Loading...
Search for: generalisation
0.006 seconds

    Symmetrie relaying based on partial decoding and the capacity of a class of relay networks

    , Article IET Communications ; Volume 3, Issue 1 , 2009 , Pages 151-159 ; 17518628 (ISSN) Ghabeli, L ; Aref, M. R ; Sharif University of Technology
    2009
    Abstract
    Symmetric relaying is a method of relaying in which the relays can decode the message of other relays in the network in addition to the source message. In this paper an achievable rate is presented for a symmetric two-relay network based on partial decoding. The strategy make use of familiar techniques such as product binning, regular encoding/sliding window decoding and regular encoding/backward decoding. The proposed rate is shown to subsume the previously proposed rate for feed-forward relay network based on decode-and-forward. This rate is also used to establish the capacity of a generalisation of Aref network called 'semi-deterministic relay network with no interference at the relays'... 

    Achievable rate region for multiple-access-relay-networks

    , Article IET Communications ; Volume 4, Issue 15 , October , 2010 , Pages 1792-1798 ; 17518628 (ISSN) Salehkalaibar, S ; Ghabeli, L ; Aref, M. R ; Sharif University of Technology
    Abstract
    The authors introduce a generalisation of the multiple-access-relay-channel (MARC) called multiple-access-relay-network (MARN). The MARC model was first introduced by Kramer et al. and consists of many transmitters, one receiver and only one relay. In the MARN, there are many transmitters, many relays and one receiver. The authors obtained an achievable rate region for MARN by considering partial decode-and-forward (PDF) strategy at the relays. They showed that the region obtained using PDF strategy subsumes the region obtained by Kramer et al. for MARC. In the proposed coding scheme, the authors take advantage of PDF strategy based on regular encoding/backward decoding strategy. They also... 

    Union of low-rank subspaces detector

    , Article IET Signal Processing ; Volume 10, Issue 1 , 2016 , Pages 55-62 ; 17519675 (ISSN) Joneidi, M ; Ahmadi, P ; Sadeghi, M ; Rahnavard, N ; Sharif University of Technology
    Institution of Engineering and Technology 
    Abstract
    The problem of signal detection using a flexible and general model is considered. Owing to applicability and flexibility of sparse signal representation and approximation, it has attracted a lot of attention in many signal processing areas. In this study, the authors propose a new detection method based on sparse decomposition in a union of subspaces model. Their proposed detector uses a dictionary that can be interpreted as a bank of matched subspaces. This improves the performance of signal detection, as it is a generalisation for detectors. Low-rank assumption for the desired signals implies that the representations of these signals in terms of some proper bases would be sparse. Their... 

    A compiler for multi-key homomorphic signatures for Turing machines

    , Article Theoretical Computer Science ; Volume 889 , 2021 , Pages 145-170 ; 03043975 (ISSN) Dolatnezhad Samarin, S ; Fiore, D ; Venturi, D ; Amini, M ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    At SCN 2018, Fiore and Pagnin proposed a generic compiler (called “Matrioska”) allowing to transform sufficiently expressive single-key homomorphic signatures (SKHSs) into multi-key homomorphic signatures (MKHSs) under falsifiable assumptions in the standard model. Matrioska is designed for homomorphic signatures that support programs represented as circuits. The MKHS schemes obtained through Matrioska support the evaluation and verification of arbitrary circuits over data signed from multiple users, but they require the underlying SKHS scheme to work with circuits whose size is exponential in the number of users, and thus can only support a constant number of users. In this work, we propose... 

    On abelian and homomorphic secret sharing schemes

    , Article Journal of Cryptology ; Volume 34, Issue 4 , 2021 ; 09332790 (ISSN) Jafari, A ; Khazaei, S ; Sharif University of Technology
    Springer  2021
    Abstract
    Homomorphic (resp. abelian) secret sharing is a generalization of ubiquitous linear secret sharing in which the secret value and the shares are taken from finite (resp. abelian) groups instead of vector spaces over a finite field. Homomorphic secret sharing was first defined by Benaloh and, later in the early nineties, Frankel and Desmedt presented some relevant results. Except for a few other related topics such as black-box secret sharing and secret sharing over rings, the subject has remained dormant for about three decades. The study of homomorphic secret sharing is resumed in this paper and three main results are presented: (1) mixed-linear schemes, a subclass of abelian schemes to be... 

    Generalisation of code division multiple access systems and derivation of new bounds for the sum capacity

    , Article IET Communications ; Vol. 8, Issue. 2 , 2014 , Pages 153-162 ; ISSN: 17518628 Dashmiz, S ; Takapoui, M. R ; Moazeni, S ; Moharrami, M ; Abolhasani, M ; Marvasti, F ; Sharif University of Technology
    Abstract
    In this study, the authors explore a generalised scheme for the synchronous code division multiple access (CDMA). In this scheme, unlike the standard CDMA systems, each user has different codewords for communicating different messages. Two main problems are investigated. The first problem concerns whether uniquely detectable overloaded matrices (an injective matrix, i.e. the inputs and outputs are in one-to-one correspondence depending on the input alphabets) exist in the absence of additive noise, and if so, whether there are any practical optimum detectors for such input codewords. The second problem is about finding tight bounds for the sum channel capacity. In response to the first... 

    Approach to detector design for statistical multiple-input-multiple-output radars using multi-scan data

    , Article IET Radar, Sonar and Navigation ; Volume 11, Issue 4 , 2017 , Pages 664-674 ; 17518784 (ISSN) Sharify, S ; Nayebi, M. M ; Sharif University of Technology
    Institution of Engineering and Technology  2017
    Abstract
    This study considers the detector design and performance analysis in a statistical multiple-input-multiple-output radar. The authors studied this subject under some assumptions such as single point target, Swerling scattering models for radar cross-section and Gaussian interference. The target is assumed to move in a piecewise linear trajectory and multi-scan data is stored. So, the target cell may have changed during the time. A three-dimensional data signal space is generated that involved in observations from multiple scans, then a generalised likelihood ratio test detector is derived that employs consecutive observations in a central unit. Then a sub-optimum detector is introduced in... 

    Higher-Order quantified boolean satisfiability

    , Article 47th International Symposium on Mathematical Foundations of Computer Science, MFCS 2022, 22 August 2022 through 26 August 2022 ; Volume 241 , 2022 ; 18688969 (ISSN); 9783959772563 (ISBN) Chistikov, D ; Haase, C ; Hadizadeh, Z ; Mansutti, A ; Sharif University of Technology
    Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing  2022
    Abstract
    The Boolean satisfiability problem plays a central role in computational complexity and is often used as a starting point for showing NP lower bounds. Generalisations such as Succinct SAT, where a Boolean formula is succinctly represented as a Boolean circuit, have been studied in the literature in order to lift the Boolean satisfiability problem to higher complexity classes such as NEXP. While, in theory, iterating this approach yields complete problems for k-NEXP for all k > 0, using such iterations of Succinct SAT is at best tedious when it comes to proving lower bounds. The main contribution of this paper is to show that the Boolean satisfiability problem has another canonical... 

    A combination of deep learning and genetic algorithm for predicting the compressive strength of high-performance concrete

    , Article Structural Concrete ; Volume 23, Issue 4 , 2022 , Pages 2405-2418 ; 14644177 (ISSN) Ranjbar, I ; Toufigh, V ; Boroushaki, M ; Sharif University of Technology
    John Wiley and Sons Inc  2022
    Abstract
    This article presented an efficient deep learning technique to predict the compressive strength of high-performance concrete (HPC). This technique combined the convolutional neural network (CNN) and genetic algorithm (GA). Six CNN architectures were considered with different hyper-parameters. GA was employed to determine the optimum number of filters in each convolutional layer of the CNN architectures. The resulted CNN architectures were then compared to each other to find the best architecture in terms of accuracy and capability of generalization. It was shown that all of the proposed CNN models are capable of predicting the HPC compressive strength with high accuracy. Finally, the best of... 

    CSR marketing through social media and contextual effects on stakeholder engagement: a multinational cross-industry analysis

    , Article Information Systems Frontiers ; 2022 ; 13873326 (ISSN) Nasr, A. K ; Rashidirad, M ; Yoganathan, V ; Sadaghiani, A. S ; Sharif University of Technology
    Springer  2022
    Abstract
    Multinational Enterprises (MNEs) use social media to reach a global audience. Simultaneously, Corporate Social Responsibility (CSR) has become an important feature of MNEs’ communications with stakeholders via social media. It is, therefore, important to understand the country and industry level differences in how stakeholders engage with CSR communications of MNEs via social media. We examine this across four countries and three industries by focusing on stakeholders’ engagement with CSR (vs. non-CSR) posts on Twitter. We find significant differences across industries within countries for three separate aspects of behavioural engagement (likes, retweets and replies). In addition, CSR posts... 

    Free vibrations of functionally graded material cylindrical shell closed with two spherical caps

    , Article Ships and Offshore Structures ; Volume 17, Issue 4 , 2022 , Pages 939-951 ; 17445302 (ISSN) Bagheri, H ; Kiani, Y ; Bagheri, N ; Eslami, M. R ; Sharif University of Technology
    Taylor and Francis Ltd  2022
    Abstract
    Free vibration response of a cylindrical shell closed with two hemispherical caps at the ends (hermit capsule) is analysed in this research. It is assumed that the system of joined shell is made from functionally graded materials (FGM). Properties of the shells are assumed to be graded through the thickness. Cylindrical and hemispherical shells are unified in thickness. To capture the effects of through-the-thickness shear deformations and rotary inertias, first order theory of shells is used. Donnell type of kinematic assumptions are adopted to establish the general equations of motion and the associated boundary and continuity conditions with the aid of Hamilton's principle. The resulting... 

    Multi-objective minimum entropy controller design for stochastic processes

    , Article Proceedings of the 2010 American Control Conference, ACC 2010, 30 June 2010 through 2 July 2010 ; 2010 , Pages 355-360 ; 9781424474264 (ISBN) Afshar, P ; Nobakhti, A ; Wang, H ; Chai, T ; Sharif University of Technology
    Abstract
    Minimum variance control is an established method in control of systems corrupted by noise. In these cases, as it is not possible to directly control the actual value of the system variables, one aims to reduce the variations instead. However, when the system noises are non-Gaussian, this approach fails because non-Gaussian noise cannot be characterised by simple measures such as variance. In these cases, the Entropy is proposed as a generalisation of the variance measure and the control objective becomes that of minimising the Entropy. Previously a limited form of this problem has been solved using first order Newtonian methods. In this paper, the control objective is first expanded to also...