Loading...
Search for: hardware
0.011 seconds
Total 350 records

    Hardware Implementation of Fuzzy Logic for Turbojet Engine Fuel Control System

    , M.Sc. Thesis Sharif University of Technology Yousefpour, Hossein (Author) ; Montazeri, Morteza (Supervisor) ; Kazemzadeh Hannani, Siamak (Co-Advisor)
    Abstract
    Gas turbine engine control is a demanding task that requires the regulation of the thrust as well as the satisfaction of the limitations such as engine aerodynamic instability, over temperature and over speed. Fuzzy logic is an attractive technique for the control of poor understood unmodeled, or complex systems especially where the experience of human operators is available to provide qualitative rules. In such cases, it has been found that control decisions can be made on the basis of linguistic measures or fuzzy algorithms. The controller that is designed on the basis of this theory is called fuzzy logic controller. The main objective of this thesis is hardware implementation of fuzzy... 

    A Scheme for Counterfeit Chip Detection Using Scan Chain

    , M.Sc. Thesis Sharif University of Technology Hashemi, Mona (Author) ; Hesabi, Shahin (Supervisor)
    Abstract
    With constant increase in the rate of VLSI circuits manufactured in sites separate from the designers and computer architects, global concern regarding the possibility of integration of malware by the manufacturing foundries has arisen. Particularly, one main issue that affects relability of the chips is modifications or additions with malicious intension, known as Harware Trojans, which are easily applicable during design and manufacturing phase of chip. This study intends to introduce a model based on the scan chain, a method is provided for intellectual property protection. Currently available IP protection solutions are usually limited to protect single FPGA configurations and require... 

    Design and Hardware Implementation of Real-Time Simulator for Electrical Machines

    , M.Sc. Thesis Sharif University of Technology Hadizadeh, Ali (Author) ; Hashemi, Matin (Supervisor) ; Parniani, Mostafa (Co-Advisor)
    Abstract
    Real-time simulators are important in design and test of power systems. Real-time simulators with hardware-in-loop capabilities are used in design of new elements in order to achieve maximum compatibility between subsystems, or in diagnosis and maintenance.The purpose of this dissertation is to design a real-time simulator for electrical machines. For this purpose, a three-phase induction machine is chosen and its model is extracted and discretized. This procedure results in a system of differential equations in form of AX = B. The extracted equations needs to be solved in real-time at every time-step. The real-time algorithms are imple-mented on FPGA. The implemented real-time simulator... 

    Development of Heuristic Algorithms for Real-Time Model Predictive Control of Nonlinear Parameter Varying Systems with Uncertainty

    , Ph.D. Dissertation Sharif University of Technology Nasrollahi Boroujeni, Saeed (Author) ; Nobahari, Hadi (Supervisor)
    Abstract
    In this study, novel algorithms are presented for nonlinear parameter varying systems with uncertainty in the model predictive control using heuristic algorithms. To this end, some algorithms are developed which provide the possibility of estimating simultaneously states and control signal of the stochastic nonlinear systems. Then, the model predictive control algorithm is presented for stochastic nonlinear systems with uncertainty to estimate uncertainty and compensate it using ant colony optimization. Next, the model predictive control algorithm is developed for nonlinear system with matched bounded uncertainty using particle swarm optimization. Performance of the developed controllers is... 

    Combination Services in A Cloud Manufacturing System With Regard to Quality as A Fuzzy Criteria

    , M.Sc. Thesis Sharif University of Technology Nateghi, Mohammad (Author) ; Hooshmand, Mahmoud (Supervisor)
    Abstract
    Today, due to the development of information technology and fierce competition among manufacturers, the need to reduce the production costs and increase the variety are strongly felt. Each process in the cloud manufacturing is first considered as a service product development, and then, specializing each of these services, provides us a lower cost, along with a higher accuracy, and quality.The modern world is the world full of uncertainty. The uncertainty, which causes the manufacturers to develop products that consume a large quantity of, fixed costs. That is why utilizing such a perspective can reduce investment risk in a new product development. Combining the production services by... 

    Design and Implementation of Processing Hardware for Active Learning Method

    , M.Sc. Thesis Sharif University of Technology Mehranzadeh, Mahdi (Author) ; Bagheri Shouraki, Saeed (Supervisor)
    Abstract
    The Active Learning Method is in fact an adaptive recursive algorithm which embodies a Multi Input and a Single Output (MISO) system as in a fuzzy combination of several Single Input systems and Single Output systems (SISO), and by utilizing a fuzzy technique of Ink Drop Spread tries to explore and extract input to output transfer function behavior in the system of a single-input to a single-output. Although in simulation state, the speed of this model is set at a much higher speed in comparison to other presented models, still is slower than the processing speed of human brain. In regards to hardware implementation, also there remain the fundamental implementation challenges through more... 

    Development of Procedures, Forms and Tools for Post-Earthquake Reconnaissance

    , M.Sc. Thesis Sharif University of Technology Mehdipour, Reza (Author) ; Mahsuli, Mojtaba (Supervisor)
    Abstract
    This study aims to design and develop procedures, forms, and tools for post-earthquake reconnaissance. The current procedure for data collection is based on the sending of groups to identify the dimensions of the evidence and its consequences by the executive and responsible institutions. Studying and reviewing the reports that have been produced by this method shows that there is not any systematic mechanism for collecting data on a wide scale and from all aspects of the evidence. The limited data collected by the executive and responsible institutions are scattered in the reports and are less documented in the database. Therefore, it is necessary to collect big data on the severity and... 

    , M.Sc. Thesis Sharif University of Technology Malekmohammadi, Alireza (Author) ; Shabany, Mahdi (Supervisor) ; Mohammadzadeh, Hoda (Co-Advisor)
    Abstract
    Make a connection between brain and computer, or Brain Computer Interface (BCI) for broad applications in areas such as medical and gamming has caused the subject to one of the most important and attractive issues in recent decades. From the perspective of pattern recognition, BCI is a classification issue that should receive signals that relate to the certain decisions of the brain and then after processing, it is concluded that the person has thought to what decision. Decisions that taken by individual, is sent from the brain to the body by signals, which is called Electroencephalogram (EEG). The number of these decisions is further, classified it also becomes more difficult. That is why... 

    An Efficient Data Prefetching Scheme in GPUs

    , M.Sc. Thesis Sharif University of Technology Mostofi, Saba (Author) ; Sarbazi Azad, Hamid (Supervisor)
    Abstract
    GPUs exploit memory hierarchy and thread-level parallelism (TLP) to hide off-chip memory access delay. However, GPUs can not keep TLP high during the execution of various applications, and hence, they fall short of hiding the access delay to off-chip memory. One effective approach to reducing memory access delay is prefetching. Prior research shows the positive impact of prefetching in improving the performance of GPUs. However, they fail to capture all the potential behind the prefetching in GPUs. In this thesis, we propose Snake, a new data prefetching in GPUs. Snake identifies stride distances among different memory access instructions and prefetches a chain of addresses that will be... 

    Construction of a Framework for the Realization of Neuro-Fuzzy Computing Structures Based on the Physical Behavior of Processing Elements

    , Ph.D. Dissertation Sharif University of Technology Merrikh-Bayat, Farnood (Author) ; Bagheri Shouraki, Saeed (Supervisor)
    Abstract
    In this thesis we concentrated on the application of memristor-rossbars for the hardware implementation of neuro-fuzzy systems. At first we showed that using memristive devices for this purpose has several problems and demonstrated the availability of the positive feedback in the behavior of this passive element. Then, by proposing new learning structure we tried to overcome some of these drawbacks. In the rest of this thesis we focused on the hardware implementation of neuro-fuzzy systems based on memristor crossbar structures. At first, hardware implementation of the Active Learning Method (ALM) is presented.
    Next, new learning and computing method is proposed by creating and using... 

    An Investigation on Hardware Implementation and Optimization of Spiking Neural Network

    , M.Sc. Thesis Sharif University of Technology Mohammadi, Mahdi (Author) ; Bagheri Shouraki, Saeed (Supervisor)
    Abstract
    Design of a spiking neural network suitable for electronic hardware implementation has been a hot research topic for a long time, in recent years implementation of spiking neural network in real time and biological scale has become important for scientists. This is due to the proximity of these networks to human brain, and the efforts led to the creation of numerous biological models and hardware which has been proposed in this context. This research includes two main parts, the first part is effort to implement a greater number of neurons per device and the second part proposes a communication system among devices to achieve biological scale. This work investigates novel neural elements and... 

    Design and Hardware Implementation of Real-Time Simulator for Power Electronic Systems

    , M.Sc. Thesis Sharif University of Technology Labbaf, Mohamad (Author) ; Hashemi, Matin (Supervisor) ; Parniani, Mostafa (Co-Advisor)
    Abstract
    Real-time simulators are playing a critical role in the design of power electronic systems. Using real-time simulator enables designers to reduce the time and cost of design by employing hardware-in-the-loop technique. In addition, this simulator can potentially reduce the risks which are associated with performing tests on actual systems. In this thesis, a real-time simulator is designed and implemented for power electronic applications. Concerning the fact that power switches are one of the most important elements in this simulator, an ideal switch model with conduction resistor and RC snubber circuit is used. This model is more accurate as compared to other models in the... 

    VLSI Architecture for Base Band Part of an Optical OFDM Transceiver

    , M.Sc. Thesis Sharif University of Technology Ghanaatian Jahromi, Reza (Author) ; Shabany, Mahdi (Supervisor) ; Salehi, Javad (Supervisor)
    Abstract
    Optical Communication is a promising technology in access networks because of bandwidth hungry application like videos. So fiber Optic is an important candidate as a media in networks. There are different methods of modulation for transferring data through a channel. Among all, Orthogonal Frequency Division Multiplexing is a method which used in most wired and wireless systems. Recent researches show that OFDM is also a good approach for optical communication.
    In this thesis we concentrate on hardware implementation of digital part of an Optical OFDM transceiver. In the first step we ignore the effect of optical channel and design and simulate the transmitter and receiver. After that we... 

    Secure Implementation of Cryptographic Algorithms on FPGA

    , M.Sc. Thesis Sharif University of Technology Farzam, Mohammad-Hossein (Author) ; Bayat-Sarmadi, Siavash (Supervisor)
    Abstract
    Security of cryptographic devices lies amongst the most important issues in the field of hardware security. It is frequently seen that in the process of designing cryptographic systems insufficient attention is paid to the physical implementation details. This is happening while a lot of secret information is known to be leaked through side-channels such as power consumption, electromagnetic emission and execution time. Side-channel attacks are able to reveal secret keys by using these side-channel leakages. Additionally, side-channel attacks are one of the most powerful but low-cost attacks that put the security of cryptographic systems in vain. It can be claimed that the most dangerous... 

    FPGA-Based Implementation of Deep Learning Accelerator with Concentration on Intrusion Detection Systems

    , M.Sc. Thesis Sharif University of Technology Fard, Ebrahim (Author) ; Jahangir, Amir Hossein (Supervisor)
    Abstract
    Intrusion Detection System (IDS) is an equipment destined to provide computer networks security. In recent years, Machine Learning and Deep Neural Network (DNN) methods have been considered as a way to detect new network attacks. Due to the huge amounts of calculations needed for these methods, there is a need for high performance and parallel or specific processors, such as Application Specific Integrated Circuit (ASIC), Graphical Processor Unit (GPU) and Field-Programmable Gate Array (FPGA). The latter seems more suitable than others due to its higher configurability and lesser power consumption. The goal of this study is the acceleration of a DNN-based IDS on FPGA. In this study, which is... 

    Trustworthiness Improvement of Integrated Circuits against Hardware Trojans

    , Ph.D. Dissertation Sharif University of Technology Farajipour Ghohroud, Najmeh (Author) ; Hessabi, Shaahin (Supervisor)
    Abstract
    Most hardware manufacturers outsource the fabrication of their integrated circuits (ICs) to third party foundries in order to reduce the cost of silicon chip fabrication. This increases the vulnerability to malicious activities. Third party foundries may modify the circuit’s design or its physical parameters. These modifications are known as Hardware Trojan Horses (HTHs). An adversary can insert a Trojan in the design to disable and/or destroy a system, or leak information to the adversary. Several Methods are proposed for HTH Detection, and Design for Hardware Trust (DfHT) in the last decade. However, the lack of a comprehensive approach in this area is sensed. Moreover, the previously... 

    Hardware Acceleration of Deep Learning based Firewalls Using FPGA

    , M.Sc. Thesis Sharif University of Technology Fotovat, Amin (Author) ; Jahangir, Amir Hossein (Supervisor)
    Abstract
    In recent years, due to the drawback of rule-based firewalls in detecting unknown attacks, using neural networks has got more attention to be used in firewalls. As the computation load of neural networks are so much there is a need to decrease the processing time and power consumption as they are under load 24/7. Although there have been huge achievements in the usage of graphics processing units (which contain numerous processing cores) in neural networks, their high power consumption has made the scientists think about an alternative to implement neural networks. Field Programmable Gate Array (FPGA) is one of the most serious candidates to be used for implementing neural networks. The goal... 

    Performance Evaluation of Software-RAID vs. Hardware RAID Controller

    , M.Sc. Thesis Sharif University of Technology Abdi Deiman, Kimia (Author) ; Asadi, Hossein (Supervisor)
    Abstract
    With the increasing volume of digital data, the design of high-performance storage systems has become one of the major concerns of storage architects. Redundant Array of Independent Disks (RAID) based on either software or hardware implementation is commonly used in storage systems. Our thorough survey of previous work shows that there has been no study comparing and characterizing the efficiency of these two implementations on an array of solid state drives. In this thesis, we examine and compare the performance of software RAID compared to hardware RAID controller. In our study, we investigate major performance metrics including bandwidth, latency, and the number of inputs and outputs per... 

    Hardware-in-the-loop Simulation of Aircraft Machine-Vision-Based Autonomous Landing

    , M.Sc. Thesis Sharif University of Technology Abbasi Jokandan, Amin (Author) ; Saghafi, Fariborz (Supervisor) ; Kasaei, Shohreh (Co-Advisor)
    Abstract
    This project aims to present a solution in order to navigate and control a fixed wing Unmanned Air Vehicle (UAV) for the landing phase using position-based visual servoing (PBVS) and then implement the Hardware-in-the-loop simulation for that objective. In all phases of the simulation, it is assumed that a camera is attached under the UAV nose and is aligned with the UAV body x-axis. Initially, the situation wherein the UAV should be able to estimate its relative position by the Haralic algorithm based on four points as runway features and then give the command to a PID controller for autolanding will be simulated. Afterwards, a real camera should capture the runway image created by virtual... 

    Design of Reconfigurable Hardware Security Module Based on Network Protocol Detection

    , M.Sc. Thesis Sharif University of Technology Zohouri, Hamid Reza (Author) ; Jahangir, Amir Hossein (Supervisor)
    Abstract
    Nowadays, in the presence of different types of computer attacks and different methods of eavesdropping on network communications, nobody can deny the importance of cryptography. Hardware Security Modules that are specifically designed for this purpose are widely used as a fast and reliable tool for encrypting data in computer networks. In this project, using the common and well-known FPGA platform and by leveraging the reconfigurability feature of this platform and also by adding a network protocol detection module to the traditional architecture of Hardware Security Modules, a novel module has been designed and implemented that can encrypt and decrypt data in a communication network, at...