Loading...
Search for: communication
0.01 seconds
Total 1379 records

    Analysis of secure signature codes provided by bent sequences for a CDMA system

    , Article 2002 IEEE Wireless Communications and Networking Conference, WCNC 2002, 17 March 2002 through 21 March 2002 ; Volume 2 , 2002 , Pages 855-859 ; 15253511 (ISSN); 0780373766 (ISBN) Madani, A. H ; Nasiri Kenari, M ; Salehi, J. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2002
    Abstract
    Matsufuji and Imamura (see IEEE Trans. on Info. Theory, vol.46, no.4, p.1691-95, 2000) proposed a new method to generate an optimal set of bent sequences as a set of signature sequences for a CDMA system has been introduced. This method is designed to make the CDMA system secure against interception, for both an insider intruder (a user) and an outsider intruder. The security analysis of this system of Matsufuji et al. was based on computing the cardinality of the search space. In this paper after reforming the bent function decomposition, we reapply the above analysis to the system. Then for binary sequences, we consider another analysis to this system, which is based on the fact that all... 

    Understanding the role of outsiders in community-based development interventions: a framework with findings from iran

    , Article Voluntas ; Volume 32, Issue 4 , 2021 , Pages 830-845 ; 09578765 (ISSN) Naficy, A ; Bergh, S. I ; Akhavan Alavi, S. H ; Maleki, A ; Mirehei, M ; Sharif University of Technology
    Springer  2021
    Abstract
    This article analyzes various roles of development practitioners (called outsiders) in five different cases of community-based development (CBD) in rural Iran. It provides a review of the literature on CBD and identifies three main types of roles fulfilled by outsiders to support indigenous development processes. These include preparing the ground, activating community-based organizations as participatory institutions, and taking on the role of brokers who bridge the gap between the local community and outside institutions—especially the state and market. From the analysis of empirical qualitative data collected during fieldwork in Iran, the article concludes that while the roles played by... 

    Quantum information transmission through a qubit chain with quasi-local dissipation

    , Article Quantum Information and Computation ; Volume 18, Issue 3-4 , March , 2018 , Pages 231-246 ; 15337146 (ISSN) Radgohar, R ; Memarzadeh, L ; Mancini, S ; Sharif University of Technology
    Rinton Press Inc  2018
    Abstract
    We study quantum information transmission in a Heisenberg-XY chain where qubits are affected by quasi-local environment action and compare it with the case of local action of the environment. We find that for open boundary conditions the former situation always improves quantum state transfer process, especially for short chains. In contrast, for closed boundary conditions quasi-local environment results advantageous in the strong noise regime. When the noise strength is comparable with the XY interaction strength, the state transfer fidelity through chain of odd/even number of qubits in presence of quasi-local environment results smaller/greater than that in presence of local environment. ©... 

    Spread-time/time-hopping UWB CDMA communication

    , Article IEEE International Symposium on Communications and Information Technologies: Smart Info-Media Systems, ISCIT 2004, Sapporo, 26 October 2004 through 29 October 2004 ; Volume 2 , 2004 , Pages 1047-1050 ; 0780385934 (ISBN) Farhang, M ; Salehi, J. A ; Sharif University of Technology
    2004
    Abstract
    The use of Spread-Time CDMA for ultrawideband (UWB) wireless communication is proposed and its capability for supporting many high data rate users is investigated. Furthermore we will study a hybrid technique, namely, Spread-Time/Time-Hopping to increase the capacity of the above mentioned technique and simultaneously minimizing the effect of near-far in a typical CDMA system  

    Computer Networks and Distributed Systems: International Symposium, CNDS 2013 Tehran, Iran, December 25–26, 2013 Revised Selected Papers

    , Article Communications in Computer and Information Science ; Vol. 428, issue , December , 2014 ; 18650929 ; 978-3-319-10902-2 Jahangir, A. H ; Movaghar, A ; Asadi, H ; Sharif University of Technology
    Abstract
    [No abstract available]  

    Network immunization under limited budget using graph spectra

    , Article International Journal of Modern Physics C ; Volume 27, Issue 8 , 2016 ; 01291831 (ISSN) Zahedi, R ; Khansari, M ; Sharif University of Technology
    World Scientific Publishing Co. Pte Ltd 
    Abstract
    In this paper, we propose a new algorithm that minimizes the worst expected growth of an epidemic by reducing the size of the largest connected component (LCC) of the underlying contact network. The proposed algorithm is applicable to any level of available resources and, despite the greedy approaches of most immunization strategies, selects nodes simultaneously. In each iteration, the proposed method partitions the LCC into two groups. These are the best candidates for communities in that component, and the available resources are sufficient to separate them. Using Laplacian spectral partitioning, the proposed method performs community detection inference with a time complexity that rivals... 

    World map of scientific misconduct

    , Article Science and Engineering Ethics ; 2017 , Pages 1-4 ; 13533452 (ISSN) Ataie Ashtiani, B ; Sharif University of Technology
    Springer Netherlands  2017
    Abstract
    A comparative world map of scientific misconduct reveals that countries with the most rapid growth in scientific publications also have the highest retraction rate. To avoid polluting the scientific record further, these nations must urgently commit to enforcing research integrity among their academic communities. © 2017 Springer Science+Business Media B.V  

    A novel granular approach for detecting dynamic online communities in social network

    , Article Soft Computing ; 2018 ; 14327643 (ISSN) Cheraghchi, H. S ; Zakerolhosseini, A ; Bagheri Shouraki, S ; Homayounvala, E ; Sharif University of Technology
    Springer Verlag  2018
    Abstract
    The great surge in the research of community discovery in complex network is going on due to its challenging aspects. Dynamicity and overlapping nature are among the common characteristics of these networks which are the main focus of this paper. In this research, we attempt to approximate the granular human-inspired viewpoints of the networks. This is especially helpful when making decisions with partial knowledge. In line with the principle of granular computing, in which precision is avoided, we define the micro- and macrogranules in two levels of nodes and communities, respectively. The proposed algorithm takes microgranules as input and outputs meaningful communities in rough... 

    World map of scientific misconduct

    , Article Science and Engineering Ethics ; Volume 24, Issue 5 , 2018 , Pages 1653-1656 ; 13533452 (ISSN) Ataie Ashtiani, B ; Sharif University of Technology
    Springer Netherlands  2018
    Abstract
    A comparative world map of scientific misconduct reveals that countries with the most rapid growth in scientific publications also have the highest retraction rate. To avoid polluting the scientific record further, these nations must urgently commit to enforcing research integrity among their academic communities. © 2017, Springer Science+Business Media B.V  

    Using self organizing map to infer communities in weblogs' social network

    , Article 2007 IADIS European Conference on Data Mining, DM 2007, part of the 1st IADIS Multi Conference on Computer Science and Information Systems, MCCSIS 2007, 3 July 2007 through 8 July 2007 ; 2020 , Pages 58-64 Jamali, M ; Abolhassani, H ; Khalilian, M ; Sharif University of Technology
    IADIS Press  2020
    Abstract
    Nowadays users of the Web are encouraged to generate content on the Web by themselves. Weblogs are the most popular tools to do this. In fact Weblogs are one kind of social networks and they are one of the most important components in Web 2.0. Blogs are often situated within a Blog community of similar interest. These communities can be a useful way for readers to access space slice of millions of Weblogs. In this paper we introduce a new algorithm to infer communities based on their link structure. This algorithm uses self organizing maps to identify communities among Weblogs. The link pattern of each Weblog is the input for SOM. © 2007 IADIS  

    Linear decoupled space-time codes

    , Article 14th IEEE 2003 International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC2003, Beijing, 7 September 2003 through 10 September 2003 ; Volume 3 , 2003 , Pages 2862-2867 ; 0780378229 (ISBN); 9780780378223 (ISBN) Razzaghi, P ; Khalaj, B. H ; Sharif University of Technology
    2003
    Abstract
    In this paper, we will introduce a new constraint on linear space-time block codes that will result in a novel decoupled symbol-by-symbol detection scheme. Based on the new framework, a quasi-decoupled space-time code that is applicable to any number of transmit and receive antennas will be proposed. We will also solve a more general case and show that all other known solutions to this problem such as orthogonal designs and Clifford algebra representations, represent special cases of such general solution which will provide an easier framework, to deal with such codes. It is noticeable that the new framework not only provides better understanding of earlier solutions but may also help in... 

    Evolution of communication

    , Article Proceedings of the Seventh IASTED International Conference on Artificial Intelligence and Soft Computing, Banff, 14 July 2003 through 16 July 2003 ; Volume 7 , 2003 , Pages 274-277 ; 0889863679 (ISBN) Halavati, R ; Bagheri Shouraki, S ; Sharif University of Technology
    2003
    Abstract
    The evolution of communication and its consequences on living objects is a challenging subject for many researches. Due to lack of our knowledge about the real trend of this evolution, artificial life simulations can shed light on many dark points of this process. In this paper, we have used Zamin artificial life environment to test the emergence of a very simple form of communication. The usability of this new capability is tested by a simple test of coping with new environment  

    A new soft-handoff management algorithm with two decision boundaries

    , Article 12th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2001), San Diego, CA, 30 September 2001 through 3 October 2001 ; Volume 1 , 2001 , Pages D54-D58 Ashtiani, F ; Salehi, J. A ; Aref, M. R ; Nasiri Kenari, M ; Sharif University of Technology
    2001
    Abstract
    One of the most prominent features of code division multiple-access (CDMA) cellular networks is their ability for applying soft-handoff. This type of handoff results in a better supporting of seamless communication services, capacity enhancement, QoS improvement, etc. Because of existence of more parameters and flexibilities compared to hard-handoff, an optimum solution for soft-handoff management and admission control for new and handoff calls is necessary. In this paper we propose a new algorithm with two thresholds for admission of new and handoff calls, and with two decision boundaries for controlling of handoff traffic. We compare this algorithm with a simpler one with only one decision... 

    Wireless optical CDMA lAN: digital implementation analysis [electronic resource]

    , Article IEEE Journal of Selected Area in Communications (JSAC) ; 2009 Vol. 27, No. 9, PP. 1676-1686, Dec Ghaffari, B. M ; Matinfar, M. D ; Salehi, J. A ; Sharif University Of Technology
    Abstract
    In this paper we present and investigate a digital design and implementational details of a wireless optical CDMA (OCDMA) system based on generalized optical orthogonal codes (OOCs). A detailed digital implementation analysis and transmitter/receiver architectures in the context of the above design are fully studied. We analyze various subsystems for a wireless OCDMA system including detector and receiver structure, acquisition, and tracking blocks as well as evaluating their performance in a typical wireless OCDMA communication system. By analyzing two main parts of the system, namely, chip-level detector and OCDMA receiver blocks we evaluate the performance of the overall system.... 

    Optimal topological design of power communication networks using genetic algorithm

    , Article Scientia Iranica ; Volume 20, Issue 3 , 2013 , Pages 945-956 ; 10263098 (ISSN) Jahromi, A. E ; Rad, Z. B ; Sharif University of Technology
    2013
    Abstract
    An electric power supply is the backbone of development in advanced as well as in developing economies. An integral part of ensuring a secure power supply system is a power communication system. Due to the high and sustained performance requirements of power communication systems, electric companies prefer to construct their own communication networks privately rather than relying solely on a public communication system. The focus of this paper is on the optimal topological design of a power communication network. Based on advanced optimization models in public communication networks, and taking into account the specific Quality of Service, as demanded by various applications, such as... 

    Communication-awareness for energy-efficiency in datacenters

    , Article Energy Efficiency in Data Centers and Clouds, 2016 ; Volume 100 , 2016 , Pages 201-254 ; 00652458 (ISSN) ; 9780128047781 (ISBN) Nabavinejad, S. M ; Goudarzi, M ; Sharif University of Technology
    Academic Press Inc  2016
    Abstract
    With the proliferation of cloud computing concept, the datacenters, as the basic infrastructure for cloud computing, have gained an ever-growing attention during the last decade. Energy consumption in datacenters is one of the several features of them that have been the target of various researches. Two major consumers of energy in datacenters are the cooling system and IT equipment. Computing resources, such as servers, and communicating ones, such as switches, constitute the main portion of IT equipment. Among these two major players, the servers have been considered more than networking equipment. Making servers energy proportional as well as server consolidation are the two essential... 

    Multicast communication in OTIS-hypercube multi-computer systems

    , Article International Journal of High Performance Computing and Networking ; Volume 4, Issue 3-4 , 2006 , Pages 161-173 ; 17400562 (ISSN) Najaf abadi, H. H ; Sarbazi azad, H ; Sharif University of Technology
    2006
    Abstract
    The ability to perform multicast communication efficiently in parallel computing systems is increasingly becoming an essential feature of these systems. Therefore, any emerging parallel architecture must be able to provide effective multicasting performance. OTIS-based multi-computer systems are parallel systems that efficiently exploit optical connections between distant nodes, while using electronic connections for physically close processors. No previous work has attempted to determine an optimal multicast communication scheme for OTIS networks. This paper presents two approaches to implement efficient multicast communication in wormhole-routed OTIS networks, for the two different... 

    Network-on-SSD: A scalable and high-performance communication design paradigm for SSDs

    , Article IEEE Computer Architecture Letters ; Vol. 12, issue 1, Article number 6178186 , 2013 , pp. 5-8 ; ISSN: 15566056 Tavakkol, A ; Arjomand, M ; Sarbazi-Azad, H ; Sharif University of Technology
    Abstract
    In recent years, flash memory solid state disks (SSDs) have shown a great potential to change storage infrastructure because of its advantages of high speed and high throughput random access. This promising storage, however, greatly suffers from performance loss because of frequent ''erase-before-write'' and ''garbage collection'' operations. Thus, novel circuit-level, architectural, and algorithmic techniques are currently explored to address these limitations. In parallel with others, current study investigates replacing shared buses in multi-channel architecture of SSDs with an interconnection network to achieve scalable, high throughput, and reliable SSD storage systems. Roughly... 

    Compound multiple access channel with confidential messages

    , Article 2014 IEEE International Conference on Communications, ICC 2014 ; 10-14 June 2014 , 2014 , Pages 1922-1927 ; ISBN: 9781479920037 Zivari Fard, H ; Akhbari, B ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
    Abstract
    In this paper, we study the problem of secret communication over a Compound Multiple Access Channel (MAC). In this channel, we assume that one of the transmitted messages is confidential that is only decoded by its corresponding receiver and kept secret from the other receiver. For this proposed setting (compound MAC with confidential messages), we derive general inner and outer bounds on the secrecy capacity region. Also, as examples, we investigate 'Less noisy' and 'Gaussian' versions of this channel, and extend the results of the discrete memoryless version to these cases. Moreover, providing numerical examples for the Gaussian case, we illustrate the comparison between achievable rate... 

    Active adversaries from an information-theoretic perspective: Data modification attacks

    , Article IEEE International Symposium on Information Theory - Proceedings ; 2014 , pp. 791-795 ; ISSN: 21578095 Mirmohseni, M ; Papadimitratos, P ; Sharif University of Technology
    Abstract
    We investigate the problem of reliable communication in the presence of active adversaries that can tamper with the transmitted data. We consider a legitimate transmitter-receiver pair connected over multiple communication paths (routes). We propose two new models of adversary, a 'memoryless' and a 'foreseer' adversary. For both models, the adversaries are placing themselves arbitrarily on the routes, keeping their placement fixed throughout the transmission block. This placement may or may not be known to the transmitter. The adversaries can choose their best modification strategy to increase the error at the legitimate receiver, subject to a maximum distortion constraint. We investigate...