Loading...
Search for:
area
0.008 seconds
Total 704 records
AMACA - A new multiple access collision avoidance scheme for wireless lans
, Article 2004 International Workshop on Wireless Ad-Hoc Networks, Oulu, 31 May 2004 through 3 June 2004 ; 2005 , Pages 238-242 ; 0780382757 (ISBN) ; Khalaj, B. H ; Sharif University of Technology
2005
Abstract
It's well known that "hidden- and exposed-terminal" are among the main problems in ad-hoc WLAN networks. In addition, there are scenarios where the desired destination is located in the range of other transmitters, so that the efforts on setting up communication with this terminal will fail due to collisions occurred between desired control packets and unwanted received data packets at destination. In such scenarios, conventional protocols can not address the problem efficiently, resulting in throughput and channel utilization degradation. In this paper, by using the same PHY of IEEE 802.11 and making slight changes in its MAC layer, a new MAC protocol is presented to address such problems....
Wide Area Protection Aganist Voltage Instability
, Ph.D. Dissertation Sharif University of Technology ; Ranjbar, Ali Mohammad (Supervisor) ; Feuillet, Reneh (Supervisor)
Abstract
oltage stability is a dynamic phenomenon. The time frame of interest for voltage stability phenomenon may vary from a few seconds to tens of minutes. Therefore, voltage stability may be either a short-term or a long-term phenomenon. The past proposed voltage stability protection schemes have major drawbacks in both static and dynamic aspects. To mitigate the drawbacks of the previously proposed voltage stability protection schemes in both static and dynamic domains two system protection schemes are proposed. In static domain, the proximity to the collapse point(i.e. proximity is measured by a voltage stability indicator) as well as the instability mechanism (i.e. determination of the most...
Modeling and Analysis of Two Wireless Networks with Opportunistic and Primary Spectrum Access
, M.Sc. Thesis Sharif University of Technology ; Ashtiani, Farid (Supervisor) ; Nasiri Kenari, Masoumeh (Supervisor)
Abstract
In this thesis, we propose an analytical model to evaluate the maximum stable throughput of a cognitive IEEE 802.11-based WLAN overlaid on a cellular network. In the considered scenario, the secondary nodes operate in uplink frequency band of primary network and transmit on their own idle detected primary channels using OFDM technique. The activity of primary nodes is modeled independently by ON-OFF alternating states with negative exponential distributed durations. The main feature of the proposed analytical model is to include different status of the secondary users, i.e., different spectrum opportunities for different cognitive users, as the result of dynamic nature of primary users as...
On Some Properties of OTIS Networks and Similar Networks
, M.Sc. Thesis Sharif University of Technology ; Movaghar Rahimabadi, Ali (Supervisor)
Abstract
The plausibility of embedding cycles of different lengths in the graphs of a network (known as the pancyclicity property) has important applications in Interconnection networks, parallel processing systems, and implementation of a number of either computational or graph problems such as those used for finding storage schemes of logical data structures, layout of circuits in VLSI and etc. OTIS network is an important Interconnection network that worth investigating. This kind of network has benefits of having electronic connection and optic connection simultaneously. Furthermore, independent of the technology of network, the topology of this network has importance. In this thesis, we have...
Throughput Analysis of a Cognitive Multi-hop Wireless Network Overlaid on a Cellular Network
, M.Sc. Thesis Sharif University of Technology ; Ashtiani, Farid (Supervisor)
Abstract
In this thesis, we evaluate the maximum stable throughput of a cognitive multi-hop IEEE 802.11-based WLAN overlaid on a cellular network. In the considered scenario, the secondary users operate in the downlink or uplink frequency band of primary network and transmit their data in free primary channels using OFDM technique. The activity of primary nodes is modeled independently by ON-OFF alternating states. To model the scenario, each secondary user is modeled with an open queueing network. The queueing network can model the transmission of data as well as the effect of primary users. By writing the traffic equations of the queueing network and applying the stability conditions, we are able...
Optimal space coverage with white convex polygons
, Article Journal of Combinatorial Optimization ; Dec , 2014 ; 13826905 ; Fazli, M ; Ghodsi, M ; Safari, M ; Sharif University of Technology
Abstract
Assume that we are given a set of points some of which are black and the rest are white. The goal is to find a set of convex polygons with maximum total area that cover all white points and exclude all black points. We study the problem on three different settings (based on overlapping between different convex polygons): (1) In case convex polygons are permitted to have common area, we present a polynomial algorithm. (2) In case convex polygons are not allowed to have common area but are allowed to have common vertices, we prove the NP-hardness of the problem and propose an algorithm whose output is at least (Formula presented.). (3) Finally, in case convex polygons are not allowed to have...
A decision tree-based method for power system fault diagnosis by synchronized Phasor Measurements
, Article IEEE PES Innovative Smart Grid Technologies Conference Europe ; 2012 ; 9781467325974 (ISBN) ; Dobakhshari, A. S ; Ranjbar, A. M ; Sharif University of Technology
2012
Abstract
This paper introduces a novel approach for power system fault diagnosis based on synchronized phasor measurements during the fault. The synchronized measurements are obtained in real time from Phasor Measurement Units (PMUs) and compared with offline thresholds determined by decision trees (DTs) to diagnose the fault. The DTs have already been trained offline using detailed power system analysis for different fault cases. While the traditional methods for fault diagnosis use the status of protective relays (PRs) and circuit breakers (CBs) to infer the fault section in the power system, the proposed method uses the available signals following the fault and thus can be trusted even in case of...
SCFIT: A FPGA-based fault injection technique for SEU fault model
, Article Proceedings -Design, Automation and Test in Europe, DATE ; 2012 , Pages 586-589 ; 15301591 (ISSN) ; 9783981080186 (ISBN) ; Ebrahimi, M ; Ejlali, A ; Miremadi, S. G ; Sharif University of Technology
2012
Abstract
In this paper, we have proposed a fast and easy-to-develop FPGA-based fault injection technique. This technique uses the Altera FPGAs debugging facilities in order to inject SEU fault model in both flip-flops and memory units. Since this method uses the FPGAs built-in facilities, it imposes a negligible performance and area overhead on the system. The experimental results on Leon2 processor shows that the proposed technique is on average four orders of magnitude faster than a simulation-based fault injection
Fault-tolerant spanners in networks with symmetric directional antennas
, Article 11th International Conference and Workshops on Algorithms and Computation, WALCOM 2017, 29 March 2017 through 31 March 2017 ; Volume 10167 LNCS , 2017 , Pages 266-278 ; 03029743 (ISSN); 9783319539249 (ISBN) ; Baharifard, F ; Borouny, M. S ; Zarrabi Zadeh, H ; Sharif University of Technology
Springer Verlag
2017
Abstract
Let P be a set of points in the plane, each equipped with a directional antenna that can cover a sector of angle α and range r. In the symmetric model of communication, two antennas u and v can communicate to each other, if and only if v lies in u’s coverage area and vice versa. In this paper, we introduce the concept of fault-tolerant spanners for directional antennas, which enables us to construct communication networks that retain their connectivity and spanning ratio even if a subset of antennas are removed from the network. We show how to orient the antennas with angle α and range r to obtain a k-fault-tolerant spanner for any positive integer k. For α ≥ π, we show that the range 13 for...
A system wide scheme for mitigation of voltage instability
, Article 2009 IEEE/PES Power Systems Conference and Exposition, PSCE 2009, Seattle, WA, 15 March 2009 through 18 March 2009 ; 2009 ; 9781424438112 (ISBN) ; Feuillet, R ; Ranjbar, A. M ; Mozafari, B ; Sharif University of Technology
2009
Abstract
In this paper, a system wide scheme is proposed to arrest voltage instability. This scheme consists of two stabilizing and securing parts. For post- contingency situations, where there are no equilibrium solutions, first, the stabilizing scheme finds the closest solvable operating point, and then passes this point to the securing scheme. The securing scheme brings the solvable, but insecure operating point, back to a secure and stable one. Also, a voltage stability indicator is proposed to monitor the available margin to the collapse point. The proposed stabilizing and securing model are solved using the sequential quadratic programming technique. ©2009 IEEE
Symmetrie relaying based on partial decoding and the capacity of a class of relay networks
, Article IET Communications ; Volume 3, Issue 1 , 2009 , Pages 151-159 ; 17518628 (ISSN) ; Aref, M. R ; Sharif University of Technology
2009
Abstract
Symmetric relaying is a method of relaying in which the relays can decode the message of other relays in the network in addition to the source message. In this paper an achievable rate is presented for a symmetric two-relay network based on partial decoding. The strategy make use of familiar techniques such as product binning, regular encoding/sliding window decoding and regular encoding/backward decoding. The proposed rate is shown to subsume the previously proposed rate for feed-forward relay network based on decode-and-forward. This rate is also used to establish the capacity of a generalisation of Aref network called 'semi-deterministic relay network with no interference at the relays'...
Reduction of sensor population in a camera sensor network
, Article 2008 International Symposium on Telecommunications, IST 2008, Tehran, 27 August 2008 through 28 August 2008 ; 2008 , Pages 349-353 ; 9781424427512 (ISBN) ; Samavi, S ; Ashori, M ; Karimi, N ; Fotohi, M ; Kasiri, K ; Sharif University of Technology
2008
Abstract
The problem of surveillance for intrusion detection in a camera sensor network is addressed in this paper. In order to save limited resources, a sensing task should involve just the right number of sensors. For a wide enough coverage area random and uniform distribution can be applied. We propose a novel method which allows reduction of number of sensors and guarantees a desired surveillance against aerial intrusion. Enhancement of the method is also offered to further reduce the number of sensors and improve the performance. ©2008 IEEE
Performance evaluation of a new backoff method for IEEE 802.11
, Article Computer Communications ; Volume 30, Issue 18 , 2007 , Pages 3698-3704 ; 01403664 (ISSN) ; Nojumi, H ; Sharif University of Technology
2007
Abstract
Since DCF is the main protocol of accessing other mobile stations in ad hoc networks such as IEEE 802.11 WLANs, a self-controlling method for each station is necessary, called the backoff algorithm. An exponential backoff method has been used in WLANs and significant efforts have been made to analyze its throughput and other important properties such as delay and jitter. In this article, we propose a new backoff algorithm and model it with a discrete-time Markov chain; measuring its saturation throughput under several conditions and several set of parameters which are to be adjusted according to the network condition, with the aim of approaching maximum throughput when stations are...
An enriched finite element algorithm for numerical computation of contact friction problems
, Article International Journal of Mechanical Sciences ; Volume 49, Issue 2 , 2007 , Pages 183-199 ; 00207403 (ISSN) ; Nikbakht, M ; Sharif University of Technology
2007
Abstract
In this paper, the extended finite element method (XFEM) is employed to model the presence of discontinuities caused by frictional contact. The method is used in modeling strong discontinuity within a standard finite element framework. In extended finite element method (XFEM) technique, the special functions are included in standard FEM to simulate discontinuity without considering the boundary conditions in meshing the domain. In this study, the classical finite element approximation is enriched by applying additional terms to simulate the frictional behavior of contact between two bodies. These terms, which are included for enrichment of nodal displacements, depend on the contact condition...
A study of feasibility for water purification using vertical porous concrete filter
, Article International Journal of Environmental Science and Technology ; Volume 4, Issue 4 , 2007 , Pages 505-512 ; 17351472 (ISSN) ; Torabian, A ; Borghei, M ; Hassani, A. H ; Sharif University of Technology
CEERS
2007
Abstract
There is a need to find cheaper and simpler techniques for rural water filtration system in developing countries. Using a filter made of blocks for the water treatment enables one to make vertical filters. It is expected that the amount of land utilized would decrease by more than 70 % if vertical filters were used. The operation and washing would be simpler than using horizontal sand filters as filters made of blocks would be used instead. The feasibility study focused on finding adequate materials, compositions and methods of making a block with enough resistance to water pressure, sufficient porosity for water transformation, and using inexpensive, readily available materials. A pilot...
A MAC protocol equipped by a novel transmission scheduling algorithm for wireless LANs
, Article 2006 3rd Annual IEEE Communications Society on Sensor and Ad hoc Communications and Networks, Secon 2006, Reston, VA, 25 September 2006 through 28 September 2006 ; Volume 3 , 2006 , Pages 933-939 ; 1424406269 (ISBN); 9781424406265 (ISBN) ; Hossein Khalaj, B ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2006
Abstract
Hidden-terminal is one of the main problems in ad hoc wireless networks. In addition, there are scenarios where the desired destination is located in the range of other transmitters, so that the efforts on setting up communication with this terminal will fail due to collisions that may occur between transmitted control frames and undesired received control and data frames. This phenomenon becomes a bottleneck when most of data transmissions experience packet fragmentation. In such scenarios, the desired destination becomes unreachable during the data transfer of neighboring nodes. Using the same PHY of IEEE 802.11 and making slight modifications in its MAC, a new medium access control scheme...
An 8-bit 160 MS/s folding-interpolating adc with optimizied active averaging/interpolating network
, Article IEEE International Symposium on Circuits and Systems 2005, ISCAS 2005, Kobe, 23 May 2005 through 26 May 2005 ; 2005 , Pages 6150-6153 ; 02714310 (ISSN) ; Movahedian, H ; Bakhtiar, M. S ; Sharif University of Technology
2005
Abstract
An 8-bit CMOS folding-interpolating analog-todigital converter is presented. A new method for designing optimized averaging circuit is also described. Careful circuit design and layout leads to a high-speed (160 MSPS) and low power (70 mW in 2.5 V supply voltage) ADC. The ADC is successfully implemented in 0.25um CMOS digital process and it takes 1x1.4 mm2 silicon area. © 2005 IEEE
Evaluating the uncertainty of urban flood model using glue approach
, Article Urban Water Journal ; Volume 19, Issue 6 , 2022 , Pages 600-615 ; 1573062X (ISSN) ; Fazloula, R ; Zarghami, M ; Akbarpour, A ; Sharif University of Technology
Taylor and Francis Ltd
2022
Abstract
This study is an attempt to investigate and analyze uncertainty through the Glue method in parts of Tabriz, Iran, using the SWMM urban flood model. In order to quantify the uncertainty, the initial range of input parameters including curve number, impenetrability percentage, penetrability level’s coarseness coefficient, and impenetrability level’s coarseness coefficient are defined and the GLUE algorithm is used to conduct primary sampling operation from parametric space using Latin hypercube sampling method. Considering the simulation results and the observed values of synchronized events, about %20 of the total outputs and generated parameters series have been excluded as acceptable...
Efficient periodic clock calculus in latency-insensitive design
, Article 2011 18th IEEE International Conference on Electronics, Circuits, and Systems, ICECS 2011, 11 December 2011 through 14 December 2011 ; Dec , 2011 , Pages 546-549 ; 9781457718458 (ISBN) ; Hessabi, S ; Goudarzi, M ; Sharif University of Technology
Abstract
Communication wire delay between multiple blocks is becoming a critical issue in System on Chip (SoC) design. Scheduling-based Latency-Insensitive Design (LID) is a method to alleviate wire delays by utilizing a central scheduling scheme for periodic clock gating of the blocks. The scheduling scheme resides in shift registers as sequences of '1' and '0' bits. In many systems, these sequences are too long, and have large area overhead. This problem indisposes the implementation of the scheduling based protocol. This paper proposes an algorithm that finds sequences with shorter lengths in comparison with the prior algorithm. On synthetic/random test cases, the algorithm gives 45% reduction on...
Observability enhancement by optimal PMU placement considering random power system outages
, Article Energy Systems ; Volume 2, Issue 1 , 2011 , Pages 45-65 ; 18683967 (ISSN) ; Fotuhi Firuzabad, M ; Shahidehpour, M ; Khodaei, A ; Sharif University of Technology
Abstract
This paper enhances the observability of power networks by taking into consideration random component outages. The architecture of wide-area measurement system (WAMS) is analyzed in order to identify components that would affect the network observability. An iterative framework is devised to calculate a bus index in power networks equipped with phasor measurement units (PMUs) and conventional measurements. The average of bus indices represents a system index which provides an overall insight on the power network observability. The system index is utilized as a criterion to distinguish among multiple optimal PMU placements. Conventional bus injection and line flow measurements and the effect...