Loading...
Search for: open-sources
0.009 seconds
Total 33 records

    Mold filling simulation in the injection molding process with openFOAM software for non-isothermal newtonian fluid

    , Article Proceedings of the 2nd IASTED Asian Conference on Modelling, Identification, and Control, AsiaMIC 2012 ; 2012 , Pages 291-296 ; 9780889869110 (ISBN) Fazelpour, F ; Vafaeipour, M ; Etemadi, H ; Dabbaghian, A ; Bardestani, R ; Dehghan, M ; Sharif University of Technology
    2012
    Abstract
    Injection molding is one of the most important manufacturing processes for mass production of complex plastic parts. In this study, mold filling is simulated by using the OpenFOAM software for Non- isothermal Newtonian fluid. The OpenFOAM is an open source software that is used in Computational Fluid Dynamics (CFD) tools. The studied mold shape has a rectangular structure with a gate for Newtonian fluid injection. The simulation carried out at non-isothermal conditions and two-dimensional flow is considered. The velocity, shear stress and temperature changes in different parts of the mold are critically studied. We show that vortex formation plays an important role on changes of shear stress... 

    Evaluating Dependability of Open-Source File Systems Considering Organizations of Hard Disks and Solid-State Drives

    , M.Sc. Thesis Sharif University of Technology Nouralizadeh Khorrami, Ahmad (Author) ; Asadi, Hossein (Supervisor)
    Abstract
    Storage subsystem is one of the most important components of a computer system. As more valuable information such as bank transactions are being stored in storage subsystems,occurrence of an unrecoverable error can lead to a much bigger problem. A storage subsystem can be divided into software and hardware part. Previous works focused on fault injection in the higher layers of the storage stack and didn’t consider fault injection at the device driver level. In this thesis, the dependability of storage stack is evaluated using fault injection at the device driver layer. Various hardware and software faults that can occur in hard disks and solid state drives are studied and dependability of... 

    Temperature distribution on a gas turbine shaft exposed to swirl combustor flue

    , Article Journal of Thermophysics and Heat Transfer ; Volume 29, Issue 2 , 2015 , Pages 319-328 ; 08878722 (ISSN) Aghakashi, V ; Saidi, M. H ; Mozafari, A. A ; Keshavarz, P ; Sharif University of Technology
    Abstract
    A gas turbine shaft is generally exposed to high-temperature gases and may seriously be affected and overheated duetotemperature fluctuationsinthe combustion chamber. Vortex flow inthe combustion chamber may increase the heat release rate and combustion efficiency, as well as control the location of energy release. However, this may result in excessive temperature on the combustor equipment and gas turbine shaft. In this study, a new gas turbine combustion chamber implementing a liner around the shaft and the liquid-fuel feeding system is designed and fabricated. The influences of parameters such as the Reynolds number and the equivalence ratio are studied. Experimental results are compared... 

    System identification for characterization of the frequency response of an 'open-source' biomedical circuit

    , Article IECBES 2014, Conference Proceedings - 2014 IEEE Conference on Biomedical Engineering and Sciences: "Miri, Where Engineering in Medicine and Biology and Humanity Meet", 8 December 2014 through 10 December 2014 ; 2015 , Pages 225-229 ; 9781479940844 (ISBN) Zahedi, E ; Mohd Ali, M. A. B ; Sharif University of Technology
    Abstract
    In this paper, system identification techniques are applied to accurately characterize the frequency behavior of a commercially available but with unknown characteristics of a photoplethysmography (under the commercial name of Pulse Sensor). Although claimed to be open-source, the electronic schematic of this device does not allow for a full characterization of it. Therefore a second order auto-regressive with exogenous input model has been employed to find the frequency response of this system. An optical excitation circuit was developed to send a pseudo-random signal to the Pulse Sensor. Results show that the model is able to reproduce the output with a fitness of 89.7 %. The obtained... 

    Bug localization using revision log analysis and open bug repository text categorization

    , Article 6th International IFIP WG 2.13 Conference on Open Source Systems, OSS 2010, Notre Dame, IN, 30 May 2010 through 2 June 2010 ; Volume 319 AICT , 2010 , Pages 188-199 ; 18684238 (ISSN) ; 9783642132438 (ISBN) Moin, A. H ; Khansari, M ; Sharif University of Technology
    2010
    Abstract
    In this paper, we present a new approach to localize a bug in the software source file hierarchy. The proposed approach uses log files of the revision control system and bug reports information in open bug repository of open source projects to train a Support Vector Machine (SVM) classifier. Our approach employs textual information in summary and description of bugs reported to the bug repository, in order to form machine learning features. The class labels are revision paths of fixed issues, as recorded in the log file of the revision control system. Given an unseen bug instance, the trained classifier can predict which part of the software source file hierarchy (revision path) is more... 

    An open source, parallel DSMC code for rarefied gas flows in arbitrary geometries

    , Article Computers and Fluids ; Volume 39, Issue 10 , 2010 , Pages 2078-2089 ; 00457930 (ISSN) Scanlon, T. J ; Roohi, E ; White, C ; Darbandi, M ; Reese, J. M ; Sharif University of Technology
    2010
    Abstract
    This paper presents the results of validation of an open source Direct Simulation Monte Carlo (DSMC) code for general application to rarefied gas flows. The new DSMC code, called dsmcFoam, has been written within the framework of the open source C++ CFD toolbox OpenFOAM. The main features of dsmcFoam code include the capability to perform both steady and transient solutions, to model arbitrary 2D/3D geometries, and unlimited parallel processing. Test cases have been selected to cover a wide range of benchmark examples from 1D to 3D. These include relaxation to equilibrium, 2D flow over a flat plate and a cylinder, and 3D supersonic flows over complex geometries. In all cases, dsmcFoam shows... 

    Designing a collaborative digital library to improve educational systems accompanied by a perspective from Iranian scholar attitudes

    , Article International Conference on Enterprise Information Systems and Web Technologies 2010, EISWT 2010, 12 July 2010 through 14 July 2010 ; 2010 , Pages 132-140 ; 9781617820656 (ISBN) Badashian, A. S ; Firouz Abadi, A. D ; Khalkhali, I ; Shafiei, M. S ; Vojdanijahromi, R ; Sharif University of Technology
    Abstract
    In this article, a universal collaborative and competitive approach is introduced for deployment of digital collections in an ideal Digital Library for future's educational system. A hierarchical structure is proposed to be used for browsing and searching within mass of digital contents provided for union of curriculums worldwide. The collaborative and open-source aspects of the system guarantee the growth of the Digital Library. On the other hand, the competitive and reviewing aspects guarantee the accuracy of the novel library contents. Two experiments confirm the need for such a universal Digital Library worldwide to enhance learning capabilities, increase accessibility, avoid redundancy... 

    Fine-grained access control for hybrid mobile applications in Android using restricted paths

    , Article 13th International ISC Conference on Information Security and Cryptology, 7 September 2016 through 8 September 2016 ; 2016 , Pages 85-90 ; 9781509039494 (ISBN) Pooryousef, S ; Amini, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    Hybrid Mobile Applications are a new generation of mobile applications that have recently introduced new security challenges. In these applications, untrusted web content, such as an advertisement inside an embedded browser, has the same privileges as the entire application and can directly access the device resources. Unfortunately, existing access control mechanisms are very coarse-grained and do not provide adequate facilities for fine-grained access rule definition and enforcement in hybrid mobile applications. In this paper, we propose a fine-grained access control mechanism for privilege separation in hybrid mobile applications. Our proposed access control mechanism, called... 

    Modeling performance of hadoop applications: A journey from queueing networks to stochastic well formed nets

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 14 December 2016 through 16 December 2016 ; Volume 10048 LNCS , 2016 , Pages 599-613 ; 03029743 (ISSN) ; 9783319495828 (ISBN) Ardagna, D ; Bernardi, S ; Gianniti, E ; Karimian Aliabadi, S ; Perez Palacin, D ; Requeno, J. I ; Carretero, J ; Nakano, K ; Ko, R ; Mueller, P ; Garcia Blas, J ; Sharif University of Technology
    Springer Verlag  2016
    Abstract
    Nowadays, many enterprises commit to the extraction of actionable knowledge from huge datasets as part of their core business activities. Applications belong to very different domains such as fraud detection or one-to-one marketing, and encompass business analytics and support to decision making in both private and public sectors. In these scenarios, a central place is held by the MapReduce framework and in particular its open source implementation, Apache Hadoop. In such environments, new challenges arise in the area of jobs performance prediction, with the needs to provide Service Level Agreement guarantees to the enduser and to avoid waste of computational resources. In this paper we... 

    CNNdroid: GPU-accelerated execution of trained deep convolutional neural networks on android

    , Article 24th ACM Multimedia Conference, MM 2016, 15 October 2016 through 19 October 2016 ; 2016 , Pages 1201-1205 ; 9781450336031 (ISBN) Latifi Oskouei, S. S ; Golestani, H ; Hashemi, M ; Ghiasi, S ; Sharif University of Technology
    Association for Computing Machinery, Inc  2016
    Abstract
    Many mobile applications running on smartphones and wear- able devices would potentially benefit from the accuracy and scalability of deep CNN-based machine learning algorithms. However, performance and energy consumption limitations make the execution of such computationally intensive algorithms on mobile devices prohibitive. We present a GPU- accelerated library, dubbed CNNdroid [1], for execution of trained deep CNNs on Android-based mobile devices. Empirical evaluations show that CNNdroid achieves up to 60X speedup and 130X energy saving on current mobile devices. The CNNdroid open source library is available for download at https://github.com/ENCP/CNNdroid  

    A combined analytical modeling machine learning approach for performance prediction of MapReduce jobs in cloud environment

    , Article 18th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2016, 24 September 2016 through 27 September 2016 ; 2017 , Pages 431-439 ; 9781509057078 (ISBN) Ataie, E ; Gianniti, E ; Ardagna, D ; Movaghar, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    Nowadays MapReduce and its open source implementation, Apache Hadoop, are the most widespread solutions for handling massive dataset on clusters of commodity hardware. At the expense of a somewhat reduced performance in comparison to HPC technologies, the MapReduce framework provides fault tolerance and automatic parallelization without any efforts by developers. Since in many cases Hadoop is adopted to support business critical activities, it is often important to predict with fair confidence the execution time of submitted jobs, for instance when SLAs are established with end-users. In this work, we propose and validate a hybrid approach exploiting both queuing networks and support vector... 

    A Task-Based Greedy Scheduling Algorithm for Minimizing Energy of MapReduce Jobs

    , Article Journal of Grid Computing ; Volume 16, Issue 4 , 2018 , Pages 535-551 ; 15707873 (ISSN) Yousefi, M.H.N ; Goudarzi, M ; Sharif University of Technology
    Springer Netherlands  2018
    Abstract
    MapReduce and its open source implementation, Hadoop, have gained widespread adoption for parallel processing of big data jobs. Since the number of such big data jobs is also rapidly rising, reducing their energy consumption is increasingly more important to reduce environmental impact as well as operational costs. Prior work by Mashayekhy et al. (IEEE Trans. Parallel Distributed Syst. 26, 2720–2733, 2016), has tackled the problem of energy-aware scheduling of a single MapReduce job but we provide a far more efficient heuristic in this paper. We first model the problem as an Integer Linear Program to find the optimal solution using ILP solvers. Then we present a task-based greedy scheduling... 

    Cross-project code clones in GitHub

    , Article Empirical Software Engineering ; 2018 ; 13823256 (ISSN) Gharehyazie, M ; Ray, B ; Keshani, M ; Zavosht, M. S ; Heydarnoori, A ; Filkov, V ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    Code reuse has well-known benefits on code quality, coding efficiency, and maintenance. Open Source Software (OSS) programmers gladly share their own code and they happily reuse others’. Social programming platforms like GitHub have normalized code foraging via their common platforms, enabling code search and reuse across different projects. Removing project borders may facilitate more efficient code foraging, and consequently faster programming. But looking for code across projects takes longer and, once found, may be more challenging to tailor to one’s needs. Learning how much code reuse goes on across projects, and identifying emerging patterns in past cross-project search behavior may... 

    A novel key partitioning schema for efficient execution of MapReduce applications

    , Article 19th International Symposium on Computer Architecture and Digital Systems, CADS 2017, 21 December 2017 through 22 December 2017 ; Volume 2018-January , March , 2018 , Pages 1-6 ; 9781538643792 (ISBN) Nasehi Basharzad, S ; Nabavinejad, S. M ; Goudarzi, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    MapReduce and its open source implementation, Hadoop, are the prevailing platforms for big data processing. MapReduce is a simple programming model for performing large computational problems in large-scale distributed systems. This model consists of two major phases: Map and Reduce. Between these two main phases, partitioner part is embedded which distributes produced keys by Map tasks among Reduce tasks. When the amount of keys and their associated values, which are called intermediate data, is huge, this part has significant impact on execution time of Reduce tasks, and consequently, completion time of jobs. In this paper, we present a network and resource aware key partitioner to... 

    Collaborative digital library: enhancing digital collections to improve learning in educational programs

    , Article Proceeding JCDL '09 Proceedings of the 9th ACM/IEEE-CS joint conference on Digital libraries Pages 359-360 ; 2009 , Pages 359- 360 ; 15525996 (ISSN); 9781605586977 (ISBN) Sajedi Badashian, A ; Dehghani Firouzabadi, A ; Khalkhali, I ; Afzali, H. R ; Ashurzad Delcheh, M ; Shoja Shafiei, M ; Alipour, M ; ACM SIGWEB; ACM SIGIR; IEEE CS ; Sharif University of Technology
    2009
    Abstract
    In this article, a universal collaborative and competitive approach is introduced for deployment of digital collections in an ideal Digital Library (DL) for future's educational system. The collaborative and open-source aspects of the system guarantee its growth and the competitive aspects guarantee the accuracy  

    Cross-project code clones in GitHub

    , Article Empirical Software Engineering ; Volume 24, Issue 3 , 2019 , Pages 1538-1573 ; 13823256 (ISSN) Gharehyazie, M ; Ray, B ; Keshani, M ; Soleimani Zavosht, M ; Heydarnoori, A ; Filkov, V ; Sharif University of Technology
    Springer New York LLC  2019
    Abstract
    Code reuse has well-known benefits on code quality, coding efficiency, and maintenance. Open Source Software (OSS) programmers gladly share their own code and they happily reuse others’. Social programming platforms like GitHub have normalized code foraging via their common platforms, enabling code search and reuse across different projects. Removing project borders may facilitate more efficient code foraging, and consequently faster programming. But looking for code across projects takes longer and, once found, may be more challenging to tailor to one’s needs. Learning how much code reuse goes on across projects, and identifying emerging patterns in past cross-project search behavior may... 

    Stabilization of cloud cavitation instabilities using Cylindrical Cavitating-bubble Generators (CCGs)

    , Article International Journal of Multiphase Flow ; Volume 115 , 2019 , Pages 108-125 ; 03019322 (ISSN) Kadivar, E ; el Moctar, O ; Javadi, K ; Sharif University of Technology
    Elsevier Ltd  2019
    Abstract
    Unsteady cloud cavitation phenomenon is an important subject due to its undesirable effects in various applications such as ship propeller, rudder and hydraulic machinery systems. We present an efficient passive control method to control the cavitation instabilities which may be caused by the shedding of cavity structures in the vicinity of the solid surface of an immersible body. We proposed a passive control method so called Cylindrical Cavitating-bubble Generators (CCGs) on the surface of a benchmark hydrofoil and analyzed the effects of this passive controller on the dynamics of the unsteady cloud cavitation. First we modeled the unsteady cavitating flow around the hydrofoil without CCGs... 

    Localizing exception faults in Android applications

    , Article Scientia Iranica ; Volume 26, Issue 3 D , 2019 , Pages 1567-1588 ; 10263098 (ISSN) Mirzaei, H ; Heydarnoori, A ; Sharif University of Technology
    Sharif University of Technology  2019
    Abstract
    In software programs, most of the time, there is a chance for occurrence of faults in general, and exception faults in particular. Localizing those pieces of code that are responsible for a particular fault is one of the most complicated tasks, and it can produce incorrect results if done manually. Semi-automated and fully-automated techniques have been introduced to overcome this issue. However, despite recent advances in fault localization techniques, they are not necessarily applicable to Android applications because of their special characteristics such as context-awareness, use of sensors, being executable on various mobile devices, limited hardware resources, etc. To this aim, in this... 

    Localizing exception faults in Android applications

    , Article Scientia Iranica ; Volume 26, Issue 3 D , 2019 , Pages 1567-1588 ; 10263098 (ISSN) Mirzaei, H ; Heydarnoori, A ; Sharif University of Technology
    Sharif University of Technology  2019
    Abstract
    In software programs, most of the time, there is a chance for occurrence of faults in general, and exception faults in particular. Localizing those pieces of code that are responsible for a particular fault is one of the most complicated tasks, and it can produce incorrect results if done manually. Semi-automated and fully-automated techniques have been introduced to overcome this issue. However, despite recent advances in fault localization techniques, they are not necessarily applicable to Android applications because of their special characteristics such as context-awareness, use of sensors, being executable on various mobile devices, limited hardware resources, etc. To this aim, in this... 

    A Bit-vector differential model for the modular addition by a constant

    , Article 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, 7 December 2020 through 11 December 2020 ; Volume 12491 LNCS , 2020 , Pages 385-414 Azimi, S. A ; Ranea, A ; Salmasizadeh, M ; Mohajeri, J ; Aref, M.R ; Rijmen, V ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2020
    Abstract
    ARX algorithms are a class of symmetric-key algorithms constructed by Addition, Rotation, and XOR, which achieve the best software performances in low-end microcontrollers. To evaluate the resistance of an ARX cipher against differential cryptanalysis and its variants, the recent automated methods employ constraint satisfaction solvers, such as SMT solvers, to search for optimal characteristics. The main difficulty to formulate this search as a constraint satisfaction problem is obtaining the differential models of the non-linear operations, that is, the constraints describing the differential probability of each non-linear operation of the cipher. While an efficient bit-vector differential...