Loading...
Search for: nayebi-nodoushan--amin
0.146 seconds

    Modeling and Solving the Simultaneous Berth and Quay Crane Scheduling in Container Terminals

    , M.Sc. Thesis Sharif University of Technology Nayebi Nodoushan, Amin (Author) ; Salmasi, Naser (Supervisor)
    Abstract
    The most important sources in container terminals are berth and quay cranes. The main purpose in the container terminals is reducing delay times of vessels. This will be obtained with planning of terminal sources. This research addresses simultaneous berth and quay crane scheduling problem. A mixed integer linear mathematical model is proposed to minimize sum of completion time of vessels. Since the proposed research problem is NP-hard, two methahuristic algorithms based on Tabu Search (TS) and Particle Swarm Optimization (PSO) are presented to heuristically solve the problem. After parameter tuning, PSO and TS algorithms are compared with experimental design methods. The results indicate... 

    An optimal analytical solution for maximizing expected battery lifetime using the calculus of variations

    , Article Integration ; Volume 71 , March , 2020 , Pages 86-94 Jafari Nodoushan, M ; Ejlali, A ; Sharif University of Technology
    Elsevier B.V  2020
    Abstract
    The exponential growth in the semiconductor industry and hence the increase in chip complexity, has led to more power usage and power density in modern processors. On the other hand, most of today's embedded systems are battery-powered, so the power consumption is one of the most critical criteria in these systems. Dynamic Voltage and Frequency Scaling (DVFS) is known as one of the most effective energy-saving methods. In this paper, we propose the optimal DVFS profile to minimize the energy consumption of a battery-based system with uncertain task execution time under deadline constraints using the Calculus of Variations (CoV). The contribution of this work is to analytically calculate the... 

    The Analysis of Low Power Embedded Systems through the Calculus of Variations

    , Ph.D. Dissertation Sharif University of Technology Jafari Nodoushan, Mostafa (Author) ; Ejlali, Alireza (Supervisor)
    Abstract
    Embedded systems usually have severe limitations on power consumption. One of the reasons is that many embedded systems are battery operated. On the other hand, the battery is a non-linear source of energy, where the lifetime depends on how the system drains power from the battery, or in other words, the battery lifetime is dependent on battery discharge current curve. The nonlinear behavior of batteries is due to their inherent characteristics, where the rate capacity and the recovery effects are believed as the two most well-known and important factors. Also, embedded systems are usually fanless with limited cooling equipment, therefore temperature management is a prominent issue in these... 

    Leakage-aware battery lifetime analysis using the calculus of variations

    , Article IEEE Transactions on Circuits and Systems I: Regular Papers ; Volume 67, Issue 12 , June , 2020 , Pages 4829-4841 Jafari Nodoushan, M ; Safaei, B ; Ejlali, A ; Chen, J.-J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Due to non-linear factors such as the rate capacity and the recovery effect, the shape of the battery discharge curve plays a significant role in the overall lifetime of the batteries. Accordingly, this paper proposes a simple heuristic battery-aware speed scheduling policy for periodic and non-periodic real-time tasks in Dynamic Voltage Scaling (DVS) systems with non-negligible leakage/static power. A set of comprehensive analysis has been conducted to compare the battery efficiency of the proposed policies with an optimal solution, which could be derived via the Calculus of Variations (CoV). These evaluations have taken into account both periodic and non-periodic tasks in DVS-based... 

    Discrimination of target and chaff in marine applications based on symmetry feature

    , Article MRRS 2017 - 2017 IEEE Microwaves, Radar and Remote Sensing Symposium, Proceedings, 29 August 2017 through 31 August 2017 ; 2017 , Pages 131-135 ; 9781509053919 (ISBN) Zarei, N ; Aalami, H ; Nayebi, M. M ; Amin, A. R ; Danaei, M. R ; Yanovsky, F ; Rudiakova, A ; Averyanova, Y ; Sharif University of Technology
    2017
    Abstract
    Among the various techniques of electronic warfare in the sea, chaff has particular importance due to its easy application and its impact on the victim radar. Despite the great history of chaff, the significant research has not been published on its recognition. It is difficult to study the behavior of chaff because of the impossibility of chaff tests in an unechoic chamber. Therefore simulation would be a suitable alternative. In this paper, the simulations of symmetric feature of chaff and target are presented and it is used to propose a processing structure, based on various classifiers, for discrimination between chaff and target. Moreover the comparison between discrimination capability... 

    Investigation on Phased Arrays with Irregular Overlapped Subarrays

    , M.Sc. Thesis Sharif University of Technology Pourjoula, Mohsen (Author) ; Nayebi (Supervisor)
    Abstract
    In this thesis, we would consentraite in the topic of irregular overlapped subarrays. In general, it would be a combination of topics overlapped and irregual arrays. In phased array topics, one of the important issues is cost. Main cost of array is consist of its phase shifter cost at all. Duo to the cost of phase shofters, overlapped subarray structure might be used. Philosophy of using overlapped subarrays returned to similar phase required for elements adjust together. But this emphasis is true just in limited field of view fields. But grating lobes could be seen even without beam steering. For solving grating lobes problem, overlapped structured has been presented. In overlapped... 

    Introducing a Simulation-Based Model to Improve the Design and Layout of Workstations Inside Airport Terminals in Iran

    , M.Sc. Thesis Sharif University of Technology Amini Esfidvajani, Amin Mohammad (Author) ; Alvanchi, Amin (Supervisor)
    Abstract
    The airport terminal is difficult to plan and design due to the different components and the intricate complexity of its parts. At the airport terminal, we face a queue system which simulation is always a good way to analyze. In addition, computer simulation using modern softwares with the capability to model different types of systems, including the airport terminal, while being less realistic than analytical models, is less costly than operational Exercise.In this study, a supportive approach for better and specific management of Iranian airport terminal buildings with discrete-event simulation is proposed, considering the need for managing the airport terminals building in the country and... 

    , M.Sc. Thesis Sharif University of Technology (Author) ; Alvanchi, Amin (Supervisor)
    Abstract
    Limited water resources in Iran have made dams an important part of the country’s infrastructure. As a result of the large number of in-progress and expected dam projects in the country, consideration of sustainability factors during planning, construction and operation phases of dam projects can create significant economical, social and environmental impacts in the long term. To come up with an inclusive sustainable development, new sustainability assessment approaches seek for sustainable development at the entire project’s life-cycle; they are looking for sustainable development at all design, construction, operation, maintenance and even demolition phases. In this research we have... 

    Control-flow checking using branch instructions

    , Article 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008, Shanghai, 17 December 2008 through 20 December 2008 ; Volume 1 , January , 2008 , Pages 66-72 ; 9780769534923 (ISBN) Jafari Nodoushan, M ; Miremadi, S. G ; Ejlali, A ; IEEE Computer Society Technical Committee on Scalable Computing ; Sharif University of Technology
    2008
    Abstract
    This paper presents a hardware control-flow checking scheme for RISC processor-based systems. This Scheme combines two error detection mechanisms to provide high coverage. The first mechanism uses parity bits to detect faults occurring in the opcodes and in the target addresses of branch instructions which lead to erroneous branches. The second mechanism uses signature monitoring to detect errors occurring in the sequential instructions. The scheme is implemented using a watchdog processor for an VHDL model of the LEON2 processor. About 31800 simulation faults were injected into the LEON2 processor. The results show that the error detection coverage is about 99.5% with average detection... 

    Optimum hello interval for a connected homogeneous topology in mobile wireless sensor networks

    , Article Telecommunication Systems ; Vol. 52, issue. 4 , April , 2013 , pp. 2475-2488 ; Online ISSN: 1572-9451 Nayebi, A ; Sarbazi-Azad, H ; Sharif University of Technology
    2013
    Abstract
    Topology of a mobile wireless sensor/ad hoc network is prone to link breakages due to node mobility which compels the periodic re-construction of the topology in so called ""hello"" intervals. The problem addressed in this paper is determining the maximum ""hello"" interval preserving the connectivity of a homogeneous topology with high probability. In order to study the optimum ""hello"" interval, statistical topology lifetime (STL) is formally defined as a value of ""hello"" interval that ensures statistical connectivity with a given threshold. Temporal properties of the topology are studied based on two phenomena; one concerning a connectivity phase transition with time and the other one... 

    Performance modeling of the LEACH protocol for mobile wireless sensor networks

    , Article Journal of Parallel and Distributed Computing ; Vol. 71, issue. 6 , 2011 , p. 812-821 ; ISSN: 07437315 Nayebi, A ; Sarbazi-Azad, H ; Sharif University of Technology
    2011
    Abstract
    In many wireless sensor network applications, nodes are mobile, while many protocols proposed for these networks assume a static network. Thus, it is important to evaluate if a traditional protocol designed for a static network can tolerate different levels of mobility. This paper provides an analytic model to investigate the effect of mobility on a well-known cluster-based protocol, LEACH. The model evaluates data loss after construction of the clusters due to node mobility, which can be used to estimate a proper update interval to balance the energy and data loss ratio. Thus, the results can help the network designer to adjust the topology update interval given a value of acceptable data... 

    Analysis of link lifetime in wireless mobile networks

    , Article Ad Hoc Networks ; Volume 10, Issue 7 , September , 2012 , Pages 1221-1237 ; 15708705 (ISSN) Nayebi, A ; Sarbazi Azad, H ; Sharif University of Technology
    2012
    Abstract
    Link lifetime (LL) analysis is crucially important in designing and evaluating wireless mobile network protocols. Although a considerable amount of research has been conducted on this issue, the current paper studies several aspects of link lifetime for the first time, e.g. a closed form expression for the probability distribution of the residual link lifetime (RLL) for the constant velocity mobility model is obtained, which facilitates marginal studies on the behavior of link lifetime. As a case, using a tail analysis of LL and RLL distributions, we analytically prove that they are heavy-tailed. Using this outcome, a self-similar behavior in the traffic pattern of a sample delay tolerant... 

    Optimum hello interval for a connected homogeneous topology in mobile wireless sensor networks

    , Article Telecommunication Systems ; Volume 52, Issue 4 , 2013 , Pages 2475-2488 ; 10184864 (ISSN) Nayebi, A ; Sarbazi Azad, H ; Sharif University of Technology
    2013
    Abstract
    Topology of a mobile wireless sensor/ad hoc network is prone to link breakages due to node mobility which compels the periodic re-construction of the topology in so called "hello" intervals. The problem addressed in this paper is determining the maximum "hello" interval preserving the connectivity of a homogeneous topology with high probability. In order to study the optimum "hello" interval, statistical topology lifetime (STL) is formally defined as a value of "hello" interval that ensures statistical connectivity with a given threshold. Temporal properties of the topology are studied based on two phenomena; one concerning a connectivity phase transition with time and the other one... 

    Performance modeling of the LEACH protocol for mobile wireless sensor networks

    , Article Journal of Parallel and Distributed Computing ; Volume 71, Issue 6 , June , 2011 , Pages 812-821 ; 07437315 (ISSN) Nayebi, A ; Sarbazi Azad, H ; Sharif University of Technology
    2011
    Abstract
    In many wireless sensor network applications, nodes are mobile, while many protocols proposed for these networks assume a static network. Thus, it is important to evaluate if a traditional protocol designed for a static network can tolerate different levels of mobility. This paper provides an analytic model to investigate the effect of mobility on a well-known cluster-based protocol, LEACH. The model evaluates data loss after construction of the clusters due to node mobility, which can be used to estimate a proper update interval to balance the energy and data loss ratio. Thus, the results can help the network designer to adjust the topology update interval given a value of acceptable data... 

    Analysis of k-Neigh topology control protocol for mobile wireless networks

    , Article Computer Networks ; Volume 53, Issue 5 , 2009 , Pages 613-633 ; 13891286 (ISSN) Nayebi, A ; Sarbazi Azad, H ; Sharif University of Technology
    2009
    Abstract
    k-Neigh is a basic neighbor-based topology control protocol based on the construction of k-neighbor graph as logical communication graph. Several topological aspects of the constructed topology which are crucial to the performance of the protocol are not yet analytically investigated. Moreover, the problem of determining the maximum "Hello" interval preserving the connectivity with high probability has not been extensively addressed yet. Since execution of the protocol is a resource consuming task, this problem is of great importance on the performance of the protocol in sense of power consumption and topology control overhead. In this paper, first, several topological properties of the... 

    Lifetime analysis of the logical topology constructed by homogeneous topology control in wireless mobile networks

    , Article 13th International Conference on Parallel and Distributed Systems, ICPADS, Hsinchu, 5 December 2007 through 7 December 2007 ; Volume 2 , December , 2007 ; 15219097 (ISSN); 9781424418909 (ISBN) Nayebi, A ; Sarbazi Azad, H ; Sharif University of Technology
    2007
    Abstract
    Topology control protocols construct a logical topology out of the physical communication graph. Logical topology is maintained by logical neighbor lists in every node. Logical topology is used by several upper-layer protocols as a substantial communication map and is prone to link breakages due to node mobility which compels the periodic re-execution of the topology control protocol in so called "Hello" intervals. The problem addressed in this paper is determining the maximum "Hello" interval preserving the connectivity with high probability which is not extensively concerned yet. The simplest form of topology control, homogeneous topology control, is chosen for start. Two connectivity... 

    The Insider Threat: Analyzing and Modeling

    , M.Sc. Thesis Sharif University of Technology Amin, Assiabi (Author) ; Hendesi, Faramarz (Supervisor)
    Abstract
    Nowadays, most of businesses are becoming computer-based. This trend causes the organizations to become more vulnerable to internal and external threats. Internal threats are done through insiders. Insiders unlike outsiders have capabilities which aid them to easily carry out their illicit activities. Unfortunately, most of research in computer security has focused on the outsider threats, whereas the most damaging is the result of insiders’ illicit activities.This dissertation addresses three primary necessities of the research in the area of insider threat: a consistent definition of insider threat, a classification of types of insider threats, and a classification of vulnerabilities which... 

    Design of a Plantwide Decentrlized Structure Controller for the Tennessee Eastman Challenge Problem

    , M.Sc. Thesis Sharif University of Technology Molamofrad, Foozhan (Author) ; Nobakhti, Amin (Supervisor)
    Abstract
    This project focuses on the Tennessee East-man challange problem(TEP) and the impact of setpoint changes and controller tunning on plant performance and profitability. TE has four major units. it is an unstable system due to the reaction within the reactor and a recycle streamcausing snow ball effect. As a result the control of this system is not easy. The study has been conducted along two main directions. First, selecting the optimal values for the setpoints and applying them in the simulation. secondly, try to find better parameter for controller in simulation. Simulation is based on working of Ricker. In TEP like the other multivariable systems, it is ameanable to use a centralized... 

    Convex Methods for the Design of Low Order Dynamic Pre-Compensators

    , M.Sc. Thesis Sharif University of Technology Shamgah, Laya (Author) ; Nobakhti, Amin (Supervisor)
    Abstract
    Decentralized control is a typical method for the design of industrial MIMO control systems. However, in most multivariable systems, the existence of large interactions limit the achievable performance of such controllers. In the Nyquist Array design method proposed by Rosenbrock, the system interactions can be reduced using a precompensator, such that a decentralized controller may be used with acceptable performance. A well designed pre-compensator will effectively decouple the system and the multivariable systems may be considered as a set of SISO systems. It is therefore obvious that the key element in the Nyquist Array design method is the design of the pre-compensator. There are two... 

    Integrity Analysis in the Time-Delay Systems

    , M.Sc. Thesis Sharif University of Technology Eslami, Mostafa (Author) ; Nobakhti, Amin (Supervisor)
    Abstract
    Integrity of closed-loop systems with integral action control is characterized by using a series of successively more difficult to obtain conditions: Integral Stabilizable (IS), Integral Controllable (IC), Integral Controllable with Integrity (ICI), and Decentralized Integral Controllability (DIC). The IS condition requires that for a Linear Time-Invariant (LTI) finitedimensional (FD) plant, G(s), one finds a stabilizing decentralized controller with integral action. For G(s) to be IC, in addition to being IS, one should be able to reduce the gain of
    all control loops by the same factor from a finite value to (but not including) zero without introducing instabilities. ICI requires that...