Loading...
Search for: scalability
0.007 seconds
Total 100 records

    Fast and scalable system for automatic artist identification

    , Article IEEE Transactions on Consumer Electronics ; Volume 55, Issue 3 , 2009 , Pages 1731-1737 ; 00983063 (ISSN) Shirali Shahreza, S ; Abolhassani, H ; Shirali Shahreza, M. H ; Sharif University of Technology
    2009
    Abstract
    Digital music technologies enable users to create and use large collections of music. One of the desirable features for users is the ability to automatically organize the collection and search in it. One of the operations that they need is automatic identification of tracks' artists. This operation can be used to automatically classify new added tracks to a collection. Additionally, the user can use this operation to identify the artist of an unknown track. The artist name of a track can help the user find similar music. In this paper, we introduce a fast and scalable system that can automatically identify the artist of music tracks. This system is creating a signature for each track that is... 

    Scalable performance analysis of epidemic routing considering skewed location visiting preferences

    , Article 27th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, MASCOTS 2019, 22 October 2019 through 25 October 2019 ; Volume 2019-October , 2019 , Pages 201-213 ; 15267539 (ISSN); 9781728149509 (ISBN) Rashidi, L ; Dalili Yazdi, A ; Entezari Maleki, R ; Sousa, L ; Movaghar, A ; Sharif University of Technology
    IEEE Computer Society  2019
    Abstract
    This paper investigates the performance of epidemic routing, in mobile social networks (MSNs), which makes use of the store-carry-forward paradigm for communication. Real-life mobility traces show that people have skewed location visiting preferences, with some places visited frequently and some others infrequently. In order to model epidemic routing in MSNs, we first analyze the time taken for a node to meet the first node belonging to a set of nodes restricted to move in a specific subarea. Afterwards, a monolithic stochastic reward net (SRN) is proposed to evaluate the delivery delay and the average number of transmissions under epidemic routing by considering skewed location visiting... 

    Exploitation of wavelength, hardware, and path redundancies in fault-tolerant all-optical DCNs

    , Article Optical Fiber Technology ; Volume 51 , 2019 , Pages 77-89 ; 10685200 (ISSN) Akbari Rokn Abadi, S ; Koohi, S ; Sharif University of Technology
    Academic Press Inc  2019
    Abstract
    Data center performance is affected by three main factors; bandwidth, latency, and reliability of intra-data center interconnection network. Bandwidth and latency are definitely improved by adopting optical technology for intra-data center communication, but fault tolerance of the corresponding optical networks has been raised less. Recently, we introduced two Torus-based, all-optical, and non-blocking networks, i.e. O-TF and O-FTF, addressing reliability of optical networks, and now, in this paper, to address the scalability problem, we propose a novel Optical Clos-based architecture which reduces minimum number of required wavelength channels, as well as, the switch size in each node.... 

    A fully distributed hierarchical attribute-based encryption scheme

    , Article Theoretical Computer Science ; Volume 815 , 2020 , Pages 25-46 Ali, M ; Mohajeri, J ; Sadeghi, M. R ; Liu, X ; Sharif University of Technology
    Elsevier B.V  2020
    Abstract
    With the development of cloud computing, many enterprises have been interested in outsourcing their data to cloud servers to decrease IT costs and rise capabilities of provided services. To afford confidentiality and fine-grained data access control, attribute-based encryption (ABE) was proposed and used in several cloud storage systems. However, scalability and flexibility in key delegation and user revocation mechanisms are primary issues in ABE systems. In this paper, we introduce the concept of a fully distributed revocable ciphertext-policy hierarchical ABE (FDR-CP-HABE) and design the first FDR-CP-HABE scheme. Our scheme offers a high level of flexibility and scalability in the key... 

    A Scalable architecture for monitoring IOT devices using ethereum and fog computing

    , Article 4th International Conference on Smart Cities, Internet of Things and Applications, SCIoT 2020, 16 September 2020 through 17 September 2020 ; 2020 , Pages 66-76 Tahmasebi, S ; Habibi, J ; Shamsaie, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    With recent considerable developments in the Internet of Things (IoT), billions of resource-constrained devices are interconnected through the Internet. Monitoring this huge number of IoT devices which are heterogeneous in terms of underlying communication protocols and data format is challenging. The majority of existing IoT device monitoring solutions heavily rely on centralized architectures. Since using centralized architectures comes at the expense of trusting an authority, it has several inherent drawbacks, including vulnerability to security attacks, lack of data privacy, and unauthorized data manipulation. Hence, a new decentralized approach is crucial to remedy these drawbacks. One... 

    Facility location optimization via multi-agent robotic systems

    , Article 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC, Sanya, 6 April 2008 through 8 April 2008 ; 2008 , Pages 287-292 ; 9781424416851 (ISBN) Moarref, M ; Sayyaadi, H ; Sharif University of Technology
    2008
    Abstract
    A facility location problem deals with locating the best place for a group of facilities, among distinct demand points, minimizing a certain locational optimization function. In this paper, distributed, asynchronous, and scalable algorithms are presented for solving a facility location problem known as continuous n-median problem (generalized Fermat-Weber problem) via multi-agent robotic systems. The algorithms are discussed both in continuous and discrete time domain, and their validity is proved. It is also shown that the solution of this facility location problem is the set of points that are the geometric medians of their corresponding Voronoi cells  

    MEHR: multi-hop energy-aware hierarchical routing for wireless sensor networks

    , Article Proceedings of New Technologies, Mobility and Security Conference and Workshops, NTMS 2008, 5 November 2008 through 7 November 2008, Tangier ; 2008 ; 9782953244304 (ISBN) Asudeh, A ; Movaghar, A ; Sharif University of Technology
    2008
    Abstract
    Nowadays, wireless sensor networks are known as a new challenge in network science. New features of these networks have made it impossible to use the traditional routing protocols. The most important challenge of these networks is the limited energy of nodes. In this paper, we will introduce MEHR as a multi-hop location-unaware hierarchical routing protocol to decrease the energy consumption in nodes, and to increase the network lifetime, we also apply MEHR to reach to a scalable routing. We will introduce a new factor to select candidate nodes and to send intra-cluster messages. We will use place-advertisement messages of sink, and a limiting parameter and also overhearing concept to create... 

    Efficient VLSI layout of WK-recursive and WK-pyramid interconnection networks

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 123-129 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Bakhshi, S ; Sarbazi Azad, H ; Sharif University of Technology
    2008
    Abstract
    The WK-recursive mesh and WK-pyramid networks are recursively-defined hierarchical interconnection networks with excellent properties which well idealize them as alternatives for mesh and traditional pyramid interconnection topologies. They have received much attention due to their favorable attributes such as small diameter, large connectivity, and high degree of scalability and expandability. In this paper, we deal with packagibility and layout area of these networks. These properties are of great importance in the implementation of interconnection networks on chips. We show that WK-recursive, mesh-pyramid and WK-pyramid networks can be laid out in an area of O(N2) which is the optimal... 

    Modeling epidemic routing: capturing frequently visited locations while preserving scalability

    , Article IEEE Transactions on Vehicular Technology ; Volume 70, Issue 3 , 2021 , Pages 2713-2727 ; 00189545 (ISSN) Rashidi, L ; Dalili Yazdi, A ; Entezari Maleki, R ; Sousa, L ; Movaghar, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    This paper investigates the performance of epidemic routing in mobile social networks considering several communities which are frequently visited by nodes. To this end, a monolithic Stochastic Reward Net (SRN) is proposed to evaluate the delivery delay and the average number of transmissions under epidemic routing by considering skewed location visiting preferences. This model is not scalable enough, in terms of the number of nodes and frequently visited locations. In order to achieve higher scalability, the folding technique is applied to the monolithic model, and an approximate folded SRN is proposed to evaluate performance of epidemic routing. Discrete-event simulation is used to... 

    HFOS L : hyper scale fast optical switch-based data center network with L-level sub-network

    , Article Telecommunication Systems ; Volume 80, Issue 3 , 2022 , Pages 397-411 ; 10184864 (ISSN) Khani, E ; Hessabi, S ; Koohi, S ; Yan, F ; Calabretta, N ; Sharif University of Technology
    Springer  2022
    Abstract
    The ever-expanding growth of internet traffic enforces deployment of massive Data Center Networks (DCNs) supporting high performance communications. Optical switching is being studied as a promising approach to fulfill the surging requirements of large scale data centers. The tree-based optical topology limits the scalability of the interconnected network due to the limitations in the port count of optical switches and the lack of optical buffers. Alternatively, buffer-less Fast Optical Switch (FOS) was proposed to realize the nanosecond switching of optical DCNs. Although FOSs provide nanosecond optical switching, they still suffer from port count limitations to scale the DCN. To address... 

    An ultrathin amorphous defective co-doped hematite passivation layer derived via an in situ electrochemical method for durable photoelectrochemical water oxidation

    , Article Journal of Materials Chemistry A ; Volume 10, Issue 31 , 2022 , Pages 16655-16665 ; 20507488 (ISSN) Fathabadi, M ; Qorbani, M ; Sabbah, A ; Quadir, S ; Huang, C. Y ; Chen, K. H ; Chen, L. C ; Naseri, N ; Sharif University of Technology
    Royal Society of Chemistry  2022
    Abstract
    Although hematite (i.e., α-Fe2O3) has been widely investigated in photoelectrochemical water oxidation studies due to its high theoretical photocurrent density, it still suffers from serious surface charge recombination and low photoelectrochemical stability. Here we report an in situ electrochemical method to form a uniform and ultrathin (i.e., 3-5 nm) passivation layer all over the pores of an optimized ∼3.2% Ti-doped α-Fe2O3 photoanode. We unveil the amorphous and defective nature of the in situ derived layer assigned to a high concentration of oxygen vacancies and intercalated potassium atoms there, i.e., the formation of Ti/K co-doped defective α-Fe2O3−x. Owing to the efficient... 

    Reliability maximization in uncertain graphs

    , Article IEEE Transactions on Knowledge and Data Engineering ; Volume 34, Issue 2 , 2022 , Pages 894-913 ; 10414347 (ISSN) Ke, X ; Khan, A ; Al Hasan, M ; Rezvansangsari, R ; Sharif University of Technology
    IEEE Computer Society  2022
    Abstract
    Network reliability measures the probability that a target node is reachable from a source node in an uncertain graph, i.e., a graph where every edge is associated with a probability of existence. In this paper, we investigate the novel and fundamental problem of adding a small number of edges in the uncertain network for maximizing the reliability between a given pair of nodes. We study the mathbf {NP}NP-hardness and the approximation hardness of our problem, and design effective, scalable solutions. Furthermore, we consider extended versions of our problem (e.g., multiple source and target nodes can be provided as input) to support and demonstrate a wider family of queries and... 

    Requirements for automating moderation in community question-answering websites

    , Article 15th Innovations in Software Engineering Conference, ISEC 2022, 24 February 2022 through 26 February 2022 ; 2022 ; 9781450396189 (ISBN) Annamoradnejad, I ; ACM; ACM India SIGSOFT ; Sharif University of Technology
    Association for Computing Machinery  2022
    Abstract
    In recent years, community Q&A websites have attracted many users and have become reliable sources among experts from various fields. These platforms have specific rules to maintain their content quality in addition to general user agreements. Due to the vast expanse of these systems in terms of the number of users and posts, manual checking and verification of new contents by the administrators and official moderators are not feasible, and these systems require scalable solutions. In major Q&A networks, the current strategy is to use crowdsourcing with reliance on reporting systems. This strategy has serious problems, including the slow handling of violations, the loss of new and... 

    Hierarchical opto-electrical on-chip network for future multiprocessor architectures

    , Article Journal of Systems Architecture ; Volume 57, Issue 1 , 2011 , Pages 4-23 ; 13837621 (ISSN) Koohi, S ; Hessabi, S ; Sharif University of Technology
    2011
    Abstract
    Importance of power dissipation in NoCs, along with power reduction capability of on-chip optical interconnects, offers optical network-on-chip as a new technology solution for on-chip interconnects. In this paper, we extract analytical models for data transmission delay, power consumption, and energy dissipation of optical and traditional NoCs. Utilizing extracted models, we compare optical NoC with electrical one and calculate lower bound limit on the optical link length below which optical on-chip network loses its efficiency. Based on this constraint, we propose a novel hierarchical on-chip network architecture, named as H2NoC, which benefits from optical transmissions in large scale... 

    Evaluating Energy Efficiency and Scalability of Timing Channel- protection Techniques exploited Exploited for Single Chip Cloud Computer

    , M.Sc. Thesis Sharif University of Technology Asgharzadeh Donighi, Ashkan (Author) ; Hesabi, Shahin (Supervisor)
    Abstract
    Although cloud porcessors have lots of benefits, they have brought new challenges for designers; one of these issues, is information leakage through Timing Channel Attack in shared hardware resources. Among these shared resources, main memory controller is less understood. Also applying timing channel protection technquies to shared memory controller, in comparison with other parts such as NoC, caches, etc, can impose high performance overhead to system throughput. Temporal Partitioning (TP) is the baseline secure scheduling algorithm that was proposed for cope with timing channel attack in shared memory controller; but beside this protection, TP compels high performance degradation. In this... 

    A CDN Architecture to be used in SDN

    , M.Sc. Thesis Sharif University of Technology Afshar Safavi, Roohollah (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    In recent years, the usage of Internet bandwidth has been increased by emerging applications such as Video on Demand (VoD).As the popularity of VoD increases among the Internet users, some new problems like bandwidth limitations and congestion embark. For solving mentioned problems, Content Delivery Networks (CDN) has been introduced. Using CDN approaches either in ISP or organization is also known as Telco CDN. Generally implementing CDN approaches to process all requests either in ISP or organization can cause bottleneck. On the other hand, Software Defined Networks (SDN) could bring us new tools and opportunities which enables us to implement novel methods to confront these problems.... 

    High Speed CDMA Communication in Optical Network on Chip

    , M.Sc. Thesis Sharif University of Technology Abdi, Mania (Author) ; Hesabi, Shahin (Supervisor)
    Abstract
    As the number of processing cores on a single chip continues to grow, the need for a high band width, low power communication structure, will be the most important requirements of next generation chip multiprocessors. Today, a major part of power consumption in multi core architectures belongs to interconnects. Due to these facts, reducing consuming power, as well as supporting high performance, is concerned in these architectures. The concept of “network-on-chip” emerged to improve the performance of CMPs. But now a day, considering the circumstances of power budges, it’s incapable of presenting new strategies to decrease consuming power and delay. However, optical interconnects have the... 

    Analysis and Optimization of the Electronic Health System Using the Blockchain

    , M.Sc. Thesis Sharif University of Technology Javan, Reza (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    The electronic health system plays a crucial role in modern healthcare, facilitating efficient data management, secure information exchange, and improved patient care. However, existing systems often face challenges related to security, privacy, scalability, and interoperability. The primary objectives of this study are proposing a system that ensures data security, patient and peer privacy, scalability, data integrity, deniability, traceability, secure data sharing, access control, transparency, real-time monitoring, and security in the drug supply chain. To achieve these objectives, we have proposed a system that encompasses a wide range of requirements of healthcare system. To enhance... 

    Decision support-as-a-service: An energy-aware decision support service in cloud computing

    , Article IKT 2013 - 2013 5th Conference on Information and Knowledge Technology ; 2013 , Pages 71-76 ; 9781467364904 (ISBN) Rajabi, A ; Ebrahimirad, V ; Yazdani, N ; Sharif University of Technology
    2013
    Abstract
    Cloud Computing has become popular nowadays. Cloud providers with scalable infrastructures can offer cloud-based services which reduce investment of organizations and diminish most of their operational costs. Therefore, traditional services need to be renovated in the spirit of cloud environments. In this paper, Decision Support-as-a-Service (DSaaS) which is a cloud-based decision support system is introduced. The DSaaS can help managers to make fast and precise decisions. Also, the important challenges of such a system are discussed and a proper energy-aware resource allocation policy is proposed as the solution for the main challenge. A wide range of simulation results show that the policy... 

    A secure key management framework for heterogeneous wireless sensor networks

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 19 October 2011 through 21 October 2011 ; Volume 7025 LNCS , October , 2011 , Pages 18-31 ; 03029743 (ISSN) ; 9783642247118 (ISBN) Alagheband, M. R ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    A Wireless sensor network (WSN) is composed of numerous sensor nodes with both insecurely limited hardware and restricted communication capabilities. Thus WSNs suffer from some inherent weaknesses. Key management is an interesting subject in WSNs because it is the fundamental element for all security operations. A few key management models for heterogeneous sensor networks have been proposed in recent years. In this paper, we propose a new key management scheme based on elliptic curve cryptography and signcryption method for hierarchical heterogeneous WSNs. Our scheme as a secure infrastructure has superior sensor node mobility and network scalability. Furthermore, we propose both a periodic...