Loading...
Search for: network-layers
0.008 seconds
Total 62 records

    Developing a feed forward multilayer neural network model for prediction of CO2 solubility in blended aqueous amine solutions

    , Article Journal of Natural Gas Science and Engineering ; Volume 21 , November , 2014 , Pages 19-25 ; ISSN: 18755100 Hamzehie, M. E ; Mazinani, S ; Davardoost, F ; Mokhtare, A ; Najibi, H ; Van der Bruggen, B ; Darvishmanesh, S ; Sharif University of Technology
    Abstract
    Absorption of carbon dioxide (CO2) in aqueous solutions can be improved by the addition of other compounds. However, this requires a large amount of equilibrium data for solubility estimation in a wide ranges of temperature, pressure and concentration. In this paper, a model based on an artificial neural network (ANN) was proposed and developed with mixtures containing monoethanolamine (MEA), diethanolamine (DEA), methyldiethanolamine (MDEA), 2-amino-2-methyl-1-propanol (AMP), methanol, triethanolamine (TEA), piperazine (PZ), diisopropanolamine (DIPA) and tetramethylensulfone (TMS) to predict solubility of CO2 in mixed aqueous solution (especially in binary and ternary mixtures) over wide... 

    The simulation of microbial enhanced oil recovery by using a two-layer perceptron neural network

    , Article Petroleum Science and Technology ; Vol. 32, Issue. 22 , 2014 , pp. 2700-2707 ; ISSN: 10916466 Morshedi, S ; Torkaman, M ; Sedaghat, M. H ; Ghazanfari M.H ; Sharif University of Technology
    Abstract
    The authors simulated a reservoir by using two-layer perceptron. Indeed a model was developed to simulate the increase in oil recovery caused by bacteria injection into an oil reservoir. This model was affected by reservoir temperature and amount of water injected into the reservoir for enhancing oil recovery. Comparing experimental and simulation results and also the erratic trend of data show that the neural networks have modeled this system properly. Considering the effects of nonlinear factors and their erratic and unknown impacts on recovered oil, the perceptron neural network can develop a proper model for oil recovery factor in various conditions. The neural networks have not been... 

    Physical layer security for some classes of three-receiver broadcast channels

    , Article IET Communications ; Vol. 8, issue. 11 , July , 2014 , p. 1965-1976 Salehkalaibar, S ; Aref, M. R ; Sharif University of Technology
    Abstract
    In this study, the authors consider the secrecy of a one-receiver, two-eavesdropper broadcast channel (BC) with three degraded message sets. Consider a three-receiver BC with three messages, where the first message is decoded by all the receivers. The second message is decoded by the first and the second receivers and is to be kept secret from the third receiver. The third message is decoded by the first receiver and is to be kept secret from the second and the third receivers. The authors consider the imperfect secrecy condition at the second receiver, that is, it is allowed to partially decode the third message. However, the perfect secrecy condition at the third receiver, does not allow... 

    Proposing a hybrid protocol for secure wireless networks based on signcryption scheme

    , Article 2013 World Congress on Computer and Information Technology, WCCIT 2013 ; June , 2013 , Page(s): 1 - 6 ; 9781479904600 (ISBN) Darmian, N. R ; Oskoei, H. R. D ; Vazirnezhad, B ; Sharif University of Technology
    2013
    Abstract
    Considering the weaknesses of cryptography algorithms and the attacks performed against them, cryptography alone cannot guarantee the security of communication in a wireless network. With regard to the developments in wireless communication networks brought about by smart array antennas, security can be sought in the physical layer as well, aiming to restrict the access of the data in a wireless network and limit it to authorized users only in order to further restrain malicious data accesses. In this paper, we analysis a strategy for restricting data access using smart array antennas and present the results in security by a parameter called exposure region. For this strategy afterwards we... 

    Network layer challenges of IEEE 802.11n wireless ad hoc networks

    , Article Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering ; Volume 72 LNICST , 2012 , Pages 377-388 ; 18678211 (ISSN) ; 9783642291562 (ISBN) EffatParvar, M ; Yazdani, N ; EffatParvar, M ; Teymoori, P ; Movaghar, A ; Sharif University of Technology
    2012
    Abstract
    Recent demands toward high-speed wireless networks are growing. IEEE 802.11n, as the latest standard toward achieving higher speeds, aims to enhance IEEE 802.11 for higher throughputs. There are few works which analyze performance of this protocol in single-hop networks in terms of MAC layer-based parameters. Most of these works suggest disabling the RTS/CTS handshake to reduce MAC layer overheads. However, the effects of this protocol on the upper layers, especially the network layer, are still unknown. This paper deals with investigating performance of the network layer over IEEE 802.11n. Through extensive simulations performed in NS-2 we show that although network throughput is improved... 

    Comparison of mouse embryo deformation modeling under needle injection using analytical Jacobian, nonlinear least square and artificial neural network techniques

    , Article Scientia Iranica ; Volume 18, Issue 6 , 2011 , Pages 1486-1491 ; 10263098 (ISSN) Abbasi, A. A ; Ahmadian, M. T ; Vossoughi, G. R ; Sharif University of Technology
    Abstract
    Analytical Jacobian, nonlinear least square and three layer artificial neural network models are employed to predict deformation of mouse embryos under needle injection, based on experimental data captured from literature. The Maximum Absolute Error (MAE), coefficient of determination ( R2), Relative Error of Prediction (REP), Root Mean Square Error of Prediction (RMSEP), NashSutcliffe coefficient of efficiency ( Ef) and accuracy factor ( Af) are used as the basis for comparison of these three models. Analytical Jacobian, nonlinear least square and ANN models have yielded the correlation coefficient of 0.9985, 0.9964 and 0.9998, respectively. The REP between the models predicted values and... 

    Stochastic restricted broadcast process theory

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 6977 LNCS , 2011 , Pages 72-86 ; 03029743 (ISSN) ; 9783642247484 (ISBN) Ghassemi, F ; Talebi, M ; Movaghar, A ; Fokkink, W ; Sharif University of Technology
    Abstract
    We provide a framework for modeling and analyzing both qualitative and quantitative aspects of mobile ad hoc network (MANET) protocols above the data-link layer. We extend Restricted Broadcast Process Theory [11,9]: delay functions are assigned to actions, while the semantics captures the interplay of a MANET protocol with stochastic behavior of the data-link and physical layer, and the dynamic topology. A continuous-time Markov chain is derived from our semantic model by resolving non-determinism, using the notion of weak Markovian network bisimilarity. The framework is applied to a leader election algorithm  

    Low energy yet reliable data communication scheme for network-on-chip

    , Article IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ; Volume 34, Issue 12 , 2015 , Pages 1892-1904 ; 02780070 (ISSN) Jafarzadeh, N ; Palesi, M ; Eskandari, S ; Hessabi, S ; Afzali-Kusha, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    In this paper, a low energy yet reliable communication scheme for network-on-chip is suggested. To reduce the communication energy consumption, we invoke low-swing signals for transmitting data, as well as data encoding techniques, for minimizing both self and coupling switching capacitance activity factors. To maintain the communication reliability of communication at low-voltage swing, an error control coding (ECC) technique is exploited. The decision about end-To-end or hop-To-hop ECC schemes and the proper number of detectable errors are determined through high-level mathematical analysis on the energy and reliability characteristics of the techniques. Based on the analysis, the extended... 

    Long Lifetime Multipath Routing in Unreliable Wireless Multimedia Sensor Networks

    , M.Sc. Thesis Sharif University of Technology Nikseresht, Ilnaz (Author) ; Movaghar Rahimabadi, Ali (Supervisor) ; Mehri, Bahman (Co-Advisor)
    Abstract
    Most of the current routing protocols in the WMSNs only consider the inter-path interference and not necessarily intra-path interference factor which is considered as one of the main causes of energy consumption in these networks. Among those protocols that consider this factor, none of them has ever come up with an algorithm capable of performing the routing without the need to use either the special hardware in the nodes (referred to as the GPS or directional antennas) or with the unrealistic assumption that the interference range is equal to the transmission range. The previously mentioned factors are critical in the sense that the former assumption results in more expensive sensor nodes... 

    Improving Quality of Service in Multimedia Wireless Sensor Networks

    , M.Sc. Thesis Sharif University of Technology Malool, Iman (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    Due to their specific characteristics such as huge data loads, heavy processes, various quality of service requirements (delay, jitter and reliability), multimedia streams have different necessities in comparison with normal data streams. The challenges of wireless sensor networks (process power, storage capacity and power limitations) add up to the challenges faced in WMSNs. In order to improve the quality of service in wireless multimedia sensor networks, attention must be paid to all the network layers. In this study improvement of quality of service is sought through the design of a protocol for the network layer of the wireless multimedia sensor network.
    This protocol tries to... 

    A comprehensive study on CO2 solubility in brine: Thermodynamic-based and neural network modeling

    , Article Fluid Phase Equilibria ; Volume 403 , October , 2015 , Pages 153-159 ; 03783812 (ISSN) Sadeghi, M ; Salami, H ; Taghikhani, V ; Robert, M. A ; Sharif University of Technology
    Elsevier  2015
    Abstract
    Phase equilibrium data are required to estimate the capacity of a geological formation to sequester CO2. In this paper, a comprehensive study, including both thermodynamic and neural network modeling, is performed on CO2 solubility in brine. Brine is approximated by a NaCl solution. The Redlich-Kwong equation of state and Pitzer expansion are used to develop the thermodynamic model. The equation of state constants are adjusted by genetic algorithm optimization. A novel approach based on a neural network model is utilized as well. The temperature range in which the presented model is valid is 283-383K, and for pressure is 0-600bar, covering the temperature and pressure... 

    Physical layer encryption scheme using finite-length polar codes

    , Article IET Communications ; Volume 9, Issue 15 , 2015 , Pages 1857-1866 ; 17518628 (ISSN) Hooshmand, R ; Aref, M. R ; Eghlidos, T ; Sharif University of Technology
    Institution of Engineering and Technology  2015
    Abstract
    In this study, by exploiting the properties of finite-length polar codes, the authors introduce a physical layer encryption scheme to make secure (from a computational security perspective) and efficient communication between a sender (Alice) and a legitimate receiver (Bob) against both active and passive attacks, simultaneously. To prevent active attacks, two techniques are considered: (i) a novel method is introduced to keep the generator matrix of polar code secret from an active attacker (Oscar); (ii) a proper joint polar encoding/encryption algorithm based on the hidden generator matrix is introduced. Two additional strategies are considered against passive attacks: (i) a new method is... 

    Diffusion of innovations over multiplex social networks

    , Article Proceedings of the International Symposium on Artificial Intelligence and Signal Processing, AISP 2015, 3 March 2015 through 5 March 2015 ; 2015 , Pages 300-304 ; 9781479988174 (ISBN) Ramezanian, R ; Magnani, M ; Salehi, M ; Montesi, D ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    The ways in which an innovation (e.g., new behaviour, idea, technology, product) diffuses among people can determine its success or failure. In this paper, we address the problem of diffusion of innovations over multiplex social networks where the neighbours of a person belong to one or multiple networks (or layers) such as friends, families, or colleagues. To this end, we generalise one of the basic game-theoretic diffusion models, called networked coordination game, for multiplex networks. We present analytical results for this extended model and validate them through a simulation study, finding among other properties a lower bound for the success of an innovation. While simple and leading... 

    Spectrally encoded code division multiple access-based cognitive relay networks

    , Article IET Communications ; Volume 9, Issue 12 , August , 2015 , Pages 1510-1521 ; 17518628 (ISSN) Najafi, S ; Shayesteh, M. G ; Sharif University of Technology
    Institution of Engineering and Technology  2015
    Abstract
    Cognitive radio and cooperative networks are increasingly regarded as revolutionary technologies that utilise the radio spectrum efficiently. In this study, spectrally encoded (spread-time) code division multiple access (SE-CDMA) scheme is proposed as a flexible and adaptable technique for physical layer of cognitive relay networks. All primary and secondary users transmit their signals to a common base station (BS) and then the BS selects one of the cognitive secondary users based on feedback information to relay the primary user's (PU's) data. To study the efficiency of the system, two scenarios are considered. In the first scenario, the secondary users transmit their information using the... 

    An asynchronous dynamic Bayesian network for activity recognition in an ambient intelligent environment

    , Article ICPCA10 - 5th International Conference on Pervasive Computing and Applications, 1 December 2010 through 3 December 2010 ; December , 2010 , Pages 20-25 ; 9781424491421 (ISBN) Mirarmandehi, N ; Rabiee, H. R ; Sharif University of Technology
    2010
    Abstract
    Ambient Intelligence is the future of computing where devices predict what users need and help them carry out their everyday life activities easier. To make this prediction possible these environments should be aware of the context. Activity recognition is one of the most complex problems in context-aware environments. In this paper we propose a layered Dynamic Bayesian Network (DBN) to recognize activities in an oral presentation. The layered architecture gives us the opportunity to recognize complex activities using the classification results of sensory data in the first layer regardless of the physical environment. Our model is event-driven meaning the classification takes place only when... 

    Layeredcast - A hybrid peer-to-peer live layered video streaming protocol

    , Article 2010 5th International Symposium on Telecommunications, IST 2010, 4 December 2010 through 6 December 2010 ; 2010 , Pages 663-668 ; 9781424481835 (ISBN) Moshref, M ; Motamedi, R ; Rabiee, H. R ; Khansari, M ; Sharif University of Technology
    Abstract
    Peer-to-Peer overlay networks are an attractive foundation for video streaming. However, live Peer-to-Peer media streaming systems face many challenges such as bandwidth heterogeneity, node churn, and selfish nodes. Although many tree based and mesh based streaming protocols have been proposed, each has its own drawbacks such as unreliability and unfairness in tree based and long startup delay and complex scheduling in mesh based protocols. In this paper, we propose a new video streaming protocol called LayeredCast main features of which are: 1) Hybrid: Drawbacks of the simple approaches are compensated using a hybrid of mesh and tree overlays. 2) Layered Video: Provides an adaptive scheme... 

    Towards performance evaluation of mobile ad hoc network protocols

    , Article Proceedings - International Conference on Application of Concurrency to System Design, ACSD, 21 June 2010 through 25 June 2010, Braga ; 2010 , Pages 85-92 ; 15504808 (ISSN) ; 9780769540665 (ISBN) Ghassemi, F ; Movaghar, A ; Fokkink, W ; Sharif University of Technology
    Abstract
    We present a formal framework to evaluate stochastic properties of MANET protocols. It captures the interplay between stochastic behavior of protocols deployed at different network layers, and the underlying dynamic topology. The link connectivity model, which implicitly models node mobility, specifies link up and down lifetimes. We use so-called constrained labeled multi-transition systems (CLMSs) to specify MANETs; transitions are annotated by network restrictions, capturing the topologies in which a transition is possible. A continuous Markov chain can be generated from a CLMS, to evaluate the performance of the corresponding MANET  

    A complementary method for preventing hidden neurons' saturation in feed forward neural networks training

    , Article Iranian Journal of Electrical and Computer Engineering ; Volume 9, Issue 2 , SUMMER-FALL , 2010 , Pages 127-133 ; 16820053 (ISSN) Moallem, P ; Ayoughi, S. A ; Sharif University of Technology
    2010
    Abstract
    In feed forward neural networks, hidden layer neurons' saturation conditions, which are the cause of flat spots on the error surface, is one of the main disadvantages of any conventional gradient descent learning algorithm. In this paper, we propose a novel complementary scheme for the learning based on a suitable combination of anti saturated hidden neurons learning process and accelerating methods like the momentum term and the parallel tangent technique. In our proposed method, a normalized saturation criterion (NSC) of hidden neurons, which is introduced in this paper, is monitored during learning process. When the NSC is higher than a specified threshold, it means that the algorithm... 

    Quality of service provisioning in optical CDMA packet networks

    , Article Journal of Optical Communications and Networking ; Volume 2, Issue 5 , 2010 , Pages 283-292 ; 19430620 (ISSN) Khaleghi, S ; Pakravan, M. R ; Sharif University of Technology
    Abstract
    An enhanced media access control (MAC) layer protocol that uses the signaling method benefits of the physical layer in order to provide different levels of quality to different users in optical code-division multiple-access (OCDMA) packet networks is presented. In the proposed network architecture the users are categorized into two classes of service, one having a higher quality level and the other having a lower quality level. Users of each class transmit at the same power level and different from the other classes users. Also, the MAC of each user estimates the amount of interference on the channel and adjusts the packet transmissions time to improve network performance. Through simulation... 

    A modified thermodynamic modeling of wax precipitation in crude oil based on PC-SAFT model

    , Article Fluid Phase Equilibria ; Volume 429 , 2016 , Pages 313-324 ; 03783812 (ISSN) Mashhadi Meighani, H ; Ghotbi, C ; Jafari Behbahani, T ; Sharif University of Technology
    Elsevier  2016
    Abstract
    Wax precipitation may occur in production or transportation of crude oil form field which is a serious problem in petroleum industry. Flow assurance issues concerning wax precipitation make it necessary to develop a precise thermodynamic model to predict the wax appearance temperature and amount of precipitation at different conditions. In this work a new procedure has been proposed to characterize crude oil based on the SARA test considering the wax and asphaltene as single pseudo components. Two scenarios have been investigated for the survey of the crude oil characterization, with and without asphaltene pseudo component. Also, in this work, the Perturbed Chain form of the Statistical...