Loading...
Search for: international-conferences
0.005 seconds
Total 179 records

    Decentralized impedance control of nonredundant multi-manipulator systems

    , Article 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC, Sanya, 6 April 2008 through 8 April 2008 ; 2008 , Pages 206-211 ; 9781424416851 (ISBN) Sadati, N ; Ghaffarkhah, A ; Sharif University of Technology
    2008
    Abstract
    In this paper, we propose a decentralized control scheme for combined motion/force control of nonredundant multi-manipulator robotic systems, cooperatively grasping a rigid body in a prespecifled position/force trajectory. The proposed control scheme uses the impedance method for modeling the internal force exerted by the end effectors to the object. The precise mathematical analysis of the overall dynamical system and the proposed controller are presented and the stability of the overall system is studied. The proposed controller, then, is applied to a cooperative system composed of two PUMA560 manipulators and the simulation results are presented to verify the proposed control scheme  

    Facility location optimization via multi-agent robotic systems

    , Article 2008 IEEE International Conference on Networking, Sensing and Control, ICNSC, Sanya, 6 April 2008 through 8 April 2008 ; 2008 , Pages 287-292 ; 9781424416851 (ISBN) Moarref, M ; Sayyaadi, H ; Sharif University of Technology
    2008
    Abstract
    A facility location problem deals with locating the best place for a group of facilities, among distinct demand points, minimizing a certain locational optimization function. In this paper, distributed, asynchronous, and scalable algorithms are presented for solving a facility location problem known as continuous n-median problem (generalized Fermat-Weber problem) via multi-agent robotic systems. The algorithms are discussed both in continuous and discrete time domain, and their validity is proved. It is also shown that the solution of this facility location problem is the set of points that are the geometric medians of their corresponding Voronoi cells  

    An adaptive approach to manage the number of virtual channels

    , Article 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008, Gino-wan, Okinawa, 25 March 2008 through 28 March 2008 ; 2008 , Pages 353-358 ; 1550445X (ISSN) ; 0769530966 (ISBN); 9780769530963 (ISBN) Mirza Aghatabar, M ; Koohi, S ; Hessabi, S ; Rahmati, D ; Sharif University of Technology
    2008
    Abstract
    Network-on-Chip (NoC) is a precious approach to handle huge number of transistors by virtue of technology scaling to lower than 50nm. Virtual channels have been introduced in order to improve the performance according to a timing multiplexing concept in each physical channel. The incremental effect of virtual channels on power consumption has been shown in literatures. The issue of power saving has always been controversial to many designers. In this paper, we introduce a new technique which tries to adaptively mange the number of virtual channels in order to reduce the power consumption while not degrading the performance of the network without any reconfiguration. Our experimental results... 

    Empirical performance evaluation of stretched hypercubes

    , Article 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008, Gino-wan, Okinawa, 25 March 2008 through 28 March 2008 ; 2008 , Pages 75-79 ; 1550445X (ISSN) ; 0769530966 (ISBN); 9780769530963 (ISBN) Meraji, S ; Sarbazi Azad, H ; IEEE Computer Society ; Sharif University of Technology
    2008
    Abstract
    Stretched hypercube has recently been introduced as an attractive alternative to the well-known hypercube. Previous research on this network topology has mainly focused on topological properties and VLSI aspects of this network In this paper, we propose some deterministic and adaptive routing algorithms for the stretched hypercubes. The performance of stretched hypercubes using the proposed routing algorithms is then evaluated by means of simulation experiments. Experiments are reahzed under different working loads and for different network actors. © 2008 IEEE  

    Resource placement in the edge product of graphs

    , Article 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, Gino-wan, Okinawa, 25 March 2008 through 28 March 2008 ; 2008 , Pages 212-218 ; 1550445X (ISSN) ; 0769530958 (ISBN); 9780769530956 (ISBN) Moinzadeh, P ; Sarbazi Azad, H ; Sharif University of Technology
    2008
    Abstract
    In a large system, it is neither economical nor efficient to equip each node with a copy of the resource, and it is desirable to distribute the copies of the resource so that certain performance measure is obtained. In this paper we consider the problem of distributing resources in the edge product of networks. The algorithms presented in this paper make use of the known placements for the basic graphs composing the product graph. Therefore, in these placements we avoid the additional costs needed for deploying and rescaling the network. © 2008 IEEE  

    Introduction of novel dispatching rules for grid scheduling algorithms

    , Article International Conference on Computer and Communication Engineering 2008, ICCCE08: Global Links for Human Development, Kuala Lumpur, 13 May 2008 through 15 May 2008 ; 2008 , Pages 1072-1078 ; 9781424416929 (ISBN) Rasooli, A ; Mirza Aghatabar, M ; Khorsandi, S ; Sharif University of Technology
    2008
    Abstract
    Grid scheduling problems are dynamic as the jobs and resources in the system vary overtime. The Rulebased scheduling algorithms are a new trend in grid scheduling which are applicable in dynamic grid environments; The arriving jobs waiting for execution is ordered according to a certain rule and they are dispatched for processing according to that order. Grid scheduling algorithms usually involve more than one objective function. In particular, it is not enough to minimize the Maximum completion time (Makespan) objective function without taking into consideration the lateness of the jobs (Tardiness). In this paper two novel dispatching rules are proposed that aims to minimize the maximum... 

    A new Bayesian classifier for skin detection

    , Article 3rd International Conference on Innovative Computing Information and Control, ICICIC'08, Dalian, Liaoning, 18 June 2008 through 20 June 2008 ; 2008 ; 9780769531618 (ISBN) Shirali Shahreza, S ; Mousavi, M. E ; Sharif University of Technology
    2008
    Abstract
    Skin detection has different applications in computer vision such as face detection, human tracking and adult content filtering. One of the major approaches in pixel based skin detection is using Bayesian classifiers. Bayesian classifiers performance is highly related to their training set. In this paper, we introduce a new Bayesian classifier skin detection method. The main contribution of this paper is creating a huge database to create color probability tables and new method for creating skin pixels data set. Our database consists of about 80000 images containing more than 5 billions pixels. Our tests shows that the performance of Bayesian classifier trained on our data set is better than... 

    Cover selection steganography method based on similarity of image blocks

    , Article 8th IEEE International Conference on Computer and Information Technology Workshops, CIT Workshops 2008, Sydney, 8 July 2008 through 11 July 2008 ; 2008 , Pages 379-384 ; 9780769533391 (ISBN) Sajedi, H ; Jamzad, M ; Sharif University of Technology
    2008
    Abstract
    An advantage of steganography, as opposed to other information hiding techniques, is that the embedder can select a cover image that results in the least detectable stego image. In a previously proposed method, a technique based on block texture similarity was introduced where blocks of cover image were replaced with the similar secret image blocks; then indices of secret image blocks were stored in cover image. In this method, the blocks of secret image are compared with blocks of a set of cover images and the image with most similar blocks to those of the secret image is selected as the best candidate to carry the secret image. Using appropriate features for comparing image blocks,... 

    Enhanced TED: a new data structure for RTL verification

    , Article 21st International Conference on VLSI Design, VLSI DESIGN 2008, Hyderabad, 4 January 2008 through 8 January 2008 ; 2008 , Pages 481-486 ; 0769530834 (ISBN); 9780769530833 (ISBN) Lotfi Kamran, P ; Massoumi, M ; Mirzaei, M ; Navabi, Z ; VLSI Society of India ; Sharif University of Technology
    2008
    Abstract
    This work provides a canonical representation for manipulation of RTL designs. Work has already been done on a canonical and graph-based representation called Taylor Expansion Diagram (TED). Although TED can effectively be used to represent arithmetic expressions at the word-level, it is not memory efficient in representing bit-level logic expressions. In addition, TED cannot represent Boolean expressions at the word-level (vector-level). In this paper, we present modifications to TED that will improve its ability for bit-level logic representation while enhancing its robustness to represent word-level Boolean expressions. It will be shown that for bit-level logic expressions, the Enhanced... 

    A simple and efficient fault-tolerant adaptive routing algorithm for meshes

    , Article 8th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2008, 9 June 2008 through 11 June 2008 ; Volume 5022 LNCS , 2008 , Pages 54-57 ; 03029743 (ISSN) ; 9783540695004 (ISBN) Shamaei, A ; Nayebi, A ; Sarbazi Azad, H ; Sharif University of Technology
    2008
    Abstract
    The planar-adaptive routing algorithm is a simple method to enhance wormhole routing algorithms for fault-tolerance in meshes but it cannot handle faults on the boundaries of mesh without excessive loss of performance. In this paper, we show that this algorithm can further be improved using a flag bit introduced for guiding misrouted messages. So, the proposed algorithm can be used to route messages when fault regions touch the boundaries of the mesh. We also show that our scheme does not lead to diminish the performance of the network and only three virtual channels per physical channels are sufficient for tolerating multiple boundary faulty regions. © 2008 Springer-Verlag Berlin Heidelberg... 

    PERMAP: A performance-aware mapping for application-specific SoCs

    , Article ASAP08 - IEEE 19th International Conference on Application-Specific Systems, Architectures and Processors, Leuven, 2 July 2008 through 4 July 2008 ; 2008 , Pages 73-78 ; 10636862 (ISSN) ; 9781424418985 (ISBN) Kiasari, A. E ; Hessabi, S ; Sarbazi Azad, H ; Sharif University of Technology
    2008
    Abstract
    Future System-on-Chip (SoC) designs will need efficient on-chip communication architectures that can provide efficient and scalable data transport among the Intellectual Properties (IPs). Designing and optimizing SoCs is an increasingly difficult task due to the size and complexity of the SoC design space, high cost of detailed simulation, and several constraints that the design must satisfy. For efficient design of SoCs, an efficient mapping of IPs onto Networks-on-Chip (NoCs) is highly desirable. Towards this end, we have presented PERMAP, a PERformance-aware MAPping algorithm which maps the IPs onto a generic NoC architecture such that the average communication delay is minimized. This is... 

    Decoding real-field codes by an iterative expectation-maximization (EM) algorithm

    , Article 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP, Las Vegas, NV, 31 March 2008 through 4 April 2008 ; 2008 , Pages 3169-3172 ; 15206149 (ISSN) ; 1424414849 (ISBN); 9781424414840 (ISBN) Zayyani, H ; Babaie Zadeh, M ; Jutten, C ; Sharif University of Technology
    2008
    Abstract
    In this paper, a new approach for decoding real-field codes based on finding sparse solutions of underdetermined linear systems is proposed. This algorithm iteratively estimates the positions and the amplitudes of the sparse errors (or noise impulses) using an Expectation-Maximization (EM) algorithm. Iterative estimation of amplitudes is done in the Expectation step (E-step), while iterative estimation of error positions is done in the Maximization step (M-step). Simulation results show 1-2 dB improvement over Linear Programming (LP) which has been previously used for error correction. ©2008 IEEE  

    A context-aware access control model for pervasive computing environments

    , Article 2007 International Conference on Intelligent Pervasive Computing, IPC 2007, Jeju Island, 11 October 2007 through 13 October 2007 ; 2007 , Pages 51-56 ; 0769530060 (ISBN); 9780769530062 (ISBN) Emami, S. S ; Amini, M ; Zokaei, S ; Sharif University of Technology
    2007
    Abstract
    In pervasive computing environments, a user can access resources and services from any where and at any time; thus a key security challenge in these environments is the design of an effective access control model which is aware of context modifications. Changes in context may trigger changes in authorizations. In this paper, we propose a new context-aware access control model based on role-based access control model for pervasive computing environments. We assign roles to users dynamically based on the long-term context information and tune active role's permissions according to the short-term context information of the users and environment. © 2007 IEEE  

    A quantitative real-time model for multihop wireless sensor networks

    , Article 2007 3th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP, Melbourne, VIC, 3 December 2007 through 6 December 2007 ; 2007 , Pages 79-84 ; 1424415020 (ISBN); 9781424415021 (ISBN) Mizanian, K ; Jahangir, A. H ; Sharif University of Technology
    2007
    Abstract
    Wireless Sensor Network (WSN) should be capable of fulfilling its mission, in a timely manner. Therefore, we propose a quantitative real-time model for multihop WSN. "Real-time degree" describes the percentage of real-time data that the network can deliver on time from any source to its destination. Most of network properties are considered as random variables and a queuing-theory based model is derived. In this model, the effect of network load on the packets ' delay and the "real-timeliness" of the network are considered. Simulation results are used to validate the proposed model. The simulation results agree very well with the model. © 2007 IEEE  

    Analysis of throughput and delay in a spectrally phase-encoded optical CDMA packet network

    , Article 4th IEEE and IFIP International Conference on Wireless and Optical Communications Networks, WOCN 2007, Singapore, 2 July 2007 through 4 July 2007 ; 2007 ; 1424410045 (ISBN); 9781424410040 (ISBN) Khaleghi, S ; Khaleghi, S ; Jamshidi, K ; Sharif University of Technology
    2007
    Abstract
    In this paper, analysis of the throughput and delay in a spectrally phase-encoded optical code-division multiple-access (OCDMA) system, using a simplified slotted packet network protocol is conducted. Steady-state throughput and average packet delay of the system are derived. In evaluating the performance of the system, only multiple access interference is considered and other sources of noise are neglected. Comparing different systems with the fixed bit rate and chip duration leads us to conclude that increasing the code length will improve the performance of networks with small average activity; but in highly active networks, decreasing the code length will result in a significant... 

    Organizing P2P nodes in semantically partitioned space

    , Article 3rd International Conference on Semantics, Knowledge, and Grid, SKG 2007, Xi'an, 29 October 2007 through 31 October 2007 ; 2007 , Pages 322-325 ; 0769530079 (ISBN); 9780769530079 (ISBN) Livani, E ; Habibi, J ; Rostami, H ; Sharif University of Technology
    2007
    Abstract
    Peer-to-peer networks are beginning to form the infrastructure of future applications. The use of semantic information to organize nodes in a P2P network is a prosperous approach. In this paper we present a novel method, called Semantic Partition Tree, which organizes nodes in a semantic space, using an upper ontology. In this approach each node can find a target in a time proportioned to the depth of the upper ontology, which is significantly less than the number of nodes in the network. Also we simulated our method with several configurations and measured its performance. The results of the simulation show that our scheme is highly scalable and can be used by real P2P networks. © 2007 IEEE... 

    Optimum design of fractional order PID for MIMO and SISO systems using particle swarm optimization techniques

    , Article 4th IEEE International Conference on Mechatronics, ICM 2007, Kumamoto, 8 May 2007 through 10 May 2007 ; 2007 ; 142441184X (ISBN); 9781424411849 (ISBN) Sadati, N ; Zamani, M ; Mohajerin, P ; Sharif University of Technology
    2007
    Abstract
    In this paper, a novel design approach for determination of the optimal Fractional Order PID (FOPID) controllers, using the Particle Swarm Optimization (PSO) method is presented. Fractional calculus can provides good performance and robustness for FOPID controllers in comparison with the conventional PID and even other types of classical controllers, because of the arbitrary order of fractional calculus presented in this scheme. This paper demonstrates in details how to employ the PSO method to search efficiently for the optimal FOPID controller parameters in SISO and MIMO systems. The proposed approach is applied to an electromagnetic suspension system as an example to illustrate the design... 

    Wavelet-based unbalanced un-equivalent multiple description coding for P2P networks

    , Article 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, Penang, 14 May 2007 through 17 May 2007 ; February , 2007 , Pages 242-247 ; 1424410940 (ISBN); 9781424410941 (ISBN) Firooz, M. H ; Ronasi, K ; Pakravan, M. R ; Nasiri Avanaki, A ; Sharif University of Technology
    2007
    Abstract
    Almost all existing multi-description coding (MDC) schemes are designed for media streaming over Internet. In this work, a wavelet-based video MDC technique is introduced that fits the criteria of media streaming over peer-to-peer networks. Our proposed method assigns descriptions to the senders due to their characteristic (i.e. bandwidth and availability). In contrast to traditional MDC, different descriptions in the proposed method have different importance in remaking the original media. Our simulation results show considerable improvement of video quality at the receiver (up to 10 dB) as compared to the state-of-the-art. ©2007 IEEE  

    Performance improvement of level-crossing A/D converters

    , Article 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, Penang, 14 May 2007 through 17 May 2007 ; February , 2007 , Pages 438-441 ; 1424410940 (ISBN); 9781424410941 (ISBN) Malmir Chegini, M ; Marvasti, F ; Sharif University of Technology
    2007
    Abstract
    Level Crossing (LC) Analog-to-Digital converters have been suggested as an asynchronous alternative to conventional schemes. It is our intention to improve the performance of these LC converters. In this paper, we also suggest alternative adaptive and multi-level adaptive LC schemes and use an iterative method to drastically improve the performance of LC converters. The impressive improvement of these schemes make LC converters a potential competitor to other conventional A/D converters such as Sigma Delta Modulators (SDM). ©2007 IEEE  

    Performance analysis of an internally coded MC-FH-CDMA system

    , Article 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, Penang, 14 May 2007 through 17 May 2007 ; February , 2007 , Pages 23-28 ; 1424410940 (ISBN); 9781424410941 (ISBN) Ghani Shayesteh, M ; Nasiri Kenari, M ; Sharif University of Technology
    2007
    Abstract
    We consider an internally coded scheme for multicarrier frequency-hopping CDMA (MC-FH-CDMA) communication systems. In this method, the total bandwidth is partitioned into Ns1 disjoint bands and each band is also segmented into Ns2 subbands. Based on the super-orthogonal encoder output and a pseudorandom (PN) sequence, one of the Ns1 bands is selected. Then, the data is transmitted in that band in the form of multicarrier frequency-hopping technique using BPSK modulation. At the receiver front end, we use soft detector, then we apply Viterbi decoding algorithm. We evaluate the performance of the proposed method. The results indicate that our method outperforms the previously presented uncoded...