Loading...
Search for: achievable-region
0.005 seconds

    The capacity region of the parallel partially cooperative relay broadcast channel with unmatched degraded subchannels

    , Article 2009 IEEE International Symposium on Information Theory, ISIT 2009, Seoul, 28 June 2009 through 3 July 2009 ; 2009 , Pages 189-193 ; 21578102 (ISSN); 9781424443130 (ISBN) Khosravi Farsani, R ; Mirmohseni, M ; Akhbari, B ; Firouzi, H ; Aref, M. R ; Sharif University of Technology
    2009
    Abstract
    We investigate the parallel partially cooperative relay broadcast channel with unmatched degraded subchannels. We characterize the capacity region of this channel in the general setting that, transmitter sends a common message for both users and a private message for each of them. Our achievability result is based on the choosing appropriate parameters for the general achievable rate region of partially cooperative relay broadcast channel. We provide a converse proof for this achievable region as well, which establishes the capacity region.© 2009 IEEE  

    On tuning fractional order [proportional-derivative] controllers for a class of fractional order systems

    , Article Automatica ; Volume 49, Issue 7 , 2013 , Pages 2297-2301 ; 00051098 (ISSN) Badri, V ; Tavazoei, M. S ; Sharif University of Technology
    2013
    Abstract
    This paper deals with a method recently proposed for tuning fractional order [proportional-derivative] (FO-[PD]) controllers. Using this tuning method, the tuned FO-[PD] controller can ensure the desired phase margin, the desired gain crossover frequency, and the flatness of the phase Bode plot at such a frequency. In the present paper, the achievable region of this tuning method in the gain crossover frequency-phase margin plane is obtained analytically. Also, the continuity of this region and uniqueness of the tuned parameters are investigated. Moreover, the achievable region of the aforementioned tuning method in the presence of time delay in the feedback loop is found  

    Physical layer security for some classes of three-receiver broadcast channels

    , Article IET Communications ; Vol. 8, issue. 11 , July , 2014 , p. 1965-1976 Salehkalaibar, S ; Aref, M. R ; Sharif University of Technology
    Abstract
    In this study, the authors consider the secrecy of a one-receiver, two-eavesdropper broadcast channel (BC) with three degraded message sets. Consider a three-receiver BC with three messages, where the first message is decoded by all the receivers. The second message is decoded by the first and the second receivers and is to be kept secret from the third receiver. The third message is decoded by the first receiver and is to be kept secret from the second and the third receivers. The authors consider the imperfect secrecy condition at the second receiver, that is, it is allowed to partially decode the third message. However, the perfect secrecy condition at the third receiver, does not allow... 

    On Marton's inner bound for broadcast channels

    , Article IEEE International Symposium on Information Theory - Proceedings, 1 July 2012 through 6 July 2012 ; July , 2012 , Pages 581-585 ; 9781467325790 (ISBN) Gohari, A ; Nair, C ; Anantharam, V ; Sharif University of Technology
    2012
    Abstract
    Marton's inner bound is the best known achievable region for a general discrete memoryless broadcast channel. To compute Marton's inner bound one has to solve an optimization problem over a set of joint distributions on the input and auxiliary random variables. The optimizers turn out to be structured in many cases. Finding properties of optimizers not only results in efficient evaluation of the region, but it may also help one to prove factorization of Marton's inner bound (and thus its optimality). The first part of this paper formulates this factorization approach explicitly and states some conjectures and results along this line. The second part of this paper focuses primarily on the... 

    Lossy transmission of correlated sources over multiple-access wiretap channels

    , Article IET Communications ; Volume 9, Issue 6 , 2015 , Pages 754-770 ; 17518628 (ISSN) Salehkalaibar, S ; Aref, M. R ; Sharif University of Technology
    Institution of Engineering and Technology  2015
    Abstract
    In this study, the authors study lossy communication of correlated sources over a multiple-access wiretap channel (MAC-WT). Consider a system with two transmitters, a receiver and an eavesdropper. There are two correlated sources where each of them is observed by the corresponding transmitter, separately. Each transmitter wishes to describe its source sequence to the receiver with a desired distortion. The sources need to be kept secret from the eavesdropper. They find an achievable region for the MAC-WT with correlated sources by separation. A joint source-channel coding scheme for the MAC-WT is also proposed. They consider lossy communication of a bivariate Gaussian source over Gaussian...