Loading...
Search for: encoding--symbols
0.005 seconds
Total 58 records

    Comment II on "Dense coding in entangled states"

    , Article Physical Review A - Atomic, Molecular, and Optical Physics ; Volume 68, Issue 1 , 2003 , Pages - ; 10502947 (ISSN) Akhavan, O ; Rezakhani, A. T ; Sharif University of Technology
    American Physical Society  2003

    A software-based error detection technique using encoded signatures

    , Article 2006 21st IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, Arlington, VA, 4 October 2006 through 6 October 2006 ; 2006 , Pages 389-397 ; 15505774 (ISSN); 076952706X (ISBN); 9780769527062 (ISBN) Sedaghat, Y ; Miremadi, S. G ; Fazeli, M ; Sharif University of Technology
    2006
    Abstract
    In this Paper, a software-based control flow checking technique called SWTES (Software-based error detection Technique using Encoded Signatures) is presented and evaluated. This technique is processor independent and can be applied to any kind of processors and microcontrollers. To implement this technique, the program is partitioned to a set of blocks and the encoded signatures are assigned during the compile time. In the run-time, the signatures are compared with the expected ones by a monitoring routine. The proposed technique is experimentally evaluated on an ATMEL MCS51 microcontroller using Software Implemented Fault Injection (SWIFI). The results show that this technique detects about... 

    Encoding the information in relative parameters

    , Article Physics Letters, Section A: General, Atomic and Solid State Physics ; Volume 407 , 2021 ; 03759601 (ISSN) Rezazadeh, F ; Mani, A ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    We investigate the problem of communicating three parameters in the absence of shared reference frame. We explore two methods in which the relative angles of spins are used to encode the parameters. In the first method we use three spins that carry the information in their relative angles while in the second method we use three disjoint spin-pairs and the information is sent through the relative angles of each individual pair. We show that in the first method, the information conveyed by each qubit is more than the second one, and that is while it requires fewer particles. © 2021 Elsevier B.V  

    GPH: A group-based partitioning scheme for reducing total power consumption of parallel buses

    , Article Microprocessors and Microsystems ; Volume 35, Issue 1 , 2011 , Pages 68-80 ; 01419331 (ISSN) Kamal, M ; Koohi, S ; Hessabi, S ; Sharif University of Technology
    2011
    Abstract
    Two main sources for power dissipation in parallel buses are data transitions on each wire and coupling between adjacent wires. So far, many techniques have been proposed for reducing the self and coupling powers. Most of these methods utilize one (or more) control bit(s) to manage the behavior of data transitions on the parallel bus. In this paper, we propose a new coding scheme, referred to as GPH, to reduce power dissipation of these control bits. GPH coding scheme employs partitioned Bus Invert and Odd Even Bus-Invert coding techniques. This method benefits from Particle Swarm Optimization (PSO) algorithm to efficiently partition the bus. In order to reduce self and coupling powers of... 

    Entanglement and optimal strings of qubits for memory channels

    , Article Physical Review A - Atomic, Molecular, and Optical Physics ; Volume 74, Issue 6 , 2006 ; 10502947 (ISSN) Karimipour, V ; Memarzadeh, L ; Sharif University of Technology
    2006
    Abstract
    We investigate the problem of enhancement of mutual information by encoding classical data into entangled input states of arbitrary length and show that while there is a threshold memory or correlation parameter beyond which entangled states outperform the separable states, resulting in a higher mutual information, this memory threshold increases toward unity as the length of the string increases. These observations imply that encoding classical data into entangled states may not enhance the classical capacity of quantum channels. © 2006 The American Physical Society  

    Zamin, an agent based artificial life model

    , Article Proceedings - HIS'04: 4th International Conference on Hybrid Intelligent Systems, Kitakyushu, 5 December 2004 through 8 December 2004 ; 2005 , Pages 160-165 ; 0769522912 (ISBN) Halavati, R ; Shouraki, S. B ; Zadeh, S. H ; Ziaie, P ; Lucas, C ; Ishikawa M ; Hashimoto S ; Paprzycki M ; Barakova E ; Yoshida K ; Koppen M ; Corne D.M ; Abraham A ; Sharif University of Technology
    2005
    Abstract
    Zamin artificial life model is designed to be a general purpose environment for researches on evolution of learning methods, living strategies and complex behaviors and is used in several studies thus far. As a main target for Zamin's design has been its expandability and ease of problem definition, a new agent based structure for this artificial world is introduced in this paper, which is believed to be much easier to use and extend. In this new model, all control and world running processes are done by agents. Therefore, any change in world processes does not require recoding the main engine and can be done just by altering the behavior of one or some agents. To have an easier interface... 

    New encoding methods for SAT-based temporal planning

    , Article ICAPS 2013 - Proceedings of the 23rd International Conference on Automated Planning and Scheduling ; June , 2013 , Pages 73-81 ; 9781577356097 (ISBN) Rankooh, M. F ; Ghassem Sani, G ; Feyzbakhsh Rankooh, M ; Sharif University of Technology
    2013
    Abstract
    Although satisfiability checking is known to be an effective approach in classical planning, it has scarcely been investigated in the field of temporal planning. Most notably, the usage of ∃-step semantics for encoding the problem into a SAT formula, while being demonstrably quite efficient for decreasing the size of the encodings in classical planning, has not yet been employed to tackle temporal planning problems. In this paper, we define temporal versions of classical ∀-step and ∃-step plans. We show that when the casual and temporal reasoning phases of a SAT-based temporal planner are separated, these semantics can be used to translate a given temporal planning problem into a SAT... 

    Lattice coding for multiple access channels with common message and additive interference

    , Article 2012 IEEE Information Theory Workshop, ITW 2012 ; 2012 , Pages 412-416 ; 9781467302234 (ISBN) Pourbabaee, M. F ; Emadi, M. J ; Davoodi, A. G ; Aref, M. R ; Sharif University of Technology
    2012
    Abstract
    In this paper, lattice based coding is used over two-user Gaussian state-dependent multiple access channel with common message for two channel models. First, it is assumed that the additive channel interference is noncausally known at both encoders. Exploiting a lattice encoding and decoding scheme, the effect of the interference is completely removed and the capacity region is achieved. Then, the multiple access channel with two additive interferences is considered in the case, where each interference is known noncausally to the associated transmitter. A pure lattice based encoding and decoding structure is proposed and an inner bound on the capacity region is derived which is valid for the... 

    Realizability of choreographies using Process algebra encodings

    , Article IEEE Transactions on Services Computing ; Volume 5, Issue 3 , 2012 , Pages 290-304 ; 19391374 (ISSN) Salaün, G ; Bultan, T ; Roohi, N ; Sharif University of Technology
    IEEE  2012
    Abstract
    Service-oriented computing has emerged as a new software development paradigm that enables implementation of Web accessible software systems that are composed of distributed services which interact with each other via exchanging messages. Modeling and analysis of interactions among services is a crucial problem in this domain. Interactions among a set of services that participate in a service composition can be described from a global point of view as a choreography. Choreographies can be specified using specification languages such as Web Services Choreography Description Language (WS-CDL) and visualized using graphical formalisms such as collaboration diagrams. In this paper, we present an... 

    ITSAT: An efficient SAT-based temporal planner

    , Article Journal of Artificial Intelligence Research ; Volume 53 , 2015 , Pages 541-632 ; 10769757 (ISSN) Rankooh, M. F ; Ghassem Sani, G ; Sharif University of Technology
    AI Access Foundation  2015
    Abstract
    Planning as satisfiability is known as an efficient approach to deal with many types of planning problems. However, this approach has not been competitive with the state-space based methods in temporal planning. This paper describes ITSAT as an efficient SAT-based (satisfiability based) temporal planner capable of temporally expressive planning. The novelty of ITSAT lies in the way it handles temporal constraints of given problems without getting involved in the difficulties of introducing continuous variables into the corresponding satisfiability problems. We also show how, as in SAT-based classical planning, carefully devised preprocessing and encoding schemata can considerably improve the... 

    Delay analysis of network coding in multicast networks with markovian arrival processes: a practical framework in cache-enabled networks

    , Article IEEE Transactions on Vehicular Technology ; Volume 67, Issue 8 , 2018 , Pages 7577-7584 ; 00189545 (ISSN) Rezaei, F ; Momeni, A ; Khalaj, B. H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    We develop an analytical framework for queueing and delay analysis in the case of a number of distinct flows arriving at a network node, where asynchronous partial network coding is applied for an efficient packet transmission. In order to perfectly model and analyze the practical communication networks, the arriving flows are assumed to be general Markovian arrival processes. As a key example, we apply the proposed model to the problem of coded caching in single bottleneck caching networks. In addition, we verify the accuracy of the proposed model through simulations and real trace-driven experiments. © 1967-2012 IEEE  

    Analyzing chor specifications by translation into FSP

    , Article Electronic Notes in Theoretical Computer Science ; Volume 255 , 2009 , Pages 159-176 ; 15710661 (ISSN) Roohi, N ; Salaun, G ; Mirian, H ; Sharif University of Technology
    2009
    Abstract
    A choreography specifies activities and interactions among a set of services from a global point of view. From this specification, local implementations or peers can be automatically generated. Generation of peers that precisely implement the choreography specification is not always possible: this problem is known as realizability. This paper presents an encoding of the Chor choreography calculus into the FSP process algebra. This encoding allows to: (i) validate and verify Chor specifications using the FSP toolbox (LTSA), (ii) generate peer protocols from its choreography specified in Chor, (iii) test for realizability of the Chor specification, and (iv) generate Java code from FSP for... 

    Optimal exploitation of the resource in remote state preparation

    , Article Physical Review A ; Volume 102, Issue 1 , 15 July , 2020 Nikaeen, M ; Ramezani, M ; Bahrampour, A ; Sharif University of Technology
    American Physical Society  2020
    Abstract
    Transmission efficiency (TE) of remote state preparation (RSP) with a shared quantum state and one bit of classical communication is considered. Following Dakić et al. [Nat. Phys. 8, 666 (2012)10.1038/nphys2377], the encoding and decoding operators of the protocol are restricted to the physically relevant classes of projective measurements and unitary operators, respectively. It is shown that contrary to the previous arguments, the quadratic fidelity as well as the linear fidelity could be a valid figure of merit to quantify the TE of RSP. Then, the TE of the protocol in terms of both linear and quadratic fidelities is evaluated in a fully optimized scenario which includes the maximization... 

    Fundamental limits of distributed encoding

    , Article 2020 IEEE International Symposium on Information Theory, ISIT 2020, 21 July 2020 through 26 July 2020 ; Volume 2020-June , August , 2020 , Pages 798-803 Abadi Khooshemehr, N ; Maddah Ali, M. A ; IEEE Information Theory Society; The Institute of Electrical and Electronics Engineers ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    In general coding theory, we often assume that error is observed in transferring or storing encoded symbols, while the process of encoding itself is error-free. Motivated by recent applications of coding theory, we introduce the problem of distributed encoding which is comprised of a set of K ϵ isolated source nodes and N ϵ encoding nodes. Each source node has one symbol from a finite field, which is sent to each of the encoding nodes. Each encoding node stores an encoded symbol from the same field, as a function of the received symbols. However, some of the source nodes are controlled by the adversary and may send different symbols to different encoding nodes. Depending on the number of... 

    Content-based video coding for distance learning

    , Article ISSPIT 2007 - 2007 IEEE International Symposium on Signal Processing and Information Technology, Cairo, 15 December 2007 through 18 December 2007 ; 2007 , Pages 1005-1010 ; 9781424418350 (ISBN) Bagheri, M ; Lotfi, T ; Darabi, A. A ; Kasaei, S ; Sharif University of Technology
    2007
    Abstract
    This paper presents a novel video encoding method for cooperative Educational Dissemination Systems. Taking into consideration the inherent characteristics of distance learning video streams, existing a few moving objects in the scene and objects having slow motions, we propose a novel content-based video encoding method which is very efficient on low bandwidth channels. In the encoding process, we apply a background subtraction algorithm for motion segmentation with a novel statistical background modeling. In each frame, the moving objects are extrapolated with rectangular bounding boxes which are the only data send over the low bandwidth channel. In the decoding process, we propose a new... 

    Efficient fully format compliant selective scrambling methods for compressed video streams

    , Article Advanced International Conference on Telecommunications andInternational Conference on Internet and Web Applications and Services, AICT/ICIW'06, Guadelope, 19 February 2006 through 25 February 2006 ; Volume 2006 , 2006 , Pages 42- ; 0769525229 (ISBN); 9780769525228 (ISBN) Kiaei, M. S ; Ghaemmaghami, S ; Khazaei, S ; Sharif University of Technology
    2006
    Abstract
    Format compliance, a desirable feature of multimedia security systems, means that the secured bitstream resembles the unprotected compressed bitstream. It is called full format compliance, if the scrambled stream can be decoded by a typical decoder. In this paper, we address the issues that are to be carefully taken into account to develop efficient fully format compliant scrambling methods for compressed video. We also propose new selective scrambling methods for securing compressed video streams. The security issues, in different parts of these scrambling methods, are analyzed and their impact on bit-rate and complexity is discussed. We show that our scrambling methods provide... 

    A new approach to persian/arabic text steganography

    , Article 5th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2006. In conjunction with 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse, COMSAR 2006, Honolulu, HI, 10 July 2006 through 12 July 2006 ; Volume 2006 , 2006 , Pages 310-315 ; 0769526136 (ISBN); 9780769526133 (ISBN) Shirali Shahreza, M. H ; Shirali Shahreza, M ; Sharif University of Technology
    2006
    Abstract
    Conveying information secretly and establishing hidden relationship has been of interest since long past. Text documents have been widely used since very long time ago. Therefore, we have witnessed different method of hiding information in texts (text steganography) since past to the present. In this paper we introduce a new approach for steganography in Persian and Arabic texts. Considering the existence of too many points in Persian and Arabic phrases, in this approach, by vertical displacement of the points, we hide information in the texts. This approach can be categorized under feature coding methods. This method can be used for Persian/Arabic Watermarking. Our method has been... 

    Fundamental limits of distributed linear encoding

    , Article IEEE Transactions on Information Theory ; Volume 67, Issue 12 , 2021 , Pages 7985-7998 ; 00189448 (ISSN) Khooshemehr, N. A ; Maddah Ali, M. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    In general coding theory, we often assume that error is observed in transferring or storing encoded symbols, while the process of encoding itself is error-free. Motivated by recent applications of coding theory, in this paper, we consider the case where the process of encoding is distributed and prone to error. We introduce the problem of distributed encoding, comprised of a set of K ∈ N isolated source nodes and N ∈ N encoding nodes. Each source node has one symbol from a finite field, which is sent to each of the encoding nodes. Each encoding node stores an encoded symbol from the same field, as a function of the received symbols. However, some of the source nodes are controlled by the... 

    Using satisfiability for non-optimal temporal planning

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 7519 Lnai , 2012 , Pages 176-188 ; 03029743 (ISSN) ; 9783642333521 (ISBN) Rankooh, M. F ; Mahjoob, A ; Ghassem-Sani, G ; Sharif University of Technology
    Springer  2012
    Abstract
    AI planning is one of the research fields that has benefited from employing satisfiability checking methods. These methods have been proved to be very effective in finding optimal plans for both classical and temporal planning. It is also known that by using planning-based heuristic information in solving SAT formulae, one can develop SAT-based planners that are competitive with state-of-the-art non-optimal planners in classical planning domains. However, using satisfiability for non-optimal temporal planning has not been investigated so far. The main difficulty in using satisfiability in temporal planning is the representation of time, which is a continuous concept. Previously introduced... 

    2PLoc: Preserving privacy in location-based services

    , Article Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust, 20 August 2010 through 22 August 2010 ; August , 2010 , Pages 707-712 ; 9780769542119 (ISBN) Amoli, A. S ; Kharrazi, M ; Jalili, R ; Sharif University of Technology
    2010
    Abstract
    Location-based services are becoming popular for mobile users. The mobile users' location plays a key role to provide the service from one side, but it can be considered as a dimension of their privacy and so necessary to keep it anonymous to the other parties. Since one important issue is to achieve an accurate service, it is important to use the mobile's accurate location. Using the location accurately raises some concerns on behalf of the user's privacy. One solution for meeting this requirement is using tickets by the means of a third party. The tickets should have some properties for not letting a mobile user to cheat and use the ticket more than one time. This paper proposes a protocol...