Loading...
Search for: boolean-functions
0.015 seconds
Total 44 records

    Bent function and Upper Bounds on the Nonlinearity of Vectorial Functions

    , M.Sc. Thesis Sharif University of Technology Kudarzi, Bahareh (Author) ; Khazaie, Shahram (Supervisor)
    Abstract
    the theses is composed of two main parts related to the nonlinearity of vectorial functions. The first part is devoted to maximally nonlinear vectorial function (bent vectorial functions) which contribute to an optimal resistance to both linear and differential attacks on symmetric cryptosystems. They can be used in block ciphers at the cost of additional diffusion-compression-expansion layers, or as building blocks for the construction on substitution boxes (S-boxes) and they are also useful for construction robust codes and algebraic manipulation detection codes. A main issue on bent vectorial bent functions is to characterize bent monomial trace functions leading to a classification of... 

    On hypercontractivity and the mutual information between Boolean functions

    , Article 2013 51st Annual Allerton Conference on Communication, Control, and Computing, Allerton 2013, Monticello, IL ; Oct , 2013 , Pages 13-19 ; 9781479934096 (ISBN) Anantharam, V ; Gohari, A. A ; Kamath, S ; Nair, C ; Sharif University of Technology
    IEEE Computer Society  2013
    Abstract
    Hypercontractivity has had many successful applications in mathematics, physics, and theoretical computer science. In this work we use recently established properties of the hypercontractivity ribbon of a pair of random variables to study a recent conjecture regarding the mutual information between binary functions of the individual marginal sequences of a sequence of pairs of random variables drawn from a doubly symmetric binary source  

    A new approach for touching cells segmentation

    , Article BioMedical Engineering and Informatics: New Development and the Future - 1st International Conference on BioMedical Engineering and Informatics, BMEI 2008, Sanya, Hainan, 27 May 2008 through 30 May 2008 ; Volume 1 , 2008 , Pages 816-820 ; 9780769531182 (ISBN) Nasr Isfahani, S ; Mirsafian, A ; Masoudi Nejad, A ; Sharif University of Technology
    2008
    Abstract
    Automatic cell segmentation has various applications in different parts of science. The development of automated methods for cell segmentation, remains challenging in situations where there are touching cells. In this paper we propose a new method for separating touching cells. As the first step, we use a combination of graph segmentation algorithm and thresholding for segmenting foreground objects and producing a binary image. Next, boundary points of separation zone are selected by using a corner detection algorithm. Finally, the marker controller watershed transform is applied to separate touching cells at selected points. © 2008 IEEE  

    A novel burst correction coding for the images

    , Article 14th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2007, Marrakech, 11 December 2007 through 14 December 2007 ; 2007 , Pages 550-553 ; 1424413788 (ISBN); 9781424413782 (ISBN) Lakdashti, A ; Kialashaki, H ; Manzuri Shalmani, M. T ; Ajorloo, H ; Sharif University of Technology
    2007
    Abstract
    A novel burst correction coding for correction of bulk errors in block-based image coding is developed. The algorithm makes artificial correlation between image pixels that distorts the image. By choosing appropriate parameters, one can control this distortion to lie in acceptable ranges. Our method can exactly correct an erroneously decoded block when using lossless codecs. In the presence of lossy codecs, the algorithm encounters a processing error which makes a noisy image after correction. The Wiener filter is used to reduce this noise. Experimental results show that our method can correct corrupted large blocks in images; the ability that other previously reported approaches have not... 

    Complex-valued sparse representation based on smoothed ℓ0 norm

    , Article 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP, Las Vegas, NV, 31 March 2008 through 4 April 2008 ; 2008 , Pages 3881-3884 ; 15206149 (ISSN) ; 1424414849 (ISBN); 9781424414840 (ISBN) Mohimani, G. H ; Babaie Zadeh, M ; Jutten, C ; Sharif University of Technology
    2008
    Abstract
    In this paper we present an algorithm for complex-valued sparse representation. In our previous work we presented an algorithm for Sparse representation based on smoothed l0-norm. Here we extend that algorithm to complex-valued signals. The proposed algorithm is compared to FOCUSS algorithm and it is experimentally shown that the proposed algorithm is about two or three orders of magnitude faster than FOCUSS while providing approximately the same accuracy. ©2008 IEEE  

    A first step to convolutive sparse representation

    , Article 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP, Las Vegas, NV, 31 March 2008 through 4 April 2008 ; 2008 , Pages 1921-1924 ; 15206149 (ISSN) ; 1424414849 (ISBN); 9781424414840 (ISBN) Firouzi, H ; Babaie Zadeh, M ; Ghasemian Sahebi, A ; Jutten, C ; Sharif University of Technology
    2008
    Abstract
    In this paper an extension of the sparse decomposition problem is considered and an algorithm for solving it is presented. In this extension, it is known that one of the shifted versions of a signal s (not necessarily the original signal itself) has a sparse representation on an overcomplete dictionary, and we are looking for the sparsest representation among the representations of all the shifted versions of s. Then, the proposed algorithm finds simultaneously the amount of the required shift, and the sparse representation. Experimental results emphasize on the performance of our algorithm. ©2008 IEEE  

    A high-performance architecture for irregular LDPC decoding algorithm using input-multiplexing method

    , Article 2007 9th International Symposium on Signal Processing and its Applications, ISSPA 2007, Sharjah, 12 February 2007 through 15 February 2007 ; 2007 ; 1424407796 (ISBN); 9781424407798 (ISBN) Sarbishei, O ; Mohtashami, V ; Sharif University of Technology
    2007
    Abstract
    A new high-performance architecture for decoding the irregular Low-Density Parity-Check (LDPC) codes with respect to the iterative message-passing decoding algorithm is explored. The proposed method is based on reducing the logic delays in the iterative processing of the bit nodes and check nodes leading to the increment of maximum possible frequency. The simulations show the efficiency of the proposed method in low/high-complexity graph matrices, though it is more effective in high-complexity ones. About 28% reduction of the combinational delay in the bit/check processors is explored without much impacting the area consumption. ©2007 IEEE  

    Higher-Order quantified boolean satisfiability

    , Article 47th International Symposium on Mathematical Foundations of Computer Science, MFCS 2022, 22 August 2022 through 26 August 2022 ; Volume 241 , 2022 ; 18688969 (ISSN); 9783959772563 (ISBN) Chistikov, D ; Haase, C ; Hadizadeh, Z ; Mansutti, A ; Sharif University of Technology
    Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing  2022
    Abstract
    The Boolean satisfiability problem plays a central role in computational complexity and is often used as a starting point for showing NP lower bounds. Generalisations such as Succinct SAT, where a Boolean formula is succinctly represented as a Boolean circuit, have been studied in the literature in order to lift the Boolean satisfiability problem to higher complexity classes such as NEXP. While, in theory, iterating this approach yields complete problems for k-NEXP for all k > 0, using such iterations of Succinct SAT is at best tedious when it comes to proving lower bounds. The main contribution of this paper is to show that the Boolean satisfiability problem has another canonical... 

    Coverage driven high-level test generation using a polynomial model of sequential circuits

    , Article IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ; Volume 29, Issue 5 , 2010 , Pages 737-748 ; 02780070 (ISSN) Alizadeh, B ; Mirzaei, M ; Fujita, M ; Sharif University of Technology
    Abstract
    This paper proposes a high-level test generation method which considers the control part as well as data path of a register transfer level circuit as a set of polynomial functions to generate behavioral test patterns from faulty behavior instead of comparing the faulty and fault-free circuits based on a hybrid Boolean-word canonical representation called Horner expansion diagram. Since this set of polynomial functions express primary outputs and next states with respect to primary inputs and present states, it is not necessary to perform justification/propagation phase which leads to a minimum number of backtracks. It improves fault coverage and reduces test generation time over logic-level... 

    Parallel Lagrange interpolation on k-ary n-cubes with maximum channel utilization

    , Article Journal of Supercomputing ; Volume 46, Issue 1 , 2008 , Pages 1-14 ; 09208542 (ISSN) Mahabadi, A ; Sarbazi Azad, H ; Khodaie, E ; Navi, K ; Sharif University of Technology
    2008
    Abstract
    This paper proposes an efficient parallel algorithm for computing Lagrange interpolation on k-ary n-cube networks. This is done using the fact that a k-ary n-cube can be decomposed into n link-disjoint Hamiltonian cycles. Using these n link-disjoint cycles, we interpolate Lagrange polynomial using full bandwidth of the employed network. Communication in the main phase of the algorithm is based on an all-to-all broadcast algorithm on the n link-disjoint Hamiltonian cycles exploiting all network channels, and thus, resulting in high-efficiency in using network resources. A performance evaluation of the proposed algorithm reveals an optimum speedup for a typical range of system parameters used... 

    A hybrid fuzzy based algorithm for 3D human airway segmentation

    , Article 2nd International Conference on Bioinformatics and Biomedical Engineering, iCBBE 2008, Shanghai, 16 May 2008 through 18 May 2008 ; 2008 , Pages 2295-2298 ; 9781424417483 (ISBN) Yousefi Rizi, F ; Ahmadian, A ; Sahba, N ; Tavakoli, V ; Alirezaie, J ; Fatemizadeh, E ; Rezaie, N ; Sharif University of Technology
    IEEE Computer Society  2008
    Abstract
    Segmentation of the human airway tree from volumetric computed tomography images is an important stage for many clinical applications such as virtual bronchoscopy. The main challenges of previously developed methods are to deal with two problems namely, leaking into the surrounding lung parenchyma during segmentation and the need to manually adjust the parameters. To overcome these problems, a multi-seeded fuzzy based region growing approach in conjuction with the spatial information of voxels is proposed. Comparison with a commonly used region growing segmentation algorithm shows that the proposed method retrieves more accurate results by achieving the specificity and sensitivity of 98.81%... 

    High capacity error free wavelet domain speech steganography

    , Article 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP, Las Vegas, NV, 31 March 2008 through 4 April 2008 ; 2008 , Pages 1729-1732 ; 15206149 (ISSN) ; 1424414849 (ISBN); 9781424414840 (ISBN) Shirali Shahreza, S ; Manzuri Shalmani, M. T ; Sharif University of Technology
    2008
    Abstract
    Steganography is the art of hiding information in a cover media without attracting attention. One of the cover media which can be used for steganography is speech. In this paper, we propose a new speech steganography in wavelet domain. In this method, lifting scheme is used to create perfect reconstruction Int2Int wavelets. The data is hidden in some of the Least Significant Bits (LSB) of detail wavelet coefficients. The LSB bits for hiding are selected with a new adaptive algorithm. This algorithm does not hide information in silent parts, so there is no need for silent detection algorithms. This method has zero error in hiding/unhiding process, while normal wavelet domain LSB has about 0.2... 

    Crowded scene object tracking in presence of Gaussian white noise using undecimated wavelet features

    , Article 2007 9th International Symposium on Signal Processing and its Applications, ISSPA 2007, Sharjah, 12 February 2007 through 15 February 2007 ; 2007 ; 1424407796 (ISBN); 9781424407798 (ISBN) Khansari, M ; Rabiee, H. R ; Asadi, M ; Ghanbari, M ; Sharif University of Technology
    2007
    Abstract
    In this paper, we propose a new noise robust algorithm for object tracking in the crowded video scenes. The algorithm exploits the properties of undecimated wavelet packet transform (UWPT) coefficients and texture analysis to track arbitrary objects. The coefficients of the UWPT of a user-specified region at the reference frame construct a Feature Vector (FV) for every pixel in that region. Optimal search for the best match of the region in successive frames is then performed by using the generated FVs inside an adaptive search window. Adaptation of the search window is achieved by inter-frame texture analysis to find the direction and speed of the object motion. Noise robustness has been... 

    Source estimation in noisy sparse component analysis

    , Article 2007 15th International Conference onDigital Signal Processing, DSP 2007, Wales, 1 July 2007 through 4 July 2007 ; July , 2007 , Pages 219-222 ; 1424408822 (ISBN); 9781424408825 (ISBN) Zayyani, H ; Babaiezadeh, M ; Jutten, C ; Sharif University of Technology
    2007
    Abstract
    In this paper, a new algorithm for Sparse Component Analysis (SCA) in the noisy underdetermined case (i.e., with more sources than sensors) is presented. The solution obtained by the proposed algorithm is compared to the minimum l1 -norm solution achieved by Linear Programming (LP). Simulation results show that the proposed algorithm is approximately 10 dB better than the LP method with respect to the quality of the estimated sources. It is due to optimality of our solution (in the MAP sense) for source recovery in noisy underdetermined sparse component analysis in the case of spiky model for sparse sources and Gaussian noise. © 2007 IEEE  

    A fast algorithm for construction of minimum delay multicast trees in P2P networks

    , Article 2006 International Symposium on Communications and Information Technologies, ISCIT, Bangkok, 18 October 2006 through 20 October 2006 ; 2006 , Pages 137-142 Ronasi, K ; Firooz, M. H ; Pakravan, M. R ; Avanaki, A. N ; Sharif University of Technology
    2006
    Abstract
    Peer to Peer networks have received considerable attention during the past decade and have been the focus of many research and development activities. New applications such as video streaming or gaming would benefit from multicast topologies and creating such trees in peer to peer networks is a challenging task. Proper multicast trees should minimize the traffic delay and bandwidth consumption. At the same time, construction of these trees should not be very complicated in terms of the required processing power so they can be implemented easily. The required time for construction of multicast trees should also be minimized and that helps with their adaptation to the dynamics of the network.... 

    A robust voice activity detection based on wavelet transform

    , Article 2nd International Conference on Electrical Engineering, ICEE, Lahore, 25 March 2008 through 26 March 2008 ; 2008 ; 9781424422937 (ISBN) Aghajani, K ; Manzuri, M. T ; Karami, M ; Tayebi, H ; Sharif University of Technology
    2008
    Abstract
    Voice activity detection is an important step in some speech processing systems, such as speech recognition, speech enhancement, noise estimation, speech compression ... etc. In this paper a new voice activity detection algorithm based on wavelet transform is proposed. In this algorithm we use the energy in each sub band, and by two methods we extract feature vector from these values. Experimental results demonstrate advantage over different VAD methods. ©2008 IEEE  

    Multiple-chi-square tests and their application on distinguishing attacks

    , Article 2011 8th International ISC Conference on Information Security and Cryptology, ISCISC 2011, 14 September 2011 through 15 September 2011, Mashhad ; 2011 , Pages 55-60 ; 9781467300773 (ISBN) Vardasbi, A ; Salmasizadeh, M ; Mohajeri, J ; Sharif University of Technology
    2011
    Abstract
    Chi-square tests are vastly used for distinguishing random distributions, but extra care must be taken when using them on several independent variables. We noticed, the chisquare statistics, in some previous works, was computed half of its real value. Thus, to avoid possible future confusions, we formulize multiple-chi-square tests. To show the application of multiple-chi-square tests, we introduce two new tests and apply them to Trivium as a special case. These tests are modifications of ANF monomial test and, when applied to Trivium with the same number of rounds, the data complexity of them is roughly 24 times smaller than that of previous ANF monomial test  

    Improved algorithms in parallel evaluation of large cryptographic S-boxes

    , Article International Journal of Parallel, Emergent and Distributed Systems ; Volume 35, Issue 4 , 2020 , Pages 461-472 Khadem, B ; Ghasemi, R ; Sharif University of Technology
    Taylor and Francis Ltd  2020
    Abstract
    Nowadays computational complexity of fast Walsh Hadamard transform and non-linearity for Boolean functions and large cryptographic substitution boxes is a major challenge of modern cryptography research on strengthening encryption schemes against linear and differential attacks. Time and memory complexities of the best existing algorithm for computing fast Walsh Hadamard transform and non-linearity for (Formula presented.) substitution boxes is (Formula presented.). This paper proposes three new innovation in acceleration methods that improve the computation time for paralleled Walsh matrix up to 68 folds and the evaluation time for non-linearity degree up to 1021 folds. These methods... 

    Analytic performance comparison of hypercubes and star graphs with implementation constraints

    , Article Journal of Computer and System Sciences ; Volume 74, Issue 6 , September , 2008 , Pages 1000-1012 ; 00220000 (ISSN) Kiasari, A. E ; Sarbazi Azad, H ; Sharif University of Technology
    2008
    Abstract
    Many theoretical-based comparison studies, relying on graph structural and algorithmic properties, have been conducted for the hypercube and the star graph. None of these studies, however, have considered real working conditions and implementation limits. We have compared the performance of the star and hypercube networks for different message lengths and number of virtual channels, and considered two implementation constraints, namely the constant bisection bandwidth and constant node pin-out. We use two accurate analytical models, already proposed for the star graph and hypercube, and implement the parameter changes imposed by technological implementation constraints. When no constraint is... 

    Frequency planning of GSM cellular communication network in urban areas including traffic distribution, a practical implementation

    , Article 2008 Asia-Pacific Symposium on Electromagnetic Compatibility and 19th International Zurich Symposium on Electromagnetic Compatibility, APEMC 2008, Suntec, 19 May 2008 through 23 May 2008 ; 2008 , Pages 891-894 ; 9810806280 (ISBN); 9789810806286 (ISBN) Atamanesh, M ; Farzaneh, F ; Sharif University of Technology
    2008
    Abstract
    Using an in-house developed software the signal level, the best server cells, and the amount of interference using standard propagation models are determined in a cellular environment. The program is also able to assign the frequency channels automatically to the TRXs taking into account the carrier to interference and the traffic distribution using a genetic algorithm. In this paper, the cost function is based on the total Carrier to Interference ratio (C/I) and the traffic density of the serving area. The software by means of a genetic algorithm approaches a frequency assignment which increases the overall quality of service throughout the cellular network. The package has been used in a...