Loading...
Search for: area
0.008 seconds
Total 704 records

    AMACA - A new multiple access collision avoidance scheme for wireless lans

    , Article 2004 International Workshop on Wireless Ad-Hoc Networks, Oulu, 31 May 2004 through 3 June 2004 ; 2005 , Pages 238-242 ; 0780382757 (ISBN) Ghaboosi, K ; Khalaj, B. H ; Sharif University of Technology
    2005
    Abstract
    It's well known that "hidden- and exposed-terminal" are among the main problems in ad-hoc WLAN networks. In addition, there are scenarios where the desired destination is located in the range of other transmitters, so that the efforts on setting up communication with this terminal will fail due to collisions occurred between desired control packets and unwanted received data packets at destination. In such scenarios, conventional protocols can not address the problem efficiently, resulting in throughput and channel utilization degradation. In this paper, by using the same PHY of IEEE 802.11 and making slight changes in its MAC layer, a new MAC protocol is presented to address such problems.... 

    Wide Area Protection Aganist Voltage Instability

    , Ph.D. Dissertation Sharif University of Technology Amraee, Turaj (Author) ; Ranjbar, Ali Mohammad (Supervisor) ; Feuillet, Reneh (Supervisor)
    Abstract
    oltage stability is a dynamic phenomenon. The time frame of interest for voltage stability phenomenon may vary from a few seconds to tens of minutes. Therefore, voltage stability may be either a short-term or a long-term phenomenon. The past proposed voltage stability protection schemes have major drawbacks in both static and dynamic aspects. To mitigate the drawbacks of the previously proposed voltage stability protection schemes in both static and dynamic domains two system protection schemes are proposed. In static domain, the proximity to the collapse point(i.e. proximity is measured by a voltage stability indicator) as well as the instability mechanism (i.e. determination of the most... 

    Modeling and Analysis of Two Wireless Networks with Opportunistic and Primary Spectrum Access

    , M.Sc. Thesis Sharif University of Technology Moradian, Masoumeh (Author) ; Ashtiani, Farid (Supervisor) ; Nasiri Kenari, Masoumeh (Supervisor)
    Abstract
    In this thesis, we propose an analytical model to evaluate the maximum stable throughput of a cognitive IEEE 802.11-based WLAN overlaid on a cellular network. In the considered scenario, the secondary nodes operate in uplink frequency band of primary network and transmit on their own idle detected primary channels using OFDM technique. The activity of primary nodes is modeled independently by ON-OFF alternating states with negative exponential distributed durations. The main feature of the proposed analytical model is to include different status of the secondary users, i.e., different spectrum opportunities for different cognitive users, as the result of dynamic nature of primary users as... 

    On Some Properties of OTIS Networks and Similar Networks

    , M.Sc. Thesis Sharif University of Technology Malekimajd, Marzieh (Author) ; Movaghar Rahimabadi, Ali (Supervisor)
    Abstract
    The plausibility of embedding cycles of different lengths in the graphs of a network (known as the pancyclicity property) has important applications in Interconnection networks, parallel processing systems, and implementation of a number of either computational or graph problems such as those used for finding storage schemes of logical data structures, layout of circuits in VLSI and etc. OTIS network is an important Interconnection network that worth investigating. This kind of network has benefits of having electronic connection and optic connection simultaneously. Furthermore, independent of the technology of network, the topology of this network has importance. In this thesis, we have... 

    Throughput Analysis of a Cognitive Multi-hop Wireless Network Overlaid on a Cellular Network

    , M.Sc. Thesis Sharif University of Technology Soleimani, Hosein (Author) ; Ashtiani, Farid (Supervisor)
    Abstract
    In this thesis, we evaluate the maximum stable throughput of a cognitive multi-hop IEEE 802.11-based WLAN overlaid on a cellular network. In the considered scenario, the secondary users operate in the downlink or uplink frequency band of primary network and transmit their data in free primary channels using OFDM technique. The activity of primary nodes is modeled independently by ON-OFF alternating states. To model the scenario, each secondary user is modeled with an open queueing network. The queueing network can model the transmission of data as well as the effect of primary users. By writing the traffic equations of the queueing network and applying the stability conditions, we are able... 

    Optimal space coverage with white convex polygons

    , Article Journal of Combinatorial Optimization ; Dec , 2014 ; 13826905 Ehsani, S ; Fazli, M ; Ghodsi, M ; Safari, M ; Sharif University of Technology
    Abstract
    Assume that we are given a set of points some of which are black and the rest are white. The goal is to find a set of convex polygons with maximum total area that cover all white points and exclude all black points. We study the problem on three different settings (based on overlapping between different convex polygons): (1) In case convex polygons are permitted to have common area, we present a polynomial algorithm. (2) In case convex polygons are not allowed to have common area but are allowed to have common vertices, we prove the NP-hardness of the problem and propose an algorithm whose output is at least (Formula presented.). (3) Finally, in case convex polygons are not allowed to have... 

    A decision tree-based method for power system fault diagnosis by synchronized Phasor Measurements

    , Article IEEE PES Innovative Smart Grid Technologies Conference Europe ; 2012 ; 9781467325974 (ISBN) Dehkordi, P. Z ; Dobakhshari, A. S ; Ranjbar, A. M ; Sharif University of Technology
    2012
    Abstract
    This paper introduces a novel approach for power system fault diagnosis based on synchronized phasor measurements during the fault. The synchronized measurements are obtained in real time from Phasor Measurement Units (PMUs) and compared with offline thresholds determined by decision trees (DTs) to diagnose the fault. The DTs have already been trained offline using detailed power system analysis for different fault cases. While the traditional methods for fault diagnosis use the status of protective relays (PRs) and circuit breakers (CBs) to infer the fault section in the power system, the proposed method uses the available signals following the fault and thus can be trusted even in case of... 

    SCFIT: A FPGA-based fault injection technique for SEU fault model

    , Article Proceedings -Design, Automation and Test in Europe, DATE ; 2012 , Pages 586-589 ; 15301591 (ISSN) ; 9783981080186 (ISBN) Mohammadi, A ; Ebrahimi, M ; Ejlali, A ; Miremadi, S. G ; Sharif University of Technology
    2012
    Abstract
    In this paper, we have proposed a fast and easy-to-develop FPGA-based fault injection technique. This technique uses the Altera FPGAs debugging facilities in order to inject SEU fault model in both flip-flops and memory units. Since this method uses the FPGAs built-in facilities, it imposes a negligible performance and area overhead on the system. The experimental results on Leon2 processor shows that the proposed technique is on average four orders of magnitude faster than a simulation-based fault injection  

    Fault-tolerant spanners in networks with symmetric directional antennas

    , Article 11th International Conference and Workshops on Algorithms and Computation, WALCOM 2017, 29 March 2017 through 31 March 2017 ; Volume 10167 LNCS , 2017 , Pages 266-278 ; 03029743 (ISSN); 9783319539249 (ISBN) Abam, M. A ; Baharifard, F ; Borouny, M. S ; Zarrabi Zadeh, H ; Sharif University of Technology
    Springer Verlag  2017
    Abstract
    Let P be a set of points in the plane, each equipped with a directional antenna that can cover a sector of angle α and range r. In the symmetric model of communication, two antennas u and v can communicate to each other, if and only if v lies in u’s coverage area and vice versa. In this paper, we introduce the concept of fault-tolerant spanners for directional antennas, which enables us to construct communication networks that retain their connectivity and spanning ratio even if a subset of antennas are removed from the network. We show how to orient the antennas with angle α and range r to obtain a k-fault-tolerant spanner for any positive integer k. For α ≥ π, we show that the range 13 for... 

    A system wide scheme for mitigation of voltage instability

    , Article 2009 IEEE/PES Power Systems Conference and Exposition, PSCE 2009, Seattle, WA, 15 March 2009 through 18 March 2009 ; 2009 ; 9781424438112 (ISBN) Amraee, T ; Feuillet, R ; Ranjbar, A. M ; Mozafari, B ; Sharif University of Technology
    2009
    Abstract
    In this paper, a system wide scheme is proposed to arrest voltage instability. This scheme consists of two stabilizing and securing parts. For post- contingency situations, where there are no equilibrium solutions, first, the stabilizing scheme finds the closest solvable operating point, and then passes this point to the securing scheme. The securing scheme brings the solvable, but insecure operating point, back to a secure and stable one. Also, a voltage stability indicator is proposed to monitor the available margin to the collapse point. The proposed stabilizing and securing model are solved using the sequential quadratic programming technique. ©2009 IEEE  

    Symmetrie relaying based on partial decoding and the capacity of a class of relay networks

    , Article IET Communications ; Volume 3, Issue 1 , 2009 , Pages 151-159 ; 17518628 (ISSN) Ghabeli, L ; Aref, M. R ; Sharif University of Technology
    2009
    Abstract
    Symmetric relaying is a method of relaying in which the relays can decode the message of other relays in the network in addition to the source message. In this paper an achievable rate is presented for a symmetric two-relay network based on partial decoding. The strategy make use of familiar techniques such as product binning, regular encoding/sliding window decoding and regular encoding/backward decoding. The proposed rate is shown to subsume the previously proposed rate for feed-forward relay network based on decode-and-forward. This rate is also used to establish the capacity of a generalisation of Aref network called 'semi-deterministic relay network with no interference at the relays'... 

    Reduction of sensor population in a camera sensor network

    , Article 2008 International Symposium on Telecommunications, IST 2008, Tehran, 27 August 2008 through 28 August 2008 ; 2008 , Pages 349-353 ; 9781424427512 (ISBN) Sanjabi, M ; Samavi, S ; Ashori, M ; Karimi, N ; Fotohi, M ; Kasiri, K ; Sharif University of Technology
    2008
    Abstract
    The problem of surveillance for intrusion detection in a camera sensor network is addressed in this paper. In order to save limited resources, a sensing task should involve just the right number of sensors. For a wide enough coverage area random and uniform distribution can be applied. We propose a novel method which allows reduction of number of sensors and guarantees a desired surveillance against aerial intrusion. Enhancement of the method is also offered to further reduce the number of sensors and improve the performance. ©2008 IEEE  

    Performance evaluation of a new backoff method for IEEE 802.11

    , Article Computer Communications ; Volume 30, Issue 18 , 2007 , Pages 3698-3704 ; 01403664 (ISSN) Minooei, H ; Nojumi, H ; Sharif University of Technology
    2007
    Abstract
    Since DCF is the main protocol of accessing other mobile stations in ad hoc networks such as IEEE 802.11 WLANs, a self-controlling method for each station is necessary, called the backoff algorithm. An exponential backoff method has been used in WLANs and significant efforts have been made to analyze its throughput and other important properties such as delay and jitter. In this article, we propose a new backoff algorithm and model it with a discrete-time Markov chain; measuring its saturation throughput under several conditions and several set of parameters which are to be adjusted according to the network condition, with the aim of approaching maximum throughput when stations are... 

    An enriched finite element algorithm for numerical computation of contact friction problems

    , Article International Journal of Mechanical Sciences ; Volume 49, Issue 2 , 2007 , Pages 183-199 ; 00207403 (ISSN) Khoei, A. R ; Nikbakht, M ; Sharif University of Technology
    2007
    Abstract
    In this paper, the extended finite element method (XFEM) is employed to model the presence of discontinuities caused by frictional contact. The method is used in modeling strong discontinuity within a standard finite element framework. In extended finite element method (XFEM) technique, the special functions are included in standard FEM to simulate discontinuity without considering the boundary conditions in meshing the domain. In this study, the classical finite element approximation is enriched by applying additional terms to simulate the frictional behavior of contact between two bodies. These terms, which are included for enrichment of nodal displacements, depend on the contact condition... 

    A study of feasibility for water purification using vertical porous concrete filter

    , Article International Journal of Environmental Science and Technology ; Volume 4, Issue 4 , 2007 , Pages 505-512 ; 17351472 (ISSN) Taghizadeh, M. M ; Torabian, A ; Borghei, M ; Hassani, A. H ; Sharif University of Technology
    CEERS  2007
    Abstract
    There is a need to find cheaper and simpler techniques for rural water filtration system in developing countries. Using a filter made of blocks for the water treatment enables one to make vertical filters. It is expected that the amount of land utilized would decrease by more than 70 % if vertical filters were used. The operation and washing would be simpler than using horizontal sand filters as filters made of blocks would be used instead. The feasibility study focused on finding adequate materials, compositions and methods of making a block with enough resistance to water pressure, sufficient porosity for water transformation, and using inexpensive, readily available materials. A pilot... 

    A MAC protocol equipped by a novel transmission scheduling algorithm for wireless LANs

    , Article 2006 3rd Annual IEEE Communications Society on Sensor and Ad hoc Communications and Networks, Secon 2006, Reston, VA, 25 September 2006 through 28 September 2006 ; Volume 3 , 2006 , Pages 933-939 ; 1424406269 (ISBN); 9781424406265 (ISBN) Ghaboosi, K ; Hossein Khalaj, B ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2006
    Abstract
    Hidden-terminal is one of the main problems in ad hoc wireless networks. In addition, there are scenarios where the desired destination is located in the range of other transmitters, so that the efforts on setting up communication with this terminal will fail due to collisions that may occur between transmitted control frames and undesired received control and data frames. This phenomenon becomes a bottleneck when most of data transmissions experience packet fragmentation. In such scenarios, the desired destination becomes unreachable during the data transfer of neighboring nodes. Using the same PHY of IEEE 802.11 and making slight modifications in its MAC, a new medium access control scheme... 

    An 8-bit 160 MS/s folding-interpolating adc with optimizied active averaging/interpolating network

    , Article IEEE International Symposium on Circuits and Systems 2005, ISCAS 2005, Kobe, 23 May 2005 through 26 May 2005 ; 2005 , Pages 6150-6153 ; 02714310 (ISSN) Azin, M ; Movahedian, H ; Bakhtiar, M. S ; Sharif University of Technology
    2005
    Abstract
    An 8-bit CMOS folding-interpolating analog-todigital converter is presented. A new method for designing optimized averaging circuit is also described. Careful circuit design and layout leads to a high-speed (160 MSPS) and low power (70 mW in 2.5 V supply voltage) ADC. The ADC is successfully implemented in 0.25um CMOS digital process and it takes 1x1.4 mm2 silicon area. © 2005 IEEE  

    Evaluating the uncertainty of urban flood model using glue approach

    , Article Urban Water Journal ; Volume 19, Issue 6 , 2022 , Pages 600-615 ; 1573062X (ISSN) Kobarfard, M ; Fazloula, R ; Zarghami, M ; Akbarpour, A ; Sharif University of Technology
    Taylor and Francis Ltd  2022
    Abstract
    This study is an attempt to investigate and analyze uncertainty through the Glue method in parts of Tabriz, Iran, using the SWMM urban flood model. In order to quantify the uncertainty, the initial range of input parameters including curve number, impenetrability percentage, penetrability level’s coarseness coefficient, and impenetrability level’s coarseness coefficient are defined and the GLUE algorithm is used to conduct primary sampling operation from parametric space using Latin hypercube sampling method. Considering the simulation results and the observed values of synchronized events, about %20 of the total outputs and generated parameters series have been excluded as acceptable... 

    Efficient periodic clock calculus in latency-insensitive design

    , Article 2011 18th IEEE International Conference on Electronics, Circuits, and Systems, ICECS 2011, 11 December 2011 through 14 December 2011 ; Dec , 2011 , Pages 546-549 ; 9781457718458 (ISBN) Zare, M ; Hessabi, S ; Goudarzi, M ; Sharif University of Technology
    Abstract
    Communication wire delay between multiple blocks is becoming a critical issue in System on Chip (SoC) design. Scheduling-based Latency-Insensitive Design (LID) is a method to alleviate wire delays by utilizing a central scheduling scheme for periodic clock gating of the blocks. The scheduling scheme resides in shift registers as sequences of '1' and '0' bits. In many systems, these sequences are too long, and have large area overhead. This problem indisposes the implementation of the scheduling based protocol. This paper proposes an algorithm that finds sequences with shorter lengths in comparison with the prior algorithm. On synthetic/random test cases, the algorithm gives 45% reduction on... 

    Observability enhancement by optimal PMU placement considering random power system outages

    , Article Energy Systems ; Volume 2, Issue 1 , 2011 , Pages 45-65 ; 18683967 (ISSN) Aminifar, F ; Fotuhi Firuzabad, M ; Shahidehpour, M ; Khodaei, A ; Sharif University of Technology
    Abstract
    This paper enhances the observability of power networks by taking into consideration random component outages. The architecture of wide-area measurement system (WAMS) is analyzed in order to identify components that would affect the network observability. An iterative framework is devised to calculate a bus index in power networks equipped with phasor measurement units (PMUs) and conventional measurements. The average of bus indices represents a system index which provides an overall insight on the power network observability. The system index is utilized as a criterion to distinguish among multiple optimal PMU placements. Conventional bus injection and line flow measurements and the effect...