Loading...
Search for: extensive-simulations
0.006 seconds
Total 58 records

    Using level restoring method for dual supply voltage

    , Article 2006 7th International Symposium on Antennas, Propagation and EM Theory, ISAPE 2006, Guilin, 26 October 2006 through 29 October 2006 ; 2006 , Pages 1170-1173 ; 1424401623 (ISBN); 9781424401628 (ISBN) Emadi, M ; Farbiz, F ; Sadeghi, K. H ; Jafargholi, A ; Sharif University of Technology
    2006
    Abstract
    A new level converter for use in dual voltage SOI digital circuits is presented. The technique which uses the idea of keeper transistors, consumes less power compared to the traditional methods. The effects of load capacitance on the circuit are studied by extensive simulations  

    Reuse-attack mitigation in wireless sensor networks

    , Article IEEE International Conference on Communications, 5 June 2011 through 9 June 2011 ; June , 2011 , Page(s): 1 - 5 ; 05361486 (ISSN) ; 9781612842332 (ISBN) Shafiei, H ; Khonsari, A ; Mirzasoleiman, B ; Ould Khaoua, M ; Sharif University of Technology
    2011
    Abstract
    Privacy preservation in wireless sensor networks has drawn considerable attention from research community during last few years. Emergence of single-owner, multi-user commercial sensor networks along with hostile and uncontrollable environment of such networks, makes the security issue in such networks of a great importance. This paper concentrates on token-based privacy preservation schemes. A possible attack on such schemes has been introduced. Two different approaches has been utilized to mitigate the attack. We present mathematical models for it's effects and overheads. The results have been verified using extensive simulations  

    Optimum hello interval for a connected homogeneous topology in mobile wireless sensor networks

    , Article Telecommunication Systems ; Vol. 52, issue. 4 , April , 2013 , pp. 2475-2488 ; Online ISSN: 1572-9451 Nayebi, A ; Sarbazi-Azad, H ; Sharif University of Technology
    Abstract
    Topology of a mobile wireless sensor/ad hoc network is prone to link breakages due to node mobility which compels the periodic re-construction of the topology in so called ""hello"" intervals. The problem addressed in this paper is determining the maximum ""hello"" interval preserving the connectivity of a homogeneous topology with high probability. In order to study the optimum ""hello"" interval, statistical topology lifetime (STL) is formally defined as a value of ""hello"" interval that ensures statistical connectivity with a given threshold. Temporal properties of the topology are studied based on two phenomena; one concerning a connectivity phase transition with time and the other one... 

    MC-MLAS: Multi-channel Minimum Latency Aggregation Scheduling in Wireless Sensor Networks

    , Article Computer Networks ; Volume 57, Issue 18 , December , 2013 , Pages 3812-3825 ; 13891286 (ISSN) Ghods, F ; Yousefi, H ; Afshin Hemmatyar, A. M ; Movaghar, A ; Sharif University of Technology
    2013
    Abstract
    Data aggregation is a key, yet time-consuming functionality in wireless sensor networks (WSNs). Multi-channel design is a promising technique to alleviate interference as a primary reason for long latency of TDMA aggregation scheduling. Indeed, it provides more potential of parallel transmissions over different frequency channels, thus minimizing time latency. In this paper, we focus on designing a multi-channel minimum latency aggregation scheduling protocol, named MC-MLAS, using a new joint approach for tree construction, channel assignment, and transmission scheduling. To our best knowledge, this is the first work in the literature which combines orthogonal channels and partially... 

    UCS-NT: An unbiased compressive sensing framework for Network Tomography

    , Article ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings ; 2013 , Pages 4534-4538 ; 15206149 (ISSN) ; 9781479903566 (ISBN) Mahyar, H ; Rabiee, H. R ; Hashemifar, Z. S ; Sharif University of Technology
    2013
    Abstract
    This paper addresses the problem of recovering sparse link vectors with network topological constraints that is motivated by network inference and tomography applications. We propose a novel framework called UCS-NT in the context of compressive sensing for sparse recovery in networks. In order to efficiently recover sparse specification of link vectors, we construct a feasible measurement matrix using this framework through connected paths. It is theoretically shown that, only O(k log(n)) path measurements are sufficient for uniquely recovering any k-sparse link vector. Moreover, extensive simulations demonstrate that this framework would converge to an accurate solution for a wide class of... 

    Performance evaluation and enhancement of random access procedure in TETRA networks

    , Article 2010 6th Conference on Wireless Advanced, WiAD 2010, 27 June 2010 through 29 June 2010 ; June , 2010 ; 9781424470716 (ISBN) Azizzadeh, F ; Ghorashi, S. A ; Khodaian, A. M ; Sharif University of Technology
    2010
    Abstract
    In this paper, random access procedure in terrestrial trunked radio (TETRA) networks is described and modeled. Then, the impact of different random access parameters on performance metrics such as "delay" and "throughput" is evaluated. Moreover, in order to have a fast "call setup" which is one of the most important features of TETRA, it is shown that random access delay can be minimized, while maintaining peak throughput. by adaptively adjusting the random access parameters according to the backlogged traffic. The performance improvement of the proposed adaptive parameter adjustment is proved via extensive simulation results  

    Iterative sparsification-projection: Fast and robust sparse signal approximation

    , Article IEEE Transactions on Signal Processing ; Volume 64, Issue 21 , 2016 , Pages 5536-5548 ; 1053587X (ISSN) Sadeghi, M ; Babaie zadeh, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    In this paper, we address recovery of sparse signals from compressed measurements, and sparse signal approximation, which have received considerable attention over the last decade. First, we revisit smoothed L0 (SL0), a well-known sparse recovery algorithm, and give some insights into it that have not been noticed previously. Specifically, we re-derive the SL0 algorithm based on proximal methods, and using recent results in solving nonconvex problems by proximal algorithms, we provide a convergence guarantee for it. In addition, inspired by this derivation, we propose a general family of algorithms, which we call iterative sparsification-projection (ISP), having SL0 as a special member. Our... 

    Compressive sensing of high betweenness centrality nodes in networks

    , Article Physica A: Statistical Mechanics and its Applications ; Volume 497 , 1 May , 2018 , Pages 166-184 ; 03784371 (ISSN) Mahyar, H ; Hasheminezhad, R ; Ghalebi, E ; Nazemian, A ; Grosu, R ; Movaghar, A ; Rabiee, H. R ; Sharif University of Technology
    Elsevier B.V  2018
    Abstract
    Betweenness centrality is a prominent centrality measure expressing importance of a node within a network, in terms of the fraction of shortest paths passing through that node. Nodes with high betweenness centrality have significant impacts on the spread of influence and idea in social networks, the user activity in mobile phone networks, the contagion process in biological networks, and the bottlenecks in communication networks. Thus, identifying k-highest betweenness centrality nodes in networks will be of great interest in many applications. In this paper, we introduce CS-HiBet, a new method to efficiently detect top-k betweenness centrality nodes in networks, using compressive sensing.... 

    Robust audio data hiding using correlated quantization with histogram-based detector

    , Article IEEE Transactions on Multimedia ; Volume 11, Issue 5 , 2009 , Pages 834-842 ; 15209210 (ISSN) Akhaee, M. A ; Saberian, M. J ; Feizi, S ; Marvasti, F ; Sharif University of Technology
    2009
    Abstract
    In this paper, two blind audio watermarking methods using correlated quantization for data embedding with histogram-based detector have been proposed. First, a novel mapping called the point-to-point graph (PPG) is introduced. In this mapping, the value of samples is important as well as the correlation among them. As this mapping increases the dimension of the signal, the data embedding procedure (quantization) will be diversified more securely than that of the 1-D domains such as the time or frequency domains. Hence, two watermarking techniques coined as hard and soft quantization methods based on the quantization of the PPG point radii are suggested. The performance of both techniques is... 

    Directional rumor routing in wireless sensor networks

    , Article 3rd IEEE/IFIP International Conference in Central Asia on Internet, ICI 2007, Tashkent, 26 September 2007 through 28 September 2007 ; 2007 ; 1424410061 (ISBN); 9781424410064 (ISBN) Shokrzadeh, H ; Haghighat, A. T ; Tashtarian, F ; Nayebi, A ; Sharif University of Technology
    IEEE Computer Society  2007
    Abstract
    Rumor routing is a classic routing algorithm based on the random walk of agents. In this paper, a method to improve the performance of this routing algorithm is proposed. Here, we try to improve the latency and energy consumption of the traditional algorithm using propagation of query and event agents in straight lines, instead of using purely random walk paths. As our results confirm, this method improves the delivery ratio of the queries which is a drawback of traditional rumor routing. To compare the performance measures with traditional algorithm, a simulation framework is developed and extensive simulations are performed. ©2007 IEEE  

    Monitoring multivariate profiles in multistage processes

    , Article Communications in Statistics: Simulation and Computation ; Volume 50, Issue 11 , 2021 , Pages 3436-3464 ; 03610918 (ISSN) Bahrami, H ; Akhavan Niaki, T ; Khedmati, M ; Sharif University of Technology
    Taylor and Francis Ltd  2021
    Abstract
    In some quality control applications, processes consist of multiple components, stations or stages to finish the final products or the services. Some quality characteristics in each stage of these processes (called multistage processes) can be represented by a relationship between a response and one or more explanatory variables which is named as profile. In this paper, a general model is proposed for monitoring multivariate profiles in multistage processes. To this aim, the multivariate form of the U transformation approach is first used to remove the effect of the cascade property between the stages. Then, three control schemes are employed to monitor the parameters of multivariate simple... 

    A lightweight secure and resilient transmission scheme for the internet of things in the presence of a hostile jammer

    , Article IEEE Internet of Things Journal ; Volume 8, Issue 6 , 2021 , Pages 4373-4388 ; 23274662 (ISSN) Letafati, M ; Kuhestani, A ; Wong, K. K ; Piran, M. J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    In this article, we propose a lightweight security scheme for ensuring both information confidentiality and transmission resiliency in the Internet-of-Things (IoT) communication. A single-Antenna transmitter communicates with a half-duplex single-Antenna receiver in the presence of a sophisticated multiple-Antenna-Aided passive eavesdropper and a multiple-Antenna-Assisted hostile jammer (HJ). A low-complexity artificial noise (AN) injection scheme is proposed for drowning out the eavesdropper. Furthermore, for enhancing the resilience against HJ attacks, the legitimate nodes exploit their own local observations of the wireless channel as the source of randomness to agree on shared secret... 

    Performance modeling of the LEACH protocol for mobile wireless sensor networks

    , Article Journal of Parallel and Distributed Computing ; Vol. 71, issue. 6 , 2011 , p. 812-821 ; ISSN: 07437315 Nayebi, A ; Sarbazi-Azad, H ; Sharif University of Technology
    Abstract
    In many wireless sensor network applications, nodes are mobile, while many protocols proposed for these networks assume a static network. Thus, it is important to evaluate if a traditional protocol designed for a static network can tolerate different levels of mobility. This paper provides an analytic model to investigate the effect of mobility on a well-known cluster-based protocol, LEACH. The model evaluates data loss after construction of the clusters due to node mobility, which can be used to estimate a proper update interval to balance the energy and data loss ratio. Thus, the results can help the network designer to adjust the topology update interval given a value of acceptable data... 

    Geometrical analysis of localization error in stereo vision systems

    , Article IEEE Sensors Journal ; Volume 13, Issue 11 , 2013 , Pages 4236-4246 ; 1530437X (ISSN) Fooladgar, F ; Samavi, S ; Soroushmehr, S. M. R ; Shirani, S ; Sharif University of Technology
    2013
    Abstract
    Determining an object location in a specific region is an important task in many machine vision applications. Different parameters affect the accuracy of the localization process. The quantization process in charge-coupled device of a camera is one of the sources of error that causes estimation rather than identifying the exact position of the observed object. A cluster of points, in the field of view of a camera are mapped into a pixel. These points form an uncertainty region. In this paper, we present a geometrical model to analyze the volume of this uncertainty region as a criterion for object localization error. The proposed approach models the field of view of each pixel as an oblique... 

    Locality-awareness in multi-channel peer-to-peer live video streaming networks

    , Article Proceedings - International Conference on Advanced Information Networking and Applications, AINA ; March , 2013 , Pages 1048-1055 ; 1550445X (ISSN) ; 9780769549538 (ISBN) Bayat, N ; Rabiee, H. R ; Salehi, M ; Sharif University of Technology
    2013
    Abstract
    The current multi-channel P2P video streaming architectures still suffer from several performance problems such as low Quality of Service (QoS) in unpopular channels. The P2P systems are inherently dynamic, and their performance problems could be categorized into four groups; peer churn, channel churn, uncooperative peers, and geographical distribution of peers. In this paper, for the first time, we develop a novel locality-incentive framework for multi-channel live video streaming. We propose a hierarchical overlay network architecture by utilizing a dual-mode locality-Awareness method (spatial and temporal). Moreover, an incentive mechanism for encouraging peers to dedicate their upload... 

    Optimum hello interval for a connected homogeneous topology in mobile wireless sensor networks

    , Article Telecommunication Systems ; Volume 52, Issue 4 , 2013 , Pages 2475-2488 ; 10184864 (ISSN) Nayebi, A ; Sarbazi Azad, H ; Sharif University of Technology
    2013
    Abstract
    Topology of a mobile wireless sensor/ad hoc network is prone to link breakages due to node mobility which compels the periodic re-construction of the topology in so called "hello" intervals. The problem addressed in this paper is determining the maximum "hello" interval preserving the connectivity of a homogeneous topology with high probability. In order to study the optimum "hello" interval, statistical topology lifetime (STL) is formally defined as a value of "hello" interval that ensures statistical connectivity with a given threshold. Temporal properties of the topology are studied based on two phenomena; one concerning a connectivity phase transition with time and the other one... 

    Structure-free real-time data aggregation in wireless sensor networks

    , Article Computer Communications ; Volume 35, Issue 9 , 2012 , Pages 1132-1140 ; 01403664 (ISSN) Yousefi, H ; Yeganeh, M. H ; Alinaghipour, N ; Movaghar, A ; Sharif University of Technology
    2012
    Abstract
    Data aggregation is a very important method to conserve energy by eliminating the inherent redundancy of raw data in dense WSNs. Although structured approaches are particularly useful for data gathering applications, they incur high maintenance overhead in dynamic scenarios for event-based applications. Moreover, a WSN should be capable of timely fulfilling its mission without losing important information in event-critical applications. In this paper, we focus on designing a structure-free Real-time data AGgregation protocol, RAG, using two mechanisms for temporal and spatial convergence of packets - Judiciously Waiting policy and Real-time Data-aware Anycasting policy. Using extensive... 

    Multivariate variability monitoring using EWMA control charts based on squared deviation of observations from target

    , Article Quality and Reliability Engineering International ; Volume 27, Issue 8 , 2011 , Pages 1069-1086 ; 07488017 (ISSN) Memar, A. O ; Niaki, S. T. A ; Sharif University of Technology
    Abstract
    Recent research works have shown that control statistics based on squared deviation of observations from target have the ability to monitor variability in both univariate and multivariate processes. In the current research, the properties of the control statistic S t that has been proposed by Huwang et al. (J. Quality Technology 2007; 39:258-278) are first reviewed and three new S t-based multivariate schemes are then presented. Extensive simulation experiments are performed to compare the performances of the proposed schemes with those of the multivariate exponentially weighted mean squared deviation (MEWMS) and the L 1-norm distance of the MEWMS deviation from its expected value (MEWMSL 1)... 

    RDAG: A structure-free real-time data aggregation protocol for wireless sensor networks

    , Article Proceedings - 17th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2011, 28 August 2011 through 31 August 2011 ; Volume 1 , August , 2011 , Pages 51-60 ; 9780769545028 (ISBN) Yeganeh, M. H ; Yousefi, H ; Alinaghipour, N ; Movaghar, A ; Sharif University of Technology
    2011
    Abstract
    Data aggregation is an effective technique which is introduced to save energy by reducing packet transmissions in WSNs. However, it extends the delay at the intermediate nodes, so it can complicate the handling of delayconstrained data in event-critical applications. Besides, the structure-based aggregation as the dominant data gathering approach in WSNs suffers from high maintenance overhead in dynamic scenarios for event-based applications. In this paper, to make aggregation more efficient, we design a novel structure-free Real-time Data AGgregation protocol, RDAG, using a Real-time Data-aware Routing policy and a Judiciously Waiting policy for spatial and temporal convergence of packets.... 

    Watermarking based on independent component analysis in spatial domain

    , Article Proceedings - 2011 UKSim 13th International Conference on Modelling and Simulation, UKSim 2011, 30 March 2011 through 1 April 2011, Cambridge ; 2011 , Pages 299-303 ; 9780769543765 (ISBN) Hajisami, A ; Rahmati, A ; Babaie Zadeh, M ; Sharif University of Technology
    2011
    Abstract
    This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA). In the suggested scheme, embedding is carried out in cumulative form in spatial domain and ICA is used for watermark extraction. For extraction there is no need to access the original image or the watermark, and extraction is carried out only with two watermarked images. Experimental results show that the new method has better quality than famous methods [1], [2], [3] in spatial or frequency domain and is robust against various attacks. Noise addition, resizing, low pass filtering, multiple marks, gray-scale reduction, rotation, JPEG compression, and cropping are some...