Loading...
Search for: community
0.018 seconds
Total 1381 records

    Three-particle deterministic secure and high bit-rate direct quantum communication protocol

    , Article Quantum Information Processing ; Volume 12, Issue 7 , 2013 , Pages 2441-2451 ; 15700755 (ISSN) Jahanshahi, S ; Bahrampour, A ; Zandi, M. H ; Sharif University of Technology
    2013
    Abstract
    A scheme for deterministic secure and high bit-rate direct communication without resorting to a distinct control interval is proposed. It utilizes three entangled qubits, and presents higher bit transfer rate of information and higher security. The security of protocol is asserted by introducing a security control for each transferred bit. The protocol is investigated for a class of individual attacks and it is explicitly showed that the protocol has a high security even in the presence of channel loss  

    Network-on-SSD: A scalable and high-performance communication design paradigm for SSDs

    , Article IEEE Computer Architecture Letters ; Volume 12, Issue 1 , January-June , 2013 , Pages 5-8 ; 15566056 (ISSN) Tavakkol, A ; Arjomand, M ; Sarbazi Azad, H ; Sharif University of Technology
    2013
    Abstract
    In recent years, flash memory olid state disks (SSDs) have shown a great potential to change storage infrastructure because of its advantages of high speed and high throughput random access. This promising storage, however, greatly suffers from performance loss because of frequent ''erase-before-write'' and ''garbage collection'' operations. Thus, novel circuit-level, architectural, and algorithmic techniques are currently explored to address these limitations. In parallel with others, current study investigates replacing shared buses in multi-channel architecture of SSDs with an interconnection network to achieve scalable, high throughput, and reliable SSD storage systems. Roughly speaking,... 

    Channel simulation via interactive communications

    , Article IEEE International Symposium on Information Theory - Proceedings ; 2012 , Pages 3053-3057 ; 9781467325790 (ISBN) Yassaee, M. H ; Gohari, A ; Aref, M. R ; Sharif University of Technology
    IEEE  2012
    Abstract
    In this paper, we study the problem of channel simulation via interactive communication, known as the coordination capacity, in a two-terminal network. We assume that two terminals observe i.i.d. copies of two random variables and would like to generate i.i.d. copies of two other random variables jointly distributed with the observed random variables. The terminals are provided with two-way communication links, and shared common randomness, all at limited rates. Two special cases of this problem are the interactive function computation studied by Ma and Ishwar, and the tradeoff curve between one-way communication and shared randomness studied by Cuff. The latter work had inspired Gohari and... 

    Beyond the cut-set bound: Uncertainty computations in network coding with correlated sources

    , Article IEEE International Symposium on Information Theory - Proceedings, 31 July 2011 through 5 August 2011 ; July , 2011 , Pages 598-602 ; 21578104 (ISSN) ; 9781457705953 (ISBN) Gohari, A. A ; Yang, S ; Jaggi, S ; Sharif University of Technology
    2011
    Abstract
    Cut-set bounds on achievable rates for network communication protocols are not in general tight. In this paper we introduce a new technique for proving converses for the problem of transmission of correlated sources in networks, that results in bounds that are tighter than the corresponding cut-set bounds. We also define the concept of "uncertainty region" which might be of independent interest. We provide a full characterization of this region for the case of two correlated random variables. The bounding technique works as follows: on one hand we show that if the communication problem is solvable, the uncertainty of certain random variables in the network with respect to imaginary parties... 

    Experimental study of a chaos-based communication system in the presence of unknown transmission delay

    , Article International Journal of Circuit Theory and Applications ; Volume 38, Issue 10 , May , 2010 , Pages 1013-1025 ; 00989886 (ISSN) Jafari, S ; Haeri, M ; Tavazoei, M. S ; Sharif University of Technology
    2010
    Abstract
    In this paper, a chaos-based communication system in the presence of unknown transmission delay is studied. First, under master/slave configurations, two chaotic Chen systems as the slaves are synchronized with a master one via unidirectional coupling. Then at the transmitter, information of an image is embedded within a slave-one signal and the resultant signal along with another one which is used to determine the transmission delay is transmitted to the receiver. At the receiver, using the received signals and the slave-two counterpart signal, the image is recovered. The performance of the proposed method is experimentally illustrated  

    On reliable routing in wireless networks with diversity

    , Article 4th IEEE and IFIP International Conference on Wireless and Optical Communications Networks, WOCN 2007, Singapore, 2 July 2007 through 4 July 2007 ; 2007 ; 1424410045 (ISBN); 9781424410040 (ISBN) Shariatpanahi, P ; Foroughmand Aarabi, H ; Sharif University of Technology
    2007
    Abstract
    Many forms of diversity have been exploited in communication systems to combat fading nature of wireless channels. Some examples are time diversity, frequency diversity, space diversity and multiuser diversity. However, another form of diversity inherent in any wireless network, which is usually not exploited, is the diversity due to the shared medium of propagation. When in a network one node transmits to the other node, all the other nodes may hear this transmission and some of them can decode the data as well. This data can be used later to enhance the end-to-end network reliability. Previous works mostly consider some special cases of relay nodes configurations, not the general case. In... 

    A comparative evaluation of DECT, PACS, and PHS standards for wireless local loop applications

    , Article IEEE Communications Magazine ; Volume 39, Issue 5 , 2001 , Pages 156-163 ; 01636804 (ISSN) Momtahan, O ; Hashemi, H ; Sharif University of Technology
    2001
    Abstract
    In a comparative analysis performance and capacity of DECT, PACS, and PHS for wireless local loop applications have been investigated. This article reports the results of both qualitative and quantitative analyses. The qualitative evaluation consists of a detailed comparison of the parameters of each standard and their relevance in WLL applications. In the quantitative analysis detailed simulations were performed covering diverse sets of conditions. The results of both types of analysis are presented. A major conclusion is that all three standards provide satisfactory performance for WLL applications. For low traffic environments PACS, which can employ larger cells, performs better than the... 

    Comparative evaluation of DECT, PACS, and PHS standards for wireless local loop applications

    , Article IEEE Personal Communications ; Volume 7, Issue 3 , 2000 , Pages 35-41 ; 10709916 (ISSN) Momtahan, O ; Hashemi, H ; Sharif University of Technology
    2000
    Abstract
    In a comparative analysis performance and capacity of DECT, PACS, and PHS for WLL applications have been investigated. This article reports the results of both qualitative and quantitative analysis. The qualitative evaluation consists of a detailed comparison of the parameters of each standard and their relevance in WLL applications. In the quantitative analysis detailed simulations have been performed covering diversified sets of conditions. The results of both types of analysis are presented. A major conclusion is that all three standards provide satisfactory performance for WLL applications. For low-traffic environments PACS, which can employ larger cells, performs better than the other... 

    On the performance of spectrally-encoded spread-time ultrawideband CDMA communication systems [electronic resource]

    , Article IEEE Transactions on Wireless Communications ; 2008 Vol. 7, No. 11 Farhang, M ; Salehi, J. A ; Sharif University Of Technology
    Abstract
    In this paper we study the performance of spectrally-encoded spread-time (SE/ST) technique when applied to ultrawideband (UWB) signals in the context of wireless code-division multiple-access (CDMA) communication. In this technique UWB pulses are spectrally encoded with pseudorandom codes that are assigned uniquely to each user. We shall show that the SE/ST ultrawideband system provides an appropriate multi-user capacity in realistic UWB channels, along with the ability of narrowband interference (NBI) suppression. To this end, after obtaining a suitable statistical model for spectrally encoded spread-time signals, we investigate the performance of the system in the presence of... 

    Capacity maximization in MIMO vehicular communication using a novel antenna selection algorithm

    , Article 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, Cagliari, Sardinia ; 2013 , Pages 1246-1251 ; 9781467324793 (ISBN) Mousavi, H. S ; Khalighinejad, B ; Khalaj, B. H ; Sharif University of Technology
    2013
    Abstract
    The capacity of multiple-input multiple-output (MIMO) systems in vehicular communication is investigated throughout this paper. The goal is to consider a link between a vehicle-side and a road-side unit in presence of line-of-sight in a way that the road-side end uses all available antennas but the vehicle-side end chooses a subset of available antennas such that the link capacity becomes maximized. In order to maximize the channel capacity a criterion is derived that forces some circumstances about the configuration of antenna array in vehicle-side. If such circumstances are satisfied the channel capacity will be at its maximum. By proposing an antenna selection algorithm, the conditions... 

    Secure noisy network coding

    , Article 2013 Iran Workshop on Communication and Information Theory ; 2013 ; 9781467350235 (ISBN) Yassaee, M. H ; Aref, M. R ; Gohari, A ; Sharif University of Technology
    2013
    Abstract
    In this paper we use the Output Statistics of Random Binning (ORSB) framework to extend the noisy network coding of Lim et al. to include an eavesdropper  

    The relationship between an EFL teacher's gender and students' willingness to communicate

    , Article International Journal of Communication and Linguistic Studies ; Volume 10, Issue 4 , 2013 , Pages 17-29 ; 23277882 (ISSN) Khosravizadeh, P ; Pakzadian, S. S
    Common Ground Publishing  2013
    Abstract
    Learning a foreign language encompasses a process of trial and error that can lead to the progression of the learner's interlanguage, meaning that the learners make use of their language knowledge that receives feedback and brings about progress through diagnosis of the problems and being corrected by the teacher. Therefore, there exists a need to analyze the underlying reasons causing the students to remain taciturn with a low willingness to communicate (WTC) during a language class. There has been much work done investigating the role of the learner's stable personal characteristics (traits) along with their situational changes at a specific time (states) that influence the student's... 

    Feature-based content dissemination process in opportunistic networks

    , Article 26th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2015, 30 August 2015 through 2 September 2015 ; Volume 2015-December , 2015 , Pages 1464-1469 ; 9781467367820 (ISBN) Zehni, M ; Elhami, G ; Pakravan, M. R ; Sharif University of Technology
    Abstract
    In order to respond to drastically increased traffic demands in mobile networks such as cellulars, opportunistic communication has been introduced as a data offloading strategy. Delivering the contents using peer-to-peer data dissemination is more preferable compared to epidemic diffusion schemes. To implement peer-to-peer dissemination, one needs to define the peer selection and content dissemination policies. Efficient content dissemination relies on the selection of suitable peers. Besides that, the peers require to choose what contents to be transmitted between them. In this paper, we propose multi-level master/slave peer selection algorithm (MMSA) and variance-based multi-metric chunk... 

    A game-theoretic approach for power allocation in bidirectional cooperative communication

    , Article IEEE Wireless Communications and Networking Conference, WCNC, 18 April 2010 through 21 April 2010 ; April , 2010 ; 15253511 (ISSN) ; 9781424463985 (ISBN) Janzamin, M ; Pakravan, M ; Sedghi, H ; Sharif University of Technology
    2010
    Abstract
    Cooperative communication exploits wireless broadcast advantage to confront the severe fading effect on wireless communications. Proper allocation of power can play an important role in the performance of cooperative communication. In this paper, we propose a distributed gametheoretical method for power allocation in bidirectional cooperative communication networks. In this work, we consider two nodes as data sources who want to cooperate in sending data to the destination. In addition to being data source, each source node has to relay the other's data. We answer the question: How much power each node contributes for relaying other node's data? We use Stackelberg game which is an... 

    Efficient codebook design for digital communication through compressed voice channels

    , Article IET Communications ; Volume 10, Issue 18 , 2016 , Pages 2613-2620 ; 17518628 (ISSN) Boloursaz Mashhadi, M ; Behnia, F ; Sharif University of Technology
    Institution of Engineering and Technology  2016
    Abstract
    The common voice channels existing in cellular communication networks provide reliable, ubiquitously available and top priority communication mediums. These properties make voice dedicated channels an ideal choice for high priority, real time communication. However, such channels include voice codecs that hamper the data flow by compressing the waveforms prior to transmission. This study designs codebooks of speech-like symbols for reliable data transfer through the voice channel of cellular networks. An efficient algorithm is proposed to select proper codebook symbols from a database of natural speech to optimise a desired objective. Two variants of this codebook optimisation algorithm are... 

    Data hiding robust to mobile communication vocoders

    , Article IEEE Transactions on Multimedia ; Volume 18, Issue 12 , 2016 , Pages 2345-2357 ; 15209210 (ISSN) Kazemi, R ; Perez Gonzalez, F ; Akhaee, M. A ; Behnia, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    The swift growth of cellular mobile networks in recent years has made voice channels almost accessible everywhere. Besides, data hiding has recently attracted significant attention due to its ability to imperceptibly embed side information that can be used for signal enhancement, security improvement, and two-way authentication purposes. In this regard, we aim at proposing efficient schemes for hiding data in the widespread voice channel of cellular networks. To this aim, our first contribution is to model the channel accurately by considering a linear filter plus a nonlinear scaling function. This model is validated through experiments with true speech signals. Then we leverage on this... 

    Intelligent rescuer robot for detecting victims accurately in natural disasters

    , Article 2nd International Conference on Knowledge-Based Engineering and Innovation, 5 November 2015 through 6 November 2015 ; 2015 , Pages 1097-1105 ; 9781467365062 (ISBN) Pouransari, A ; Pouransari, H ; Madadpour Inallou, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    Robotics has become a rapidly growing science that will enter the life of all classes of people in a few years. That is why we have tried to work in this field. The project that we are going to describe here is a robotic rescue team that uses its designed systems and utilized detection methods to help people and help rescuers to accurately detect victims when natural disasters such as floods and earthquakes occur. However, in addition to the functions listed, this robotic team can help in the identification of historic centers, help to protect the environment, be useful in mapping, and help the traffic police. The technologies used in this project can be implemented in various industrial... 

    Mobility-Aware resource allocation in vlc networks using t-step look-ahead policy

    , Article Journal of Lightwave Technology ; Volume 36, Issue 23 , 2018 , Pages 5358-5370 ; 07338724 (ISSN) Dastgheib, M. A ; Beyranvand, H ; Salehi, J. A ; Maier, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Visible light communication (VLC) uses huge license-free spectral bandwidth of visible light for high-speed wireless communication. Since each VLC access point covers a small area, handovers of mobile users are inevitable. In order to deal with these handovers, developing fast and effective resource allocation algorithms is a challenge. This paper introduces the problem of mobility-aware optimization of resources in VLC networks using the T-step look-ahead policy and employing the notion of handover efficiency. It is shown that the handover efficiency can correlate the overall performance of the network with future actions based on the mobility of users. Due to the stationary nature of... 

    Holographic diffusers: application for indoor infrared communications

    , Article International Journal of Wireless Information Networks ; Volume 4, Issue 4 , 10-01 , 1997 , pp 259-274 ; 1572-8129 Pakravan, M. R ; Simova, E ; Kavehrad, M ; Sharif University of Technology
    1997
    Abstract
    Diffused infrared transmission is one of thepreferred techniques used in indoor wirelesscommunications. Tolerance to shadowing and a lack ofalignment requirements are among the many advantagesoffered by this technique compared to the line-of-sighttechniques. However, it has its disadvantages, namelyhigh path loss and multipath dispersion. The limitationimposed by eye-safety requirements restricts the transmitted power. Therefore, efficient useof transmitted optical power is the key for practicalbroadband infrared systems. In this paper, we report onusing a holographic diffuser for shaping of infrared radiation pattern in an indoorinfrared transmission system. The holographic diffusershave... 

    A novel granular approach for detecting dynamic online communities in social network

    , Article Soft Computing ; Volume 23, Issue 20 , 2019 , Pages 10339-10360 ; 14327643 (ISSN) Cheraghchi, H. S ; Zakerolhosseini, A ; Bagheri Shouraki, S ; Homayounvala, E ; Sharif University of Technology
    Springer Verlag  2019
    Abstract
    The great surge in the research of community discovery in complex network is going on due to its challenging aspects. Dynamicity and overlapping nature are among the common characteristics of these networks which are the main focus of this paper. In this research, we attempt to approximate the granular human-inspired viewpoints of the networks. This is especially helpful when making decisions with partial knowledge. In line with the principle of granular computing, in which precision is avoided, we define the micro- and macrogranules in two levels of nodes and communities, respectively. The proposed algorithm takes microgranules as input and outputs meaningful communities in rough...