Loading...
Search for: arithmetization
0.007 seconds

    Universal image steganalysis against spatial-domain steganography based on energy distribution of singular values

    , Article 7th International Conference on Information Technology and Application, ICITA 2011 ; 2011 , Pages 179-183 ; 9780980326741 (ISBN) Shojaei Hashemi, A ; Soltanian Zadeh, H ; Ghaemmagham, S ; Kamarei, M ; Sharif University of Technology
    Abstract
    A passive image steganalysis method is proposed to universally detect spatial-domain steganography schemes. It is shown to have better performance than universal steganalyzers known to be powerful in spatial domain, including the WFLogSv and the WAM methods. This level of accuracy is the result of improving the WFLogSv steganalyzer by considering a more comprehensive relationship between the singular values of each image block and the linear correlation of the rows and the columns. That is, instead of the closeness of the lower singular values to zero, the energy distribution of the singular values is investigated. An innovative measure is proposed for this investigation, which is inspired... 

    Memristor-based circuits for performing basic arithmetic operations

    , Article Procedia Computer Science, 6 October 2010 through 10 October 2010 ; Volume 3 , October , 2011 , Pages 128-132 ; 18770509 (ISSN) Merrikh Bayat, F ; Shouraki, S. B ; Sharif University of Technology
    2011
    Abstract
    In almost all of the currently working circuits, especially in analog circuits implementing signal processing applications, basic arithmetic operations such as multiplication, addition, subtraction and division are performed on values which are represented by voltages or currents. However, in this paper, we propose a new and simple method for performing analog arithmetic operations which in this scheme, signals are represented and stored through a memristance of the newly found circuit element, i.e. memristor, instead of voltage or current. Some of these operators such as divider and multiplier are much simpler and faster than their equivalent voltage-based circuits and they require less... 

    Performability evaluation of grid environments using stochastic reward nets

    , Article IEEE Transactions on Dependable and Secure Computing ; Volume 12, Issue 2 , 2015 , Pages 204-216 ; 15455971 (ISSN) Entezari Maleki, R ; Trivedi, K. S ; Movaghar, A ; Sharif University of Technology
    Abstract
    In this paper, performance of grid computing environment is studied in the presence of failure-repair of the resources. To achieve this, in the first step, each of the grid resource is individually modeled using Stochastic Reward Nets (SRNs), and mean response time of the resource for grid tasks is computed as a performance measure. In individual models, three different scheduling schemes called random selection, non-preemptive priority, and preemptive priority are considered to simultaneously schedule local and grid tasks to the processors of a single resource. In the next step, single resource models are combined to shape an entire grid environment. Since the number of the resources in a... 

    A novel architecture of pseudorandom dithered MASH digital delta-sigma modulator with lower spur

    , Article Journal of Circuits, Systems and Computers ; Volume 25, Issue 7 , 2016 ; 02181266 (ISSN) Noori, S. A. S ; Frashidi, E ; Sadughi, S ; Sharif University of Technology
    World Scientific Publishing Co. Pte Ltd 
    Abstract
    A Digital Delta Sigma Modulator (DDSM) is a Finite State Machine (FSM); it is implemented using finite precision arithmetic units and the number of available states is finite. The DDSM always produces a periodic output signal when the input is constant. This paper proposes a novel method of applying periodic dither to a DDSM in order to obtain minimized spurious tones. The effects of adding the pseudorandom dither signal in different stages within the proposed Multi-Stage noise Shaping (MASH) modulator are expressed in the equations, and the results are compared. We present results regarding the periodicity of the quantization noise produced by a MASH modulator with a constant input and a... 

    A novel OCR system for calculating handwritten persian arithmetic expressions

    , Article IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2009, 14 December 2009 through 16 December 2009 ; 2009 , Pages 277-282 ; 9781424459506 (ISBN) Khalighi, S ; Tirdad, P ; Rabiee, H. R ; Parviz, M ; Sharif University of Technology
    Abstract
    In this paper we propose a novel OCR system which can recognize and calculate handwritten Persian arithmetic expressions without using a keyboard or a memory to store the intermediate results. Our research is composed of two major phases: character recognition and calculation. The recognition phase is based on a new approach for feature extraction. Fuzzy Support Vector Machines (FSVMs) are employed as the classifier. In calculation phase a simple algorithm is used for calculating the recognized arithmetic expression. The performance of the system is evaluated on a database consisting of 3400 digits and symbols written by 20 different people. 92 percent accuracy in recognition proves the good... 

    A novel OCR system for calculating handwritten Persian arithmetic expressions

    , Article 8th International Conference on Machine Learning and Applications, ICMLA 2009, 13 December 2009 through 15 December 2009 ; 2009 , Pages 755-758 ; 9780769539263 (ISBN) Khalighi, S ; Tirdad, P ; Rabiee, H. R ; Parviz, M ; Sharif University of Technology
    Abstract
    In this paper, we propose a novel OCR system which can recognize and calculate handwritten Persian arithmetic expressions without using a keyboard or a memory to store the intermediate results. Our system is composed of two major phases: character recognition and calculation. The recognition phase is based on a new approach for feature extraction followed by a Fuzzy Support Vector Machines (FSVMs) as the classifier. In calculation phase a simple algorithm is used for calculating the recognized arithmetic expressions. The performance of the system was evaluated on a database consisting of 3400 digits and symbols written by 20 different people. 92 percent accuracy in recognition proves the... 

    Improvement of fault detection in wireless sensor networks

    , Article 2009 Second ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM 2009, Sanya, 8 August 2009 through 9 August 2009 ; Volume 4 , 2009 , Pages 644-646 ; 9781424442461 (ISBN) Khazaei, E ; Barati, A ; Movaghar, A ; Yangzhou University; Guangdong University of Business Studies; Wuhan Institute of Technology; IEEE SMC TC on Education Technology and Training; IEEE Technology Management Council ; Sharif University of Technology
    2009
    Abstract
    This paper presents a centralized fault detection algorithm for wireless sensor networks. Faulty sensor nodes are identified based on comparisons between neighboring nodes and own central node and dissemination of the decision made at each node. RNS system is used to tolerate transient faults in sensing and communication. In this system, arithmetic operations act on residues - reminder of dividing original number in several definite modules - in parallel. Consequently computations on these residues which are smaller than the original number are performed, so speed up arithmetic and decreased power consumption is achieved. ©2009 IEEE  

    Joint source-channel coding using finite state integer arithmetic codes

    , Article Proceedings of 2009 IEEE International Conference on Electro/Information Technology, EIT 2009, 7 June 2009 through 9 June 2009, Windsor, ON ; 2009 , Pages 19-22 ; 9781424433551 (ISBN) Moradmand, H ; Payandeh, A ; Aref, M. R ; Sharif University of Technology
    2009
    Abstract
    Inserting redundancy to arithmetic codes is a common strategy to add error detection capability to this well-known family of source codes. By using this strategy error correction is possible through some decoding algorithms such as Viterbi decoder. In this paper a system has proposed that uses finite state integer arithmetic codes (FSAC) as a joint source-channel code in combination with a cyclic redundancy check (CRC) and a List Viterbi decoder. The proposed scheme has shown better performance than previous ones. © 2009 IEEE  

    Aging-Aware context switching in multicore processors based on workload classification

    , Article IEEE Computer Architecture Letters ; Volume 19, Issue 2 , 2020 , Pages 159-162 Sharifi, F ; Rohbani, N ; Hessabi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    As transistor dimensions continue to shrink, long-term reliability threats, such as Negative Bias Temperature Instability, affect multicore processors lifespan. This letter proposes a load balancing technique, based on the rate of integer and floating-point instructions per workloads. This technique classifies workloads into integer-majority and floating-point-majority classes and migrates workloads among cores in order to relax the stressed execution units. The context switching feature of operating system is employed to reduce implementation and performance overheads of the proposed technique. According to the simulations, the proposed technique reduces the aging rate of a multicore... 

    Enhanced TED: a new data structure for RTL verification

    , Article 21st International Conference on VLSI Design, VLSI DESIGN 2008, Hyderabad, 4 January 2008 through 8 January 2008 ; 2008 , Pages 481-486 ; 0769530834 (ISBN); 9780769530833 (ISBN) Lotfi Kamran, P ; Massoumi, M ; Mirzaei, M ; Navabi, Z ; VLSI Society of India ; Sharif University of Technology
    2008
    Abstract
    This work provides a canonical representation for manipulation of RTL designs. Work has already been done on a canonical and graph-based representation called Taylor Expansion Diagram (TED). Although TED can effectively be used to represent arithmetic expressions at the word-level, it is not memory efficient in representing bit-level logic expressions. In addition, TED cannot represent Boolean expressions at the word-level (vector-level). In this paper, we present modifications to TED that will improve its ability for bit-level logic representation while enhancing its robustness to represent word-level Boolean expressions. It will be shown that for bit-level logic expressions, the Enhanced... 

    Optimization and Verification of Arithmetic Circuits under Different Levels of Abstraction

    , M.Sc. Thesis Sharif University of Technology Sarbishei, Omid (Author) ; Tabandeh, Mahmoud (Supervisor) ; Alizadeh, Bijan (Supervisor)
    Abstract
    Arithmetic circuits are considered as very important blocks of datapaths in microprocessor structures. Due to the high importance of these circuits, several optimization approaches in different levels of abstraction have been proposed for them. These approaches can be implemented by either software or manually by digital logic designers. As within this optimization process, specially, in manual approaches, the probability of introducing logic bugs in the circuit is high, it would then be necessary to make use of verification and debugging techniques for the designed circuits. One of the classic verification methods is simulation. This approach is not suitable for large designs and it does... 

    Distributed Verifiable Computing: Algorithms and Analysis

    , M.Sc. Thesis Sharif University of Technology Rahimi, Ali (Author) ; Maddah Ali, Mohammad Ali (Supervisor)
    Abstract
    Zero knowledge proofs allow a person (prover) to convince another person (verifier) that he has performed a specific computation on a secret data correctly, and has obtained a true answer, without having to disclose the secret data. QAP (Quadratic Arithmetic Program) based zkSNARKs (zero knowledge Succinct Non-interactive Argument of Knowledge) are a type of zero knowledge proof. They have several properties that make them attractive in practice, e.g. verifier's work is very easy. So they are used in many areas such as Blockchain and cloud computing. But yet prover's work in QAP based zkSNARKs is heavy, therefore, it may not be possible for a prover with limited processing resource to run... 

    Feature specific control flow checking in COTS-based embedded systems

    , Article Proceedings - 3rd International Conference on Dependability, DEPEND 2010, 18 July 2010 through 25 July 2010 ; July , 2010 , Pages 58-63 ; 9780769540900 (ISBN) Rajabzadeh, A ; Miremadi, S.G ; IARIA ; Sharif University of Technology
    2010
    Abstract
    While the Control Flow Checking (CFC) methods are using the ordinary instruction set and general Arithmetic and Logic Unit (ALU) features to protect the programs against the transient faults, this paper presents a new kind of CFC method, called feature specific CFC. The idea behind this method is using a specific internal hardware in modern processors which provides the ability to monitor internal various parameters of the program. This method is a pure software method and the external hardware overhead is zero. Other overheads have been measured experimentally by executing the workloads on a Pentium system. The execution time overhead is between 42% and 67% and the program size overhead is... 

    Tolerance analysis of mechanical assemblies based on modal interval and small degrees of freedom (MI-SDOF) concepts

    , Article International Journal of Advanced Manufacturing Technology ; Volume 50, Issue 9-12 , 2010 , Pages 1041-1061 ; 02683768 (ISSN) Khodaygan, S ; Movahhedy, M. R ; Saadat Fomani, M ; Sharif University of Technology
    Abstract
    Tolerance analysis is a key analytical tool for estimation of accumulating effects of the individual part tolerances on the design specifications of a mechanical assembly. This paper presents a new feature-based approach to tolerance analysis for mechanical assemblies with geometrical and dimensional tolerances. In this approach, geometrical and dimensional tolerances are expressed by small degrees of freedom (SDOF) of geometric entities (faces, feature axes, edges, and features of size) that are described by tolerance zones. The uncertainty of dimensions and geometrical form of features due to tolerances is mathematically described using modal interval arithmetic. The two concepts of modal... 

    Hierarchical stochastic models for performance, availability, and power consumption analysis of iaaS clouds

    , Article IEEE Transactions on Cloud Computing ; 2017 ; 21687161 (ISSN) Ataie, E ; Entezari Maleki, R ; Rashidi, L ; Trivedi, K. S ; Ardagna, D ; Movaghar, A ; Sharif University of Technology
    Abstract
    Infrastructure as a Service (IaaS) is one of the most significant and fastest growing fields in cloud computing. To efficiently use the resources of an IaaS cloud, several important factors such as performance, availability, and power consumption need to be considered and evaluated carefully. Evaluation of these metrics is essential for cost-benefit prediction and quantification of different strategies which can be applied to cloud management. In this paper, analytical models based on Stochastic Reward Nets (SRNs) are proposed to model and evaluate an IaaS cloud system at different levels. To achieve this, an SRN is initially presented to model a group of physical machines which are... 

    Adaptive control of low-level radio frequency signals based on in-phase and quadrature components

    , Article IEEE Transactions on Nuclear Science ; Volume 64, Issue 4 , 2017 , Pages 1023-1028 ; 00189499 (ISSN) Rezaeizadeh, A ; Smith, R. S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    This research work presents a low-level radio frequency (RF) control method based on the in-phase, I , and quadrature, Q , components of the RF signal. The proposed method uses only the main four arithmetic operations, i.e., addition, subtraction, multiplication, and division, which makes this control method suitable for implementation on the field-programmable gate array. The control scheme is adaptive in the sense that it estimates the system response on-the-fly, and therefore, it is robust against changes in the loop phase and/or gain during the operation. © 2017 IEEE  

    A formal approach for debugging arithmetic circuits

    , Article IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ; Volume 28, Issue 5 , 2009 , Pages 742-754 ; 02780070 (ISSN) Sarbishei, O ; Tabandeh, M ; Alizadeh, B ; Fujita, M ; Sharif University of Technology
    2009
    Abstract
    This paper presents a novel automatic debugging algorithm for a postsynthesis combinational arithmetic circuit. The approach is robust under wide varieties of arithmetic circuit architectures and design optimizations. The debugging algorithm in this paper consists of three phases of partial product initialization, xor extraction, and carry-signal mapping. The run-time complexity of conventional carry-signal-mapping algorithms, such as the approach described by Stoffel and Kunz, is exponential. However, in the proposed algorithm, by making use of some important design issues, we categorize the extracted xors into half/full-adders to make a very fast debugging algorithm. This approach is... 

    Hierarchical stochastic models for performance, availability, and power consumption analysis of iaas clouds

    , Article IEEE Transactions on Cloud Computing ; Volume 7, Issue 4 , 2019 , Pages 1039-1056 ; 21687161 (ISSN) Ataie, E ; Entezari Maleki, R ; Rashidi, L ; Trivedi, K. S ; Ardagna, D ; Movaghar, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    Infrastructure as a Service (IaaS) is one of the most significant and fastest growing fields in cloud computing. To efficiently use the resources of an IaaS cloud, several important factors such as performance, availability, and power consumption need to be considered and evaluated carefully. Evaluation of these metrics is essential for cost-benefit prediction and quantification of different strategies which can be applied to cloud management. In this paper, analytical models based on Stochastic Reward Nets (SRNs) are proposed to model and evaluate an IaaS cloud system at different levels. To achieve this, an SRN is initially presented to model a group of physical machines which are... 

    Implementation of supersingular isogeny-based diffie-hellman and key encapsulation using an efficient scheduling

    , Article IEEE Transactions on Circuits and Systems I: Regular Papers ; Volume 67, Issue 12 , 2020 , Pages 4895-4903 Farzam, M. H ; Bayat Sarmadi, S ; Mosanaei Boorani, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Isogeny-based cryptography is one of the promising post-quantum candidates mainly because of its smaller public key length. Due to its high computational cost, efficient implementations are significantly important. In this paper, we have proposed a high-speed FPGA implementation of the supersingular isogeny Diffie-Hellman (SIDH) and key encapsulation (SIKE). To this end, we have adapted the algorithm of finding optimal large-degree isogeny computation strategy for hardware implementations. Using this algorithm, hardware-suited strategies (HSSs) can be devised. We have also developed a tool to schedule field arithmetic operations efficiently using constraint programming. This tool enables... 

    Reliable and energy efficient MLC STT-RAM buffer for CNN accelerators

    , Article Computers and Electrical Engineering ; Volume 86 , 2020 Jasemi, M ; Hessabi, S ; Bagherzadeh, N ; Sharif University of Technology
    Elsevier Ltd  2020
    Abstract
    We propose a lightweight scheme where the formation of a data block is changed in such a way that it can tolerate soft errors significantly better than the baseline. The key insight behind our work is that CNN weights are normalized between -1 and 1 after each convolutional layer, and this leaves one bit unused in half-precision floating-point representation. By taking advantage of the unused bit, we create a backup for the most significant bit to protect it against the soft errors. Also, considering the fact that in MLC STT-RAMs the cost of memory operations (read and write), and reliability of a cell are content-dependent (some patterns take larger current and longer time, while they are...