Loading...
Search for: communication-channels--information-theory
0.007 seconds
Total 149 records

    On distributed transmission of remote correlated Gaussian sources over an orthogonal Gaussian multiple-access channel

    , Article 2016 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 245-250 ; 9781509034345 (ISBN) Setayesh, M ; Behroozi, H ; Khalaj, B. H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    In this paper, we consider the problem of sending a bivariate correlated Gaussian source through a two-user Gaussian orthogonal multiple-access channel (MAC), where each encoder observes a noisy version of one of the source components, and the receiver aims at reconstructing each source component. The estimation quality is measured by mean-squared error (MSE) distortion criterion. Different components of the source have their own fidelity requirements instead of total or average distortion measure. It is easy to verify that for this problem, digital communication has an optimal performance. However, it is not explicit that when there is a constraint on the total power budget, what power... 

    Performance enhancement of the golden code by utilizing the ORIOL antenna

    , Article 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 288-292 ; 9781509034345 (ISBN) Amirikooshki, V ; Sadathosseini, M. A ; Lotfi Rezaabad, A ; Talebi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    In this paper, a novel method is exposed to improve the performance of the Golden code. In fact, we recommend using the octagonal reconfigurable isolated orthogonal element (ORIOL) antennas instead of a conventional microstrip patch antenna. In order to obtain a dramatic improvement, the ORIOL antenna should be employed in both the transmitter and the receiver sides. Accordingly, in this paper, we recommend space-time-polarization diversity instead of space-time singly; therefore, it is obvious that by employing this technique, the system obtains more strength against destructive fading. The simulations for different rates have confirmed that utilizing the ORIOL antenna outperforms patch... 

    Multi-Party secret key agreement over state-dependent wireless broadcast channels

    , Article IEEE Transactions on Information Forensics and Security ; Volume 12, Issue 2 , 2017 , Pages 323-337 ; 15566013 (ISSN) Jafari Siavoshani, M ; Mishra, S ; Fragouli, C ; Diggavi, S. N ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    We consider a group of m trusted and authenticated nodes that aim to create a shared secret key K over a wireless channel in the presence of an eavesdropper Eve. We assume that there exists a state-dependent wireless broadcast channel from one of the honest nodes to the rest of them including Eve. All of the trusted nodes can also discuss over a cost-free, noiseless and unlimited rate public channel which is also overheard by Eve. For this setup, we develop an information-theoretically secure secret key agreement protocol. We show the optimality of this protocol for 'linear deterministic' wireless broadcast channels. This model generalizes the packet erasure model studied in the literature... 

    Estimation of nonlinear dynamic systems over communication channels

    , Article IEEE Transactions on Automatic Control ; Volume 63, Issue 9 , 2018 , Pages 3024-3031 ; 00189286 (ISSN) Sanjaroon, V ; Farhadi, A ; Motahari, A. S ; Khalaj, B. H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Remote observation of the state trajectory of nonlinear dynamic systems over limited capacity communication channels is studied. It is shown that two extreme cases are possible: Either the system is fully observable or the error in estimation blows up. The key observation is that such behavior is determined by the relationship between the Shannon capacity and the Lyapunov exponents; the well-known characterizing parameters of a communication channel on one side, and a dynamic system from the other side. In particular, it is proved that for nonlinear systems with initial state x0, the minimum capacity of an additive white Gaussian noise channel required for full observation of the system in... 

    Low complexity resource allocation in the relay channels with energy harvesting transmitters

    , Article Ad Hoc Networks ; Volume 77 , 2018 , Pages 108-118 ; 15708705 (ISSN) Mohassel Feghhi, M ; Abbasfar, A ; Mirmohseni, M ; Sharif University of Technology
    Elsevier B.V  2018
    Abstract
    Energy Harvesting (EH) is a novel technique to prolong the lifetime of the wireless Ad-hoc and sensor networks with replenishable nodes. In this sense, it has emerged as a promising technique for Green Communications. On the other hand, cooperative communication with the help of relay nodes improves the performance of wireless communication networks. In this paper, we investigate the cooperation in EH nodes. We consider the optimal power and rate allocation in the full-duplex Gaussian relay channel in which source and relay can harvest energy from their environments. In our model, the energy arrivals at the source and the relay are general stochastic processes with known EH times and amounts... 

    State-dependent multiple access relay channel with cooperating transmitters

    , Article 2018 Iran Workshop on Communication and Information Theory, IWCIT 2018, 25 April 2018 through 26 April 2018 ; 2018 , Pages 1-6 ; 9781538641491 (ISBN) Gholipour, J ; Mirmohseni, M ; Seyfe, B ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    In this paper, we consider a state-dependent multiple access relay channel (MARC) with two-way cooperation at transmitters, in which the transmitters cooperate with each other over two limited-rate channels. We derive an achievable rate region for this channel by using block-Markov superposition coding, and double binning techniques. In our proposed scheme, the relay decodes only parts of the messages which are shared between the transmitters. © 2018 IEEE  

    Spatial multiplexing gain in MIMO radars with widely separated antennas

    , Article IET Signal Processing ; Volume 12, Issue 2 , March , 2018 , Pages 207-213 ; 17519675 (ISSN) Nazari Majd, M ; Radmard, M ; Chitgarha, M. M ; Farina, A ; Bastani, M. H ; Nayebi, M. M ; Sharif University of Technology
    Institution of Engineering and Technology  2018
    Abstract
    Multiple-input multiple-output (MIMO) radars have attracted much attention for their superior ability to enhance a system's performance. In this study, the authors' goal was the study of the spatial multiplexing gain of MIMO radars with widely separated antennas (WS-MIMO), which the authors showed that is equal to the number of unambiguously detectable targets. They obtained this number from two different aspects: first, by defining the ambiguity function of a WS-MIMO radar in the case of multiple targets, suitable for such purpose; Second, by modelling the MIMO radar system with a MIMO wireless channel. They showed that a MIMO radar is indeed a MIMO wireless system communicating the... 

    Sampling and distortion tradeoffs for bandlimited periodic signals

    , Article IEEE Transactions on Information Theory ; Volume 64, Issue 3 , March , 2018 , Pages 1706-1724 ; 00189448 (ISSN) Mohammadi, E ; Marvasti, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    In this paper, the optimal sampling strategies (uniform or nonuniform) and distortion tradeoffs for Gaussian bandlimited periodic signals with additive white Gaussian noise are studied. Our emphasis is on characterizing the optimal sampling locations as well as the optimal presampling filter to minimize the reconstruction distortion. We first show that to achieve the optimal distortion, no presampling filter is necessary for any arbitrary sampling rate. Then, we provide a complete characterization of optimal distortion for low and high sampling rates (with respect to the signal bandwidth). We also provide bounds on the reconstruction distortion for rates in the intermediate region. It is... 

    A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks

    , Article Peer-to-Peer Networking and Applications ; 2018 , Pages 1-18 ; 19366442 (ISSN) Nikravan, M ; Movaghar, A ; Hosseinzadeh, M ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    The Internet of Things (IoT) presents a new paradigm of the future Internet that intends to provide interactive communication between various processing objects via heterogeneous networks. The IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) is an IPv6 adaptation sub-layer and provides the requirements of IP connectivity between resource-constrained devices in lossy, low power networks. Since the size of a packet in the IPv6 is larger than the size of a frame in the IEEE 802.15.4, the 6LoWPAN adaptation layer performs packet fragmentation. In this paper, first, the 6LoWPAN fragmentation mechanism in terms of security issues is analyzed and then, fragment duplication attack which... 

    On tradeoff between collision and cooperation in a random access wireless network with energy harvesting nodes

    , Article IEEE Transactions on Vehicular Technology ; Volume 67, Issue 3 , 2018 , Pages 2501-2513 ; 00189545 (ISSN) Moradian, M ; Ashtiani, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    In this paper, we investigate an energy harvesting cooperative network in which the cooperation is done in a random access environment. Although the cooperation provides an extra harvested energy supply for transmissions of the source, it causes probable collisions for the transmitted source packets. Thus, this kind of cooperation can improve or degrade the QoS of the source packets. We find the optimal policy in such a scenario to maximize the source throughput and derive the necessary and sufficient condition for no-cooperation policy to be throughput-optimal. Then, we prove that the maximum throughput is obtained by considering no-cooperation or full-cooperation policy depending on the... 

    One-third probability embedding: less detectable LSB steganography

    , Article Proceedings - 2009 IEEE International Conference on Multimedia and Expo, ICME 2009, 28 June 2009 through 3 July 2009, New York, NY ; 2009 , Pages 1002-1005 ; 9781424442911 (ISBN) Sarreshtedari, S ; Ghotbi, M ; Ghaemmaghami, S ; Institute of Electrical and Electronics Engineers; Circuits and Systems Society; Communications Society; Signal Processing Society ; Sharif University of Technology
    2009
    Abstract
    This paper introduces a new method for the least significant bit (LSB) steganography in spatial domain. The new method, called one-third LSB embedding, reduces the probability of change per pixel to one-third without sacrificing the embedding capacity, as compared to previous LSB steganography techniques. This improvement results in a better imperceptibility and higher robustness against well known LSB detectors. Each bit of the message is carried through a function of three adjacent cover pixels and it is shown that no significant improvement is achieved by increasing the length of the pixel sequence employed. ©2009 IEEE  

    Efficient secure channel coding based on quasi-cyclic low-density parity-check codes

    , Article IET Communications ; Volume 3, Issue 2 , 2009 , Pages 279-292 ; 17518628 (ISSN) Sobhi Afshar, A. A ; Eghlidos, T ; Aref, M. R ; Sharif University of Technology
    2009
    Abstract
    A secure channel coding (joint encryption-channel coding) scheme provides both data security and reliability in one combined process to achieve faster processing and/or more efficient implementation. The issue of using quasi-cyclic low-density parity-check (QC-LDPC) codes in a symmetric-key secure channel coding scheme is addressed. A set of this class of LDPC codes has recently been recommended by the NASA Goddard Space Flight Center for near-earth and deep-space communications. The proposed scheme provides an efficient error performance, an acceptable level of security and a low-complexity practicable implementation. The results indicate that the proposed scheme can efficiently employ... 

    Optimal utility-energy tradeoff in delay constrained random access networks

    , Article 2009 IEEE International Conference on Communications, ICC 2009, Dresden, 14 June 2009 through 18 June 2009 ; 2009 ; 05361486 (ISSN); 9781424434350 (ISBN) Khodaian, A ; Hossein Khalaj, B ; Shah Mansouri, H ; Sharif University of Technology
    2009
    Abstract
    Rate, energy and delay are three main parameters of interest in ad-hoc networks. In this paper, we discuss the problem of maximizing network utility and minimizing energy consumption while satisfying a given transmission delay constraint for each packet. We formulate this problem in the standard convex optimization form and subsequently discuss the tradeoff between utility, energy and delay in such framework. Also, in order to adapt for the distributed nature of the network, a distributed algorithm where nodes decide on choosing transmission rates and probabilities based on their local information is introduced. ©2009 IEEE  

    Simultaneous partial and backward decoding approach for two-level relay networks

    , Article 2009 IEEE International Symposium on Information Theory, ISIT 2009, Seoul, 28 June 2009 through 3 July 2009 ; 2009 , Pages 517-521 ; 21578102 (ISSN); 9781424443130 (ISBN) Ghabeli, L ; Aref, M. R ; Sharif University of Technology
    2009
    Abstract
    In this paper, we propose a new achievable rate for two-level relay networks by introducing a new strategy named simultaneous partial and backward decoding. In the proposed method, benefitting from regular encoding/backward decoding strategy, different message parts transmitted in the network are simultaneously decoded at the relays and the receiver. The proposed strategy is shown to achieve better rates than the previously proposed methods based on decode-and-forward and partial decode-and-forward. © 2009 IEEE  

    Optimum power allocation in parallel poisson optical channel

    , Article 2009 10th International Conference on Telecommunications, ConTEL 2009, Zagreb, 8 June 2009 through 10 June 2009 ; 2009 , Pages 285-288 ; 9789531841313 (ISBN) Alem Karladani, M. M ; Sepahi, L ; Jazayerifar, M ; Kalbasi, K ; Sharif University of Technology
    2009
    Abstract
    In this paper we investigate the Shannon capacity of single and parallel Poisson channels in different scenarios. At first, by examining the capacity equation of the single Poisson channel, the minimum average power that maximizes the capacity is found. Then, applying the method of Lagrange multipliers on the capacity expression of the parallel Poisson channel, we obtain the optimum power allocation maximizing the parallel Poisson channel capacity  

    Inter-symbol-interference reduction in indoor infrared systems by effective sampling

    , Article Proceedings - 2009 International Conference on Future Computer and Communication, ICFCC 2009, 3 April 2009 through 5 April 2009, Kuala Lumpar ; 2009 , Pages 42-46 ; 9780769535913 (ISBN) Hassanzadeh, M. R ; Mansouri Rad, M. M ; Sharif University of Technology
    2009
    Abstract
    A new and simple receiver structure for reducing the multipath inter-symbole interference (ISI) effect is proposed for infrared diffuse links. In this new method, bit-error rate (BER) performance of the system will be improved significantly without any essential change in the receiver structure. In our analysis, all major noise sources such as ambient light, signal shotnoise, dark current and thermal noise of the receiver are considered. © 2009 IEEE  

    Space-query-time tradeoff for computing the visibility polygon

    , Article 3rd International Frontiers of Algorithmics Workshop, FAW 2009, Hefei, 20 June 2009 through 23 June 2009 ; Volume 5598 LNCS , 2009 , Pages 120-131 ; 03029743 (ISSN); 3642022693 (ISBN); 9783642022692 (ISBN) Nouri, M ; Ghodsi, M ; Sharif University of Technology
    2009
    Abstract
    Computing the visibility polygon, VP, of a point in a polygonal scene, is a classical problem that has been studied extensively. In this paper, we consider the problem of computing VP for any query point efficiently, with some additional preprocessing phase. The scene consists of a set of obstacles, of total complexity O(n). We show for a query point q, VP(q) can be computed in logarithmic time using O(n 4) space and O(n 4 logn) preprocessing time. Furthermore to decrease space usage and preprocessing time, we make a tradeoff between space usage and query time; so by spending O(m) space, we can achieve O(n 2 log √ m/n)/√ m)query time, where n 2≤m≤n 4. These results are also applied to... 

    A novel tunable UWB pulse design for narrowband interference suppression implemented in BiCMOS technology

    , Article Proceedings - IEEE International Symposium on Circuits and Systems, 24 May 2009 through 27 May 2009, Taipei ; 2009 , Pages 405-408 ; 02714310 (ISSN); 9781424438280 (ISBN) Hedayati, H ; Fotowat Ahmady, A ; Sharif University of Technology
    2009
    Abstract
    The unique properties of modified Hermite pulses is utilized to develop a novel pulse technique for Ultra Wideband (UWB) communications. The proposed method increases the bandwidth of the pulse up to 10 GHz and overcomes the coexistence problem of UWB and vulnerable narrowband systems through suppressing narrowband interference. Consequently it improves the range of UWB communications by increasing the power, without disturbing the narrowband systems. The pulse technique is implemented in high frequency pulse generation circuits and could be fully integrated in BiCMOS process. The nulls of the frequency response are tuned to be located in a definite narrowband system with the number of the... 

    Joint distributed source and network coding for multiple wireless unicast sessions

    , Article 2009 IEEE Wireless Communications and Networking Conference, WCNC 2009, Budapest, 5 April 2009 through 8 April 2009 ; 2009 ; 15253511 (ISSN); 9781424429486 (ISBN) Etemadi Tajbakhsh, S ; Movaghar, A ; Sharif University of Technology
    2009
    Abstract
    Few works has been focused on the problem of joint distributed data compression and network coding. In this paper we give some examples showing the advantage of broadcast nature of wireless environment as a basis for joint codes design. Also we show that joint coding is possible in the case of multiple unicasts. The idea of this paper can be exploited in an opportunistic manner. Actually, the foundation of our idea is nothing but combining opportunistic network coding (COPE) and distributed source coding using syndromes (DISCUS) for wireless applications. © 2009 IEEE  

    A low power and high density cache memory based on novel SRAM cell

    , Article IEICE Electronics Express ; Volume 6, Issue 15 , 2009 , Pages 1084-1090 ; 13492543 (ISSN) Azizi Mazreah, A ; Noorollahi Romani, M ; Manzuri, M. T ; Mehrparvar, A ; Sharif University of Technology
    2009
    Abstract
    Based on the observation that dynamic occurrence of zeros in the cache access stream and cache-resident memory values of ordinary programs exhibit a strong bias towards zero, this paper presents a novel CMOS four-transistor (4T) SRAM cell for very high density and low power cache applications. This cell retains its data with leakage current and positive feedback without refresh cycle. The new cell size is 20% smaller than a conventional six-transistor cell using same design rules and delay access of a cache based on new 4T SRAM cell is 32% smaller than a cache based on 6T SRAM cell. Also the dynamic and static power consumption of new cell is 40% and 20% smaller than 6T SRAM cell,...