Loading...
Search for: community
0.01 seconds
Total 1381 records

    An adaptive secure channel coding scheme for data transmission over LEO satellite channels

    , Article Scientia Iranica ; Volume 13, Issue 4 , 2006 , Pages 373-378 ; 10263098 (ISSN) Payandeh, A ; Ahmadian, M ; Aref, M. R ; Sharif University of Technology
    Sharif University of Technology  2006
    Abstract
    Both secure and error control coding are very extensive subjects, each with a variety of subdisciplines. A secure channel coding (joint encryption-channel coding) scheme provides both data secrecy and data reliability in one process to combat problems in an insecure and unreliable channel. In this paper, a joint encryption-channel coding scheme is developed, based on concatenated turbo codes for more efficient and secure transmission of LEO satellite data. Reliability and security are achieved by adapting the pseudo-random puncturing strategy with a change of distance between satellites and ground stations in the communication séance, an issue further burdened by reducing energy consumption... 

    Can a multi-hop link relying on untrusted amplify-and-forward relays render security?

    , Article Wireless Networks ; Volume 27, Issue 1 , 2021 , Pages 795-807 ; 10220038 (ISSN) Tatar Mamaghani, M ; Kuhestani, A ; Behroozi, H ; Sharif University of Technology
    Springer  2021
    Abstract
    Cooperative relaying is utilized as an efficient method for data communication in wireless sensor networks and the Internet of Things. However, sometimes due to the necessity of multi-hop relaying in such communication networks, it is challenging to guarantee the secrecy of cooperative transmissions when the relays may themselves be eavesdroppers, i.e., we may face with the untrusted relaying scenario where the relays are both necessary helpers and potential adversary. To obviate this issue, a new cooperative jamming scheme is proposed in this paper, in which the data can be confidentially communicated from the source to the destination through multiple untrusted relays. In our proposed... 

    Bacterial receiver prototype for molecular communication using rhamnose operon in a microfluidic environment

    , Article IEEE Transactions on Nanobioscience ; Volume 20, Issue 4 , 2021 , Pages 426-435 ; 15361241 (ISSN) Amerizadeh, A ; Mashhadian, A ; Farahnak Ghazani, M ; Arjmandi, H. R ; Alsadat Rad, M ; Shamloo, A ; Vosoughi, M ; Nasiri Kenari, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Bacterial populations are promising candidates for the development of the receiver and transmitter nanomachines for molecular communication (MC). A bacterial receiver is required to uptake the information molecules and produce the detectable molecules following a regulation mechanism. We have constructed a novel bacterial MC receiver using an inducible bacterial L-rhamnose-regulating operon. The proposed bacterial receiver produces green fluorescent protein (GFP) in response to the L-rhamnose information molecules following a quite fast regulation mechanism. To fabricate the receiver, the bacterial population has been transformed using a plasmid harboring L-rhamnose operon genes and gene... 

    Multi-agent machine learning in self-organizing systems

    , Article Information Sciences ; Volume 581 , 2021 , Pages 194-214 ; 00200255 (ISSN) Hejazi, E ; Sharif University of Technology
    Elsevier Inc  2021
    Abstract
    This paper develops a novel insight and procedure that includes a variety of algorithms for finding the best solution in a structured multi-agent system with internal communications and a global purpose. In other words, it finds the optimal communication structure among agents and the optimal policy in this structure. First, a unique reinforcement learning algorithm is proposed to find the optimal policy of each agent in a fixed structure with non-linear function approximators like artificial neural networks (ANN) and with eligibility traces. Secondly, a mechanism is presented to perform self-organization based on the information of the learned policy. Finally, an algorithm that can discover... 

    Digital divides,the Internet and social media uses among Afghans in Iran

    , Article Technology in Society ; Volume 70 , 2022 ; 0160791X (ISSN) Jauhiainen, J. S ; Eyvazlu, D ; Junnila, J ; Virnes, A ; Sharif University of Technology
    Elsevier Ltd  2022
    Abstract
    The studies on forced migrants' digitally mediated communication and transnational practices have not sufficiently addressed contexts in which migrants are imposed with strong regulations on their physical mobility and information and communication technology (ICT), Internet, and social media uses. This article studied Internet and social media uses, digital divides (access, use, and the impact of Internet and social media), and digital transnational practices among Afghans in Iran. More than three million Afghans live in different legal, economic, and social positions in Iran. The analysis was based on surveys with 2003 Afghan refugees, other legally authorized Afghan immigrants, and... 

    Towards high data-rate diffusive molecular communications: A review on performance enhancement strategies

    , Article Digital Signal Processing: A Review Journal ; Volume 124 , 2022 ; 10512004 (ISSN) Gursoy, M. C ; Nasiri Kenari, M ; Mitra, U ; Sharif University of Technology
    Elsevier Inc  2022
    Abstract
    Diffusive molecular communications (DiMC) have recently gained attention as a candidate for nano- to micro- and macro-scale communications due to its simplicity and energy efficiency. As signal propagation is solely enabled by Brownian motion mechanics, DiMC faces severe inter-symbol interference (ISI), which limits reliable and high data-rate communications. Herein, recent literature on DiMC performance enhancement strategies is surveyed; key research directions are identified. Signaling design and associated design constraints are presented. Studies on fundamental information theoretic limits of DiMC channel are reviewed. Classical and novel transceiver designs are discussed with an... 

    Reducing storage and communication latencies in vehicular edge cloud

    , Article 2022 Joint European Conference on Networks and Communications and 6G Summit, EuCNC/6G Summit 2022, 7 June 2022 through 10 June 2022 ; 2022 , Pages 291-296 ; 9781665498715 (ISBN) Kishani, M ; Becvar, Z ; Nikooroo, M ; Asadi, H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    Low-latency data access is crucial in edge clouds serving autonomous vehicles. Storage I/O caching is a promising solution to deliver the desired storage performance at a reasonable cost in vehicular edge platforms. Current storage I/O caching methods, however, are not specialized for workload characteristics and demands of autonomous vehicles and/or do not consider the communication latency between the vehicle and the base station hosting the edge cloud node. In this work, we propose a storage mechanism for vehicular edge cloud platforms taking communication, I/O cache, and storage latencies into account. We evaluate our proposed framework using realistic storage traces of vehicular... 

    Efficient secure channel coding based on quasi-cyclic low-density parity-check codes

    , Article IET Communications ; Volume 3, Issue 2 , 2009 , Pages 279-292 ; 17518628 (ISSN) Sobhi Afshar, A. A ; Eghlidos, T ; Aref, M. R ; Sharif University of Technology
    2009
    Abstract
    A secure channel coding (joint encryption-channel coding) scheme provides both data security and reliability in one combined process to achieve faster processing and/or more efficient implementation. The issue of using quasi-cyclic low-density parity-check (QC-LDPC) codes in a symmetric-key secure channel coding scheme is addressed. A set of this class of LDPC codes has recently been recommended by the NASA Goddard Space Flight Center for near-earth and deep-space communications. The proposed scheme provides an efficient error performance, an acceptable level of security and a low-complexity practicable implementation. The results indicate that the proposed scheme can efficiently employ... 

    Simultaneous Group Membership with Members Collaboration in Wireless Networks Using Hierarchical Approach

    , M.Sc. Thesis Sharif University of Technology Mortazavi, Anahita (Author) ; Nemaney Pour, Alireza (Supervisor)
    Abstract
    Recently, demand for using variant applications in distributed networks has been increased largely. Most of these applications are based on group communication.In distributed group communication, two important factors need to be considered, group construction, and Group Key Management (GKM). The group construction specifies the process of constructing a new group by cooperation between distributed users. As well, GKM ensures re-freshness of the group key after each join/leave operation. Both of these tasks must be done by collaboration between members. This leads to imposing complexity and communication overhead to the system.This thesis proposes efficient methods for group construction and... 

    Iranian EFL Learner's Willingness to Communicate: The Roles of Motivation, Communication Anxiety, Linguistic Self-confidence, and Attitude

    , M.Sc. Thesis Sharif University of Technology Mesbah, Zahra (Author) ; Alemi, Minoo (Supervisor) ; Tajeddin, Zia (Co-Advisor)
    Abstract
    Willingness to communicate (WTC) has recently received great attention in the area of second language learning. Thus, the concept of willingness to communicate and what would influence the students' willingness to communicate gain importance. The current study employed a hybrid design to probe Iranian students' willingness to communicate. First, self-report questionnaires were administered to 431 language learners to collect quantitative data. Then, interviews were conducted with 41 randomly selected learners who had already completed the questionnaires. Pearson correlation coefficient, one-way ANOVA, independent t-test through SPSS .16 and the Structural Equation Model (SEM) analyses... 

    Content Based Community Extraction in Social Networks from Stream Data

    , M.Sc. Thesis Sharif University of Technology Sadegh, Mohammad Mehdi (Author) ; Abolhassani, Hassan (Supervisor)
    Abstract
    Increasing in social communication via electronic ways has been made social network analysis of these communications more important each day. One of the most important aspects in social network analysis is community detection in such networks. There are many different ways to extract communities from social graph structure which in some of them the content of communication between actors has been noticed in community extraction algorithm. In this thesis after a short survey over advantages and disadvantages of existing methods for community detection, a new method for extracting communities from social networks has been suggested which in addition to streaming property of data it spot the... 

    Ultrashort Pulse Receiver Design Via Statistical Invariance Principle

    , Ph.D. Dissertation Sharif University of Technology Farhang, Mahmoud (Author) ; Salehi, Javad (Supervisor)
    Abstract
    With the emergence and development of ultra broadband communication systems incorporating ultrashort pulses, the design of suitable receiver structures became one the most significant problems in such systems; since due the limited bandwidth and speed of current electronic devices, most of the existing receiver structures cannot be used properly. In the field of radio communications, the design of simple and low power consumption receivers for ultrawideband (UWB) and millimeter wave band communication systems, which do not rely on complex channel estimation mechanisms, is of much interest. In ultrashort light pulse optical communication systems –and specially coherent optical CDMA systems–... 

    Zero-error Coding Based ISI Mitigation for Molecular Communication Systems

    , M.Sc. Thesis Sharif University of Technology Abadi, Nastaran (Author) ; Nasiri Kenari, Masoumeh (Supervisor) ; Mirmohseni, Mahtab (Supervisor)
    Abstract
    Molecular communication which is inspired by nature has emerged as a promising field in recent years for its potential applications in medicine, environment, tissue engineering, industry and so on. In molecular communication, molecules are the information carriers. One of the mechanisms of movement of molecules that does not require any infrastructure is Diffusion. Diffusion-based molecular communication in which molecules diffuse in the medium in order to reach the receiver, has two major problems: delayed and lost molecules. Due to the randomness of diffusion, molecules are usually received with varied delays, their order of reception is different from the order of transmission and even... 

    Inferential Account of Communication, and Information Theory

    , M.Sc. Thesis Sharif University of Technology Sadeh, Sadra (Author) ; Ghadakpour, Laleh (Supervisor)
    Abstract
    The inferential approach, in contrast with classic model of coding-decoding, regards communication something more than the mere decoding of the received message, and points to the inference as a pivotal element for the discovery of the intentional meaning in a communication. This line of research was beginned with the works of Paul Grice in the literature of the pragmatics. His theory proposes its cooperation principle and conversational maxims for that aim.Relevance theory, while accepting the pivotal role of the inference, replaces cognitive principle of relevance with those Gricean rules. Hence, it proposes a more comprehensive explanation of communication, with more simplicity and... 

    Design and Simulation of a High Speed Li-Fi Receiver

    , M.Sc. Thesis Sharif University of Technology Safiallah, Mahyar (Author) ; Fotowat Ahmadi, Ali (Supervisor)
    Abstract
    LiFi is a bidirectional wireless optical networking technology that uses commercial LEDs for data transmission. In simpler terms, LiFi is considered a light-based WiFi that uses light instead of radio waves to transmit information. Using light to transmit data allows LiFi to deliver a couple of advantages, such as working in areas susceptible to electromagnetic, working across higher bandwidth while offering higher transmission speeds. Finally, the security of this technology is much more than other ways of communication since the light cannot penetrate through walls and doors, so other people who are not in the room could not access data.In this dissertation, a Li-Fi receiver that uses... 

    Reconfigurable cluster-based networks-on-chip for application-specific MPSoCs

    , Article Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors ; 9-11 July , 2012 , pp. 153-156 ; ISSN: 10636862 ; ISBN: 9780769547688 Modarressi, M ; Sarbazi-Azad, H ; Sharif University of Technology
    Abstract
    In this paper, we propose a reconfigurable NoC in which a customized topology for a given application can be implemented. In this NoC, the nodes are grouped into some clusters interconnected by a reconfigurable communication infrastructure. The nodes inside a cluster are connected by a fixed topology. From the traffic management perspective, this structure benefits from the interesting characteristics of the mesh topology (efficient handling of local traffic where each node communicates with its neighbors), while avoids its drawbacks (the lack of short paths between remotely located nodes). We then present a design flow that maps the frequently communicating tasks of a given application into... 

    Colluding eavesdroppers in large cooperative wireless networks

    , Article IWCIT 2014 - Iran Workshop on Communication and Information Theory ; 2014 ; ISBN: 9781479948789 Mirmohseni, M ; Papadimitratos, P ; Sharif University of Technology
    Abstract
    Securing communication against non-colluding passive eavesdroppers has been extensively studied. Colluding eavesdroppers were considered for interference-limited large networks. However, collusion was not investigated for large cooperative networks. This paper closes this gap: we study the improvement the eavesdroppers achieve due to collusion in terms of the information leakage rate in a large cooperative network. We consider a dense network with nl legitimate nodes, ne eavesdroppers, and path loss exponent α ≥ 2. We show that if ne (2+2/α) (log ne)γ = o(n l) holds, for some positive γ, then zero-cost secure communication is possible; i.e., ne colluding eavesdroppers can be tolerated. This... 

    Diffusion based molecular communication: A simple near optimal receiver

    , Article IWCIT 2014 - Iran Workshop on Communication and Information Theory ; 7-8 May , 2014 ; Print ISBN: 9781479948789 Mosayebi, R ; Arjmandi, H ; Gohari, A ; Kenari, M. N ; Mitra, U ; Sharif University of Technology
    Abstract
    Nanonetworking indicates new solutions for many applications in biomedical and industrial fields. In this paper, we examine the diffusion-based molecular communication for information transmission in nano-networks. Design of practical decoders for resource-limited nano-networks requires an understanding the fundamental performance limits of memory-limited decoders. While some existing works in the literature do consider decoders with limited memory, to best of our knowledge, the tradeoff between memory and probability of error has not been studied in the literature. In this paper we make a first step by studying this tradeoff for a particular molecular communication channel between two... 

    From source model to quantum key distillation: An improved upper bound

    , Article IWCIT 2014 - Iran Workshop on Communication and Information Theory ; 2014 Keykhosravi, K ; Mahzoon, M ; Gohari, A ; Aref, M.R ; Sharif University of Technology
    Abstract
    In this paper we derive a new upper bound on the quantum key distillation capacity. This upper bound is an extension of the classical bound of Gohari and Anantharam on the source model problem. Our bound strictly improves the quantum extension of reduced intrinsic information bound of Christandl et al. Although this bound is proposed for quantum settings, it also serves as an upper bound for the special case of classical source model, and may improve the bound of Gohari and Anantharam. The problem of quantum key distillation is one in which two distant parties, Alice and Bob, and an adversary, Eve, have access to copies of quantum systems A, B, E respectively, prepared jointly according to... 

    Secure data over GSM based on algebraic codebooks

    , Article Proceedings of IEEE East-West Design and Test Symposium, EWDTS 2013, Rostov-on-Don ; 2013 ; 9781479920969 (ISBN) Boloursaz, M ; Kazemi, R ; Nashtaali, D ; Nasiri, M ; Behnia, F ; Sharif University of Technology
    2013
    Abstract
    This paper considers the problem of secure data communication through the Global System for Mobile communications (GSM). The algebraic codebook method for data transmission through the Adaptive Multi Rate 12.2Kbps voice channel is investigated and its maximum achievable data rate is calculated. Based on the vocoder channel properties, the method's Bit Error Rate (BER) performance is improved by repetition coding and classification methods. Simulation results show that by simultaneous application of repetition coding and clustering methods, the decoder's performance improves about 6.5% compared to the case of no clustering for 1Kbps data communication in AMR 4.75 voice codec