Loading...
Search for: communication-channels--information-theory
0.009 seconds
Total 149 records

    Multiple access channel with common message and secrecy constraint

    , Article IET Communications ; Volume 10, Issue 1 , 2016 , Pages 98-110 ; 17518628 (ISSN) Zivari Fard, H ; Akhbari, B ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
    Institution of Engineering and Technology 
    Abstract
    The authors study the problem of secret communication over a multiple-access channel with a common message. Here, the authors assume that two transmitters have confidential messages, which must be kept secret from the wiretapper (the second receiver), and both of them have access to a common message which can be decoded by the two receivers. The authors call this setting as multiple-access wiretap channel with common message (MAWC-CM). For this setting, the authors derive general inner and outer bounds on the secrecy capacity region for the discrete memoryless case and show that these bounds meet each other for a special case called the switch channel. As well, for a Gaussian version of... 

    Multi-party secret key agreement over state-dependent wireless broadcast channels

    , Article IEEE Transactions on Information Forensics and Security ; Volume PP, Issue 99 , 2016 ; 15566013 (ISSN) Jafari Siavoshani, M ; Mishra, S ; Fragouli, C ; Diggavi, S. N ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    We consider a group of m trusted and authenticated nodes that aim to create a shared secret key K over a wireless channel in the presence of an eavesdropper Eve. We assume that there exists a state dependent wireless broadcast channel from one of the honest nodes to the rest of them including Eve. All of the trusted nodes can also discuss over a cost-free, noiseless and unlimited rate public channel which is also overheard by Eve. For this setup, we develop an information-theoretically secure secret key agreement protocol. We show the optimality of this protocol for "linear deterministic" wireless broadcast channels. This model generalizes the packet erasure model studied in literature for... 

    Analytical power allocation for a full duplex decode-and-forward relay channel

    , Article 2013 Iran Workshop on Communication and Information Theory ; 2013 ; 9781467350235 (ISBN) Golami Davoodi, A ; Emadi, M. J ; Aref, M. R ; Sharif University of Technology
    Abstract
    For a Rayleigh fading full-duplex decode-and-forward relay channel, we analytically derive optimum power allocation schemes subject to individual power constraints for the source and the relay. The optimization problem is taken over the source power and the relay power. It is proven that the optimization problem is concave for this scenario, and optimum power allocations are derived in a closed-form. Finally, the implications of the theoretical results are discussed through the graphs  

    Cross-layer QSI-Aware radio resource management for HetNets with flexible backhaul

    , Article 2016 IEEE Wireless Communications and Networking Conference, 3 April 2016 through 7 April 2016 ; Volume 2016-September , 2016 ; 15253511 (ISSN) ; 9781467398145 (ISBN) Omidvar, N ; Zhang, F ; Liu, A ; Lau, V ; Tsang, D ; Pakravan, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    In this paper, we consider the problem of cross-layer radio resource management in heterogeneous networks (HetNets) with flexible backhaul, which aims at minimizing the total transmit power of base stations (BSs) while guaranteeing the average end-To-end data rate requirement of each data flow. We formulate the problem as a two-Timescale stochastic optimisation, where the long-Timescale control variables are flow control, routing control and interference coordination, while the short-Timescale control variable is instantaneous beamforming within each cell. Using a stochastic cutting plane (SCP) method, we propose a cross-layer queue-state information (QSI) aware radio resource management... 

    On the capacity region of asymmetric gaussian two-way line channel

    , Article IEEE Transactions on Communications ; Volume 64, Issue 9 , 2016 , Pages 3669-3682 ; 00906778 (ISSN) Ghasemi Goojani, S ; Karimi Bidhendi, S ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Lattice codes are known to outperform random codes for certain networks, especially in the Gaussian two-way relay channels (GTWRCs) where lattice codes are able to exploit their linearity. As an extension of the GTWRC, in this paper, we consider the asymmetric Gaussian two-way line network where two nodes exchange their messages through multiple relays. We first investigate the capacity region of the full-duplex two-way two-relay line network. The results can be extended to an arbitrary number of relays and to half-duplex scenarios. This channel consists of four nodes: 1 ↔ 2 ↔ 3 ↔ 4, where nodes 1 and 4 with the help of two full-duplex relays, i.e., nodes 2 and 3, exchange their messages... 

    Minimum output entropy of a non-gaussian quantum channel

    , Article Physical Review A - Atomic, Molecular, and Optical Physics ; Volume 94, Issue 2 , 2016 ; 10502947 (ISSN) Memarzadeh, L ; Mancini, S ; Sharif University of Technology
    American Physical Society  2016
    Abstract
    We introduce a model of a non-Gaussian quantum channel that stems from the composition of two physically relevant processes occurring in open quantum systems, namely, amplitude damping and dephasing. For it we find input states approaching zero output entropy while respecting the input energy constraint. These states fully exploit the infinite dimensionality of the Hilbert space. Upon truncation of the latter, the minimum output entropy remains finite, and optimal input states for such a case are conjectured thanks to numerical evidence  

    Secrecy capacity in large cooperative networks in presence of eavesdroppers with unknown locations

    , Article 2016 Iran Workshop on Communication and Information Theory, IWCIT 2016, 3 May 2016 through 4 May 2016 ; 2016 ; 9781509019229 (ISBN) Hadavi, A. H ; Kazempour, N ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    In this paper, an extended large wireless network, with a single transmitter-receiver pair, under the secrecy constraint is considered. In contrast to works which use idealized assumptions, a more realistic network situation with unknown eavesdroppers locations is investigated: the legitimate users only know their own Channel State Information (CSI), not the eavesdroppers CSI. Also, the network is analyzed by taking in to account the effects of both fading and path loss. Under these assumptions, a power efficient cooperative scheme, named stochastic virtual beamforming, is proposed. Applying this scheme, any desired pair of secure rate and outage level denoted by (Rs, ϵ) will be achievable... 

    Imperfect and Perfect Secrecy in Compound Multiple Access Channel with Confidential Message

    , Article IEEE Transactions on Information Forensics and Security ; Volume 11, Issue 6 , 2016 , Pages 1239-1251 ; 15566013 (ISSN) Zivari Fard, H ; Akhbari, B ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    In this paper, we study the problem of secret communication over a compound Multiple Access Channel (MAC). In this channel, we assume that one of the transmitted messages is confidential, which is only decoded by its corresponding receiver and kept secret from the other receiver. We call this proposed setting the compound MAC with a confidential message. For this model, we derive general inner and outer bounds for both imperfect and perfect secrecy conditions for the second receiver. Also, as examples, we investigate less noisy and Gaussian versions of this channel, and extend the results of the discrete memoryless version to these cases. Moreover, providing numerical examples for the... 

    BER derivation for UWB communication with a relay node in the presence of inter-channel interference

    , Article 2009 IEEE 3rd International Symposium on Advanced Networks and Telecommunication Systems, ANTS 2009, 14 December 2009 through 16 December 2009, New Delhi ; 2009 ; 9781424459896 (ISBN) Zeinalpour Yazdi, Z ; Nasiri Kenari, M ; Aazhang, B ; Sharif University of Technology
    Abstract
    In this paper, we present the average bit error probability (BEP) of a decode-and-forward relay network employing UWB links, developed by IEEE 802.15.4a standards, between its nodes. Our methodology is based on computing the Characteristic Function (CF) of the decision variable at the destination terminal. Numerical results show that significant improvement in the BEP of impulse radio UWB system is obtained by adding a relay node. The analytical expressions are also validated by computer simulations which confirm the accuracy of the approximations used in obtaining the BEP  

    A new nonlinear controller for active power filters

    , Article 2009 International Conference on Electric Power and Energy Conversion Systems, EPECS 2009, 10 November 2009 through 12 November 2009 ; 2009 ; 9789948427155 (ISBN) Zadkhast, S ; Mokhtari, H ; Sharif University of Technology
    Abstract
    Linear controllers have been widely used for controlling Active Power Filters (APFs). However, due to their limitations, a tradeoff between the bandwidth of the current control loop (CCL) and the voltage control loop (VCL) need to be made to remain stable in all conditions. This tradeoff leads to imperfect usage of the APF's capacity. Nonlinear controllers can eliminate such limitations and simultaneously remain stable in all conditions. In this paper, a new nonlinear controller for controlling the output current and the DC voltage (Vdc) of an APF is proposed. Feedback linearization method is applied on the CCL and the VCL is controlled via indirect method. In this method, an auxiliary... 

    Sampling and distortion tradeoffs for bandlimited periodic signals

    , Article IEEE Transactions on Information Theory ; 2017 ; 00189448 (ISSN) Mohammadi, E ; Marvasti, F ; Sharif University of Technology
    Abstract
    In this paper, the optimal sampling strategies (uniform or nonuniform) and distortion tradeoffs for Gaussian bandlimited periodic signals with additive white Gaussian noise are studied. Our emphasis is on characterizing the optimal sampling locations as well as the optimal pre-sampling filter to minimize the reconstruction distortion. We first show that to achieve the optimal distortion, no pre-sampling filter is necessary for any arbitrary sampling rate. Then, we provide a complete characterization of optimal distortion for low and high sampling rates (with respect to the signal bandwidth). We also provide bounds on the reconstruction distortion for rates in the intermediate region. It is... 

    Compressed sensing block MAP-LMS adaptive filter for sparse channel estimation and a Bayesian Cramer-Rao bound

    , Article Machine Learning for Signal Processing XIX - Proceedings of the 2009 IEEE Signal Processing Society Workshop, MLSP 2009, 2 September 2009 through 4 September 2009 ; 2009 ; 9781424449484 (ISBN) Zayyani, H ; Babaie Zadeh, M ; Jutten, C ; Sharif University of Technology
    Abstract
    This paper suggests to use a Block MAP-LMS (BMAP-LMS) adaptive filter instead of an Adaptive Filter called MAP-LMS for estimating the sparse channels. Moreover to faster convergence than MAP-LMS, this block-based adaptive filter enables us to use a compressed sensing version of it which exploits the sparsity of the channel outputs to reduce the sampling rate of the received signal and to alleviate the complexity of the BMAP-LMS. Our simulations show that our proposed algorithm has faster convergence and less final MSE than MAP-LMS, while it is more complex than MAP-LMS. Moreover, some lower bounds for sparse channel estimation is discussed. Specially, a Cramer-Rao bound and a Bayesian... 

    Joint sum rate and error probability optimization: finite blocklength analysis

    , Article IEEE Wireless Communications Letters ; 2017 ; 21622337 (ISSN) Haghifam, M ; Mili, M. R ; Makki, B ; Nasiri Kenari, M ; Svensson, T ; Sharif University of Technology
    Abstract
    We study the tradeoff between the sum rate and the error probability in downlink of wireless networks. Using the recent results on the achievable rates of finite-length codewords, the problem is cast as a joint optimization of the network sum rate and the per-user error probability. Moreover, we develop an efficient algorithm based on the divide-and-conquer technique to simultaneously maximize the network sum rate and minimize the maximum users’ error probability and to evaluate the effect of the codeword length on the system performance. The results show that, in delay-constrained scenarios, optimizing the per-user error probability plays a key role in achieving high throughput. IEEE  

    A distortion outer bound for communicating correlated gaussian sources over a gaussian MAC

    , Article IEEE Communications Letters ; Volume 21, Issue 7 , 2017 , Pages 1457-1460 ; 10897798 (ISSN) Setayesh, M ; Behroozi, H ; Khalaj, B. H ; Sharif University of Technology
    Abstract
    In this letter, we consider two problems of sending a bivariate Gaussian source through a two-user Gaussian non-orthogonal multiple-access channel. We provide a new distortion outer bound for the considered joint source-channel coding problems, which significantly reduces the gap between inner and outer bounds of the distortion for correlation coefficients below a threshold. Furthermore, numerical results show, that under some conditions, our proposed outer bound matches with the inner bound obtained via the separate source-channel coding scheme, which proves the optimality of this scheme. © 1997-2012 IEEE  

    Sensitivity of the secrecy capacity of a wiretap channel to the channel gains with imperfect channel information

    , Article IWCIT 2017 - Iran Workshop on Communication and Information Theory, 3 May 2017 through 4 May 2017 ; 2017 ; 9781509047833 (ISBN) Sedighizad, M ; Bafghi, H. G ; Seyfe, B ; Sharif University of Technology
    Abstract
    In this paper, the impact of a small variations in the channel gains on the secrecy rate of the wiretap channel is studied, in which it is assumed that the imperfect channel knowledge is available at the transmitter. First, we consider general additive noise model for both legitimate and eavesdropper channels in the wiretap channel, and compute the variation of the secrecy rate resulting from the small variations in the channel gains. Then, we focus on the Gaussian wiretap channel, as a special case and calculate the sensitivity of the secrecy capacity to the channel gains with imperfect channel knowledge. Interestingly, it is shown that in some situations the effect of the channel variation... 

    Binary fading interference channel with no CSIT

    , Article IEEE Transactions on Information Theory ; Volume 63, Issue 6 , 2017 , Pages 3565-3578 ; 00189448 (ISSN) Vahid, A ; Maddah Ali, M. A ; Avestimehr, A. S ; Zhu, Y ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    We study the capacity region of the two-user binary fading (or erasure) interference channel, where the transmitters have no knowledge of the channel state information. We develop new inner bounds and outer bounds for this problem. We identify three regimes based on the channel parameters: weak, moderate, and strong interference regimes. Interestingly, this is similar to the generalized degrees of freedom of the two-user Gaussian interference channel, where transmitters have perfect channel knowledge. We show that for the weak interference regime, treating interference as erasure is optimal while for the strong interference regime, decoding interference is optimal. For the moderate... 

    Simulation of a channel with another channel

    , Article IEEE Transactions on Information Theory ; Volume 63, Issue 5 , 2017 , Pages 2659-2677 ; 00189448 (ISSN) Haddadpour, F ; Yassaee, M. H ; Beigi, S ; Gohari, A ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    In this paper, we study the problem of simulating a discrete memoryless channel (DMC) from another DMC under an average-case and an exact model. We present several achievability and infeasibility results, with tight characterizations in special cases. In particular, for the exact model, we fully characterize when a binary symmetric channel can be simulated from a binary erasure channel when there is no shared randomness. We also provide infeasibility and achievability results for the simulation of a binary channel from another binary channel in the case of no shared randomness. To do this, we use the properties of Rényi capacity of a given order. We also introduce a notion of 'channel... 

    Sampling and distortion tradeoffs for indirect source retrieval

    , Article 2016 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2016, 7 December 2016 through 9 December 2016 ; 2017 , Pages 545-549 ; 9781509045457 (ISBN) Mohammadi, E ; Fallah, A ; Marvasti, F ; IEEE Signal Processing Society; The Institute of Electrical and Electronics Engineers ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    We study the problem of remote reconstruction of a continuous signal from its multiple corrupted versions. We are interested in the optimal number of samples and their locations for each corrupted signal to minimize the total reconstruction distortion of the remote signal. The correlation among the corrupted signals can be utilized to reduce the sampling rate. For a class of Gaussian signals, we show that in the low sampling rate region, it is optimal to use a certain nonuniform sampling scheme on all the signals. On the other hand, in the high sampling rate region, it is optimal to uniformly sample all the signals. We also show that both of these sampling strategies are optimal if we are... 

    Interference efficiency: A new metric to analyze the performance of cognitive radio networks

    , Article IEEE Transactions on Wireless Communications ; Volume 16, Issue 4 , 2017 , Pages 2123-2138 ; 15361276 (ISSN) Mili, M. R ; Musavian, L ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    In this paper, we develop and analyze a novel performance metric, called interference efficiency, which shows the number of transmitted bits per unit of interference energy imposed on the primary users (PUs) in an underlay cognitive radio network (CRN). Specifically, we develop a framework to maximize the interference efficiency of a CRN with multiple secondary users (SUs) while satisfying target constraints on the average interference power, total transmit power, and minimum ergodic rate for the SUs. In doing so, we formulate a multiobjective optimization problem (MOP) that aims to maximize ergodic sum rate of SUs and to minimize average interference power on the primary receiver. We solve... 

    Diversity-multiplexing tradeoff in MIMO radars

    , Article IET Radar, Sonar and Navigation ; Volume 11, Issue 4 , 2017 , Pages 691-700 ; 17518784 (ISSN) Nazari Majd, M ; Radmard, M ; Chitgarha, M. M ; Farina, A ; Nayebi, M. M ; Bastani, M. H ; Sharif University of Technology
    Institution of Engineering and Technology  2017
    Abstract
    Two gains play key roles in recently developed multiple-input-multiple-output (MIMO) wireless communication systems: 'spatial diversity' gain and 'spatial multiplexing' gain. The diversity gain (DG) refers to the capability to decrease the error rate of the MIMO channel, whereas the multiplexing gain (MG) implicitly refers to the amount of increase in the capacity of the MIMO channel. It has been shown that there is a fundamental tradeoff between these two types of gains, meaning interplay between increasing reliability (via an increase in the DG) and increasing data rate (via an increase in the MG). On the other hand, recently, MIMO radars have attracted much attention for their superior...