa, S ; Amiri, M. J ; Sharif University of Technology
    Springer-Verlag Italia s.r.l  2022
    Abstract
    Static malware detection approaches are time-consuming and cannot deal with code obfuscation techniques. Dynamic malware detection approaches, on the other hand, address these two challenges, however, suffer from behavioral ambiguity, such as the system calls obfuscation. In this paper, we introduce Markhor, a dynamic and behavior-based malware detection approach. Markhor uses system call data dependency and system call control dependency sequences to create a weighted list of malicious patterns. The list is then used to determine the malicious processes. Next, the similarity of a file system call sequences to a malicious pattern is extracted based on a fuzzy algorithm and the file nature is... 

    LSB ++: An improvement to LSB + steganography

    , Article IEEE Region 10 Annual International Conference, Proceedings/TENCON, 21 November 2011 through 24 November 2011, Bali ; 2011 , Pages 364-368 ; 9781457702556 (ISBN) Ghazanfari, K ; Ghaemmaghami, S ; Khosravi, S. R ; Sharif University of Technology
    Abstract
    The Least Significant Bit (LSB) substitution is an old and simple data hiding method that could almost effortlessly be implemented in spatial or transform domain over any digital media. This method can be attacked by several steganalysis methods, because it detectably changes statistical and perceptual characteristics of the cover signal. A typical method for steganalysis of the LSB substitution is the histogram attack that attempts to diagnose anomalies in the cover image's histogram. A well-known method to stand the histogram attack is the LSB + steganography that intentionally embeds some extra bits to make the histogram look natural. However, the LSB + method still affects the perceptual... 

    LATED: lifetime-aware tag for enduring design

    , Article Proceedings - 2015 11th European Dependable Computing Conference, EDCC 2015, 7 September 2015 through 11 September 2015 ; 2015 , Pages 97-107 ; 9781467392891 (ISBN) Ghaemi, S. G ; Hosseini Monazzah, A. M ; Farbeh, H ; Miremadi, S. G ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Nowadays, leakage energy constitutes up to 80% of total cache energy consumption and tag array is responsible for a considerable fraction of static energy consumption. An approach to reduce static energy consumption is to replace SRAMs by STT-RAMs with near zero leakage power. However, a problem of an STT-RAM cell is its limited write endurance. In spite of previous studies which have targeted the data array, in this study STT-RAMs are used in the L1 tag array. To solve the write endurance problem, this paper proposes an STTRAM/SRAM tag architecture. Considering the spatial locality of memory references, the lower significant bitlines of the tag update more. The SRAM part handles the updates...