Loading...
Search for: point-to-point
0.007 seconds
Total 24 records

    Quantization based audio watermarking in a new transform domain

    , Article 2008 International Symposium on Telecommunications, IST 2008, Tehran, 27 August 2008 through 28 August 2008 ; October , 2008 , Pages 682-687 ; 9781424427512 (ISBN) Akhaee, M. A ; Nikooienejad, A ; Marvasti, F ; Sharif University of Technology
    2008
    Abstract
    In this paper, a novel blind watermarking technique based on quantization is proposed. Quantization is performed in a special domain which converts one dimensional signal to a 2-D one named Point to Point Graph (PPG). Basis of the method is on the separation of this domain into two portions; while, only one portion is quantized. Furthermore, in the dewatermarking procedure, by using the unquantized portion and zero norm, the embedded data can be extracted. The performance of the proposed method is analytically investigated and verified by simulation with artificial Gaussian signals. Experimental results over several audio signals shows the great robustness of the technique in comparison with... 

    Simulation of a channel with another channel

    , Article IEEE Transactions on Information Theory ; Volume 63, Issue 5 , 2017 , Pages 2659-2677 ; 00189448 (ISSN) Haddadpour, F ; Yassaee, M. H ; Beigi, S ; Gohari, A ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    In this paper, we study the problem of simulating a discrete memoryless channel (DMC) from another DMC under an average-case and an exact model. We present several achievability and infeasibility results, with tight characterizations in special cases. In particular, for the exact model, we fully characterize when a binary symmetric channel can be simulated from a binary erasure channel when there is no shared randomness. We also provide infeasibility and achievability results for the simulation of a binary channel from another binary channel in the case of no shared randomness. To do this, we use the properties of Rényi capacity of a given order. We also introduce a notion of 'channel... 

    When is it possible to simulate a DMC channel from another?

    , Article 2013 IEEE Information Theory Workshop, ITW 2013 ; Sept , 2013 , Page(s): 1 - 5 ; 9781479913237 (ISBN) Haddadpour, F ; Yassaee, M. H ; Aref, M. R ; Gohari, A
    2013
    Abstract
    In this paper, we study the problem of simulating a DMC channel from another DMC channel. We assume that the input to the channel we are simulating is i.i.d. and that the transmitter and receivers are provided with common randomness at limited rates. We prove bounds for simulating point-to-point, MAC and broadcast channels. As a special case, we recover the achievability part of the result of Cuff for point-to-point channel simulation via a noiseless link and shared randomness  

    Point-to-point connectivity prediction in porous media using percolation theory

    , Article Physica A: Statistical Mechanics and its Applications ; Volume 460 , 2016 , Pages 304-313 ; 03784371 (ISSN) Tavagh Mohammadi, B ; Masihi, M ; Ganjeh Ghazvini, M ; Sharif University of Technology
    Elsevier 
    Abstract
    The connectivity between two points in porous media is important for evaluating hydrocarbon recovery in underground reservoirs or toxic migration in waste disposal. For example, the connectivity between a producer and an injector in a hydrocarbon reservoir impact the fluid dispersion throughout the system. The conventional approach, flow simulation, is computationally very expensive and time consuming. Alternative method employs percolation theory. Classical percolation approach investigates the connectivity between two lines (representing the wells) in 2D cross sectional models whereas we look for the connectivity between two points (representing the wells) in 2D aerial models. In this... 

    A High-Performance and Low-Power Reconfigurable Network-on-Chip Architecture

    , Ph.D. Dissertation Sharif University of Technology Modarressi, Mehdi (Author) ; Sarbazi Azad, Hamid (Supervisor)
    Abstract
    Network-on-Chip (NoC) is a promising on-chip communication paradigm which targets the scalability and predictability problems of the traditional on-chip mechanisms. However, it has been shown that, in future technologies (especially 22 nm technology), the power consumption of the current NoCs is about 10 times higher than the power budget can be devoted to them. Application-specific optimization is one of the most effective approaches to bridge the exiting gap between the current and the ideal NoC power consumptions. However, almost all existing application-specific customization methods try to customize NoCs for... 

    A technique for deriving one-shot achievability results in network information theory

    , Article IEEE International Symposium on Information Theory - Proceedings ; 2013 , Pages 1287-1291 ; ISSN: 21578095 ; ISBN: 9781479904464 Yassaee, M. H ; Aref, M. R ; Gohari, A ; IEEE; IEEE Information Theory Society ; Sharif University of Technology
    2013
    Abstract
    This paper proposes a novel technique to prove a one-shot version of achievability results in network information theory. The technique is not based on covering and packing lemmas. In this technique, we use a stochastic encoder and decoder with a particular structure for coding that resembles both the ML and the joint-typicality coders. Although stochastic encoders and decoders do not usually enhance the capacity region, their use simplifies the analysis. The Jensen inequality lies at the heart of error analysis, which enables us to deal with the expectation of many terms coming from stochastic encoders and decoders at once. The technique is illustrated via four examples: point-to-point... 

    Task migration in mesh NOCs over virtual point-to-point connections

    , Article 19th International Euromicro Conference on Parallel, Distributed, and Network-Based Processing, PDP 2011, Ayia Napa, 9 February 2011 through 11 February 2011 ; 2011 , Pages 463-469 ; 9780769543284 (ISBN) Goodarzi, B ; Sarbazi Azad, H ; Sharif University of Technology
    Abstract
    Processor allocation in todays many core MPSoCs is a challenging task, especially since the order and requirements of incoming applications are unknown during design stage. To improve network performance, balance the workload across processing cores, or mitigate the effect of hot processing elements in thermal management methodologies, task migration is a method which has attracted much attention in recent years. Runtime task migration was first proposed in multicomputer with load balancing as the major objective. However, specific NoC properties such as limited amount of communication buffers, more sensitivity to implementation complexity, and tight latency and power consumption constraints... 

    Robust audio data hiding using correlated quantization with histogram-based detector

    , Article IEEE Transactions on Multimedia ; Volume 11, Issue 5 , 2009 , Pages 834-842 ; 15209210 (ISSN) Akhaee, M. A ; Saberian, M. J ; Feizi, S ; Marvasti, F ; Sharif University of Technology
    2009
    Abstract
    In this paper, two blind audio watermarking methods using correlated quantization for data embedding with histogram-based detector have been proposed. First, a novel mapping called the point-to-point graph (PPG) is introduced. In this mapping, the value of samples is important as well as the correlation among them. As this mapping increases the dimension of the signal, the data embedding procedure (quantization) will be diversified more securely than that of the 1-D domains such as the time or frequency domains. Hence, two watermarking techniques coined as hard and soft quantization methods based on the quantization of the PPG point radii are suggested. The performance of both techniques is... 

    Coding and decoding in a point-to-point communication using the polarization of the light beam

    , Article Applied Optics ; Volume 47, Issue 14 , 2008 , Pages 2680-2686 ; 1559128X (ISSN) Kavehvash, Z ; Massoumian, F ; Sharif University of Technology
    OSA - The Optical Society  2008
    Abstract
    A new technique for coding and decoding of optical signals through the use of polarization is described. In this technique the concept of coding is translated to polarization. In other words, coding is done in such a way that each code represents a unique polarization. This is done by implementing a binary pattern on a spatial light modulator in such a way that the reflected light has the required polarization. Decoding is done by the detection of the received beam's polarization. By linking the concept of coding to polarization we can use each of these concepts in measuring the other one, attaining some gains. In this paper the construction of a simple point-to-point communication where... 

    Virtual point-to-point connections for NoCs

    , Article IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ; Vol. 29, issue. 6 , 2010 , p. 855-868 ; ISSN: 02780070 Modarressi, M ; Tavakkol, A ; Sarbazi-Azad, H ; Sharif University of Technology
    Abstract
    In this paper, we aim to improve the performance and power metrics of packet-switched network-on-chips (NoCs) and benefits from the scalability and resource utilization advantages of NoCs and superior communication performance of point-to-point dedicated links. The proposed method sets up the virtual point-to-point (VIP) connections over one virtual channel (which bypasses the entire router pipeline) at each physical channel of the NoC. We present two schemes for constructing such VIP circuits. In the first scheme, the circuits are constructed for an application based on its task-graph at design time. The second scheme addresses constructing the connections at run-time using a light-weight... 

    On the capacity of level and type modulations in Molecular communication with ligand receptors

    , Article IEEE International Symposium on Information Theory - Proceedings, 14 June 2015 through 19 June 2015 ; Volume 2015-June , 2015 , Pages 1951-1955 ; 21578095 (ISSN) ; 9781467377041 (ISBN) Aminian, G ; Mirmohseni, M ; Nasiri Kenari, M ; Fekri, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    In this paper, we consider the bacterial point-to-point communication problem with one transmitter and one receiver by considering the ligand receptor binding process. The most commonly investigated signalling model, referred to as the Level Scenario (LS), uses one type of a molecule with different concentration levels for signaling. An alternative approach is to employ multiple types of molecules with a single concentration level, referred to as the Type Scenario (TS). We investigate the trade-offs between the two scenarios for the ligand receptor from the capacity point of view. For this purpose, we evaluate the capacity using numerical algorithms. Moreover, we derive an upper bound on the... 

    A distributed measurement system for internet delay estimation

    , Article 2010 IEEE International Instrumentation and Measurement Technology Conference, I2MTC 2010 - Proceedings, 3 May 2010 through 6 May 2010 ; May , 2010 , Pages 1556-1560 ; 9781424428335 (ISBN) Hariri, N ; Hariri, B ; Shirmohammadi, S ; Sharif University of Technology
    2010
    Abstract
    predicting the latency between hosts in the internet can play a significant rolein the improvement of the performance of many services that use latency distances among hosts as a decision making input. Although, the information regarding the point to point delay among internet peers is required in many applications, such information is not easily available to the peers. Latency data acquisition requires a considerableamount of measurements to be performed at each node in order for that node to keep a recordof its latency to all the other nodes. Moreover, the measurements need to be regularly repeated in order to be updatedagainst the network dynamics where the latency values are frequently... 

    Virtual point-to-point connections for NoCs

    , Article IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ; Volume 29, Issue 6 , May , 2010 , Pages 855-868 ; 02780070 (ISSN) Modarressi, M ; Tavakkol, A ; Sarbazi Azad, H ; Sharif University of Technology
    2010
    Abstract
    In this paper, we aim to improve the performance and power metrics of packet-switched network-on-chips (NoCs) and benefits from the scalability and resource utilization advantages of NoCs and superior communication performance of point-to-point dedicated links. The proposed method sets up the virtual point-to-point (VIP) connections over one virtual channel (which bypasses the entire router pipeline) at each physical channel of the NoC. We present two schemes for constructing such VIP circuits. In the first scheme, the circuits are constructed for an application based on its task-graph at design time. The second scheme addresses constructing the connections at run-time using a light-weight... 

    An opto-electrical NoC with traffic flow prediction in chip multiprocessors

    , Article Proceedings - 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2014 ; 2014 , Pages 440-443 Ghane, M ; Arjomand, M ; Sarbazi Azad, H ; Sharif University of Technology
    Abstract
    Network-on-Chip (NoC) paradigm has emerged as a revolutionary methodology to integrate numerous IP blocks on a single chip. The achievable performance of adopting NoCs is constrained by the performance limitation mainly imposed by the metal wires that are the physical realization of communication channels. According to the International Technology Roadmap for Semiconductors (ITRS) report, new interconnect paradigms providing huge bandwidth is in need for future products. The current wired channels have limited bandwidth, and consequently, they limit the performance enhancements that NoC architectures can provide. Optical interconnects are capable of achieving better performance via... 

    Independent control of multiple magnetic microrobots: design, dynamic modelling, and control

    , Article Journal of Micro-Bio Robotics ; Volume 16, Issue 2 , 27 June , 2020 , Pages 215-224 Khalesi, R ; Nejat Pishkenari, H ; Vossoughi, G ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2020
    Abstract
    Swimming microrobots have a variety of applications including drug delivery, sensing, and artificial fertilization. Their small size makes onboard actuation very hard, and therefore an external source such as the magnetic field is a practical way to steer and move the robot. In this paper, we have designed a novel microrobot steered by magnetic paddles. We have also discussed design parameters where, based on the conducted simulation, the robot speed reaches 520 um/s. It is shown that the microrobot speed depends on the robot paddle dimensions. According to the microrobots motion characteristics and their different reactions to the same input, we have designed a steering strategy for... 

    Supporting non-contiguous processor allocation in mesh-based chip multiprocessors using virtual point-to-point links

    , Article IET Computers and Digital Techniques ; Vol. 6, issue. 5 , September , 2012 , pp. 302-317 ; ISSN: 17518601 Asadinia, M ; Modarressi, M ; Sarbazi-Azad, H ; Sharif University of Technology
    Abstract
    In this study, the authors propose a processor allocation mechanism for run-time assignment of a set of communicating tasks of input applications onto the processing nodes of a chip multiprocessor, when the arrival order and execution lifetime of the input applications are not known a priori. This mechanism targets the on-chip communication and aims to reduce the power and latency of the network-on-chip employed as the communication infrastructure. In this work, the authors benefit from the advantages of non-contiguous processor allocation mechanisms, by allowing the tasks of the input application mapped onto disjoint regions (submeshes) and then virtually connecting them by bypassing the... 

    A Comparison between Virtual Private LAN Service (VPLS)and P2MP IP-only LAN Service (IPLS)

    , M.Sc. Thesis Sharif University of Technology Yousefi, Dariush (Author) ; Ajorloo, Hossein (Supervisor)
    Abstract
    Today Ethernet is the predominant technology for implementing Local Area Networks. Its privileges encourage service providers to extend Ethernet from Local Area Networks to Metropolitan Area Networks or even Wide Area Networks. Ethernet benefits such as low operational costs, well interoperability, plug-n-paly characteristic and rapid provisioning on demand make Ethernet ideal for Metropolitan Area Networks.But Ethernet by itself has some weakness like flat structure that makes it unfit for use in Metropolitan Area Networks. A suitable solution for taking advantages of Ethernet benefits in service provider network is using Ethernet in access network and applying multi-point to multi-point... 

    On deterministic approaches to attitude determination with magnometer in eclipse

    , Article 2010 Chinese Control and Decision Conference, CCDC 2010, 26 May 2010 through 28 May 2010, Xuzhou ; 2010 , Pages 3754-3759 ; 9781424451821 (ISBN) Moodi, H ; Bustan, D ; Sharif University of Technology
    2010
    Abstract
    A gyroless deterministic attitude determination algorithm based on simulation of sun in eclipse is stated in this paper and has been compared to stochastic filters like extended Kalman filter and unscented Kalman filter. Attitude determination with low cost sensors such as magnometer and sun sensor results in usage of recursive algorithms such as Kalman filter which has the probability of divergence, but with deterministic point to point algorithm such as the one introduced in this paper we can be sure to have an attitude determination with a fixed maximum error. Proposed method has been compared with Extended Kalman Filter and Unscented Kalman filter due to its modeling error, robustness... 

    Robust image data hiding using geometric mean quantization

    , Article GLOBECOM - IEEE Global Telecommunications Conference, 30 November 2009 through 4 December 2009, Honolulu, HI ; 2009 ; 9781424441488 (ISBN) Akhaee, M. A ; Ghaemmaghami, S ; Nikooienejad, A ; Marvasti, F ; Sharif University of Technology
    Abstract
    In this paper, a novel quantization based watermarking method is proposed. For blind detection, a set of nonlinear convex functions based on geometric mean are investigated. In order to achieve minimum distortion, the optimum function set is found. The algorithm is implemented on the approximation coefficients of wavelet transform for natural images. In order to make the algorithm more robust and imperceptible, a new transform domain called Point to Point Graph (PPG), which converts a 1-D signal to a 2-D one, has been used. The error probability of the proposed scheme is analytically investigated. Simulation results show that this algorithm has great robustness against common attacks such as... 

    Virtual point-to-point links in packet-switched NoCs

    , Article IEEE Computer Society Annual Symposium on VLSI: Trends in VLSI Technology and Design, ISVLSI 2008, Montpellier, 7 April 2008 through 9 April 2008 ; 2008 , Pages 433-436 ; 9780769531700 (ISBN) Modarressi, M ; Sarbazi Azad, H ; Tavakkol, A ; Sharif University of Technology
    2008
    Abstract
    A method to setup virtual point-to-point links between the cores of a packet-switched network-on-chip is presented in this paper which aims at reducing the NoC power consumption and delay. The router architecture proposed in this paper provides packet-switching, as well as a number of virtual point-to-point, or VIP (VIrtual Point-to-point) for short, connections. This is achieved by designating one virtual channel at each physical channel of a router to bypass the router pipeline. The mapping and routing algorithm exploits these virtual channels and tries to virtually connect the source and destination nodes of high-volume communication flows during task-graph mapping and route selection...