Loading...
Search for: communication-channels--information-theory
0.013 seconds
Total 149 records

    Secrecy capacity of wiretap channel for a new scenario and designing code for wiretap channel

    , Article Proceedings - 2010 18th Iranian Conference on Electrical Engineering, ICEE 2010, 11 May 2010 through 13 May 2010 ; 2010 , Pages 183-187 ; 9781424467600 (ISBN) Jahandideh, V ; Salimi, S ; Salmasizadeh, M ; Sharif University of Technology
    Abstract
    The concept of information theoretic security is introduced. Secrecy capacity of two receiver broadcast channel for a new scenario is derived in which it is assumed that the legitimate receiver has access to a noisy version of eavesdroppers channel outputs. Also the ideas of code designing to achieve zero error on main channel and perfect secrecy on the eavesdropper's channel, without invoking complicated capacity achieving codes are provided  

    Secrecy capacity in large cooperative networks in presence of eavesdroppers with unknown locations

    , Article 2016 Iran Workshop on Communication and Information Theory, IWCIT 2016, 3 May 2016 through 4 May 2016 ; 2016 ; 9781509019229 (ISBN) Hadavi, A. H ; Kazempour, N ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    In this paper, an extended large wireless network, with a single transmitter-receiver pair, under the secrecy constraint is considered. In contrast to works which use idealized assumptions, a more realistic network situation with unknown eavesdroppers locations is investigated: the legitimate users only know their own Channel State Information (CSI), not the eavesdroppers CSI. Also, the network is analyzed by taking in to account the effects of both fading and path loss. Under these assumptions, a power efficient cooperative scheme, named stochastic virtual beamforming, is proposed. Applying this scheme, any desired pair of secure rate and outage level denoted by (Rs, ϵ) will be achievable... 

    Scheduling TV commercials using genetic algorithms

    , Article International Journal of Production Research ; Volume 51, Issue 16 , 2013 , Pages 4921-4929 ; 00207543 (ISSN) Ghassemi Tari, F ; Alaei, R ; Sharif University of Technology
    2013
    Abstract
    In this paper, the problem of scheduling commercial messages during the peak of viewing time of a TV channel is formulated as a combinatorial auction-based mathematical programming model. Through this model, a profitable and efficient mechanism for allocating the advertising time to advertisers is developed by which the revenue of TV channels is maximised while the effectiveness of advertising is increased. We developed a steady-state genetic algorithm to find an optimal or a near optimal solution for the proposed problem. A computational experiment was conducted for evaluating the efficiency of the proposed algorithm. A set of test problems with different sizes were generated, using the... 

    Sampling and distortion tradeoffs for indirect source retrieval

    , Article 2016 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2016, 7 December 2016 through 9 December 2016 ; 2017 , Pages 545-549 ; 9781509045457 (ISBN) Mohammadi, E ; Fallah, A ; Marvasti, F ; IEEE Signal Processing Society; The Institute of Electrical and Electronics Engineers ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    We study the problem of remote reconstruction of a continuous signal from its multiple corrupted versions. We are interested in the optimal number of samples and their locations for each corrupted signal to minimize the total reconstruction distortion of the remote signal. The correlation among the corrupted signals can be utilized to reduce the sampling rate. For a class of Gaussian signals, we show that in the low sampling rate region, it is optimal to use a certain nonuniform sampling scheme on all the signals. On the other hand, in the high sampling rate region, it is optimal to uniformly sample all the signals. We also show that both of these sampling strategies are optimal if we are... 

    Sampling and distortion tradeoffs for bandlimited periodic signals

    , Article IEEE Transactions on Information Theory ; 2017 ; 00189448 (ISSN) Mohammadi, E ; Marvasti, F ; Sharif University of Technology
    Abstract
    In this paper, the optimal sampling strategies (uniform or nonuniform) and distortion tradeoffs for Gaussian bandlimited periodic signals with additive white Gaussian noise are studied. Our emphasis is on characterizing the optimal sampling locations as well as the optimal pre-sampling filter to minimize the reconstruction distortion. We first show that to achieve the optimal distortion, no pre-sampling filter is necessary for any arbitrary sampling rate. Then, we provide a complete characterization of optimal distortion for low and high sampling rates (with respect to the signal bandwidth). We also provide bounds on the reconstruction distortion for rates in the intermediate region. It is... 

    Sampling and distortion tradeoffs for bandlimited periodic signals

    , Article IEEE Transactions on Information Theory ; Volume 64, Issue 3 , March , 2018 , Pages 1706-1724 ; 00189448 (ISSN) Mohammadi, E ; Marvasti, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    In this paper, the optimal sampling strategies (uniform or nonuniform) and distortion tradeoffs for Gaussian bandlimited periodic signals with additive white Gaussian noise are studied. Our emphasis is on characterizing the optimal sampling locations as well as the optimal presampling filter to minimize the reconstruction distortion. We first show that to achieve the optimal distortion, no presampling filter is necessary for any arbitrary sampling rate. Then, we provide a complete characterization of optimal distortion for low and high sampling rates (with respect to the signal bandwidth). We also provide bounds on the reconstruction distortion for rates in the intermediate region. It is... 

    Robust controller design for discrete unstable non-minimum-phase delayed stochastic processes

    , Article International Journal of Control, Automation and Systems ; Volume 11, Issue 5 , 2013 , Pages 893-902 ; 15986446 (ISSN) Rezaei, S ; Shahrokhi, M ; Sharif University of Technology
    2013
    Abstract
    Control of unstable non-minimum-phase delayed stochastic processes is a challenging problem. In this work based on the Diophantine equation and using pole-placement technique, a discrete control scheme for such processes has been proposed. Robust stability of the suggested control structure has been shown. Advantages of the proposed scheme over the existing algorithms have been shown through computer simulations. It has been shown that performance of the proposed scheme for handling model mismatch and colored noise is superior to the previous work proposed in the literature  

    Resource allocation in space division multiplexed elastic optical networks secured with quantum key distribution

    , Article IEEE Journal on Selected Areas in Communications ; Volume 39, Issue 9 , 2021 , Pages 2688-2700 ; 07338716 (ISSN) Ehsani Moghaddam, E ; Beyranvand, H ; Salehi, J. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Elastic Optical Network (EON) is a promising solution to address the high capacity, low latency, and flexibility requirements of the upcoming 5th-generation (5G) networks. Furthermore, Multi-Core Fibers (MCFs) and Space Division Multiplexing (SDM) technique can be utilized to overcome the capacity limitation of the conventional Single Mode Fibers (SMFs). On the other hand, Quantum Key Distribution (QKD) is an effective solution to address the security issues in 5G transport networks. In this paper, we investigate the performance of QKD over elastic optical networks with multi-core fibers and address the resource allocation problem for quantum and classical channels of QKD (QChs and CChs) and... 

    Quasi-inversion of qubit channels

    , Article Physical Review A ; Volume 101, Issue 3 , 2020 Karimipour, V ; Benatti, F ; Floreanini, R ; Sharif University of Technology
    American Physical Society  2020
    Abstract
    In general quantum operations, or quantum channels cannot be inverted by physical operations, i.e., by completely positive trace-preserving maps. An arbitrary state passing through a quantum channel loses its fidelity with the input. Given a quantum channel E, we discuss the concept of its quasi-inverse as a completely positive trace-preserving map Eqi which when composed with E increases its average input-output fidelity in an optimal way. The channel Eqi comes as close as possible to the inverse of a quantum channel. We give a complete classification of such maps for qubit channels and provide quite a few illustrative examples. © 2020 American Physical Society  

    Quantum capacity of a bosonic dephasing channel

    , Article Physical Review A ; Volume 102, Issue 4 , 2020 Arqand, A ; Memarzadeh, L ; Mancini, S ; Sharif University of Technology
    American Physical Society  2020
    Abstract
    We study the quantum capacity of a continuous-variable dephasing channel, which is a notable example of a non-Gaussian quantum channel. We prove that a single-letter formula applies. The optimal input state is found to be diagonal in the Fock basis and with a distribution that is a discrete version of a Gaussian. We discuss how its mean and variance are related to the dephasing rate and input energy. We then show that by increasing the input energy, the capacity saturates to a finite value. We also show that it decays exponentially for large values of dephasing rates. © 2020 American Physical Society  

    Quantum achievability proof via collision relative entropy

    , Article IEEE Transactions on Information Theory ; Vol. 60, issue. 12 , 2014 , pp. 7980-7986 ; ISSN: 00189448 Beigi, S ; Gohari, A
    Abstract
    In this paper, we provide a simple framework for deriving one-shot achievable bounds for some problems in quantum information theory. Our framework is based on the joint convexity of the exponential of the collision relative entropy and is a (partial) quantum generalization of the technique of Yassaee et al. from classical information theory. Based on this framework, we derive one-shot achievable bounds for the problems of communication over classical-quantum channels, quantum hypothesis testing, and classical data compression with quantum side information. We argue that our one-shot achievable bounds are strong enough to give the asymptotic achievable rates of these problems even up to the... 

    Power of quantum channels for creating quantum correlations

    , Article Physical Review A - Atomic, Molecular, and Optical Physics ; Volume 86, Issue 6 , 2012 ; 10502947 (ISSN) Abad, T ; Karimipour, V ; Memarzadeh, L ; Sharif University of Technology
    2012
    Abstract
    Local noise can produce quantum correlations on an initially classically correlated state, provided that it is not represented by a unital or semiclassical channel. We find the power of any given local channel for producing quantum correlations on an initially classically correlated state. We introduce a computable measure for quantifying the quantum correlations in quantum-classical states, which is based on the noncommutativity of ensemble states in one party of the composite system. Using this measure we show that the amount of quantum correlations produced is proportional to the classical correlations in the initial state. The power of an arbitrary channel for producing quantum... 

    Power-efficient deterministic and adaptive routing in torus networks-on-chip

    , Article Microprocessors and Microsystems ; Vol. 36, issue. 7 , October , 2012 , pp. 571-585 ; ISSN: 01419331 Rahmati, D ; Sarbazi-Azad, H ; Hessabi, S ; Kiasari, A. E ; Sharif University of Technology
    Abstract
    Modern SoC architectures use NoCs for high-speed inter-IP communication. For NoC architectures, high-performance efficient routing algorithms with low power consumption are essential for real-time applications. NoCs with mesh and torus interconnection topologies are now popular due to their simple structures. A torus NoC is very similar to the mesh NoC, but has rather smaller diameter. For a routing algorithm to be deadlock-free in a torus, at least two virtual channels per physical channel must be used to avoid cyclic channel dependencies due to the warp-around links; however, in a mesh network deadlock freedom can be insured using only one virtual channel. The employed number of virtual... 

    Power-efficient deterministic and adaptive routing in torus networks-on-chip

    , Article Microprocessors and Microsystems ; Volume 36, Issue 7 , 2012 , Pages 571-585 ; 01419331 (ISSN) Rahmati, D ; Sarbazi Azad, H ; Hessabi, S ; Kiasari, A. E ; Sharif University of Technology
    Elsevier  2012
    Abstract
    Modern SoC architectures use NoCs for high-speed inter-IP communication. For NoC architectures, high-performance efficient routing algorithms with low power consumption are essential for real-time applications. NoCs with mesh and torus interconnection topologies are now popular due to their simple structures. A torus NoC is very similar to the mesh NoC, but has rather smaller diameter. For a routing algorithm to be deadlock-free in a torus, at least two virtual channels per physical channel must be used to avoid cyclic channel dependencies due to the warp-around links; however, in a mesh network deadlock freedom can be insured using only one virtual channel. The employed number of virtual... 

    Power control for multirate DS-CDMA systems with imperfect successive interference cancellation

    , Article IEEE Transactions on Vehicular Technology ; Volume 57, Issue 1 , 2008 , Pages 600-603 ; 00189545 (ISSN) Jalali, S ; Khalaj, B. H ; Sharif University of Technology
    2008
    Abstract
    In this paper, the problem of power allocation and optimal decoding order of users for the uplink channel of a multirate direct-sequence code-division multiple-access system with linear successive interference cancellation (IC) is addressed. First, the closed-form expressions of the required received powers at the base station for providing all users with their demanded rates and signal to interference-plus-noise ratios (SINRs) are derived. Then, it is shown that, unlike the case when the IC is perfect, in this case, optimum ordering of users at the receiver, which minimizes the total transmitted power, is a function of both their requested SINRs and path gains. Finally, in searching for the... 

    Physical layer security for some classes of three-receiver broadcast channels

    , Article IET Communications ; Vol. 8, issue. 11 , July , 2014 , p. 1965-1976 Salehkalaibar, S ; Aref, M. R ; Sharif University of Technology
    Abstract
    In this study, the authors consider the secrecy of a one-receiver, two-eavesdropper broadcast channel (BC) with three degraded message sets. Consider a three-receiver BC with three messages, where the first message is decoded by all the receivers. The second message is decoded by the first and the second receivers and is to be kept secret from the third receiver. The third message is decoded by the first receiver and is to be kept secret from the second and the third receivers. The authors consider the imperfect secrecy condition at the second receiver, that is, it is allowed to partially decode the third message. However, the perfect secrecy condition at the third receiver, does not allow... 

    Performance evaluations and comparisons of several LDPC coded MC-FH-CDMA systems

    , Article Scientia Iranica ; Volume 13, Issue 4 , 2006 , Pages 337-347 ; 10263098 (ISSN) Behroozi, H ; Haghighat, J ; Nasiri Kenari, M ; Jamali, S. H ; Sharif University of Technology
    Sharif University of Technology  2006
    Abstract
    In this paper, the application of regular Low-Density Parity-Check (LDPC) codes in Multi-Carrier Frequency-Hopping (MC-FH) CDMA systems is studied. To this end, different well-known constructions of regular LDPC codes are considered and the performance of LDPC coded MC-FH-CDMA systems, based on these constructions, are evaluated and compared in a frequency-selective slowly Rayleigh fading channel. These results are compared with those previously reported for super-orthogonal convolutionally coded MC-FH-CDMA systems. The simulation results indicate that the LDPC coded MC-FH-CDMA system significantly outperforms the uncoded and super-orthogonal convolutionally coded schemes. To alleviate the... 

    Performance enhancement of the golden code by utilizing the ORIOL antenna

    , Article 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 288-292 ; 9781509034345 (ISBN) Amirikooshki, V ; Sadathosseini, M. A ; Lotfi Rezaabad, A ; Talebi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    In this paper, a novel method is exposed to improve the performance of the Golden code. In fact, we recommend using the octagonal reconfigurable isolated orthogonal element (ORIOL) antennas instead of a conventional microstrip patch antenna. In order to obtain a dramatic improvement, the ORIOL antenna should be employed in both the transmitter and the receiver sides. Accordingly, in this paper, we recommend space-time-polarization diversity instead of space-time singly; therefore, it is obvious that by employing this technique, the system obtains more strength against destructive fading. The simulations for different rates have confirmed that utilizing the ORIOL antenna outperforms patch... 

    Performance comparison of partially adaptive routing algorithms

    , Article 20th International Conference on Advanced Information Networking and Applications, Vienna, 18 April 2006 through 20 April 2006 ; Volume 2 , 2006 , Pages 763-767 ; 1550445X (ISSN) ; 0769524664 (ISBN); 9780769524665 (ISBN) Patooghy, A ; Sarbazi Azad, H ; Sharif University of Technology
    2006
    Abstract
    Partially adaptive routing algorithms are a useful category of routing algorithms due to their simple router logic and restricted adaptivity in selecting the next output channel towards the destination. Several partially adaptive routing algorithms on mesh and hypercube networks have been presented in the literature. But there is no study on evaluating the performance of these algorithms. This paper tries to compare the most important partially adaptive routing algorithms on the mesh and hypercube networks as the most popular topologies for multicomputers. The evaluation has been performed by the use of event driven simulator coded by C++ compiler. © 2006 IEEE  

    Performance comparison of deadlock recovery and deadlock avoidance routing algorithms in wormhole-switched networks

    , Article IEE Proceedings: Computers and Digital Techniques ; Volume 150, Issue 2 , 2003 , Pages 97-106 ; 13502387 (ISSN) Khonsari, A ; Shahrabi, A ; Ould Khaoua, M ; Sarbazi Azad, H ; Sharif University of Technology
    2003
    Abstract
    Dealing with deadlock has always been a crucial issue for any routing algorithms proposed for wormhole-switched networks. Adaptive routing algorithms, based on deadlock avoidance strategies, usually dedicate resources specifically to ensure deadlock freedom. However, a number of recent studies have demonstrated that deadlocks are quite rare in the network. This fact has motivated researchers to introduce adaptive routing algorithms based on deadlock recovery strategies. In an effort to gain a deep understanding of the factors that affect routing performance, a comparison of the performance merits of deadlock recovery against deadlock avoidance routing algorithms is performed. While most...