Loading...
Search for: scalability
0.01 seconds
Total 100 records

    Direct decoration of carbon nanohorns with binary nickel-cobalt sulfide nanosheets towards non-enzymatic glucose sensing in human fluids

    , Article Electrochimica Acta ; Volume 428 , 2022 ; 00134686 (ISSN) Kachouei, M. A ; Hekmat, F ; Wang, H ; Amaratunga, G. A. J ; Unalan, H. E ; Shahrokhian, S ; Sharif University of Technology
    Elsevier Ltd  2022
    Abstract
    A highly controllable, green, and rapid strategy is demonstrated for fabricating of highly sensitive non-enzymatic glucose sensing platforms. Carbon nanohorns (CNHs) were decorated onto the screen-printed electrodes. Binary nickel-cobalt sulfide (NiCo-S) nanosheets (NSs) were then deposited on CNH-casted electrodes by a facile and scalable method. Following detailed structural characterization and the electrocatalytic activity of the fabricated NiCo-S/CNH electrodes towards electro-oxidation of glucose was examined in detail. The proposed electrodes operated within two distinct linear dynamic ranges of 0.001- 0.330 mM and 0.330 - 4.53 mM with sensitivities of 1842 µA.mM−1.cm−2 and 854... 

    HFOS L : hyper scale fast optical switch-based data center network with L-level sub-network

    , Article Telecommunication Systems ; Volume 80, Issue 3 , 2022 , Pages 397-411 ; 10184864 (ISSN) Khani, E ; Hessabi, S ; Koohi, S ; Yan, F ; Calabretta, N ; Sharif University of Technology
    Springer  2022
    Abstract
    The ever-expanding growth of internet traffic enforces deployment of massive Data Center Networks (DCNs) supporting high performance communications. Optical switching is being studied as a promising approach to fulfill the surging requirements of large scale data centers. The tree-based optical topology limits the scalability of the interconnected network due to the limitations in the port count of optical switches and the lack of optical buffers. Alternatively, buffer-less Fast Optical Switch (FOS) was proposed to realize the nanosecond switching of optical DCNs. Although FOSs provide nanosecond optical switching, they still suffer from port count limitations to scale the DCN. To address... 

    An ultrathin amorphous defective co-doped hematite passivation layer derived via an in situ electrochemical method for durable photoelectrochemical water oxidation

    , Article Journal of Materials Chemistry A ; Volume 10, Issue 31 , 2022 , Pages 16655-16665 ; 20507488 (ISSN) Fathabadi, M ; Qorbani, M ; Sabbah, A ; Quadir, S ; Huang, C. Y ; Chen, K. H ; Chen, L. C ; Naseri, N ; Sharif University of Technology
    Royal Society of Chemistry  2022
    Abstract
    Although hematite (i.e., α-Fe2O3) has been widely investigated in photoelectrochemical water oxidation studies due to its high theoretical photocurrent density, it still suffers from serious surface charge recombination and low photoelectrochemical stability. Here we report an in situ electrochemical method to form a uniform and ultrathin (i.e., 3-5 nm) passivation layer all over the pores of an optimized ∼3.2% Ti-doped α-Fe2O3 photoanode. We unveil the amorphous and defective nature of the in situ derived layer assigned to a high concentration of oxygen vacancies and intercalated potassium atoms there, i.e., the formation of Ti/K co-doped defective α-Fe2O3−x. Owing to the efficient... 

    Reliability maximization in uncertain graphs

    , Article IEEE Transactions on Knowledge and Data Engineering ; Volume 34, Issue 2 , 2022 , Pages 894-913 ; 10414347 (ISSN) Ke, X ; Khan, A ; Al Hasan, M ; Rezvansangsari, R ; Sharif University of Technology
    IEEE Computer Society  2022
    Abstract
    Network reliability measures the probability that a target node is reachable from a source node in an uncertain graph, i.e., a graph where every edge is associated with a probability of existence. In this paper, we investigate the novel and fundamental problem of adding a small number of edges in the uncertain network for maximizing the reliability between a given pair of nodes. We study the mathbf {NP}NP-hardness and the approximation hardness of our problem, and design effective, scalable solutions. Furthermore, we consider extended versions of our problem (e.g., multiple source and target nodes can be provided as input) to support and demonstrate a wider family of queries and... 

    Requirements for automating moderation in community question-answering websites

    , Article 15th Innovations in Software Engineering Conference, ISEC 2022, 24 February 2022 through 26 February 2022 ; 2022 ; 9781450396189 (ISBN) Annamoradnejad, I ; ACM; ACM India SIGSOFT ; Sharif University of Technology
    Association for Computing Machinery  2022
    Abstract
    In recent years, community Q&A websites have attracted many users and have become reliable sources among experts from various fields. These platforms have specific rules to maintain their content quality in addition to general user agreements. Due to the vast expanse of these systems in terms of the number of users and posts, manual checking and verification of new contents by the administrators and official moderators are not feasible, and these systems require scalable solutions. In major Q&A networks, the current strategy is to use crowdsourcing with reliance on reporting systems. This strategy has serious problems, including the slow handling of violations, the loss of new and... 

    The discrepancy attack on polyshard-ed blockchains

    , Article 2021 IEEE International Symposium on Information Theory, ISIT 2021, 12 July 2021 through 20 July 2021 ; Volume 2021-July , 2021 , Pages 2672-2677 ; 21578095 (ISSN); 9781538682098 (ISBN) Abadi Khooshemehr, N ; Maddah Ali, M. A ; IEEE Information Theory Society; The Institute of Electrical and Electronics Engineers ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Sharding, i.e. splitting the miners or validators to form and run several subchains in parallel, is known as one of the main solutions to the scalability problems of blockchains. The drawback is that as the number of miners expanding each subchain becomes small, it becomes vulnerable to security attacks. To solve this problem, a framework, named as Ployshard, has been proposed in which each validator verifies a coded combination of the blocks introduced by different subchains, thus helping to protect the security of all subchains. In this paper, we introduce an attack on Ployshard, called the discrepancy attack, which is the result of malicious nodes controlling a few subchains and... 

    Energy efficiency through joint routing and function placement in different modes of SDN/NFV networks

    , Article Computer Networks ; Volume 200 , 2021 ; 13891286 (ISSN) Moosavi, R ; Parsaeefard, S ; Maddah Ali, M. A ; Shah-Mansouri, V ; Khalaj, B. H ; Bennis, M ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    Network function virtualization (NFV) and software-defined networking (SDN) are two promising technologies to enable 5G and 6G services and achieve cost reduction, network scalability, and deployment flexibility. However, migration to full SDN/NFV networks in order to serve these services is a time-consuming process and costly for mobile operators. This paper focuses on energy efficiency during the transition of mobile core networks (MCN) to full SDN/NFV networks and explores how energy efficiency can be addressed during such migration. We propose a general system model containing a combination of legacy nodes and links, in addition to newly introduced NFV and SDN nodes. We refer to this... 

    Modeling epidemic routing: capturing frequently visited locations while preserving scalability

    , Article IEEE Transactions on Vehicular Technology ; Volume 70, Issue 3 , 2021 , Pages 2713-2727 ; 00189545 (ISSN) Rashidi, L ; Dalili Yazdi, A ; Entezari Maleki, R ; Sousa, L ; Movaghar, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    This paper investigates the performance of epidemic routing in mobile social networks considering several communities which are frequently visited by nodes. To this end, a monolithic Stochastic Reward Net (SRN) is proposed to evaluate the delivery delay and the average number of transmissions under epidemic routing by considering skewed location visiting preferences. This model is not scalable enough, in terms of the number of nodes and frequently visited locations. In order to achieve higher scalability, the folding technique is applied to the monolithic model, and an approximate folded SRN is proposed to evaluate performance of epidemic routing. Discrete-event simulation is used to... 

    A matrix factorization model for hellinger-based trust management in social internet of things

    , Article IEEE Transactions on Dependable and Secure Computing ; 2021 ; 15455971 (ISSN) Aalibagi, S ; Mahyar, H ; Movaghar, A ; Stanley, H. E ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    The Social Internet of Things (SIoT), integration of the Internet of Things and Social Networks paradigms, has been introduced to build a network of smart nodes that are capable of establishing social links. In order to deal with misbehaving service provider nodes, service requestor nodes must evaluate their trustworthiness levels. In this paper, we propose a novel trust management mechanism in the SIoT to predict the most reliable service providers for each service requestor, which leads to reduce the risk of being exposed to malicious nodes. We model the SIoT with a flexible bipartite graph, then build a social network among the service requestor nodes, using the Hellinger distance.... 

    A Matrix factorization model for Hellinger-Based trust management in social internet of things

    , Article IEEE Transactions on Dependable and Secure Computing ; 2021 ; 15455971 (ISSN) Aalibagi, S ; Mahyar, H ; Movaghar, A ; Stanley, H. E ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    The Social Internet of Things (SIoT), integration of the Internet of Things and Social Networks paradigms, has been introduced to build a network of smart nodes that are capable of establishing social links. In order to deal with misbehaving service provider nodes, service requestor nodes must evaluate their trustworthiness levels. In this paper, we propose a novel trust management mechanism in the SIoT to predict the most reliable service providers for each service requestor, which leads to reduce the risk of being exposed to malicious nodes. We model the SIoT with a flexible bipartite graph, then build a social network among the service requestor nodes, using the Hellinger distance.... 

    A fully distributed hierarchical attribute-based encryption scheme

    , Article Theoretical Computer Science ; Volume 815 , 2020 , Pages 25-46 Ali, M ; Mohajeri, J ; Sadeghi, M. R ; Liu, X ; Sharif University of Technology
    Elsevier B.V  2020
    Abstract
    With the development of cloud computing, many enterprises have been interested in outsourcing their data to cloud servers to decrease IT costs and rise capabilities of provided services. To afford confidentiality and fine-grained data access control, attribute-based encryption (ABE) was proposed and used in several cloud storage systems. However, scalability and flexibility in key delegation and user revocation mechanisms are primary issues in ABE systems. In this paper, we introduce the concept of a fully distributed revocable ciphertext-policy hierarchical ABE (FDR-CP-HABE) and design the first FDR-CP-HABE scheme. Our scheme offers a high level of flexibility and scalability in the key... 

    Introduction to non-volatile memory technologies

    , Article Advances in Computers ; Volume 118 , 2020 , Pages 1-13 Asadinia, M ; Sarbazi Azad, H ; Sharif University of Technology
    Academic Press Inc  2020
    Abstract
    Dynamic Random Access Memory (DRAM) has been the leading main memory technology during the last four decades. In deep submicron regime, however, scaling DRAM comes with several challenges caused by charge leakage and imprecise charge placement. Phase Change Memory (PCM) technology is known as one of the most promising technologies to replace DRAM. Compared to competitive non-volatile memories like NAND Flash, Spin Transfer Torque random-access memory (STT-RAM), Magnetoresistive random-access memory (MRAM), PCM benefits from best attributes of fast random access, negligible leakage energy, superior scalability, high density, and operating in both Single-level Cell (SLC) and Multilevel Cell... 

    Sequential RTV/(TiO2/SiO2) nanocomposite deposition for suppressing the leakage current in silicone rubber insulators

    , Article Applied Physics A: Materials Science and Processing ; Volume 126, Issue 5 , 2020 Parand, P ; Mohammadi, M ; Shayegani Akmal, A. A ; Samadpour, M ; dehghani, M ; Parvazian, E ; Sharif University of Technology
    Springer  2020
    Abstract
    The sequential deposition method is introduced for suppressing the leakage current in silicone rubber insulators. Room temperature vulcanizing silicone and TiO2/silica nanocomposites are sequentially deposited on silicone insulators surface. TEM results showed that TiO2 nanoparticles size is about 20–30 nm, and the structural study revealed their anatase crystalline structure. Silica nanoparticles are deposited on the surface of insulators by spray deposition. The contact angle was enhanced from 104° to 149° after nanoparticles deposition, which confirms the hydrophobicity improvement. Results show that leakage current for nanocomposite samples in a contaminated environment reduced to about... 

    A Scalable architecture for monitoring IOT devices using ethereum and fog computing

    , Article 4th International Conference on Smart Cities, Internet of Things and Applications, SCIoT 2020, 16 September 2020 through 17 September 2020 ; 2020 , Pages 66-76 Tahmasebi, S ; Habibi, J ; Shamsaie, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    With recent considerable developments in the Internet of Things (IoT), billions of resource-constrained devices are interconnected through the Internet. Monitoring this huge number of IoT devices which are heterogeneous in terms of underlying communication protocols and data format is challenging. The majority of existing IoT device monitoring solutions heavily rely on centralized architectures. Since using centralized architectures comes at the expense of trusting an authority, it has several inherent drawbacks, including vulnerability to security attacks, lack of data privacy, and unauthorized data manipulation. Hence, a new decentralized approach is crucial to remedy these drawbacks. One... 

    First demonstration of photoelectrochemical water splitting by commercial W–Cu powder metallurgy parts converted to highly porous 3D WO3/W skeletons

    , Article International Journal of Hydrogen Energy ; Volume 45, Issue 11 , 28 February , 2020 , Pages 6369-6379 Mojaddami, M ; Simchi, A ; Sharif University of Technology
    Elsevier Ltd  2020
    Abstract
    Hydrogen evolution through photoelectrochemical (PEC) water splitting by tungsten oxide-based photoanodes, as a stable and environmental-friendly material with moderate band gap, has attracted significant interest in recent years. The performance of WO3 photoanode could be hindered by its poor oxygen evolution reaction kinetics and high charge carrier recombination rate. Additionally, scalable and cost-effective commercial procedure to prepare nanostructured electrodes is still challenging. We present, for the first time, a novel and scalable method to fabricate highly efficient self-supported WO3/W nanostructured photoanodes from commercial W–Cu powder metallurgy (P/M) parts for water... 

    Scalable performance analysis of epidemic routing considering skewed location visiting preferences

    , Article 27th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, MASCOTS 2019, 22 October 2019 through 25 October 2019 ; Volume 2019-October , 2019 , Pages 201-213 ; 15267539 (ISSN); 9781728149509 (ISBN) Rashidi, L ; Dalili Yazdi, A ; Entezari Maleki, R ; Sousa, L ; Movaghar, A ; Sharif University of Technology
    IEEE Computer Society  2019
    Abstract
    This paper investigates the performance of epidemic routing, in mobile social networks (MSNs), which makes use of the store-carry-forward paradigm for communication. Real-life mobility traces show that people have skewed location visiting preferences, with some places visited frequently and some others infrequently. In order to model epidemic routing in MSNs, we first analyze the time taken for a node to meet the first node belonging to a set of nodes restricted to move in a specific subarea. Afterwards, a monolithic stochastic reward net (SRN) is proposed to evaluate the delivery delay and the average number of transmissions under epidemic routing by considering skewed location visiting... 

    Exploitation of wavelength, hardware, and path redundancies in fault-tolerant all-optical DCNs

    , Article Optical Fiber Technology ; Volume 51 , 2019 , Pages 77-89 ; 10685200 (ISSN) Akbari Rokn Abadi, S ; Koohi, S ; Sharif University of Technology
    Academic Press Inc  2019
    Abstract
    Data center performance is affected by three main factors; bandwidth, latency, and reliability of intra-data center interconnection network. Bandwidth and latency are definitely improved by adopting optical technology for intra-data center communication, but fault tolerance of the corresponding optical networks has been raised less. Recently, we introduced two Torus-based, all-optical, and non-blocking networks, i.e. O-TF and O-FTF, addressing reliability of optical networks, and now, in this paper, to address the scalability problem, we propose a novel Optical Clos-based architecture which reduces minimum number of required wavelength channels, as well as, the switch size in each node.... 

    Performance evaluation of epidemic content retrieval in DTNs with restricted mobility

    , Article IEEE Transactions on Network and Service Management ; Volume 16, Issue 2 , 2019 , Pages 701-714 ; 19324537 (ISSN) Rashidi, L ; Entezari Maleki, R ; Chatzopoulos, D ; Hui, P ; Trivedi, K. S ; Movaghar, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In some applicable scenarios, such as community patrolling, mobile nodes are restricted to move only in their own communities. Exploiting the meetings of the nodes within the same community and the nodes within the neighboring communities, a delay tolerant network (DTN) can provide communication between any two nodes. In this paper, two analytical models based on stochastic reward nets (SRNs) are proposed to evaluate the performance of the epidemic content retrieval in such multi-community DTNs. Performance measures computed by the proposed models are the average retrieval delay and the average number of transmissions. The monolithic SRN model proposed in the first step is not scalable, in... 

    Controlled electrophoretic deposition of electrochemically exfoliated graphene sheets on Ag nanowires network

    , Article Micro and Nano Letters ; Volume 14, Issue 4 , 2019 , Pages 389-393 ; 17500443 (ISSN) Malekshahi Byranvand, M ; Tajabadi, F ; Mardi, S ; Taghavinia, N ; Amiri Zarand, A ; Dabirian, A ; Sharif University of Technology
    Institution of Engineering and Technology  2019
    Abstract
    Electrochemical exfoliation of graphite has recently attracted a big attention as a simple, fast and scalable method for the preparation of high quality graphene, but there are some drawbacks that hinder its application. Direct deposition is one of the most critical challenges that makes it difficult to deposit uniform, compact and large scale graphene thin films. This work develops a facile electrophoretic deposition route to fabricate exfoliated graphene (EG) film on Ag nanowires (NWs) networks with a controllable film thickness in nanometers scale. EG thin films are deposited with different applied potentials and times from an EG dispersion in N, N-dimethylformamide solvent. Since... 

    TA-LRW: A replacement policy for error rate reduction in stt-mram caches

    , Article IEEE Transactions on Computers ; Volume 68, Issue 3 , 2019 , Pages 455-470 ; 00189340 (ISSN) Cheshmikhani, E ; Farbeh, H ; Miremadi, S. G ; Asadi, H ; Sharif University of Technology
    IEEE Computer Society  2019
    Abstract
    As technology process node scales down, on-chip SRAM caches lose their efficiency because of their low scalability, high leakage power, and increasing rate of soft errors. Among emerging memory technologies, Spin-Transfer Torque Magnetic RAM (STT-MRAM) is known as the most promising replacement for SRAM-based cache memories. The main advantages of STT-MRAM are its non-volatility, near-zero leakage power, higher density, soft-error immunity, and higher scalability. Despite these advantages, high error rate in STT-MRAM cells due to retention failure, write failure, and read disturbance threatens the reliability of cache memories built upon STT-MRAM technology. The error rate is significantly...