Loading...
Search for: farazmand--siavash
0.107 seconds

    An introductory course on differentiable manifolds

    , Book Shashahani, Siavash
    Dover Publications, Inc  2016
    Abstract
    Based on author Siavash Shahshahani's extensive teaching experience, this volume presents a thorough, rigorous course on the theory of differentiable manifolds. Geared toward advanced undergraduates and graduate students in mathematics, the treatment's prerequisites include a strong background in undergraduate mathematics, including multivariable calculus, linear algebra, elementary abstract algebra, and point set topology. More than 200 exercises offer students ample opportunity to gauge their skills and gain additional insights.
    The four-part treatment begins with a single chapter devoted to the tensor algebra of linear spaces and their mappings. Part II brings in neighboring points to... 

    FEDC: Control flow error detection and correction for embedded systems without program interruption

    , Article ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings, 4 March 2008 through 7 March 2008, Barcelona ; 2008 , Pages 33-38 ; 9780769531021 (ISBN) Farazmand, N ; Fazeli, M ; Miremadi, S. G ; Sharif University of Technology
    2008
    Abstract
    This paper proposes a new technique called CFEDC to detect and correct control flow errors (CFEs) without program interruption. The proposed technique is based on the modification of application software and minor changes in the underlying hardware. To demonstrate the effectiveness of CFEDC, it has been implemented on an OpenRISC 1200 as a case study. Analytical results for three workload programs show that this technique detects all CFEs and corrects on average about 81.6% of CFEs. These figures are achieved with zero error detection /correction latency. According to the experimental results, the overheads are generally low as compared to other techniques; the performance overhead and the... 

    Wastewater treatment technology selection using a hybrid multicriteria decision-making method

    , Article International Transactions in Operational Research ; 2021 ; 09696016 (ISSN) Salamirad, A ; Kheybari, S ; Ishizaka, A ; Farazmand, H ; Sharif University of Technology
    Blackwell Publishing Ltd  2021
    Abstract
    Various technological methods are available for industrial wastewater treatment (WWT), ranging from conventional to advanced treatment processes. It is therefore a complex exercise to select the most appropriate technology to treat the industrial wastewater in a particular situation. Many criteria can be considered in the decision-making process; therefore, multicriteria decision-making methods are especially appropriate for solving this problem. In this paper, we aim to select the most appropriate municipal WWT technology for agricultural usages. We propose a new hybrid methodology based on the best–worst method (BWM) and the behavioral technique for order of preference by similarity to the... 

    Wastewater treatment technology selection using a hybrid multicriteria decision-making method

    , Article International Transactions in Operational Research ; Volume 30, Issue 3 , 2023 , Pages 1479-1504 ; 09696016 (ISSN) Salamirad, A ; Kheybari, S ; Ishizaka, A ; Farazmand, H ; Sharif University of Technology
    John Wiley and Sons Inc  2023
    Abstract
    Various technological methods are available for industrial wastewater treatment (WWT), ranging from conventional to advanced treatment processes. It is therefore a complex exercise to select the most appropriate technology to treat the industrial wastewater in a particular situation. Many criteria can be considered in the decision-making process; therefore, multicriteria decision-making methods are especially appropriate for solving this problem. In this paper, we aim to select the most appropriate municipal WWT technology for agricultural usages. We propose a new hybrid methodology based on the best–worst method (BWM) and the behavioral technique for order of preference by similarity to the... 

    Assessment of message missing failures in FlexRay-based networks

    , Article 13th Pacific Rim International Symposium on Dependable Computing, PRDC 2007, Melbourne, VIC, 17 December 2007 through 19 December 2007 ; 2007 , Pages 191-194 ; 0769530540 (ISBN); 9780769530543 (ISBN) Lari, V ; Dehbashi, M ; Miremadi, S. G ; Farazmand, N ; Sharif University of Technology
    2007
    Abstract
    This paper assesses message missing failures in a FlexRay-based network. The assessment is based on about 35680 bit-flip fault injections inside different parts of the FlexRay communication controller; the parts are: controller host interface, protocol operation control, coding and decoding unit, media access control and clock synchronization process. To do this, a FlexRay communication controller is modeled by Verilog HDL at the behavioral level. This HDL model of the controller is exploited to setup a FlexRay-based network composed of four nodes. The results of fault injection show that about 35% of faults led to the message missing failures. The controller host interface and the clock... 

    The Evolution of a Geometric Space in in the Nineteenth Century

    , M.Sc. Thesis Sharif University of Technology Karimi, Ehsan (Author) ; Shahshahani, Siavash (Supervisor)
    Abstract
    The meaning and the nature of space and it’s essential properties seems to be one of the oldest problems which has been continuing to occupy human’s mind during centuries. It can be counted as a common ground between philosophy, mathematics, physics and even art. However this thesis concentrates on the philosophical and mathematical attitudes, neglecting the other aspects of the issue. Prima facie, it appears that the concept of space is essentially mingled with geometry, the science which seems to investigate the essentials of space. Taking it for granted, Kant regarded space, and so Euclidean geometry which dominates it, as an indispensible and necessary structure of the human’s mind.... 

    P - Adic L Functions

    , M.Sc. Thesis Sharif University of Technology Sanjari, Ali (Author) ; Shahshahani, Siavash (Supervisor)
    Abstract
    Using interpolation and starting with Bernoulli numbers, posed by Leopold and Kubota, the aspect of adic function was constructed as adic analogues of the Dirichlet functions.Studing Galois module theory of ideal class group and his favorite structure extensions and modules related to them,Iwasawa found a new method for constructing adic functions by using Stickelberger’s elements.These results wich established by Iwasawa are known as Iwasawa Theory and they have many application in Algebriac Number Theory. Iwasawa’s most remarkable disconvry is the facet that at least in some important cases, there is a similar deep algebraic and analytic dichotomy in arithmetic of extensions. A... 

    A solution to single point of failure using voter replication and disagreement detection

    , Article 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2006, Indianapolis, IN, 29 September 2006 through 1 October 2006 ; 2006 , Pages 171-176 ; 0769525393 (ISBN); 9780769525396 (ISBN) Patooghy, A ; Miremadi, S. Gh ; Javadtalab, A ; Fazeli, M ; Farazmand, N ; Sharif University of Technology
    2006
    Abstract
    This paper suggests a method, called distributed voting, to overcome the problem of the single point of failure in a TMR system used in robotics and industrial control applications. It uses time redundancy and is based on TMR with disagreement detector feature. This method masks faults occurring in the voter where the TMR system can continue its function properly. The method has been evaluated by injecting faults into Vertex2Pro and Vertex4 Xilinx FPGAs. An analytical evolution is also performed. The results of both evaluation approaches show that the proposed method can improve the reliability and the mean time to failure (MTTF) of a TMR system by at least a factor of (2-R v(t)) where Rv(t)... 

    Exploiting structural information of data in active learning

    , Article Artificial Intelligence and Soft Computing: Lecture Notes in Computer Science ; Volume 8468 LNAI, Issue PART 2 , 2014 , Pages 796-808 Shadloo, Maryam ; Beigy, Hamid ; Haghiri, Siavash ; Sharif University of Technology
    2014
    Abstract
    In recent years, the active learning algorithms have focused on combining correlation criterion and uncertainty criterion for evaluating instances. Although these criteria might be useful, applying these measures on whole input space globally may lead to inefficient selected instances for active learning. The proposed method takes advantage of clustering to partition input space to subspaces. Then it exploits both labeled and unlabeled data locally for selection of instances by using a graph-based active learning. We define a novel utility score for selecting clusters by combining uncertainty criterion, local entropy of clusters and the factor of contribution of each cluster in queries.... 

    A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration

    , M.Sc. Thesis Sharif University of Technology Shekofteh, Nastaran (Author) ; Bayat-Sarmadi, Siavash (Supervisor)
    Abstract
    Hardware Trojans have emerged as a major concern for integrated circuits in recent years. As a result, detecting Trojans has become an important issue in critical applications, such as finance and health. In this work, a trusted platform for detecting Trojans in FPGA bitstreams is presented. The proposed methodology takes advantage of increased Trojan activation, caused by transition aware partitioning of the circuit, while it benefits partial reconfiguration feature of FPGAs to reduce area overhead. Simulation results, performed for the transition probability thresholds of 〖10〗^(-4) and 〖2×10〗^(-5), show that this method increases the ratio of the number of transitions in the Trojan... 

    Performance Evaluation of Physical Unclonable Functions and Proposing a Scheme on FPGA

    , M.Sc. Thesis Sharif University of Technology Ramezani, Alireza (Author) ; Bayat-Sarmadi, Siavash (Supervisor)
    Abstract
    In recent years, in addition to traditional cryptographic blocks, a hardware blocks in this work namely PUF, has been used mostly for chip ID generation, authentication and so on. In this work we study recent proposed PUFs and their implementations on FPGA, and the measurement of quality metrics on them. Some of most important characteristics of PUFs are unpredictability, reliability, number of challenge response pairs and area. According to experiments that have been performed in this study and also according to previous work, one high-quality PUF in term of uniqueness and reliability is Ring Oscillator PUF. However, the disadvantage of this PUF is small number of challenge and response... 

    Increasing BIOS Trust in Personal Computers Using Reconfigurable Devices

    , M.Sc. Thesis Sharif University of Technology Eslampanah, Marziye (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    Due to the expansion of digital system threats, trusted computation with a new approach for countering such threats has emerged. This approach is based on using a hardware module for implementing a trusted platform (TPM). TPM includes a chipset and the trusted systems core. Nowadays many of mobile computers do include this technology. This hardware creates trust using a trust chain and expanding this trust to other parts of the system. The starting point in this chain is the computer BIOS. BIOS is the first code that the system usually executes. One of the most powerful recent attacks on computer systems is to infect the BIOS and other firmware. One of such complicated attacks is the rootkit... 

    Efficient Implementation of Post-Quantum Cryptography Based on Learning with Errors

    , Ph.D. Dissertation Sharif University of Technology Ebrahimi, Shahriar (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    Public key encryption (PKE) cryptography plays a big role in securing communication channels of internet. The security of every PKE scheme is usually based on a hard problem that has no polynomial time solution using any computational structure. However, widely used classic PKE schemes such as RSA or ECC, are based on hard problems that have polynomial solutions using a quantum computer. Therefore, such PKE schemes will not be secure in post-quantum era. Among quantum-resistant schemes, lattice-based cryptography and especially learning with errors (LWE) problem have gained high attention due to their low computational complexity. In this thesis, different LWE-based cryptosystems are... 

    Hardware Acceleration of Convolutional Neural Networks by Computational Prediction

    , M.Sc. Thesis Sharif University of Technology Sajjadi, Pegahsadat (Author) ; Bayatsarmadi, Siavash (Supervisor)
    Abstract
    Recently, Convolutional neural networks (CNNs) are widely used in many artificial intelligence applications such as image processing, speech processing and robotics. The neural networks superior accuracy comes at the cost of high computational complexity. Recent studies show that these operations can be performed in parallel. Therefore, as graphic processing units (GPUs) offer the best performance in terms of computational power and throughput, they are widely used to implement and accelerate neural networks. Nevertheless, the high price and power consumption of these processors have resulted in drawing more attraction towards Field-Programmable Arrays (FPGAs). In order to improve resource... 

    Implementation of an IoT Edge Computing Module in Compliance with TPM Standards

    , M.Sc. Thesis Sharif University of Technology Hasanizadeh, Parisa (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    Cloud computing has a significant role in expanding applications of the Internet of Things (IoT). Currently, applications such as virtual reality and augmented reality require low latency, which is not achievable using traditional cloud computing in some scenarios. Edge computing is a new approach in IoT, which solves some of the limitations of the cloud computing by extending and developing its operations. Reducing response time and network traffic are some of the most important achievements of edge computing. Despite of its numerous advantages over cloud computing, edge computing faces serious challenges such as virtualization, implementation infrastructure, resource allocation and task... 

    Improving Remote Attestation Techniques for IoT Devices using Physical Model

    , M.Sc. Thesis Sharif University of Technology Salehi, Mohsen (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    Due to the widespread growth in the use of IoT devices, authors consider these devices as an attractive target platform. Several approaches have been proposed to defend IoT devices against various attacks. However, most of them suffer from some shortcomings such as being computationally expensive, not being general, or not being robust enough.Due to the attacks such as firmware modification and the existence of computational limitations, the use of local approaches is inefficient. Another approach is to use remote attestation techniques, which are divided into two categories, static and dynamic. However, static detection techniques are vulnerable to runtime attacks. Furthermore, existing... 

    Customizing a Privacy-Preserving Blockchain-Based Distributed Ledger for Second-Price Auction Smart Contract

    , M.Sc. Thesis Sharif University of Technology Mirzaei, Amir (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    A distributed ledger is a method of digital data storage and sharing in different places, and the blockchain technology is a way of implementing a distributed ledger. This technology has been employed in many of the cryptocurrencies like Ethereum to store transactions. In addition to storing transactions, Ethereum deploys scripts called smart contracts that are automatically executable. These scripts execute transparently and without preserving the privacy of participants. On the other hand, confidentiality and privacy are among the important components in data, network, and system security. Models such as Hawk and Enigma have been presented to obtain privacy-preserving in smart contracts;... 

    Network Traffic Reduction in Internet of Things Using Reconfigurable Cache based on Workload Characterization

    , M.Sc. Thesis Sharif University of Technology Rezaei, Rezvan (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    Nowadays, with the advancement of internet of things, The number of nodes within the network has increased and there is huge traffic in these networks despite the small volume of data sent and received each node. The current architecture of the Internet network does not have the functionality required for Internet of things, as a result of designing a new architecture for Internet - based Internet of things. Content - based network is a new architecture introduced to the Internet, and its purpose is to change the network from host-centric to content-centric. One of the features of content-based networks is the use of in network caching that helps increase productivity and reduce the traffic... 

    Implementation of Remote Attestation Mechanism on Internet of Things End-Nodes using TPM

    , M.Sc. Thesis Sharif University of Technology Daghlavi, Khaled (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    Today Internet of Things (IoT) applications are growing rapidly around us and alongside this trend, the topics of security and trust in this field are getting more serious. A big part of this field is composed of embedded systems. Remote attestation is a prominent security option in regards of attesting to the integrity of these type of systems and consequently establishing trust remotely. Remote attestation has been an active field of research to attest different type of systems against various types of threats. A noteworthy security hardware, enabling this type of process, is the Trusted Platform Module (TPM). Incorporating this chip in traditional personal computers for security purposes... 

    Low-Latency Cloud Gaming Using Task Offloading and Resource Allocation in Mobile Edge Networks

    , M.Sc. Thesis Sharif University of Technology Ghorbanny, Behzad (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    The video game industry has turned into one of the most remunerative entertainment industries amongst multimedia applications. The development of cloud-based services in recent years, has also turned cloud gaming in the form of ``gaming as a service'' into one of the most intriguing novel applications. In previous works, it has been shown that the employment of servers closer to the users in providing cloud gaming services could greatly enhance users' quality of experience, reduce network core congestion, and improve quality of service metrics. In this research, task offloading and resource allocation optimization for providing cloud gaming using edge computing has been investigated in newer...