Loading...
Search for: distributed-computer-systems
0.015 seconds
Total 133 records

    Flopcoin: a cryptocurrency for computation offloading

    , Article IEEE Transactions on Mobile Computing ; Volume 17, Issue 5 , 2018 , Pages 1062-1075 ; 15361233 (ISSN) Chatzopoulos, D ; Ahmadi, M ; Kosta, S ; Hui, P ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    During the last years, researche'rs have proposed solutions to help smartphones improve execution time and reduce energy consumption by offloading heavy tasks to remote entities. Lately, inspired by the promising results of message forwarding in opportunistic networks, many researchers have proposed strategies for task offloading towards nearby mobile devices, giving birth to the Device-to-Device offloading paradigm. None of these strategies, though, offers any mechanism that considers selfish users and, most importantly, that motivates and defrays the participating devices who spend their resources. In this paper, we address these problems and propose the design of a framework that... 

    Optimal DG placement and sizing based on MICP in radial distribution networks

    , Article IEEE Proceedings 2017 Smart Grid Conference, SGC 2017 ; Volume 2018-January , 2018 , Pages 1-6 ; 9781538642795 (ISBN) Mousavi, M ; Ranjbar, A. M ; Safdarian, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Electric distribution system is one of the most important parts of power systems owing to delivering electricity to consumers. The major amount of losses in a power system is in distribution level. Optimal distributed generation (DG) placement and sizing have a significant effect on power loss reduction in distribution systems. In this paper, a mixed integer conic programming (MICP) approach is presented to solve the problem of DG placement, sizing, and hourly generation with the aim of reducing power loss and costs in radial distribution systems. The costs include both investment and operational costs of DGs. Hourly load variations are considered in the model. To verify the effectiveness of... 

    Resilient transactive control for systems with high wind penetration based on cloud computing

    , Article IEEE Transactions on Industrial Informatics ; Volume 14, Issue 3 , 2018 , Pages 1286-1296 ; 15513203 (ISSN) Rayati, M ; Ranjbar, A. M ; Sharif University of Technology
    IEEE Computer Society  2018
    Abstract
    One of the main shortcomings, caused by high penetration of wind power, is intermittency of generation. For integrating high penetration of wind power, the frequency regulation and the transactive control systems are modified to be sufficiently resilient against fluctuations of wind power and malicious cyber threats. Here, a hierarchical state-space model is presented for the frequency regulation and the transactive control systems in a smart grid environment. To achieve a resilient control, a framework based on cloud computing is proposed for the communication network. Benefits and challenges of the cloud-based framework are also described in this paper. To optimize the operation of the... 

    Cloud manufacturing service selection optimization and scheduling with transportation considerations: mixed-integer programming models

    , Article International Journal of Advanced Manufacturing Technology ; Volume 95, Issue 1-4 , 2018 , Pages 43-70 ; 02683768 (ISSN) Akbaripour, H ; Houshmand, M ; van Woensel, T ; Mutlu, N ; Sharif University of Technology
    Springer London  2018
    Abstract
    Cloud manufacturing is an emerging service-oriented manufacturing paradigm that integrates and manages distributed manufacturing resources through which complex manufacturing demands with a high degree of customization can be fulfilled. The process of service selection optimization and scheduling (SSOS) is an important issue for practical implementation of cloud manufacturing. In this paper, we propose new mixed-integer programming (MIP) models for solving the SSOS problem with basic composition structures (i.e., sequential, parallel, loop, and selective). Through incorporation of the proposed MIP models, the SSOS with a mixed composition structure can be tackled. As transportation is... 

    A push-pull network coding protocol for live peer-to-peer streaming

    , Article Computer Networks ; Volume 130 , 2018 , Pages 145-155 ; 13891286 (ISSN) Ayatollahi, H ; Khansari, M ; Rabiee, H. R ; Sharif University of Technology
    Elsevier B.V  2018
    Abstract
    In this paper, we propose a new peer-to-peer (P2P) video streaming protocol which presents an implementation of network coding with a new caching mechanism. It employs a push-pull mechanism for sending the video chunks between peers. More specifically, this push-pull mechanism gives priority to the video chunks according to their video layers. The video base layer is transmitted through a pushing mechanism while the enhancement layers employ a pulling mechanism. Moreover, in the network coding algorithm of this protocol, we introduce a caching mechanism to improve the network's performance as well as the video streaming quality. The comprehensive simulations show that the proposed protocol... 

    Exact solution for elliptic localization in distributed MIMO radar systems

    , Article IEEE Transactions on Vehicular Technology ; Volume 67, Issue 2 , February , 2018 , Pages 1075-1086 ; 00189545 (ISSN) Amiri, R ; Behnia, F ; Maleki Sadr, M. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Elliptic localization is a range-based positioning technique exploiting multiple transmitter-receiver pairs, each of which provides separate bistatic range (BR) measurements. In this paper, a novel computationally efficient solution for locating a single target from BR measurements in distributed MIMO radar systems is proposed. Due to nonconvex nature of the associated maximum likelihood (ML) estimation problem, its globally optimal solution is difficult to obtain. We first reformulate the ML estimation as a nonconvex constrained weighted least squares problem. Owing to special structure of the resulting problem, it is recast as a convex problem, whose exact solution can be obtained in... 

    DuCNoC: a high-throughput FPGA-based NoC simulator using dual-clock lightweight router micro-architecture

    , Article IEEE Transactions on Computers ; Volume 67, Issue 2 , February , 2018 , Pages 208-221 ; 00189340 (ISSN) Mardani Kamali, H ; Zamiri Azar, K ; Hessabi, S ; Sharif University of Technology
    IEEE Computer Society  2018
    Abstract
    On-chip interconnections play an important role in multi/many-processor systems-on-chip (MPSoCs). In order to achieve efficient optimization, each specific application must utilize a specific architecture, and consequently a specific interconnection network. For design space exploration and finding the best NoC solution for each specific application, a fast and flexible NoC simulator is necessary, especially for large design spaces. In this paper, we present an FPGA-based NoC co-simulator, which is able to be configured via software. In our proposed NoC simulator, entitled DuCNoC, we implement a Dual-Clock router micro-architecture, which demonstrates 75x-350x speed-up against BOOKSIM.... 

    Comparison of nonlinear filtering techniques for inertial sensors error identification in INS/GPS integration

    , Article Scientia Iranica ; Volume 25, Issue 3B , 2018 , Pages 1281-1295 ; 10263098 (ISSN) Kaviani, S ; Salarieh, H ; Alasty, A ; Abediny, M ; Sharif University of Technology
    Sharif University of Technology  2018
    Abstract
    Nonlinear filtering techniques are used to fuse the Global Positioning System (GPS) with Inertial Navigation System (INS) to provide a robust and reliable navigation system with a performance superior to that of either INS or GPS alone. Prominent nonlinear estimators in this field are Kalman Filters (KF) and Particle Filters (PF). The main objective of this research is the comparative study of the well-established filtering methods of EKF, UKF, and PF based on EKF and UKF in an INS-GPS integrated navigation system. Different features of INS-GPS integrated navigation methods in the state estimation, bias estimation, and bias/scale factor estimation are investigated using these four filtering... 

    Performance and power modeling and evaluation of virtualized servers in IaaS clouds

    , Article Information Sciences ; Volume 394-395 , 2017 , Pages 106-122 ; 00200255 (ISSN) Entezari Maleki, R ; Sousa, L ; Movaghar, A ; Sharif University of Technology
    Elsevier Inc  2017
    Abstract
    In this paper, Stochastic Activity Networks (SANs) are exploited to model and evaluate the power consumption and performance of virtualized servers in cloud computing. The proposed SAN models the physical servers in three different power consumption and provisioning delay modes, switching the status of the servers according to the workload of the corresponding cluster if required. The Dynamic Voltage and Frequency Scaling (DVFS) technique is considered in the proposed model for dynamically controlling the supply voltage and clock frequency of CPUs. Thus, Virtual Machines (VMs) on top a physical server can be divided into several power consumption and processing speed groups. According to the... 

    Proximity-Aware balanced allocations in cache networks

    , Article 31st IEEE International Parallel and Distributed Processing Symposium, IPDPS 2017, 29 May 2017 through 2 June 2017 ; 2017 , Pages 1068-1077 ; 9781538639146 (ISBN) Pourmiri, A ; Jafari Siavoshan, M ; Shariatpanahi, S. P ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    We consider load balancing in a network of caching servers delivering contents to end users. Randomized load balancing via the so-called power of two choices is a well-known approach in parallel and distributed systems that reduces network imbalance. In this paper, we propose a randomized load balancing scheme which simultaneously considers cache size limitation and proximity in the server redirection process. Since the memory limitation and the proximity constraint cause correlation in the server selection process, we may not benefit from the power of two choices in general. However, we prove that in certain regimes, in terms of memory limitation and proximity constraint, our scheme results... 

    A secure attribute based keyword search scheme against keyword guessing attack

    , Article 2016 8th International Symposium on Telecommunications, IST 2016,17 March 2017 ; 2017 , Pages 124-128 ; 9781509034345 (ISBN) Yousefipoor, V ; Ameri, M. H ; Mohajeri, J ; Eghlidos, T ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    To provide the privacy of the users who receive some computing services from the cloud, the users must encrypt their documents before outsourcing them to the cloud. Computation on outsourced encrypted data in the cloud rises some complexity to the system specially in the case when an entity would like to find some documents related to a special keyword. Searchable encryption is a tool for data owners to encrypt their data in a searchable manner. Generally, there exist two kinds of searchable encryption, namely symmetric (secret key) and asymmetric (public key) ones. Most of the public key searchable encryption schemes are vulnerable to the keyword guessing attack (KGA). In this paper we... 

    Optimal sizing of distributed energy storage in distribution systems

    , Article 2015 Smart Grid Conference, SGC 2015, 23 December 2015 through 24 December 2015 ; 2017 , Pages 60-65 ; 9781509003693 (ISBN) Karimi Gharigh, M. R ; Seydali Seyf Abad, M ; Nokhbehzaeem, J ; Safdarian, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    In future smart grids, energy storage systems (EESs) are expected to play an indispensable role in balancing continuous load changes arising from customers' life-style as well as varying output of intermittent energy resources. This, however, needs significant investment that should be justified prior to their implementation. This paper presents a model to find the optimal capacity for ESSs in distribution systems. The model aims at maximizing system owner profit by reducing total electricity procurement costs. The model is formulated as a mixed integer non-linear programming problem. Due to the complexity and large size of the problem, a decouplebased method is proposed wherein optimal... 

    An intelligent cloud-based data processing broker for mobile e-health multimedia applications

    , Article Future Generation Computer Systems ; Volume 66 , 2017 , Pages 71-86 ; 0167739X (ISSN) Peddi, S. V. B ; Kuhad, P ; Yassine, A ; Pouladzadeh, P ; Shirmohammadi, S ; Nazari Shirehjini, A. A ; Sharif University of Technology
    Elsevier B.V  2017
    Abstract
    Mobile e-health applications provide users and healthcare practitioners with an insightful way to check users/patients’ status and monitor their daily calorie intake. Mobile e-health applications provide users and healthcare practitioners with an insightful way to check users/patients’ status and monitor their daily activities. This paper proposes a cloud-based mobile e-health calorie system that can classify food objects in the plate and further compute the overall calorie of each food object with high accuracy. The novelty in our system is that we are not only offloading heavy computational functions of the system to the cloud, but also employing an intelligent cloud-broker mechanism to... 

    Power- and performance-efficient cluster-based network-on-chip with reconfigurable topology

    , Article Microprocessors and Microsystems ; April , 2016 ; 01419331 (ISSN) Mehrvarzy, P ; Modarressi, M ; Sarbazi Azad, H ; Sharif University of Technology
    Elsevier  2016
    Abstract
    Topology is widely known as the most important characteristic of networks-on-chip (NoC), since it highly affects overall network performance, cost, and power consumption. In this paper, we propose a reconfigurable architecture and design flow for NoCs on which a customized topology for any target application can be implemented. In this structure, the nodes are grouped into some clusters interconnected by a reconfigurable communication infrastructure. The nodes inside a cluster are connected by a mesh to benefit from the interesting characteristics of the mesh topology, i.e. regular structure and efficient handling of local traffic. A reconfigurable inter-cluster topology then eliminates the... 

    ACM: Accurate crosstalk modeling to predict channel delay in Network-on-Chips

    , Article 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design, IOLTS 2016, 4 July 2016 through 6 July 2016 ; 2016 , Pages 7-8 ; 9781509015061 (ISBN) Mahdavi, Z ; Shirmohammadi, Z ; Miremadi, S. G ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    The severity of timing delay in the communication channels of Network on Chip (NoC) depends on the transition patterns appearing on the wires. An analytical model can estimate the timing delay in NoC channels in the presence of crosstalk faults. However, recently proposed analytical model does not have enough accuracy and is based on 3-wire delay model. In this paper, an Accurate Crosstalk Model (ACM) based on 5-wire delay model is proposed to estimate the delay of communication channels in the presence of crosstalk faults. ACM is more accurate due to considering more wires in the delay model and also considering the overlaps between locations of transition patterns  

    A fuzzy fully distributed trust management system in wireless sensor networks

    , Article AEU - International Journal of Electronics and Communications ; Volume 70, Issue 1 , 2016 , Pages 40-49 ; 14348411 (ISSN) Jadidoleslamy, H ; Aref, M.R ; Bahramgiri, H ; Sharif University of Technology
    Elsevier GmbH  2016
    Abstract
    Wireless sensor networks (WSNs) usually consist of many tiny sensor nodes and a Sink. Problems like nodes' misbehavior due to malicious, compromised or selfishness intentions, and WSNs' security vulnerabilities against different attacks due to free and unprotected communications, untrusted and broadcasted transmissions, hostile environments and limited resources, degrade the security and overall performance of WSNs. In another direction, most of the traditional security mechanisms are unsuitable for WSNs. One significant security solution against these problems is Trust Management System (TMS); TMS enhances the security by detecting the nodes' abnormal behaviors; it improves the cooperation... 

    Power- and performance-efficient cluster-based network-on-chip with reconfigurable topology

    , Article Microprocessors and Microsystems ; Volume 46 , 2016 , Pages 122-135 ; 01419331 (ISSN) Mehrvarzy, P ; Modarressi, M ; Sarbazi Azad, H ; Sharif University of Technology
    Elsevier B.V  2016
    Abstract
    Topology is widely known as the most important characteristic of networks-on-chip (NoC), since it highly affects overall network performance, cost, and power consumption. In this paper, we propose a reconfigurable architecture and design flow for NoCs on which a customized topology for any target application can be implemented. In this structure, the nodes are grouped into some clusters interconnected by a reconfigurable communication infrastructure. The nodes inside a cluster are connected by a mesh to benefit from the interesting characteristics of the mesh topology, i.e. regular structure and efficient handling of local traffic. A reconfigurable inter-cluster topology then eliminates the... 

    Have you asked your neighbors? A Hidden Market approach for device-to-device offloading

    , Article 17th International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2016, 21 June 2016 through 24 June 2016 ; 2016 ; 9781509021857 (ISBN) Chatzopoulos, D ; Ahmadi, M ; Kosta, S ; Hui, P ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    During the last years, researchers have proposed solutions to help smartphones offload heavy tasks to remote entities in order to improve execution time and reduce energy consumption. Lately, inspired by the promising results of message forwarding in opportunistic networks, many researchers have proposed strategies for task offloading towards nearby mobile devices. None of these strategies, though, proposes any mechanism that considers selfish users and, most importantly, that motivates and defrays the participating devices who spend their resources. In this paper, we address these problems and propose the design of a framework that integrates an incentive scheme and a reputation mechanism.... 

    PAM: A packet manipulation mechanism for mitigating crosstalk faults in NoCs

    , Article Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015, 26 October 2015 through 28 October 2015 ; October , 2015 , Pages 1895-1902 ; 9781509001545 (ISBN) Shirmohammadi, Z ; Ansari, M ; Abharian, S. K ; Safari, S ; Miremadi, S. G ; Atzori L ; Jin X ; Jarvis S ; Liu L ; Calvo R. A ; Hu J ; Min G ; Georgalas N ; Wu Y ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    This paper proposes an efficient mechanism that mitigates crosstalk faults in Network-on-Chips (NoCs). This is done by using a Packet Manipulating mechanism called PAM for reliable data transfer of NoCs. PAM investigates the transitions of a packet to minimize the forbidden transition patterns appearing during the flit traversal in NoCs. To do this, the content of a packet is manipulated using three different manipulating mechanisms. In other words, PAM manipulates the content of packet in three manipulating modes including: vertical, horizontal and diagonal modes. Then, comparing the transitions of these manipulating mechanisms, a packet with minimum numbers of transitions is selected to be... 

    Modeling and optimization of a network of energy hubs to improve economic and emission considerations

    , Article Energy ; Volume 93 , December , 2015 , Pages 2546-2558 ; 03605442 (ISSN) Maroufmashat, A ; Elkamel, A ; Fowler, M ; Sattari, S ; Roshandel, R ; Hajimiragha, A ; Walker, S ; Entchev, E ; Sharif University of Technology
    Elsevier Ltd  2015
    Abstract
    Energy hubs that incorporate a variety of energy generation and energy transformation technologies can be used to provide the energy storage needed to enable the efficient operation of a ‘smart energy network’. When these hubs are combined as a network and allowed to exchange energy, they create efficiency advantages in both financial and environmental performance. Further, the interconnectedness of the energy network design provides an added layer of reliability. In this paper, a complex network of energy hubs is modeled and optimized under different scenarios to examine both the financial viability and potential reduction of greenhouse gas emissions. Two case studies consisting of two and...