Loading...
Search for:
miremadi--a--r
0.198 seconds
Total 18927 records
A low-cost fault-tolerant technique for carry look-ahead adder
, Article 2009 15th IEEE International On-Line Testing Symposium, IOLTS 2009, Sesimbra-Lisbon, 24 June 2009 through 26 June 2009 ; 2009 , Pages 217-222 ; 9781424445950 (ISBN) ; Sedaghat, Y ; Miremadi, G ; Ejlali, A. R ; Sharif University of Technology
2009
Abstract
This paper proposes a low-cost fault-tolerant Carry Look-Ahead (CLA) adder which consumes much less power and area overheads in comparison with other fault-tolerant CLA adders. Analytical and experimental results show that this adder corrects all single-bit and multiple-bit transient faults. The Power-Delay Product (PDP) and area overheads of this technique are decreased at least 82% and 71%, respectively, as compared to adders which use traditional TMR, parity prediction, and duplication techniques. © 2009 IEEE
Misbehavior resilient multi-path data transmission in mobile ad-hoc networks
, Article 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06, Alexandria, VA, 30 October 2006 through 30 October 2006 ; 2006 , Pages 91-100 ; 1595935541 (ISBN); 9781595935540 (ISBN) ; Rabiee, H. R ; Miremadi, G ; Khonsari, A ; Sharif University of Technology
2006
Abstract
This paper introduces Adaptive Path Selection and Loading (APSL) as a multi-path data transmission scheme for mitigating the effects of misbehaving nodes in mobile ad-hoc networks. In APSL, misbehavior resilience is achieved by adaptively loading Reed-Solomon (RS) coded data into multiple node-disjoint paths. In order to maximize packet delivery ratio, paths are loaded according to Path State Information (PSI) which dynamically estimates the availability and stability of each path. We evaluated APSL through simulation in terms of packet delivery ratio, normalized average end-to-end delay and overhead. APSL can achieve more than 90% packet delivery ratio. Compared to adaptive single path and...
Performance evaluation of a routing protocol for wireless sensor networks
, Article 2006 IFIP International Conference on Wireless and Optical Communications Networks, Bangalore, 11 April 2006 through 13 April 2006 ; 2006 ; 1424403405 (ISBN); 9781424403400 (ISBN) ; Fazeli, M ; Patooghy, A ; Miremadi, S. G ; Sharif University of Technology
IEEE Computer Society
2006
Abstract
A wireless sensor network with a large number of small sensor nodes can be used as an effective tool for gathering data in various situations. Energy is a critical resource in wireless sensor networks and system lifetime needs to be prolonged through the use of energy-aware strategies during system operation. Routing protocols in WSNs might differ depending on the application and network architecture. Many routing protocols have been specifically designed for WSNs where energy awareness is an essential design issue. The aim of this paper is to evaluate the efficiency of a routing protocol named directed flooding which is a fault-tolerant and energy efficient routing protocol for wireless...
Reliability of protecting techniques used in fault-tolerant Cache memories
, Article Canadian Conference on Electrical and Computer Engineering 2005, Saskatoon, SK, 1 May 2005 through 4 May 2005 ; Volume 2005 , 2005 , Pages 820-823 ; 08407789 (ISSN) ; Zarandi, H. R ; Sharif University of Technology
2005
Abstract
This paper analyzes the problem of transient-error recovery of several protecting techniques used in fault-tolerant cache memories. In this paper, reliability and mean-time-to-failure (MTTF) equations for several protecting techniques are derived and estimated. The results of the considered techniques are compared with those of cache memories without redundancies and with only parity codes in both tag and data arrays of caches. Depending on the error rate under which a cache memory will operate, and the size of the cache memory, one of the analyzed cases could be used. If the transient-error rate is very small or the size of cache memory is relatively small, then a protected with only single...
Challenges in trust and security by implementation of E-CRM among banks and financial institution: A case study of e-banking in iran"
, Article International Journal of Information Science and Management ; Volume 10, Issue SPL.ISSUE , 2012 , Pages 99-118 ; 20088302 (ISSN) ; Ghalamakri, S ; Ramezani, A. A ; Sharif University of Technology
2012
Abstract
The advancement in technology, information and communication has forced banks and financial institutions into hard competition. In this new era technology, people and customer are the elements which the banks are concentrating on them to manage customer relationship and success of banking in customer satisfaction. Electronic customer relationship management (e-CRM) is seen to arise from the consolidation of traditional CRM with the e-business applications marketplace and has created a flurry of activity among companies. The purpose of this study is to examine the competitive advantages on e-CRM in financial institutions and banks and obtain better understanding of the e-CRM benefits. A...
Switch level fault emulation
, Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 2778 , 2003 , Pages 849-858 ; 03029743 (ISSN); 3540408223 (ISBN); 9783540408222 (ISBN) ; Ejlali, A ; Sharif University of Technology
Springer Verlag
2003
Abstract
The switch level is an abstraction level between the gate level and the electrical level, offers many advantages. Switch level simulators can reliably model many important phenomena in CMOS circuits, such as bi-directional signal propagation, charge sharing and variations in driving strength. However, the fault simulation of switch level models is more time-consuming than gate level models. This paper presents a method for fast fault emulation of switch level circuits using FPGA chips. In this method, gates model switch level circuits and we can emulate mixed gate-switch level models. By the use of this method, FPGA chips can be used to accelerate the fault injection campaigns into switch...
Error detection enhancement in PowerPC architecture-based embedded processors
, Article Journal of Electronic Testing: Theory and Applications (JETTA) ; Volume 24, Issue 1-3 , 2008 , Pages 21-33 ; 09238174 (ISSN) ; Farivar, R ; Miremadi, S. G ; Sharif University of Technology
2008
Abstract
This paper presents a behavior-based error detection technique called Control Flow Checking using Branch Trace Exceptions for PowerPC processors family (CFCBTE). This technique is based on the branch trace exception feature available in the PowerPC processors family for debugging purposes. This technique traces the target addresses of program branches at run-time and compares them with reference target addresses to detect possible violations caused by transient faults. The reference target addresses are derived by a preprocessor from the source program. To enhance the error detection coverage, three other mechanisms, i.e., Machine Check Exception, System Trap Instructions and Work Load Timer...
An energy efficient circuit level technique to protect register file from MBUs and SETs in embedded processors
, Article Proceedings of the International Conference on Dependable Systems and Networks, 29 June 2009 through 2 July 2009, Lisbon ; 2009 , Pages 195-204 ; 9781424444212 (ISBN) ; Namazi, A ; Miremadi, S.G ; Sharif University of Technology
2009
Abstract
This paper presents a circuit level soft error-tolerant-technique, called RRC (Robust Register Caching), for the register file of embedded processors. The basic idea behind the RRC is to effectively cache the most vulnerable registers in a small highly robust register cache built by circuit level SEU and SET protected memory cells. To decide which cache entry should be replaced, the average number of read operations during a register ACE time is used as a criterion to judge. In fact, the victim cache entry is one which has the maximum read count. To minimize the power overhead of the RRC, the clock gating technique is efficiently exploited for the main register file resulting in...
A fast, flexible, and easy-to-develop FPGA-based fault injection technique
, Article Microelectronics Reliability ; Volume 54, Issue 5 , May , 2014 , Pages 1000-1008 ; ISSN: 00262714 ; Mohammadi, A ; Ejlali, A ; Miremadi, S. G ; Sharif University of Technology
2014
Abstract
By technology down scaling in nowadays digital circuits, their sensitivity to radiation effects increases, making the occurrence of soft errors more probable. As a consequence, soft error rate estimation of complex circuits such as processors is becoming an important issue in safety- and mission-critical applications. Fault injection is a well-known and widely used approach for soft error rate estimation. Development of previous FPGA-based fault injection techniques is very time consuming mainly because they do not adequately exploit supplementary FPGA tools. This paper proposes an easy-to-develop and flexible FPGA-based fault injection technique. This technique utilizes debugging facilities...
Operand Width Aware Hardware Reuse: A low cost fault-tolerant approach to ALU design in embedded processors
, Article Microelectronics Reliability ; Volume 51, Issue 12 , December , 2011 , Pages 2374-2387 ; 00262714 (ISSN) ; Namazi, A ; Miremadi, S. G ; Haghdoost, A ; Sharif University of Technology
2011
Abstract
This paper presents a low cost fault-tolerant technique so called OWHR (Operand Width Aware Hardware Reuse) to ALU design in embedded processors. The OWHR technique is motivated by two facts: (1) Many of the produced and consumed values are narrow-width values in the embedded processors, i.e. they have leading zeros or ones in their most significant bits. This indicates that only a fraction of the circuit is performing useful operations when a particular arithmetic or logic circuit in the ALU is operating on narrow-width values; (2) other circuits of the ALU are not used, when a particular arithmetic or logic circuit is being utilized to perform a specific operation in the ALU in the...
Feedback redundancy: A power efficient SEU-tolerant latch design for deep sub-micron technologies
, Article 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, Edinburgh, 25 June 2007 through 28 June 2007 ; 2007 , Pages 276-285 ; 0769528554 (ISBN); 9780769528557 (ISBN) ; Patooghy, A ; Miremadi, S. G ; Ejlali, A ; Sharif University of Technology
2007
Abstract
The continuous decrease in CMOS technology feature size increases the susceptibility of such circuits to single event upsets (SEU) caused by the impact of particle strikes on system flip flops. This paper presents a novel SEU-tolerant latch where redundant feedback lines are used to mask the effects of SEUs. The power dissipation, area, reliability, and propagation delay of the presented SEU-tolerant latch are analyzed by SPICE simulations. The results show that this latch consumes about 50% less power and occupies 42% less area than a TMR-latch. However, the reliability and the propagation delay of the proposed latch are still the same as the TMR-latch. the reliability of the proposed latch...
Numeral-based crosstalk avoidance coding to reliable NoC design
, Article Proceedings - 2011 14th Euromicro Conference on Digital System Design: Architectures, Methods and Tools, DSD 2011 ; 2011 , Pages 55-62 ; 9780769544946 (ISBN) ; Patooghy, A ; Miremadi, S. G ; Sharif University of Technology
2011
Abstract
This paper proposes a Numeral-Based Crosstalk Avoidance Coding (NB-CAC) to protect communication channels of Network-on-Chips (NoCs) against crosstalk faults. The NB-CAC scheme produces codewords without bit patterns '101' and '010' to eliminate harmful transition patterns from NoC channels. This is done by the use of a new numeral system proposed in the paper. Using the proposed numeral system, the NB-CAC scheme 1) can be utilized in NoC channels with any arbitrary width, and 2) can be implemented with low area, power, and timing overheads. VHDL and SPICE simulations have been carried out for a wide range of channel widths to evaluate delay, area, and power consumption of the NB-CAC codecs....
Robust register caching: An energy-efficient circuit-level technique to combat soft errors in embedded processors
, Article IEEE Transactions on Device and Materials Reliability ; Volume 10, Issue 2 , February , 2010 , Pages 208-221 ; 15304388 (ISSN) ; Namazi, A ; Miremadi, S. G ; Sharif University of Technology
2010
Abstract
This paper presents a cost-efficient technique to jointly use circuit- and architecture-level techniques to protect an embedded processor's register file against soft errors. The basic idea behind the proposed technique is robust register caching (RRC), which creates a cache of the most vulnerable registers within the register file in a small and highly robust cache memory built from circuit-level single-event-upset-protected memory cells. To guarantee that the most vulnerable registers are always stored in the robust register cache, the average number of read operations during a register's lifetime is used as a metric to guide the cache replacement policy. A register is vulnerable to soft...
Fault tolerant and low energy write-back heterogeneous set associative cache for DSM technologies
, Article International Conference on Availability, Reliability and Security, ARES 2009, Fukuoka, Fukuoka Prefecture, 16 March 2009 through 19 March 2009 ; 2009 , Pages 448-453 ; 9780769535647 (ISBN) ; Ejlali, A ; Miremadi, S. G ; Sharif University of Technology
2009
Abstract
This paper presents a fault tolerant and energy efficient write-back set-associative cache, which has a heterogeneous structure. The cache architecture is based on partitioning the ways of each set into two different parts. In each set, one cache way uses SECDED code and maintains dirty blocks while the other ways employ parity bit and keep clean blocks. To evaluate the set-associative cache, SIMPLESCALAR tool and CACTI analytical model are used. The experimental results show that as the feature size decreases and the associativity increases, the energy saving of the proposed cache increases. The experimental results express that for an 8-way setassociative cache in 32nm, about 7% area and...
A fault tolerant approach to object oriented design and synthesis of embedded systems
, Article 2nd Latin-American Symposium on Dependable Computing, LADC 2005, Salvador, 25 October 2005 through 28 October 2005 ; Volume 3747 LNCS , 2005 , Pages 143-153 ; 03029743 (ISSN); 3540295720 (ISBN); 9783540295723 (ISBN) ; Farivar, R ; Hessabi, S ; Miremadi, S. G ; Sharif University of Technology
2005
Abstract
The ODYSSEY design methodology has been recently introduced as a viable solution to the increasing design complexity problem in the ASICs. It is an object-oriented design methodology which models a system in terms of its constituting objects and their corresponding method calls. Some of these methods are implemented in hardware; others are simply executed by a general purpose processor. One fundamental element of this methodology is a network on chip that implements method invocation for hardware-based method calls. However this network is prone to faults, thus errors on it may result into system failure. In this paper an architectural fault-tolerance enhancement to the ODYSSEY design...
Using genetic algorithm to identify soft-error derating blocks of an application program
, Article Proceedings - 15th Euromicro Conference on Digital System Design, DSD 2012, 5 September 2012 through 8 September 2012 ; September , 2012 , Pages 359-367 ; 9780769547985 (ISBN) ; Rahmani, A. M ; Mansoor, A ; Miremadi, S. G ; Sharif University of Technology
2012
Abstract
Soft-errors are increasingly considered as a major cause for computer system failures. Software techniques are used as cost-effective and flexible techniques to tolerate soft-errors but the introduced overhead is not acceptable in some safety-critical real-time systems. The identification of the program blocks and protecting only vulnerable blocks against soft-errors reduces the performance overhead. In this paper, we present a genetic algorithm to identify the vulnerable program blocks as well as the derating program blocks against soft-errors. Then, only vulnerable blocks are protected by some software-based soft-error tolerance techniques to achieve a lower performance and space overhead....
SCFIT: A FPGA-based fault injection technique for SEU fault model
, Article Proceedings -Design, Automation and Test in Europe, DATE ; 2012 , Pages 586-589 ; 15301591 (ISSN) ; 9783981080186 (ISBN) ; Ebrahimi, M ; Ejlali, A ; Miremadi, S. G ; Sharif University of Technology
2012
Abstract
In this paper, we have proposed a fast and easy-to-develop FPGA-based fault injection technique. This technique uses the Altera FPGAs debugging facilities in order to inject SEU fault model in both flip-flops and memory units. Since this method uses the FPGAs built-in facilities, it imposes a negligible performance and area overhead on the system. The experimental results on Leon2 processor shows that the proposed technique is on average four orders of magnitude faster than a simulation-based fault injection
LER: Least-error-rate replacement algorithm for emerging STT-RAM caches
, Article IEEE Transactions on Device and Materials Reliability ; Volume 16, Issue 2 , 2016 , Pages 220-226 ; 15304388 (ISSN) ; Farbeh, H ; Miremadi, S. G ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2016
Abstract
Spin-transfer-torque RAMs (STT-RAMs) are the most promising technology for replacing Static RAMs (SRAMs) in on-chip caches. One of the major problems in STT-RAMs is the high error rate due to stochastic switching in write operations. Cache replacement algorithms have a major role in the number of write operations into the caches. Due to this fact, it is necessary to redesign cache replacement algorithms to consider the new challenges of STT-RAM caches. This paper proposes a cache replacement algorithm, which is called least error rate (LER) , to reduce the error rate in L2 caches. The main idea is to place the incoming block in a line that incurs the minimum error rate in write operation....
OPTIMAS: overwrite purging through in-execution memory address snooping to improve lifetime of NVM-based scratchpad memories
, Article IEEE Transactions on Device and Materials Reliability ; Volume 17, Issue 3 , 2017 , Pages 481-489 ; 15304388 (ISSN) ; Farbeh, H ; Miremadi, S. G ; Sharif University of Technology
2017
Abstract
SRAM-based scratchpad memories (SPMs) used in embedded systems impose high leakage power. Designing SPMs based on non-volatile memories (NVMs) were proposed as NVMs have negligible leakage power. The main problem of utilizing NVMs across the SPM is their limited number of write cycles (endurance). This problem threatens the reliability of NVM-based SPMs. To alleviate the problem of limited endurance in NVM-based SPMs, this paper proposes a method, called overwrite purging through in-execution memory address snooping (OPTIMAS). The main idea behind the proposed method is to control the lifetime of NVM-based SPMs, directly by a hardware unit, outside of the SPM mapping algorithm. This idea...
A software-based concurrent error detection technique for powerPC processor-based embedded systems
, Article 20th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, DFT 2005, Monterey, CA, 3 October 2005 through 5 October 2005 ; 2005 , Pages 266-274 ; 15505774 (ISSN) ; Farivar, R ; Miremadi, S. G ; Aitken R ; Ito H ; Metra C ; Park N ; Sharif University of Technology
2005
Abstract
This paper presents a behavior-based error detection technique called Control Flow Checking using Branch Trace Exceptions for PowerPC processors family (CFCBTE). This technique is based on the branch trace exception feature available in the PowerPC processors family for debugging purposes. This technique traces the target addresses of program branches at run-time and compares them with reference target addresses to detect possible violations caused by transient faults. The reference target addresses are derived by a preprocessor from the source program. The proposed technique is experimentally evaluated on a 32-bit PowerPC microcontroller using software implemented fault injection (SWIFI)....