Loading...
Search for:
rajabzadeh--p
0.119 seconds
Total 1981 records
An accurate performance model of fully adaptive routing in wormhole-switched two-dimensional mesh multicomputers
, Article Microprocessors and Microsystems ; Volume 31, Issue 7 , 2007 , Pages 445-455 ; 01419331 (ISSN) ; Sarbazi Azad, H ; Rajabzadeh, P ; Sharif University of Technology
2007
Abstract
Numerous analytical performance models have been proposed for deterministic wormhole-routed mesh networks while only a single model, to our best knowledge, has been suggested for fully adaptive wormhole routing in mesh interconnection networks. This paper proposes a new and accurate analytical performance model for fully adaptive wormhole-routed mesh networks. Simulation results show that unlike the previously proposed model which is only accurate in light traffic loads, this model can be used for the performance analysis of almost all traffic loads. © 2007 Elsevier B.V. All rights reserved
Feature specific control flow checking in COTS-based embedded systems
, Article Proceedings - 3rd International Conference on Dependability, DEPEND 2010, 18 July 2010 through 25 July 2010 ; July , 2010 , Pages 58-63 ; 9780769540900 (ISBN) ; Miremadi, S.G ; IARIA ; Sharif University of Technology
2010
Abstract
While the Control Flow Checking (CFC) methods are using the ordinary instruction set and general Arithmetic and Logic Unit (ALU) features to protect the programs against the transient faults, this paper presents a new kind of CFC method, called feature specific CFC. The idea behind this method is using a specific internal hardware in modern processors which provides the ability to monitor internal various parameters of the program. This method is a pure software method and the external hardware overhead is zero. Other overheads have been measured experimentally by executing the workloads on a Pentium system. The execution time overhead is between 42% and 67% and the program size overhead is...
Transient detection in COTS processors using software approach
, Article Microelectronics Reliability ; Volume 46, Issue 1 , 2006 , Pages 124-133 ; 00262714 (ISSN) ; Miremadi, S. G ; Sharif University of Technology
2006
Abstract
This paper presents a software-based error detection scheme called enhanced committed instructions counting (ECIC) for embedded and real-time systems using commercial off-the-shelf (COTS) processors. The scheme uses the internal performance monitoring features of a processor, which provides the ability to count the number of committed instructions in a program. To evaluate the ECIC scheme, 6000 software induced faults are injected into a 32-bit Pentium® processor. The results show that the error detection coverage varies between 90.52% and 98.18%, for different workloads. © 2004 Elsevier Ltd. All rights reserved
CFCET: A hardware-based control flow checking technique in COTS processors using execution tracing
, Article Microelectronics Reliability ; Volume 46, Issue 5-6 , 2006 , Pages 959-972 ; 00262714 (ISSN) ; Miremadi, S. G ; Sharif University of Technology
2006
Abstract
This paper presents a behavioral-based error detection technique called control flow checking by execution tracing (CFCET) to increase concurrent error detection capabilities of commercial off-the-shelf (COTS) processors. This technique traces the program jumps graph (PJG) at run-time and compares it with the reference jumps graph to detect possible violations caused by transient faults. The reference graph is driven by a preprocessor from the source program. The idea behind the CFCET is based on using an external watchdog processor (WDP) and also the internal execution tracing feature available in COTS processors to monitor the addresses of taken branches in a program, externally. This is...
A hardware approach to concurrent error detection capability enhancement in COTS processors
, Article 11th Pacific Rim International Symposium on Dependable Computing, PRDC 2005, Changsha, Hunan, 12 December 2005 through 14 December 2005 ; Volume 2005 , 2005 , Pages 83-90 ; 0769524923 (ISBN); 9780769524924 (ISBN) ; Miremadi, S. G ; Sharif University of Technology
2005
Abstract
To enhance the error detection capability in COTS (commercial off-the-shelf) -based design of safety-critical systems, a new hardware-based control flow checking (CFC) technique will be presented. This technique, Control Flow Checking by Execution Tracing (CFCET), employs the internal execution tracing features available in COTS processors and an external watchdog processor (WDP) to monitor the addresses of taken branches in a program. This is done without any modification of application programs, therefore, the program overhead is zero. The external hardware overhead is about 3.5% using an Altera Flex 10K30 FPGA. For different workload programs, the execution time overhead and the error...
Error detection enhancement in COTS superscalar processors with event monitoring features
, Article Proceedings - 10th IEEE Pacific Rim International Symposium on Dependable Computing, Papeete Tahiti, 3 March 2004 through 5 March 2004 ; 2004 , Pages 49-54 ; 0769520766 (ISBN); 9780769520766 (ISBN) ; Mohandespour, M ; Miremadi, G ; Sharif University of Technology
2004
Abstract
Increasing use of commercial off-the-shelf (COTS) superscalar processors in industrial, embedded, and real-time systems necessitates the development of error detection mechanisms for such systems. This paper presents an error detection scheme called Committed Instructions Counting (CIC) to increase error detection in such systems. The scheme uses internal Performance Monitoring features and an external watchdog processor (WDP). The Performance Monitoring features enable counting the number of committed instructions in a program. The scheme is experimentally evaluated on a 32-bit Pentium® processor using software implemented fault injection (SWIFI). A total of 8181 errors were injected into...
Linear and Nonlinear Thermoelastic Analysis of Functionally Graded Circular Plates and Cylindrical Bending of FG Plates
, Ph.D. Dissertation Sharif University of Technology ; Nosier, Asghar (Supervisor)
Abstract
In the present study, analytical solutions within first-order shear deformation plate theory (FSDT), are presented for the linear and nonlinear asymmetric bending of functionally graded circular plates subjected to thermo-mechanical loading and boundary layer phenomenon is also investigated. To this end, cylindrical bending of long rectangular FG plates is also considered to study the perturbation technique which is used here to solve the nonlinear equations. Functionally graded materials are mostly used in high temperature environments and the study of their behavior under thermal and mechanical loadings and in small and large deflection ranges has become very important. Here, the linear...
Linear and Nonlinear Analysis of Functionally Graded Annular Sector Plate with Various Boundary Condition under Tranverse Mechanical Loading by Using Extended Kantorovich Method
, M.Sc. Thesis Sharif University of Technology ; Fallah Rajabzadeh, Famida (Supervisor)
Abstract
In this study, linear and nonlinear mechanical behavior of moderately thick annular sector plates made of functionally graded materials is investigated. In linear analysis, based on first order shear deformation theory, governing equation with two different approaches are derived. In first approach, by application of extended Kantorovich method (EKM), displacements field variables are expressed as separable function of and together, and two sets of ordinary differential equations (ODEs) by using the principle of minimum total potential energy are derived. In the second approach, within FSDT and using the principle of minimum total potential energy, the governing partial differential...
Free Vibration Analysis of FG Annular Sector Plates Using Extended Kantrovich Method
, M.Sc. Thesis Sharif University of Technology ; Fallah Rajabzadeh, Famida (Supervisor)
Abstract
In this study the free vibration of annular sector plates made of functional materials with using the extended Katrovich method is investigated for a variety of boundary conditions. For this purpose, based on the first order shear deformation theory and Hamilton's principle, equations of motion that they are five differential equations and coupled, are derived. Due to the difficulty of the equations obtained by applying extended kantrovich method on these equations, two ordinary differential equations obtained, the two categories combined fixed and simple boundary conditions will be solved by using generalized differential quadrature and in an iterative process system natural frequency is...
A provably secure identity-based proxy ring signature based on RSA
, Article Security and Communication Networks ; Volume 8, Issue 7 , July , 2015 , Pages 1223-1236 ; 19390114 (ISSN) ; Salmasizadeh, M ; Susilo, W ; Sharif University of Technology
John Wiley and Sons Inc
2015
Abstract
Proxy ring (anonymous proxy) signatures allow an entity to delegate its signing capability to a group of entities (proxy group) such that only one of the members in the proxy group can generate a proxy signature on behalf of the delegator, while privacy of the proxy signer is protected. Identity-based versions of proxy ring signatures employ identity strings in place of randomly generated public keys. Our contribution is twofold. First, we formalize a security model for identity-based proxy ring signatures. We note that there exists no formal security model for identity-based proxy ring signatures prior to our work. Second, we present the first provably secure identity-based proxy ring...
A short identity-based proxy ring signature scheme from RSA
, Article Computer Standards and Interfaces ; Volume 38 , February , 2015 , Pages 144-151 ; 09205489 (ISSN) ; Salmasizadeh, M ; Susilo, W ; Sharif University of Technology
Elsevier
2015
Abstract
Identity-based proxy ring signature concept was introduced by Cheng et al. in 2004. This primitive is useful where the privacy of proxy signers is required. In this paper, the first short provably secure identity-based proxy ring signature scheme from RSA assumption has been proposed. In addition, the security of the proposed scheme tightly reduces to the RSA assumption, and therefore, the proposed scheme has a proper advantage in security reduction compared to the ones from RSA. The proposed scheme not only outperforms the existing schemes in terms of efficiency and practicality, but also does not suffer from the proxy key exposure attack due to the use of the sequential aggregation...
Identity-based proxy signatures: A generic construction and a concrete scheme from RSA
, Article Security and Communication Networks ; Volume 8, Issue 18 , May , 2015 , Pages 3602-3614 ; 19390114 (ISSN) ; Salmasizadeh, M ; Boyd, C ; Sharif University of Technology
John Wiley and Sons Inc
2015
Abstract
Proxy signatures allow an entity to delegate its signing capability to a proxy which can sign messages on behalf of the delegator. We examine identity-based versions of proxy signatures which employ identity strings in place of randomly generated public keys. First, we give a new generic construction of identity-based proxy signatures from identity-based standard signatures and show that our generic construction is secure if the underlying identity-based standard signature is secure. In addition, we present the first identity-based proxy signature from Rivest, Shamir and Adleman (RSA), secure under the one-wayness of RSA in the random oracle model. We should highlight that the proxy key...
A short ID-based proxy signature scheme
, Article International Journal of Communication Systems ; Volume 29, Issue 5 , 2016 , Pages 859-873 ; 10745351 (ISSN) ; Salmasizadeh, M ; Susilo, W ; Sharif University of Technology
John Wiley and Sons Ltd
2016
Abstract
The notion of identity-based proxy signature with message recovery feature has been proposed to shorten identity-based proxy signatures and improve their communication overhead because signed messages are not transmitted with these kinds of signatures. There are a few schemes for this notion: the schemes of Singh and Verma and Yoon et al. Unfortunately, Tian et al., by presenting two forgery attacks, show that Singh and Verma scheme is not secure, and also, the scheme of Yoon et al. does not support provable security. The contributions of this paper are twofold. First, we review the scheme by Yoon et al. and discuss why it does not have message recovery property, and consequently, it is not...
Another security improvement over the Lin et al.'s electronic-voting scheme
, Article International Journal of Electronic Security and Digital Forensics ; Volume 1, Issue 4 , 2008 , Pages 413-422 ; 1751911X (ISSN) ; Mohajeri, J ; Salmasizadeh, M ; Sharif University of Technology
Inderscience Publishers
2008
Abstract
Lin, Hwang and Chang (2003) have proposed an electronic-voting scheme which can be utilised in large-scale elections, and claimed that it detects double voting. In this article, by presenting an attack, we show that voters can successfully vote more than once without being detected. Then, we propose a new modified scheme based on the Lin, Hwang and Chang's (2003) scheme with the same efficiency to solve this weakness and analyse its security. © 2008, Inderscience Publishers
Experimental evaluation of Master/Checker architecture using power supply- and software-based fault injection
, Article Proceedings - 10th IEEE International On-Line Testing Symposium, IOLTS 2004, Madeira Island, 12 July 2004 through 14 July 2004 ; 2004 , Pages 239-244 ; 0769521800 (ISBN); 9780769521800 (ISBN) ; Miremadi, S. G ; Mohandespour, M ; Sharif University of Technology
2004
Abstract
This paper presents an experimental evaluation of the effectiveness of the Master/Checker (M/C) architecture in a 32-bit Pentium® processor system using both power-supply disturbance (PSD) fault injection and software-implemented fault injection (SWIFI) methods. A total of 6000 faults were injected in the Master processor to measure the error detection coverage of the Checker processor. The results of the experiments with PSD fault injection show that the error detection coverage of the M/C architecture is about 66.13%, which is not quite effective. This low coverage depends on the high rate of Master processor hangs because of voltage fluctuation. The coverage increased to about 99.73% when...
Error detection enhancement in COTS superscalar processors with performance monitoring features
, Article Journal of Electronic Testing: Theory and Applications (JETTA) ; Volume 20, Issue 5 SPEC.ISS , 2004 , Pages 553-567 ; 09238174 (ISSN) ; Miremadi, S. G ; Mohandespour, M ; Sharif University of Technology
2004
Abstract
Increasing use of commercial off-the-shelf (COTS) superscalar processors in industrial, embedded, and real-time systems necessitates the development of error detection mechanisms for such systems. This paper presents an error detection scheme called Committed Instructions Counting (CIC) to increase error detection in such systems. The scheme uses internal Performance Monitoring features and an external watchdog processor (WDP). The Performance Monitoring features enable counting the number of committed instructions in a program. The scheme is experimentally evaluated on a 32-bit Pentium® processor using software implemented fault injection (SWIFI). A total of 8181 errors were injected into...
Design of Intermediate-level Primitives for Electronic Voting and Multi-party Protocols
, Ph.D. Dissertation Sharif University of Technology ; Salmasizadeh, Mahmoud (Supervisor)
Abstract
In this thesis, intermediate-level cryptographic primitives of multi-proxy multi-signatures and proxy signatures with message recovery with different applications in multi-party protocols such as electronic voting are considered. To save bandwidth, improve efficiency and ensure the accuracy of design, four factors: employing identity-based settings, independency of signature size to the number of signers in multi-proxy multi-signature schemes, transmission of signatures without messages in proxy signature schemes and presenting provable security are vital. On
one hand, to take advantage of identity-based cryptosystems to improve efficiency, designing schemes without bilinear pairings is...
one hand, to take advantage of identity-based cryptosystems to improve efficiency, designing schemes without bilinear pairings is...
Buckling Analysis of Composite Cylindrical Shells Under External Pressure
, M.Sc. Thesis Sharif University of Technology ; Fallah Rajabzadeh, Famida (Supervisor)
Abstract
The aim of this project is buckling and post-buckling analysis of laminated composite circular cylindrical shells under external pressure on the basis of different shell theories. Based on Donnell, Love, and Sanders nonlinear shell theories within the first-order shear deformation model and von Karman geometric nonlinearity, the potential energy of composite circular cylindrical shells under external pressure with simply supported edges is extracted and by minimizing of the total potential energy and implementing the Ritz method, buckling pressure, the nonlinear post-buckling analysis and the curves of static equilibrium paths are presented. Furthermore, the effect of the external energy due...
A provably secure code-based short signature scheme and its nontransferable variant
, Article International Journal of Communication Systems ; Volume 31, Issue 6 , April , 2018 ; 10745351 (ISSN) ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
John Wiley and Sons Ltd
2018
Abstract
Signatures with partially message recovery in which some parts of messages are not transmitted with signatures to make them shorter are helpful where bandwidth is one of the critical concern. This primitive is especially used for signing short messages in applications such as time stamping, certified email services, and identity-based cryptosystems. In this paper, to have quantum-attack-resistant short signatures, the first signature scheme with partially message recovery based on coding theory is presented. Next, it is shown that the proposal is secure under Goppa Parametrized Bounded Decoding and the Goppa Code Distinguishing assumptions in the random oracle model. Relying on the partially...
Reverse Engineering of Stock Selection Algorithms in the Capital Market
, M.Sc. Thesis Sharif University of Technology ; Habibi, Jafar (Supervisor)
Abstract
Capital market is one of the important ways to invest. Investors use different ways to analyze this market. One of the most important ways is to use stock filters that people need to learn both programming and capital market concepts. Automatic programming tools emerged to solve the need to learn a lot of programming languages in different fields but in stock filters have not been used until now in ower knowledge. In this research, the goal is to create automatic programming techniques to recognize stock filters from input-output examples. For this task, in the first step, the history of stock market have been used and a lot of stock filters with different length have been created. After...