Loading...
Search for: error-detection
0.006 seconds

    Hardware Trojan detection and localization based on local detectors

    , Article Turkish Journal of Electrical Engineering and Computer Sciences ; Volume 26, Issue 3 , 2018 , Pages 1403-1416 ; 13000632 (ISSN) Bazzazi, A ; Manzuri Shalmani, M. T ; Hemmatyar, A. M. A ; Sharif University of Technology
    Turkiye Klinikleri Journal of Medical Sciences  2018
    Abstract
    Hardware Trojans are one of the serious threats with detrimental, irreparable effects on the functionality, security, and performance of digital integrated circuits. It is difficult to detect Trojans because of their diversity in size and performance. While the majority of current methods focus on Trojan detection during chip testing, run-time techniques can be employed to gain unique advantages. This paper proposes a method based on the online scalable detection technique, which eliminates the need for a reference chip. Involving local detectors, this technique assesses the variations in the logical values of each node to find out whether there are Trojans. This method excludes time and... 

    Joint source-channel coding using finite state integer arithmetic codes

    , Article Proceedings of 2009 IEEE International Conference on Electro/Information Technology, EIT 2009, 7 June 2009 through 9 June 2009, Windsor, ON ; 2009 , Pages 19-22 ; 9781424433551 (ISBN) Moradmand, H ; Payandeh, A ; Aref, M. R ; Sharif University of Technology
    2009
    Abstract
    Inserting redundancy to arithmetic codes is a common strategy to add error detection capability to this well-known family of source codes. By using this strategy error correction is possible through some decoding algorithms such as Viterbi decoder. In this paper a system has proposed that uses finite state integer arithmetic codes (FSAC) as a joint source-channel code in combination with a cyclic redundancy check (CRC) and a List Viterbi decoder. The proposed scheme has shown better performance than previous ones. © 2009 IEEE  

    An efficient content-based video coding method for distance learning applications

    , Article Scientia Iranica ; Volume 16, Issue 2 D , 2009 , Pages 85-103 ; 10263098 (ISSN) Lotfi, T ; Bagheri, M ; Darabi, A. A ; Kasaei, S ; Sharif University of Technology
    2009
    Abstract
    This paper presents a novel method for cooperative educational dissemination systems. Taking into consideration the inherent characteristics of distance learning video streams (existence of a few slow moving objects in a classroom), we have proposed a novel content-based video coding method that is very efficient at low bitrate channels. On the encoding side, we have applied a background subtraction algorithm for motion segmentation using a novel statistical background modeling approach. At each frame, the moving objects are extrapolated with a rectangular model and tracked frame by frame (which forms the only data needed to be sent over the channel). On the decoding side, we have used a new... 

    Axial position detection for optical tweezers based on Moiré Deflectometry

    , Article Optics Communications ; Volume 446 , 2019 , Pages 33-38 ; 00304018 (ISSN) Khorshad, A. A ; S. Reihani, S. N ; Sharif University of Technology
    Elsevier B.V  2019
    Abstract
    Optical tweezers are indispensable instruments for applying and measuring Pico-Newton range forces. The magnitude of the exerted force is determined by measuring the displacement of the trapped bead from the center of the trap. Recently, we developed a new detection system for optical tweezers based on Moiré Deflectometry (MD). In this work, we show, both theoretically and experimentally, that the introduced method can be used for detection in the axial direction, as well, with a significantly larger sensitivity compared to the commonly used QPD method. As an example, for a 2.17μm polystyrene bead this method could provide a sensitivity 285% larger than that of the QPD method. © 2019... 

    A cost-effective error detection and roll-back recovery technique for embedded microprocessor control logic

    , Article 20th International Conference on Microelectronics, ICM'08, Sharjah, 14 December 2008 through 17 December 2008 ; January , 2008 , Pages 470-473 ; 9781424423705 (ISBN) Ghasemzadeh Mohammadi, H ; Tabkhi, H ; Miremadi, S. G ; Ejlali, A ; Sharif University of Technology
    2008
    Abstract
    The increasing rate of transient faults necessitates the use of on-chip fault-tolerant techniques in embedded microprocessors. Performance overhead is a challenging problem in on-chip fault-tolerant techniques used in the random logic of the embedded microprocessors. This paper presents a signature-based error detection and roll-back recovery technique for the control logic with much lower performance overhead as compared to many previous techniques. The low performance overhead is achieved by eliminating the fault masking overhead cycles in the previous techniques. The performance overhead is analytically studied, and the analytical results recommend at which fault rate the use of the... 

    Improving fault tolerance in ad-hoc networks by using residue number system

    , Article Journal of Applied Sciences ; Volume 8, Issue 18 , 2008 , Pages 3273-3278 ; 18125654 (ISSN) Barati, A ; Dehghan, M ; Movaghar, A ; Barati, H ; Sharif University of Technology
    2008
    Abstract
    In this study, we presented a method for distributing data storage by using residue number system for mobile systems and wireless networks based on peer to peer paradigm. Generally, redundant residue number system is capable in error detection and correction. In proposed method, we made a new system by mixing Redundant Residue Number System (RRNS), Multi Level Residue Number System (ML RNS) and Multiple Valued Logic (MVL RNS) which was perfect for parallel, carry free, high speed arithmetic and the system supports secure data communication. In addition it had ability of error detection and correction. In comparison to other number systems, it had many improvements in data security, error... 

    Reliable video transmission using codes close to the channel capacity

    , Article IEEE Transactions on Circuits and Systems for Video Technology ; Volume 16, Issue 12 , 2006 , Pages 1550-1556 ; 10518215 (ISSN) Dianat, R ; Marvasti, F ; Ghanbari, M ; Sharif University of Technology
    2006
    Abstract
    Long Reed-Solomon codes over the prime field GF(216 + 1) are proposed as a low overhead channel code for reliable transmission of video over noisy and lossy channels. The added redundancy is near optimal from the information theoretic point of view contrary to the conventionally used intra-coding and sync (marker) insertion in video transmission that are not justified theoretically. Compared to known source-channel coding methods, we have achieved the quality of the output of source coder by providing nearly error free transmission. (By nearly error free we mean an arbitrarily small error probability.) The price paid for such remarkable video quality improvement and relatively low complexity... 

    CFCET: A hardware-based control flow checking technique in COTS processors using execution tracing

    , Article Microelectronics Reliability ; Volume 46, Issue 5-6 , 2006 , Pages 959-972 ; 00262714 (ISSN) Rajabzadeh, A ; Miremadi, S. G ; Sharif University of Technology
    2006
    Abstract
    This paper presents a behavioral-based error detection technique called control flow checking by execution tracing (CFCET) to increase concurrent error detection capabilities of commercial off-the-shelf (COTS) processors. This technique traces the program jumps graph (PJG) at run-time and compares it with the reference jumps graph to detect possible violations caused by transient faults. The reference graph is driven by a preprocessor from the source program. The idea behind the CFCET is based on using an external watchdog processor (WDP) and also the internal execution tracing feature available in COTS processors to monitor the addresses of taken branches in a program, externally. This is... 

    Evaluating the Energy Consumption of Fault-Detection Mechanisms in Embedded Systems

    , M.Sc. Thesis Sharif University of Technology Fakhraei, Mohammad (Author) ; Ejlali, Alireza (Supervisor)
    Abstract
    Memories are one of the main component in the embedded systems, and owing to their vulnerability to error, this part of system must be fault tolerant. Single error correction (SEC) codes are one of the most commonly used methods against sot errors. However, on the other hands as the technology scales, multiple bit upsets (MBUs) are becoming more likely to occur in the memories and the SEC codes have lost their effectiveness in fault coverage. Therefore a greater attention is devoted to the codes with the higher fault coverage such as single error correction/double error detection (SEC/DED) codes. These codes increase the delay, area and power consumption overhead. These parameters are the... 

    Efficient and concurrent reliable realization of the secure cryptographic SHA-3 algorithm

    , Article IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ; Vol. 33, issue. 7 , July , 2014 , p. 1105-1109 ; 0278-0070 Bayat-Sarmadi, S ; Mozaffari-Kermani, M ; Reyhani-Masoleh, A ; Sharif University of Technology
    Abstract
    The secure hash algorithm (SHA)-3 has been selected in 2012 and will be used to provide security to any application which requires hashing, pseudo-random number generation, and integrity checking. This algorithm has been selected based on various benchmarks such as security, performance, and complexity. In this paper, in order to provide reliable architectures for this algorithm, an efficient concurrent error detection scheme for the selected SHA-3 algorithm, i.e., Keccak, is proposed. To the best of our knowledge, effective countermeasures for potential reliability issues in the hardware implementations of this algorithm have not been presented to date. In proposing the error detection... 

    Memory mapped SPM: Protecting instruction scratchpad memory in embedded systems against soft errors

    , Article Proceedings - 9th European Dependable Computing Conference, EDCC 2012 ; 2012 , Pages 218-226 ; 9780769546711 (ISBN) Farbeh, H ; Fazeli, M ; Khosravi, F ; Miremadi, S. G ; Sharif University of Technology
    IEEE  2012
    Abstract
    Predictability, energy consumption, area and reliability are the major concerns in embedded systems. Using scratchpad memories (SPMs) instead of cache memories play an increasing role to satisfy these concerns. Both cache and SPM as on-chip SRAM memories are highly vulnerable to soft errors and as they contain the most frequently used blocks of the program, their errors can easily propagate in system leading to erroneous results. Unlike the instruction cache, an error in the instruction SPM cannot be corrected using only parity bits by invalidating the erroneous line. This study suggests a low-cost mechanism to protect the instruction SPM against soft errors. The main idea underlying the... 

    New statistic to increase correctness in simulation factor screening using frequency domain method

    , Article Communications in Statistics - Theory and Methods ; Volume 41, Issue 12 , 2012 , Pages 2242-2255 ; 03610926 (ISSN) Sohi, Z. A ; Noorossana, R ; Akhavan Niaki, S. T ; Sharif University of Technology
    2012
    Abstract
    Simulation models often include a large number of input factors, many of them may be unimportant to the output; justifying the use of factor screening experiments to eliminate unimportant input factors from consideration in later stages of analysis. With a large number of factors, the challenge is designing experiments so that total number of runs and consequently the required time and cost decrease while achieving a satisfactory detection rate. This article employs frequency domain method (FDM) which is applicable in discrete-event simulation models to propose a new statistic defined as the ratio of estimated signal spectrum to maximum estimated noise spectrum. The proposed method not only... 

    Reliability/energy trade-off in Bluetooth error control schemes

    , Article Microelectronics Reliability ; Volume 51, Issue 8 , August , 2011 , Pages 1398-1412 ; 00262714 (ISSN) Khodadoustan, S ; Jalali, F ; Ejlali, A ; Sharif University of Technology
    2011
    Abstract
    Two important objectives in wireless sensor networks are reliability and reducing energy consumption. Hence, overcoming energy constraints and utilizing error control schemes such as Automatic Repeat Request (ARQ) and Forward Error Correction (FEC) are necessary to improve the energy efficiency and reliability. However, these two concerns are at odds, so there is a trade-off between them. Considering this point, the impact of various error control schemes on these objectives and the trade-off between them has been considered in Bluetooth networks recently. However, all these works consider ideal assumptions (e.g., perfect error detection) only. This work evaluates the energy-efficiency of... 

    Low energy yet reliable data communication scheme for network-on-chip

    , Article IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ; Volume 34, Issue 12 , 2015 , Pages 1892-1904 ; 02780070 (ISSN) Jafarzadeh, N ; Palesi, M ; Eskandari, S ; Hessabi, S ; Afzali-Kusha, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    In this paper, a low energy yet reliable communication scheme for network-on-chip is suggested. To reduce the communication energy consumption, we invoke low-swing signals for transmitting data, as well as data encoding techniques, for minimizing both self and coupling switching capacitance activity factors. To maintain the communication reliability of communication at low-voltage swing, an error control coding (ECC) technique is exploited. The decision about end-To-end or hop-To-hop ECC schemes and the proper number of detectable errors are determined through high-level mathematical analysis on the energy and reliability characteristics of the techniques. Based on the analysis, the extended... 

    A cache-assisted scratchpad memory for multiple-bit-error correction

    , Article IEEE Transactions on Very Large Scale Integration (VLSI) Systems ; Volume 24, Issue 11 , 2016 , Pages 3296-3309 ; 10638210 (ISSN) Farbeh, H ; Sadat Mirzadeh, N ; Farhady Ghalaty, N ; Miremadi, S. G ; Fazeli, M ; Asadi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Scratchpad memory (SPM) is widely used in modern embedded processors to overcome the limitations of cache memory. The high vulnerability of SPM to soft errors, however, limits its usage in safety-critical applications. This paper proposes an efficient fault-tolerant scheme, called cache-assisted duplicated SPM (CADS), to protect SPM against soft errors. The main aim of CADS is to utilize cache memory to provide a replica for SPM lines. Using cache memory, CADS is able to guarantee a full duplication of all SPM lines. We also further enhance the proposed scheme by presenting buffered CADS (BCADS) that significantly improves the CADS energy efficiency. BCADS is compared with two well-known... 

    An optimum pre-filter for ICA based multi-input multi-output OFDM system

    , Article International Journal of Innovative Computing, Information and Control ; Volume 7, Issue 6 , June , 2011 , Pages 3499-3508 ; 13494198 (ISSN) Khosravy, M ; Asharif, M. R ; Khosravi, M ; Yamashita, K ; Sharif University of Technology
    Abstract
    This paper presents an optimum pre-filter for ICA based multi-input multi-output OFDM system. In our former work, we presented a pre-filter solution for multiuser reconstruction in ICA based MIMO-OFDM systems [1,2]. Here, based on the structure of the system and former pre-filter solution, an optimization problem has been designed to give us the optimum pre-filter. The designed problem is based on minimization of the estimation error of ambiguities inherent to ICA in reconstruction of the data after separation. The optimization problem is mathematically solved and a set of optimized coefficients are obtained. Among the obtained set as optimum coefficients, optimum coefficients are acquired... 

    An optimum pre-filter for ICA based mulit-input multi-output OFDM system

    , Article ICETC 2010 - 2nd International Conference on Education Technology and Computer, 22 June 2010 through 24 June 2010 ; Volume 5 , 2010 , Pages V5129-V5133 ; 9781424463688 (ISBN) Khosravy, M ; Alsharif, M. R ; Khosravi, M ; Yamashita, K ; Sharif University of Technology
    Abstract
    This paper presents an Optimum pre-filter for ICA based mulit-input multi-output OFDM System. In our former work, we presented a pre-filter solution for multiuser reconstruction in ICA based MIMO-OFDM systems [1], [2]. Here, based on the structure of the system and former prefilter solution, an optimization problem has been designed to give us the optimum pre-filter. The designed problem is based on minimization of the estimation error of ambiguities inherent to ICA in reconstruction of the data after separation. The optimization problem is mathematically solved and a set of optimized coefficients are obtained. Among the obtained set as optimum coefficients, optimum coefficients are acquired... 

    Robust multiplicative patchwork method for audio watermarking

    , Article DSP 2009:16th International Conference on Digital Signal Processing, Santorini, 5 July 2009 through 7 July 2009 ; 2009 ; 9781424432981 (ISBN) Khademi Kalantari, N ; Akhaee, M. A ; Ahadi, M ; Amindavar, H. R ; Sharif University of Technology
    2009
    Abstract
    A Multiplicative Patchwork Method (MPM) for audio watermarking is proposed in this paper. In order to embed watermark data within the host signal, two subsets of the host signal features are selected using two secret keys. Then, watermark data is inserted simply by multiplying one subset and leaving the other one unchanged. In order to have an error free detection in attack-free case, embedding is performed in the selected frames of the host signal which satisfies a certain condition. This method is implemented in the wavelet domain and approximation coefficients are used for data embedding. Furthermore, the inaudibility of watermark insertion is controlled using iterative approach aided by... 

    Robust multiplicative patchwork method for audio watermarking

    , Article IEEE Transactions on Audio, Speech and Language Processing ; Volume 17, Issue 6 , 2009 , Pages 1133-1141 ; 15587916 (ISSN) Khademi Kalantari, N ; Akhaee, M. A ; Ahadi, M ; Amindavar, H ; Sharif University of Technology
    2009
    Abstract
    This paper presents a Multiplicative Patchwork Method (MPM) for audio watermarking. The watermark signal is embedded by selecting two subsets of the host signal features and modifying one subset multiplicatively regarding the watermark data, whereas another subset is left unchanged. The method is implemented in wavelet domain and approximation coefficients are used to embed data. In order to have an error-free detection, the watermark data is inserted only in the frames where the ratio of the energy of subsets is between two predefined values. Also in order to control the inaudibility of watermark insertion, we use an iterative algorithm to reach a desired quality for the watermarked audio... 

    Far-field continuous speech recognition system based on speaker localization and sub-band beamforming

    , Article 6th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2008, Doha, 31 March 2008 through 4 April 2008 ; 2008 , Pages 495-500 ; 9781424419685 (ISBN) Asaei, A ; Taghizadeh, M. J ; Sameti, H ; Sharif University of Technology
    2008
    Abstract
    This paper proposes a Distant Speech Recognition system based on a novel speaker Localization and Beamforming (SRLB) algorithm. To localize the speaker an algorithm based on Steered Response Power by utilizing harmonic structures of speech signal is proposed. This new scheme has the ability of speaker verification by fundamental frequency variation: therefore it can be utilized in the design of a speech recognition system for verified speakers. Then the performance of the Farsi speech recognition engine is evaluated under notorious conditions of noise and reverberation. Simulation results and tests on real data shows that by utilizing proposed localization scheme, recognition accuracy...