Loading...
Search for:
communication-channels--information-theory
0.008 seconds
Total 148 records
On the capacity region of semi-deterministic multiple-access-relay-networks
, Article 2010 Australian Communications Theory Workshop, AusCTW 2010, Canberra, ACT, 3 February 2010 through 5 February 2010 ; 2010 , Pages 54-58 ; 9781424454334 (ISBN) ; Ghabeli, L ; Aref, M. R ; ANU - The Australian National University; ACoRN - ARC Communications Research Network; NICTA; UniSA; CSIRO ; Sharif University of Technology
2010
Abstract
In this paper, we introduce a generalization of the Multiple-Access-Relay- Channel (MARC) called Multiple-Access-Relay-Network (MARN). In the proposed network, there are many transmitters, many relays and one receiver. The MARC model was first introduced by Kramer and consists of many transmitters, one receiver and only one relay.We also define semi-deterministic MARN, in which the output of the link between each transmitter and each relay is a deterministic function of the transmitter's input. We first obtain an achievable rate region for MARN by considering Partial Decode-and-Forward (PDF) strategy at the relays. Then we show that in semi-deterministic MARN, the proposed achievable rate...
On reconstructing linear combinations of correlated gaussian sources over a MAC
, Article IEEE Communications Letters ; Volume 20, Issue 12 , 2016 , Pages 2450-2453 ; 10897798 (ISSN) ; Behroozi, H ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2016
Abstract
In this letter, we study the joint source-channel coding problem of communicating the linear functions of correlated Gaussian sources over a Gaussian multiple access channel. In this setup, each transmitter observes one of two correlated sources. The receiver aims to reconstruct a linear combination of both correlated Gaussian sources within an average distortion level. For this setup, we first obtain a new lower bound on the achievable distortion and then, we propose a novel lattice-based hybrid transmission scheme and its achievable distortion is derived. We show that our proposed scheme can achieve the optimal distortion under some conditions
Integer forcing-and-forward transceiver design for MIMO multipair two-way relaying
, Article IEEE Transactions on Vehicular Technology ; Volume 65, Issue 11 , 2016 , Pages 8865-8877 ; 00189545 (ISSN) ; Nasiri Kenari, M ; Maham, B ; Hejazi, M ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2016
Abstract
In this paper, we propose a new transmission scheme, called integer forcing-and-forward (IFF), for communications among multipair multiple-antenna users in which each pair exchanges their messages with the help of a single multiple-antenna relay in the multiple-access and broadcast phases. The proposed scheme utilizes integer forcing linear receiver (IFLR) at the relay, which uses equations, i.e., linear integer combinations of messages, to harness intrapair interference. Accordingly, we propose the design of a mean square error (MSE)-based transceiver, including precoder and projection matrices for the relay and users, assuming that perfect channel state information (CSI) is available. In...
A lattice-based compress-and-forward strategy for Gaussian two-way relay channel with direct links
, Article IEEE Wireless Communications Letters ; Volume 5, Issue 5 , 2016 , Pages 500-503 ; 21622337 (ISSN) ; Mardani, S ; Behroozi, H ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
Abstract
In this letter, the Gaussian two-way relay channel with direct links is investigated in which two users aim at exchanging their messages with the help of a relay node. We propose a new lattice-based compress-and-forward strategy and obtain its achievable rate-region. We show that the proposed scheme is superior to all previously known achievable schemes for channel gains larger than one. In particular, under the symmetric case, the proposed scheme is able to achieve a capacity region within 0.5 bit or (1/2)log 3 ≅ 0.79 bit, depending on the power of the relay
Multi-party secret key agreement over state-dependent wireless broadcast channels
, Article IEEE Transactions on Information Forensics and Security ; Volume PP, Issue 99 , 2016 ; 15566013 (ISSN) ; Mishra, S ; Fragouli, C ; Diggavi, S. N ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2016
Abstract
We consider a group of m trusted and authenticated nodes that aim to create a shared secret key K over a wireless channel in the presence of an eavesdropper Eve. We assume that there exists a state dependent wireless broadcast channel from one of the honest nodes to the rest of them including Eve. All of the trusted nodes can also discuss over a cost-free, noiseless and unlimited rate public channel which is also overheard by Eve. For this setup, we develop an information-theoretically secure secret key agreement protocol. We show the optimality of this protocol for "linear deterministic" wireless broadcast channels. This model generalizes the packet erasure model studied in literature for...
Analytical power allocation for a full duplex decode-and-forward relay channel
, Article 2013 Iran Workshop on Communication and Information Theory ; 2013 ; 9781467350235 (ISBN) ; Emadi, M. J ; Aref, M. R ; Sharif University of Technology
Abstract
For a Rayleigh fading full-duplex decode-and-forward relay channel, we analytically derive optimum power allocation schemes subject to individual power constraints for the source and the relay. The optimization problem is taken over the source power and the relay power. It is proven that the optimization problem is concave for this scenario, and optimum power allocations are derived in a closed-form. Finally, the implications of the theoretical results are discussed through the graphs
Minimum output entropy of a non-gaussian quantum channel
, Article Physical Review A - Atomic, Molecular, and Optical Physics ; Volume 94, Issue 2 , 2016 ; 10502947 (ISSN) ; Mancini, S ; Sharif University of Technology
American Physical Society
2016
Abstract
We introduce a model of a non-Gaussian quantum channel that stems from the composition of two physically relevant processes occurring in open quantum systems, namely, amplitude damping and dephasing. For it we find input states approaching zero output entropy while respecting the input energy constraint. These states fully exploit the infinite dimensionality of the Hilbert space. Upon truncation of the latter, the minimum output entropy remains finite, and optimal input states for such a case are conjectured thanks to numerical evidence
Imperfect and Perfect Secrecy in Compound Multiple Access Channel with Confidential Message
, Article IEEE Transactions on Information Forensics and Security ; Volume 11, Issue 6 , 2016 , Pages 1239-1251 ; 15566013 (ISSN) ; Akhbari, B ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
Abstract
In this paper, we study the problem of secret communication over a compound Multiple Access Channel (MAC). In this channel, we assume that one of the transmitted messages is confidential, which is only decoded by its corresponding receiver and kept secret from the other receiver. We call this proposed setting the compound MAC with a confidential message. For this model, we derive general inner and outer bounds for both imperfect and perfect secrecy conditions for the second receiver. Also, as examples, we investigate less noisy and Gaussian versions of this channel, and extend the results of the discrete memoryless version to these cases. Moreover, providing numerical examples for the...
A distortion outer bound for communicating correlated gaussian sources over a gaussian MAC
, Article IEEE Communications Letters ; Volume 21, Issue 7 , 2017 , Pages 1457-1460 ; 10897798 (ISSN) ; Behroozi, H ; Khalaj, B. H ; Sharif University of Technology
Abstract
In this letter, we consider two problems of sending a bivariate Gaussian source through a two-user Gaussian non-orthogonal multiple-access channel. We provide a new distortion outer bound for the considered joint source-channel coding problems, which significantly reduces the gap between inner and outer bounds of the distortion for correlation coefficients below a threshold. Furthermore, numerical results show, that under some conditions, our proposed outer bound matches with the inner bound obtained via the separate source-channel coding scheme, which proves the optimality of this scheme. © 1997-2012 IEEE
Sensitivity of the secrecy capacity of a wiretap channel to the channel gains with imperfect channel information
, Article IWCIT 2017 - Iran Workshop on Communication and Information Theory, 3 May 2017 through 4 May 2017 ; 2017 ; 9781509047833 (ISBN) ; Bafghi, H. G ; Seyfe, B ; Sharif University of Technology
Abstract
In this paper, the impact of a small variations in the channel gains on the secrecy rate of the wiretap channel is studied, in which it is assumed that the imperfect channel knowledge is available at the transmitter. First, we consider general additive noise model for both legitimate and eavesdropper channels in the wiretap channel, and compute the variation of the secrecy rate resulting from the small variations in the channel gains. Then, we focus on the Gaussian wiretap channel, as a special case and calculate the sensitivity of the secrecy capacity to the channel gains with imperfect channel knowledge. Interestingly, it is shown that in some situations the effect of the channel variation...
Sampling and distortion tradeoffs for indirect source retrieval
, Article 2016 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2016, 7 December 2016 through 9 December 2016 ; 2017 , Pages 545-549 ; 9781509045457 (ISBN) ; Fallah, A ; Marvasti, F ; IEEE Signal Processing Society; The Institute of Electrical and Electronics Engineers ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2017
Abstract
We study the problem of remote reconstruction of a continuous signal from its multiple corrupted versions. We are interested in the optimal number of samples and their locations for each corrupted signal to minimize the total reconstruction distortion of the remote signal. The correlation among the corrupted signals can be utilized to reduce the sampling rate. For a class of Gaussian signals, we show that in the low sampling rate region, it is optimal to use a certain nonuniform sampling scheme on all the signals. On the other hand, in the high sampling rate region, it is optimal to uniformly sample all the signals. We also show that both of these sampling strategies are optimal if we are...
Diversity-multiplexing tradeoff in MIMO radars
, Article IET Radar, Sonar and Navigation ; Volume 11, Issue 4 , 2017 , Pages 691-700 ; 17518784 (ISSN) ; Radmard, M ; Chitgarha, M. M ; Farina, A ; Nayebi, M. M ; Bastani, M. H ; Sharif University of Technology
Institution of Engineering and Technology
2017
Abstract
Two gains play key roles in recently developed multiple-input-multiple-output (MIMO) wireless communication systems: 'spatial diversity' gain and 'spatial multiplexing' gain. The diversity gain (DG) refers to the capability to decrease the error rate of the MIMO channel, whereas the multiplexing gain (MG) implicitly refers to the amount of increase in the capacity of the MIMO channel. It has been shown that there is a fundamental tradeoff between these two types of gains, meaning interplay between increasing reliability (via an increase in the DG) and increasing data rate (via an increase in the MG). On the other hand, recently, MIMO radars have attracted much attention for their superior...
Multi-Party secret key agreement over state-dependent wireless broadcast channels
, Article IEEE Transactions on Information Forensics and Security ; Volume 12, Issue 2 , 2017 , Pages 323-337 ; 15566013 (ISSN) ; Mishra, S ; Fragouli, C ; Diggavi, S. N ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2017
Abstract
We consider a group of m trusted and authenticated nodes that aim to create a shared secret key K over a wireless channel in the presence of an eavesdropper Eve. We assume that there exists a state-dependent wireless broadcast channel from one of the honest nodes to the rest of them including Eve. All of the trusted nodes can also discuss over a cost-free, noiseless and unlimited rate public channel which is also overheard by Eve. For this setup, we develop an information-theoretically secure secret key agreement protocol. We show the optimality of this protocol for 'linear deterministic' wireless broadcast channels. This model generalizes the packet erasure model studied in the literature...
Spatial multiplexing gain in MIMO radars with widely separated antennas
, Article IET Signal Processing ; Volume 12, Issue 2 , March , 2018 , Pages 207-213 ; 17519675 (ISSN) ; Radmard, M ; Chitgarha, M. M ; Farina, A ; Bastani, M. H ; Nayebi, M. M ; Sharif University of Technology
Institution of Engineering and Technology
2018
Abstract
Multiple-input multiple-output (MIMO) radars have attracted much attention for their superior ability to enhance a system's performance. In this study, the authors' goal was the study of the spatial multiplexing gain of MIMO radars with widely separated antennas (WS-MIMO), which the authors showed that is equal to the number of unambiguously detectable targets. They obtained this number from two different aspects: first, by defining the ambiguity function of a WS-MIMO radar in the case of multiple targets, suitable for such purpose; Second, by modelling the MIMO radar system with a MIMO wireless channel. They showed that a MIMO radar is indeed a MIMO wireless system communicating the...
On tradeoff between collision and cooperation in a random access wireless network with energy harvesting nodes
, Article IEEE Transactions on Vehicular Technology ; Volume 67, Issue 3 , 2018 , Pages 2501-2513 ; 00189545 (ISSN) ; Ashtiani, F ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2018
Abstract
In this paper, we investigate an energy harvesting cooperative network in which the cooperation is done in a random access environment. Although the cooperation provides an extra harvested energy supply for transmissions of the source, it causes probable collisions for the transmitted source packets. Thus, this kind of cooperation can improve or degrade the QoS of the source packets. We find the optimal policy in such a scenario to maximize the source throughput and derive the necessary and sufficient condition for no-cooperation policy to be throughput-optimal. Then, we prove that the maximum throughput is obtained by considering no-cooperation or full-cooperation policy depending on the...
One-third probability embedding: less detectable LSB steganography
, Article Proceedings - 2009 IEEE International Conference on Multimedia and Expo, ICME 2009, 28 June 2009 through 3 July 2009, New York, NY ; 2009 , Pages 1002-1005 ; 9781424442911 (ISBN) ; Ghotbi, M ; Ghaemmaghami, S ; Institute of Electrical and Electronics Engineers; Circuits and Systems Society; Communications Society; Signal Processing Society ; Sharif University of Technology
2009
Abstract
This paper introduces a new method for the least significant bit (LSB) steganography in spatial domain. The new method, called one-third LSB embedding, reduces the probability of change per pixel to one-third without sacrificing the embedding capacity, as compared to previous LSB steganography techniques. This improvement results in a better imperceptibility and higher robustness against well known LSB detectors. Each bit of the message is carried through a function of three adjacent cover pixels and it is shown that no significant improvement is achieved by increasing the length of the pixel sequence employed. ©2009 IEEE
Space-query-time tradeoff for computing the visibility polygon
, Article 3rd International Frontiers of Algorithmics Workshop, FAW 2009, Hefei, 20 June 2009 through 23 June 2009 ; Volume 5598 LNCS , 2009 , Pages 120-131 ; 03029743 (ISSN); 3642022693 (ISBN); 9783642022692 (ISBN) ; Ghodsi, M ; Sharif University of Technology
2009
Abstract
Computing the visibility polygon, VP, of a point in a polygonal scene, is a classical problem that has been studied extensively. In this paper, we consider the problem of computing VP for any query point efficiently, with some additional preprocessing phase. The scene consists of a set of obstacles, of total complexity O(n). We show for a query point q, VP(q) can be computed in logarithmic time using O(n 4) space and O(n 4 logn) preprocessing time. Furthermore to decrease space usage and preprocessing time, we make a tradeoff between space usage and query time; so by spending O(m) space, we can achieve O(n 2 log √ m/n)/√ m)query time, where n 2≤m≤n 4. These results are also applied to...
Joint distributed source and network coding for multiple wireless unicast sessions
, Article 2009 IEEE Wireless Communications and Networking Conference, WCNC 2009, Budapest, 5 April 2009 through 8 April 2009 ; 2009 ; 15253511 (ISSN); 9781424429486 (ISBN) ; Movaghar, A ; Sharif University of Technology
2009
Abstract
Few works has been focused on the problem of joint distributed data compression and network coding. In this paper we give some examples showing the advantage of broadcast nature of wireless environment as a basis for joint codes design. Also we show that joint coding is possible in the case of multiple unicasts. The idea of this paper can be exploited in an opportunistic manner. Actually, the foundation of our idea is nothing but combining opportunistic network coding (COPE) and distributed source coding using syndromes (DISCUS) for wireless applications. © 2009 IEEE
Unified approach to the capacity evaluation of the relay channel
, Article IET Communications ; Volume 3, Issue 7 , 2009 , Pages 1208-1215 ; 17518628 (ISSN) ; Aref, M. R ; Sharif University of Technology
2009
Abstract
The authors indicate the dependence between the inputs of the relay channel with one auxiliary random variable as Cover, El-Gamal and Salehi have done for the multiple access channel with arbitrarily correlated sources. Then, by considering broadcast and multiple access sub-channels in the relay channel, the authors describe the essential role of the relay with special Markovity conditions on the auxiliary random variable and channel input-outputs, and unify most of known capacity theorems into one capacity theorem. The capacity theorem potentially may be applicable to a more general class of relay channels including at least the relay channels with known capacity. © The Institution of...
Continuity of the quantum Fisher information
, Article Physical Review A ; Volume 100, Issue 3 , 2019 ; 24699926 (ISSN) ; Hassani, M ; Alipour, S ; Sharif University of Technology
American Physical Society
2019
Abstract
In estimating an unknown parameter of a quantum state the quantum Fisher information (QFI) is a pivotal quantity, which depends on the state and its derivate with respect to the unknown parameter. We prove the continuity property for the QFI in the sense that two close states with close first derivatives have close QFIs. This property is completely general and irrespective of dynamics or how states acquire their parameter dependence and also the form of parameter dependence-indeed this continuity is basically a feature of the classical Fisher information that in the case of the QFI naturally carries over from the manifold of probability distributions onto the manifold of density matrices. We...