Loading...
Search for: communication-channels--information-theory
0.016 seconds
Total 149 records

    Delay-constrained utility maximisation in multi-hop random access networks

    , Article IET Communications ; Volume 4, Issue 16 , November , 2010 , Pages 1908-1918 ; 17518628 (ISSN) Khodaian, A. M ; Khalaj, B. H ; Sharif University of Technology
    2010
    Abstract
    Multi-hop random access networks have received much attention because of their distributed nature which facilitates deploying many new applications over the sensor and computer networks. Recently, utility maximisation framework is applied in order to optimise performance of such networks; however, proposed algorithms result in large transmission delays. In this study, the authors will analyse delay in random access multi-hop networks and solve the delay-constrained utility maximisation problem. We define the network utility as a combination of rate utility and energy cost functions and solve the following two problems: 'optimal medium access control with link delay constraint' and, 'optimal... 

    Crosstalk modeling to predict channel delay in Network-on-Chips

    , Article Proceedings - IEEE International Conference on Computer Design: VLSI in Computers and Processors, 3 October 2010 through 6 October 2010 ; October , 2010 , Pages 396-401 ; 10636404 (ISSN) ; 9781424489350 (ISBN) Patooghy, A ; Miremadi, S. G ; Shafaei, M ; Sharif University of Technology
    2010
    Abstract
    Communication channels in Network-on-Chips (NoCs) are highly susceptible to crosstalk faults due to the use of nano-scale VLSI technologies in the fabrication of NoCs. Crosstalk faults cause variable timing delay in NoC channels based on the patterns of transitions appearing on the channels. This paper proposes an analytical model to estimate the timing delay of an NoC channel in the presence of crosstalk faults. The model calculates expected number of 4C, 3C, 2C, and 1C transition patterns to predict delay of a K-bit communication channel. The model is applicable for both non-protected channels and channels which are protected by crosstalk mitigation methods. Spice simulations are done in a... 

    Cross-layer QSI-Aware radio resource management for HetNets with flexible backhaul

    , Article 2016 IEEE Wireless Communications and Networking Conference, 3 April 2016 through 7 April 2016 ; Volume 2016-September , 2016 ; 15253511 (ISSN) ; 9781467398145 (ISBN) Omidvar, N ; Zhang, F ; Liu, A ; Lau, V ; Tsang, D ; Pakravan, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    In this paper, we consider the problem of cross-layer radio resource management in heterogeneous networks (HetNets) with flexible backhaul, which aims at minimizing the total transmit power of base stations (BSs) while guaranteeing the average end-To-end data rate requirement of each data flow. We formulate the problem as a two-Timescale stochastic optimisation, where the long-Timescale control variables are flow control, routing control and interference coordination, while the short-Timescale control variable is instantaneous beamforming within each cell. Using a stochastic cutting plane (SCP) method, we propose a cross-layer queue-state information (QSI) aware radio resource management... 

    Cooperative relay cognitive interference channel

    , Article Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, 17 December 2010 through 19 December 2010, Beijing ; 2010 , Pages 1064-1069 ; 9781424469406 (ISBN) Kazemi, M ; Aref, M. R ; Ahmadian Attari, M ; Sharif University of Technology
    2010
    Abstract
    The cooperative relay cognitive interference channel (RCIC) is a four-node network with two source nodes (primary source and cognitive source) and two destination nodes, in which sources try to communicate at certain rates with their corresponding destinations simultaneously through a common medium and each destination can act as a relay to assist the other one. For the partially cooperative RCIC (PC-RCIC), in which only one of the destinations (corresponding to the cognitive source) acts as a relay, we derive an achievable rate region based on using rate splitting and superposition coding at the cognitive source, and using decode-and-forward scheme at the relay. For the degraded PC-RCIC, we... 

    Cooperative relay broadcast channels with partial causal channel state information

    , Article IET Communications ; Volume 5, Issue 6 , 2011 , Pages 760-774 ; 17518628 (ISSN) Akhbari, B ; Khosravi Farsani, R ; Aref, M. R ; Sharif University of Technology
    Abstract
    The authors consider 'partially' and 'fully cooperative' state-dependent relay broadcast channels (RBCs), where partial channel state information (CSI) is available at the nodes causally. First, the authors derive an achievable rate region for general discrete memoryless partially cooperative RBC (PC-RBC) with partial causal CSI, by exploiting superposition coding at the source, decode-and-forward scheme at the relay and Shannon's strategy at the source and the relay. Then, they establish the capacity region of the discrete memoryless physically degraded PC-RBC with partial causal CSI. They also characterise the capacity region of discrete memoryless PC-RBC with feedback and partial causal... 

    Continuity of the quantum Fisher information

    , Article Physical Review A ; Volume 100, Issue 3 , 2019 ; 24699926 (ISSN) Rezakhani, A. T ; Hassani, M ; Alipour, S ; Sharif University of Technology
    American Physical Society  2019
    Abstract
    In estimating an unknown parameter of a quantum state the quantum Fisher information (QFI) is a pivotal quantity, which depends on the state and its derivate with respect to the unknown parameter. We prove the continuity property for the QFI in the sense that two close states with close first derivatives have close QFIs. This property is completely general and irrespective of dynamics or how states acquire their parameter dependence and also the form of parameter dependence-indeed this continuity is basically a feature of the classical Fisher information that in the case of the QFI naturally carries over from the manifold of probability distributions onto the manifold of density matrices. We... 

    Compute-and-forward two-way relaying

    , Article IET Communications ; Volume 9, Issue 4 , 2015 , Pages 451-459 ; 17518628 (ISSN) Azimi Abarghouyi, S. M ; Hejazi, M ; Nasiri Kenari, M ; Sharif University of Technology
    Institution of Engineering and Technology  2015
    Abstract
    In this study, a new two-way relaying scheme based on compute-and-forward (CMF) framework and relay selection strategies is proposed, which provides a higher throughput than the conventional two-way relaying schemes. Two cases of relays with or without feedback transmission capability are considered. An upper bound on the computation rate of each relay is derived, and based on that, a lower bound on the outage probability of the system is presented assuming block Rayleigh fading channels. Numerical results show that while the average sum rate of the system without feedback, named as max-CMF (M-CMF), reaches the derived upper bound only in low SNRs, that of the system with feedback, named as... 

    Compressed sensing block MAP-LMS adaptive filter for sparse channel estimation and a Bayesian Cramer-Rao bound

    , Article Machine Learning for Signal Processing XIX - Proceedings of the 2009 IEEE Signal Processing Society Workshop, MLSP 2009, 2 September 2009 through 4 September 2009 ; 2009 ; 9781424449484 (ISBN) Zayyani, H ; Babaie Zadeh, M ; Jutten, C ; Sharif University of Technology
    Abstract
    This paper suggests to use a Block MAP-LMS (BMAP-LMS) adaptive filter instead of an Adaptive Filter called MAP-LMS for estimating the sparse channels. Moreover to faster convergence than MAP-LMS, this block-based adaptive filter enables us to use a compressed sensing version of it which exploits the sparsity of the channel outputs to reduce the sampling rate of the received signal and to alleviate the complexity of the BMAP-LMS. Our simulations show that our proposed algorithm has faster convergence and less final MSE than MAP-LMS, while it is more complex than MAP-LMS. Moreover, some lower bounds for sparse channel estimation is discussed. Specially, a Cramer-Rao bound and a Bayesian... 

    Compress-and-forward strategy for causal cognitive interference channel

    , Article Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, 17 December 2010 through 19 December 2010, Beijing ; 2010 , Pages 1088-1095 ; 9781424469406 (ISBN) Mirmohseni, M ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
    2010
    Abstract
    In this paper, we consider Causal Cognitive Interference Channel (CC-IFC), wherein the cognitive user overhears the channel and exploits knowledge of the primary user's message from the causally received signals. We propose a coding scheme which combines Compress-and-Forward (CF) strategy with Marton coding with common information at the cognitive user. Rate splitting for messages at both transmitters is used to have a collaborative strategy. Moreover, the cognitive user compresses its channel observation using Wyner-Ziv coding and splits the index of its compressed signal. Then, the cognitive user having common information to both receivers and private information to each of them, jointly... 

    Comprehensive study on a 2 × 2 full-rate and linear decoding complexity space-time block code

    , Article IET Communications ; Volume 9, Issue 1 , 2015 , Pages 122-132 ; 17518628 (ISSN) Hosseini, S. S ; Talebi, S ; Abouei, J ; Sharif University of Technology
    Institution of Engineering and Technology  2015
    Abstract
    This paper presents a comprehensive study on the Full-Rate and Linear-Receiver (FRLR) STBC proposed as a newly coding scheme with the low decoding complexity for a 2×2 MIMO system. It is shown that the FRLR code suffers from the lack of the non-vanishing determinant (NVD) property that is a key parameter in designing a full-rate STBC with a good performance in higher data rates, across QAM constellation. To overcome this drawback, we show that the existence of the NVD feature for the FRLR code depends on the type of the modulation. In particular, it is analytically proved that the FRLR code fulfills the NVD property across the PAM constellation but not for the QAM scheme. Simulation results... 

    Compound multiple access channel with confidential messages

    , Article 2014 IEEE International Conference on Communications, ICC 2014 ; 10-14 June 2014 , 2014 , Pages 1922-1927 ; ISBN: 9781479920037 Zivari Fard, H ; Akhbari, B ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
    Abstract
    In this paper, we study the problem of secret communication over a Compound Multiple Access Channel (MAC). In this channel, we assume that one of the transmitted messages is confidential that is only decoded by its corresponding receiver and kept secret from the other receiver. For this proposed setting (compound MAC with confidential messages), we derive general inner and outer bounds on the secrecy capacity region. Also, as examples, we investigate 'Less noisy' and 'Gaussian' versions of this channel, and extend the results of the discrete memoryless version to these cases. Moreover, providing numerical examples for the Gaussian case, we illustrate the comparison between achievable rate... 

    Comment II on "Dense coding in entangled states"

    , Article Physical Review A - Atomic, Molecular, and Optical Physics ; Volume 68, Issue 1 , 2003 , Pages - ; 10502947 (ISSN) Akhavan, O ; Rezakhani, A. T ; Sharif University of Technology
    American Physical Society  2003

    Cohering and decohering power of quantum channels

    , Article Physical Review A - Atomic, Molecular, and Optical Physics ; Volume 92, Issue 3 , 2015 ; 10502947 (ISSN) Mani, A ; Karimipour, V ; Sharif University of Technology
    American Physical Society  2015
    Abstract
    We introduce the concepts of cohering and decohering power of quantum channels. Using the axiomatic definition of the coherence measure, we show that the optimization required for calculations of these measures can be restricted to pure input states and hence greatly simplified. We then use two examples of this measure, one based on the skew information and the other based on the l1 norm; we find the cohering and decohering measures of a number of one-, two-, and n-qubit channels. Contrary to the view at first glance, it is seen that quantum channels can have cohering power. It is also shown that a specific property of a qubit unitary map is that it has equal cohering and decohering power in... 

    Code design for IMTSC/CEO problem using multilevel Slepian-Wolf coded quantization framework

    , Article Proceedings - 2010 18th Iranian Conference on Electrical Engineering, ICEE 2010, 11 May 2010 through 13 May 2010 ; 2010 , Pages 282-287 ; 9781424467600 (ISBN) Nooshyar, M ; Aghagolzadeh, A ; Rabiee, H. R ; Sharif University of Technology
    Abstract
    The aim of this paper is introducing coding scheme that can potentially achieve the sum rate-distortion bound of Gaussian IMTSC/CEO problem with arbitrary number of encoders. No previous work has been reported on code design for the IMTSC/CEO problem with the number of encoders greater than two. In this paper the framework of Slepian-Wolf coded quantization is extended to the case with the number of encoders greater than two. On the other hand, we apply the approach to the case of unequal levels of the observation noise at the encoders. Encoding process consists of trellis coded quantization (TCQ) and LDPC codes. The proposed framework can be easily used for any number of active encoders... 

    Clipping noise cancellation in uplink MC-CDMA system using signal reconstruction from non-uniform samples

    , Article 2008 International Conference on Telecommunications, ICT, St. Petersburg, 16 June 2008 through 19 June 2008 ; 2008 ; 9781424420360 (ISBN) Ali Hemmati, R ; Azmi, P ; Marvasti, F ; Sharif University of Technology
    2008
    Abstract
    In this paper, an iterative signal reconstruction method is extended to cancel multi-user clipping noise in a uplink MC-CDMA systems. Clipping is the simplest method to overcome high peak-to-average power ratio of multi-carrier signals but it makes the multi-carrier signals distorted. Reconstruction methods use non-distorted samples to reconstruct distorted samples in the receiver but multi-user interference causes the methods do not work properly because all the received samples are distorted by clipping and interference and so there is no undistorted samples to be used in recovering clipped samples. On the other hand, multi-user interference cancellation methods do not work properly... 

    Capacity of a more general class of relay channels

    , Article 2008 International Symposium on Information Theory and its Applications, ISITA2008, Auckland, 7 December 2008 through 10 December 2008 ; April , 2008 ; 9781424420698 (ISBN) Abed Hodtani, G ; Aref, M. R ; Commemorative Organization for the Japan World; Exposition('70); Support Center for Advanced Telecommunications; Technology Research; REFEC Research Foundation for the; Electrotechnology of Chubu ; Sharif University of Technology
    2008
    Abstract
    Capacity has been found for degraded, reversely degraded, full feedback, semi-deterministic, orthogonal relay channels, also for a class of deterministic relay channels and a class of modulo sum relay channels. We indicate what the relay decodes and forwards with one auxiliary random variable having bounded cardinality and attempt to define a more general class of relay channels in order to unify most of known capacity theorems into one capacity theorem by considering additional assumptions imposed to the definition of those channels. In other words, the relay channel inputs are dependent as in multiple access channel with arbitrarily correlated sources and here we do for the relay channel... 

    Blind interference alignment for three-user multi-hop SISO interference channel

    , Article International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 6 October 2014 through 8 October 2014 ; Volume 2015-January, Issue January , 2015 , Pages 462-467 ; 21570221 (ISSN) Kheirkhah Sangdeh, P ; Mirmohseni, M ; Akhaee, M. A ; Sharif University of Technology
    IEEE Computer Society  2015
    Abstract
    Interference Alignment (IA) is a rather new technique to achieve higher Degrees-of-Freedom (DoF) compared to traditional orthogonal naive methods, like, Time Division Multiple Access (TDMA). In many IA schemes, Instantaneous Channel State Information at Transmitter (CSIT) is mandatory. However, this requirement becomes an obstacle to implement those methods in practice. In some practical scenarios, it is not possible to provide instantaneous or even delayed CSIT. Recently, Blind Interference Alignment (BIA) has been introduced as a solution to align interference without CSIT. In spit of major advances in single-hop Interference Channels (ICs), few researches focused on multi-hop ICs. In this... 

    Bit error probability analysis of UWB communications with a relay node

    , Article IEEE Transactions on Wireless Communications ; Volume 9, Issue 2 , 2010 , Pages 802-813 ; 15361276 (ISSN) Zeinalpour Yazdi, Z ; Nasiri Kenari, M ; Aazhang, B ; Sharif University of Technology
    2010
    Abstract
    In this paper, the extension of cooperative communication to the context of TH-UWB is investigated. In particular, the average bit error probability (BEP) is provided for cooperative TH-UWB systems with decode-and-forward relaying protocol. In the considered relay network, UWB links among the nodes are modeled according to IEEE 802.15.4a standards. Our methodology is based on computing the Characteristic Function (CF) of the decision variable at the destination terminal. We use Gaussian quadrature numerical method to approximate the CF of interference component appeared in decision variable term. This technique permits to predict the system performance in different IEEE 802.15.4a defined... 

    Binary fading interference channel with no CSIT

    , Article IEEE Transactions on Information Theory ; Volume 63, Issue 6 , 2017 , Pages 3565-3578 ; 00189448 (ISSN) Vahid, A ; Maddah Ali, M. A ; Avestimehr, A. S ; Zhu, Y ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    We study the capacity region of the two-user binary fading (or erasure) interference channel, where the transmitters have no knowledge of the channel state information. We develop new inner bounds and outer bounds for this problem. We identify three regimes based on the channel parameters: weak, moderate, and strong interference regimes. Interestingly, this is similar to the generalized degrees of freedom of the two-user Gaussian interference channel, where transmitters have perfect channel knowledge. We show that for the weak interference regime, treating interference as erasure is optimal while for the strong interference regime, decoding interference is optimal. For the moderate... 

    BER derivation for UWB communication with a relay node in the presence of inter-channel interference

    , Article 2009 IEEE 3rd International Symposium on Advanced Networks and Telecommunication Systems, ANTS 2009, 14 December 2009 through 16 December 2009, New Delhi ; 2009 ; 9781424459896 (ISBN) Zeinalpour Yazdi, Z ; Nasiri Kenari, M ; Aazhang, B ; Sharif University of Technology
    Abstract
    In this paper, we present the average bit error probability (BEP) of a decode-and-forward relay network employing UWB links, developed by IEEE 802.15.4a standards, between its nodes. Our methodology is based on computing the Characteristic Function (CF) of the decision variable at the destination terminal. Numerical results show that significant improvement in the BEP of impulse radio UWB system is obtained by adding a relay node. The analytical expressions are also validated by computer simulations which confirm the accuracy of the approximations used in obtaining the BEP