An Enhanced Method for Detecting Control Flow Errors Caused by Soft Errors in the Processors Running the Programs
Seyedeh Afifeh
Alavi
Computer Dept., ECE
author
Mojtaba
Valinataj
Computer Dept., ECE, Babol Noshirvani Univ. of Tech., Babol, Iran
author
Mojtaba
Mansoori
Computer Dept., ECE, Babol Noshirvani Univ. of Tech., Babol, Iran
author
text
article
2018
per
The processing systems utilized in the satellites or nuclear reactors are highly susceptible to produce wrong results because of the existence of different radiations. In this paper, a new method is proposed for enhancing the program executions on the fault-prone processors in extreme environments. The main goal is the detection of control flow errors caused by soft errors that maybe produced by transient faults occurred in the underlying hardware. This method detects the errors by recognizing the deviations from the proper program flow execution. The proposed method operates by allocating two specific signatures and at most three control instructions to each basic block inside a program. This way, many control flow errors are detected. The experimental results based on the simulation of the proposed method together with the previous methods show that the proposed method detects the control flow errors better than the previous methods with respect to three main parameters including fault coverage, performance overhead and memory overhead.
Journal of Soft Computing and Information Technology
Babol Noshirvani University of Technology
2383-1006
7
v.
1
no.
2018
1
12
https://jscit.nit.ac.ir/article_75693_697b2039ed47443776dbaa12ae00203e.pdf
Human Action Recognition using FREAK-HOG and CSVM
Nacer
Farajzadeh
Faculty of IT and Computer Engineering Department, Azarbaijan Shahid Madani University
author
Mahdi
Hashemzadeh
Faculty of IT and Computer Engineering Department, Azarbaijan Shahid Madani University
author
text
article
2018
per
Recently, human action recognition in videos has become an interesting area of research due to its variety of important applications such as intelligent security supervisions, smart environments, education, health-care monitoring systems, data mining, etc. There are, however, number of challenges that makes the development of these systems a bit harder than the common machine vision systems, both in accuracy and efficiency: changes in illumination, moving background, cluttered backgrounds, camera motions, complexity of the actions, to name a few. One of the commonly used methods for automatic human action recognition is to, firstly, extract some feature points within the video frames, then describe those points locally, and finally, code (cluster) them to feed a learning algorithm to build the action recognition model. In this paper, we aim to increase the accuracy of these methods by introducing the use of texture information extracted using a human retina-inspired algorithm (FREAK) together with the appearance-based information of the moving objects. In order to increase the efficacy and eliminate the overhead of furthered texture information in model building phase and, of course, in hope of increasing the accuracy as well, we propose to use a cascade approach to build the desired model. Experiments on a publicly available large dataset namely UCF101, confirm that the proposed method achieves a very comparable results with the state-of-the-art methods.
Journal of Soft Computing and Information Technology
Babol Noshirvani University of Technology
2383-1006
7
v.
1
no.
2018
13
28
https://jscit.nit.ac.ir/article_75694_ca54b581fa168c1379cad3aab16c5e15.pdf
Cloud Service Selection based on the Credibility persistency of Users’ Feedbacks
Mohammad Javad
Salehi
Computer Engineering Department, University of Applied Science & Technology, Tehran, Iran
author
Mehrdad
Ashtiani
Computer Engineering Department, Iran University of Science and Technology, Tehran, Iran
author
Behrouz
Minaei Bidgoli
Computer Engineering Department, Iran University of Science and Technology, Tehran, Iran
author
text
article
2018
per
Nowadays, trust is a major topic under discussion in the cloud computing environments. The existence of a mechanism for building and preserving trust among service consumers and providers is a critical component in the success of providing cloud services. Therefore, computational trust in cloud computing environments has turned into a considerable concern. The lack of trust among service providers and consumers may result in the reduction of the general appeal for the acceptance of cloud services among users. In other words, even though the services provided by each vendor maybe similar in terms of functionality, they may vastly differ in terms of quality of service. For this reason, a false choice in selecting a service may have devastating impacts on the requirements and goals of the end-user. To this aim, in this paper, a computational trust model based on the credibility of users’ feedbacks for the calculation of services’ trustworthiness is introduced. The proposed model, not only takes into account the existing experiences that other users have with a service provider, but also considers the credibility of such feedbacks as well as the persistency of correct and constructive feedbacks through time. In the end, the efficiency of the proposed model is investigated through a series of evaluation scenarios and it is shown that the proposed model is capable of accurately calculating the trustworthiness of the system. Such accuracy is maintained even in the presence of malicious users.
Journal of Soft Computing and Information Technology
Babol Noshirvani University of Technology
2383-1006
7
v.
1
no.
2018
29
41
https://jscit.nit.ac.ir/article_75695_95ad3d0ab4b626b3b8ffd2f04338a56d.pdf
A Scalable Traffic Engineering Method in an SDN-based Data Center Network Using Decomposition Technique
Mostafa
Bastam
Computer Engineering Department, University of Mazandaran, Babolsar, Iran.
author
Masoud
Sabaei
Computer Engineering Department, Amirkabir University of Technology, Tehran, Iran
author
Rouhollah
Yousefpour
Mathematics Department, University of Mazandaran, Babolsar, Iran
author
text
article
2018
per
Today's data centers consist of thousands of servers hosting a variety of cloud-based services. In this paper, a scalable and new technique is presented for traffic engineering in software-defined data center networks helping to design an optimal demand-path mapping with a tolerable computational complexity. The proposed method is based on linear programming model and attempts to minimize the maximum link utilization that causes minimum link congestion. The method focuses on an optimal solution to load balancing in networks. It proposes a new decomposition technique that can limit the search space of the original Linear Programming problem, such that the time required to solve the problem can be reduced substantially. To reduce time complexity, a decomposition technique is used to divide the problem model into smaller sub-problems, which are then solved simultaneously by applying parallelizing techniques (multiple-core computing and OpenMP).Simulation results show that solving time and load balancing are considerably improved.
Journal of Soft Computing and Information Technology
Babol Noshirvani University of Technology
2383-1006
7
v.
1
no.
2018
42
55
https://jscit.nit.ac.ir/article_76666_7c7b5bacf82da006274f0de6910102b9.pdf
Native Quality Assessment Model of news sites (NEWSQUAL)
محمدتقی
تقوی فرد
دانشگاه علامه طباطبایی
author
پیام
حنفی زاده
دانشگاه علامه طباطبایی
author
ابوالفضل
کزازی
دانشگاه علامه طباطبایی
author
hamid
jafary
Information Technology Management
Allameh Tabataba'i University, Ph.D. Student
Tehran, Iran
author
text
article
2018
per
Native Quality Assessment Model of news sites (NEWSQUAL), Native Quality Assessment Model of news sites (NEWSQUAL): Effective measurements and accurate analysis of the quality of news sites are the first steps necessary to improve their performance and improve the reporting methods in these centers. Therefore, this research is looking for quality assessment of news sites. The present study consists of using the Delphi method as a qualitative method for evaluating the indicators by the experts in the field of news has led to the provision of a native model for assessing the quality of news sites. The native model (NEWSQUAL) consists of five dimensions and 72 indicators, from five perspectives of design and graphic design, content, technical system, services, and executive management of news sites, each of which consists of several sub-criteria. Subsequently, by selecting 61 news sites, their qualitative evaluation was calculated using a questionnaire and the quality score of each site was obtained.
Journal of Soft Computing and Information Technology
Babol Noshirvani University of Technology
2383-1006
7
v.
1
no.
2018
56
71
https://jscit.nit.ac.ir/article_79228_e908125628ed2421e226373524b42b40.pdf
Introducing a New Hyperchaotic System and Its Physical Realization by Designing an Analog Electronic Circuit
Ali
Abooee
Department of Electrical Engineering, Yazd University, Yazd, Iran
author
Seyeed Mahdi
Hosseini
Department of Electrical Engineering, Yazd University, Yazd, Iran.
author
Seyyed Mohammad Reza
Mirjalili
Department of Electrical Engineering, Yazd University, Yazd, Iran.
author
Seyyed Mohammad
Hosseini
Department of Electrical Engineering, Yazd University, Yazd, Iran
author
Mohammad Mehdi
Arefi
Department of Power and Control Engineering, School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran
author
text
article
2018
per
In this paper, based on Liu chaotic system, a novel hyperchaotic system possessing an origin equilibrium point is introduced. To demonstrate the existence of hyperchaos phenomenon in this system, several mathematical criteria are used and discussed. These criteria comprise dissipativity checking, instability proof of the equilibrium point, draw of phase portraits of strange attractor, time responses of state variables, calculation of Lyapunov exponents, extract of fractional dimension and high sensitivity analysis of system’s time responses to initial conditions. It is shown that positive Lyapunov exponents of the introduced system are larger than ones of other hyperchaotic systems. By altering each of the parameters of the system, different types of dynamical behaviors including chaos, limit cycle, quasi periodic and hyperchaos are observed. An analog electronic circuit is designed to realize the hyperchaotic system composed of linear resistors, linear capacitors, operational amplifiers, and analog multipliers. Moreover, the designed nonlinear circuit is simulated by using ORCAD16.6 software. Next, it is physically implemented and tested in our laboratory. Both simulation results and experimental observations depict the occurrence of hyperchaos phenomenon in the designed circuit.
Journal of Soft Computing and Information Technology
Babol Noshirvani University of Technology
2383-1006
7
v.
1
no.
2018
72
86
https://jscit.nit.ac.ir/article_79229_96e228ae8e5b1f42f3f24056d4e08734.pdf
A new energy-efficient fuzzy cluster-based routing algorithm with a Constant threshold in wireless sensor network
Mostafa
Mirzaie
Department of Electrical and Computer Engineering Imam Reza International University, Mashhad, Iran
author
Sayyed Majid
Mazinani
Department of Electrical and Computer Engineering Imam Reza International University, Mashhad, Iran
author
Armin
Mazinani
Department of Electrical and Computer Engineering, Khayyam University, Mashhad, Iran
author
text
article
2018
per
A major challenge in the development of wireless sensor networks is Increase network lifetime. Cluster-based routing protocols are proposed as a solution to improve energy consumption in wireless sensor networks. Clustering in each round and the single-hop transmission to base station is base of many algorithms that have been presented so far. Clustering in each round increases the number of control messages, collision and reduces energy of the network. Multi-hop routing increases the life time of cluster nodes and improves network performance. Proposed algorithm use the benefits of clustering and multi-hop routing, we consider a new fuzzy clustering based routing protocol with fixed threshold. The innovations of proposed paper include clustering nodes in different rounds, consideration of a fixed threshold, using different clustering algorithms, and multi-hop routing by considering the appropriate intermediate node In order to send data from each cluster head to the base station. Fuzzy inference using parameters such as "remaining energy", "neighbors' number", and "distance" of each node. The proposed algorithm has been compared with other algorithms on the field of network lifetime parameters, number of dead nodes per round, first dead node, half dead, and last dead node. The simulation results show that the proposed algorithm increases the network life expectancy of 44.5 percent in compared with other methods.
Journal of Soft Computing and Information Technology
Babol Noshirvani University of Technology
2383-1006
7
v.
1
no.
2018
87
103
https://jscit.nit.ac.ir/article_80046_64079876fcb936fd5bb0d7ab8f571ee2.pdf