Loading...
Search for: network-layers
0.015 seconds
Total 62 records

    A Comparison between Virtual Private LAN Service (VPLS)and P2MP IP-only LAN Service (IPLS)

    , M.Sc. Thesis Sharif University of Technology Yousefi, Dariush (Author) ; Ajorloo, Hossein (Supervisor)
    Abstract
    Today Ethernet is the predominant technology for implementing Local Area Networks. Its privileges encourage service providers to extend Ethernet from Local Area Networks to Metropolitan Area Networks or even Wide Area Networks. Ethernet benefits such as low operational costs, well interoperability, plug-n-paly characteristic and rapid provisioning on demand make Ethernet ideal for Metropolitan Area Networks.But Ethernet by itself has some weakness like flat structure that makes it unfit for use in Metropolitan Area Networks. A suitable solution for taking advantages of Ethernet benefits in service provider network is using Ethernet in access network and applying multi-point to multi-point... 

    Long Lifetime Multipath Routing in Unreliable Wireless Multimedia Sensor Networks

    , M.Sc. Thesis Sharif University of Technology Nikseresht, Ilnaz (Author) ; Movaghar Rahimabadi, Ali (Supervisor) ; Mehri, Bahman (Co-Advisor)
    Abstract
    Most of the current routing protocols in the WMSNs only consider the inter-path interference and not necessarily intra-path interference factor which is considered as one of the main causes of energy consumption in these networks. Among those protocols that consider this factor, none of them has ever come up with an algorithm capable of performing the routing without the need to use either the special hardware in the nodes (referred to as the GPS or directional antennas) or with the unrealistic assumption that the interference range is equal to the transmission range. The previously mentioned factors are critical in the sense that the former assumption results in more expensive sensor nodes... 

    Improving Quality of Service in Multimedia Wireless Sensor Networks

    , M.Sc. Thesis Sharif University of Technology Malool, Iman (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Due to their specific characteristics such as huge data loads, heavy processes, various quality of service requirements (delay, jitter and reliability), multimedia streams have different necessities in comparison with normal data streams. The challenges of wireless sensor networks (process power, storage capacity and power limitations) add up to the challenges faced in WMSNs. In order to improve the quality of service in wireless multimedia sensor networks, attention must be paid to all the network layers. In this study improvement of quality of service is sought through the design of a protocol for the network layer of the wireless multimedia sensor network.
    This protocol tries to... 

    XPS study of size effects of Fe3O4 nanoparticles on crosslinking degree of magnetic TFN membrane

    , Article Polymer Testing ; Volume 73 , 2019 , Pages 232-241 ; 01429418 (ISSN) Tayefeh, A ; Poursalehi, R ; Wiesner, M ; Mousavi, S. A ; Sharif University of Technology
    Elsevier Ltd  2019
    Abstract
    The control of thin film nanocomposite (TFN) membranes cross-linking degree is an important factor to design new membranes and optimizing permeation characteristics. The Fe3O4 nanoparticle's based TFN membranes due to potentially added magnetic responsive properties to the membrane has a great importance in developing membrane architectures. Fe3O4/polyamide (PA) TFN membranes filled with nanoparticles in different sizes and concentrations have been synthesized. Cross-linking degree of PA layer characterized with Fourier transform spectroscopy (FTIR) and x-ray photoelectron spectroscopy (XPS) methods to evaluate size dependency of the cross-linking degree of PA layer network. Obvious... 

    Quality of service in the network layer of vehicular Ad hoc networks

    , Article 2016 World Congress on Engineering and Computer Science, WCECS 2016, 19 October 2016 through 21 October 2016 ; Volume 2225 , 2016 , Pages 114-118 ; 20780958 (ISSN); 9789881404718 (ISBN) Tabar, S ; Najjar, L ; Gholamalitabar, M ; Sharif University of Technology
    Newswood Limited  2016
    Abstract
    Vehicular Ad-hoc Networks (VANET) has attracted a great deal of attention during the last decade. This type of wireless network is predicted to play a key role in future automotive innovation. VANET as a foundation for Intelligent Transportation System (ITS) promises many improvements in terms of safety, resource efficiency and passenger assistance services. Among these three main categories, safety applications are the most important ones because they deal with the lives of large numbers of people who drive every day. Safety applications are classified as real-time applications; they must act within a certain period of time, otherwise their implementation will be worthless. As a result,... 

    Physical layer security in AF and CF relay networks with RF-energy harvesting

    , Article 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, 6 September 2017 through 7 September 2017 ; 2018 , Pages 86-92 ; 9781538665602 (ISBN) Soleimani, A ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Abstract
    In this paper, we investigate the achievable secrecy rate in a relay channel where the source and the destination wish to keep the information confidential from an untrusted relay (potential eavesdropper). The relay has no energy supply, and harvests its required energy for relaying from its received signals. For radio-frequency (RF) Energy Harvesting (EH) at the relay, we adopt power splitting (PS) approach. We study the problem of achieving positive secrecy rates between the transmitter and the receiver while making use of an untrusted relay. Energy limitation at the relay makes the problem more interesting. Because, the relay must choose either to eavesdrop the signal to be able to decode... 

    Physical-Layer schemes for wireless coded caching

    , Article IEEE Transactions on Information Theory ; Volume 65, Issue 5 , 2019 , Pages 2792-2807 ; 00189448 (ISSN) Shariatpanahi, S. P ; Caire, G ; Hossein Khalaj, B ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    We investigate the potentials of applying the coded caching paradigm in wireless networks. In order to do this, we investigate physical layer schemes for downlink transmission from a multiantenna transmitter to several cache-enabled users. As the baseline scheme, we consider employing coded caching on the top of max-min fair multicasting, which is shown to be far from optimal at high-SNR values. Our first proposed scheme, which is near-optimal in terms of DoF, is the natural extension of multiserver coded caching to Gaussian channels. As we demonstrate, its finite SNR performance is not satisfactory, and thus we propose a new scheme in which the linear combination of messages is implemented... 

    Analytical modeling and performance analysis of flooding in CSMA-based wireless networks

    , Article IEEE Transactions on Vehicular Technology ; Volume 60, Issue 2 , Volume 60, Issue 2 , 2011 , Pages 664-679 ; 00189545 (ISSN) Shah Mansouri, H ; Pakravan, M. R ; Khalaj, B. H ; Sharif University of Technology
    Abstract
    Although different broadcasting techniques are widely deployed in wireless networks, there are limited comprehensive analytical frameworks to evaluate the performance of such schemes. In this paper, based on a rigorous theoretical analysis, upper bounds on the network coverage and the total number of transmissions (corresponding to network energy consumption) of flooding and its popular variant probabilistic flooding are derived. The analysis is performed for a static multihop ad hoc wireless network when the network is in saturated condition. To consider a realistic medium-access control (MAC) layer algorithm, successful signal reception is based on the protocol model, and nodes employ... 

    Physical layer security for some classes of three-receiver broadcast channels

    , Article IET Communications ; Vol. 8, issue. 11 , July , 2014 , p. 1965-1976 Salehkalaibar, S ; Aref, M. R ; Sharif University of Technology
    Abstract
    In this study, the authors consider the secrecy of a one-receiver, two-eavesdropper broadcast channel (BC) with three degraded message sets. Consider a three-receiver BC with three messages, where the first message is decoded by all the receivers. The second message is decoded by the first and the second receivers and is to be kept secret from the third receiver. The third message is decoded by the first receiver and is to be kept secret from the second and the third receivers. The authors consider the imperfect secrecy condition at the second receiver, that is, it is allowed to partially decode the third message. However, the perfect secrecy condition at the third receiver, does not allow... 

    High-Speed multi-layer convolutional neural network based on free-space optics

    , Article IEEE Photonics Journal ; Volume 14, Issue 4 , 2022 ; 19430655 (ISSN) Sadeghzadeh, H ; Koohi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    Convolutional neural networks (CNNs) are at the heart of several machine learning applications, while they suffer from computational complexity due to their large number of parameters and operations. Recently, all-optical implementation of the CNNs has achieved many attentions, however, the recently proposed optical architectures for CNNs cannot fully utilize the tremendous capabilities of optical processing, due to the required electro-optical conversions in-between successive layers. To implement an all-optical multi-layer CNN, it is essential to optically implement all required operations, namely convolution, summation of channels' output for each convolutional kernel feeding the... 

    A comprehensive study on CO2 solubility in brine: Thermodynamic-based and neural network modeling

    , Article Fluid Phase Equilibria ; Volume 403 , October , 2015 , Pages 153-159 ; 03783812 (ISSN) Sadeghi, M ; Salami, H ; Taghikhani, V ; Robert, M. A ; Sharif University of Technology
    Elsevier  2015
    Abstract
    Phase equilibrium data are required to estimate the capacity of a geological formation to sequester CO2. In this paper, a comprehensive study, including both thermodynamic and neural network modeling, is performed on CO2 solubility in brine. Brine is approximated by a NaCl solution. The Redlich-Kwong equation of state and Pitzer expansion are used to develop the thermodynamic model. The equation of state constants are adjusted by genetic algorithm optimization. A novel approach based on a neural network model is utilized as well. The temperature range in which the presented model is valid is 283-383K, and for pressure is 0-600bar, covering the temperature and pressure... 

    Coordination of large-scale systems using fuzzy optimal control strategies and neural networks

    , Article 2016 IEEE International Conference on Fuzzy Systems, 24 July 2016 through 29 July 2016 ; 2016 , Pages 2035-2042 ; 9781509006250 (ISBN) Sadati, N ; Berenji, H ; Gulf University for Science and Technology (GUST); IEEE; IEEE Big Data Initiative; IEEE Computational Intelligence Society (CIS); The International Neural Network Society (INNS) ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    Coordination strategies in large-scale systems are mainly based on two principles: interaction prediction and interaction balance. Using these principles, Model coordination and Goal coordination were proposed. The interactions in the first method and the Lagrangian coefficients in the second method were considered as coordination parameters. In this paper, the concept of coordination is introduced within the framework of two-level large-scale systems and a new intelligent approach for Model coordination is introduced. For this purpose, the system is decomposed into several subsystems, and the overall problem is considered as an optimization problem. With the aim of optimization, the control... 

    Neural control of a fully actuated biped robot

    , Article IECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics, Paris, 6 November 2006 through 10 November 2006 ; 2006 , Pages 3104-3109 ; 1424401364 (ISBN); 9781424401369 (ISBN) Sadati, N ; Hamed, K. A ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    According to the fact that humans and animals show marvelous abilities in walking on irregular terrain, there is a strong need for adaptive algorithms in walking of biped robots to behave like them. Since the stance leg can easily rise from the ground and it can easily rotate about the toe or the heel, the problem of controlling the biped robots is difficult. In this paper, according to the adaptive locomotion patterns of animals, coordination and control of body links have been done with Central Pattern Generator (CPG) in spinal cord and feedback network from musculoskeletal system. A one layer feedforward neural network that its inputs are the scaled joint variables and the touch sensors... 

    Throughput analysis of IEEE 802.11 multi-hop wireless networks with routing consideration: A general framework

    , Article IEEE Transactions on Communications ; Volume 66, Issue 11 , 2018 , Pages 5430-5443 ; 00906778 (ISSN) Rezaei, S ; Gharib, M ; Movaghar, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    The end-to-end throughput of multi-hop communication in wireless ad hoc networks is affected by the conflict between forwarding nodes. It has been shown that sending more packets than maximum achievable end-to-end throughput not only fails to increase throughput but also decreases throughput owing to high contention and collision. Accordingly, it is of crucial importance for a source node to know the maximum end-to-end throughput. The end-to-end throughput depends on multiple factors, such as physical layer limitations, medium access control (MAC) protocol properties, routing policy, and nodes' distribution. There have been many studies on analytical modeling of end-to-end throughput but... 

    Secrecy throughput maximization for full-duplex wireless powered IOT networks under fairness constraints

    , Article IEEE Internet of Things Journal ; Volume 6, Issue 4 , 2019 , Pages 6964-6976 ; 23274662 (ISSN) Rezaei, R ; Sun, S ; Kang, X ; Guan, Y. L ; Pakravan, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we study the secrecy throughput of a full-duplex wireless powered communication network (WPCN) for Internet of Things (IoT). The WPCN consists of a full-duplex multiantenna base station (BS) and a number of sensor nodes. The BS transmits energy all the time, and each node harvests energy prior to its transmission time slot. The nodes sequentially transmit their confidential information to the BS, and the other nodes are considered as potential eavesdroppers. We first aim to optimize the sum secrecy throughput of the nodes. The optimization variables are the duration of the time slots and the BS beamforming vectors in different time slots. The optimization problem is shown to... 

    Diffusion of innovations over multiplex social networks

    , Article Proceedings of the International Symposium on Artificial Intelligence and Signal Processing, AISP 2015, 3 March 2015 through 5 March 2015 ; 2015 , Pages 300-304 ; 9781479988174 (ISBN) Ramezanian, R ; Magnani, M ; Salehi, M ; Montesi, D ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    The ways in which an innovation (e.g., new behaviour, idea, technology, product) diffuses among people can determine its success or failure. In this paper, we address the problem of diffusion of innovations over multiplex social networks where the neighbours of a person belong to one or multiple networks (or layers) such as friends, families, or colleagues. To this end, we generalise one of the basic game-theoretic diffusion models, called networked coordination game, for multiplex networks. We present analytical results for this extended model and validate them through a simulation study, finding among other properties a lower bound for the success of an innovation. While simple and leading... 

    A novel genetic-based resource allocation and cooperative node selection technique for physical layer security designs

    , Article Wireless Personal Communications ; Volume 95, Issue 4 , 2017 , Pages 4733-4746 ; 09296212 (ISSN) Okati, N ; Mosavi, M. R ; Behroozi, H ; Sharif University of Technology
    Springer New York LLC  2017
    Abstract
    This paper presents a novel approach for power allocation and cooperative node selection to enhance physical layer security in presence of an eavesdropper in a wireless network. Our network consists of a source–destination pair and a number of cooperative nodes which can be used as relays to increase throughput at the destination, or as friendly jammers to confuse eavesdropper. First, we introduce a low complexity method, for which relay−jammer selection and power allocation are performed, simultaneously. Then, we propose self-adaptive genetic algorithm to solve the non-linear non-convex programing problem. Using the proposed method, the number of friendly jammers that ensure the secrecy... 

    A genetic approach in relay-jammer selection and power allocation for physical layer security

    , Article 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 374-379 ; 9781509034345 (ISBN) Okati, N ; Mosavi, M. R ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    Node cooperation approaches improve physical layer security in wireless networks without applying data encryption. Selecting the appropriate nodes to cooperate as relays or friendly jammers, to degrade eavesdropper's link, is a challenging problem which has attracted a lot of attention in recent years. Various approaches, based on conventional exhaustive search, have been suggested for optimal relay-jammer selection and power allocation in the literature. The complexity of these methods is proportional to the number of intermediate nodes. As the number of intermediate nodes exceeds a specific bound, conventional exhaustive search appears infeasible due to high computational complexity. In... 

    Spectrally encoded code division multiple access-based cognitive relay networks

    , Article IET Communications ; Volume 9, Issue 12 , August , 2015 , Pages 1510-1521 ; 17518628 (ISSN) Najafi, S ; Shayesteh, M. G ; Sharif University of Technology
    Institution of Engineering and Technology  2015
    Abstract
    Cognitive radio and cooperative networks are increasingly regarded as revolutionary technologies that utilise the radio spectrum efficiently. In this study, spectrally encoded (spread-time) code division multiple access (SE-CDMA) scheme is proposed as a flexible and adaptable technique for physical layer of cognitive relay networks. All primary and secondary users transmit their signals to a common base station (BS) and then the BS selects one of the cognitive secondary users based on feedback information to relay the primary user's (PU's) data. To study the efficiency of the system, two scenarios are considered. In the first scenario, the secondary users transmit their information using the... 

    An overlay multicast protocol for multimedia applications in mobile ad-hoc networks

    , Article 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, 9 December 2008 through 12 December 2008 ; 2008 , Pages 162-167 ; 9780769534732 (ISBN) Naderan Tahan, M ; Rabiee, H. R ; Saremi, F ; Iranmanesh, Z ; Sharif University of Technology
    IEEE Computer Society  2008
    Abstract
    Overlay multicast has gained much attention in recent years as an alternative method to network layer multicast, especially for mobile ad hoc networks (MANETs). In this paper, we propose a new overlay multicast protocol to achieve simplicity of deployment, rapid adaptation of overlay structure when nodes move, and reduced delay. In our algorithm, to join or leave a multicast group, it is only sufficient for a member node to inform its first upstream member node. This updates the tree structure more rapidly when nodes move. In addition, join and leave delays are reduced and this makes the protocol suitable for multimedia multicasting in MANETs. Simulation results compared to that of ODMRP and...