Loading...
Search for: complex-network
0.007 seconds
Total 184 records

    A comparative study of different approaches for finding the upper boundary points in stochastic-flow networks

    , Article International Journal of Enterprise Information Systems ; Volume 10, Issue 3 , 1 July , 2014 , Pages 13-20 ; ISSN: 15481115 Mansourzadeh, S. M ; Nasseri, S. H ; Forghani Elahabad, M ; Ebrahimnejad, A ; Sharif University of Technology
    Abstract
    An information system network (ISN) can be modeled as a stochastic-flow network (SFN). There are several algorithms to evaluate reliability of an SFN in terms of Minimal Cuts (MCs). The existing algorithms commonly first find all the upper boundary points (called d-MCs) in an SFN, and then determine the reliability of the network using some approaches such as inclusion-exclusion method, sum of disjoint products, etc. However, most of the algorithms have been compared via complexity results or through one or two benchmark networks. Thus, comparing those algorithms through random test problems can be desired. Here, the authors first state a simple improved algorithm. Then, by generating a... 

    Distributed user association and femtocell allocation in heterogeneous wireless networks

    , Article IEEE Transactions on Communications ; Vol. 62, issue. 8 , 2014 , p. 3027-3043 Bayat, S ; Louie, R. H. Y ; Han, Z ; Vucetic, B ; Li, Y ; Sharif University of Technology
    Abstract
    Deployment of low-power low-cost small access points such as femtocell access points (FAPs) constitute an attractive solution for improving the existing macrocell access points' (MAPs) capacity, reliability, and coverage. However, FAP deployment faces challenging problems such as interference management and the lack of flexible frameworks for deploying the FAPs by the service providers (SPs). In this paper, we propose a novel solution that jointly associates the user equipment (UE) to the APs, and allocates the FAPs to the SPs such that the the total satisfaction of the UEs in an uplink OFDMA network is maximized. We model the competitive behaviors among the UEs, FAPs, and SPs as a dynamic... 

    Comparison between different multi-objective approaches to distribution network planning

    , Article IET Conference Publications ; Volume 2013, Issue 615 CP , 2013 ; 9781849197328 (ISBN) Haji, A ; Eini, B. J ; Mirvazand, M ; Safari, M ; Sharif University of Technology
    2013
    Abstract
    Distribution companies try to meet different goals such as increasing profitability, reducing investment and improving reliability indices. Therefore, distribution network planning has converted into complex multi-objective optimization problems. Mathematicians and operation research experts have developed many methods which can be used for solving these problems. Despite all efforts to develop applicable approaches for these problems, there is still no general consensus on project selection policy. Evaluating the strengths and weaknesses of each network optimization strategy selection in pragmatic manner is the objective of current research. In this paper, many methods used in network... 

    An efficient VLSI architecture of QPP interleaver/deinterleaver for LTE turbo coding

    , Article Proceedings - IEEE International Symposium on Circuits and Systems ; 2013 , Pages 797-800 ; 02714310 (ISSN) ; 9781467357609 (ISBN) Ardakani, A ; Mahdavi, M ; Shabany, M ; Sharif University of Technology
    2013
    Abstract
    Long Term Evolution (LTE) supports peak data rates in excess of 300 Mb/s. A good approach to achieve such rates is by parallelizing the required processing in turbo decoders. An interleaver is an important part of a turbo decoder. LTE uses the Quadratic Permutation Polynomial (QPP) interleaver, which makes it suitable for parallel decoding. In this paper, we propose an efficient architecture for the QPP interleaver, called the Add-Compare-Select (ACS) permuting network. A unique feature of the proposed architecture is that it can be used both as the interleaver and deinterleaver leading to a high-speed low-complexity hardware interleaver/deinterleaver for turbo decoding. The proposed design... 

    Broadband miniaturized efficient array antennas

    , Article Applied Computational Electromagnetics Society Journal ; Volume 28, Issue 3 , 2013 , Pages 188-194 ; 10544887 (ISSN) Jafargholi, A ; Jafargholi, A ; Sharif University of Technology
    2013
    Abstract
    This paper introduces a new array architecture, in which antenna elements are arranged in a spiral curve. The spiral array enhances ultra-wideband (UWB) pattern characteristics compared to alternative array geometries of similar elements, without requiring a complex feed network for frequency change compensation. A number of examples are illustrated to demonstrate the array capability in broadband array designs. It is revealed that for the same number of elements and curvature lengths, a spiral array has a wider radiation bandwidth than the corresponding circular and linear array antennas. In addition, it is also demonstrated that the spiral architecture discussed here can be best suited for... 

    Multi-layer hybrid wired-cum-wireless sensor network design

    , Article International Journal of Communication Networks and Distributed Systems ; Volume 9, Issue 3-4 , 2012 , Pages 286-310 ; 17543916 (ISSN) Maleki, S ; Sepehri, M. M ; Farvaresh, H ; Nayebi, A ; Sawhney, R ; Sharif University of Technology
    2012
    Abstract
    Sensor networks with sensing, data processing and communicating capabilities have a broad spectrum of applications. Based on application requirements, various network configurations can be designed. One such robust configuration is a hybrid wired-cum-wireless sensor network that is composed of a wireless sensor network and a wired backbone which are inter-connected via access points. In this paper, the joint problem of configuring a hybrid wired-cum-wireless sensor network, position-constrained cluster head and access point placement is proposed. The design considers real wireless communication limitations, optimum locations of access points and cluster heads, and hybrid transmission... 

    Flow and heat transfer analysis of turbine blade cooling passages using network method

    , Article ASME 2012 Gas Turbine India Conference, GTINDIA 2012 ; 2012 , Pages 523-531 ; 9780791845165 (ISBN) Alizadeh, M ; Izadi, A ; Fathi, A ; Khaledi, H ; Sharif University of Technology
    2012
    Abstract
    Modern turbine blades are cooled by air flowing through internal cooling passages. Three-Dimensional numerical simulation of these blade cooling passages is too time-consuming because of their complex geometries. These geometrical complexities exist as a result of using various kinds of cooling technologies such as rib turbulators (inline, staggered, or inclined ribs), pin fin, 90 and 180 degree turns (both sharp and gradual turns, with and without turbulators), finned passage, by-pass flow and tip cap impingement. One possible solution to simulate such sophisticated passages is to use the one-dimensional network method, which is presented in the current work. Turbine blade cooling channels... 

    CDSEG: Community detection for extracting dominant segments in color images

    , Article ISPA 2011 - 7th International Symposium on Image and Signal Processing and Analysis ; 2011 , Pages 177-182 ; 9789531841597 (ISBN) Amiri, S. H ; Abin, A.A ; Jamzad, M ; Sharif University of Technology
    Abstract
    Segmentation plays an important role in the machine vision field. Extraction of dominant segments with large number of pixels is essential for some applications such as object detection. In this paper, a new approach is proposed for color image segmentation which uses ideas behind the social science and complex networks to find dominant segments. At first, we extract the color and texture information for each pixel of input image. A network that consists of some nodes and edges is constructed based on the extracted information. The idea of community detection in social networks is used to partition a color image into disjoint segments. Community detection means partitioning vertices of a... 

    Maximum clique-based resource allocation in device-to-device communications

    , Article IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 30 August 2015 through 2 September 2015 ; Volume 2015-December , Sept , 2015 , Pages 1195-1200 ; 9781467367820 (ISBN) Elhami, G ; Zehni, M ; Pakravan, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Device-to-Device communication (D2D) integrated in cellular networks emerges as a new trend in response to notable rise in traffic demand. Resource allocation is one of the important challenges in deployment of D2D networks. In this paper, we formulate an optimization problem for optimal resource allocation and then propose a novel algorithm namely maximum clique based resource allocation (MCRA) for improving the spectral reuse based on graph theoretic concept of maximum clique. Practical application of D2D communications requires each node to receive and transmit signals during the communication process. We have considered this issue in constructing the interference graph and mathematical... 

    Graph-based altruistic games for interference mitigation in femtocell networks

    , Article 26th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2015, 30 August 2015 through 2 September 2015 ; Volume 2015-December , 2015 , Pages 1883-1888 ; 9781467367820 (ISBN) Vahabpour, A ; Khalaj, B. H ; Sharif University of Technology
    Abstract
    Femtocell networks are a common means of offloading in current mobile networks. Game theoretic and learning-based self-organization schemes are known as two viable approaches for interference control in co-existing macro/femtocell networks. Nevertheless, extensions of these schemes to concurrent multi-agent scenarios often face several challenges including high computational complexity, cyclic behaviors, and lack of convergence. This paper addresses such challenges by introducing local games based on a graph representation of the network. The goal of the games is to optimize the aggregate network capacity through power control. Fairness among femtocells and quality of service (QoS) for... 

    Forming external behaviors by leveraging internal opinions

    , Article Proceedings - IEEE INFOCOM, 26 April 2015 through 1 May 2015 ; Volume 26 , 2015 , Pages 1849-1857 ; 0743166X (ISSN) ; 9781479983810 (ISBN) Ahmadinejad, A ; Dehghani, S ; Hajiaghayi, M ; Mahini, H ; Seddighin, S ; Yazdanbod, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    People make decisions and express their opinions according to their communities. A natural idea for controlling the diffusion of a behavior is to find influential people, and employ them to spread a desired behavior. We investigate an influencing problem when individuals' behaviors are affected by their friends in an opinion formation process. Our goal is to design efficient algorithms for finding opinion leaders such that changing their opinions has a great impact on the overall external behaviors in the society. We study directed social networks and define a set of problems like maximizing the sum of individuals' behaviors or maximizing the number of individuals whose external behaviors... 

    Influence maximization of informed agents in social networks

    , Article Applied Mathematics and Computation ; Volume 254 , 2015 , Pages 229-239 ; 00963003 (ISSN) AskariSichani, O ; Jalili, M ; Sharif University of Technology
    Abstract
    Control of collective behavior is one of the most desirable goals in many applications related to social networks analysis and mining. In this work we propose a simple yet effective algorithm to control opinion formation in complex networks. We aim at finding the best spreaders whose connection to a reasonable number of informed agents results in the best performance. We consider an extended version of the bounded confidence model in which the uncertainty of each agent is adaptively controlled by the network. A number of informed agents with the desired opinion value is added to the network and create links with other agents such that large portion of the network follows their opinions. We... 

    Optimal pinning controllability of complex networks: Dependence on network structure

    , Article Physical Review E - Statistical, Nonlinear, and Soft Matter Physics ; Volume 91, Issue 1 , January , 2015 ; 15393755 (ISSN) Jalili, M ; Askari Sichani, O ; Yu, X ; Sharif University of Technology
    American Physical Society  2015
    Abstract
    Controlling networked structures has many applications in science and engineering. In this paper, we consider the problem of pinning control (pinning the dynamics into the reference state), and optimally placing the driver nodes, i.e., the nodes to which the control signal is fed. Considering the local controllability concept, a metric based on the eigenvalues of the Laplacian matrix is taken into account as a measure of controllability. We show that the proposed optimal placement strategy considerably outperforms heuristic methods including choosing hub nodes with high degree or betweenness centrality as drivers. We also study properties of optimal drivers in terms of various centrality... 

    Provable partial key escrow

    , Article International Journal of Network Security ; Volume 10, Issue 2 , 2010 , Pages 153-156 ; 1816353X (ISSN) Azimian, K ; Mohajeri, J ; Salmasizadeh, M ; Wagstaff Jr., S. S ; Sharif University of Technology
    2010
    Abstract
    In this paper wefirst propose two new concepts concerning the notion of key escrow schemes: provable partiality and independence. Roughly speaking, a scheme has provable partiality if the existence of a polynomial time for recovering the secret from escrowed information implies there is a polynomial time algorithm for solving a well known intractable problem. A scheme is independent if the secret key and the escrowed information are independent. Finally, we propose a new verifiable partial key escrow scheme, based on McCurley's encryption scheme, satisfying both of the above criteria  

    Efficient codebook design for digital communication through compressed voice channels

    , Article IET Communications ; Volume 10, Issue 18 , 2016 , Pages 2613-2620 ; 17518628 (ISSN) Boloursaz Mashhadi, M ; Behnia, F ; Sharif University of Technology
    Institution of Engineering and Technology  2016
    Abstract
    The common voice channels existing in cellular communication networks provide reliable, ubiquitously available and top priority communication mediums. These properties make voice dedicated channels an ideal choice for high priority, real time communication. However, such channels include voice codecs that hamper the data flow by compressing the waveforms prior to transmission. This study designs codebooks of speech-like symbols for reliable data transfer through the voice channel of cellular networks. An efficient algorithm is proposed to select proper codebook symbols from a database of natural speech to optimise a desired objective. Two variants of this codebook optimisation algorithm are... 

    Simulation and optimization of a pulsating heat pipe using artificial neural network and genetic algorithm

    , Article Heat and Mass Transfer/Waerme- und Stoffuebertragung ; Volume 52, Issue 11 , 2016 , Pages 2437-2445 ; 09477411 (ISSN) Jokar, A ; Abbasi Godarzi, A ; Saber, M ; Shafii, M. B ; Sharif University of Technology
    Springer Verlag 
    Abstract
    In this paper, a novel approach has been presented to simulate and optimize the pulsating heat pipes (PHPs). The used pulsating heat pipe setup was designed and constructed for this study. Due to the lack of a general mathematical model for exact analysis of the PHPs, a method has been applied for simulation and optimization using the natural algorithms. In this way, the simulator consists of a kind of multilayer perceptron neural network, which is trained by experimental results obtained from our PHP setup. The results show that the complex behavior of PHPs can be successfully described by the non-linear structure of this simulator. The input variables of the neural network are input heat... 

    An improved algorithm for finding all upper boundary points in a stochastic-flow network

    , Article Applied Mathematical Modelling ; Volume 40, Issue 4 , 2016 , Pages 3221-3229 ; 0307904X (ISSN) Forghani elahabad, M ; Mahdavi Amiri, N ; Sharif University of Technology
    Elsevier Inc  2016
    Abstract
    The d-MinCut (d-MC) problem has been extensively studied in the past decades and various algorithms have been proposed. The existing algorithms often consist of two general stages, finding all the d-MC candidates and testing each candidate for being a d-MC. To find all the d-MC candidates, a system of equations and inequalities should be solved. Here, we propose a novel efficient algorithm to solve the system. Then, using our new results, an improved algorithm is proposed for the d-MC problem. Computing its complexity, we show the proposed algorithm to be more efficient than the other existing algorithms with respect to the number of minimal cuts. A medium-size network example is worked... 

    Performance analysis of carrier-less modulation schemes for wireless nanosensor networks

    , Article 15th IEEE International Conference on Nanotechnology, 27 July 2015 through 30 July 2015 ; 2015 , Pages 45-50 ; 9781467381550 (ISBN) Zarepour, E ; Hassan, M ; Chou, C. T ; Bayat, S ; Nanotechnology Council ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    Wireless Nano-scale Sensor Networks (WNSNs) are very simple and energy restricted networks that operate over terahertz band ranging from 0.1-10 THz, which faces significant molecular absorption noise and attenuation. Given these challenges, reliability, energy efficiency, and simplicity constitute the main criteria in designing communication protocols for WNSNs. Due to its simplicity and energy efficiency, carrier-less pulse based modulation is considered the best candidate for WNSNs. In this paper, we compare the performance of four different carrier-less modulations, PAM, OOK, PPM, and BPSK, in the context of WNSNs operating within the terahertz band. Our study shows that although BPSK is... 

    A fuzzy fully distributed trust management system in wireless sensor networks

    , Article AEU - International Journal of Electronics and Communications ; Volume 70, Issue 1 , 2016 , Pages 40-49 ; 14348411 (ISSN) Jadidoleslamy, H ; Aref, M.R ; Bahramgiri, H ; Sharif University of Technology
    Elsevier GmbH  2016
    Abstract
    Wireless sensor networks (WSNs) usually consist of many tiny sensor nodes and a Sink. Problems like nodes' misbehavior due to malicious, compromised or selfishness intentions, and WSNs' security vulnerabilities against different attacks due to free and unprotected communications, untrusted and broadcasted transmissions, hostile environments and limited resources, degrade the security and overall performance of WSNs. In another direction, most of the traditional security mechanisms are unsuitable for WSNs. One significant security solution against these problems is Trust Management System (TMS); TMS enhances the security by detecting the nodes' abnormal behaviors; it improves the cooperation... 

    A survey of key pre-distribution and overlay routing in unstructured wireless networks

    , Article Scientia Iranica ; Volume 23, Issue 6 , 2016 , Pages 2831-2844 ; 10263098 (ISSN) Gharib, M ; Yousefi'zadeh, H ; Movaghar, A ; Sharif University of Technology
    Sharif University of Technology  2016
    Abstract
    Unstructured wireless networks such as mobile ad hoc networks and wireless sensor networks have been rapidly growing in the past decade. Security is known as a challenging issue in such networks, in which there is no fixed infrastructure or central trusted authority. Further, node limitations in processing power, storage, and energy consumption add further complexity to addressing security in such networks. While cryptography has proven to be an effective solution capable of satisfying most network security requirements, it requires the use of efficient key pre-distribution algorithms compatible with the limitation of unstructured wireless networks. Typically, a key pre-distribution...