Loading...
Search for: hardware
0.008 seconds
Total 350 records

    Design and optimization of reliable hardware accelerators: leveraging the advantages of high-level synthesis

    , Article 2018 IEEE 24th International Symposium on On-Line Testing and Robust System Design, IOLTS 2018, 2 July 2018 through 4 July 2018 ; 2018 , Pages 232-235 ; 9781538659922 (ISBN) Naz Taher, F ; Kishani, M ; Carrion Schafer, B ; Sharif University of Technology
    Abstract
    This work proposes an automatic method to generate opti- mized redundant hardware accelerator with maximum reliabil- ity given a single behavioral description for High-Level Syn- thesis (HLS). For this purpose, this work exploits one of the main advantages of C-based VLSI design over traditional RT- level design: The ability to generate micro-architectures with unique characteristics from the same behavioral description. This is typically done by setting different synthesis options to determine how to synthesize loops, arrays and functions and to specify the number and type of Functional Units (FUs) to be instantiated. The proposed method is composed of two main phases. The first phase... 

    LDMBL: An architecture for reducing code duplication in heavyweight binary instrumentations

    , Article Software - Practice and Experience ; Volume 48, Issue 9 , 2018 , Pages 1642-1659 ; 00380644 (ISSN) Momeni, B ; Kharrazi, M ; Sharif University of Technology
    John Wiley and Sons Ltd  2018
    Abstract
    Emergence of instrumentation frameworks has vastly contributed to the software engineering practices. As the instrumentation use cases become more complex, complexity of instrumenting programs also increases, leading to a higher risk of software defects, increased development time, and decreased maintainability. In security applications such as symbolic execution and taint analysis, which need to instrument a large number of instruction types, this complexity is prominent. This paper presents an architecture based on the Pin binary instrumentation framework to abstract the low-level OS and hardware-dependent implementation details, facilitate code reuse in heavyweight instrumentation use... 

    Design and realization of a sign language educational humanoid robot

    , Article Journal of Intelligent and Robotic Systems: Theory and Applications ; 2018 , Pages 1-15 ; 09210296 (ISSN) Meghdari, A ; Alemi, M ; Zakipour, M ; Kashanian, A ; Sharif University of Technology
    Springer Netherlands  2018
    Abstract
    This paper introduces a novel robotic platform, called RASA (Robot Assistant for Social Aims). This educational social robot is designed and constructed to facilitate teaching Persian Sign Language (PSL) to children with hearing disabilities. There are three predominant characteristics from which design guidelines of the robot are generated. First, the robot is designed as a fully functional interactive social robot with children as its social service recipients. Second, it comes with the ability to perform PSL, which demands a dexterous upper-body of 29 actuated degrees of freedom. Third, it has a relatively low development cost for a robot in its category. This funded project, addresses... 

    Design and realization of a sign language educational humanoid robot

    , Article Journal of Intelligent and Robotic Systems: Theory and Applications ; Volume 95, Issue 1 , 2019 , Pages 3-17 ; 09210296 (ISSN) Meghdari, A ; Alemi, M ; Zakipour, M ; Kashanian, S. A ; Sharif University of Technology
    Springer Netherlands  2019
    Abstract
    This paper introduces a novel robotic platform, called RASA (Robot Assistant for Social Aims). This educational social robot is designed and constructed to facilitate teaching Persian Sign Language (PSL) to children with hearing disabilities. There are three predominant characteristics from which design guidelines of the robot are generated. First, the robot is designed as a fully functional interactive social robot with children as its social service recipients. Second, it comes with the ability to perform PSL, which demands a dexterous upper-body of 29 actuated degrees of freedom. Third, it has a relatively low development cost for a robot in its category. This funded project, addresses... 

    Low-latency double point multiplication architecture using differential addition chain over GF( 2 m)

    , Article IEEE Transactions on Circuits and Systems I: Regular Papers ; Volume 66, Issue 4 , 2019 , Pages 1465-1473 ; 15498328 (ISSN) Shahroodi, T ; Bayat-Sarmadi, S ; Mosanaei-Boorani, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    During the past decade, elliptic curve cryptography (ECC) has been widely deployed in different scenarios as the main asymmetric cryptosystem due to its smaller key length and relatively higher speed compared with other asymmetric cryptosystems. The most critical operation in ECC computation is point multiplication. In some popular applications such as signature verification schemes, the double point multiplication can be exploited. In this paper, we propose an algorithm and its corresponding architecture to speed up the double point multiplication using a modified binary differential addition chain. The proposed method is highly parallelizable and has been implemented on Virtex-4, Virtex-5,... 

    Localizing exception faults in Android applications

    , Article Scientia Iranica ; Volume 26, Issue 3 D , 2019 , Pages 1567-1588 ; 10263098 (ISSN) Mirzaei, H ; Heydarnoori, A ; Sharif University of Technology
    Sharif University of Technology  2019
    Abstract
    In software programs, most of the time, there is a chance for occurrence of faults in general, and exception faults in particular. Localizing those pieces of code that are responsible for a particular fault is one of the most complicated tasks, and it can produce incorrect results if done manually. Semi-automated and fully-automated techniques have been introduced to overcome this issue. However, despite recent advances in fault localization techniques, they are not necessarily applicable to Android applications because of their special characteristics such as context-awareness, use of sensors, being executable on various mobile devices, limited hardware resources, etc. To this aim, in this... 

    Localizing exception faults in Android applications

    , Article Scientia Iranica ; Volume 26, Issue 3 D , 2019 , Pages 1567-1588 ; 10263098 (ISSN) Mirzaei, H ; Heydarnoori, A ; Sharif University of Technology
    Sharif University of Technology  2019
    Abstract
    In software programs, most of the time, there is a chance for occurrence of faults in general, and exception faults in particular. Localizing those pieces of code that are responsible for a particular fault is one of the most complicated tasks, and it can produce incorrect results if done manually. Semi-automated and fully-automated techniques have been introduced to overcome this issue. However, despite recent advances in fault localization techniques, they are not necessarily applicable to Android applications because of their special characteristics such as context-awareness, use of sensors, being executable on various mobile devices, limited hardware resources, etc. To this aim, in this... 

    Lightweight residual densely connected convolutional neural network

    , Article Multimedia Tools and Applications ; Volume 79, Issue 35-36 , 2020 , Pages 25571-25588 Fooladgar, F ; Kasaei, S ; Sharif University of Technology
    Springer  2020
    Abstract
    Extremely efficient convolutional neural network architectures are one of the most important requirements for limited-resource devices (such as embedded and mobile devices). The computing power and memory size are two important constraints of these devices. Recently, some architectures have been proposed to overcome these limitations by considering specific hardware-software equipment. In this paper, the lightweight residual densely connected blocks are proposed to guaranty the deep supervision, efficient gradient flow, and feature reuse abilities of convolutional neural network. The proposed method decreases the cost of training and inference processes without using any special... 

    A novel implementation of the IEEE802.11 Medium Access Control

    , Article 2006 International Symposium on Intelligent Signal Processing and Communications, ISPACS'06, Yonago, 12 December 2006 through 15 December 2006 ; 2006 , Pages 489-492 ; 0780397339 (ISBN); 9780780397330 (ISBN) Samadi, S ; Golmohammadi, A ; Jannesari, A ; Movahedi, M. R ; Khalaj, B ; Ghaemmaghami, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2006
    Abstract
    This work presents some new optimization approaches to implementation of Medium Access Control (MAC) layer of IEEE 802.11 wireless networking protocol using general purpose DSP and gate array systems. Optimization starts at design level. The hardware/software partitioning of the MACs architecture is optimized in the sense of minimal implementation burden, while maintaining the system's functionalities and performance. The proposed partitioning and implementation technique obviates the use of any Real Time Operating System (RTOS), which leads to a simple, high speed, and low memory structure of the MACs software. Also, solutions such as using hash tables and pipeline processing are given and... 

    Simulation of superconductive fault current limiter (SFCL) using modular neural networks

    , Article IECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics, Paris, 6 November 2006 through 10 November 2006 ; 2006 , Pages 4415-4419 ; 1424401364 (ISBN); 9781424401369 (ISBN) Makki, B ; Sadati, N ; Sohani, M ; Sharif University of Technology
    2006
    Abstract
    Modular Neural Networks have had significant success in a wide range of applications because of their superiority over single non-modular ones in terms of proper data representation, feasibility of hardware implementation and faster learning. This paper presents a constructive multilayer neural network (CMNN) in conjunction with a Hopfield model using a new cost function to simulate the behavior of superconductive fault current limiters (SFCLs). The results show that the proposed approach can efficiently simulate the behavior of SFCLs. ©2006 IEEE  

    CFCET: A hardware-based control flow checking technique in COTS processors using execution tracing

    , Article Microelectronics Reliability ; Volume 46, Issue 5-6 , 2006 , Pages 959-972 ; 00262714 (ISSN) Rajabzadeh, A ; Miremadi, S. G ; Sharif University of Technology
    2006
    Abstract
    This paper presents a behavioral-based error detection technique called control flow checking by execution tracing (CFCET) to increase concurrent error detection capabilities of commercial off-the-shelf (COTS) processors. This technique traces the program jumps graph (PJG) at run-time and compares it with the reference jumps graph to detect possible violations caused by transient faults. The reference graph is driven by a preprocessor from the source program. The idea behind the CFCET is based on using an external watchdog processor (WDP) and also the internal execution tracing feature available in COTS processors to monitor the addresses of taken branches in a program, externally. This is... 

    PVMC: task mapping and scheduling under process variation heterogeneity in mixed-criticality systems

    , Article IEEE Transactions on Emerging Topics in Computing ; 2021 ; 21686750 (ISSN) Bahrami, F ; Ranjbar, B ; Rohbani, N ; Ejlali, A. R ; Sharif University of Technology
    IEEE Computer Society  2021
    Abstract
    Embedded systems have migrated from special-purpose hardware to commodity hardware. These systems have also tended to Mixed-Criticality (MC) implementations, executing applications of different criticalities upon a shared platform. Multi-core processors, which are commonly used to design MC systems, bring out new challenges due to the process variations. Power and frequency asymmetry affects the predictability of embedded systems. In this work, variation-aware techniques are explored to not only improve the reliability of MC systems, but also aid the scheduling and energy saving of them. We leverage the core-to-core (C2C) variations to protect high-criticality tasks and provide full service... 

    A fault tolerant approach to object oriented design and synthesis of embedded systems

    , Article 2nd Latin-American Symposium on Dependable Computing, LADC 2005, Salvador, 25 October 2005 through 28 October 2005 ; Volume 3747 LNCS , 2005 , Pages 143-153 ; 03029743 (ISSN); 3540295720 (ISBN); 9783540295723 (ISBN) Fazeli, M ; Farivar, R ; Hessabi, S ; Miremadi, S. G ; Sharif University of Technology
    2005
    Abstract
    The ODYSSEY design methodology has been recently introduced as a viable solution to the increasing design complexity problem in the ASICs. It is an object-oriented design methodology which models a system in terms of its constituting objects and their corresponding method calls. Some of these methods are implemented in hardware; others are simply executed by a general purpose processor. One fundamental element of this methodology is a network on chip that implements method invocation for hardware-based method calls. However this network is prone to faults, thus errors on it may result into system failure. In this paper an architectural fault-tolerance enhancement to the ODYSSEY design... 

    Evaluation of some exponential random number generators implemented by FPGA

    , Article IASTED International Conference on Parallel and Distributed Computing and Networks, as part of the 23rd IASTED International Multi-Conference on Applied Informatics, Innsbruck, 15 February 2005 through 17 February 2005 ; 2005 , Pages 578-583 ; 10272666 (ISSN) Timarchi, S ; Miremadi, S. G ; Ejlali, A. R ; Fahringer T ; Hamza M. H ; Sharif University of Technology
    2005
    Abstract
    Normally, random number generators produce uniformly distributed values. In some cases, such as Monte Carlo simulation, non-uniform distributed values (e.g. exponential distribution and weibull distribution) are required. One way of producing non-uniformly distributed random values, is to add an extra hardware to a uniformly distributed random number generator. In this paper, three different methods are studied to generate exponential random values. These methods are based oft three algorithm of logarithm evaluating namely: CORDIC, Interpolation and Piecewise lookup table. The study is based on an experimental evaluation of the above methods, using FPGA chips, to compare the speed, hardware... 

    Efficient Hardware Implementation of ECG Derived Respiration (EDR) System, Applied to Body Area Network (BAN)

    , M.Sc. Thesis Sharif University of Technology Shayei, Ali (Author) ; Shabany, Mahdi (Supervisor)
    Abstract
    The rapid growth in the health care technology, has made the Body Area Network (BAN) as an attracting topic for research and design development. BAN devices have restrictions on their size and power consumption. Monitoring the respiratory signal is crucial in many medical applications and is normally part of a BAN system. Traditional methods for the respiration measurement are normally based on measuring the volume of air inhaled and exhaled by lungs (like a spirometer) or oxygen saturation in blood. However, these methods have numerous drawbacks including their high cost and limited accessibility. In this thesis, a novel scheme is proposed to derive the respiratory signal from the... 

    Design and Implementation of Processing Hardware for Active Learning Method

    , M.Sc. Thesis Sharif University of Technology Mehranzadeh, Mahdi (Author) ; Bagheri Shouraki, Saeed (Supervisor)
    Abstract
    The Active Learning Method is in fact an adaptive recursive algorithm which embodies a Multi Input and a Single Output (MISO) system as in a fuzzy combination of several Single Input systems and Single Output systems (SISO), and by utilizing a fuzzy technique of Ink Drop Spread tries to explore and extract input to output transfer function behavior in the system of a single-input to a single-output. Although in simulation state, the speed of this model is set at a much higher speed in comparison to other presented models, still is slower than the processing speed of human brain. In regards to hardware implementation, also there remain the fundamental implementation challenges through more... 

    A high performance real-time simulator for controllers hardware-in-the-loop testing

    , Article Energies ; Volume 5, Issue 6 , 2012 , Pages 1713-1733 ; 19961073 (ISSN) Matar, M ; Karimi, H ; Etemadi, A ; Iravani, R ; Sharif University of Technology
    2012
    Abstract
    This paper presents a high performance real-time simulator for power electronic systems applications and primarily intended for controller hardware-in-the-loop (CHIL) testing. The novelty of the proposed simulator resides in the massively parallel hardware architecture that efficiently exploits fine-grained parallelism without imposing severe communication overhead time that can limit the performance. The simulator enables the use of a nanosecond range simulation timestep to simulate power electronic systems. Through the use of this nanosecond range simulation timestep, the simulator minimizes the error arising from the intersimulation timestep switching phenomenon associated with CHIL. The... 

    No-go theorem for iterations of unknown quantum gates

    , Article Physical Review A - Atomic, Molecular, and Optical Physics ; Volume 93, Issue 1 , 2016 ; 10502947 (ISSN) Soleimanifar, M ; Karimipour, V ; Sharif University of Technology
    American Physical Society 
    Abstract
    We propose a no-go theorem by proving the impossibility of constructing a deterministic quantum circuit that iterates a unitary oracle by calling it only once. Different schemes are provided to bypass this result and to approximately realize the iteration. The optimal scheme is also studied. An interesting observation is that for a large number of iterations, a trivial strategy like using the identity channel has the optimal performance, and preprocessing, postprocessing, or using resources like entanglement does not help at all. Intriguingly, the number of iterations, when being large enough, does not affect the performance of the proposed schemes  

    Linear active disturbance rejection control from the practical aspects

    , Article IEEE/ASME Transactions on Mechatronics ; 2018 ; 10834435 (ISSN) Ahi, B ; Haeri, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    In this paper, important issues that could come up in practice of Active Disturbance Rejection Control (ADRC) due to a common assumption and some inevitable practical restrictions are investigated. The main idea behind ADRC is modeling effects of both internal uncertainties and external disturbances as an extra state called the total disturbance which is timely estimated. In the majority of recent works, it is assumed that time derivative of total disturbance is bounded. First we prove that, beside the system characteristics, the validity of this assumption strongly depends on the tuning parameters, even in the case of simple classes of linear second order systems. Thus, one should be... 

    A novel deep learning backstepping controller-based digital twins technology for pitch angle control of variable speed wind turbine

    , Article Designs ; Volume 4, Issue 2 , 2020 , Pages 1-19 Parvaresh, A ; Abrazeh, S ; Mohseni, S. R ; Zeitouni, M. J ; Gheisarnejad, M ; Khooban, M. H ; Sharif University of Technology
    MDPI AG  2020
    Abstract
    This paper proposes a deep deterministic policy gradient (DDPG) based nonlinear integral backstepping (NIB) in combination with model free control (MFC) for pitch angle control of variable speed wind turbine. In particular, the controller has been presented as a digital twin (DT) concept, which is an increasingly growing method in a variety of applications. In DDPG-NIB-MFC, the pitch angle is considered as the control input that depends on the optimal rotor speed, which is usually derived from effective wind speed. The system stability according to the Lyapunov theory can be achieved by the recursive nature of the backstepping theory and the integral action has been used to compensate for...