Loading...
Search for: communication-channels--information-theory
0.015 seconds
Total 149 records

    A secure error-resilient lossless source coding scheme based on punctured turbo codes

    , Article Iranian Journal of Electrical and Computer Engineering ; Volume 5, Issue 1 , 2006 , Pages 19-23 ; 16820053 (ISSN) Payandeh, A ; Ahmadian, M ; Aref, M. R ; Sharif University of Technology
    2006
    Abstract
    In this paper, we develop a new error-resistant secure lossless source coding scheme for discrete sources. Recent results indicate that the same turbo principle that provides sub-optimal strategy for channel coding, can be used to obtain efficient source coding schemes. We extend the source turbo-coding idea to include security for transmission of the compressed data and also to ensure the lossless recovery of information at the receiver. Compression and security are achieved by adapting the random puncturing strategy to the statistics of the source. Lossless compression is guaranteed by finely puncturing the encoded data of a parallel-concatenated turbo code while verifying the integrity of... 

    A polynomial algorithm for partitioning problems

    , Article Transactions on Embedded Computing Systems ; Volume 9, Issue 4 , 2010 ; 15399087 (ISSN) Tahaee, S. A ; Jahangir, A. H ; Sharif University of Technology
    2010
    Abstract
    This article takes a theoretical approach to focus on the algorithmic properties of hardware/software partitioning. It proposes a method with polynomial complexity to find the global optimum of an NP-hard model partitioning problem for 75% of occurrences under some practical conditions. The global optimum is approached with a lower bound distance for the remaining 25%. Furthermore, this approach ensures finding the 2-approximate of the global optimum partition in 97% of instances where technical assumptions exist. The strategy is based on intelligently changing the parameters of the polynomial model of the partitioning problem to force it to produce (or approach) the exact solution to the... 

    A novel tunable UWB pulse design for narrowband interference suppression implemented in BiCMOS technology

    , Article Proceedings - IEEE International Symposium on Circuits and Systems, 24 May 2009 through 27 May 2009, Taipei ; 2009 , Pages 405-408 ; 02714310 (ISSN); 9781424438280 (ISBN) Hedayati, H ; Fotowat Ahmady, A ; Sharif University of Technology
    2009
    Abstract
    The unique properties of modified Hermite pulses is utilized to develop a novel pulse technique for Ultra Wideband (UWB) communications. The proposed method increases the bandwidth of the pulse up to 10 GHz and overcomes the coexistence problem of UWB and vulnerable narrowband systems through suppressing narrowband interference. Consequently it improves the range of UWB communications by increasing the power, without disturbing the narrowband systems. The pulse technique is implemented in high frequency pulse generation circuits and could be fully integrated in BiCMOS process. The nulls of the frequency response are tuned to be located in a definite narrowband system with the number of the... 

    A new wideband MIMO channel model for simulating 5-GHz band indoor WLANs

    , Article 2006 IEEE 64th Vehicular Technology Conference, VTC-2006 Fall, Montreal, QC, 25 September 2006 through 28 September 2006 ; 2006 , Pages 2298-2303 ; 15502252 (ISSN); 1424400635 (ISBN); 9781424400638 (ISBN) Jedari, E ; Golparvar Roozbahani, M ; Shishegar, A. A ; Enayati, A. R ; Alihemmati, R ; Sharif University of Technology
    2006
    Abstract
    Considerable interest in the indoor applications of wireless local-area networks (WLANs) demands some powerful simulation methods of these systems. Proper modeling of the physical propagation channel is crucial in this context. A novel simulation method for indoor wideband multi-input multi-output (MIMO) channel at the operating frequency band of IEEE 802.11a, HIPERLAN/2, and the emerging IEEE 802.11n standards is presented in this paper which is suitable for performance analysis of MIMO techniques in these systems. The presented model is developed on the basis of a previously proposed channel representation at the same frequency band. Simulation results for MIMO channel capacity are... 

    A new routing algorithm for irregular mesh NoCs

    , Article 2008 International SoC Design Conference, ISOCC 2008, Busan, 24 November 2008 through 25 November 2008 ; Volume 1 , 2008 , Pages I260-I264 ; 9781424425990 (ISBN) Samadi Bokharaei, V ; Shamaei, A ; Sarbaziazad, H ; Abbaspour, M ; Sharif University of Technology
    2008
    Abstract
    Network-on-Chips (NoCs) usually use regular mesh-based topologies.Regular mesh topologies are not always efficient because of power and area constraints which should be considered in designing system-on-chips.To overcome this problem,irregular mesh NoCs are used for which the design of routing algorithms is an important issue.This paper presents a novel routing algorithm for irregular mesh-based NoCs called "i-route". In contrast to other routing algorithms,this algorithm can be implemented on any arbitrary irregular mesh NoC without any change in the place of IPs. In this algorithm, messages are routed using only 2 classes of virtual channels. Simulation results show that using only 2... 

    A new nonlinear controller for active power filters

    , Article 2009 International Conference on Electric Power and Energy Conversion Systems, EPECS 2009, 10 November 2009 through 12 November 2009 ; 2009 ; 9789948427155 (ISBN) Zadkhast, S ; Mokhtari, H ; Sharif University of Technology
    Abstract
    Linear controllers have been widely used for controlling Active Power Filters (APFs). However, due to their limitations, a tradeoff between the bandwidth of the current control loop (CCL) and the voltage control loop (VCL) need to be made to remain stable in all conditions. This tradeoff leads to imperfect usage of the APF's capacity. Nonlinear controllers can eliminate such limitations and simultaneously remain stable in all conditions. In this paper, a new nonlinear controller for controlling the output current and the DC voltage (Vdc) of an APF is proposed. Feedback linearization method is applied on the CCL and the VCL is controlled via indirect method. In this method, an auxiliary... 

    A new approach to fast decode quasi-orthogonal space-time block codes

    , Article IEEE Transactions on Wireless Communications ; Volume 14, Issue 1 , 2015 , Pages 165-176 ; 15361276 (ISSN) Ahmadi, A ; Talebi, S ; Shahabinejad, M ; Sharif University of Technology
    Abstract
    Motivated by the statistical correspondence between phases of the transmitted and received vectors, we present a fast decoding method for quasi-orthogonal space-time block codes (QOSTBCs) in this paper. The proposed decoder selects proper candidates from precomputed and sorted sets by focusing on the phase of a specific entry of the combined and decoupled vector. The ML metric of the most probable candidates is first evaluated, and then, the remaining candidates are assessed based on the similarity between the phases. The new algorithm can work with any type of constellation such as QAM and PSK and supports generalized block-diagonal QOSTBCs. Theoretical results backed by simulation tests... 

    An energy-efficient virtual channel power-gating mechanism for on-chip networks

    , Article Proceedings -Design, Automation and Test in Europe, DATE, 9 March 2015 through 13 March 2015 ; Volume 2015-April , March , 2015 , Pages 1527-1532 ; 15301591 (ISSN) ; 9783981537048 (ISBN) Mirhosseini, A ; Sadrosadati, M ; Fakhrzadehgan, A ; Modarressi, M ; Sarbazi Azad, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Power-gating is a promising method for reducing the leakage power of digital systems. In this paper, we propose a novel power-gating scheme for virtual channels in on-chip networks that uses an adaptive method to dynamically adjust the number of active VCs based on the on-chip traffic characteristics. Since virtual channels are used to provide higher throughput under high traffic loads, our method sets the number of virtual channel at each port selectively based on the workload demand, thereby do not negatively affect performance. Evaluation results show that by using this scheme, about 40% average reduction in static power consumption can be achieved with negligible performance overhead  

    An efficient DVS scheme for on-chip networks using reconfigurable Virtual Channel allocators

    , Article Proceedings of the International Symposium on Low Power Electronics and Design, 22 July 2015 through 24 July 2015 ; Volume 2015-September , July , 2015 , Pages 249-254 ; 15334678 (ISSN) ; 9781467380096 (ISBN) Sadrosadati, M ; Mirhosseini, A ; Aghilinasab, H ; Sarbazi Azad, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Network-on-Chip (NoC) is a key element in the total power consumption of a chip multiprocessor. Dynamic Voltage Scaling is a promising method for power saving in NoCs since it contributes to reduction in both static and dynamic power consumptions. In this paper, we propose a novel scheme to reduce on-chip network power consumption when the number of Virtual Channels (VCs) with active allocation requests per cycle is less than the number of total VCs. In our method, we introduce a reconfigurable arbitration logic which can be configured to have multiple latencies and hence, multiple slack times. The increased slack times are then used to reduce the supply voltage of the routers in order to... 

    Analytic modeling of channel traffic in n-cubes

    , Article 1st International Computer Science Symposium in Russia, CSR 2006, St. Petersburg, 8 June 2006 through 12 June 2006 ; Volume 3967 LNCS , 2006 , Pages 567-579 ; 03029743 (ISSN) Sarbazi Azad, H ; Mahini, H ; Patooghy, A ; Sharif University of Technology
    Springer Verlag  2006
    Abstract
    Many studies have shown that the imbalance of network channel traffic is of critical effect on the overall performance of multicomputer systems. In this paper, we analytically model the traffic rate crossing the network channels of a hypercube network under different working conditions. The effect of different parameters on the shaping of non-uniformity and traffic imbalance over network channels, are considered and analytical models for each case are proposed. © Springer-Verlag Berlin Heidelberg 2006  

    Analytical power allocation for a full duplex decode-and-forward relay channel

    , Article 2013 Iran Workshop on Communication and Information Theory ; 2013 ; 9781467350235 (ISBN) Golami Davoodi, A ; Emadi, M. J ; Aref, M. R ; Sharif University of Technology
    Abstract
    For a Rayleigh fading full-duplex decode-and-forward relay channel, we analytically derive optimum power allocation schemes subject to individual power constraints for the source and the relay. The optimization problem is taken over the source power and the relay power. It is proven that the optimization problem is concave for this scenario, and optimum power allocations are derived in a closed-form. Finally, the implications of the theoretical results are discussed through the graphs  

    Analysis of throughput and delay in a spectrally phase-encoded optical CDMA packet network

    , Article 4th IEEE and IFIP International Conference on Wireless and Optical Communications Networks, WOCN 2007, Singapore, 2 July 2007 through 4 July 2007 ; 2007 ; 1424410045 (ISBN); 9781424410040 (ISBN) Khaleghi, S ; Khaleghi, S ; Jamshidi, K ; Sharif University of Technology
    2007
    Abstract
    In this paper, analysis of the throughput and delay in a spectrally phase-encoded optical code-division multiple-access (OCDMA) system, using a simplified slotted packet network protocol is conducted. Steady-state throughput and average packet delay of the system are derived. In evaluating the performance of the system, only multiple access interference is considered and other sources of noise are neglected. Comparing different systems with the fixed bit rate and chip duration leads us to conclude that increasing the code length will improve the performance of networks with small average activity; but in highly active networks, decreasing the code length will result in a significant... 

    An adaptive secure channel coding scheme for data transmission over LEO satellite channels

    , Article Scientia Iranica ; Volume 13, Issue 4 , 2006 , Pages 373-378 ; 10263098 (ISSN) Payandeh, A ; Ahmadian, M ; Aref, M. R ; Sharif University of Technology
    Sharif University of Technology  2006
    Abstract
    Both secure and error control coding are very extensive subjects, each with a variety of subdisciplines. A secure channel coding (joint encryption-channel coding) scheme provides both data secrecy and data reliability in one process to combat problems in an insecure and unreliable channel. In this paper, a joint encryption-channel coding scheme is developed, based on concatenated turbo codes for more efficient and secure transmission of LEO satellite data. Reliability and security are achieved by adapting the pseudo-random puncturing strategy with a change of distance between satellites and ground stations in the communication séance, an issue further burdened by reducing energy consumption... 

    An adaptive call admission algorithm for cellular networks

    , Article Computers and Electrical Engineering ; Volume 31, Issue 2 , 2005 , Pages 132-151 ; 00457906 (ISSN) Beigy, H ; Meybodi, M. R ; Sharif University of Technology
    2005
    Abstract
    In this paper, we first propose a new continuous action-set learning automaton and theoretically study its convergence properties and show that it converges to the optimal action. Then we give an adaptive and autonomous call admission algorithm for cellular mobile networks, which uses the proposed learning automaton to minimize the blocking probability of the new calls subject to the constraint on the dropping probability of the handoff calls. The simulation results show that the performance of the proposed algorithm is close to the performance of the limited fractional guard channel algorithm for which we need to know all the traffic parameters in advance. © 2005 Elsevier Ltd. All rights... 

    An adaptive approach to manage the number of virtual channels

    , Article 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008, Gino-wan, Okinawa, 25 March 2008 through 28 March 2008 ; 2008 , Pages 353-358 ; 1550445X (ISSN) ; 0769530966 (ISBN); 9780769530963 (ISBN) Mirza Aghatabar, M ; Koohi, S ; Hessabi, S ; Rahmati, D ; Sharif University of Technology
    2008
    Abstract
    Network-on-Chip (NoC) is a precious approach to handle huge number of transistors by virtue of technology scaling to lower than 50nm. Virtual channels have been introduced in order to improve the performance according to a timing multiplexing concept in each physical channel. The incremental effect of virtual channels on power consumption has been shown in literatures. The issue of power saving has always been controversial to many designers. In this paper, we introduce a new technique which tries to adaptively mange the number of virtual channels in order to reduce the power consumption while not degrading the performance of the network without any reconfiguration. Our experimental results... 

    An achievable rate for relay networks based on compress-and-forward strategy

    , Article IEEE Communications Letters ; Volume 14, Issue 4 , 2010 , Pages 279-281 ; 10897798 (ISSN) Salehkalaibar, S ; Ghabeli, L ; Aref, M. R ; Sharif University of Technology
    Abstract
    Compress-and-Forward (CF) is a well-known coding strategy proposed for relay channels. Few works which were done about the generalization of the CF strategy to the relay networks, are based on irregular encoding/successive decoding. In this paper, a new generalization of the CF strategy to the relay networks based on regular encoding/backward decoding is presented. In general, backward decoding has been shown to yield higher rates in comparison with successive decoding. Here we will investigate the performance of backward decoding in our problem and show that our achievable rate includes the previously proposed rates  

    AMACA - A new multiple access collision avoidance scheme for wireless lans

    , Article 2004 International Workshop on Wireless Ad-Hoc Networks, Oulu, 31 May 2004 through 3 June 2004 ; 2005 , Pages 238-242 ; 0780382757 (ISBN) Ghaboosi, K ; Khalaj, B. H ; Sharif University of Technology
    2005
    Abstract
    It's well known that "hidden- and exposed-terminal" are among the main problems in ad-hoc WLAN networks. In addition, there are scenarios where the desired destination is located in the range of other transmitters, so that the efforts on setting up communication with this terminal will fail due to collisions occurred between desired control packets and unwanted received data packets at destination. In such scenarios, conventional protocols can not address the problem efficiently, resulting in throughput and channel utilization degradation. In this paper, by using the same PHY of IEEE 802.11 and making slight changes in its MAC layer, a new MAC protocol is presented to address such problems.... 

    A low power and high density cache memory based on novel SRAM cell

    , Article IEICE Electronics Express ; Volume 6, Issue 15 , 2009 , Pages 1084-1090 ; 13492543 (ISSN) Azizi Mazreah, A ; Noorollahi Romani, M ; Manzuri, M. T ; Mehrparvar, A ; Sharif University of Technology
    2009
    Abstract
    Based on the observation that dynamic occurrence of zeros in the cache access stream and cache-resident memory values of ordinary programs exhibit a strong bias towards zero, this paper presents a novel CMOS four-transistor (4T) SRAM cell for very high density and low power cache applications. This cell retains its data with leakage current and positive feedback without refresh cycle. The new cell size is 20% smaller than a conventional six-transistor cell using same design rules and delay access of a cache based on new 4T SRAM cell is 32% smaller than a cache based on 6T SRAM cell. Also the dynamic and static power consumption of new cell is 40% and 20% smaller than 6T SRAM cell,... 

    A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks

    , Article Peer-to-Peer Networking and Applications ; 2018 , Pages 1-18 ; 19366442 (ISSN) Nikravan, M ; Movaghar, A ; Hosseinzadeh, M ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    The Internet of Things (IoT) presents a new paradigm of the future Internet that intends to provide interactive communication between various processing objects via heterogeneous networks. The IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) is an IPv6 adaptation sub-layer and provides the requirements of IP connectivity between resource-constrained devices in lossy, low power networks. Since the size of a packet in the IPv6 is larger than the size of a frame in the IEEE 802.15.4, the 6LoWPAN adaptation layer performs packet fragmentation. In this paper, first, the 6LoWPAN fragmentation mechanism in terms of security issues is analyzed and then, fragment duplication attack which... 

    A lattice-based compress-and-forward strategy for Gaussian two-way relay channel with direct links

    , Article IEEE Wireless Communications Letters ; Volume 5, Issue 5 , 2016 , Pages 500-503 ; 21622337 (ISSN) Ghasemi Goojani, S ; Mardani, S ; Behroozi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    In this letter, the Gaussian two-way relay channel with direct links is investigated in which two users aim at exchanging their messages with the help of a relay node. We propose a new lattice-based compress-and-forward strategy and obtain its achievable rate-region. We show that the proposed scheme is superior to all previously known achievable schemes for channel gains larger than one. In particular, under the symmetric case, the proposed scheme is able to achieve a capacity region within 0.5 bit or (1/2)log 3 ≅ 0.79 bit, depending on the power of the relay