Loading...
Search for: shah-mansouri--v
0.11 seconds

    Adaptive fault-tolerant data flooding for energy-aware sensor networks

    , Article 2nd International Conference on Intelligent Sensing and Information Processing, ICISIP'05, Chennai, 4 January 2005 through 7 January 2005 ; Volume 2005 , 2005 , Pages 83-87 ; 0780388402 (ISBN); 9780780388406 (ISBN) Karzand, M ; Ghannad Rezaie, M ; Shah Mansouri, V ; Sharif University of Technology
    2005
    Abstract
    Flooding technique is widely using to manipulate sensor network essential activities such as synchronization, data gathering, network query and in-network information processing. Reliable and low latency data broadcasting is the primary goal in design of appropriate quality of service aware flooding algorithm. This paper proposes a new error-rate adaptive reliable data flooding strategy. Energy consumption which it the main limitation in sensor network, has been considered in optimal presented scheme. Also the tradeoff between reliability, power consumption and latency has been cared to achieve the finest devise. The simulation results have shown significant enhancement in quality of data... 

    An upper bound on the performance of non-repetitive flooding over CSMA in wireless ad-hoc networks

    , Article 2009 IEEE International Conference on Communications, ICC 2009, Dresden, 14 June 2009 through 18 June 2009 ; 2009 ; 05361486 (ISSN); 9781424434350 (ISBN) Shah Mansouri, H ; Pakravan, M. R ; Sharif University of Technology
    2009
    Abstract
    Although flooding and its variants are widely deployed for broadcasting by different applications, there are limited results on a complete and comprehensive analytical framework describing their behavior in general cases. We have previously published results which provide an upper bound for the performance of flooding when flooded packets have the highest serving priority. In this paper, using a different and simpler approach, we develop an analytical framework for analysis of flooding in general cases where flooding packets do not receive any special priority treatment in the network. The analysis is performed for a static multi-hop ad hoc wireless network using CSMA as its MAC layer. The... 

    Reliable and energy efficient single source broadcasting using network coding in wireless Ad-hoc networks

    , Article 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, Penang, 14 May 2007 through 17 May 2007 ; February , 2007 , Pages 81-85 ; 1424410940 (ISBN); 9781424410941 (ISBN) Shah Mansouri, H ; Pakravan, M. R ; Sharif University of Technology
    2007
    Abstract
    There are applications where important and critical data should be sent to all nodes in a wireless Ad-hoc network. Flooding and its variants are typically used to achieve this target. Network coding can also be used for broadcasting in such an environment. Energy consumption in the network, coverage and total delay are all important parameters that should be considered when an algorithm is evaluated. In this article, a reliable and energy efficient single source broadcasting algorithm is proposed based on network coding. This algorithm guarantees the delivery of desired messages to all network nodes, consumes less energy compared and reduces the total delay compared to other algorithms. This... 

    Energy-Aware Computation Offloading for Wireless Powered Mobile-Edge Computing Systems

    , M.Sc. Thesis Sharif University of Technology Bolourian, Mehdi (Author) ; Shah Mansouri, Hamed (Supervisor)
    Abstract
    Mobile edge computing (MEC) is envisioned to address the computation demands of Internet of Things (IoT) devices. However, it is crucial for the MEC to operate in coordination with the cloud tier to achieve a highly scalable IoT system. In addition, IoT devices require regular maintenance to either recharge or replace their batteries which may not always be feasible. Wireless energy transfer (WET) can provide IoT devices a stable source of energy. Nonetheless, proper scheduling of energy harvesting and efficient allocation of computing resources are the key for sustainable operation of these devices. In this thesis, we introduce a three-tier wireless powered mobile edge computing (WPMEC)... 

    Artificial Intelligence as a Service in Edge Computing

    , M.Sc. Thesis Sharif University of Technology Pourakbar, Vahid (Author) ; Shah Mansouri, Hamed (Supervisor)
    Abstract
    Artificial intelligence (AI) has become an instrumental force in reshaping various sectors, especially in mobile networks. To realize AI as a service (AIaaS) and enable prompt decision-making, edge computing has risen as an innovative response, pushing computation closer to data sources. Although this is promising to reduce the dependency on remote cloud infrastructures and save the mobile devices’ energy, current methodologies display constraints in effectively distributing deep neural network (DNN) inference tasks, leading to possible resource underutilization and performance compromises. To tackle these issues, in this thesis, we study AIaaS at the edge and focus on renowned DNN... 

    Performance Analysis of Flooding-based Broadcasting in Wireless Networks

    , Ph.D. Dissertation Sharif University of Technology Shah-Mansouri, Hamed (Author) ; Hossein Khalaj, Babak (Supervisor)
    Abstract
    Broadcasting in wireless ad hoc networks serves many important tasks such as data dissemination and route establishment in which one node sends its data to all other network nodes. The most popular form of broadcasting adopted by many ad-hoc protocols is flooding. In flooding, each node receiving a packet from a neighboring node rebroadcasts it exactly once. Wide adoption of flooding for broadcasting traffic is mainly due to its simplicity. The importance of performance analysis of flooding lies on its aforementioned popularity. The parameters of interest in analysis of flooding are network coverage, energy consumption and broadcast throughput while network coverage is the average percentage... 

    Optimal utility-energy tradeoff in delay constrained random access networks

    , Article 2009 IEEE International Conference on Communications, ICC 2009, Dresden, 14 June 2009 through 18 June 2009 ; 2009 ; 05361486 (ISSN); 9781424434350 (ISBN) Khodaian, A ; Hossein Khalaj, B ; Shah Mansouri, H ; Sharif University of Technology
    2009
    Abstract
    Rate, energy and delay are three main parameters of interest in ad-hoc networks. In this paper, we discuss the problem of maximizing network utility and minimizing energy consumption while satisfying a given transmission delay constraint for each packet. We formulate this problem in the standard convex optimization form and subsequently discuss the tradeoff between utility, energy and delay in such framework. Also, in order to adapt for the distributed nature of the network, a distributed algorithm where nodes decide on choosing transmission rates and probabilities based on their local information is introduced. ©2009 IEEE  

    Performance analysis of flooding over CSMA in wireless ad-hoc networks

    , Article 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008, Poznan, 15 September 2008 through 18 September 2008 ; 2008 ; 9781424426447 (ISBN) Shah Mansouri, H ; Bahramian, S ; Pakravan, M. R ; Sharif University of Technology
    2008
    Abstract
    Flooding and its variants are the simplest and most widely used broadcasting methods. Therefore, analysis of its performance in an ad-hoc environment using realistic assumptions is an important research topic. In this article, deploying a rigorous theoretic analysis, an upper bound on the performance of probabilistic flooding running over CSMA as a real and suitable MAC layer protocol for broadcasting scenarios is derived in a static multi-hop ad-hoc network in saturated condition. This model reveals the relation between network parameters and the performance of flooding and thus, helps the designer to have a better understanding of the effect of different design parameters. Using this... 

    Indoor Positioning Based on Wi-Fi and Bluetooth Low Energy

    , M.Sc. Thesis Sharif University of Technology Beigi Harchekani, Karamat (Author) ; Shah Mansouri, Hamed (Supervisor)
    Abstract
    Indoor positioning plays a pivotal role in a wide range of applications, from smart homes to industrial automation. In this thesis, we propose a comprehensive approach for accurate positioning in indoor environments through the integration of existing Wi-Fi and Bluetooth Low Energy (BLE) devices. The proposed algorithm involves acquiring the received signal strength indicator (RSSI) data from these devices and capturing the complex interactions between RSSI and positions. To enhance the accuracy of the collected data, we first use a Kalman filter for denoising RSSI values, then categorize them into distinct classes using the K-nearest neighbor (KNN) algorithm. Incorporating the filtered... 

    Energy efficiency through joint routing and function placement in different modes of SDN/NFV networks

    , Article Computer Networks ; Volume 200 , 2021 ; 13891286 (ISSN) Moosavi, R ; Parsaeefard, S ; Maddah Ali, M. A ; Shah-Mansouri, V ; Khalaj, B. H ; Bennis, M ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    Network function virtualization (NFV) and software-defined networking (SDN) are two promising technologies to enable 5G and 6G services and achieve cost reduction, network scalability, and deployment flexibility. However, migration to full SDN/NFV networks in order to serve these services is a time-consuming process and costly for mobile operators. This paper focuses on energy efficiency during the transition of mobile core networks (MCN) to full SDN/NFV networks and explores how energy efficiency can be addressed during such migration. We propose a general system model containing a combination of legacy nodes and links, in addition to newly introduced NFV and SDN nodes. We refer to this... 

    Achievable throughput of wireless networks with local traffic

    , Article IEEE Wireless Communications and Networking Conference, WCNC ; 10 November , 2014 , Pages 3076-3081 ; ISSN: 15253511 ; ISBN: 9781479930838 Shariatpanahi, S. P ; Khalaj, B. H ; Shah-Mansouri, H ; Sharif University of Technology
    2014
    Abstract
    Many applications in wireless networks impose locally distributed traffic on the network. We consider the effect of traffic localization on throughput of large wireless networks in the scaling sense. We show that by careful exploitation of traffic localization, one can enhance the throughput of various schemes in wireless networks. Also, the important case of Small World traffic distribution in wireless networks is addressed. In this type of traffic, in addition to the local traffic, a non-negligible amount of global traffic should be handled by the network. It is shown that a non-negligible amount of network-wide traffic can be tolerated by network without any performance degradation in the... 

    Analytical modeling and performance analysis of flooding in CSMA-based wireless networks

    , Article IEEE Transactions on Vehicular Technology ; Volume 60, Issue 2 , Volume 60, Issue 2 , 2011 , Pages 664-679 ; 00189545 (ISSN) Shah Mansouri, H ; Pakravan, M. R ; Khalaj, B. H ; Sharif University of Technology
    2011
    Abstract
    Although different broadcasting techniques are widely deployed in wireless networks, there are limited comprehensive analytical frameworks to evaluate the performance of such schemes. In this paper, based on a rigorous theoretical analysis, upper bounds on the network coverage and the total number of transmissions (corresponding to network energy consumption) of flooding and its popular variant probabilistic flooding are derived. The analysis is performed for a static multihop ad hoc wireless network when the network is in saturated condition. To consider a realistic medium-access control (MAC) layer algorithm, successful signal reception is based on the protocol model, and nodes employ... 

    On the route discovery rate of flooding in large wireless networks

    , Article IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC ; 2012 , Pages 1238-1242 ; 9781467325691 (ISBN) Shah-Mansouri, H ; Khalaj, B. H ; Shariatpanahi, S. P ; Sharif University of Technology
    2012
    Abstract
    In this paper, we derive the rate of route discovery process for finding a randomly chosen destination in large wireless networks. The well-known protocol for route discovery is flooding in which each node simply rebroadcasts the route request packet once. Rate of route discovery process is defined as the inverse of time between transmitting two successive route request packets which shows how fast a node can request a route to its destination. Discovery time is another parameter of interest. For a single node discovering routes to its destination, at most the rate of Eθ (1/3√n) is feasible when n identical nodes are optimally placed in network area and the discovery time is of order... 

    Power allocation scheme in time division multiple access distributed multiple-input multiple-output interference channels

    , Article IET Communications ; Volume 7, Issue 5 , 2013 , Pages 391-396 ; 17518628 (ISSN) Shariatpanahi, S. P ; Khalaj, B. H ; Shah Mansouri, H ; Sharif University of Technology
    2013
    Abstract
    In this study, the authors propose a novel power allocation scheme in time division multiple access (TDMA)-based distributed multiple-input multiple-output (MIMO) channels. By modelling the problem with a TDMA MIMO interference channel, the authors have derived closed-form expressions for power and time slot assigned to each MIMO transmission. Although our scheme is sub-optimal, with the aid of Jensen's inequality, it is shown to be superior to solutions based on channel inversion. In addition, the proposed scheme is compared with the optimal solution, and also with the scheme proposed by Dohler. By applying our proposed power allocation to the hierarchical cooperation strategy, the authors... 

    One-hop throughput of wireless networks with random connections

    , Article IEEE Wireless Communications Letters ; Volume 1, Issue 3 , 2012 , Pages 205-208 ; 21622337 (ISSN) Shariatpanahi, S. P ; Khalaj, B. H ; Alishahi, K ; Shah Mansouri, H ; Sharif University of Technology
    2012
    Abstract
    We consider one-hop communication in wireless networks with random connections. In the random connection model, the channel powers between different nodes are drawn from a common distribution in an i.i.d. manner. In a wireless network with n nodes, a simple one-hop scheme achieving the throughput scaling of order n 1/3-δ, for any arbitrarily small δ > 0, is proposed. This scheme is based on maximizing the number of successful concurrent transmissions. Such achievable throughput, along with the order n 1/3 upper bound derived by Cui et al., characterizes the throughput of one-hop schemes for the class of connection models with distribution having finite mean and variance  

    Throughput of Large One-Hop Ad Hoc Wireless Networks With General Fading

    , Article IEEE Transactions on Vehicular Technology ; Volume 64, Issue 7 , 2015 , Pages 3304-3310 ; 00189545 (ISSN) Shariatpanahi, S. P ; Khalaj, B. H ; Alishahi, K ; Shah Mansouri, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    We consider the problem of determining throughput of one-hop unicast transmissions in ad hoc wireless networks. We consider an interference-limited scenario in which wireless links between different nodes are modeled by independently and identically distributed random variables. The main decoding challenge for receive nodes is due to interference of nonintended concurrent transmissions. In this scenario, we consider a heuristic one-hop transmission strategy based on activating source-destination pairs with strongest direct links and forcing other pairs to be silent. We present a closed-form expression for throughput scaling of such strategy, for a completely general channel power... 

    Counter-based broadcasting: Modeling and performance analysis in CSMA-based wireless networks

    , Article IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 13 September 2009 through 16 September 2009, Tokyo ; 2009 ; 9781424451234 (ISBN) Shah Mansouri, H ; Khalaj, B. H ; Pakravan, M. R ; Khodaian, A. M ; Sharif University of Technology
    IEEE  2009
    Abstract
    Counter-based broadcasting improves the performance of flooding by preventing the network from being swamped by a large number of rebroadcast messages. In such approach, the rebroadcast decision is made based on counting duplicated packets in order to restrict the number of extra retransmissions. In this article, using a rigorous theoretic analysis, an upper bound on the performance of counter-based broadcasting for saturated networks is derived. Our model assumes a CSMA-based static multi-hop ad-hoc network. The derived analytical model can be used to predict the behavior of counter-based broadcasting schemes. It especially provides the required insight on the impact of different network... 

    Dynamic scheduling MAC protocol for large scale sensor networks

    , Article 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS 2005, Washington, 7 November 2005 through 10 November 2005 ; Volume 2005 , 2005 , Pages 62-66 ; 0780394666 (ISBN); 9780780394667 (ISBN) Shah Mansouri, V ; MohammadNia Avval, M ; Ghiassi Farrokhfal, Y ; Hossein Khalaj, B ; Sharif University of Technology
    2005
    Abstract
    In this paper a modified neighbor aware medium-access control protocol is proposed designed for wireless sensor networks. Wireless sensor networks are generally comprised of battery powered nodes. These nodes are densely deployed in an ad-hoc structure. The main objective for sensor networks is low power consumption while latency is less important. This leads different MAC layer design for wireless sensor networks compared to conventional ad hoc protocols. In this paper we propose a neighbor aware medium access control to reduce power consumption. This protocol is derived from Modified Distributed mediation device (MDMD) protocol and uses useful properties of this protocol while improves the... 

    Job Scheduling for Edge-Cloud Computing in IoT Systems

    , M.Sc. Thesis Sharif University of Technology Sojoudi Haghighi, Majid (Author) ; Shah Mansouri, Hamed (Supervisor) ; Namvar, Mehrzad (Co-Supervisor)
    Abstract
    IoT-based systems use cloud computing servers that are generally far away from them to perform tasks. Whenever there is a computational task that requires heavy and complex processing, the problem of offloading decision is to identify the best computing server to perform the processing related to this task. Numerous dynamic factors affect the solution to this problem.Optimization in energy consumption of the device that has generated a task alongside reducing its calculation delay can be applied in solving the offloading problem. The optimization problem that is formed to minimize the energy consumption in the offloading decision is an integer programming problem that is generally difficult... 

    Traffic aware dynamic node scheduling for power efficient sensor networks

    , Article 2004 Intelligent Sensors, Sensor Networks and Information Processing Conference, ISSNIP '04, Melbourne, 14 December 2004 through 17 December 2004 ; 2004 , Pages 37-42 ; 0780388933 (ISBN); 9780780388932 (ISBN) Ghannad Rezaie, M ; Shah Mansouri, V ; Pakravan, M. R ; Sharif University of Technology
    2004
    Abstract
    This paper proposes a new medium-access control (MAC) protocol designed for wireless sensor networks. A wireless sensor network is an array of large number of sensors interconnected by a multi-hop ad-hoc network. The primary objective for the sensor network is achieving to low-power consumption while latency is usually less important compare to traditional wireless networks. This characteristic of sensor network motivates the design of new MAC layer so that power consumption is reduced. In this paper, a novel traffic-aware algorithm based on distributed node schedule management (DMD) protocol is introduced that utilizes distributed dynamic node scheduling strategy to dramatically increase...