Loading...
Search for: source-coding
0.012 seconds
Total 32 records

    On the reliable transmission of correlated sources over two-relay network

    , Article 2013 IEEE Information Theory Workshop, ITW 2013 ; 2013 ; 9781479913237 (ISBN) Nasiraee, M ; Akhbari, B ; Ahmadian-Attari, M ; Aref, M. R ; Sharif University of Technology
    2013
    Abstract
    In this paper, we investigate reliable transmission of three correlated discrete memoryless sources over a two-relay network. In our considered model, one of the sources is available at the sender whereas, the other two sources are known to the first and the second relay. We present both joint and separate source-channel coding schemes, and derive the corresponding sets of sufficient conditions for reliable sources transmission. The manner of cooperation in both schemes is Decode-and-Forward strategy. In the joint approach, we generalize the correlation preserving mapping technique to our model using nested backward decoding. Our proposed separate approach is based on Slepian-Wolf source... 

    On the performance of polar codes for lossy compression of Gaussian sources

    , Article 2013 Iran Workshop on Communication and Information Theory, IWCIT 2013 ; 2013 ; 9781467350235 (ISBN) Eghbalian Arani, S ; Behroozi, H ; Sharif University of Technology
    2013
    Abstract
    In this work, we study the lossy source coding of a Gaussian source with polar codes. We show through two distributions on discrete alphabet, quantized approach as well as Central Limit Theorem (CLT) approach, when the alphabet size grows to infinity, polar codes can achieve the rate distortion bound for a Gaussian source. By comparing the rate of convergence on two distributions, we show that the quantized approach have a better convergence rate than the CLT approach  

    On source transmission over some classes of relay channels

    , Article IEEE International Symposium on Information Theory - Proceedings ; 2012 , Pages 1942-1946 ; 9781467325790 (ISBN) Salehkalaibar, S ; Aref, M. R ; Sharif University of Technology
    IEEE  2012
    Abstract
    We study the reliable transmission of correlated sources over the relay channel. One of the sources is available at the sender while the other one is known to the relay. The receiver wishes to reconstruct both sources. We find necessary and sufficient conditions for optimal separation of source and channel codes. The coding scheme is based on the combination of the Slepian-Wolf source coding and Partial Decode-and-Forward (PDF) strategy. In this scheme, the relay partially decodes the message transmitted by the sender. We also consider the semi-deterministic relay channel where the output at the relay is a deterministic function of inputs from the sender and the relay. For the transmission... 

    Joint Disrtibuted Source and Network Coding

    , M.Sc. Thesis Sharif University of Technology Etemadi Tajbakhsh, Shahriar (Author) ; Movaghar Rahimabadi, Ali (Supervisor)
    Abstract
    Network coding, as a novel technique, suggests that the intermediate nodes of a network can combine independent flows to optimize the usage of a shared communication channel. Also, distributed source coding, exploits the joint statistics of correlated information sources to reduce the volume of transmitted information. Surprisingly, it has been shown that linear network codes are able to compress correlated sources. In this project, we have focused on this problem, i.e. joint distributed source and network coding. We have two important contributions with different directions. First we give a practical design for joint coding. Second, we use an evolutionary approach to find the best placement... 

    Exploiting Applications and Improving Performance of Polar Codes in Information Theory

    , M.Sc. Thesis Sharif University of Technology Khatami, Mehrdad (Author) ; Marvasti, Farrokh (Supervisor)
    Abstract
    The two central topics of information theory are the compression and the transmission of data. Shannon, in his seminal work, formalized both these problems and determined their fundamental limits. Since then the main goal of coding theory has been to find practical schemes that approach these limits.Polar codes, recently invented by Arıkan, are the first practical codes that are known to achieve the capacity for a large class of channels. Their code construction is based on a phenomenon called “channel polarization”.
    Since the performance of polar code degrades when the block length is small, several kinds of Reed – Solomon concatenation is considered in order to improve the... 

    Analysis of Universal Coding Algorithms for Some Special Classes of Information Sources

    , M.Sc. Thesis Sharif University of Technology Nangir, Mahdi (Author) ; Aref, Mohammad Reza (Supervisor) ; Behroozi, Hamid (Supervisor)
    Abstract
    The coding and compression of information sources with special probability distribution is the center of concentration of researchers in this field in the last decades. In this dissertation, after a concise introduction to source coding, we focus on the universal source coding and data compression from an algorithmic and information theoretic point of view. First we introduce the fundamental concepts of source coding and data compression. Then, we analysis some algorithms on integer coding and verify their universality and asymptotically optimality. Usually statistics of information sources is not available in communication systems and storage devices, so that applying universal source... 

    Source Coding with Polar Codes

    , M.Sc. Thesis Sharif University of Technology Eghbalian Arani, Sajjad (Author) ; Behroozi, Hamid (Supervisor)
    Abstract
    Polar codes were introduced by Arikan in 2009. These codes are the first family of codes that with low encoding complexity and successive cancellation decoder, can achieve the channel capacity. Polar codes, at first were implemented for channel coding, but in 2010 performance of these codes in binary and q-ary alphabet source was studied. It is shown that these codes can perform efficiently in channel coding and source coding. On the other hand, one of the most important continuous sources are Gaussian sources. Due to the importance of Gaussian sources and good performance of polar codes, we try to evaluate the performance of these codes in Gaussian sources. Note that, these codes have... 

    On the duality of additivity and tensorization

    , Article IEEE International Symposium on Information Theory - Proceedings, 14 June 2015 through 19 June 2015 ; Volume 2015-June , 2015 , Pages 2381-2385 ; 21578095 (ISSN) ; 9781467377041 (ISBN) Beigi, S ; Gohari, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    A function is said to be additive if, similar to mutual information, expands by a factor of n, when evaluated on n i.i.d. repetitions of a source or channel. On the other hand, a function is said to satisfy the tensorization property if it remains unchanged when evaluated on i.i.d. repetitions. Additive rate regions are of fundamental importance in network information theory, serving as capacity regions or upper bounds thereof. Tensorizing measures of correlation have also found applications in distributed source and channel coding problems as well as the distribution simulation problem. Prior to our work only two measures of correlation, namely the hypercontractivity ribbon and maximal... 

    On Körner-Marton's sum modulo two problem

    , Article IWCIT 2015 - Iran Workshop on Communication and Information Theory, 6 May 2015 through 7 May 2015 ; May , 2015 ; 9781479982356 (ISBN) Sefidgaran, M ; Gohari, A ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    In this paper we study the sum modulo two problem proposed by Körner and Marton. In this source coding problem, two transmitters who observe binary sources X and Y, send messages of limited rate to a receiver whose goal is to compute the sum modulo of X and Y. This problem has been solved for the two special cases of independent and symmetric sources. In both of these cases, the rate pair (H(X|Y), H(Y|X)) is achievable. The best known outer bound for this problem is a conventional cut-set bound, and the best known inner bound is derived by Ahlswede and Han using a combination of Slepian-Wolf and Körner-Marton's coding schemes. In this paper, we propose a new outer bound which is strictly... 

    Generalised secure distributed source coding with side information

    , Article IET Communications ; Volume 4, Issue 18 , 2010 , Pages 2262-2272 ; 17518628 (ISSN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2010
    Abstract
    New inner and outer bounds on the achievable compression-equivocation rate region for generalised secure data compression with side information are given that do not match in general. In this setup, two senders, Alice and Charlie intend to transmit information to Bob via channels with limited capacity so that he can reliably reconstruct their observations. The eavesdropper, Eve, has access to one of the channels at each instant and is interested in the source of the same channel at the time. Bob and Eve also have their own observations, which are correlated with Alice's and Charlie's observations. In this model, two equivocation and compression rates are defined with respect to the sources... 

    A new approach for distributed image coding in wireless sensor networks

    , Article Proceedings - IEEE Symposium on Computers and Communications, 22 June 2010 through 25 June 2010, Riccione ; June , 2010 , Pages 563-566 ; 15301346 (ISSN) ; 9781424477555 (ISBN) Jamali, M ; Zokaei, S ; Rabiee, H. R ; Sharif University of Technology
    2010
    Abstract
    Power and bandwidth constraints are two major challenges in wireless sensor networks. Since a considerable amount of energy in sensor networks is consumed for data transmission, compression techniques may prolong the life of such networks. Moreover, with fewer bits to transmit, the network can cope better with the problem of inadequate bandwidth. In this paper, we consider an image sensor network and propose a paradigm based on the principles of Distributed Source Coding (DSC) for efficient compression. Our method relies on high correlation between the sensor nodes. The algorithm consists of two phases: the Training Phase and the Main Phase. In the Training Phase an aggregation node or a... 

    Multimedia multicast based on multiterminal source coding

    , Article IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences ; Volume E93-A, Issue 9 , 2010 , Pages 1639-1649 ; 09168508 (ISSN) Aghagolzadeh, A ; Nooshyar, M ; Rabiee, H. R ; Mikaili, E ; Sharif University of Technology
    2010
    Abstract
    Multimedia multicast with two servers based on the mul- titerminal source coding is studied in some previous researches. Due to the possibility of providing an approach for practical code design for more than two correlated sources in IMTSC/CEO setup, in this paper, the framework of Slepian-Wolf coded quantization is extended and a practical code design is presented for IMTSC/CEO with the number of encoders greater than two. Then the multicast system based on the IMTSC/CEO is applied to the cases with three, four and five servers. Since the underlying code design approach for the IMTSC/CEO problem has the capability of applying to an arbitrary number of active encoders, the proposed MMBMSC... 

    Code design for IMTSC/CEO problem using multilevel Slepian-Wolf coded quantization framework

    , Article Proceedings - 2010 18th Iranian Conference on Electrical Engineering, ICEE 2010, 11 May 2010 through 13 May 2010 ; 2010 , Pages 282-287 ; 9781424467600 (ISBN) Nooshyar, M ; Aghagolzadeh, A ; Rabiee, H. R ; Sharif University of Technology
    Abstract
    The aim of this paper is introducing coding scheme that can potentially achieve the sum rate-distortion bound of Gaussian IMTSC/CEO problem with arbitrary number of encoders. No previous work has been reported on code design for the IMTSC/CEO problem with the number of encoders greater than two. In this paper the framework of Slepian-Wolf coded quantization is extended to the case with the number of encoders greater than two. On the other hand, we apply the approach to the case of unequal levels of the observation noise at the encoders. Encoding process consists of trellis coded quantization (TCQ) and LDPC codes. The proposed framework can be easily used for any number of active encoders... 

    On the optimal performance in asymmetric gaussian wireless sensor networks with fading

    , Article IEEE Transactions on Signal Processing ; Volume 58, Issue 4 , 2010 , Pages 2436-2441 ; 1053587X (ISSN) Behroozi, H ; Alajaji, F ; Linder, T ; Sharif University of Technology
    2010
    Abstract
    We study the estimation of a Gaussian source by a Gaussian wireless sensor network (WSN) where L distributed sensors transmit noisy observations of the source through a fading Gaussian multiple access channel to a fusion center. In a recent work Gastpar, [ "Uncoded transmission is exactly optimal for a Simple Gaussian Sensor Network", IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 52475251, Nov. 2008] showed that for a symmetric Gaussian WSN with no fading, uncoded (analog) transmission achieves the optimal performance theoretically attainable (OPTA). In this correspondence, we consider an asymmetric fading WSN in which the sensors have differing noise and transmission powers. We first... 

    Evaluating the Rate of Compressibility of Sparse Stochastic Processes

    , M.Sc. Thesis Sharif University of Technology Ghourchian, Hamid (Author) ; Amini, Arash (Supervisor) ; Aminzadeh Gohari, Amin (Supervisor)
    Abstract
    In most stochastic models with uncountable cardinality of sample space with non-trivial probability measures, the inherent information is infinite. The continuous-valued random variables and continuous-domain random processes are among such objects. Therefore, a fidelity criterion must be defined between the stochastic subject and its estimated version. Although there are some criteria for of stochastic continuous signals, based on quantizing the signal in both time and amplitude domains, we are going to define a criterion which is for stochastic processes in bounded time domain. Next, the criterion will be expressed in general sources perspective and the optimum rate of coding will be... 

    Neutron noise source reconstruction using the adaptive neuro-fuzzy inference system (ANFIS) in the VVER-1000 reactor core

    , Article Annals of Nuclear Energy ; Volume 105 , 2017 , Pages 36-44 ; 03064549 (ISSN) Hosseini, S. A ; Esmaili Paeen Afrakoti, I ; Sharif University of Technology
    Abstract
    The neutron noise is defined as the stationary fluctuation of the neutron flux around its mean value due to the induced perturbation in the reactor core. The neutron noise analysis may be useful in many applications like noise source reconstruction. To identify the noise source, calculated neutron noise distribution of the detectors is used as input data by the considered unfolding algorithm. The neutron noise distribution of the VVER-1000 reactor core is calculated using the developed computational code based on Galerkin Finite Element Method (GFEM). The noise source of type absorber of variable strength is considered in the calculation. The computational code developed based on An Adaptive... 

    Sampling and distortion tradeoffs for indirect source retrieval

    , Article 2016 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2016, 7 December 2016 through 9 December 2016 ; 2017 , Pages 545-549 ; 9781509045457 (ISBN) Mohammadi, E ; Fallah, A ; Marvasti, F ; IEEE Signal Processing Society; The Institute of Electrical and Electronics Engineers ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    We study the problem of remote reconstruction of a continuous signal from its multiple corrupted versions. We are interested in the optimal number of samples and their locations for each corrupted signal to minimize the total reconstruction distortion of the remote signal. The correlation among the corrupted signals can be utilized to reduce the sampling rate. For a class of Gaussian signals, we show that in the low sampling rate region, it is optimal to use a certain nonuniform sampling scheme on all the signals. On the other hand, in the high sampling rate region, it is optimal to uniformly sample all the signals. We also show that both of these sampling strategies are optimal if we are... 

    Crowdsummarizer: automated generation of code summaries for java programs through crowdsourcing

    , Article IEEE Software ; Volume 34, Issue 2 , 2017 , Pages 71-80 ; 07407459 (ISSN) Badihi, S ; Heydarnoori, A ; Sharif University of Technology
    Abstract
    To perform software maintenance, developers must have a relatively good understanding of the program's source code, which is often written by other developers. Code summaries, which describe a program's entities (for example, its methods), help developers better comprehend code more quickly. However, generating code summaries can be challenging. To mitigate this problem, CrowdSummarizer exploits crowdsourcing, gamification, and natural-language processing to automatically generate high-level summaries of Java program methods. Researchers have implemented it as an Eclipse plug-in together with a Web-based code summarization game that can be played by the crowd. Two empirical studies... 

    Deep relative attributes

    , Article 13th Asian Conference on Computer Vision, ACCV 2016, 20 November 2016 through 24 November 2016 ; Volume 10115 LNCS , 2017 , Pages 118-133 ; 03029743 (ISSN); 9783319541921 (ISBN) Souri, Y ; Noury, E ; Adeli, E ; Sharif University of Technology
    Springer Verlag  2017
    Abstract
    Visual attributes are great means of describing images or scenes, in a way both humans and computers understand. In order to establish a correspondence between images and to be able to compare the strength of each property between images, relative attributes were introduced. However, since their introduction, hand-crafted and engineered features were used to learn increasingly complex models for the problem of relative attributes. This limits the applicability of those methods for more realistic cases. We introduce a deep neural network architecture for the task of relative attribute prediction. A convolutional neural network (ConvNet) is adopted to learn the features by including an... 

    An evolutionary approach to generalized mirror sites problem

    , Article 1st International Conference on Bio-Inspired Computational Methods Used for Solving Difficult Problems-Development of Intelligent and Complex Systems, BICS 2008, Tirgu Mures, 5 November 2008 through 7 November 2008 ; Volume 1117 , 2009 , Pages 40-46 ; 0094243X (ISSN); 9780735406544 (ISBN) Etemadi Tajbakhsh, S ; Movaghar, A ; Beigy, H ; Petru Maior University; Romanian Academy ; Sharif University of Technology
    2009
    Abstract
    The minimum cost subgraph for joint distributed source and network coding has been studied using a linear programming approach. This problem considers some statistically correlated information sources in a network, where sending over each link has a defined cost. The desired solution to this problem is a set of coding rates over the graph links, that minimizes the total communication costs. But in this problem, the placement of the sources is pre-defined, which is not necessarily optimal. In this paper, for the first time, we find a "good" placement for the sources using a genetic programming approach. This problem can be seen as the generalized mirror sites problem, where sources are not...