Loading...
Search for: source-coding
0.012 seconds
Total 32 records

    Joint Disrtibuted Source and Network Coding

    , M.Sc. Thesis Sharif University of Technology Etemadi Tajbakhsh, Shahriar (Author) ; Movaghar Rahimabadi, Ali (Supervisor)
    Abstract
    Network coding, as a novel technique, suggests that the intermediate nodes of a network can combine independent flows to optimize the usage of a shared communication channel. Also, distributed source coding, exploits the joint statistics of correlated information sources to reduce the volume of transmitted information. Surprisingly, it has been shown that linear network codes are able to compress correlated sources. In this project, we have focused on this problem, i.e. joint distributed source and network coding. We have two important contributions with different directions. First we give a practical design for joint coding. Second, we use an evolutionary approach to find the best placement... 

    Automated Release Note Generation

    , Ph.D. Dissertation Sharif University of Technology Izadi, Maliheh (Author) ; Heydarnoori, Abbas (Supervisor)
    Abstract
    As one of the most important software artifacts, release reports include most essential changes of software systems in each release. These reports are useful for documenting team activities, improving communication between team members and facilitating decision makings. They are often generated manually by a team member, which can be a tedious and time-consuming task. For each release, one should go through hundreds of issue reports, changed files, source code, and other related documents to determine what has changed and why. Then they need to identify the most important and relevant changes. Therefore, automated generation of release reports can be highly desirable. Despite the... 

    Joint SourceChannel Coding in Video Transmission Using Deep Learning

    , M.Sc. Thesis Sharif University of Technology Ghayoumi Ghamsari, Moein (Author) ; Behroozi, Hamid (Supervisor) ; Hossein Khalaj, Babak (Supervisor)
    Abstract
    In the signal transmission cycle in a telecommunication network, there are two coding blocks, which can be realized in two ways. In the traditional way, source coding is first used to remove redundancies and compress information. Then, channel coding is used to transmit on the telecommunication channel and deal with noise and other destructive factors of the channel. In other words, source coding and channel coding are done separately. In contrast, signal transmission can be done by joint source¬channel coding. According to Shannon separation theorem and with the fulfillment of the conditions mentioned in the theorem, the method of separation of source and channel coding in a point to point... 

    Evaluating the Rate of Compressibility of Sparse Stochastic Processes

    , M.Sc. Thesis Sharif University of Technology Ghourchian, Hamid (Author) ; Amini, Arash (Supervisor) ; Aminzadeh Gohari, Amin (Supervisor)
    Abstract
    In most stochastic models with uncountable cardinality of sample space with non-trivial probability measures, the inherent information is infinite. The continuous-valued random variables and continuous-domain random processes are among such objects. Therefore, a fidelity criterion must be defined between the stochastic subject and its estimated version. Although there are some criteria for of stochastic continuous signals, based on quantizing the signal in both time and amplitude domains, we are going to define a criterion which is for stochastic processes in bounded time domain. Next, the criterion will be expressed in general sources perspective and the optimum rate of coding will be... 

    Capacity and Security of Cooperative Information Systems with Correlated Sources

    , Ph.D. Dissertation Sharif University of Technology Salehkalaibar, Sadaf (Author) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    The main problem in network information theory is how to send some sources in a network with multiple transmitters and receivers, in the presence of the noise and the interference.This problem is not solved in its general form and it needs source coding and channel coding. With the increase of users in a network, the secrecy becomes a challenging issue. The information-theoretic security is independent of the computational complexity.In this thesis, we investigate the transmission of correlated sources over information theoretic networks and study secrecy constraints in these networks. First, we study the secrecy of a one-receiver, two-eavesdropper broadcast channel with three degraded... 

    Source Coding with Polar Codes

    , M.Sc. Thesis Sharif University of Technology Eghbalian Arani, Sajjad (Author) ; Behroozi, Hamid (Supervisor)
    Abstract
    Polar codes were introduced by Arikan in 2009. These codes are the first family of codes that with low encoding complexity and successive cancellation decoder, can achieve the channel capacity. Polar codes, at first were implemented for channel coding, but in 2010 performance of these codes in binary and q-ary alphabet source was studied. It is shown that these codes can perform efficiently in channel coding and source coding. On the other hand, one of the most important continuous sources are Gaussian sources. Due to the importance of Gaussian sources and good performance of polar codes, we try to evaluate the performance of these codes in Gaussian sources. Note that, these codes have... 

    An Investigation on Entanglement and Its Applications in Quantum Communication Protocols

    , M.Sc. Thesis Sharif University of Technology Noshad, Morteza (Author) ; Aref, Mohammad Reza (Supervisor) ; Aminzadeh Gohari, Amin (Co-Advisor)
    Abstract
    In this thesis, we propose a new method for deriving the achievability results in quantum information theoretic problems. The calssical quan- tum decoupling lemma is an essential component in our method. Assume that each classical source is randomly binned at a finite rate. We find sufficient conditions on these rates such that the bin indices are nearly mutually independent of each other and of a quantum source Qn. Us- ing this theorem in conjunction with the calssical quantum Slepian Wolf (CQSW) result, this method suggest a new comprehensive framework for the achievability of network quantum information theoretic prob- lems. We’ve used the new method to redrive the Holevo bound, private... 

    Analysis of Universal Coding Algorithms for Some Special Classes of Information Sources

    , M.Sc. Thesis Sharif University of Technology Nangir, Mahdi (Author) ; Aref, Mohammad Reza (Supervisor) ; Behroozi, Hamid (Supervisor)
    Abstract
    The coding and compression of information sources with special probability distribution is the center of concentration of researchers in this field in the last decades. In this dissertation, after a concise introduction to source coding, we focus on the universal source coding and data compression from an algorithmic and information theoretic point of view. First we introduce the fundamental concepts of source coding and data compression. Then, we analysis some algorithms on integer coding and verify their universality and asymptotically optimality. Usually statistics of information sources is not available in communication systems and storage devices, so that applying universal source... 

    Secrecy Rates in Wiretap Channels

    , Ph.D. Dissertation Sharif University of Technology Salimi, Somayeh (Author) ; Salmasizadeh, Mahmoud (Supervisor) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    Security has been considered from the information theoretic point of view in different channels such as broadcast, multiple access and relay channels. Due to application of these channels in modern networks such as wireless, sensor and Ad-hoc networks, information theoretic security arguments especially wiretapping, has major significance in these networks. With regard to necessity of confidentiality protection in modern telecommunication services, security from the information theoretic point of view should be considered as well as capacity and achievable rate region considerations in these networks. In this thesis, first, a survey of basic works in the subjects of secrecy capacity and... 

    Exploiting Applications and Improving Performance of Polar Codes in Information Theory

    , M.Sc. Thesis Sharif University of Technology Khatami, Mehrdad (Author) ; Marvasti, Farrokh (Supervisor)
    Abstract
    The two central topics of information theory are the compression and the transmission of data. Shannon, in his seminal work, formalized both these problems and determined their fundamental limits. Since then the main goal of coding theory has been to find practical schemes that approach these limits.Polar codes, recently invented by Arıkan, are the first practical codes that are known to achieve the capacity for a large class of channels. Their code construction is based on a phenomenon called “channel polarization”.
    Since the performance of polar code degrades when the block length is small, several kinds of Reed – Solomon concatenation is considered in order to improve the... 

    On the reliable transmission of correlated sources over two-relay network

    , Article 2013 IEEE Information Theory Workshop, ITW 2013 ; 2013 ; 9781479913237 (ISBN) Nasiraee, M ; Akhbari, B ; Ahmadian-Attari, M ; Aref, M. R ; Sharif University of Technology
    2013
    Abstract
    In this paper, we investigate reliable transmission of three correlated discrete memoryless sources over a two-relay network. In our considered model, one of the sources is available at the sender whereas, the other two sources are known to the first and the second relay. We present both joint and separate source-channel coding schemes, and derive the corresponding sets of sufficient conditions for reliable sources transmission. The manner of cooperation in both schemes is Decode-and-Forward strategy. In the joint approach, we generalize the correlation preserving mapping technique to our model using nested backward decoding. Our proposed separate approach is based on Slepian-Wolf source... 

    On the performance of polar codes for lossy compression of Gaussian sources

    , Article 2013 Iran Workshop on Communication and Information Theory, IWCIT 2013 ; 2013 ; 9781467350235 (ISBN) Eghbalian Arani, S ; Behroozi, H ; Sharif University of Technology
    2013
    Abstract
    In this work, we study the lossy source coding of a Gaussian source with polar codes. We show through two distributions on discrete alphabet, quantized approach as well as Central Limit Theorem (CLT) approach, when the alphabet size grows to infinity, polar codes can achieve the rate distortion bound for a Gaussian source. By comparing the rate of convergence on two distributions, we show that the quantized approach have a better convergence rate than the CLT approach  

    On source transmission over some classes of relay channels

    , Article IEEE International Symposium on Information Theory - Proceedings ; 2012 , Pages 1942-1946 ; 9781467325790 (ISBN) Salehkalaibar, S ; Aref, M. R ; Sharif University of Technology
    IEEE  2012
    Abstract
    We study the reliable transmission of correlated sources over the relay channel. One of the sources is available at the sender while the other one is known to the relay. The receiver wishes to reconstruct both sources. We find necessary and sufficient conditions for optimal separation of source and channel codes. The coding scheme is based on the combination of the Slepian-Wolf source coding and Partial Decode-and-Forward (PDF) strategy. In this scheme, the relay partially decodes the message transmitted by the sender. We also consider the semi-deterministic relay channel where the output at the relay is a deterministic function of inputs from the sender and the relay. For the transmission... 

    On the duality of additivity and tensorization

    , Article IEEE International Symposium on Information Theory - Proceedings, 14 June 2015 through 19 June 2015 ; Volume 2015-June , 2015 , Pages 2381-2385 ; 21578095 (ISSN) ; 9781467377041 (ISBN) Beigi, S ; Gohari, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    A function is said to be additive if, similar to mutual information, expands by a factor of n, when evaluated on n i.i.d. repetitions of a source or channel. On the other hand, a function is said to satisfy the tensorization property if it remains unchanged when evaluated on i.i.d. repetitions. Additive rate regions are of fundamental importance in network information theory, serving as capacity regions or upper bounds thereof. Tensorizing measures of correlation have also found applications in distributed source and channel coding problems as well as the distribution simulation problem. Prior to our work only two measures of correlation, namely the hypercontractivity ribbon and maximal... 

    On Körner-Marton's sum modulo two problem

    , Article IWCIT 2015 - Iran Workshop on Communication and Information Theory, 6 May 2015 through 7 May 2015 ; May , 2015 ; 9781479982356 (ISBN) Sefidgaran, M ; Gohari, A ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    In this paper we study the sum modulo two problem proposed by Körner and Marton. In this source coding problem, two transmitters who observe binary sources X and Y, send messages of limited rate to a receiver whose goal is to compute the sum modulo of X and Y. This problem has been solved for the two special cases of independent and symmetric sources. In both of these cases, the rate pair (H(X|Y), H(Y|X)) is achievable. The best known outer bound for this problem is a conventional cut-set bound, and the best known inner bound is derived by Ahlswede and Han using a combination of Slepian-Wolf and Körner-Marton's coding schemes. In this paper, we propose a new outer bound which is strictly... 

    Generalised secure distributed source coding with side information

    , Article IET Communications ; Volume 4, Issue 18 , 2010 , Pages 2262-2272 ; 17518628 (ISSN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2010
    Abstract
    New inner and outer bounds on the achievable compression-equivocation rate region for generalised secure data compression with side information are given that do not match in general. In this setup, two senders, Alice and Charlie intend to transmit information to Bob via channels with limited capacity so that he can reliably reconstruct their observations. The eavesdropper, Eve, has access to one of the channels at each instant and is interested in the source of the same channel at the time. Bob and Eve also have their own observations, which are correlated with Alice's and Charlie's observations. In this model, two equivocation and compression rates are defined with respect to the sources... 

    A new approach for distributed image coding in wireless sensor networks

    , Article Proceedings - IEEE Symposium on Computers and Communications, 22 June 2010 through 25 June 2010, Riccione ; June , 2010 , Pages 563-566 ; 15301346 (ISSN) ; 9781424477555 (ISBN) Jamali, M ; Zokaei, S ; Rabiee, H. R ; Sharif University of Technology
    2010
    Abstract
    Power and bandwidth constraints are two major challenges in wireless sensor networks. Since a considerable amount of energy in sensor networks is consumed for data transmission, compression techniques may prolong the life of such networks. Moreover, with fewer bits to transmit, the network can cope better with the problem of inadequate bandwidth. In this paper, we consider an image sensor network and propose a paradigm based on the principles of Distributed Source Coding (DSC) for efficient compression. Our method relies on high correlation between the sensor nodes. The algorithm consists of two phases: the Training Phase and the Main Phase. In the Training Phase an aggregation node or a... 

    Multimedia multicast based on multiterminal source coding

    , Article IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences ; Volume E93-A, Issue 9 , 2010 , Pages 1639-1649 ; 09168508 (ISSN) Aghagolzadeh, A ; Nooshyar, M ; Rabiee, H. R ; Mikaili, E ; Sharif University of Technology
    2010
    Abstract
    Multimedia multicast with two servers based on the mul- titerminal source coding is studied in some previous researches. Due to the possibility of providing an approach for practical code design for more than two correlated sources in IMTSC/CEO setup, in this paper, the framework of Slepian-Wolf coded quantization is extended and a practical code design is presented for IMTSC/CEO with the number of encoders greater than two. Then the multicast system based on the IMTSC/CEO is applied to the cases with three, four and five servers. Since the underlying code design approach for the IMTSC/CEO problem has the capability of applying to an arbitrary number of active encoders, the proposed MMBMSC... 

    Code design for IMTSC/CEO problem using multilevel Slepian-Wolf coded quantization framework

    , Article Proceedings - 2010 18th Iranian Conference on Electrical Engineering, ICEE 2010, 11 May 2010 through 13 May 2010 ; 2010 , Pages 282-287 ; 9781424467600 (ISBN) Nooshyar, M ; Aghagolzadeh, A ; Rabiee, H. R ; Sharif University of Technology
    Abstract
    The aim of this paper is introducing coding scheme that can potentially achieve the sum rate-distortion bound of Gaussian IMTSC/CEO problem with arbitrary number of encoders. No previous work has been reported on code design for the IMTSC/CEO problem with the number of encoders greater than two. In this paper the framework of Slepian-Wolf coded quantization is extended to the case with the number of encoders greater than two. On the other hand, we apply the approach to the case of unequal levels of the observation noise at the encoders. Encoding process consists of trellis coded quantization (TCQ) and LDPC codes. The proposed framework can be easily used for any number of active encoders... 

    On the optimal performance in asymmetric gaussian wireless sensor networks with fading

    , Article IEEE Transactions on Signal Processing ; Volume 58, Issue 4 , 2010 , Pages 2436-2441 ; 1053587X (ISSN) Behroozi, H ; Alajaji, F ; Linder, T ; Sharif University of Technology
    2010
    Abstract
    We study the estimation of a Gaussian source by a Gaussian wireless sensor network (WSN) where L distributed sensors transmit noisy observations of the source through a fading Gaussian multiple access channel to a fusion center. In a recent work Gastpar, [ "Uncoded transmission is exactly optimal for a Simple Gaussian Sensor Network", IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 52475251, Nov. 2008] showed that for a symmetric Gaussian WSN with no fading, uncoded (analog) transmission achieves the optimal performance theoretically attainable (OPTA). In this correspondence, we consider an asymmetric fading WSN in which the sensors have differing noise and transmission powers. We first...