Loading...
Search for: shah-mansouri--hamed
0.108 seconds

    Energy-Aware Computation Offloading for Wireless Powered Mobile-Edge Computing Systems

    , M.Sc. Thesis Sharif University of Technology Bolourian, Mehdi (Author) ; Shah Mansouri, Hamed (Supervisor)
    Abstract
    Mobile edge computing (MEC) is envisioned to address the computation demands of Internet of Things (IoT) devices. However, it is crucial for the MEC to operate in coordination with the cloud tier to achieve a highly scalable IoT system. In addition, IoT devices require regular maintenance to either recharge or replace their batteries which may not always be feasible. Wireless energy transfer (WET) can provide IoT devices a stable source of energy. Nonetheless, proper scheduling of energy harvesting and efficient allocation of computing resources are the key for sustainable operation of these devices. In this thesis, we introduce a three-tier wireless powered mobile edge computing (WPMEC)... 

    Artificial Intelligence as a Service in Edge Computing

    , M.Sc. Thesis Sharif University of Technology Pourakbar, Vahid (Author) ; Shah Mansouri, Hamed (Supervisor)
    Abstract
    Artificial intelligence (AI) has become an instrumental force in reshaping various sectors, especially in mobile networks. To realize AI as a service (AIaaS) and enable prompt decision-making, edge computing has risen as an innovative response, pushing computation closer to data sources. Although this is promising to reduce the dependency on remote cloud infrastructures and save the mobile devices’ energy, current methodologies display constraints in effectively distributing deep neural network (DNN) inference tasks, leading to possible resource underutilization and performance compromises. To tackle these issues, in this thesis, we study AIaaS at the edge and focus on renowned DNN... 

    Indoor Positioning Based on Wi-Fi and Bluetooth Low Energy

    , M.Sc. Thesis Sharif University of Technology Beigi Harchekani, Karamat (Author) ; Shah Mansouri, Hamed (Supervisor)
    Abstract
    Indoor positioning plays a pivotal role in a wide range of applications, from smart homes to industrial automation. In this thesis, we propose a comprehensive approach for accurate positioning in indoor environments through the integration of existing Wi-Fi and Bluetooth Low Energy (BLE) devices. The proposed algorithm involves acquiring the received signal strength indicator (RSSI) data from these devices and capturing the complex interactions between RSSI and positions. To enhance the accuracy of the collected data, we first use a Kalman filter for denoising RSSI values, then categorize them into distinct classes using the K-nearest neighbor (KNN) algorithm. Incorporating the filtered... 

    Job Scheduling for Edge-Cloud Computing in IoT Systems

    , M.Sc. Thesis Sharif University of Technology Sojoudi Haghighi, Majid (Author) ; Shah Mansouri, Hamed (Supervisor) ; Namvar, Mehrzad (Co-Supervisor)
    Abstract
    IoT-based systems use cloud computing servers that are generally far away from them to perform tasks. Whenever there is a computational task that requires heavy and complex processing, the problem of offloading decision is to identify the best computing server to perform the processing related to this task. Numerous dynamic factors affect the solution to this problem.Optimization in energy consumption of the device that has generated a task alongside reducing its calculation delay can be applied in solving the offloading problem. The optimization problem that is formed to minimize the energy consumption in the offloading decision is an integer programming problem that is generally difficult... 

    AI as a Service via DNNs Coordination on Edge

    , M.Sc. Thesis Sharif University of Technology Malekim, Alireza (Author) ; Hosein Khalaj, Babak (Supervisor) ; Shah Mansouri, Hamed (Supervisor)
    Abstract
    As artificial intelligence (AI) applications continue to proliferate, the demand for deep neural network (DNN) models is on the rise. Many applications employing DNNs are sensitive to processing time or require significant processing power for their inputs. One current method for providing DNN-based services is through edge computing ser- vices. These services have less processing power compared to cloud services but can offer greater accessibility. While DNN models deployed at the edge offer promising prospects for delivering AI services with minimal latency, their potential for collabora- tion remains largely unexplored. In this thesis, we propose that DNN service providers pool their... 

    Evaluation of Intelligent Automation Solutions in 5G Cloud-Native Mobile Network

    , M.Sc. Thesis Sharif University of Technology Mamaghani, Ali (Author) ; Hossein Khalaj, Babak (Supervisor) ; Shah Mansouri, Hamed (Supervisor)
    Abstract
    In today's world, mobile network technology and artificial intelligence models have made significant advancements. In this project, we intend to combine the two elements of mobile networks and artificial intelligence to reveal new aspects of these two fields, which have been less practically addressed in the past. In implementing this mobile network, we use the cloud-native software concept, which existed in the software world before mobile networks and became widespread around 2014 with Google’s introduction of Kubernetes. Another notable point in the world of computer science that helps us is the recent advancements in the field of artificial intelligence. In fact, with increased... 

    Multi-Agent Computation Offloading for Edge AI as a Service

    , M.Sc. Thesis Sharif University of Technology Samadi Gonbadani, Nima (Author) ; Shah Mansouri, Hamed (Supervisor) ; Hossein Khalaj, Babak (Supervisor)
    Abstract
    Nowadays the importance of Artificial Intelligence (AI) in daily life cannot be denied. Apart from improving quality of life, AI can be utilized to increase industrial efficiency and lower human errors. Due to the high computational needs of AI models, especially those based on Deep Neural Networks (DNN), powerful cloud computing servers are used to execute these models. However, low latency requirements, communicational pressure on the network backbone, and privacy concerns have made it possible for another computational paradigm to tackle these issues. This computational paradigm is called edge computing and is based on utilizing hardware resources available at the network edge and user... 

    An upper bound on the performance of non-repetitive flooding over CSMA in wireless ad-hoc networks

    , Article 2009 IEEE International Conference on Communications, ICC 2009, Dresden, 14 June 2009 through 18 June 2009 ; 2009 ; 05361486 (ISSN); 9781424434350 (ISBN) Shah Mansouri, H ; Pakravan, M. R ; Sharif University of Technology
    2009
    Abstract
    Although flooding and its variants are widely deployed for broadcasting by different applications, there are limited results on a complete and comprehensive analytical framework describing their behavior in general cases. We have previously published results which provide an upper bound for the performance of flooding when flooded packets have the highest serving priority. In this paper, using a different and simpler approach, we develop an analytical framework for analysis of flooding in general cases where flooding packets do not receive any special priority treatment in the network. The analysis is performed for a static multi-hop ad hoc wireless network using CSMA as its MAC layer. The... 

    Reliable and energy efficient single source broadcasting using network coding in wireless Ad-hoc networks

    , Article 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, Penang, 14 May 2007 through 17 May 2007 ; February , 2007 , Pages 81-85 ; 1424410940 (ISBN); 9781424410941 (ISBN) Shah Mansouri, H ; Pakravan, M. R ; Sharif University of Technology
    2007
    Abstract
    There are applications where important and critical data should be sent to all nodes in a wireless Ad-hoc network. Flooding and its variants are typically used to achieve this target. Network coding can also be used for broadcasting in such an environment. Energy consumption in the network, coverage and total delay are all important parameters that should be considered when an algorithm is evaluated. In this article, a reliable and energy efficient single source broadcasting algorithm is proposed based on network coding. This algorithm guarantees the delivery of desired messages to all network nodes, consumes less energy compared and reduces the total delay compared to other algorithms. This... 

    Optimal utility-energy tradeoff in delay constrained random access networks

    , Article 2009 IEEE International Conference on Communications, ICC 2009, Dresden, 14 June 2009 through 18 June 2009 ; 2009 ; 05361486 (ISSN); 9781424434350 (ISBN) Khodaian, A ; Hossein Khalaj, B ; Shah Mansouri, H ; Sharif University of Technology
    2009
    Abstract
    Rate, energy and delay are three main parameters of interest in ad-hoc networks. In this paper, we discuss the problem of maximizing network utility and minimizing energy consumption while satisfying a given transmission delay constraint for each packet. We formulate this problem in the standard convex optimization form and subsequently discuss the tradeoff between utility, energy and delay in such framework. Also, in order to adapt for the distributed nature of the network, a distributed algorithm where nodes decide on choosing transmission rates and probabilities based on their local information is introduced. ©2009 IEEE  

    Performance analysis of flooding over CSMA in wireless ad-hoc networks

    , Article 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008, Poznan, 15 September 2008 through 18 September 2008 ; 2008 ; 9781424426447 (ISBN) Shah Mansouri, H ; Bahramian, S ; Pakravan, M. R ; Sharif University of Technology
    2008
    Abstract
    Flooding and its variants are the simplest and most widely used broadcasting methods. Therefore, analysis of its performance in an ad-hoc environment using realistic assumptions is an important research topic. In this article, deploying a rigorous theoretic analysis, an upper bound on the performance of probabilistic flooding running over CSMA as a real and suitable MAC layer protocol for broadcasting scenarios is derived in a static multi-hop ad-hoc network in saturated condition. This model reveals the relation between network parameters and the performance of flooding and thus, helps the designer to have a better understanding of the effect of different design parameters. Using this... 

    Adaptive fault-tolerant data flooding for energy-aware sensor networks

    , Article 2nd International Conference on Intelligent Sensing and Information Processing, ICISIP'05, Chennai, 4 January 2005 through 7 January 2005 ; Volume 2005 , 2005 , Pages 83-87 ; 0780388402 (ISBN); 9780780388406 (ISBN) Karzand, M ; Ghannad Rezaie, M ; Shah Mansouri, V ; Sharif University of Technology
    2005
    Abstract
    Flooding technique is widely using to manipulate sensor network essential activities such as synchronization, data gathering, network query and in-network information processing. Reliable and low latency data broadcasting is the primary goal in design of appropriate quality of service aware flooding algorithm. This paper proposes a new error-rate adaptive reliable data flooding strategy. Energy consumption which it the main limitation in sensor network, has been considered in optimal presented scheme. Also the tradeoff between reliability, power consumption and latency has been cared to achieve the finest devise. The simulation results have shown significant enhancement in quality of data... 

    Performance Analysis of Flooding-based Broadcasting in Wireless Networks

    , Ph.D. Dissertation Sharif University of Technology Shah-Mansouri, Hamed (Author) ; Hossein Khalaj, Babak (Supervisor)
    Abstract
    Broadcasting in wireless ad hoc networks serves many important tasks such as data dissemination and route establishment in which one node sends its data to all other network nodes. The most popular form of broadcasting adopted by many ad-hoc protocols is flooding. In flooding, each node receiving a packet from a neighboring node rebroadcasts it exactly once. Wide adoption of flooding for broadcasting traffic is mainly due to its simplicity. The importance of performance analysis of flooding lies on its aforementioned popularity. The parameters of interest in analysis of flooding are network coverage, energy consumption and broadcast throughput while network coverage is the average percentage... 

    Achievable throughput of wireless networks with local traffic

    , Article IEEE Wireless Communications and Networking Conference, WCNC ; 10 November , 2014 , Pages 3076-3081 ; ISSN: 15253511 ; ISBN: 9781479930838 Shariatpanahi, S. P ; Khalaj, B. H ; Shah-Mansouri, H ; Sharif University of Technology
    2014
    Abstract
    Many applications in wireless networks impose locally distributed traffic on the network. We consider the effect of traffic localization on throughput of large wireless networks in the scaling sense. We show that by careful exploitation of traffic localization, one can enhance the throughput of various schemes in wireless networks. Also, the important case of Small World traffic distribution in wireless networks is addressed. In this type of traffic, in addition to the local traffic, a non-negligible amount of global traffic should be handled by the network. It is shown that a non-negligible amount of network-wide traffic can be tolerated by network without any performance degradation in the... 

    Analytical modeling and performance analysis of flooding in CSMA-based wireless networks

    , Article IEEE Transactions on Vehicular Technology ; Volume 60, Issue 2 , Volume 60, Issue 2 , 2011 , Pages 664-679 ; 00189545 (ISSN) Shah Mansouri, H ; Pakravan, M. R ; Khalaj, B. H ; Sharif University of Technology
    2011
    Abstract
    Although different broadcasting techniques are widely deployed in wireless networks, there are limited comprehensive analytical frameworks to evaluate the performance of such schemes. In this paper, based on a rigorous theoretical analysis, upper bounds on the network coverage and the total number of transmissions (corresponding to network energy consumption) of flooding and its popular variant probabilistic flooding are derived. The analysis is performed for a static multihop ad hoc wireless network when the network is in saturated condition. To consider a realistic medium-access control (MAC) layer algorithm, successful signal reception is based on the protocol model, and nodes employ... 

    On the route discovery rate of flooding in large wireless networks

    , Article IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC ; 2012 , Pages 1238-1242 ; 9781467325691 (ISBN) Shah-Mansouri, H ; Khalaj, B. H ; Shariatpanahi, S. P ; Sharif University of Technology
    2012
    Abstract
    In this paper, we derive the rate of route discovery process for finding a randomly chosen destination in large wireless networks. The well-known protocol for route discovery is flooding in which each node simply rebroadcasts the route request packet once. Rate of route discovery process is defined as the inverse of time between transmitting two successive route request packets which shows how fast a node can request a route to its destination. Discovery time is another parameter of interest. For a single node discovering routes to its destination, at most the rate of Eθ (1/3√n) is feasible when n identical nodes are optimally placed in network area and the discovery time is of order... 

    Power allocation scheme in time division multiple access distributed multiple-input multiple-output interference channels

    , Article IET Communications ; Volume 7, Issue 5 , 2013 , Pages 391-396 ; 17518628 (ISSN) Shariatpanahi, S. P ; Khalaj, B. H ; Shah Mansouri, H ; Sharif University of Technology
    2013
    Abstract
    In this study, the authors propose a novel power allocation scheme in time division multiple access (TDMA)-based distributed multiple-input multiple-output (MIMO) channels. By modelling the problem with a TDMA MIMO interference channel, the authors have derived closed-form expressions for power and time slot assigned to each MIMO transmission. Although our scheme is sub-optimal, with the aid of Jensen's inequality, it is shown to be superior to solutions based on channel inversion. In addition, the proposed scheme is compared with the optimal solution, and also with the scheme proposed by Dohler. By applying our proposed power allocation to the hierarchical cooperation strategy, the authors... 

    Reinforcement learning-based task scheduling using dvfs techniques in mobile devices

    , Article IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC ; 2023 ; 978-166546483-3 (ISBN) Hajikhodaverdian, M ; Rastaghi, H ; Saadat, M ; Shah Mansouri, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2023
    Abstract
    Mobile devices are equipped with a multi-core heterogeneous processing architecture to balance the trade-off between performance and power efficiency. To take advantage of this architecture, in this paper, we propose a task scheduling algorithm that allocates the cores to computation tasks and adjusts the cores' operating frequency by using the dynamic voltage and frequency scaling (DVFS) technique. Our objective is to minimize the battery energy consumption of devices. We also consider offloading the tasks to a cloud server to address their ever increasingly computation demand. In order to design the task scheduling algorithm, we first formulate a combinatorial optimization problem. To... 

    One-hop throughput of wireless networks with random connections

    , Article IEEE Wireless Communications Letters ; Volume 1, Issue 3 , 2012 , Pages 205-208 ; 21622337 (ISSN) Shariatpanahi, S. P ; Khalaj, B. H ; Alishahi, K ; Shah Mansouri, H ; Sharif University of Technology
    2012
    Abstract
    We consider one-hop communication in wireless networks with random connections. In the random connection model, the channel powers between different nodes are drawn from a common distribution in an i.i.d. manner. In a wireless network with n nodes, a simple one-hop scheme achieving the throughput scaling of order n 1/3-δ, for any arbitrarily small δ > 0, is proposed. This scheme is based on maximizing the number of successful concurrent transmissions. Such achievable throughput, along with the order n 1/3 upper bound derived by Cui et al., characterizes the throughput of one-hop schemes for the class of connection models with distribution having finite mean and variance  

    Throughput of Large One-Hop Ad Hoc Wireless Networks With General Fading

    , Article IEEE Transactions on Vehicular Technology ; Volume 64, Issue 7 , 2015 , Pages 3304-3310 ; 00189545 (ISSN) Shariatpanahi, S. P ; Khalaj, B. H ; Alishahi, K ; Shah Mansouri, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    We consider the problem of determining throughput of one-hop unicast transmissions in ad hoc wireless networks. We consider an interference-limited scenario in which wireless links between different nodes are modeled by independently and identically distributed random variables. The main decoding challenge for receive nodes is due to interference of nonintended concurrent transmissions. In this scenario, we consider a heuristic one-hop transmission strategy based on activating source-destination pairs with strongest direct links and forcing other pairs to be silent. We present a closed-form expression for throughput scaling of such strategy, for a completely general channel power...