Loading...
Search for: communication-channels--information-theory
0.011 seconds
Total 149 records

    Compound multiple access channel with confidential messages

    , Article 2014 IEEE International Conference on Communications, ICC 2014 ; 10-14 June 2014 , 2014 , Pages 1922-1927 ; ISBN: 9781479920037 Zivari Fard, H ; Akhbari, B ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
    Abstract
    In this paper, we study the problem of secret communication over a Compound Multiple Access Channel (MAC). In this channel, we assume that one of the transmitted messages is confidential that is only decoded by its corresponding receiver and kept secret from the other receiver. For this proposed setting (compound MAC with confidential messages), we derive general inner and outer bounds on the secrecy capacity region. Also, as examples, we investigate 'Less noisy' and 'Gaussian' versions of this channel, and extend the results of the discrete memoryless version to these cases. Moreover, providing numerical examples for the Gaussian case, we illustrate the comparison between achievable rate... 

    Multiple access channel with common message and secrecy constraint

    , Article IET Communications ; Volume 10, Issue 1 , 2016 , Pages 98-110 ; 17518628 (ISSN) Zivari Fard, H ; Akhbari, B ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
    Institution of Engineering and Technology 
    Abstract
    The authors study the problem of secret communication over a multiple-access channel with a common message. Here, the authors assume that two transmitters have confidential messages, which must be kept secret from the wiretapper (the second receiver), and both of them have access to a common message which can be decoded by the two receivers. The authors call this setting as multiple-access wiretap channel with common message (MAWC-CM). For this setting, the authors derive general inner and outer bounds on the secrecy capacity region for the discrete memoryless case and show that these bounds meet each other for a special case called the switch channel. As well, for a Gaussian version of... 

    Imperfect and Perfect Secrecy in Compound Multiple Access Channel with Confidential Message

    , Article IEEE Transactions on Information Forensics and Security ; Volume 11, Issue 6 , 2016 , Pages 1239-1251 ; 15566013 (ISSN) Zivari Fard, H ; Akhbari, B ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    In this paper, we study the problem of secret communication over a compound Multiple Access Channel (MAC). In this channel, we assume that one of the transmitted messages is confidential, which is only decoded by its corresponding receiver and kept secret from the other receiver. We call this proposed setting the compound MAC with a confidential message. For this model, we derive general inner and outer bounds for both imperfect and perfect secrecy conditions for the second receiver. Also, as examples, we investigate less noisy and Gaussian versions of this channel, and extend the results of the discrete memoryless version to these cases. Moreover, providing numerical examples for the... 

    Bit error probability analysis of UWB communications with a relay node

    , Article IEEE Transactions on Wireless Communications ; Volume 9, Issue 2 , 2010 , Pages 802-813 ; 15361276 (ISSN) Zeinalpour Yazdi, Z ; Nasiri Kenari, M ; Aazhang, B ; Sharif University of Technology
    2010
    Abstract
    In this paper, the extension of cooperative communication to the context of TH-UWB is investigated. In particular, the average bit error probability (BEP) is provided for cooperative TH-UWB systems with decode-and-forward relaying protocol. In the considered relay network, UWB links among the nodes are modeled according to IEEE 802.15.4a standards. Our methodology is based on computing the Characteristic Function (CF) of the decision variable at the destination terminal. We use Gaussian quadrature numerical method to approximate the CF of interference component appeared in decision variable term. This technique permits to predict the system performance in different IEEE 802.15.4a defined... 

    BER derivation for UWB communication with a relay node in the presence of inter-channel interference

    , Article 2009 IEEE 3rd International Symposium on Advanced Networks and Telecommunication Systems, ANTS 2009, 14 December 2009 through 16 December 2009, New Delhi ; 2009 ; 9781424459896 (ISBN) Zeinalpour Yazdi, Z ; Nasiri Kenari, M ; Aazhang, B ; Sharif University of Technology
    Abstract
    In this paper, we present the average bit error probability (BEP) of a decode-and-forward relay network employing UWB links, developed by IEEE 802.15.4a standards, between its nodes. Our methodology is based on computing the Characteristic Function (CF) of the decision variable at the destination terminal. Numerical results show that significant improvement in the BEP of impulse radio UWB system is obtained by adding a relay node. The analytical expressions are also validated by computer simulations which confirm the accuracy of the approximations used in obtaining the BEP  

    Compressed sensing block MAP-LMS adaptive filter for sparse channel estimation and a Bayesian Cramer-Rao bound

    , Article Machine Learning for Signal Processing XIX - Proceedings of the 2009 IEEE Signal Processing Society Workshop, MLSP 2009, 2 September 2009 through 4 September 2009 ; 2009 ; 9781424449484 (ISBN) Zayyani, H ; Babaie Zadeh, M ; Jutten, C ; Sharif University of Technology
    Abstract
    This paper suggests to use a Block MAP-LMS (BMAP-LMS) adaptive filter instead of an Adaptive Filter called MAP-LMS for estimating the sparse channels. Moreover to faster convergence than MAP-LMS, this block-based adaptive filter enables us to use a compressed sensing version of it which exploits the sparsity of the channel outputs to reduce the sampling rate of the received signal and to alleviate the complexity of the BMAP-LMS. Our simulations show that our proposed algorithm has faster convergence and less final MSE than MAP-LMS, while it is more complex than MAP-LMS. Moreover, some lower bounds for sparse channel estimation is discussed. Specially, a Cramer-Rao bound and a Bayesian... 

    A new nonlinear controller for active power filters

    , Article 2009 International Conference on Electric Power and Energy Conversion Systems, EPECS 2009, 10 November 2009 through 12 November 2009 ; 2009 ; 9789948427155 (ISBN) Zadkhast, S ; Mokhtari, H ; Sharif University of Technology
    Abstract
    Linear controllers have been widely used for controlling Active Power Filters (APFs). However, due to their limitations, a tradeoff between the bandwidth of the current control loop (CCL) and the voltage control loop (VCL) need to be made to remain stable in all conditions. This tradeoff leads to imperfect usage of the APF's capacity. Nonlinear controllers can eliminate such limitations and simultaneously remain stable in all conditions. In this paper, a new nonlinear controller for controlling the output current and the DC voltage (Vdc) of an APF is proposed. Feedback linearization method is applied on the CCL and the VCL is controlled via indirect method. In this method, an auxiliary... 

    Performance analysis of lattice-reduction algorithms for a novel LR-compatible K-Best MIMO detector

    , Article Proceedings - IEEE International Symposium on Circuits and Systems ; 2011 , Pages 701-704 ; 02714310 (ISSN) ; 9781424494736 (ISBN) Youssef, A ; Shabany, M ; Gulak, P. G ; Sharif University of Technology
    Abstract
    Lattice Reduction (LR) has been proposed as a method to enhance the performance of MIMO detectors such as ZF, MMSE and V-BLAST. Until recently, the application of LR to the superior K-Best tree-search detection algorithm was not practical due to the significant increase in complexity of K-Best as a result of the distortion of tree symmetry caused by LR. However, in our recently published work we developed an innovative K-Best algorithm to accommodate tree-asymmetry with no additional complexity. In this work, we build on this result and perform a detailed analysis of the effect of various LR algorithms on the performance of LR-aided K-Best. We show that LLL and Seysen provide equivalent... 

    Binary fading interference channel with no CSIT

    , Article IEEE Transactions on Information Theory ; Volume 63, Issue 6 , 2017 , Pages 3565-3578 ; 00189448 (ISSN) Vahid, A ; Maddah Ali, M. A ; Avestimehr, A. S ; Zhu, Y ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    We study the capacity region of the two-user binary fading (or erasure) interference channel, where the transmitters have no knowledge of the channel state information. We develop new inner bounds and outer bounds for this problem. We identify three regimes based on the channel parameters: weak, moderate, and strong interference regimes. Interestingly, this is similar to the generalized degrees of freedom of the two-user Gaussian interference channel, where transmitters have perfect channel knowledge. We show that for the weak interference regime, treating interference as erasure is optimal while for the strong interference regime, decoding interference is optimal. For the moderate... 

    A polynomial algorithm for partitioning problems

    , Article Transactions on Embedded Computing Systems ; Volume 9, Issue 4 , 2010 ; 15399087 (ISSN) Tahaee, S. A ; Jahangir, A. H ; Sharif University of Technology
    2010
    Abstract
    This article takes a theoretical approach to focus on the algorithmic properties of hardware/software partitioning. It proposes a method with polynomial complexity to find the global optimum of an NP-hard model partitioning problem for 75% of occurrences under some practical conditions. The global optimum is approached with a lower bound distance for the remaining 25%. Furthermore, this approach ensures finding the 2-approximate of the global optimum partition in 97% of instances where technical assumptions exist. The strategy is based on intelligently changing the parameters of the polynomial model of the partitioning problem to force it to produce (or approach) the exact solution to the... 

    Efficient secure channel coding based on quasi-cyclic low-density parity-check codes

    , Article IET Communications ; Volume 3, Issue 2 , 2009 , Pages 279-292 ; 17518628 (ISSN) Sobhi Afshar, A. A ; Eghlidos, T ; Aref, M. R ; Sharif University of Technology
    2009
    Abstract
    A secure channel coding (joint encryption-channel coding) scheme provides both data security and reliability in one combined process to achieve faster processing and/or more efficient implementation. The issue of using quasi-cyclic low-density parity-check (QC-LDPC) codes in a symmetric-key secure channel coding scheme is addressed. A set of this class of LDPC codes has recently been recommended by the NASA Goddard Space Flight Center for near-earth and deep-space communications. The proposed scheme provides an efficient error performance, an acceptable level of security and a low-complexity practicable implementation. The results indicate that the proposed scheme can efficiently employ... 

    A fuzzy sliding mode control approach for nonlinear chemical processes

    , Article Control Engineering Practice ; Volume 17, Issue 5 , 2009 , Pages 541-550 ; 09670661 (ISSN) Shahraz, A ; Bozorgmehry Boozarjomehry, R ; Sharif University of Technology
    2009
    Abstract
    Fuzzy sliding mode control (FSMC) as a robust and intelligent nonlinear control technique is proposed to control processes with severe nonlinearity and unknown models. The performance of the proposed method has been evaluated for both single input single output (SISO) and MIMO nonlinear systems through its application in three severely nonlinear processes that are frequently used as benchmarks of nonlinear process control strategies. The evaluation shows that, despite its lack of dependence on the process model, the proposed method performs almost the same as conventional sliding mode control alternatives that utilize all the information that exists in the mathematical model of the process.... 

    A distortion outer bound for communicating correlated gaussian sources over a gaussian MAC

    , Article IEEE Communications Letters ; Volume 21, Issue 7 , 2017 , Pages 1457-1460 ; 10897798 (ISSN) Setayesh, M ; Behroozi, H ; Khalaj, B. H ; Sharif University of Technology
    Abstract
    In this letter, we consider two problems of sending a bivariate Gaussian source through a two-user Gaussian non-orthogonal multiple-access channel. We provide a new distortion outer bound for the considered joint source-channel coding problems, which significantly reduces the gap between inner and outer bounds of the distortion for correlation coefficients below a threshold. Furthermore, numerical results show, that under some conditions, our proposed outer bound matches with the inner bound obtained via the separate source-channel coding scheme, which proves the optimality of this scheme. © 1997-2012 IEEE  

    On distributed transmission of remote correlated Gaussian sources over an orthogonal Gaussian multiple-access channel

    , Article 2016 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 245-250 ; 9781509034345 (ISBN) Setayesh, M ; Behroozi, H ; Khalaj, B. H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    In this paper, we consider the problem of sending a bivariate correlated Gaussian source through a two-user Gaussian orthogonal multiple-access channel (MAC), where each encoder observes a noisy version of one of the source components, and the receiver aims at reconstructing each source component. The estimation quality is measured by mean-squared error (MSE) distortion criterion. Different components of the source have their own fidelity requirements instead of total or average distortion measure. It is easy to verify that for this problem, digital communication has an optimal performance. However, it is not explicit that when there is a constraint on the total power budget, what power... 

    On Körner-Marton's sum modulo two problem

    , Article IWCIT 2015 - Iran Workshop on Communication and Information Theory, 6 May 2015 through 7 May 2015 ; May , 2015 ; 9781479982356 (ISBN) Sefidgaran, M ; Gohari, A ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    In this paper we study the sum modulo two problem proposed by Körner and Marton. In this source coding problem, two transmitters who observe binary sources X and Y, send messages of limited rate to a receiver whose goal is to compute the sum modulo of X and Y. This problem has been solved for the two special cases of independent and symmetric sources. In both of these cases, the rate pair (H(X|Y), H(Y|X)) is achievable. The best known outer bound for this problem is a conventional cut-set bound, and the best known inner bound is derived by Ahlswede and Han using a combination of Slepian-Wolf and Körner-Marton's coding schemes. In this paper, we propose a new outer bound which is strictly... 

    Sensitivity of the secrecy capacity of a wiretap channel to the channel gains with imperfect channel information

    , Article IWCIT 2017 - Iran Workshop on Communication and Information Theory, 3 May 2017 through 4 May 2017 ; 2017 ; 9781509047833 (ISBN) Sedighizad, M ; Bafghi, H. G ; Seyfe, B ; Sharif University of Technology
    Abstract
    In this paper, the impact of a small variations in the channel gains on the secrecy rate of the wiretap channel is studied, in which it is assumed that the imperfect channel knowledge is available at the transmitter. First, we consider general additive noise model for both legitimate and eavesdropper channels in the wiretap channel, and compute the variation of the secrecy rate resulting from the small variations in the channel gains. Then, we focus on the Gaussian wiretap channel, as a special case and calculate the sensitivity of the secrecy capacity to the channel gains with imperfect channel knowledge. Interestingly, it is shown that in some situations the effect of the channel variation... 

    On optimum asymptotic multiuser efficiency of randomly spread CDMA

    , Article IEEE Transactions on Information Theory ; Volume 61, Issue 12 , 2015 , Pages 6635-6642 ; 00189448 (ISSN) Sedaghat, M. A ; Müller, R. R ; Marvasti, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    We extend the result by Tse and Verdú on the optimum asymptotic multiuser efficiency of randomly spread code division multiple access (CDMA) with binary phase shift keying input. Random Gaussian and random binary antipodal spreading are considered. We obtain the optimum asymptotic multiuser efficiency of a K-user system with spreading gain N when K and N → ∞ and the loading factor, (K/N) , grows logarithmically with K under some conditions. It is shown that the optimum detector in a Gaussian randomly spread CDMA system has a performance close to the single user system at high signal-to-noise ratio when K and N → ∞ and the loading factor, (K/N), is kept less than (log3 K/2). Random binary... 

    One-third probability embedding: less detectable LSB steganography

    , Article Proceedings - 2009 IEEE International Conference on Multimedia and Expo, ICME 2009, 28 June 2009 through 3 July 2009, New York, NY ; 2009 , Pages 1002-1005 ; 9781424442911 (ISBN) Sarreshtedari, S ; Ghotbi, M ; Ghaemmaghami, S ; Institute of Electrical and Electronics Engineers; Circuits and Systems Society; Communications Society; Signal Processing Society ; Sharif University of Technology
    2009
    Abstract
    This paper introduces a new method for the least significant bit (LSB) steganography in spatial domain. The new method, called one-third LSB embedding, reduces the probability of change per pixel to one-third without sacrificing the embedding capacity, as compared to previous LSB steganography techniques. This improvement results in a better imperceptibility and higher robustness against well known LSB detectors. Each bit of the message is carried through a function of three adjacent cover pixels and it is shown that no significant improvement is achieved by increasing the length of the pixel sequence employed. ©2009 IEEE  

    Analytic modeling of channel traffic in n-cubes

    , Article 1st International Computer Science Symposium in Russia, CSR 2006, St. Petersburg, 8 June 2006 through 12 June 2006 ; Volume 3967 LNCS , 2006 , Pages 567-579 ; 03029743 (ISSN) Sarbazi Azad, H ; Mahini, H ; Patooghy, A ; Sharif University of Technology
    Springer Verlag  2006
    Abstract
    Many studies have shown that the imbalance of network channel traffic is of critical effect on the overall performance of multicomputer systems. In this paper, we analytically model the traffic rate crossing the network channels of a hypercube network under different working conditions. The effect of different parameters on the shaping of non-uniformity and traffic imbalance over network channels, are considered and analytical models for each case are proposed. © Springer-Verlag Berlin Heidelberg 2006  

    Estimation of nonlinear dynamic systems over communication channels

    , Article IEEE Transactions on Automatic Control ; Volume 63, Issue 9 , 2018 , Pages 3024-3031 ; 00189286 (ISSN) Sanjaroon, V ; Farhadi, A ; Motahari, A. S ; Khalaj, B. H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Remote observation of the state trajectory of nonlinear dynamic systems over limited capacity communication channels is studied. It is shown that two extreme cases are possible: Either the system is fully observable or the error in estimation blows up. The key observation is that such behavior is determined by the relationship between the Shannon capacity and the Lyapunov exponents; the well-known characterizing parameters of a communication channel on one side, and a dynamic system from the other side. In particular, it is proved that for nonlinear systems with initial state x0, the minimum capacity of an additive white Gaussian noise channel required for full observation of the system in...