Loading...
Search for: coding-scheme
0.006 seconds
Total 37 records

    Return code schemes for electronic voting systems

    , Article 2nd International Joint Conference on Electronic Voting, E-Vote-ID 2017, 24 October 2017 through 27 October 2017 ; Volume 10615 LNCS , 2017 , Pages 198-209 ; 03029743 (ISSN); 9783319686868 (ISBN) Khazaei, S ; Wikström, D ; Sharif University of Technology
    Springer Verlag  2017
    Abstract
    We describe several return code schemes for secure vote submission in electronic voting systems. We consider a unified treatment where a return code is generated as a multiparty computation of a secure MAC tag applied on an encrypted message submitted by a voter. Our proposals enjoy a great level of flexibility with respect to various usability, security, and performance tradeoffs. © 2017, Springer International Publishing AG  

    On the capacity region of a class of Z channels with cooperation

    , Article ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications, 17 October 2010 through 20 October 2010 ; October , 2010 , Pages 464-468 ; 9781424460175 (ISBN) Salehkalaibar, S ; Aref, M. R ; Sharif University of Technology
    2010
    Abstract
    In this paper, we consider Z Channel (ZC) with cooperation, where there are two senders and two receivers. The first sender transmits information to both receivers and also to the second sender. The first receiver and the second sender cooperate with the first sender in sending messages to the second receiver. The second sender transmits information only to its intended receiver. We first establish an achievable rate region for the general cooperative ZC. The coding scheme is based on rate splitting technique. At the receivers, we use joint decoding strategy. To illustrate the tightness of the proposed inner bound, we define degraded cooperative ZC. We derive an outer bound to the capacity... 

    CodedSketch: A coding scheme for distributed computation of approximated matrix multiplication

    , Article IEEE Transactions on Information Theory ; Volume 67, Issue 6 , 2021 , Pages 4185-4196 ; 00189448 (ISSN) Jahani Nezhad, T ; Maddah Ali, M. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    In this paper, we propose CodedSketch, as a distributed straggler-resistant scheme to compute an approximation of the multiplication of two massive matrices. The objective is to reduce the recovery threshold, defined as the total number of worker nodes that the master node needs to wait for to be able to recover the final result. To exploit the fact that only an approximated result is required, in reducing the recovery threshold, some sorts of pre-compression are required. However, compression inherently involves some randomness that would lose the structure of the matrices. On the other hand, considering the structure of the matrices is crucial to reduce the recovery threshold. In... 

    Internally channel-coded framed time-hopping fiber-optic CDMA communications

    , Article IEEE/OSA Journal of Lightwave Technology ; Vol.23, No.11, PP. 3702-3707, Nov. 2005 Azmi, P ; Nasiri-Kenari, M ; Salehi, J. A ; Sharif University Of Technology
    Abstract
    Due to the low cardinality of optical orthogonal codes (OOCs) with a correlation value of 1, the capability of an internal channel-coding scheme cannot be applied effectively for an increasing number of simultaneous users in a typical fiber-optic code division multiple-access (FO-CDMA) system. In this paper, we consider applying the internal channel-coding scheme to the framed time-hopping (FTH) FO-CDMA system. Due to the extremely high cardinality of the spreading sequence in FTH FO-CDMA, the technique highlights the ability of the internal channel-coding scheme to increase the effective number of users in an FO-CDMA system. For the FTH FO-CDMA system, we only consider a Poisson... 

    One-receiver two-eavesdropper broadcast channel with degraded message sets

    , Article IEEE Transactions on Information Forensics and Security ; Volume 8, Issue 7 , 2013 , Pages 1162-1172 ; 15566013 (ISSN) Salehkalaibar, S ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    2013
    Abstract
    In this paper, we study the one-receiver two-eavesdropper Broadcast Channel (BC) with three degraded message sets. A common message is sent to three receivers. Another message is sent to the first and second receivers and needs to be kept secret from the third receiver (second eavesdropper). The third message is sent to the first receiver and needs to be kept secret from the second and third receivers (first and second eavesdroppers). First, we consider perfect secrecy conditions at the eavesdroppers, where we find an achievable perfect secrecy region. In the achievability scheme, we use superposition coding which divides the available randomness into different levels. These levels are used... 

    Sending a Gaussian source over an AWGN channel in the presence of an unknown interference

    , Article 2012 46th Annual Conference on Information Sciences and Systems, CISS 2012, Princeton, NJ, 21 March 2012 through 23 March 2012 ; 2012 ; 9781467331401 (ISBN) Ghasemi Goojani, S ; Behroozi, H ; Sharif University of Technology
    2012
    Abstract
    This paper analyzes the problem of transmitting a Gaussian source over an additive white Gaussian noise (AWGN) channel in the presence of an unknown interference. The goal is to estimate the source at the receiver with minimum mean squared error (MMSE) distortion. We introduce a lattice-based coding scheme and calculate its achievable distortion. If the interference distribution and the lattice voronoi region satisfy some conditions, the effect of interference can be reduced  

    On the transmission of a Gaussian source over an AWGN channel with correlated interference

    , Article 12th Canadian Workshop on Information Theory, CWIT 2011, 17 May 2011 through 20 May 2011 ; May , 2011 , Pages 19-23 ; 9781457707438 (ISBN) Varasteh, M ; Behroozi, H ; Sharif University of Technology
    2011
    Abstract
    We study hybrid digital-analog (HDA) joint source-channel coding schemes in transmitting an analog Gaussian source over an AWGN channel in the presence of an interference, correlated with the source. We analyze these schemes to obtain achievable (mean-squared error) distortion-power tradeoffs. For comparison, we also obtain two outer bounds for the achievable distortion-power tradeoff; those are two necessary conditions under which (D,P) is achievable. Using numerical examples, we demonstrate that, a two-layered coding scheme consisting of analog and Costa coding performs well compared to other provided HDA schemes  

    On Körner-Marton's sum modulo two problem

    , Article IWCIT 2015 - Iran Workshop on Communication and Information Theory, 6 May 2015 through 7 May 2015 ; May , 2015 ; 9781479982356 (ISBN) Sefidgaran, M ; Gohari, A ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    In this paper we study the sum modulo two problem proposed by Körner and Marton. In this source coding problem, two transmitters who observe binary sources X and Y, send messages of limited rate to a receiver whose goal is to compute the sum modulo of X and Y. This problem has been solved for the two special cases of independent and symmetric sources. In both of these cases, the rate pair (H(X|Y), H(Y|X)) is achievable. The best known outer bound for this problem is a conventional cut-set bound, and the best known inner bound is derived by Ahlswede and Han using a combination of Slepian-Wolf and Körner-Marton's coding schemes. In this paper, we propose a new outer bound which is strictly... 

    Capacity of channel with energy harvesting transmitter

    , Article IET Communications ; Volume 9, Issue 4 , March , 2015 , Pages 526-531 ; 17518628 (ISSN) Ghanizade Bafghi, H ; Seyfe, B ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Institution of Engineering and Technology  2015
    Abstract
    The authors propose a new technique to model the arriving energy's knowledge (AEK) in the energy harvesting (EH) communication systems. They consider a batteryless EH transmitter with the AEK non-causally provided to it. They show that the capacity of the authors' model in general case, that is, discrete memoryless channel, can be derived through a binning scheme. This resembles a Gelfand-Pinsker type capacity formula which intuitively is the result of treating the energy as a channel state. Moreover, they investigate two especial cases of binary and Gaussian channels with the EH transmitters. In the binary symmetric channel with EH transmitter (BSCEH), their coding scheme leads to achieve... 

    Achievable rate regions for interference channel with two relays

    , Article ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications, 17 October 2010 through 20 October 2010 ; October , 2010 , Pages 1018-1023 ; 9781424460175 (ISBN) Akhbari, B ; Mirmohseni, M ; Aref, M.R ; Society of Information Theory and Its Applications (SITA); National Science Council; Bureau of Foreign Trade, MOEA; Chunghwa Telecom Co., Ltd; Inf. Commun. Res. Lab. Ind. Technol ; Sharif University of Technology
    2010
    Abstract
    In this paper, we introduce discrete memoryless Interference Channel (IFC) with two relays as two interfering transmitter-receiver pairs that are aided by two relays. We propose two different coding strategies for this channel. In the first strategy, we assume that each relay tries to mainly help one of the transmitter-receiver pairs through signal relaying and interference cancellation, while in the second strategy we assume that each relay tries to help both transmitter-receiver pairs. In our coding schemes, we employ rate-splitting, generalized block Markov coding, superposition coding and Gel'fand-Pinsker binning to cancel parts of the interference known to be experienced at the... 

    Capacity regions for some classes of Causal Cognitive Interference Channels with delay

    , Article 2010 IEEE Information Theory Workshop, ITW 2010 - Proceedings, 30 August 2010 through 3 September 2010 ; 2010 ; 9781424482641 (ISBN) Mirmohseni, M ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
    Abstract
    In this paper, we investigate Causal Cognitive Interference Channel (CC-IFC) with delay in which the cognitive user transmission can depend on L future received symbols as well as the past ones. We study two special cases: CC-IFC without delay (L=1), where the cognitive user can use only current and past received symbols, and CC-IFC with a block length delay (L=n), wherein the entire received sequence can be used. In each case, we obtain an inner bound on the capacity region. Our coding schemes are based on the generalized block Markov superposition coding and instantaneous relaying for CC-IFC without delay, and non-causal partial Decode-and-Forward (DF) for CC-IFC with a block length delay.... 

    Generalized multiple-access relay channel with confidential messages

    , Article ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications, 17 October 2010 through 20 October 2010, Taichung ; 2010 , Pages 1024-1029 ; 9781424460175 (ISBN) Sonee, A ; Salimi, S ; Salmasizadeh, M ; Sharif University of Technology
    2010
    Abstract
    In this paper, we propose information theoretic schemes that achieve the rate-equivocation regions for the multiple-access relay channel with confidential messages. This channel consists of two users that play the role of eavesdropper for each other's message and a relay that helps them to have a reliable and secure communication. The relay can itself be an eavesdropper of the users messages. The first coding scheme used for achievability is noise forwarding strategy and the second is the combination of noise forwarding with the compress and forward strategy. In the first one, relay cooperates with the users to have a confidential communication by sending codewords independent of the secret... 

    Achievable rate region for multiple-access-relay-networks

    , Article IET Communications ; Volume 4, Issue 15 , October , 2010 , Pages 1792-1798 ; 17518628 (ISSN) Salehkalaibar, S ; Ghabeli, L ; Aref, M. R ; Sharif University of Technology
    Abstract
    The authors introduce a generalisation of the multiple-access-relay-channel (MARC) called multiple-access-relay-network (MARN). The MARC model was first introduced by Kramer et al. and consists of many transmitters, one receiver and only one relay. In the MARN, there are many transmitters, many relays and one receiver. The authors obtained an achievable rate region for MARN by considering partial decode-and-forward (PDF) strategy at the relays. They showed that the region obtained using PDF strategy subsumes the region obtained by Kramer et al. for MARC. In the proposed coding scheme, the authors take advantage of PDF strategy based on regular encoding/backward decoding strategy. They also... 

    State-dependent relay cchannel with private messages with partial causal and non-causal channel state information

    , Article IEEE International Symposium on Information Theory - Proceedings, 13 June 2010 through 18 June 2010, Austin, TX ; 2010 , Pages 634-638 ; 21578103 (ISSN) ; 9781424469604 (ISBN) Akhbari, B ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    2010
    Abstract
    In this paper, we introduce a discrete memoryless State-Dependent Relay Channel with Private Messages (SD-RCPM) as a generalization of the state-dependent relay channel. We investigate two main cases: SD-RCPM with non-causal Channel State Information (CSI), and SD-RCPM with causal CSI. In each case, it is assumed that partial CSI is available at the source and relay. For non-causal case, we establish an achievable rate region using Gel'fand-Pinsker type coding scheme at the nodes informed of CSI, and Compress-and-Forward (CF) scheme at the relay. Using Shannon's strategy and CF scheme, an achievable rate region for causal case is obtained. As an example, the Gaussian version of SD-RCPM is... 

    A new achievable rate region for the gaussian two-way relay channel via hybrid broadcast protocol

    , Article IEEE Communications Letters ; Vol. 18, issue. 11 , 2014 , pp. 1883-1886 ; ISSN: 10897798 Ghasemi Goojani, S ; Behroozi, H ; Sharif University of Technology
    Abstract
    In this letter, we study the Gaussian two-way relay channel (GTWRC) with a direct link in which two nodes want to exchange information with each other with the help of a relay node in the presence of a direct link between two nodes. Specially, we focus on a protocol with four phases, which is called the hybrid broadcast (HBC) protocol. In the HBC protocol, sequential transmissions from both users are followed by a transmission from the relay. Using nested lattice codes, we obtain a new achievable rate region for this protocol. In fact, utilizing a four-stage lattice partition chain, we introduce an intermediate lattice in our lattice-based coding scheme, and by using it, we split the... 

    Deep-Learning-Based blind recognition of channel code parameters over candidate sets under awgn and multi-path fading conditions

    , Article IEEE Wireless Communications Letters ; Volume 10, Issue 5 , 2021 , Pages 1041-1045 ; 21622337 (ISSN) Dehdashtian, S ; Hashemi, M ; Salehkaleybar, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    We consider the problem of recovering channel code parameters over a candidate set by merely analyzing the received encoded signals. We propose a deep learning-based solution that I) is capable of identifying the channel code parameters for several coding scheme (such as LDPC, Convolutional, Turbo, and Polar codes), II) is robust against channel impairments like multi-path fading, III) does not require any previous knowledge or estimation of channel state or signal-to-noise ratio (SNR), and IV) outperforms related works in terms of probability of detecting the correct code parameters. © 2012 IEEE  

    Sending linear functions of correlated gaussian sources over a MAC in the presence of known interference at the transmitter

    , Article 2012 46th Annual Conference on Information Sciences and Systems, CISS 2012, 21 March 2012 through 23 March 2012 ; March , 2012 , Page(s) 1 - 6 ; 9781467331401 (ISBN) Ghasemi Goojani, S ; Behroozi, H ; Sharif University of Technology
    2012
    Abstract
    In this work, we consider the problem of communicating linear functions of correlated Gaussian sources over a two-user additive Gaussian noise multiple access channel (MAC) in the presence of known interference at the transmitter. The goal is to estimate a linear combination of two sources at the receiver with minimum average mean squared error (MSE) distortion. Here, a lattice-based coding scheme is presented and its achievable distortion is analyzed. In addition, two lower bounds on the achievable distortion are derived. The proposed lattice coding scheme can cancel channel interference completely  

    On source transmission over some classes of relay channels

    , Article IEEE International Symposium on Information Theory - Proceedings ; 2012 , Pages 1942-1946 ; 9781467325790 (ISBN) Salehkalaibar, S ; Aref, M. R ; Sharif University of Technology
    IEEE  2012
    Abstract
    We study the reliable transmission of correlated sources over the relay channel. One of the sources is available at the sender while the other one is known to the relay. The receiver wishes to reconstruct both sources. We find necessary and sufficient conditions for optimal separation of source and channel codes. The coding scheme is based on the combination of the Slepian-Wolf source coding and Partial Decode-and-Forward (PDF) strategy. In this scheme, the relay partially decodes the message transmitted by the sender. We also consider the semi-deterministic relay channel where the output at the relay is a deterministic function of inputs from the sender and the relay. For the transmission... 

    Compress-and-forward strategy for cognitive interference channel with unlimited look-ahead

    , Article IEEE Communications Letters ; Volume 15, Issue 10 , 2011 , Pages 1068-1071 ; 10897798 (ISSN) Mirmohseni, M ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
    Abstract
    This study investigates the Causal Cognitive Interference Channel (CC-IFC) with unlimited look-ahead, in which the cognitive user non-causally knows its entire received sequence. A coding scheme is proposed which combines the Compress-and-Forward (CF) strategy and Marton coding at the cognitive user. Using this scheme, a new inner bound on the capacity region (achievable rate region) is established for the CC-IFC with unlimited look-ahead. Further, the derived achievable rate region is extended to the Gaussian case and is compared with the previously obtained results via numerical examples, which are based on the Decode-and-Forward (DF) strategy  

    Capacity bounds for the three-user Cognitive Z-Interference Channel

    , Article 12th Canadian Workshop on Information Theory, CWIT 2011, 17 May 2011 through 20 May 2011 ; May , 2011 , Pages 34-37 ; 9781457707438 (ISBN) Mirmohseni, M ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    In this paper, we consider a three-user cognitive radio network with two primary users and one cognitive radio. We concentrate on a three-user Interference Channel (IFC) where one of the transmitters has cognitive capabilities and non-causally knows the messages of the other two transmitters. Moreover, we assume that the cognitive transmitter does not cause any interference at the receivers of the primary users and we introduce three-user Cognitive Z-Interference Channel (C-ZIFC). We first obtain an inner bound on the capacity region of three-user C-ZIFC, where our coding scheme makes use of collaborative strategy by rate splitting and cooperative strategy by superposition coding. Moreover,...