Loading...
Search for:
miremadi--s--g
0.113 seconds
Total 12405 records
Performance evaluation of a routing protocol for wireless sensor networks
, Article 2006 IFIP International Conference on Wireless and Optical Communications Networks, Bangalore, 11 April 2006 through 13 April 2006 ; 2006 ; 1424403405 (ISBN); 9781424403400 (ISBN) ; Fazeli, M ; Patooghy, A ; Miremadi, S. G ; Sharif University of Technology
IEEE Computer Society
2006
Abstract
A wireless sensor network with a large number of small sensor nodes can be used as an effective tool for gathering data in various situations. Energy is a critical resource in wireless sensor networks and system lifetime needs to be prolonged through the use of energy-aware strategies during system operation. Routing protocols in WSNs might differ depending on the application and network architecture. Many routing protocols have been specifically designed for WSNs where energy awareness is an essential design issue. The aim of this paper is to evaluate the efficiency of a routing protocol named directed flooding which is a fault-tolerant and energy efficient routing protocol for wireless...
Can erasure codes damage reliability in SSD-based storage systems?
, Article IEEE Transactions on Emerging Topics in Computing ; Volume 7, Issue 3 , 2019 , Pages 435-446 ; 21686750 (ISSN) ; Safaei, B ; Miremadi, S. G ; Sharif University of Technology
IEEE Computer Society
2019
Abstract
Erasure codes are applied in storage systems including both Hard Disk Drive (HDD) and Solid State Disk (SSD) to protect arrays of disks against failures. Applying these codes in SSD-based systems incurs additional number of Program/Erase (P/E) cycles on each disk, which may accelerate the wear-out of disks. This means that while erasure codes improve reliability of SSD-based systems, they impose a side-effect that may degrade reliability as the number of P/E cycles increases. This paper investigates the benefit and side-effect of erasure codes on reliability of SSD-based systems. The investigation attempts to find out the parameters which improve/damage reliability. This study has been...
Speedup analysis in simulation-emulation co-operation
, Article 1st IEEE International Conference on FieId-Programmable Technology, FPT 2002, 16 December 2002 through 18 December 2002 ; 2002 , Pages 394-398 ; 0780375742 (ISBN); 9780780375741 (ISBN) ; Sarmadi, S. B ; Asadi, G ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2002
Abstract
This paper presents an analytical approach to estimate the speedup in a simulation-emulation cooperation environment. The speedup of this approach as compared with the speedup of a pure simulation is analyzed. Also, an analysis of the speedup is given when different types of application instructions are utilized. The analysis is based on using both Verilog and VHDL. The results show that when only the simulation part of the simulation-emulation co-operation is used, the speedup is higher, than when the pure simulation is used. The total speedup is also depended on the type of application instructions and the communication cycle time between the simulator and the emulator. © 2002 IEEE
A low cost circuit level fault detection technique to full adder design
, Article 2011 18th IEEE International Conference on Electronics, Circuits, and Systems, ICECS 2011, 11 December 2011 through 14 December 2011, Beirut ; 2011 , Pages 446-450 ; 9781457718458 (ISBN) ; Fazeli, M ; Hessabi, S ; Miremadi, S. G ; Sharif University of Technology
2011
Abstract
This paper proposes a Low Cost circuit level Fault Detection technique called LCFD for a one-bit Full Adder (FA) as the basic element of adder circuits. To measure the fault detection coverage of the proposed technique, we conduct an exhaustive circuit level fault injection experiment on all susceptible nodes of a FA. Experimental results show that the LCDF technique can detect about 83% of injected faults while having only about 40% area and 22% power consumption overheads. In the LCDF technique, the fault detection latency does not affect the latency of the FA, since the error detection is done in parallel with the addition
Floating-ECC: dynamic repositioning of error correcting code bits for extending the lifetime of STT-RAM caches
, Article IEEE Transactions on Computers ; Volume 65, Issue 12 , 2016 , Pages 3661-3675 ; 00189340 (ISSN) ; Kim, H ; Miremadi, S. G ; Kim, S ; Sharif University of Technology
IEEE Computer Society
2016
Abstract
Spin-Transfer Torque RAM (STT-RAM) is a promising alternative to SRAM for implementing on-chip L2 and L3 caches. One of the most critical challenges in STT-RAM is reliability due to limited write endurance, which results in insufficient lifetime, as well as various types of errors. Previous studies have focused on either presenting various cache architectures/management techniques to improve the lifetime of STT-RAM caches or utilizing different Error Correcting Codes (ECCs) to protect against the permanent and transient errors. However, there is no quantitative analysis in the literature to determine the impact of ECCs on the lifetime of the STT-RAM caches. This paper formulates this impact...
SOYA: SSD-based RAID systems reliability simulator
, Article 2016 International Conference on System Reliability and Science, ICSRS 2016, 15 November 2016 through 18 November 2016 ; 2017 , Pages 167-173 ; 9781509032778 (ISBN) ; Safaei, B ; Miremadi, S. G ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2017
Abstract
The use of Solid State Drives (SSDs) has been increased in storage systems due to high performance and low power consumption. However, some inherent properties of SSDs result in different behavior for SSDs in comparison with Hard Disk Drives (HDDs). As an inherent property, the Bit Error Rate (BER) of SSDs increases, when the number of Program/Erase (P/E) cycles arises. This increment leads to two effects in an array of SSDs during its operation: (1) different BER on different SSDs of the system (SSD-variant BER), and (2) different BER in different time moments (time-variant BER). With respect to these two effects, the reliability evaluation of SSD-based RAIDs would be different from...
A fault tolerant approach to object oriented design and synthesis of embedded systems
, Article 2nd Latin-American Symposium on Dependable Computing, LADC 2005, Salvador, 25 October 2005 through 28 October 2005 ; Volume 3747 LNCS , 2005 , Pages 143-153 ; 03029743 (ISSN); 3540295720 (ISBN); 9783540295723 (ISBN) ; Farivar, R ; Hessabi, S ; Miremadi, S. G ; Sharif University of Technology
2005
Abstract
The ODYSSEY design methodology has been recently introduced as a viable solution to the increasing design complexity problem in the ASICs. It is an object-oriented design methodology which models a system in terms of its constituting objects and their corresponding method calls. Some of these methods are implemented in hardware; others are simply executed by a general purpose processor. One fundamental element of this methodology is a network on chip that implements method invocation for hardware-based method calls. However this network is prone to faults, thus errors on it may result into system failure. In this paper an architectural fault-tolerance enhancement to the ODYSSEY design...
Numeral-based crosstalk avoidance coding to reliable NoC design
, Article Proceedings - 2011 14th Euromicro Conference on Digital System Design: Architectures, Methods and Tools, DSD 2011 ; 2011 , Pages 55-62 ; 9780769544946 (ISBN) ; Patooghy, A ; Miremadi, S. G ; Sharif University of Technology
2011
Abstract
This paper proposes a Numeral-Based Crosstalk Avoidance Coding (NB-CAC) to protect communication channels of Network-on-Chips (NoCs) against crosstalk faults. The NB-CAC scheme produces codewords without bit patterns '101' and '010' to eliminate harmful transition patterns from NoC channels. This is done by the use of a new numeral system proposed in the paper. Using the proposed numeral system, the NB-CAC scheme 1) can be utilized in NoC channels with any arbitrary width, and 2) can be implemented with low area, power, and timing overheads. VHDL and SPICE simulations have been carried out for a wide range of channel widths to evaluate delay, area, and power consumption of the NB-CAC codecs....
An efficient method to reliable data transmission in Network-on-Chips
, Article Proceedings - 13th Euromicro Conference on Digital System Design: Architectures, Methods and Tools, DSD 2010, 1 September 2010 through 3 September 2010, Lille ; 2010 , Pages 467-474 ; 9780769541716 (ISBN) ; Tabkhi, H ; Miremadi, S. G ; Sharif University of Technology
2010
Abstract
Data transmission in Network-on-Chips (NoCs) is a serious problem due to crosstalk faults happening in adjacent communication links. This paper proposes an efficient flow-control method to enhance the reliability of packet transmission in Network-on-Chips. The method investigates the opposite direction transitions appearing between flits of a packet to reorder the flits in the packet. Flits are reordered in a fixed-size window to reduce: 1) the probability of crosstalk occurrence, and 2) the total power consumed for packet delivery. The proposed flow-control method is evaluated by a VHDL-based simulator under different window sizes and various channel widths. Simulation results enable NoC...
Robust register caching: An energy-efficient circuit-level technique to combat soft errors in embedded processors
, Article IEEE Transactions on Device and Materials Reliability ; Volume 10, Issue 2 , February , 2010 , Pages 208-221 ; 15304388 (ISSN) ; Namazi, A ; Miremadi, S. G ; Sharif University of Technology
2010
Abstract
This paper presents a cost-efficient technique to jointly use circuit- and architecture-level techniques to protect an embedded processor's register file against soft errors. The basic idea behind the proposed technique is robust register caching (RRC), which creates a cache of the most vulnerable registers within the register file in a small and highly robust cache memory built from circuit-level single-event-upset-protected memory cells. To guarantee that the most vulnerable registers are always stored in the robust register cache, the average number of read operations during a register's lifetime is used as a metric to guide the cache replacement policy. A register is vulnerable to soft...
ACM: Accurate crosstalk modeling to predict channel delay in Network-on-Chips
, Article 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design, IOLTS 2016, 4 July 2016 through 6 July 2016 ; 2016 , Pages 7-8 ; 9781509015061 (ISBN) ; Shirmohammadi, Z ; Miremadi, S. G ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2016
Abstract
The severity of timing delay in the communication channels of Network on Chip (NoC) depends on the transition patterns appearing on the wires. An analytical model can estimate the timing delay in NoC channels in the presence of crosstalk faults. However, recently proposed analytical model does not have enough accuracy and is based on 3-wire delay model. In this paper, an Accurate Crosstalk Model (ACM) based on 5-wire delay model is proposed to estimate the delay of communication channels in the presence of crosstalk faults. ACM is more accurate due to considering more wires in the delay model and also considering the overlaps between locations of transition patterns
3D-DPS: An efficient 3D-CAC for reliable data transfer in 3D ICs
, Article Proceedings - 2016 12th European Dependable Computing Conference, EDCC 2016, 5 September 2016 through 9 September 2016 ; 2016 , Pages 97-107 ; 9781509015825 (ISBN) ; Rohbani, N ; Miremadi, S. G ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2016
Abstract
Migration to Three Dimensional Integrated Circuits (3D ICs) can provide higher scalability, higher throughput, and lower power consumption with respect to Two Dimensional Integrated Circuits (2D ICs). Also, the latency bottleneck of interconnections in 2D ICs is efficiently solved in 3D ICs. This is due to the use of Through-Silicon-Vias (TSVs) in the communication structure of 3D ICs. TSVs are among the efficient fabrication mechanisms that connect stacked layers in 3D ICs. However, proximity and large size of TSVs make them highly prone to crosstalk faults. Crosstalk faults can cause mutual undesired influences between TSVs and thus seriously threat the reliability of data transfer on...
In-scratchpad memory replication: Protecting scratchpad memories in multicore embedded systems against soft errors
, Article ACM Transactions on Design Automation of Electronic Systems ; Volume 20, Issue 4 , 2015 ; 10844309 (ISSN) ; Farbeh, H ; Miremadi, S. G ; Sharif University of Technology
Association for Computing Machinery
2015
Abstract
Scratchpad memories (SPMs) are widely employed inmulticore embedded processors. Reliability is one of the major constraints in the embedded processor design, which is threatened with the increasing susceptibility of memory cells to multiple-bit upsets (MBUs) due to continuous technology down-scaling. This article proposes a low-cost and efficient data replication mechanism, called In-Scratchpad Memory Replication (ISMR), to correct MBUs in SPMs of multicore embedded processors. The main feature of ISMR is a smart controller, called Replication Management Unit (RMU), which is responsible for dynamically analyzing the activity of the SPM blocks at runtime and efficiently replicating the...
A partial task replication algorithm for fault-tolerant FPGA-based soft-multiprocessors
, Article CSI Symposium on Real-Time and Embedded Systems and Technologies, RTEST 2015, 7 October 2015 through 8 October 2015 ; October , 2015 , Page(s): 1 - 7 ; 9781467380478 (ISBN) ; Farbeh, H ; Miremadi, S. G ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2015
Abstract
FPGA-based multiprocessors, referred as softmultiprocessors, have an increasing use in embedded systems due to appealing SRAM features. More than 95% of such FPGAs are occupied by SRAM cells constructing the configuration bits. These SRAM cells are highly vulnerable to soft errors threatening the reliability of the system. This paper proposes a fault-tolerant method to detect and correct errors in the configuration bits. The main of this method is to analyze the scheduled task graph and select a subset of tasks to be replicated in multiple processors based on the utilization of the processors in different execution phases. To this end, 1) errors are detected by re-executing a subset of tasks...
Fault tolerant and low energy write-back heterogeneous set associative cache for DSM technologies
, Article International Conference on Availability, Reliability and Security, ARES 2009, Fukuoka, Fukuoka Prefecture, 16 March 2009 through 19 March 2009 ; 2009 , Pages 448-453 ; 9780769535647 (ISBN) ; Ejlali, A ; Miremadi, S. G ; Sharif University of Technology
2009
Abstract
This paper presents a fault tolerant and energy efficient write-back set-associative cache, which has a heterogeneous structure. The cache architecture is based on partitioning the ways of each set into two different parts. In each set, one cache way uses SECDED code and maintains dirty blocks while the other ways employ parity bit and keep clean blocks. To evaluate the set-associative cache, SIMPLESCALAR tool and CACTI analytical model are used. The experimental results show that as the feature size decreases and the associativity increases, the energy saving of the proposed cache increases. The experimental results express that for an 8-way setassociative cache in 32nm, about 7% area and...
A Low area overhead NBTI/PBTI sensor for SRAM memories
, Article IEEE Transactions on Very Large Scale Integration (VLSI) Systems ; Volume 25, Issue 11 , 2017 , Pages 3138-3151 ; 10638210 (ISSN) ; Rohbani, N ; Miremadi, S. G ; Sharif University of Technology
2017
Abstract
Bias temperature instability (BTI) is known as one serious reliability concern in nanoscale technologies. BTI gradually increases the absolute value of threshold voltage (Vth) of MOS transistors. The main consequence of Vth shift of the SRAM cell transistors is the static noise margin (SNM) degradation. The SNM degradation of SRAM cells results in bit-flip occurrences due to transient faults and should be monitored accurately. This paper proposes a sensor called write current-based BTI sensor (WCBS) to assess the BTI-aging state of SRAM cells. The WCBS measures BTI-induced SNM degradation of SRAM cells by monitoring the maximum write current shifts due to BTI. The observations show that the...
An efficient numerical-based crosstalk avoidance codec design for NoCs
, Article Microprocessors and Microsystems ; Volume 50 , 2017 , Pages 127-137 ; 01419331 (ISSN) ; Mozafari, F ; Miremadi, S .G ; Sharif University of Technology
Elsevier B.V
2017
Abstract
With technology scaling, crosstalk fault has become a serious problem in reliable data transfer through Network on Chip (NoC) channels. The effects of crosstalk fault depend on transition patterns appearing on the wires of NoC channels. Among these patterns, Triplet Opposite Direction (TOD) imposes the worst crosstalk effects. Crosstalk Avoidance Codes (CACs) are the overhead-efficient mechanisms to tackle TODs. The main problem of CACs is their high imposed overheads to NoC routers. To solve this problem, this paper proposes an overhead-efficient coding mechanism called Penultimate-Subtracted Fibonacci (PS-Fibo) to alleviate crosstalk faults in NoC wires. PS-Fibo coding mechanism benefits...
Reducing power consumption in NoC design with no effect on performance and reliability
, Article 14th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2007, Marrakech, 11 December 2007 through 14 December 2007 ; 2007 , Pages 886-889 ; 1424413788 (ISBN); 9781424413782 (ISBN) ; Fazeli, M ; Miremadi, S. G ; Sharif University of Technology
2007
Abstract
High reliability, low power consumption and high performance are key objectives in the design of NoCs. These three design objectives should be considered simultaneously in order to have an optimal design. This paper proposes a method to reduce power consumption of an application specific NoC. This is done in two steps: 1) Extra virtual channels are used in the router architecture to increase the performance in an application specific NoC, and 2) The amount of the performance gain is then set to the initial point using frequency scaling technique, hence reducing the power consumption, without corruption of reliability. The simulation results show that the method can reduce the power...
A low-power and SEU-tolerant switch architecture for network on chips
, Article 13th Pacific Rim International Symposium on Dependable Computing, PRDC 2007, Melbourne, VIC, 17 December 2007 through 19 December 2007 ; 2007 , Pages 264-267 ; 0769530540 (ISBN) ; 9780769530543 (ISBN) ; Fazeli, M ; Miremadi, S. G ; Sharif University of Technology
2007
Abstract
High reliability, high performance, low power consumption are the main objectives in the design of NoCs. These three design objectives are mostly conflicting and should be considered simultaneously in order to have an optimal design. This paper proposes a method based on duplicating the virtual channels of each NoC node as well as parity codes to prevent SEUs from producing erroneous data. The method is compared with two widely used SEU-tolerant methods i.e., the Switch to Switch and the End to End flow control methods, in terms of reliability, power consumption and performance. A flit level VHDL-based simulator and Synopsys Power Compiler tool have been used to extract experimental results....
Error detection enhancement in PowerPC architecture-based embedded processors
, Article Journal of Electronic Testing: Theory and Applications (JETTA) ; Volume 24, Issue 1-3 , 2008 , Pages 21-33 ; 09238174 (ISSN) ; Farivar, R ; Miremadi, S. G ; Sharif University of Technology
2008
Abstract
This paper presents a behavior-based error detection technique called Control Flow Checking using Branch Trace Exceptions for PowerPC processors family (CFCBTE). This technique is based on the branch trace exception feature available in the PowerPC processors family for debugging purposes. This technique traces the target addresses of program branches at run-time and compares them with reference target addresses to detect possible violations caused by transient faults. The reference target addresses are derived by a preprocessor from the source program. To enhance the error detection coverage, three other mechanisms, i.e., Machine Check Exception, System Trap Instructions and Work Load Timer...