Loading...
Search for: jahangir--a--h
0.123 seconds

    Erratum: worst-case dimensioning and modeling of reliable real-time multihop wireless sensor network (Performance Evaluation (2009) 66 (685-700))

    , Article Performance Evaluation ; Volume 67, Issue 12 , 2010 , Pages 1386- ; 01665316 (ISSN) Mizanian, K ; Yousefi, H ; Jahangir, A. H ; Sharif University of Technology
    2010

    Worst case dimensioning and modeling of reliable real-time multihop wireless sensor network

    , Article Performance Evaluation ; Volume 66, Issue 12 , 2009 , Pages 685-700 ; 01665316 (ISSN) Mizanian, K ; Yousefi, H ; Jahangir, A. H ; Sharif University of Technology
    2009
    Abstract
    Wireless Sensor Network (WSN) should be capable of fulfilling its mission, in a timely manner and without loss of important information. In this paper, we propose a new analytical model for calculating RRT (Reliable Real-Time) degree in multihop WSNs, where RRT degree describes the percentage of real-time data that the network can reliably deliver on time from any source to its destination. Also, packet loss probability is modeled as a function of the probability of link failure when the buffer is full and the probability of node failure when node's energy is depleted. Most of the network properties are considered as random variables and a queuing theory based model is derived. In this... 

    A novel improvement technique for high-level test synthesis

    , Article Proceedings of the 2003 IEEE International Symposium on Circuits and Systems, Bangkok, 25 May 2003 through 28 May 2003 ; Volume 5 , 2003 , Pages V609-V612 ; 02714310 (ISSN) Safari, S ; Esmaeilzadeh, H ; Jahangir, A. H ; Sharif University of Technology
    2003
    Abstract
    Improving testability during the early stages of High-Level Synthesis (HLS) has several benefits, including reduced test hardware overhead, reduced test costs, reduced design iteration, and significant improved fault coverage. In this paper, we present a novel register allocation method, which is based on weighted graph coloring algorithm, targeting testability improvement for digital circuits. The topics covered in this paper include an overview of HLS and testability parameters, our testability model and experimental results  

    Testability improvement during high-level synthesis

    , Article 12th Asian Test Symposium, ATS 2003, 16 November 2003 through 19 November 2003 ; Volume 2003-January , 2003 , Pages 505- ; 10817735 (ISSN); 0769519512 (ISBN) Safari, S ; Esmaeilzadeh, H ; Jahangir, A. H ; Sharif University of Technology
    IEEE Computer Society  2003
    Abstract
    Improving testability during the early stages of High-Level Synthesis (HLS) reduces test hardware overheads, test costs, design iterations, and also improves fault coverage. In this paper, we present a novel register allocation algorithm which is based on weighted graph coloring, targeting testability improvement. © 2003 IEEE  

    Computer Networks and Distributed Systems: International Symposium, CNDS 2013 Tehran, Iran, December 25–26, 2013 Revised Selected Papers

    , Article Communications in Computer and Information Science ; Vol. 428, issue , December , 2014 ; 18650929 ; 978-3-319-10902-2 Jahangir, A. H ; Movaghar, A ; Asadi, H ; Sharif University of Technology
    2014
    Abstract
    [No abstract available]  

    Low-power arithmetic unit for DSP applications

    , Article International Symposium on System on Chip, SoC ; 31 October- 2 November , 2011 , pp. 68-71 ; ISBN: 9781457706721 Modarressi, M ; Nikounia, S. H ; Jahangir, A. H ; Sharif University of Technology
    2011
    Abstract
    DSP algorithms are one of the most important components of modern embedded computer systems. These applications generally include fixed point and floating-point arithmetic operations and trigonometric functions which have long latencies and high power consumption. Nonetheless, DSP applications enjoy from some interesting characteristics such as tolerating slight loss of accuracy and high degree of value locality which can be exploited to improve their power consumption and performance. In this paper, we present an application-specific result-cache that aims to reduce the power consumption and latency of DSP algorithms by reusing the results of the arithmetic operations executed on the same... 

    Low-power arithmetic unit for DSP applications

    , Article 2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems, SPICES 2015 ; 2011 , Pages 68-71 ; 9781457706721 (ISBN) Modarressi, M ; Nikounia, S. H ; Jahangir, A. H ; Sharif University of Technology
    2011
    Abstract
    DSP algorithms are one of the most important components of modern embedded computer systems. These applications generally include fixed point and floating-point arithmetic operations and trigonometric functions which have long latencies and high power consumption. Nonetheless, DSP applications enjoy from some interesting characteristics such as tolerating slight loss of accuracy and high degree of value locality which can be exploited to improve their power consumption and performance. In this paper, we present an application-specific result-cache that aims to reduce the power consumption and latency of DSP algorithms by reusing the results of the arithmetic operations executed on the same... 

    Modeling and evaluating reliable real-time degree in multi-hop wireless sensor networks

    , Article 2009 IEEE Sarnoff Symposium, SARNOFF 2009, Princeton, NJ, 30 March 2009 through 1 April 2009 ; 2009 ; 9781424433827 (ISBN) Mizanian, K ; Yousefi, H ; Jahangir, A. H ; IEEE ; Sharif University of Technology
    2009
    Abstract
    Wireless Sensor Network (WSN) should be capable of fulfilling its mission, in a timely manner and without loss of important information. In this paper, we propose a new analytical model for calculating RRT (Reliable Real-Time) degree in multihop WSNs, where RRT degree describes the percentage of real-time data that the network can reliably deliver on time from any source to its destination. Also, packet loss probability is modeled as a function of the probability of link failure when the buffer is full and the probability of node failure when node's energy is depleted. Most of network properties are considered as random variables and a queuing-theory based model is derived. In this model,... 

    Modeling and evaluating the reliability of cluster-based wireless sensor networks

    , Article Proceedings - International Conference on Advanced Information Networking and Applications, AINA, 20 April 2010 through 23 April 2010 ; April , 2010 , Pages 827-834 ; 1550445X (ISSN) ; 9780769540184 (ISBN) Yousefi, H ; Mizanian, K ; Jahangir, A. H ; Sharif University of Technology
    2010
    Abstract
    The reliability of wireless sensor networks (WSNs) depends on both sensing coverage and reliable transmission of collected data provided by the target cluster of sensors in the proximity of the phenomenon to the observer. In this paper, we establish a probabilistic fundamental quantitative notion for performance-critical applications on reliable information transfer and propose a new analytical model to calculate the coverage-oriented reliability of cluster-based WSNs. Here, the packet loss probability is modeled as a function of two main parameters. The first is the probability of link failure when the node's buffer at the end point of the link is full (discarding the packet) or when the... 

    Lazy instruction scheduling: Keeping performance, reducing power

    , Article ISLPED'08: 13th ACM/IEEE International Symposium on Low Power Electronics and Design, Bangalore, 11 August 2008 through 13 August 2008 ; 2008 , Pages 375-380 ; 15334678 (ISSN); 9781605581095 (ISBN) Mahjur, A ; Taghizadeh, M ; Jahangir, A. H ; Sharif University of Technology
    2008
    Abstract
    An important approach to reduce power dissipation is reducing the number of instructions executed by the processor. To achieve this goal, this paper introduces a novel instruction scheduling algorithm that executes an instruction only when its result is required by another instruction. In this manner, it not only does not execute useless instructions, but also reduces the number of instructions executed after a mispredicted branch. The cost of the extra hardware is 161 bytes for 128 instruction window size. Measurements done using SPEC CPU 2000 benchmarks show that the average number of executed instructions is reduced by 13.5% while the average IPC is not affected. Copyright 2008 ACM  

    Finding aggregation tree with genetic algorithm for network correlated data gathering

    , Article 2nd International Conference on Sensor Technologies and Applications, SENSORCOMM 2008, Cap Esterel, 25 August 2008 through 31 August 2008 ; 2008 , Pages 429-434 ; 9780769533308 (ISBN) Habibi Masouleh, H ; Tahaee, S. A ; Jahangir, A. H ; Sharif University of Technology
    2008
    Abstract
    The critical issue in designing correlated data networks like Wireless Sensor Networks is to minimize the total cost of data transmission in the network, and decrease the amount of data flow. The problem of finding optimal aggregation tree for correlated data gathering in single sink network is considered as an NP-Complete problem and hence heuristic methods are usually applied to solve it[1]. In this paper, we apply genetic algorithm (GA) to solve the problem. In our method, we improve the performance of genetic search by selecting proper initial population. This initial population is determined in two ways, by using Prime's algorithm, and shortest path tree. The main issue is to regard... 

    Analysis of TESLA protocol in vehicular ad hoc networks using timed colored Petri nets

    , Article 2015 6th International Conference on Information and Communication Systems, ICICS 2015, 7 April 2015 through 9 April 2015 ; April , 2015 , Pages 222-227 ; 9781479973491 (ISBN) Jahanian, M. H ; Amin, F ; Jahangir, A. H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Authentication is an essential security requirement in safety-related vehicle-to-vehicle applications in VANETs. TESLA is one of the most popular broadcast source authentication protocols proposed and standardized for this purpose. Having strict time constraints and being prone to GPS synchronization errors make the analysis of this protocol challenging. In this paper, we utilize a timed model checking approach based on timed colored Petri nets to model and verify TESLA considering its time-sensitive behaviors. In this way, we show how neglecting timing aspects in protocol design and in protocol modelling can lead to successfully launched attacks and erroneous analyses respectively, and how... 

    A content-based deep intrusion detection system

    , Article International Journal of Information Security ; 2021 ; 16155262 (ISSN) Soltani, M ; Siavoshani, M. J ; Jahangir, A. H ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2021
    Abstract
    The growing number of Internet users and the prevalence of web applications make it necessary to deal with very complex software and applications in the network. This results in an increasing number of new vulnerabilities in the systems, and leading to an increase in cyber threats and, in particular, zero-day attacks. The cost of generating appropriate signatures for these attacks is a potential motive for using machine learning-based methodologies. Although there are many studies on using learning-based methods for attack detection, they generally use extracted features and overlook raw contents. This approach can lessen the performance of detection systems against content-based attacks... 

    A content-based deep intrusion detection system

    , Article International Journal of Information Security ; Volume 21, Issue 3 , 2022 , Pages 547-562 ; 16155262 (ISSN) Soltani, M ; Siavoshani, M. J ; Jahangir, A. H ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2022
    Abstract
    The growing number of Internet users and the prevalence of web applications make it necessary to deal with very complex software and applications in the network. This results in an increasing number of new vulnerabilities in the systems, and leading to an increase in cyber threats and, in particular, zero-day attacks. The cost of generating appropriate signatures for these attacks is a potential motive for using machine learning-based methodologies. Although there are many studies on using learning-based methods for attack detection, they generally use extracted features and overlook raw contents. This approach can lessen the performance of detection systems against content-based attacks... 

    Network survivability performance evaluation with applications in WDM networks with wavelength conversion

    , Article Proceedings - 29th Annual IEEE International Conference on Local Computer Networks, LCN 2004, Tampa, FL, 16 November 2004 through 18 November 2004 ; 2004 , Pages 344-351 Keshtgary, M ; Al Zahrani, F. A ; Jayasumana, A. P ; Jahangir, A. H ; Sharif University of Technology
    2004
    Abstract
    Network survivability gauges the ability of a network to support the committed Quality of Services (QoS) continuously in the presence of various failure scenarios. We perceive that both performance and availability are integral components of survivability. Therefore, we propose a composite model for survivability that consists of performance and availability analysis. A analytical technique is presented to find the excess loss due to failure (ELF) when the system is operating in gracefully degraded states. An algorithm is proposed to carry out the availability analysis of the network even when the available paths between nodes are non-disjoint. These two models are combined to construct a... 

    RACE: a real-time scheduling policy and communication architecture for large-scale wireless sensor networks

    , Article Proceedings of the 7th Annual Communication Networks and Services Research Conference, CNSR 2009, 11 May 2009 through 13 May 2009, Moncton, NB ; 2009 , Pages 458-460 ; 9780769536491 (ISBN) Mizanian, K ; Hajisheykhi, R ; Mohammad, B ; Jahangir, A. H ; Sharif University of Technology
    2009
    Abstract
    In wireless sensor networks (WSN), individual sensor nodes are inherently unreliable and have very limited capabilities to ensure real-time properties. In fact, one of the most predominant limitations in wireless sensor networks is energy consumption, which hinders the capacity of the network to provide real-time guarantees (e.g. low duty-cycles, low transmission range). Many approaches have been proposed to deal with energy/latency trade-offs, but they are likely to be insufficient for the applications where reduced delay guarantee is the main concern. We present and evaluate a packet scheduling policy and routing algorithm called RACE that inherently accounts for time constraints. We show... 

    Performance evaluation of energy management system in smart home using wireless sensor network

    , Article 2012 2nd Iranian Conference on Smart Grids, ICSG 2012, 23 May 2012 through 24 May 2012 ; May , 2012 , Page(s): 1 - 8 ; 9781467313995 (ISBN) Maghsoodi, N. H ; Haghnegahdar, M ; Jahangir, A. H ; Sanaei, E ; Sharif University of Technology
    IEEE  2012
    Abstract
    In this paper we evaluate the performance of Energy Management and Building Automation Systems in smart environment using wireless sensor network. We describe some aspects of smart grid and then explain the related communication models of smart meters and building management or energy management systems in a smart home. We propose three models, then we compare these models and we select a model for our test bed. We implement the selected model in real environment using wireless sensor network. We analyse network delay to find out whether wireless sensor network is useful or not. With proposed model, we can save up to 57% in energy cost. Also, we develop In- home display to inform customers... 

    Numerical investigation of the effects of a copper foam filled with phase change materials in a water-cooled photovoltaic/thermal system

    , Article Energy Conversion and Management ; Volume 163 , 2018 , Pages 187-195 ; 01968904 (ISSN) Mousavi, S ; Kasaeian, A ; Shafii, M. B ; Jahangir, M. H ; Sharif University of Technology
    Elsevier Ltd  2018
    Abstract
    The purpose of the present study is to investigate the thermal performance of a photovoltaic/thermal system, integrated with phase change materials in porous medium. For this purpose, a metal foam was employed as porous medium and the performance of five different PCMs, as organic and inorganic, were examined as well. Moreover, the effects of different key parameters such as the mass flow rate, solar irradiance, inlet water temperature and inclination were studied. Finally, the simulation results were compared with a water-cooled photovoltaic/thermal without incorporating PCMs and porous medium, and thermal performance of the three PV/T cases were reported. The highest thermal efficiency of... 

    An analytical performance evaluation for WSNs using loop-free bellman ford protocol

    , Article 2009 International Conference on Advanced Information Networking and Applications, AINA 2009, Bradford, 26 May 2009 through 29 May 2009 ; 2009 , Pages 568-571 ; 1550445X (ISSN); 9780769536385 (ISBN) Baharloo, M ; Hajisheykhi, R ; Arjomand, M ; Jahangir, A. H ; IEEE Computer Society ; Sharif University of Technology
    2009
    Abstract
    Although several analytical models have been proposed for wireless sensor networks (WSNs) with different capabilities, very few of them consider the effect of general service distribution as well as design constraints on network performance. This paper presents a new analytical model to compute message latency in a WSN with loop-free Bellman Ford routing strategy. The model considers limited buffer size for each node using M/G/1/k queuing system. Also, contention probability and resource utilization are suitably modeled. The results obtained from simulation experiments confirm that the model exhibits a high degree of accuracy for various network configurations. © 2009 IEEE  

    A lightweight key establishment scheme for wireless sensor networks

    , Article 3rd International Conference on New Technologies, Mobility and Security, NTMS 2009 ; Article number 5384737 , 2009 ; 9781424462735 (ISBN) Nikounia, S. H ; Amin, F ; Jahangir, A ; Sharif University of Technology
    2009
    Abstract
    Key predistribution in sensor networks refers to the problem of distributing secret keys among sensor nodes prior to deployment. Recently, many key predistribution schemes have been proposed for wireless sensor networks. To further improve these techniques, researchers have also proposed to use sensors' expected location information to help predistribution of keying materials. In this paper we propose a lightweight and scalable key establishment scheme for GPS-enabled wireless sensor networks. This scheme has little communication overhead and memory usage. Since communications and computations of key establishment schemes are done only once and when the network is begin initiated, actually...