Loading...
Search for: cut-sets
0.011 seconds

    An outer bound on the capacity region of Broadcast-Relay-Channel

    , Article IEEE International Symposium on Information Theory - Proceedings, 13 June 2010 through 18 June 2010, Austin, TX ; 2010 , Pages 599-603 ; 21578103 (ISSN) ; 9781424469604 (ISBN) Salehkalaibar, S ; Ghabeli, L ; Aref, M. R ; Sharif University of Technology
    2010
    Abstract
    In this paper, we obtain an outer bound on the capacity region of the Broadcast-Relay-Channel (BRC). BRC is a four node network with one source, one relay and two destinations. To the best of our knowledge, this work represents the first effort to find an outer bound on the capacity region of the BRC. In the proof, we jointly utilize the ideas of the outer bounds on the Broadcast Channel (BC) and also the cut-set bound. The proposed outer bound looks like the inner bound obtained by Kramer et. al for BRC  

    A novel approach to determine minimal tie-sets of complex network

    , Article IEEE Transactions on Reliability ; Volume 53, Issue 1 , 2004 , Pages 61-70 ; 00189529 (ISSN) Fotuhi Firuzabad, M ; Billinton, R ; Munian, T. S ; Vinayagam, B ; Sharif University of Technology
    2004
    Abstract
    Network reliability analysis is usually based on minimal path or cut enumeration from which the associated reliability expressions are deduced. The cut-set method is a popular approach in the reliability analysis of many systems from simple to complex configurations. The computational requirements necessary to determine the minimal cut-sets of a network depend mainly on the number of minimal paths between the source and the sink. A technique designated as the "Path Tracing Algorithm" is presented in this paper, which can handle both simple and complex networks, and considers both unidirectional and bi-directional branches. A step by step procedure is explained using a bridge-network. The... 

    Generalized meet in the middle cryptanalysis of block ciphers with an automated search algorithm

    , Article IEEE Access ; Volume 8 , 2020 , Pages 2284-2301 Ahmadi, S ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Meet in the middle (MITM) attack is one of the most important and applicable methods for cryptanalysis of block ciphers. In this paper, a more generalized method for MITM attack is considered. For this purpose, a notion, namely cut-set, is utilized by which several numbers of MITM attacks can be performed. However, manual investigation on these cases is time-consuming and sometimes not error-free. Therefore, a new search algorithm is also provided to obtain proper attacks in a timely manner. For examination, this new search algorithm, which could make an automated attack along with some certain ideas, is applied on HIGHT, Piccolo-128, CRAFT and AES-128 block ciphers. The least time... 

    Development Of a Software For Fault Tree Analysis By Modularization Method And Dynamic Classification Events with case study And Compared Results with the SAPHIRE Software

    , M.Sc. Thesis Sharif University of Technology Aslangir, Soleyman (Author) ; Ghofrani, Mohammad Bagher (Supervisor) ; Ebrahimi, Behrooz (Co-Advisor)
    Abstract
    Because of the Complexity in Calculating the Probability of Failure of the System, This Computation is Done by the Software Have Been Developed for this Purpose. Of Course, When We Use Them, We See That Each of Them Have Their Advantages and Disadvantages. One of the disadvantages that have been tried to be resolved over time, the type of programming and algorithm for calculation of it is the fault tree Because new techniques like modularization which have been designed in recent years, a significant improvement in accuracy and speed performance computing applications that use this method have been obtained.In This Thesis Has Developed Software That is Able to Calculate the Probability of... 

    New Automatic Meet in the Middle Cryptanalysis of Block Ciphers

    , Ph.D. Dissertation Sharif University of Technology Ahmadi, Siavash (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    Block ciphers are one of the most necessary primitives for security protocols, and so, cryptanalysis of them is also essential as well. On the other hand, the security assessment of block ciphers is usually manual work with various specific-idea according to the target block cipher type and algorithm. Some basic known methods for cryptanalysis of block ciphers include linear, differential, meet in the middle, and integral attacks. However, cryptanalysis methods are not limited to them, and many new hybrid or innovative methods are employed to provide better results. Recently, automated cryptanalysis of block ciphers and proposing new methods for analyzes of these ciphers are in the... 

    Beyond the cut-set bound: Uncertainty computations in network coding with correlated sources

    , Article IEEE Transactions on Information Theory ; Volume 59, Issue 9 , 2013 , Pages 5708-5722 ; 00189448 (ISSN) Gohari, A. A ; Yang, S ; Jaggi, S ; Sharif University of Technology
    2013
    Abstract
    Cut-set bounds are not, in general, tight for all classes of network communication problems. In this paper, we introduce a new technique for proving converses for the problem of transmission of correlated sources in networks, which results in bounds that are tighter than the corresponding cut-set bounds. We also define the concept of 'uncertainty region' which might be of independent interest. We provide a full characterization of this region for the case of two correlated random variables. The bounding technique works as follows: on one hand, we show that if the communication problem is solvable, the uncertainty of certain random variables in the network with respect to imaginary parties... 

    Beyond the cut-set bound: Uncertainty computations in network coding with correlated sources

    , Article IEEE International Symposium on Information Theory - Proceedings, 31 July 2011 through 5 August 2011 ; July , 2011 , Pages 598-602 ; 21578104 (ISSN) ; 9781457705953 (ISBN) Gohari, A. A ; Yang, S ; Jaggi, S ; Sharif University of Technology
    2011
    Abstract
    Cut-set bounds on achievable rates for network communication protocols are not in general tight. In this paper we introduce a new technique for proving converses for the problem of transmission of correlated sources in networks, that results in bounds that are tighter than the corresponding cut-set bounds. We also define the concept of "uncertainty region" which might be of independent interest. We provide a full characterization of this region for the case of two correlated random variables. The bounding technique works as follows: on one hand we show that if the communication problem is solvable, the uncertainty of certain random variables in the network with respect to imaginary parties... 

    On Körner-Marton's sum modulo two problem

    , Article IWCIT 2015 - Iran Workshop on Communication and Information Theory, 6 May 2015 through 7 May 2015 ; May , 2015 ; 9781479982356 (ISBN) Sefidgaran, M ; Gohari, A ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    In this paper we study the sum modulo two problem proposed by Körner and Marton. In this source coding problem, two transmitters who observe binary sources X and Y, send messages of limited rate to a receiver whose goal is to compute the sum modulo of X and Y. This problem has been solved for the two special cases of independent and symmetric sources. In both of these cases, the rate pair (H(X|Y), H(Y|X)) is achievable. The best known outer bound for this problem is a conventional cut-set bound, and the best known inner bound is derived by Ahlswede and Han using a combination of Slepian-Wolf and Körner-Marton's coding schemes. In this paper, we propose a new outer bound which is strictly... 

    Capacity of a class of symmetric relay networks with orthogonal components

    , Article IET Communications ; Volume 4, Issue 18 , 2010 , Pages 2181-2186 ; 17518628 (ISSN) Ghabeli, L ; Aref, M. R ; Sharif University of Technology
    2010
    Abstract
    In this study, the authors extend the concept of relay channel with orthogonal components to define a class of symmetric relay networks with orthogonal components named symmetric orthogonal relay network. In the defined network, the channels diverge from each node sender use different frequency bands whereas the channels converge to each node receiver use the same frequency band. This structure is very well understood in half-duplex transmission systems where the relays cannot send and receive at the same time or over the same frequency band. The authors show that the unicast capacity of the defined network is equal to the cut-set bound. In the achievability proof, the authors take advantage... 

    Overcoming drug resistance by co-targeting

    , Article Proceedings - 2010 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2010, 18 December 2010 through 21 December 2010 ; December , 2010 , Pages 198-202 ; 9781424483075 (ISBN) Ayati, M ; Taheri, G ; Arab, S ; Wong, L ; Eslahchi, C ; Sharif University of Technology
    2010
    Abstract
    Removal or suppression of key proteins in an essential pathway of a pathogen is expected to disrupt the pathway and prohibit the pathogen from performing a vital function. Thus disconnecting multiple essential pathways should disrupt the survival of a pathogen even when it has multiple pathways to drug resistance. We consider a scenario where the drug-resistance pathways are unknown. To disrupt these pathways, we consider a cut set S of G, where G is a connected simple graph representing the protein interaction network of the pathogen, so that G-S splits to two partitions such that the endpoints of each pathway are in different partitions. If the difference between the sizes of the two... 

    A lattice-based compress-and-forward strategy for Gaussian two-way relay channel with direct links

    , Article IEEE Wireless Communications Letters ; Volume 5, Issue 5 , 2016 , Pages 500-503 ; 21622337 (ISSN) Ghasemi Goojani, S ; Mardani, S ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    In this letter, the Gaussian two-way relay channel with direct links is investigated in which two users aim at exchanging their messages with the help of a relay node. We propose a new lattice-based compress-and-forward strategy and obtain its achievable rate-region. We show that the proposed scheme is superior to all previously known achievable schemes for channel gains larger than one. In particular, under the symmetric case, the proposed scheme is able to achieve a capacity region within 0.5 bit or (1/2)log 3 ≅ 0.79 bit, depending on the power of the relay  

    Impact of channel estimation errors and power allocation on analog network coding and routing in two-way relaying

    , Article IEEE Transactions on Vehicular Technology ; Volume 61, Issue 7 , May , 2012 , Pages 3223-3239 ; 00189545 (ISSN) Tabataba, F. S ; Sadeghi, P ; Hucher, C ; Pakravan, M. R ; Sharif University of Technology
    IEEE  2012
    Abstract
    In this paper, we study two important transmission strategies in full-duplex two-way relaying in the presence of channel estimation errors. In analog network coding (ANC), the relay transmits the combined signals that were received from both sources, with the aim of achieving better spectral efficiency. However, due to imperfect channel-state information (CSI), sources cannot perfectly cancel their own data in the relayed signal. We derive an achievable information rate for ANC in imperfect-CSI conditions and show how the ANC performance can significantly be degraded as a result. Moreover, we derive cut-set bounds with channel estimation errors for traditional routing (TR), in which time...