Loading...
Search for: mitigation
0.006 seconds

    Using binary-reflected gray coding for crosstalk mitigation of network on chip

    , Article Proceedings - 17th CSI International Symposium on Computer Architecture and Digital Systems, CADS 2013 ; 2013 , Pages 81-86 ; 9781479905621 (ISBN) Shirmohammadi, Z ; Miremadi, S. G ; Sharif University of Technology
    IEEE Computer Society  2013
    Abstract
    This paper proposes an efficient crosstalk mitigation method for Network-on-Chips. This method uses the binary-reflected Gray coding to send the proper code word into a channel. As the Gray code has reflective and unit distance properties, based on these facts, content of every flit is selected so that to minimize the number of forbidden transition patterns in the channel. A VHDL-based simulation is carried out for several channel widths. Simulation results show that the proposed method reduces the forbidden transitions up to 26% and can save power in NoC links  

    Optimal selection of voltage sag mitigation solution based on event tree method

    , Article PQ 2012: 8th International Conference - 2012 Electric Power Quality and Supply Reliability, Conference Proceedings ; 2012 , Pages 119-124 ; 9781467319775 (ISBN) Yasir, M ; Kazemi, S ; Lehtonen, M ; Fotuhi Firuzabad, M ; Sharif University of Technology
    2012
    Abstract
    Modern commercial operations consist of critical equipments that are more susceptible to voltage sag events. The consistent and smooth running of these operations is often disrupted by voltage sags. Diverse range of solutions exist which can enhance the ride through capability of sensitive devices. This paper presents various voltage dip mitigation solutions and a methodology for analyzing the effectiveness and practical viability of these solutions. The proposed approach is based on event tree method which gives an indication about the extent of process interruption in the event of voltage sags. A case study is conducted in the paper with different combinations of practical mitigation... 

    Graph-based altruistic games for interference mitigation in femtocell networks

    , Article 26th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2015, 30 August 2015 through 2 September 2015 ; Volume 2015-December , 2015 , Pages 1883-1888 ; 9781467367820 (ISBN) Vahabpour, A ; Khalaj, B. H ; Sharif University of Technology
    Abstract
    Femtocell networks are a common means of offloading in current mobile networks. Game theoretic and learning-based self-organization schemes are known as two viable approaches for interference control in co-existing macro/femtocell networks. Nevertheless, extensions of these schemes to concurrent multi-agent scenarios often face several challenges including high computational complexity, cyclic behaviors, and lack of convergence. This paper addresses such challenges by introducing local games based on a graph representation of the network. The goal of the games is to optimize the aggregate network capacity through power control. Fairness among femtocells and quality of service (QoS) for... 

    Crosstalk modeling to predict channel delay in Network-on-Chips

    , Article Proceedings - IEEE International Conference on Computer Design: VLSI in Computers and Processors, 3 October 2010 through 6 October 2010 ; October , 2010 , Pages 396-401 ; 10636404 (ISSN) ; 9781424489350 (ISBN) Patooghy, A ; Miremadi, S. G ; Shafaei, M ; Sharif University of Technology
    2010
    Abstract
    Communication channels in Network-on-Chips (NoCs) are highly susceptible to crosstalk faults due to the use of nano-scale VLSI technologies in the fabrication of NoCs. Crosstalk faults cause variable timing delay in NoC channels based on the patterns of transitions appearing on the channels. This paper proposes an analytical model to estimate the timing delay of an NoC channel in the presence of crosstalk faults. The model calculates expected number of 4C, 3C, 2C, and 1C transition patterns to predict delay of a K-bit communication channel. The model is applicable for both non-protected channels and channels which are protected by crosstalk mitigation methods. Spice simulations are done in a... 

    FiRot: An efficient crosstalk mitigation method for Network-on-Chips

    , Article Proceedings - 16th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2010, 13 December 2010 through 15 December 2010 ; December , 2010 , Pages 55-61 ; 9780769542898 (ISBN) Patooghy, A ; Shafaei, M ; Miremadi, S. G ; Falahati, H ; Taheri, S ; Sharif University of Technology
    2010
    Abstract
    This paper proposes an efficient crosstalk mitigation method for Network-on-Chips (NoCs). The proposed method investigates flits in each packet to minimize the number of harmful transition patterns appearing on the communication channels of NoC. To do this, the content of every flit is rotated with respect to the previously flit sent through the channel. Rotation is done to find a rotated version of the flit which minimizes the number of harmful transition patterns. A tag field is added into the rotated flit to enable the receiving side to recover the original flit. Maximum number of rotations is bounded by a fixed value to minimize the timing and power overheads of the proposed method.... 

    A survey on the effect of different kinds of wind turbines on power system stability

    , Article 2010 1st International Nuclear and Renewable Energy Conference, INREC'10, 21 March 2010 through 24 March 2010 ; March , 2010 ; 9781424452149 (ISBN) Bahramipanah, M ; Afsharnia, S ; Shahooei, Z ; Sharif University of Technology
    2010
    Abstract
    Due to deterioration of fossil fuel and policy directives on greenhouse gas mitigation, wind power generation has been widely developed in recent years. This has raised many issues in terms of power system operation, dynamics, stability and etc. This paper reviews the effect of different kinds of wind turbines on power system stability. Since there are no existing surveys in this area, it provides a comprehensive overview in transient and dynamic stability. The contribution of this survey is to provide a comparison to determine which kinds of wind turbines is better from the system stability point of view. Furthermore, the effects of wind power generation with energy storage systems are... 

    Resilience of civil infrastructure by optimal risk mitigation

    , Article Scientia Iranica ; Volume 23, Issue 5 , 2016 , Pages 1961-1974 ; 10263098 (ISSN) Mahsuli, M ; Sharif University of Technology
    Sharif University of Technology 
    Abstract
    This paper puts forward a framework for optimal mitigation of regional risk to enhance the resilience of civil infrastructure. To meet this objective, probabilistic models, methods, and software are developed and applied. The work is conducted within a new reliability-based approach, in which reliability methods compute risk. This contrasts several contemporary approaches for risk analysis. Risk, in this context, denotes the probability of exceeding monetary loss. Evaluating such probabilities requires probabilistic models for hazards, response, damage, and loss. This motivates the following contributions in this paper. First, a new computer program is developed that is tailored to conduct... 

    Reshaping energy policy for sustainable development: Curbing Iran’s carbon emission monster via renewable energies

    , Article Energy Sources, Part B: Economics, Planning and Policy ; Volume 11, Issue 9 , 2016 , Pages 830-840 ; 15567249 (ISSN) Eshraghi, H ; Maleki, A ; Sharif University of Technology
    Taylor and Francis Inc 
    Abstract
    This paper formulates flow of energy from primary resources and import routes to different socio-economic sectors by making use of Long-Range Energy Alternatives Planning (LEAP) model. It presents a baseline of how Iran’s future production and consumption patterns evolve. It also seeks plausible scenario for renewable energies utilization and evaluates its mitigation potential and economic aspects. Model results indicate that exploitation of a "not-too-strict" package of renewable sources featuring 10 GW of wind and 19 GW of hydro by the end of 2035 will lead to CO2 emissions to be reduced up to an amount of 190.7 million tons in the study period. By accounting for the opportunity costs... 

    Cogging force mitigation techniques in a modular linear permanent magnet motor

    , Article IET Electric Power Applications ; Volume 10, Issue 7 , 2016 , Pages 667-674 ; 17518660 (ISSN) Tootoonchian, F ; Nasiri Gheidari, Z ; Sharif University of Technology
    Institution of Engineering and Technology 
    Abstract
    Modular linear doubly salient permanent magnet motors are well adapted to linear propulsion systems because of their distinct characteristics, such as high efficiency and power density, reduced maintenance and initial cost, low noise and permanent magnet (PM) leakage flux, and fault tolerance capability. However, such motors suffer from high cogging thrust. In this study, various techniques based on previously proposed methods for PM machines are applied on the studied motor and evaluated by using non-linear three-dimensional time-stepping finite element analysis; three novel, optimised techniques are then presented. The techniques presented are based on the minimisation of the variation in... 

    Let me join two worlds! analyzing the integration of web and native technologies in hybrid mobile apps

    , Article Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, 31 July 2018 through 3 August 2018 ; 2018 , Pages 1814-1819 ; 9781538643877 (ISBN) Pouryousef, S ; Rezaiee, M ; Chizari, A ; Sharif University of Technology
    Abstract
    We can notice that security problems of inappropriate integration of native and web technologies in hybrid mobile applications (apps) have been covered in the related state-of-the-art research. However, analyzing hybrid mobile apps' unique behaviors has been seldom addressed. In this paper, we explore the influence of native and web technologies integration in hybrid mobile apps on the generated profile of mobile applications. Specifically, we analyze the type of Security Sensitive APIs (SS-APIs) exposed to web content and identify the corresponding usage patterns by systematically tracking function-call-graphs of a large number of hybrid and native mobile apps. Our investigations indicate... 

    Design and control of a self-powered hybrid electromagnetic damper

    , Article Journal of Sound and Vibration ; Volume 428 , 2018 , Pages 147-167 ; 0022460X (ISSN) Jamshidi, M ; Chang, C. C ; Bakhshi, A ; Sharif University of Technology
    Academic Press  2018
    Abstract
    In this paper, the characteristics of a hybrid regenerative electromagnetic (EM) damper are first determined and experimentally examined. The main idea is to have two modes of operation for the EM damper, namely passive energy harvesting and semi-active modes. In the passive mode, the vibrational energy of an underlying structure is harvested and stored in a rechargeable battery. The harvested energy can then be employed in the semi-active control mode to supply the power demand for the required sensors and microcontroller. This hybrid damper would thus be capable of realizing the characteristics of a self-powered EM damper. A prototype of the damper was designed and tested under different... 

    A general framework for voltage sag performance analysis of distribution networks

    , Article Energies ; Volume 12, Issue 14 , 2019 ; 19961073 (ISSN) Safdarian, A ; Fotuhi Firuzabad, M ; Lehtonen, M ; Sharif University of Technology
    MDPI AG  2019
    Abstract
    The proliferation of more sensitive loads has obliged distribution companies to pay greater attention to the voltage sag mitigation potential of different design alternatives in network planning studies. In doing so, a company has to have effective tools for estimating the voltage sag performance of its network. In this regard, this paper establishes a three-step framework for evaluating voltage sag performance of a distribution network. The first step, designated as state selection, is to select a network state in which voltage sag is likely. Although voltage sags have various causes, those that originated from faults in distribution networks are considered in this paper. The stochastic... 

    A nine-step approach for developing and implementing an “agricultural drought risk management plan”; case study: Alamut River basin in Qazvin, Iran

    , Article Natural Hazards ; Volume 102, Issue 3 , 2020 , Pages 1187-1205 Fatehi Marj, A ; Hosseini Hossein Abadi, F ; Sharif University of Technology
    Springer  2020
    Abstract
    Occurrence of drought, as an inevitable natural climate feature, cannot be ceased while happening. However, costs of the consequences could be alleviated using mature scientific integrated approaches. To reduce the amount of damage, it is required to provide “Contingency” and “Mitigation” action plans. For this reason, development of efficient operating instructions for various regions based on weather conditions and field studies is needed as well as having a sophisticated understanding of socioeconomic situations. This paper describes an approach to provide the first national agricultural drought risk management plan for a river basin in Iran country as a pilot. The study lasted for... 

    A decision support system for demand management in healthcare supply chains considering the epidemic outbreaks: A case study of coronavirus disease 2019 (COVID-19)

    , Article Transportation Research Part E: Logistics and Transportation Review ; Volume 138 , June , 2020 Govindan, K ; Mina, H ; Alavi, B ; Sharif University of Technology
    Elsevier Ltd  2020
    Abstract
    The disasters caused by epidemic outbreaks is different from other disasters due to two specific features: their long-term disruption and their increasing propagation. Not controlling such disasters brings about severe disruptions in the supply chains and communities and, thereby, irreparable losses will come into play. Coronavirus disease 2019 (COVID-19) is one of these disasters that has caused severe disruptions across the world and in many supply chains, particularly in the healthcare supply chain. Therefore, this paper, for the first time, develops a practical decision support system based on physicians' knowledge and fuzzy inference system (FIS) in order to help with the demand... 

    PLCDefender: Improving remote attestation techniques for PLCs using physical model

    , Article IEEE Internet of Things Journal ; 2020 Salehi, M ; Bayat Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    In order to guarantee the security of industrial control system (ICS) processes, the proper functioning of the programmable logic controllers (PLCs) must be ensured. In particular, cyber-attacks can manipulate the PLC control logic program and cause terrible damage that jeopardize people’s life when bringing the state of the critical system into an unreliable state. Unfortunately, no remote attestation technique has yet been proposed that can validate the PLC control logic program using a physics-based model that demonstrates device behavior. In this paper, we propose PLCDefender, a mitigation method that combines hybrid remote attestation technique with a physics-based model to preserve the... 

    Straggler mitigation in distributed matrix multiplication: fundamental limits and optimal coding

    , Article IEEE Transactions on Information Theory ; Volume 66, Issue 3 , 2020 , Pages 1920-1933 Yu, Q ; Maddah Ali, M. A ; Avestimehr, A. S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    We consider the problem of massive matrix multiplication, which underlies many data analytic applications, in a large-scale distributed system comprising a group of worker nodes. We target the stragglers' delay performance bottleneck, which is due to the unpredictable latency in waiting for slowest nodes (or stragglers) to finish their tasks. We propose a novel coding strategy, named entangled polynomial code, for designing the intermediate computations at the worker nodes in order to minimize the recovery threshold (i.e., the number of workers that we need to wait for in order to compute the final output). We demonstrate the optimality of entangled polynomial code in several cases, and show... 

    Soft error mitigation in switch modules of SRAM-based FPGAs

    , Article 2007 IEEE International Symposium on Circuits and Systems, ISCAS 2007, New Orleans, LA, 27 May 2007 through 30 May 2007 ; 2007 , Pages 141-144 ; 02714310 (ISSN) Zarandi, H. R ; Miremadi, S. G ; Pradhan, D. K ; Mathew, J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2007
    Abstract
    In this paper, we propose two techniques to mitigate soft error effects on the switch modules of SRAM-based FPGAs: 1) The first technique tolerates SEU-caused open errors based on a new programming method for SRAM-bits of switch modules, and 2) The second technique mitigates SEU-cause short errors in the switch modules based on a mixed programmable and hard-wired switch module structure in the FPGAs. The effects of these two techniques on the delay, area and power consumption for 20 MCNC benchmark circuits are achieved using a minor modification in VPR and T-VPack FPGA CAD tools. The experimental results show that he first technique increase reliability of connections of switch module up to... 

    Distributed detection and mitigation of biasing attacks over multi-agent networks

    , Article IEEE Transactions on Network Science and Engineering ; Volume 8, Issue 4 , 2021 , Pages 3465-3477 ; 23274697 (ISSN) Doostmohammadian, M ; Zarrabi, H ; Rabiee, H. R ; Khan, U. A ; Charalambous, T ; Sharif University of Technology
    IEEE Computer Society  2021
    Abstract
    This paper proposes a distributed attack detection and mitigation technique based on distributed estimation over a multi-agent network, where the agents take partial system measurements susceptible to (possible) biasing attacks. In particular, we assume that the system is not locally observable via the measurements in the direct neighborhood of any agent. First, for performance analysis in the attack-free case, we show that the proposed distributed estimation is unbiased with bounded mean-square deviation in steady-state. Then, we propose a residual-based strategy to locally detect possible attacks at agents. In contrast to the deterministic thresholds in the literature assuming an upper... 

    Earthquake vulnerability assessment for urban areas using an ann and hybrid swot-qspm model

    , Article Remote Sensing ; Volume 13, Issue 22 , 2021 ; 20724292 (ISSN) Alizadeh, M ; Zabihi, H ; Rezaie, F ; Asadzadeh, A ; Wolf, I. D ; Langat, P. K ; Khosravi, I ; Beiranvand Pour, A ; Mohammad Nataj, M ; Pradhan, B ; Sharif University of Technology
    MDPI  2021
    Abstract
    Tabriz city in NW Iran is a seismic-prone province with recurring devastating earthquakes that have resulted in heavy casualties and damages. This research developed a new computational framework to investigate four main dimensions of vulnerability (environmental, social, economic and physical). An Artificial Neural Network (ANN) Model and a SWOT-Quantitative Strategic Planning Matrix (QSPM) were applied. Firstly, a literature review was performed to explore indicators with significant impact on aforementioned dimensions of vulnerability to earthquakes. Next, the twenty identified indicators were analyzed in ArcGIS, a geographic information system (GIS) software, to map earthquake... 

    Earthquake vulnerability assessment for urban areas using an ann and hybrid swot-qspm model

    , Article Remote Sensing ; Volume 13, Issue 22 , 2021 ; 20724292 (ISSN) Alizadeh, M ; Zabihi, H ; Rezaie, F ; Asadzadeh, A ; Wolf, I. D ; Langat, P. K ; Khosravi, I ; Beiranvand Pour, A ; Nataj, M. M ; Pradhan, B ; Sharif University of Technology
    MDPI  2021
    Abstract
    Tabriz city in NW Iran is a seismic-prone province with recurring devastating earthquakes that have resulted in heavy casualties and damages. This research developed a new computational framework to investigate four main dimensions of vulnerability (environmental, social, economic and physical). An Artificial Neural Network (ANN) Model and a SWOT-Quantitative Strategic Planning Matrix (QSPM) were applied. Firstly, a literature review was performed to explore indicators with significant impact on aforementioned dimensions of vulnerability to earthquakes. Next, the twenty identified indicators were analyzed in ArcGIS, a geographic information system (GIS) software, to map earthquake...