Loading...
Search for: fairness
0.007 seconds
Total 54 records

    A Study of Management Policies of Shared Resources in Modern SSDs with Multi-Programming

    , M.Sc. Thesis Sharif University of Technology Mohammad Hassani, Arghavan (Author) ; Sarbazi Azad, Hamid (Supervisor)
    Abstract
    Solid State Drives (SSDs) have an electronic architecture based on non-volatile memories. The unique merit of a SSD is its internal parallelism. Thus, adopting SSDs as the storage media in the storage systems in various devices, such as smart phones, personal computers, large workstations, and etc., improves the performance of the device, substantially. However, the conventional host interface protocols in SSDs, i.e. SATA and SAS, have critical limitations, like low bus bandwidth (maximum 12Gbps), and a single shared request queue. With such limitations, the host interface turns into a performance bottleneck in conventional SSDs. Therefore, the high performance provided by such SSDs cannot... 

    Design of a Traceable Optimistic Fair Exchange Protocol

    , M.Sc. Thesis Sharif University of Technology Ganjavi, Ramin (Author) ; Salmasizadeh, Mahmoud (Supervisor)
    Abstract
    Fair exchange of digital items through computer network is an important research topic of modern cryptography. Generallty, a fair exchange protocol is a way which helps two parties to exchange their digital items fairly, so that at the end of the protocol execution, both parties recieve their desirable items or none of them recieves anything. In a practical applications, fair exchange protocol is widely used in different but related fields like contract signing protocols,non-repudiation protocols,e-ayment system and certified e-mails. In a fair exchange protocol, a trusted third party (TTP) acts as an arbitrator between two parties. To reduce the traffic load of the arbitrator, the concept... 

    Opportunistic Fair Resource Allocation for Multi-Cell Wireless Networks

    , M.Sc. Thesis Sharif University of Technology Shahsavari, Shahram (Author) ; Hossein Khalaj, Babak (Supervisor)
    Abstract
    In recent years, introduction of new technologies has highlighted the need to more data rate in mobile networks. Classical methods of resource allocation in mobile networks cannot respond to this huge demand for data rate because of their limitations. Resource allocation, as one of the operators’ tasks, plays a key role in the network efficiency and users’ data rate. Opportunistic resource allocation and scheduling have gained attention in recent years. On the other, using single-channel (frequency reuse-1) networks is also one of the methods to improve data rate in mobile networks. It is expected that the use of opportunistic scheduling in single-channel networks can repond to the huge... 

    Fair and Strategic Division of Resources

    , Ph.D. Dissertation Sharif University of Technology Seddighin, Masoud (Author) ; Ghodsi, Mohammad (Supervisor)
    Abstract
    In this study, we consider the fair division problem. In this problem, a heterogeneous resource must be fairly divided among a set of agents with different preferences.The resource can be either a divisible good (i.e., time, land), or a set of indivisible goods. When the resource is a single divisible good, the problem is commonly known as cake cutting. To measure fairness, several notions are defined, i.e., envy-freeness, proportionality, equability, maximin-share. In this thesis, we first give a formal definition of these notions. Next, we present our results for envy-freeness and maximin-share.First, we prove the existence of an allocation that guarantees each agent a factor 3/4 of his... 

    Improving Throughput and Secrecy Throughput Performance in Wireless Powered Communication Networks

    , Ph.D. Dissertation Sharif University of Technology Rezaei Estakhrooeieh, Roohollah (Author) ; Pakravan, Mohammad Reza (Supervisor)
    Abstract
    In wireless powered communication networks (WPCNs), wireless nodes are charged via an access point. In these networks, an access point transfers power to the nodes, and then, the nodes use the received power to transmit their information to the access point. Due to the wireless transmission of the information, eavesdropping of it is an important vulnerability in these networks. The conventional method to resolve this security problem is using cryptography algorithms. However, this method needs key management and complex encryption algorithms to be used by the nodes, which may not be applicable. Physical layer security (PLS), which uses the channel characteristics, is a more suitable way to... 

    Fair and Efficient Cake Cutting

    , M.Sc. Thesis Sharif University of Technology Mirfakhar, Amir Mahdi (Author) ; Ghodsi, Mohammad (Supervisor)
    Abstract
    Cake Cutting is an old problem that studies how to allocate a resource among a number of agents to achieve fairness or maximize the revenue by selling the chunks fairly. The primary assumption in the conventional methods of studying Cake Cutting was that the allocator knows everything about the agents and their valuation functions for the different cuts of the cake, which could be impossible in real life. Here we addressed a new setting for an online Cake Cutting problem with unconnected pieces and studied four different objectives upon the setting. There we studied fair and efficient Online Cake Cutting by means of linear fairness and envy freeness. We also added a payment rule to study the... 

    Differential Item Functioning (DIF)in Terms of Gender in a High Stakes Test

    , M.Sc. Thesis Sharif University of Technology Tayebi, Alireza (Author) ; Salehi, Mohammad (Supervisor)
    Abstract
    Validation is an important enterprise especially when the test to be validated is a high-stakes one the results of which bring about life-changing implications for the candidates (Roever, 2001). Messick’s (1988) notion of construct irrelevant factors is pertinent in test validation. Demographic variables like gender, field of study and age can affect test results and interpretations. A fair test needs to be neutral when it comes to construct irrelevant factors such as gender. Differential Item Functioning is a way of making sure that the test does not favor one group of test takers over the others. The current study investigated differential item functioning (DIF) in terms of gender in the... 

    Stale Pricing in Mutual Funds

    , M.Sc. Thesis Sharif University of Technology Aliabadi Farahani, Ebrahim (Author) ; Barakchian, Mahdi (Supervisor) ; Ebrahimnejad, Ali (Supervisor)
    Abstract
    One of the advantage of the mutual funds is their liquidity. They should pay back investor’s money based on Net Asset Value (NAV) anytime they request. Sometimes, NAV computed by fund is different from the real value of it. This error in pricing could be more intense in Iran because Iran stock market liquidity is low, ticker become closed frequently, and stocks can’t be traded and the change of price in one day has the limitation. All of these reasons make the price of stock in Iran stale which doesn’t contain the latest market information. The staleness of stock price makes the return of funds predictable and provide the opportunity of arbitrage which causes the transfer of the wealth among... 

    Performance Evaluation of Applied Scheduling Algorithms Based on Weighted Fair Queuing for Elastic Traffic

    , M.Sc. Thesis Sharif University of Technology Allahyar, Ehsan (Author) ; Movaghar Rahimabadi, Ali (Supervisor)
    Abstract
    Queuing algorithms are used in packet forwarding elements such as routers or switches and the goal is to minimize transmission delays as well as to help manage network congestions. On the other hand, over 90 to 95% of the packets in the Internet use TCP and correspond to the transfer of digital documents of one form or another (Web pages, data files, MP3 tracks etc.) ; this kind of traffic is called elastic. In this thesis, we present a new Start-time Fair Queuing (SFQ) algorithm called Weighted Start-time Fair Queuing (WSFQ) which is more efficient and achieves better fairness than SFQ in the presence of small and huge elastic traffic flows. WSFQ scheduler, like SFQ uses a start time... 

    An Optimistic Fair Exchange Protocol for Proxy Signatures

    , M.Sc. Thesis Sharif University of Technology Ghorbani, Kosar (Author) ; Salmasizadeh, Mahmoud (Supervisor)
    Abstract
    Increasing use of World Wide Web and users tend to accompany in the electronic transaction has caused a fair exchange becomes very important and pervasive electronic transaction. These transactions have a lot of usage and benefits. In this study, the optimistic fair exchange has been studied. It is a special case of the fair exchange while having more advantages than the fair exchange. A situation considered that a signer could not sign a message by himself so he delegates his right in signing to a person as a proxy signer. In this study, a protocol of optimistic fair exchange for proxy signature is presented. So, the proxy signer can accompany in the optimistic fair exchange instead of the... 

    Weighted start-time fair queuing: A new start-time fair queuing for elastic traffic

    , Article 2009 Spring Simulation Multiconference, SpringSim 2009, 22 March 2009 through 27 March 2009 ; 2009 Allahyar, E ; Movaghar, A ; Sharif University of Technology
    Association for Computing Machinery, Inc  2009
    Abstract
    In this paper, we present a new Start-time Fair Queuing (SFQ) algorithm called Weighted Start-time Fair Queuing (WSFQ) which is more efficient and achieves better fairness than SFQ in the presence of small and huge elastic traffic flows. WSFQ scheduler, like SFQ uses a start time eligibility criterion to select packets and when the start-time of two packets in two flows are the same, it acts like Weighted Fair Queuing (WFQ) which selects the smallest virtual finish time first. Afterward, we compared the performance of our model with that of the applied scheduling algorithms such as First-In-First-Out (FIFO), SFQ as well as WFQ on the end-to-end delay and the throughput in small and... 

    Secrecy throughput maximization for full-duplex wireless powered IOT networks under fairness constraints

    , Article IEEE Internet of Things Journal ; Volume 6, Issue 4 , 2019 , Pages 6964-6976 ; 23274662 (ISSN) Rezaei, R ; Sun, S ; Kang, X ; Guan, Y. L ; Pakravan, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we study the secrecy throughput of a full-duplex wireless powered communication network (WPCN) for Internet of Things (IoT). The WPCN consists of a full-duplex multiantenna base station (BS) and a number of sensor nodes. The BS transmits energy all the time, and each node harvests energy prior to its transmission time slot. The nodes sequentially transmit their confidential information to the BS, and the other nodes are considered as potential eavesdroppers. We first aim to optimize the sum secrecy throughput of the nodes. The optimization variables are the duration of the time slots and the BS beamforming vectors in different time slots. The optimization problem is shown to... 

    Saturated hydraulic conductivity of problematic soils measured by a newly developed low-compliance triaxial permeameter

    , Article Engineering Geology ; Volume 278 , 2020 Sadeghi, H ; AliPanahi, P ; Sharif University of Technology
    Elsevier B.V  2020
    Abstract
    Research on the reliable characterization of saturated permeability has received great yet necessary attention globally. However, most studies were carried out on soils with a volumetric tendency being almost insensitive to water saturation or at least with this hidden assumption. This is clearly not the case when dealing with the two broad categories of problematic soils, including collapsible and expansive soils. As confirmed by previous research, at least one-fifth of the planet comprises of these soils with a relatively fair distribution. Therefore, the main objective of this study is to introduce a low-compliance double cell/burette permeameter to track all volumetric changes during the... 

    Quality of service provisioning in optical CDMA packet networks

    , Article Journal of Optical Communications and Networking ; Volume 2, Issue 5 , 2010 , Pages 283-292 ; 19430620 (ISSN) Khaleghi, S ; Pakravan, M. R ; Sharif University of Technology
    Abstract
    An enhanced media access control (MAC) layer protocol that uses the signaling method benefits of the physical layer in order to provide different levels of quality to different users in optical code-division multiple-access (OCDMA) packet networks is presented. In the proposed network architecture the users are categorized into two classes of service, one having a higher quality level and the other having a lower quality level. Users of each class transmit at the same power level and different from the other classes users. Also, the MAC of each user estimates the amount of interference on the channel and adjusts the packet transmissions time to improve network performance. Through simulation... 

    Quality of service provisioning in optical CDMA packet networks

    , Article Journal of Optical Communications and Networking ; Volume 2, Issue 5, Article number 5457930 , May , 2010 , Pages 283-292 Khaleghi, S. (Sina) ; Pakravan, M. R. (Mohammad Reza) ; Sharif University of Technology
    Abstract
    An enhanced media access control (MAC) layer protocol that uses the signaling method benefits of the physical layer in order to provide different levels of quality to different users in optical code-division multiple-access (OCDMA) packet networks is presented. In the proposed network architecture the users are categorized into two classes of service, one having a higher quality level and the other having a lower quality level. Users of each class transmit at the same power level and different from the other classes’ users. Also, the MAC of each user estimates the amount of interference on the channel and adjusts the packet transmission’s time to improve network performance. Through... 

    Prevention of distribution network overvoltage by adaptive droop-based active and reactive power control of PV systems

    , Article Electric Power Systems Research ; Volume 133 , 2016 , Pages 313-327 ; 03787796 (ISSN) Ghasemi, M. A ; Parniani, M ; Sharif University of Technology
    Elsevier Ltd 
    Abstract
    Proliferation of grid-connected photovoltaic systems (PVSs) causes technical problems due to their variable and non-dispatchable generated power. High penetration of PVS in distribution networks can result in overvoltage in some operating conditions. Although this situation occurs rarely, it limits the installed capacity of PVS. In this paper, adaptive droop-based control algorithms are presented to regulate active and reactive power of PVS, with the objectives of loss minimization and increasing the PVS capacity installation without unallowable overvoltage. Operating voltage range of the PVS is divided into several intervals, and a specific control algorithm is presented for each of them.... 

    Precoding in relay networks with frequency selective channels

    , Article Conference Record - Asilomar Conference on Signals, Systems and Computers ; 2012 , Pages 537-541 ; 10586393 (ISSN) ; 9781467350518 (ISBN) Schad, A ; Khalaj, B ; Pesavento, M ; Sharif University of Technology
    Abstract
    We consider a wireless network with one source, multiple relays and multiple destinations. The source and the relays are assumed to utilize multiple antennas. To reduce the effects of the frequency selective source-to-relay and relay-to-destination channels, and to compensate for the different delays of the various signal paths in the network and for multi-user interference and noise, the source, the relays and the destinations apply linear filtering to their signals. The proposed scheme generalizes the recently proposed filter-and-forward relaying scheme. We propose an iterative algorithm to solve the problem of maximizing the quality-of-service at the destinations. Simulation results... 

    Perceptions of instructor injustice in COVID-19-imposed online courses: EFL students’ perceptions and experiences in focus

    , Article Communication Quarterly ; Volume 70, Issue 5 , 2022 , Pages 469-494 ; 01463373 (ISSN) Chory, R. M ; Zhaleh, K ; Estaji, M ; Sharif University of Technology
    Routledge  2022
    Abstract
    The present study explored Iranian students’ perceptions of unfair instructor behavior in COVID-19 crisis-prompted online language education. Through an online open-ended questionnaire, 91 Iranian English as a Foreign Language (EFL) university students reported their beliefs and experiences concerning instructor injustice in online classes. Results indicated that about two-thirds of the students considered the nature of online courses, particularly their impact on student-instructor relational communication and favoritism, to be a factor leading to teacher unjust behavior. They also identified technological factors, including students’ online communication anxiety, as barriers. Consistent... 

    On the relevance of fair sampling assumption in the recent bell photonic experiments

    , Article Journal of Modern Optics ; Volume 52, Issue 10 , 2005 , Pages 1405-1414 ; 09500340 (ISSN) Shafiee, A ; Golshani, M ; Sharif University of Technology
    2005
    Abstract
    In the experimental verification of Bell's inequalities in real photonic experiments, it is generally believed that the so-called fair sampling assumption (which means that a small fraction of results provide a fair statistical sample) has an unavoidable role. Here, we want to show that the interpretation of these experiments could be feasible, if some different alternative assumptions other than the fair sampling were used. For this purpose, we derive an efficient Bell-type inequality which is a CHSH-type inequality in real experiments. Quantum mechanics violates our proposed inequality, independent of the detection-efficiency problems. © 2005 Taylor & Francis Group Ltd  

    On the physical layer security of the cooperative rate-splitting-aided downlink in UAV networks

    , Article IEEE Transactions on Information Forensics and Security ; Volume 16 , 2021 , Pages 5018-5033 ; 15566013 (ISSN) Bastami, H ; Letafati, M ; Moradikia, M ; Abdelhadi, A ; Behroozi, H ; Hanzo, L ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Unmanned Aerial Vehicles (UAVs) have found compelling applications in intelligent logistics, search and rescue as well as in air-borne Base Station (BS). However, their communications are prone to both channel errors and eavesdropping. Hence, we investigate the max-min secrecy fairness of UAV-aided cellular networks, in which Cooperative Rate-Splitting (CRS) aided downlink transmissions are employed by each multi-antenna UAV Base Station (UAV-BS) to safeguard the downlink of a two-user Multi-Input Single-Output (MISO) system against an external multi-antenna Eavesdropper ( Eve ). Realistically, only Imperfect Channel State Information (ICSI) is assumed to be available at the transmitter....