Loading...
Search for: spreading
0.008 seconds
Total 178 records

    Solving Delayed SIRS Meanfield Model on Homogeneous Networks

    , M.Sc. Thesis Sharif University of Technology Saeedghalati, Mohammad Karim (Author) ; Ejtehadi, Mohammad Reza (Supervisor)
    Abstract
    In this work we simulate SIRS1 model on homogeneous networks by means of simulation, then we drove meanfield equations for this model and compared the solution of these equations to the simulations results on the network. To obtain a new model closer to the reality, we modified the SIRS model and introduce history to the convenient model. After simulation of this model we redrove the equations with history and found that this model can show bifurcation so we found the phase diagram for this model. And in the last part we introduced history to a meanfield model with pair approximation and drove the equations and try to solve
    them numerically.
     

    A new immunization algorithm based on spectral properties for complex networks

    , Article 2015 7th Conference on Information and Knowledge Technology, IKT 2015, 26 May 2015 through 28 May 2015 ; May , 2015 , Page(s): 1 - 5 ; 9781467374859 (ISBN) Zahedi, R ; Khansari, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Nowadays, we are facing epidemic spreading in many different areas; examples are infection propagation, rumor spreading and computer viruses in computer networks. Finding a strategy to control and mitigate the spread of these epidemics is gaining much interest in recent researches. Due to limitation of immunization resources, it is important to establish a strategy for selecting nodes which has the most effect in mitigating epidemics. In this paper, we propose a new algorithm that minimizes the worst expected growth of an epidemic by reducing the size of the largest connected component of the underlying contact network. The proposed algorithm is applicable to any level of available resources... 

    Covert communications through mobile voice channels

    , Article IET Information Security ; Volume 10, Issue 3 , 2016 , Pages 156-164 ; 17518709 (ISSN) Kazemi, R ; Rezaei, R ; Akhaee, M. A ; Behnia, F ; Sharif University of Technology
    Institution of Engineering and Technology  2016
    Abstract
    The rapid development and growth of cellular mobile networks in recent years has made voice channels widely available almost everywhere. On the other hand, voice dedicated channels possess properties that make them ideal options for high priority real-time secure communications. Beside these realities, information embedding has gained remarkable attention in recent years due to its potential application in multimedia security. In this regard, this study aims to propose an efficient scheme for data hiding to show the feasibility of exploiting these channels for covert communications. To this end, the authors propose new suboptimal but practical schemes based on additive and multiplicative... 

    Prediction of lateral spreading displacement on gently sloping liquefiable ground

    , Article Geotechnical Frontiers 2017, 12 March 2017 through 15 March 2017 ; Issue GSP 281 , 2017 , Pages 267-276 ; 08950563 (ISSN) Ghasemi Fare, O ; Pak, A ; Geo-Institute (G-I) of the American Society of Civil Engineers; Industrial Fabrics Association International (IFAI) ; Sharif University of Technology
    American Society of Civil Engineers (ASCE)  2017
    Abstract
    A fully coupled numerical analysis using Biot's theory with u-p formulation considering variable permeability during liquefaction is used in this study to simulate liquefaction induced lateral spreading phenomenon. A centrifuge test performed on liquefiable soil at Rensselaer Polytechnic Institute is simulated using the developed model. The numerical results are in good agreement with experimental observations. A number of numerical simulations under different geometric, site-specific, and ground acceleration parameters have been carried out in the course of this study. Based on the statistical analysis conducted on the results of 31 different models, a new relation is proposed for... 

    Errorless codes for over-loaded CDMA with active user detection

    , Article 2009 IEEE International Conference on Communications, ICC 2009, Dresden, 14 June 2009 through 18 June 2009 ; 2009 ; 05361486 (ISSN); 9781424434350 (ISBN) Pad, P ; Soltanolkotabi, M ; Hadikhanlou, S ; Enayati, A ; Marvasti, F ; Sharif University of Technology
    2009
    Abstract
    In this paper we introduce a new class of codes for over-loaded synchronous wireless CDMA systems which increases the number of users for a fixed number of chips without introducing any errors. In addition these codes support active user detection. We derive an upper bound on the number of users with a fixed spreading factor. Also we propose an ML decoder for a subclass of these codes that is computationally implementable. Although for our simulations we consider a scenario that is worse than what occurs in practice, simulation results indicate that this coding/decoding scheme is robust against additive noise. As an example, for 64 chips and 88 users we propose a coding/decoding scheme that... 

    Inter-symbol-interference reduction in indoor infrared systems by effective sampling

    , Article Proceedings - 2009 International Conference on Future Computer and Communication, ICFCC 2009, 3 April 2009 through 5 April 2009, Kuala Lumpar ; 2009 , Pages 42-46 ; 9780769535913 (ISBN) Hassanzadeh, M. R ; Mansouri Rad, M. M ; Sharif University of Technology
    2009
    Abstract
    A new and simple receiver structure for reducing the multipath inter-symbole interference (ISI) effect is proposed for infrared diffuse links. In this new method, bit-error rate (BER) performance of the system will be improved significantly without any essential change in the receiver structure. In our analysis, all major noise sources such as ambient light, signal shotnoise, dark current and thermal noise of the receiver are considered. © 2009 IEEE  

    Real-Time IDS using reinforcement learning

    , Article 2008 2nd International Symposium on Intelligent Information Technology Application, IITA 2008, Shanghai, 21 December 2008 through 22 December 2008 ; Volume 2 , January , 2008 , Pages 593-597 ; 9780769534978 (ISBN) Sagha, H ; Bagheri Shouraki, S ; Hosein, K ; Mahdi, D ; Sharif University of Technology
    2008
    Abstract
    In this paper we proposed a new real-time learning method. The engine of this method is a fuzzy-modeling technique which is called ink drop spread (IDS). IDS method has good convergence and is very simple and away from complex formula. The proposed method uses a reinforcement learning approach by an actor-critic system similar to Generalized Approximate Reasoning based Intelligent Control (GARIC) structure to adapt the IDS by delayed reinforcement signals. Our system uses Temporal Difference (TD) learning to model the behavior of useful actions of a control system. It is shown that the system can adapt itself, commencing with random actions. © 2008 IEEE  

    Genetic ink drop spread

    , Article 2008 2nd International Symposium on Intelligent Information Technology Application, IITA 2008, Shanghai, 21 December 2008 through 22 December 2008 ; Volume 2 , January , 2008 , Pages 603-607 ; 9780769534978 (ISBN) Sagha, H ; Shouraki, S. B ; Beigy, H ; Khasteh, H ; Enayati, E ; Sharif University of Technology
    2008
    Abstract
    This paper describes a genetic-fuzzy system adapted to find efficient partitions on data domains for IDS (Ink Drop Spread). IDS is the engine of Active Learning Method (ALM), a methodology of soft computing. IDS extracts useful information from a system subjected to modeling. Proposed method, called GIDS (Genetic IDS), uses genetic algorithm which optimizes the parameters of membership functions that represent the partitions on data planes. Obtained Results showed that using genetic algorithm to find the partitions has better accuracy than the previous generic IDS methods. © 2008 IEEE  

    Sensitivity analysis of coherent ultrashort light pulse CDMA communication system with respect to dispersion

    , Article Optical Transmission, Switching, and Subsystems V, Wuhan, 2 November 2007 through 5 November 2007 ; Volume 6783 , 2007 ; 0277786X (ISSN); 9780819469465 (ISBN) Ataie, V ; Jamshidi, K ; Salehi, J. A ; Sharif University of Technology
    2007
    Abstract
    In this paper, we analyze the sensitivity degradation of a system due to various orders of chromatic dispersion. To do this, the power penalty of the uncoded and encoded pulse of a coherent ultrashort light pulse Code Division Multiple Access (CDMA) communication system due to various orders of chromatic dispersions are analyzed. Analysis of uncoded pulse shows that the power penalty is unacceptably high when second order dispersion is not compensated. However we can obtain acceptable level of power penalties while compensating second and third order dispersion. Also, due to the high order of dispersion, the power of encoded pulse decreases as it propagates through the fiber which leads to a... 

    An internally coded time-hopping spread-time CDMA scheme for UWB systems and its performance analysis

    , Article 2007 IEEE Radio and Wireless Symposium, RWS, Long Beach, CA, 9 January 2007 through 11 January 2007 ; 2007 , Pages 511-514 ; 9781424404452(ISBN) Ghani Shayesteh, M ; Nasiri Kenari, M ; Sharif University of Technology
    2007
    Abstract
    We consider an internally coded multiple access technique for Ultra Wide-Band systems which combines time-hopping (TH) and spread-time (ST) techniques using a super-orthogonal encoder. In this method, the duration of each bit is divided into Ns frames. The outputs of a superorthogonal encoder and a PN sequence specify the frame number, in which the data is transmitted in spread-time CDMA form using the second PN sequence. We consider soft decision before Viterbi decoding at the receiver. We obtain the performance of the proposed method. We also consider the uncoded ST-CDMA system and compare its performance with our method. The results indicate that our method has much more better... 

    A Neuro-Fuzzy model for prediction of liquefaction-induced lateral spreading

    , Article 8th US National Conference on Earthquake Engineering 2006, San Francisco, CA, 18 April 2006 through 22 April 2006 ; Volume 13 , 2006 , Pages 8001-8008 ; 9781615670444 (ISBN) Haeri, S. M ; Khalili, A ; Sadati, N ; Sharif University of Technology
    2006
    Abstract
    Lateral spreading generated by earthquake induced liquefaction, is a major cause for significant damage to the engineered structures, during earthquakes. Knowing the amount of displacement which is likely to occur due to the lateral spreading, will lead to better construction policies, and will reduce unexpected damages. A Neuro-Fuzzy model based on subtractive clustering is developed to predict the amount of lateral spreading expected to occur due to an earthquake. A large database containing the case histories of observed lateral spreading during seven major earthquakes of the past is used for training and evaluating the models. The results of this study show that Neuro-Fuzzy method serves... 

    An experimental investigation on the deformation behavior during wire flat rolling process

    , Article Journal of Materials Processing Technology ; Volume 160, Issue 3 , 2005 , Pages 313-320 ; 09240136 (ISSN) Kazeminezhad, M ; Karimi Taheri, A ; Sharif University of Technology
    2005
    Abstract
    In the present study a laboratory flat rolling machine is utilized to assess the deformation behavior of low and high carbon steel wires in wire flat rolling process. The effects of friction coefficient, rolling reduction and roll speed on rolling force and deformation behavior of the wires are experimentally investigated. It is found that the roll speed affects considerably the rolling force but a negligible effect on deformation behavior. It is noted that by increasing the roll speed, the rolling force may decrease or increase depending on the magnitude of the roll speed. Also, the deformation behavior of the wires in flat rolling is formulated. A relationship is developed for calculating... 

    Traffic aware dynamic node scheduling for power efficient sensor networks

    , Article 2004 Intelligent Sensors, Sensor Networks and Information Processing Conference, ISSNIP '04, Melbourne, 14 December 2004 through 17 December 2004 ; 2004 , Pages 37-42 ; 0780388933 (ISBN); 9780780388932 (ISBN) Ghannad Rezaie, M ; Shah Mansouri, V ; Pakravan, M. R ; Sharif University of Technology
    2004
    Abstract
    This paper proposes a new medium-access control (MAC) protocol designed for wireless sensor networks. A wireless sensor network is an array of large number of sensors interconnected by a multi-hop ad-hoc network. The primary objective for the sensor network is achieving to low-power consumption while latency is usually less important compare to traditional wireless networks. This characteristic of sensor network motivates the design of new MAC layer so that power consumption is reduced. In this paper, a novel traffic-aware algorithm based on distributed node schedule management (DMD) protocol is introduced that utilizes distributed dynamic node scheduling strategy to dramatically increase... 

    The Dynamic and the Geometry of Disease Outbreaks by Redefining the Effective Distance

    , M.Sc. Thesis Sharif University of Technology Babazadeh Maghsoodlo, Yazdan (Author) ; Ghanbarnejad, Fakhteh (Supervisor)
    Abstract
    An infectious disease can spread through different communities via mobility networks. In this study we address three basic questions related to this matter in the meta-population approximation: firstly, where did the disease start? Secondly, when did the disease start? Thirdly, how does it spread in the network? To answer these questions, we introduce a generic mathematical framework with appropriate physical assumptions and study the spread of diseases. Then, with analytical solutions, we bring up different algorithms in order to answer these three questions. Using these algorithms, we redefine the effective distance and arriving time and unveil the simple geometry of the disease outbreak  

    Narrowband Interference Cancellation in Wireless Ultra Wideband Communication Systems via Three-Level Spread Time Codes

    , Ph.D. Dissertation Sharif University of Technology Mashhadi, Saeed (Author) ; Salehi, Javad (Supervisor)
    Abstract
    Achieving various data rates over a wide range of applications and in a multiple-access scenario should be done under certain power and bandwidth constraints. Emerging UWB communications has opened a novel perspective against different wireless network challenges, especially overwhelming data rates. In the research field, we begin our thesis with exposition of UWB, narrowband interference and spread time codes. We elaborate on the properties of spread time codes through frequency domain analysis of a reusable multiple-access scheme. Evaluating the variance of ISI, MAI and RUI, we demonstrate the spread time codes behave in an optimum manner, i.e., the most RUI resistibility, along with all... 

    A novel inference algorithm for active Learning method

    , Article 1st Iranian Conference on Pattern Recognition and Image Analysis ; 2013 ; 9781467362047 (ISBN) Afrakoti, I. E. P ; Shouraki, S. B ; Ghaffari, A ; Sharif University of Technology
    2013
    Abstract
    This paper presents a new inference algorithm for Active Learning Method (ALM). ALM is a pattern-based algorithm for soft computing which uses the Ink Drop Spread (IDS) algorithm as its main engine for feature extraction. In this paper a fuzzy number is extracted from each IDS plane rather than the narrow path and spread as in previous approaches. In order to compare performance of the proposed algorithm with the original one, two functions which are widely used in literature are modeled as the benchmark. Simulation results show that the proposed algorithm is as effective as previous one in the modeling task  

    Multiple jammer cancelation in spectrally-encoded spread-time asynchronous CDMA system: Matched & partially-matched schemes

    , Article 2012 19th International Conference on Telecommunications, ICT 2012, 23 April 2012 through 25 April 2012, Jounieh ; 2012 ; 9781467307475 (ISBN) Akhoondi, F ; Mashhadi, S ; Sharif University of Technology
    IEEE  2012
    Abstract
    In this paper, we study and analyze the performance of matched and partially-matched receivers for a typical ultra wide-band Spectrally-Encoded Spread-Time (SE/ST) CDMA in the presence of multiple tone jammers. We investigate a scenario where there is no information about the jammer frequencies in the transmitter side while it is desirable to cancel it in the receiver side. We will demonstrate the performance of the SE/ST system would be improved through partially matched filter at the receiver. In addition, we approximate the two-dimensional RAKE receiver by a simple one-dimensional RAKE for the scenario where there are K asynchronous users. Furthermore, closed form formula for the... 

    Response of a group of piles to liquefaction-induced lateral spreading by large scale shake table testing

    , Article Soil Dynamics and Earthquake Engineering ; Volume 38 , 2012 , Pages 25-45 ; 02677261 (ISSN) Haeri, S. M ; Kavand, A ; Rahmani, I ; Torabi, H ; Sharif University of Technology
    2012
    Abstract
    Liquefaction-induced lateral spreading has imposed severe damages to many important structures supported on pile foundations during past earthquakes. As a result, evaluation of pile response to lateral spreading is an important step towards safe and resistant design of pile foundations against this destructive phenomenon. Current paper aims to study the response of a group of piles subjected to liquefaction-induced lateral spreading using a large scale 1-g shake table test. General test results including time-histories of accelerations, pore water pressures, displacements and bending moments are presented and discussed in this paper. In addition, distribution of lateral soil pressure on... 

    A content-based digital image watermarking algorithm robust against JPEG compression

    , Article IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2011, 14 December 2011 through 17 December 2011 ; Dec , 2011 , Pages 432-437 ; 9781467307529 (ISBN) Najafi, A ; Siahkoohi, A ; Shamsollahi, M. B ; Sharif University of Technology
    Abstract
    Watermarking (imperceptible insertion of data into the host image or soundtracks) has attracted many research interests in the recent decade. The aim of this correspondence is to introduce a none-blind, content-based method for image watermarking. It employs properties of Human Visual System (HVS) and is capable of embedding a high-energy watermark (consequently robust against lossy compressions and other kinds of attacks) while prevents perceptible degradation in the host image. To modulate the binary coded watermark on a spread-spectrum noise, the introduced algorithm is followed by spread-spectrum watermarking. The algorithm was simulated and experimental results represent magnificent... 

    Memristor crossbar-based hardware implementation of the IDS method

    , Article IEEE Transactions on Fuzzy Systems ; Volume 19, Issue 6 , Dec , 2011 , Pages 1083-1096 ; 10636706 (ISSN) Merrikh Bayat, F ; Shouraki, S. B ; Rohani, A ; Sharif University of Technology
    2011
    Abstract
    Ink drop spread (IDS) is the engine of an active learning method, which is the methodology of soft computing. IDS, as a pattern-based processing unit, extracts useful information from a system that is subjected to modeling. In spite of its excellent potential to solve problems such as classification and modeling compared with other soft-computing tools, finding its simple and fast hardware implementation is still a challenge. This paper describes a new hardware implementation of the IDS method that is based on the memristor crossbar structure. In addition to simplicity, being completely real time, having low latency, and the ability to continue working properly after the occurrence of power...