Search for: multiple-access-channels
Total 38 records
Article Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, 17 December 2010 through 19 December 2010, Beijing ; 2010 , Pages 998-1001 ; 9781424469406 (ISBN) ; Salimi, S ; Salmasizadeh, M ; Sharif University of Technology
Two-user Multiple Access Channel with a Wire- Tapper (MAC-WT) is considered. A general outer bound for the secrecy capacity region is given. Also, we have defined the Deterministic MAC-WT, where the channel input of each user is a deterministic function of the channel output and the channel input of the other user. For this network single-letter inner and outer bounds for the secrecy capacity region are given. Furthermore, it is shown that in the Deterministic MAC-WT, if the wiretapper channel is a degraded version of the main channel, inner and outer bounds meet and the secrecy capacity region is characterized
Article 2018 IEEE Information Theory Workshop, ITW 2018, 25 November 2018 through 29 November 2018 ; 2019 ; 9781538635995 (ISBN) ; Maddah Ali, M. A ; Motahari, S. A ; Sun Yat-Sen University ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc 2019
Genome-Wide Association Study (GWAS) addresses the problem of associating subsequences of individuals' genomes to the observable characteristics called phenotypes. In a genome of length G, it is observed that each characteristic is only related to a specific subsequence of it with length L, called the causal subsequence. The objective is to recover the causal subsequence, using a dataset of N individuals' genomes and their observed characteristics. Recently, the problem has been investigated from an information theoretic point of view in . It has been shown that there is a threshold effect for reliable learning of the causal subsequence at Gh ( N L/G ) by characterizing the capacity of...
Article IEEE Journal on Selected Areas in Communications ; Volume 31, Issue 9 , 2013 , Pages 1765-1778 ; 07338716 (ISSN) ; Skoglund, M ; Golic, J. D ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
A secret key agreement framework involving three users is considered in which each of the users 1 and 2 intends to share a secret key with user 3 and users 1 and 2 are eavesdroppers with respect to each other. There is a generalized discrete memoryless multiple access channel (GDMMAC) from users 1 and 2 to user 3 where the three users receive outputs from the channel. Furthermore, there is a feedback channel from user 3 to users 1 and 2 through which user 3 sends information extracted from the received output from the GDMMAC to increase the key rates. We consider both noiseless and noisy feedback. In the case of noiseless feedback, a public channel of unlimited capacity from user 3 to users...
Article IEEE International Symposium on Information Theory - Proceedings, 31 July 2011 through 5 August 2011 ; August , 2011 , Pages 1970-1974 ; 21578104 (ISSN) ; 9781457705953 (ISBN) ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
In this paper, the effect of using an insecure and noiseless feedback channel in increasing secret key rates is investigated. There is a generalized discrete memoryless multiple access channel (GDMMAC) between two transmitters and a receiver where, in addition to the receiver, both of the transmitters receive noisy channel outputs. Furthermore, an insecure and noiseless feedback channel exists from the receiver to the transmitters. Each of the transmitters intends to share a secret key with the receiver while keeping it concealed from the other transmitter. For this setup, an inner bound of the secret key capacity region is derived. For some special cases, the secret key capacity region is...
Article IEEE Transactions on Signal Processing ; Volume 58, Issue 4 , 2010 , Pages 2436-2441 ; 1053587X (ISSN) ; Alajaji, F ; Linder, T ; Sharif University of Technology
We study the estimation of a Gaussian source by a Gaussian wireless sensor network (WSN) where L distributed sensors transmit noisy observations of the source through a fading Gaussian multiple access channel to a fusion center. In a recent work Gastpar, [ "Uncoded transmission is exactly optimal for a Simple Gaussian Sensor Network", IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 52475251, Nov. 2008] showed that for a symmetric Gaussian WSN with no fading, uncoded (analog) transmission achieves the optimal performance theoretically attainable (OPTA). In this correspondence, we consider an asymmetric fading WSN in which the sensors have differing noise and transmission powers. We first...
Article IEEE Communications Letters ; Volume 20, Issue 12 , 2016 , Pages 2450-2453 ; 10897798 (ISSN) ; Behroozi, H ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc 2016
In this letter, we study the joint source-channel coding problem of communicating the linear functions of correlated Gaussian sources over a Gaussian multiple access channel. In this setup, each transmitter observes one of two correlated sources. The receiver aims to reconstruct a linear combination of both correlated Gaussian sources within an average distortion level. For this setup, we first obtain a new lower bound on the achievable distortion and then, we propose a novel lattice-based hybrid transmission scheme and its achievable distortion is derived. We show that our proposed scheme can achieve the optimal distortion under some conditions
Article IEEE Transactions on Information Forensics and Security ; Volume 11, Issue 6 , 2016 , Pages 1239-1251 ; 15566013 (ISSN) ; Akhbari, B ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
In this paper, we study the problem of secret communication over a compound Multiple Access Channel (MAC). In this channel, we assume that one of the transmitted messages is confidential, which is only decoded by its corresponding receiver and kept secret from the other receiver. We call this proposed setting the compound MAC with a confidential message. For this model, we derive general inner and outer bounds for both imperfect and perfect secrecy conditions for the second receiver. Also, as examples, we investigate less noisy and Gaussian versions of this channel, and extend the results of the discrete memoryless version to these cases. Moreover, providing numerical examples for the...
Article IEEE Communications Letters ; Volume 21, Issue 7 , 2017 , Pages 1457-1460 ; 10897798 (ISSN) ; Behroozi, H ; Khalaj, B. H ; Sharif University of Technology
In this letter, we consider two problems of sending a bivariate Gaussian source through a two-user Gaussian non-orthogonal multiple-access channel. We provide a new distortion outer bound for the considered joint source-channel coding problems, which significantly reduces the gap between inner and outer bounds of the distortion for correlation coefficients below a threshold. Furthermore, numerical results show, that under some conditions, our proposed outer bound matches with the inner bound obtained via the separate source-channel coding scheme, which proves the optimality of this scheme. © 1997-2012 IEEE
Article IWCIT 2014 - Iran Workshop on Communication and Information Theory ; May , 2014 ; 978-1-4799-4878-9 ; Khormuji, M. N ; Skoglund, M ; Aref, M. R ; Sharif University of Technology
We consider a two-user state-dependent generalized multiple access channel (GMAC) with correlated channel state information (CSI). It is assumed that the CSI is partially known at each encoder noncausally. We first present an achievable rate region using multi-layer Gelfand-Pinsker coding with partial state and message cooperation between the encoders. We then specialize our result to a Gaussian GMAC with additive interferences that are known partially at each encoder. We show that the proposed scheme can remove the common part known at both encoders and also mitigate a significant part of the independent interference via state cooperation when the feedback links are strong. Thus, the...
Article IET Communications ; Volume 6, Issue 13 , 2012 , Pages 1857-1867 ; 17518628 (ISSN) ; Zamanighomi, M ; Aref, M. R ; Sharif University of Technology
In this study, a two-user discrete memoryless multiple-access channel with two correlated states known non-causally at the corresponding encoder is considered. Each encoder transmits a message independent of the other encoder's and tries to cooperate with it. To consider cooperative encoders, it is assumed that each encoder strictly-causally receives and finds out the other encoder's transmitted signals and tries to cooperate with the other encoder by transmitting its message. A special case is also studied in which the common part of the states is known at the both encoders, resulting in a larger rate region. For these two scenarios, achievable rate regions are derived using a combination...
Article 2011 IEEE Information Theory Workshop, ITW 2011 ; 2011 , Pages 628-632 ; 9781457704376 (ISBN) ; Emadi, M. J ; Chaharsooghi, F. S ; Aref, M. R ; Sharif University of Technology
In this paper, a two-user discrete memoryless multiple-access channel (DM-MAC) with correlated channel states, each known at one of the encoders is considered, in which each encoder transmits independent messages and tries to cooperate with the other one. To consider cooperating encoders, it is assumed that each encoder strictly-causally receives and learns the other encoder's transmitted symbols and tries to cooperate with the other encoder by transmitting its message. Next, we study this channel in a special case; we assume that the common part of both states is known at both, hence encoders use this opportunity to get better rate region. For these scenarios, an achievable rate region is...
Article 2014 IEEE International Conference on Communications, ICC 2014 ; 10-14 June 2014 , 2014 , Pages 1922-1927 ; ISBN: 9781479920037 ; Akhbari, B ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
In this paper, we study the problem of secret communication over a Compound Multiple Access Channel (MAC). In this channel, we assume that one of the transmitted messages is confidential that is only decoded by its corresponding receiver and kept secret from the other receiver. For this proposed setting (compound MAC with confidential messages), we derive general inner and outer bounds on the secrecy capacity region. Also, as examples, we investigate 'Less noisy' and 'Gaussian' versions of this channel, and extend the results of the discrete memoryless version to these cases. Moreover, providing numerical examples for the Gaussian case, we illustrate the comparison between achievable rate...
Article IET Communications ; Vol. 8, issue. 8 , 2014 , p. 1296-1308 ; Khormuji, M. N ; Skoglund, M ; Aref, M. R ; Sharif University of Technology
The authors study a two-user state-dependent generalised multiple-access channel (GMAC) with correlated states. It is assumed that each encoder has 'non-causal' access to channel state information (CSI). They develop an achievable rate region by employing rate-splitting, block Markov encoding, Gelfand-Pinsker multicoding, superposition coding and joint typicality decoding. In the proposed scheme, the encoders use a partial decoding strategy to collaborate in the next block, and the receiver uses a backward decoding strategy with joint unique decoding at each stage. The author's achievable rate region includes several previously known regions proposed in the literature for different scenarios...
Article 2013 Iran Workshop on Communication and Information Theory ; 2013 ; 9781467350235 (ISBN) ; Khormuji, M. N ; Skoglund, M ; Aref, M. R ; Sharif University of Technology
We study a two-user state-dependent generalized multiple-access channel (GMAC) with correlated states. It is assumed that each encoder noncausally knows partial channel state information. We develop an achievable rate region by employing rate-splitting, block Markov encoding, Gelfand-Pinsker multicoding, superposition coding and jointly typical decoding. In the proposed scheme, the encoders use a partial decoding strategy to collaborate in the next block, and the receiver uses a backward decoding strategy with a joint unique decoding at each stage. Our achievable rate region includes several previously known rate regions proposed in the literature for different scenarios of multiple-access...
Article 2012 Swedish Communication Technologies Workshop, Swe-CTW 2012 ; 2012 , Pages 48-52 ; 9781467347631 (ISBN) ; Khormuji, M. N ; Skoglund, M ; Aref, M. R ; Sharif University of Technology
The two-user discrete memoryless state-dependent multiple-access channel with cooperating encoders is considered. It is assumed that the channel is controlled with two independent states such that each of the channel state information is noncausally available at one encoder. Moreover, based on the intrinsic characteristic of wireless networks, it is assumed that each encoder strictly causally receive a noisy version of the transmitted signal of the other encoder. Hence, the encoders can cooperate in transmitting the message to the receiver. An achievable rate region for the channel is derived by use of rate splitting, block Markov encoding and Gelfand-Pinsker multilevel encoding along with...
Article 2012 IEEE Information Theory Workshop, ITW 2012 ; 2012 , Pages 412-416 ; 9781467302234 (ISBN) ; Emadi, M. J ; Davoodi, A. G ; Aref, M. R ; Sharif University of Technology
In this paper, lattice based coding is used over two-user Gaussian state-dependent multiple access channel with common message for two channel models. First, it is assumed that the additive channel interference is noncausally known at both encoders. Exploiting a lattice encoding and decoding scheme, the effect of the interference is completely removed and the capacity region is achieved. Then, the multiple access channel with two additive interferences is considered in the case, where each interference is known noncausally to the associated transmitter. A pure lattice based encoding and decoding structure is proposed and an inner bound on the capacity region is derived which is valid for the...
Article 12th Canadian Workshop on Information Theory, CWIT 2011, 17 May 2011 through 20 May 2011 ; May , 2011 , Pages 178-181 ; 9781457707438 (ISBN) ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
In this paper, we analyze the capacity region of a communication network where a Multiple Access Channel (MAC) and a point-to-point channel share a same medium and interfere with each other, where the transmitter of the point-to-point channel has cognitive capabilities. We introduce Multiple Access-Cognitive Interference Channel (MA-CIFC), with a two-user MAC as a primary network and a cognitive transmitter-receiver pair in which the cognitive transmitter knows the message being sent by all of the transmitters in a non-causal manner. We obtain an inner bound on the capacity region of MA-CIFC and derive two sets of strong interference conditions under which we establish the capacity regions....
Article IET Communications ; Volume 10, Issue 1 , 2016 , Pages 98-110 ; 17518628 (ISSN) ; Akhbari, B ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
Institution of Engineering and Technology
The authors study the problem of secret communication over a multiple-access channel with a common message. Here, the authors assume that two transmitters have confidential messages, which must be kept secret from the wiretapper (the second receiver), and both of them have access to a common message which can be decoded by the two receivers. The authors call this setting as multiple-access wiretap channel with common message (MAWC-CM). For this setting, the authors derive general inner and outer bounds on the secrecy capacity region for the discrete memoryless case and show that these bounds meet each other for a special case called the switch channel. As well, for a Gaussian version of...
Article IEEE Transactions on Communications ; Volume 68, Issue 2 , 2020 , Pages 987-997 ; Karamzade, A ; Mirzaeifard, R ; Motahari, S. A ; Manzuri Shalmani, M. T ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc 2020
A central machine is interested in estimating the underlying structure of a sparse Gaussian Graphical Model (GGM) from a dataset distributed across multiple local machines. The local machines can communicate with the central machine through a wireless multiple access channel. In this paper, we are interested in designing effective strategies where reliable learning is feasible under power and bandwidth limitations. Two approaches are proposed: Signs and Uncoded methods. In the Signs method, the local machines quantize their data into binary vectors and an optimal channel coding scheme is used to reliably send the vectors to the central machine where the structure is learned from the received...
Article 2008 International Symposium on Information Theory and its Applications, ISITA2008, Auckland, 7 December 2008 through 10 December 2008 ; April , 2008 ; 9781424420698 (ISBN) ; Aref, M. R ; Commemorative Organization for the Japan World; Exposition('70); Support Center for Advanced Telecommunications; Technology Research; REFEC Research Foundation for the; Electrotechnology of Chubu ; Sharif University of Technology
Capacity has been found for degraded, reversely degraded, full feedback, semi-deterministic, orthogonal relay channels, also for a class of deterministic relay channels and a class of modulo sum relay channels. We indicate what the relay decodes and forwards with one auxiliary random variable having bounded cardinality and attempt to define a more general class of relay channels in order to unify most of known capacity theorems into one capacity theorem by considering additional assumptions imposed to the definition of those channels. In other words, the relay channel inputs are dependent as in multiple access channel with arbitrarily correlated sources and here we do for the relay channel...