Loading...
Search for: network-layers
0.011 seconds
Total 62 records

    Long Lifetime Multipath Routing in Unreliable Wireless Multimedia Sensor Networks

    , M.Sc. Thesis Sharif University of Technology Nikseresht, Ilnaz (Author) ; Movaghar Rahimabadi, Ali (Supervisor) ; Mehri, Bahman (Co-Advisor)
    Abstract
    Most of the current routing protocols in the WMSNs only consider the inter-path interference and not necessarily intra-path interference factor which is considered as one of the main causes of energy consumption in these networks. Among those protocols that consider this factor, none of them has ever come up with an algorithm capable of performing the routing without the need to use either the special hardware in the nodes (referred to as the GPS or directional antennas) or with the unrealistic assumption that the interference range is equal to the transmission range. The previously mentioned factors are critical in the sense that the former assumption results in more expensive sensor nodes... 

    A Comparison between Virtual Private LAN Service (VPLS)and P2MP IP-only LAN Service (IPLS)

    , M.Sc. Thesis Sharif University of Technology Yousefi, Dariush (Author) ; Ajorloo, Hossein (Supervisor)
    Abstract
    Today Ethernet is the predominant technology for implementing Local Area Networks. Its privileges encourage service providers to extend Ethernet from Local Area Networks to Metropolitan Area Networks or even Wide Area Networks. Ethernet benefits such as low operational costs, well interoperability, plug-n-paly characteristic and rapid provisioning on demand make Ethernet ideal for Metropolitan Area Networks.But Ethernet by itself has some weakness like flat structure that makes it unfit for use in Metropolitan Area Networks. A suitable solution for taking advantages of Ethernet benefits in service provider network is using Ethernet in access network and applying multi-point to multi-point... 

    Improving Quality of Service in Multimedia Wireless Sensor Networks

    , M.Sc. Thesis Sharif University of Technology Malool, Iman (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Due to their specific characteristics such as huge data loads, heavy processes, various quality of service requirements (delay, jitter and reliability), multimedia streams have different necessities in comparison with normal data streams. The challenges of wireless sensor networks (process power, storage capacity and power limitations) add up to the challenges faced in WMSNs. In order to improve the quality of service in wireless multimedia sensor networks, attention must be paid to all the network layers. In this study improvement of quality of service is sought through the design of a protocol for the network layer of the wireless multimedia sensor network.
    This protocol tries to... 

    Mutual manufacturing service selection and routing problem considering customer clustering in Cloud manufacturing

    , Article Production and Manufacturing Research ; 2018 ; 21693277 (ISSN) Assari, M ; Delaram, J ; Fatahi Valilai, O ; Sharif University of Technology
    Taylor and Francis Ltd  2018
    Abstract
    Considering the globalization concept, all companies around the world are able to communicate with each other, share their technologies, and eliminate their production incapability issues. To achieve this goal, Cloud manufacturing system has been proposed. One of the most important issues in Cloud manufacturing is service composition, in which composition of cloud services is determined to meet customer orders. This paper considers a single-product supply network over one period in Cloud manufacturing system with the goal of service composition optimization. The network is designed in a layered structure considering transportation and production services and customers can be classified in... 

    Simulation and optimization of pulsating heat pipe flat-plate solar collectors using neural networks and genetic algorithm: a semi-experimental investigation

    , Article Clean Technologies and Environmental Policy ; Volume 18, Issue 7 , 2016 , Pages 2251-2264 ; 1618954X (ISSN) Jalilian, M ; Kargarsharifabad, H ; Abbasi Godarzi, A ; Ghofrani, A ; Shafii, M. B ; Sharif University of Technology
    Springer Verlag  2016
    Abstract
    This research study presents an investigation on the behavior of a Pulsating Heat Pipe Flat-Plate Solar Collector (PHPFPSC) by artificial neural network method and an optimization of the parameters of the collector by genetic algorithm. In this study, several experiments were performed to study the effects of various evaporator lengths, filling ratios, inclination angles, solar radiation, and input chilled water temperature between 9:00 A.M. to 5:00 P.M., and the output temperature of the water tank, which was the output of the system, was also measured. According to the input and output information, multilayer perceptron neural network was trained and used to predict the behavior of the... 

    3D hand pose estimation using RGBD images and hybrid deep learning networks

    , Article Visual Computer ; 2021 ; 01782789 (ISSN) Mofarreh Bonab, M ; Seyedarabi, H ; Mozaffari Tazehkand, B ; Kasaei, S ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2021
    Abstract
    Hand pose estimation is one of the most attractive research areas for image processing. Among the human body parts, hands are particularly important for human–machine interactions. The advent of commercial depth cameras along with the rapid growth of deep learning has made great progress in all image processing fields, especially in hand pose estimation. In this study, using depth data, we introduce two hybrid deep neural networks to estimate 3D hand poses with fewer computations and higher accuracy compared with their counterparts. Due to the fact that the dimensions of data are reduced while passing through successive layers of networks, which causes data to be lost, we use the concept of... 

    An intelligent computer method for vibration responses of the spinning multi-layer symmetric nanosystem using multi-physics modeling

    , Article Engineering with Computers ; 2021 ; 01770667 (ISSN) Guo, J ; Baharvand, A ; Tazeddinova, D ; Habibi, M ; Safarpour, H ; Roco Videla, A ; Selmi, A ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2021
    Abstract
    This article is the first attempt to employ deep learning to estimate the frequency performance of the rotating multi-layer nanodisks. The optimum values of the parameters involved in the mechanism of the fully connected neural network are determined through the momentum-based optimizer. The strength of the method applied in this survey comes from the high accuracy besides lower epochs needed to train the multi-layered network. It should be mentioned that the current nanostructure is modeled as a nanodisk on the viscoelastic substrate. Due to rotation, the centrifugal and Coriolis effects are considered. Hamilton’s principle and generalized differential quadrature method (GDQM) are presented... 

    An intelligent computer method for vibration responses of the spinning multi-layer symmetric nanosystem using multi-physics modeling

    , Article Engineering with Computers ; Volume 38 , 2022 , Pages 4217-4238 ; 01770667 (ISSN) Guo, J ; Baharvand, A ; Tazeddinova, D ; Habibi, M ; Safarpour, H ; Roco-Videla, A ; Selmi, A ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2022
    Abstract
    This article is the first attempt to employ deep learning to estimate the frequency performance of the rotating multi-layer nanodisks. The optimum values of the parameters involved in the mechanism of the fully connected neural network are determined through the momentum-based optimizer. The strength of the method applied in this survey comes from the high accuracy besides lower epochs needed to train the multi-layered network. It should be mentioned that the current nanostructure is modeled as a nanodisk on the viscoelastic substrate. Due to rotation, the centrifugal and Coriolis effects are considered. Hamilton’s principle and generalized differential quadrature method (GDQM) are presented... 

    3D hand pose estimation using RGBD images and hybrid deep learning networks

    , Article Visual Computer ; Volume 38, Issue 6 , 2022 , Pages 2023-2032 ; 01782789 (ISSN) Mofarreh Bonab, M ; Seyedarabi, H ; Mozaffari Tazehkand, B ; Kasaei, S ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2022
    Abstract
    Hand pose estimation is one of the most attractive research areas for image processing. Among the human body parts, hands are particularly important for human–machine interactions. The advent of commercial depth cameras along with the rapid growth of deep learning has made great progress in all image processing fields, especially in hand pose estimation. In this study, using depth data, we introduce two hybrid deep neural networks to estimate 3D hand poses with fewer computations and higher accuracy compared with their counterparts. Due to the fact that the dimensions of data are reduced while passing through successive layers of networks, which causes data to be lost, we use the concept of... 

    A novel genetic-based resource allocation and cooperative node selection technique for physical layer security designs

    , Article Wireless Personal Communications ; Volume 95, Issue 4 , 2017 , Pages 4733-4746 ; 09296212 (ISSN) Okati, N ; Mosavi, M. R ; Behroozi, H ; Sharif University of Technology
    Springer New York LLC  2017
    Abstract
    This paper presents a novel approach for power allocation and cooperative node selection to enhance physical layer security in presence of an eavesdropper in a wireless network. Our network consists of a source–destination pair and a number of cooperative nodes which can be used as relays to increase throughput at the destination, or as friendly jammers to confuse eavesdropper. First, we introduce a low complexity method, for which relay−jammer selection and power allocation are performed, simultaneously. Then, we propose self-adaptive genetic algorithm to solve the non-linear non-convex programing problem. Using the proposed method, the number of friendly jammers that ensure the secrecy... 

    Optimum low complexity filter bank for generalized orthogonal frequency division multiplexing

    , Article Eurasip Journal on Wireless Communications and Networking ; Volume 2018, Issue 1 , 2018 ; 16871472 (ISSN) Abbaszadeh, M. H ; Khalaj, B. H ; Haghbin, A ; Sharif University of Technology
    Springer International Publishing  2018
    Abstract
    Generalized frequency division multiplexing (GFDM) is one of the multicarrier modulation candidates proposed for the 5th generation of wireless networks. Among GFDM linear receivers, GFDM MMSE receiver achieves the best error performance for multipath fading channels at the cost of high numerical complexity. Hence, the combination of GFDM match filter (MF) receiver and double-side successive interference cancellation (DSIC) method is used instead. However, there is a significant gap between the error performance of GFDM MMSE and DSIC/MF receivers for the case of employing modern channel coding. Recently, we have proposed a new multicarrier scheme based on GFDM architecture called generalized... 

    A survey of key pre-distribution and overlay routing in unstructured wireless networks

    , Article Scientia Iranica ; Volume 23, Issue 6 , 2016 , Pages 2831-2844 ; 10263098 (ISSN) Gharib, M ; Yousefi'zadeh, H ; Movaghar, A ; Sharif University of Technology
    Sharif University of Technology  2016
    Abstract
    Unstructured wireless networks such as mobile ad hoc networks and wireless sensor networks have been rapidly growing in the past decade. Security is known as a challenging issue in such networks, in which there is no fixed infrastructure or central trusted authority. Further, node limitations in processing power, storage, and energy consumption add further complexity to addressing security in such networks. While cryptography has proven to be an effective solution capable of satisfying most network security requirements, it requires the use of efficient key pre-distribution algorithms compatible with the limitation of unstructured wireless networks. Typically, a key pre-distribution... 

    Extending concepts of mapping of human brain to artificial intelligence and neural networks

    , Article Scientia Iranica ; Volume 28, Issue 3 D , 2021 , Pages 1529-1534 ; 10263098 (ISSN) Joghataie, A ; Sharif University of Technology
    Sharif University of Technology  2021
    Abstract
    This paper introduces the concept of mapping of Artificially Intelligent (AI) computational systems. The concept of homunculus from human neurophysiology is extended to AI systems. It is assumed that an AI system behaves similarly to a mini-column or ganglion in the natural animal brain that comprises a layer of afferent (input) neurons, a number of interconnecting processing cells, and a layer of efferent (output) neurons or organs. The objective of the present study was to identify the correlation between the stimulus to each afferent neuron and the corresponding response from each efferent organ when the intelligent system is subjected to certain stimuli. To clarify the general concept, a... 

    Quality of service in the network layer of vehicular Ad hoc networks

    , Article 2016 World Congress on Engineering and Computer Science, WCECS 2016, 19 October 2016 through 21 October 2016 ; Volume 2225 , 2016 , Pages 114-118 ; 20780958 (ISSN); 9789881404718 (ISBN) Tabar, S ; Najjar, L ; Gholamalitabar, M ; Sharif University of Technology
    Newswood Limited  2016
    Abstract
    Vehicular Ad-hoc Networks (VANET) has attracted a great deal of attention during the last decade. This type of wireless network is predicted to play a key role in future automotive innovation. VANET as a foundation for Intelligent Transportation System (ITS) promises many improvements in terms of safety, resource efficiency and passenger assistance services. Among these three main categories, safety applications are the most important ones because they deal with the lives of large numbers of people who drive every day. Safety applications are classified as real-time applications; they must act within a certain period of time, otherwise their implementation will be worthless. As a result,... 

    Physical layer encryption scheme using finite-length polar codes

    , Article IET Communications ; Volume 9, Issue 15 , 2015 , Pages 1857-1866 ; 17518628 (ISSN) Hooshmand, R ; Aref, M. R ; Eghlidos, T ; Sharif University of Technology
    Institution of Engineering and Technology  2015
    Abstract
    In this study, by exploiting the properties of finite-length polar codes, the authors introduce a physical layer encryption scheme to make secure (from a computational security perspective) and efficient communication between a sender (Alice) and a legitimate receiver (Bob) against both active and passive attacks, simultaneously. To prevent active attacks, two techniques are considered: (i) a novel method is introduced to keep the generator matrix of polar code secret from an active attacker (Oscar); (ii) a proper joint polar encoding/encryption algorithm based on the hidden generator matrix is introduced. Two additional strategies are considered against passive attacks: (i) a new method is... 

    Spectrally encoded code division multiple access-based cognitive relay networks

    , Article IET Communications ; Volume 9, Issue 12 , August , 2015 , Pages 1510-1521 ; 17518628 (ISSN) Najafi, S ; Shayesteh, M. G ; Sharif University of Technology
    Institution of Engineering and Technology  2015
    Abstract
    Cognitive radio and cooperative networks are increasingly regarded as revolutionary technologies that utilise the radio spectrum efficiently. In this study, spectrally encoded (spread-time) code division multiple access (SE-CDMA) scheme is proposed as a flexible and adaptable technique for physical layer of cognitive relay networks. All primary and secondary users transmit their signals to a common base station (BS) and then the BS selects one of the cognitive secondary users based on feedback information to relay the primary user's (PU's) data. To study the efficiency of the system, two scenarios are considered. In the first scenario, the secondary users transmit their information using the... 

    Low energy yet reliable data communication scheme for network-on-chip

    , Article IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ; Volume 34, Issue 12 , 2015 , Pages 1892-1904 ; 02780070 (ISSN) Jafarzadeh, N ; Palesi, M ; Eskandari, S ; Hessabi, S ; Afzali-Kusha, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    In this paper, a low energy yet reliable communication scheme for network-on-chip is suggested. To reduce the communication energy consumption, we invoke low-swing signals for transmitting data, as well as data encoding techniques, for minimizing both self and coupling switching capacitance activity factors. To maintain the communication reliability of communication at low-voltage swing, an error control coding (ECC) technique is exploited. The decision about end-To-end or hop-To-hop ECC schemes and the proper number of detectable errors are determined through high-level mathematical analysis on the energy and reliability characteristics of the techniques. Based on the analysis, the extended... 

    Diffusion of innovations over multiplex social networks

    , Article Proceedings of the International Symposium on Artificial Intelligence and Signal Processing, AISP 2015, 3 March 2015 through 5 March 2015 ; 2015 , Pages 300-304 ; 9781479988174 (ISBN) Ramezanian, R ; Magnani, M ; Salehi, M ; Montesi, D ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    The ways in which an innovation (e.g., new behaviour, idea, technology, product) diffuses among people can determine its success or failure. In this paper, we address the problem of diffusion of innovations over multiplex social networks where the neighbours of a person belong to one or multiple networks (or layers) such as friends, families, or colleagues. To this end, we generalise one of the basic game-theoretic diffusion models, called networked coordination game, for multiplex networks. We present analytical results for this extended model and validate them through a simulation study, finding among other properties a lower bound for the success of an innovation. While simple and leading... 

    Secure overlay routing using key pre-distribution: A linear distance optimization approach

    , Article IEEE Transactions on Mobile Computing ; Volume 15, Issue 9 , 2016 , Pages 2333-2344 ; 15361233 (ISSN) Gharib, M ; Yousefi'zadeh, H ; Movaghar, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Key pre-distribution algorithms have recently emerged as efficient alternatives of key management in today's secure communications landscape. Secure routing techniques using key pre-distribution algorithms require special algorithms capable of finding optimal secure overlay paths. To the best of our knowledge, the literature of key pre-distribution systems is still facing a major void in proposing optimal overlay routing algorithms. In the literature work, traditional routing algorithms are typically used twice to find a NETWORK layer path from the source node to the destination and then to find required cryptographic paths. In this paper, we model the problem of secure routing using... 

    Physical layer network coding in molecular two-way relay networks

    , Article IWCIT 2016 - Iran Workshop on Communication and Information Theory, 3 May 2016 through 4 May 2016 ; 2016 ; 9781509019229 (ISBN) Farahnak Ghazani, M ; Aminian, G ; Mirmohseni, M ; Gohari, A ; Nasiri Kenari, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    In traditional wireless networks, physical layer network coding (PNC) exploits the inverse additivity property of broadcast signals in the medium, an idea which is not directly applicable to molecular networks. In this paper, to make the natural XOR operation possible at the physical layer, we exploit the reaction of different molecule types and we propose a PNC scheme in diffusion-based molecular relay networks. For comparison, we consider the straightforward network coding (SNC) scheme in molecular networks. Assuming the ligand-receptor binding process at the receivers, we investigate the error performance of both schemes. It is observed that in addition to the simplicity of the proposed...