Loading...
Search for: safety-engineering
0.005 seconds
Total 39 records

    Static network codes using network minimal subgraphs

    , Article 2nd International Conference on Electrical Engineering, ICEE, Lahore, 25 March 2008 through 26 March 2008 ; 2008 ; 9781424422937 (ISBN) Rezagholipour, M ; Ahmadian, M ; Aref, M. R ; Sharif University of Technology
    2008
    Abstract
    For a given multicast network problem, there are different solutions. Sometimes some links of a network may be removed by failure and then we will be encountered with link failure in the network. Therefore, one of the objectives of selecting a specific network code solution among different options is to increase the robustness provided by this solution against such failure. In this paper we extend the definition of the minimal subtree graph and replace it with a new definition of minimal subgraph and use it as a basis of a faster method with lower complexity for finding a static network code resistant against all solvable link failure patterns of a network. ©2008 IEEE  

    Problems and challenges for implementation of safety and HSE management rules in aged Iranian refineries and petrochemical complexes

    , Article CHISA 2006 - 17th International Congress of Chemical and Process Engineering, Prague, 27 August 2006 through 31 August 2006 ; 2006 ; 8086059456 (ISBN); 9788086059457 (ISBN) Abdolhamidzadeh, B ; Hashemi, V ; Rashtchian, D ; Sharif University of Technology
    2006
    Abstract
    Nowadays "as everywhere in the world", so much attention is drawn to performing safety and HSE management rules in Iran. Considering the long life of oil and it's relevant industries in Iran (since 1908, first oil well in Middle East, Masjid Soleyman), many units with more than 50 years old are still in operation. This situation posed special problems in performing safety and HSE regulations that some of them are communal among these units. This paper reveals the result of industrial projects, collecting numerous technical checklists in such units and author's experiences in recent years in Iran, which is aimed to announce some of these major problems and also present solutions for them  

    Risk measures for minimization of earthquake costs

    , Article Safety, Reliability, Risk and Life-Cycle Performance of Structures and Infrastructures - Proceedings of the 11th International Conference on Structural Safety and Reliability, ICOSSAR 2013 ; 2013 , Pages 2619-2626 ; 9781138000865 (ISBN) Haukaas, T ; Allahdadian, S ; Mahsuli, M ; Sharif University of Technology
    2013
    Abstract
    The total cost of earthquakes is in this paper modeled as a continuous random variable that includes the cost of damage and the cost of construction to prevent damage. Realizations of this variable are obtained by evaluating an array of probabilistic models that take many basic random variables as input. Consequently, analyses can be conducted to determine the mean cost, as well as cost exceedance probabilities and other measures of seismic risk. Such results are employed to address the underlying decision problem, namely to minimize the total cost of earthquakes when that cost is a continuous random variable. Applicable decision theories are outlined and several risk measures are... 

    Designing gear-shift pattern for an electric vehicle to optimize energy consumption

    , Article ASME International Mechanical Engineering Congress and Exposition, Proceedings (IMECE) ; Vol. 11 , 2010 , pp. 837-846 ; ISBN: 9780791844489 Rahimi, M. A ; Salehi, R ; Alasty, A ; Sharif University of Technology
    Abstract
    In this paper optimization of energy consumption in an electric vehicle is presented. The main idea of this optimization is based on selecting the best gear level in driving the vehicle. Two algorithms for optimization are introduced which are based on fuzzy rules and fuzzy controllers. In first algorithm, fuzzy controller simulates energy consumption in different gear levels, and chooses the optimum gear level. While in second method, fuzzy controller detects the optimum gear level by measuring the vehicle's average speed and acceleration. To investigate the performance of these controllers, a model of TOSAN vehicle is developed and the controllers outputs are checked in simulation of TOSAN... 

    One-receiver two-eavesdropper broadcast channel with degraded message sets

    , Article IEEE Transactions on Information Forensics and Security ; Volume 8, Issue 7 , 2013 , Pages 1162-1172 ; 15566013 (ISSN) Salehkalaibar, S ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    2013
    Abstract
    In this paper, we study the one-receiver two-eavesdropper Broadcast Channel (BC) with three degraded message sets. A common message is sent to three receivers. Another message is sent to the first and second receivers and needs to be kept secret from the third receiver (second eavesdropper). The third message is sent to the first receiver and needs to be kept secret from the second and third receivers (first and second eavesdroppers). First, we consider perfect secrecy conditions at the eavesdroppers, where we find an achievable perfect secrecy region. In the achievability scheme, we use superposition coding which divides the available randomness into different levels. These levels are used... 

    Payload attribution via character dependent multi-bloom filters

    , Article IEEE Transactions on Information Forensics and Security ; Volume 8, Issue 5 , 2013 , Pages 705-716 ; 15566013 (ISSN) Haghighat, M. H ; Tavakoli, M ; Kharrazi, M ; Sharif University of Technology
    2013
    Abstract
    Network forensic analysts employ payload attribution systems (PAS) as an investigative tool, which enables them to store and summarize large amounts of network traffic, including full packet payload. Hence an investigator could query the system for a specific string and check whether any of the packets transmitted previously in the network contained that specific string. As a shortcoming, the previously proposed techniques are unable to support wildcard queries. Wildcards are an important type of query that allow the investigator to locate strings in the payload when only part of the string is known. In this paper, a new data structure for payload attribution, named Character Dependent... 

    An FSM-based monitoring technique to differentiate between follow-up and original errors in safety-critical distributed embedded systems

    , Article Microelectronics Journal ; Volume 42, Issue 6 , June , 2011 , Pages 863-873 ; 00262692 (ISSN) Sedaghat, Y ; Miremadi, S. G ; Sharif University of Technology
    2011
    Abstract
    Nowadays, distributed embedded systems are employed in many safety-critical applications such as X-by-Wire. These systems are composed of several nodes interconnected by a network. Studies show that a transient fault in the communication controller of a network node can lead to errors in the fault site node (called original errors) and/or in the neighbor nodes (called follow-up errors). The communication controller of a network node can be halted due to an error, which may be a follow-up error. In this situation, a follow-up error leads to halt the correct operation of a fault-free controller while the fault site node, i.e. the faulty controller, still continues its operation. In this paper,... 

    Performability guarantee for periodic tasks in real-time systems

    , Article Scientia Iranica ; Vol. 21, issue. 6 , 2014 , p. 2127-2137 ; 1026-3098 Bashiri, M ; Miremadi, S. G ; Sharif University of Technology
    Abstract
    Performability is an important parameter in safety-critical real-time systems. This parameter is defined as the joint consideration of two other important parameters, i.e., reliability and performance. This paper proposes a schedulability condition that guarantees a desired level of performability under various working conditions for real-time systems. The basic idea underlining this condition is to select a subset of schedulable tasks and manage their slack times to satisfy a desired performability level. The proposed condition is evaluated on a hard real-time system that employs the Rate-Monotonic (RM) scheduling algorithm and uses the re-execution mechanism to improve the reliability.... 

    Risk assessment modelling for evaluating safety and impact on business via a 3D risk matrix

    , Article 28th Congress of the International Council of the Aeronautical Sciences 2012, ICAS 2012, 23 September 2012 through 28 September 2012 ; Volume 6 , September , 2012 , Pages 4773-4781 ; 9781622767540 (ISBN) Rezaei, M ; Abedian, A ; Teimouri, H ; Sharif University of Technology
    2012
    Abstract
    This research investigates a three dimensional parametric risk assessment model considering the 3rd factor to be the impact on business. In order to represent the 3rd order risk assessment matrix monitoring the impact of safety reports on the continuous economical performance of the airline, the other two factors, probability of safety and severity are redefined. Introducing two quantitative and qualitative assessment methodologies, the overall risk of the organization can be studied by means of Analytical Hierarchy Process (AHP). providing an adequate background to define the safety goals of the organization  

    Multivariate variability monitoring using EWMA control charts based on squared deviation of observations from target

    , Article Quality and Reliability Engineering International ; Volume 27, Issue 8 , 2011 , Pages 1069-1086 ; 07488017 (ISSN) Memar, A. O ; Niaki, S. T. A ; Sharif University of Technology
    Abstract
    Recent research works have shown that control statistics based on squared deviation of observations from target have the ability to monitor variability in both univariate and multivariate processes. In the current research, the properties of the control statistic S t that has been proposed by Huwang et al. (J. Quality Technology 2007; 39:258-278) are first reviewed and three new S t-based multivariate schemes are then presented. Extensive simulation experiments are performed to compare the performances of the proposed schemes with those of the multivariate exponentially weighted mean squared deviation (MEWMS) and the L 1-norm distance of the MEWMS deviation from its expected value (MEWMSL 1)... 

    ScTMR: A scan chain-based error recovery technique for TMR systems in safety-critical applications

    , Article Proceedings -Design, Automation and Test in Europe, DATE, 14 March 2011 through 18 March 2011 ; March , 2011 , Pages 289-292 ; 15301591 (ISSN) ; 9783981080179 (ISBN) Ebrahimi, M ; Miremadi, S. G ; Asadi, H ; Sharif University of Technology
    2011
    Abstract
    We propose a roll-forward error recovery technique based on multiple scan chains for TMR systems, called Scan chained TMR (ScTMR). ScTMR reuses the scan chain flip-flops employed for testability purposes to restore the correct state of a TMR system in the presence of transient or permanent errors. In the proposed ScTMR technique, we present a voter circuitry to locate the faulty module and a controller circuitry to restore the system to the fault-free state. As a case study, we have implemented the proposed ScTMR technique on an embedded processor, suited for safety-critical applications. Exhaustive fault injection experiments reveal that the proposed architecture has the error detection and... 

    Provable partial key escrow

    , Article International Journal of Network Security ; Volume 10, Issue 2 , 2010 , Pages 153-156 ; 1816353X (ISSN) Azimian, K ; Mohajeri, J ; Salmasizadeh, M ; Wagstaff Jr., S. S ; Sharif University of Technology
    2010
    Abstract
    In this paper wefirst propose two new concepts concerning the notion of key escrow schemes: provable partiality and independence. Roughly speaking, a scheme has provable partiality if the existence of a polynomial time for recovering the secret from escrowed information implies there is a polynomial time algorithm for solving a well known intractable problem. A scheme is independent if the secret key and the escrowed information are independent. Finally, we propose a new verifiable partial key escrow scheme, based on McCurley's encryption scheme, satisfying both of the above criteria  

    Inherently safe and economically optimal design using multi-objective optimization: The case of a refrigeration cycle

    , Article Process Safety and Environmental Protection ; Volume 104 , 2016 , Pages 254-267 ; 09575820 (ISSN) Eini, S ; Shahhosseini, H. R ; Javidi, M ; Sharifzadeh, M ; Rashtchian, D ; Sharif University of Technology
    Institution of Chemical Engineers  2016
    Abstract
    The economic viability of industrial processes strongly depends on their safe and reliable operation. The method of inherent safe process design enables systematic consideration of safety measures in order to ensure process safe operation at the early stages of process design. The challenge is that the economic measures that are often considered for the design of industrial processes are often incommensurable with the safety measures. In the present research, a novel framework is proposed in which the safety criteria are quantified based on consequence modeling and aggregated with the economic performance using multi-objective optimization programming. The developed methodology was applied... 

    Quality of service in the network layer of vehicular Ad hoc networks

    , Article 2016 World Congress on Engineering and Computer Science, WCECS 2016, 19 October 2016 through 21 October 2016 ; Volume 2225 , 2016 , Pages 114-118 ; 20780958 (ISSN); 9789881404718 (ISBN) Tabar, S ; Najjar, L ; Gholamalitabar, M ; Sharif University of Technology
    Newswood Limited  2016
    Abstract
    Vehicular Ad-hoc Networks (VANET) has attracted a great deal of attention during the last decade. This type of wireless network is predicted to play a key role in future automotive innovation. VANET as a foundation for Intelligent Transportation System (ITS) promises many improvements in terms of safety, resource efficiency and passenger assistance services. Among these three main categories, safety applications are the most important ones because they deal with the lives of large numbers of people who drive every day. Safety applications are classified as real-time applications; they must act within a certain period of time, otherwise their implementation will be worthless. As a result,... 

    Applications of axiomatic design theory in design for human safety in manufacturing systems: a literature review

    , Article MATEC Web of Conferences, 13 September 2017 through 15 September 2017 ; Volume 127 , 2017 ; 2261236X (ISSN) Sadeghi, L ; Houshmand, M ; Fatahi Valilai, O ; Slatineanu L ; Sharif University of Technology
    Abstract
    Design for Human Safety (DfHS) is an approach to integrate knowledge of human safety in the design process. DfHS is multi-disciplinary in its nature, requiring many kinds of information and knowledge. Number of DfHS studies tried to apply Axiomatic Design (AD) to achieve their aims. The purpose of this paper is to review the literature on application of AD in DfHS in manufacturing systems and to propose a roadmap for future DfHS works. This paper examines the number and type of publications dealing with this context. The review covers papers published between 1990 (when AD was introduced first) and 2017. It is based on a range of combinations of the following keywords: "Axiomatic design" and... 

    Assessing public acceptance of connected vehicle systems in a new scheme of usage-based insurance

    , Article Transportation Research Record ; Volume 2625 , 2017 , Pages 62-69 ; 03611981 (ISSN); 9780309441551 (ISBN) Sahebi, S ; Nassiri, H ; Sharif University of Technology
    National Research Council  2017
    Abstract
    The consequences of road accidents are significant for drivers and society. The connected vehicle system (CVS) is a promising technology that can improve road safety by warning drivers of traffic hazards. Broad implementation of the CVS could mitigate the harmful consequences of road accidents. Widespread implementation requires schemes that can promote the pervasive adoption of the system by drivers. This study proposes the innovative idea of implementing the CVS in usage-based insurance (UBI) as a measurement probe and modeling drivers' acceptance of the new UBI scheme. This study developed a random effect logit model demonstrating that the drivers of cheaper vehicles and middle-age... 

    Improving hardware Trojan detection using scan chain based ring oscillators

    , Article Microprocessors and Microsystems ; Volume 63 , 2018 , Pages 55-65 ; 01419331 (ISSN) Asadi Kouhanjani, M. R ; Jahangir, A. H ; Sharif University of Technology
    Elsevier B.V  2018
    Abstract
    In recent years, the security of integrated circuits (ICs) has received more attention as usage of ICs made by untrustworthy foundries has increased in safety-critical systems [1]. In this paper, we introduce a novel approach for fingerprinting the delay of functional paths in a sequential circuit that have millions of transistors, like processors. We present a method for inserting Ring Oscillators (ROs) into scan chain for measuring the delay of each functional path inside the chip. Using the proposed method, the payload part of Trojans will be detected according to their size and cell types. Our method can be used by power-based Trojan detection approaches for finding the trigger part of... 

    Optimum placement of gas detectors considering voting strategy with different detection set points

    , Article Journal of Loss Prevention in the Process Industries ; Volume 55 , 2018 , Pages 53-60 ; 09504230 (ISSN) Rad, A ; Rashtchian, D ; Eghbal Ahmadi, M. H ; Sharif University of Technology
    Elsevier Ltd  2018
    Abstract
    Voting logic or k out of p redundancy is widely used in safety systems to meet two key objectives: enhancing reliability and reducing spurious performance. Even so, in designing gas detector systems especially of flammable gas type, it is a common engineering practice to consider at least two different detection levels in addition to normal voting. Under such circumstances, the presence of gas is confirmed if sensed by two detectors at two different concentrations: one at a low level and another one in the same voting network at a high level. Existing formulations for optimal placement of gas detectors do not consider this type of voting. In this study, first the general form of multi-level... 

    RI-COTS: trading performance for reliability improvements in commercial of the shelf systems

    , Article 19th International Symposium on Computer Architecture and Digital Systems, CADS 2017, 21 December 2017 through 22 December 2017 ; Volume 2018-January , March , 2018 , Pages 1-6 ; 9781538643792 (ISBN) Ghasemi, G ; Hosseini Monazzah, A. M ; Farbeh, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    The flexibility of software-based fault tolerant approaches in providing the required level of reliability Commer-cial-Off-The Shelf (COTS) devices made them the first choice in designing safety-critical systems. In this paper, we propose a reliability improvement method for COTS-based systems, so-called, RI-COTS. The main idea behind RI-COTS is to establish a tradeoff between reliability and performance of COTS system through controlling redundant execution at instruction level. RI-COTS is implemented on LEON2 processor VHDL model. Our simulation results show that comparing with the most related studies, RI-COTS can improve the fault detection capability by 20% with only 4% performance... 

    Critical review on fusion welding of magnesium alloys: metallurgical challenges and opportunities

    , Article Science and Technology of Welding and Joining ; Volume 26, Issue 8 , 2021 , Pages 559-580 ; 13621718 (ISSN) Pouranvari, M ; Sharif University of Technology
    Taylor and Francis Ltd  2021
    Abstract
    As the lightest structural alloys, magnesium alloys offer significant potential for improving the energy efficiency of various transportation systems. The lack of sufficient weldability of Mg alloys is a crucial barrier to their potential use in safety-critical applications. Porosity formation, grain structure engineering, solidification cracking, liquation, and liquation cracking are the key metallurgical challenges to obtain reliable and robust fusion welds in Mg alloys. This critical review highlights the current understating regarding controlling the metallurgical phenomena during fusion welding of Mg alloys and discusses the unresolved metallurgical challenges to shed light on the path...