Loading...
Search for:
shafaei-moghaddam--mansour
0.152 seconds
Total 617 records
Crosstalk Fault Modeling and Mitigation in System-on-Chips
, M.Sc. Thesis Sharif University of Technology ; Miremadi, Ghassem (Supervisor)
Abstract
Use of nano-scale VLSI technologies in the fabrication of System-on-Chips (SoCs) makes reliability as one of the major issues in the design and implementation of these products. SoCs are susceptible to several fault sources such as crosstalks, cosmic particle strikes, electromagnetic interferences, and power supply disturbances. Among the mentioned fault sources, crosstalks have the major contribution in threatening the reliability of SoCs. This thesis addresses the modeling and mitigation of crosstalk faults. In this regard, two analytical models and three crosstalk reduction methods have been introduced. The proposed analytical models, which have been introduced in the fourth chapter of...
Facial Expression Recognition Using a Mobile Camera
, M.Sc. Thesis Sharif University of Technology ; Jamzad, Mansour (Supervisor)
Abstract
Detecting emotions and facial expressions, as a means of nonverbal communication between human and machines, has attracted a great deal of attention in recent decades with the developments in artificial intelligence and acknowledging the ties between robotics and future human life. Human face plays a key role in his communications and processing it in a video source for the sake of mood recognition could be employed in different applications such as improving human and machine communication and analysis of emotions in different circumstances. Facial expression detection is useful in understanding not only momentary emotions, but also mental activities, social interactions and psychological...
Community structure and information cascade in signed networks
, Article New Generation Computing ; Vol. 32, issue. 3-4 , August , 2014 , p. 257-269 ; Jalili, M ; Sharif University of Technology
2014
Abstract
In this paper, we study information cascade in networks with positive and negative edges. The cascade depth is correlated with community structure of signed networks where communities are defined such that positive inter-community and negative intra-community links are minimized. The cascade is initialized from a number of nodes that are selected randomly. Finally, the number of nodes that have participated in the cascade is interpreted as cascade depth; the more the number of such nodes, the more the depth of the cascade. We investigate influence of community structure (i.e.; percentage of inter-community positive and intra-community negative links) on the cascade depth. We find significant...
Modeling Information Cascade in Social Network with Positive and Negative
, M.Sc. Thesis Sharif University of Technology ; Jalili, Mahdi (Supervisor)
Abstract
Information cascade or affection in a broad social network is introduced as a dynamic epidemic phenomenon in the society. As people notify a new innovation, technology, or hobby, they try to share it with their friends, colleges or neighbors. Till now most of the cascade models are presented for unsigned network, in which all links have the same sign (such as friends and trusted networks). In these networks cascade is independent of the edge sign. But in reality signed networks are as common as simple networks. Thus, in this thesis, we study information cascade in networks with positive and negative edges. We link the cascade size to community structure of signed networks; communities are...
Evaluation of Lump Sum Contracts in the Organization for Development, Renovation and Equipping Schools
, M.Sc. Thesis Sharif University of Technology ; Mofid, Masoud (Supervisor)
Abstract
The construction industry is one of the most important economic sectors, which shares a major part of Gross Domestic Product (GDP) and employment. In Iran many development projects are designed and implemented annually which billions of Rials are due as a result of construction and operation for executive bodies. The Organization for Development, Renovation and Equipping Schools (ODRES) as the executive branch of the Ministry of Education, is one of the largest construction bodies which undertakes construction of hundreds of educational, cultural and athletic projects annually. Given that the project delivery methods and the need to choose the correct method of contract payments exerts great...
Numeral-based crosstalk avoidance coding to reliable NoC design
, Article Proceedings - 2011 14th Euromicro Conference on Digital System Design: Architectures, Methods and Tools, DSD 2011 ; 2011 , Pages 55-62 ; 9780769544946 (ISBN) ; Patooghy, A ; Miremadi, S. G ; Sharif University of Technology
2011
Abstract
This paper proposes a Numeral-Based Crosstalk Avoidance Coding (NB-CAC) to protect communication channels of Network-on-Chips (NoCs) against crosstalk faults. The NB-CAC scheme produces codewords without bit patterns '101' and '010' to eliminate harmful transition patterns from NoC channels. This is done by the use of a new numeral system proposed in the paper. Using the proposed numeral system, the NB-CAC scheme 1) can be utilized in NoC channels with any arbitrary width, and 2) can be implemented with low area, power, and timing overheads. VHDL and SPICE simulations have been carried out for a wide range of channel widths to evaluate delay, area, and power consumption of the NB-CAC codecs....
Crosstalk modeling to predict channel delay in Network-on-Chips
, Article Proceedings - IEEE International Conference on Computer Design: VLSI in Computers and Processors, 3 October 2010 through 6 October 2010 ; October , 2010 , Pages 396-401 ; 10636404 (ISSN) ; 9781424489350 (ISBN) ; Miremadi, S. G ; Shafaei, M ; Sharif University of Technology
2010
Abstract
Communication channels in Network-on-Chips (NoCs) are highly susceptible to crosstalk faults due to the use of nano-scale VLSI technologies in the fabrication of NoCs. Crosstalk faults cause variable timing delay in NoC channels based on the patterns of transitions appearing on the channels. This paper proposes an analytical model to estimate the timing delay of an NoC channel in the presence of crosstalk faults. The model calculates expected number of 4C, 3C, 2C, and 1C transition patterns to predict delay of a K-bit communication channel. The model is applicable for both non-protected channels and channels which are protected by crosstalk mitigation methods. Spice simulations are done in a...
Optimization, Fabrication and Utilization of a New Tendon Actuated Manipulator with Lockable Joints
, M.Sc. Thesis Sharif University of Technology ; Alasty, Aria (Supervisor) ; Salarieh, Hassan (Supervisor)
Abstract
Serpentine manipulators are a kind of hybrid manipulators that have a large number of joints and degrees of freedom. Due to their high flexibility, they have a great potential to work in constrained environment that filled with obstacles. One of the main problems of this type of manipulators is high weight and controlling difficulties. Many researches have been done to achieve lighter weight and simplify control methods of hyper-redundant manipulator. One way is putting the actuators in the base of the manipulator and transferring the actuator forces by cable. In this way, one cable and one actuator per controllable DOF is needed. Therefore, the weight and cost will increase dramatically...
Aging Based Cache Policy for The Network of Caches
, M.Sc. Thesis Sharif University of Technology ; Rezazad, Mostafa (Supervisor) ; Ghahramani, Amirali (Co-Supervisor)
Abstract
The basis of the current IP-based networking architecture is on addressing locations (IP addresses). This way of locating and searching content does not meet the existing applications’ demands for generating and consuming larger data. In order to confront this problem, Named Data Networking (NDN) has been proposed that allocates names to data instead of the location. This fundamental change improves the functionality of the network in terms of various aspects such as smoother mobile routing, higher security, intrinsic multicast, broadcast system, and enables caching at the network level. As data directly receives an address in NDN, it can reside anywhere in the network. Furthermore, content...
An experimental study to find the acoustic quality indicators of mulberry wood
, Article ASME International Mechanical Engineering Congress and Exposition, Proceedings (IMECE), 12 November 2010 through 18 November 2010, Vancouver, BC ; Volume 13 , 2010 , Pages 43-47 ; 9780791844502 (ISBN) ; Behzad, M ; Sharif University of Technology
2010
Abstract
Morus Alba or mulberry is a wood species that is broadly used in making musical instruments in Eastern countries. However, the mechanical and acoustical properties of this type of wood are not investigated properly. In this study a set of features, previously examined for other species, are applied to this wood and its acoustic quality is evaluated. Setar, a Persian musical instrument made of mulberry wood, is selected as the test case of this experiment. Different samples of wood are gathered and categorized based on their appropriateness for Setar construction. The quality of each sample is identified based on the Perceptual knowledge of professional Setar makers. The most effective...
Automatic Image Annotation Using Deep Learning
, M.Sc. Thesis Sharif University of Technology ; Jamzad, Mansour (Supervisor)
Abstract
With the advances in technology, Nowadays digital cameras are everywhere. As a result very large amount of images are on the web. Searching through these images intelligently and purposively is an essential need. Recently the possibility of retrieving images with some conceptual words along side of content based image retrieval has been studied in computer vision. For this purpose it’s required that for each image several words that describe its content be assigned automatically. One of the main problems for this task is semantic gap, meaning that the low level features such as color, texture,… don’t have the ability to describe the high level concepts in images which are comprehensible by...
Human Activity Recognition with Spatio Temporal Features in RGB-D Videos
, M.Sc. Thesis Sharif University of Technology ; Jamzad, Mansour (Supervisor)
Abstract
Human activity recognition is an important and useful area in computer vision that application include surveillance systems, patient monitoring systems, human-computer interaction and analyse video data from big websites.Traditional Human action recognition use the RGB videos as default input that unable describe motion and action as full. On the other hand Kinect camera sendsthe RGB data to output in addition to the Depth Data that allows us to extract skeleton of human easily. Recently Space-time features have been particulary popular in RGB Videos because of their structure. These features are describedby their descriptor and send the good and important information to output.Finally we...
Setar Production Modification With Vibration Analysis
, M.Sc. Thesis Sharif University of Technology ; Behzad, Mehdi (Supervisor)
Abstract
Setar is a traditional Persian musical instrument. Nowadays, Setar is one of the most common musical instruments in Persian music. A systematic method for Setar production modification has not been introduced yet. This work is the first scientific work about analysis of this instrument. The aim of this study is to undertake early steps for Setar quality improvement. In this thesis, after analysis of the wood using in Setar construction, numerical and experimental methods have been utilized to analyze this instrument. After that, some works has been performed to extract an objective function which can judge about Setar quality. The results show good agreement between experimental and...
Automatic Skin Cancer (Melanoma) Detection Using Visual Features
, M.Sc. Thesis Sharif University of Technology ; Jamzad, Mansour (Supervisor)
Abstract
Melanoma is a malignant skin cancer which is caused by cancerous growth of melanocytes. If not treated at its early development stages, melanoma is the deadliest form of cancer. The best way to cure melanoma is to treat it in its earliest stage of development. Since a melanoma leasion is similar to benign moles (regaring its shape and appearance) at its early stages of development, it is often mistaken for moles and left untreated. Therefore, automatic melanoma detection can increase the survival rate of patients by detecting melanoma in its early stages. In this thesis, a new method for automatic diagnosis of melanoma using segmented dermoscopic images is provided. Almost all related...
Tamper Detection in Digital Images Using Transform Domains
,
M.Sc. Thesis
Sharif University of Technology
;
Jamzad, Mansour
(Supervisor)
Abstract
Nowadays, digital images are easy to manipulate and edit due to availability of powerful image processing and editing software. It is possible to add or remove important features to the image without leaving any obvious traces of tampering. Therefore, proving the authenticity and integrity of digital media becomes increasingly important. In this study, we focus on detection of a special type of digital forgery, the copy-move attack, in which a part of the image is copied and pasted somewhere else in the image with the intent to cover an important image features or to add some fake feature. In this way we propose some novel methods that work in spatial domain, Discrete Cosine domain and...
A Hybrid Method for Improving the Color Constancy in Images
, M.Sc. Thesis Sharif University of Technology ; Jamzad, Mansour (Supervisor)
Abstract
The ability of measuring colors of objects, independent of light source illumination, is called color constancy which is an important field in machine vision and image processing. In this thesis, we propose five new combinantional ways in color constansy fields. The first two proposed methods use neural networks to combining basic methods. The third and forth proposed methods use fuzzy measures and integrals for combining color constancy methods. And finally fifth method combines methods with indoor outdoor classification this method has the best result (3.01 median angular error) in proposed methods and past methods in color constancy fields. It is shown in this article that the proposed...
A Fast Algorithm for Shadow Generation with Low Distortion Based on Shadow Map Technique
, M.Sc. Thesis Sharif University of Technology ; Jamzad, Mansour (Supervisor)
Abstract
Shadows are one of the most important details in graphical images. There exist many shadow generation algorithms each of which suffers from some problems. High processing time and ill-shaped shadow borders, known as alasing, are some of such problems. In this paper, we propose a heuristic method based on standard shadow map technique, named rotated shadow maps, to generate excellent hard shadows. Our method uses some shadow maps which are generated from the same view but objects are slightly rotated around the center of view area. Rotated shadow maps can be considered as an independent hard shadow generation algorithm. Also it can be combined with other shadow map based approaches. Utilizing...
Indoor Office Environment Mapping Using a Mobile Robot with Kinect Sensor
, M.Sc. Thesis Sharif University of Technology ; Jamzad, Mansour (Supervisor)
Abstract
In recent years with advancement of Robotics, the applications of wide scale use of robots in our homes is not as far-fetched as it was before. One of the important problems for an indoor robot is moving inside a new and unknown environment. To achieve this, the robot should, with the help of its sensors, not only calculate its location; but should also build a map of the environment for later use. Additionally, the robot must be able to explore this unknown environment. The most important drawbacks of the classical solutions to these problems are long computation times, heavy memory usage and absence of precision. In recent years, large amount of research effort has put on solving these...
Improving the Robustness of Image Watermarking for Publicly Copyright-Proving
, M.Sc. Thesis Sharif University of Technology ; Jamzad, Mansour (Supervisor)
Abstract
The advent of Internet and advancement of computer technologies have enabled convenient and fast exchange of multimedia so the illegal reproduction and modification of digital media has become increasingly serious. Hence, how to protect the intellectual property rights of digital multimedia is an imperative issue. Digital watermarking is one of the solutions to prevent unauthorized use of images. Traditional digital watermarking techniques embed a watermark such as logo, trademark, or copyright information into a host image so that it is not perceptible. These techniques, depending on the amount of embedded data, will distort the content of host image which results in quality degradation of...
Images Classification with Limited Number of Labeled Data Using Domain Adaptation
, M.Sc. Thesis Sharif University of Technology ; Jamzad, Mansour (Supervisor)
Abstract
The traditional machine learning methods assume that the training data and the test data are drawn from the same distribution (or drawn from the same domain). In practice, in many computer vision applications, this assumption may not hold. Unfortunately, the performance of these methods degrades on dataset drawn from a different domain. Domain adaptation attempts to minimize this degradation caused by distribution mismatch between the training and test data. Domain adaptation tries to adapt a model trainded from one domain to another domain. We focus on supervised domain adaptation method in which limited labeled data is available from the target domain. We propose a new domain adaptation...