Loading...
Search for: correlation-coefficients
0.009 seconds
Total 83 records

    Using self-adaptive evolutionary algorithm to improve the performance of an extreme learning machine for estimating soil temperature

    , Article Computers and Electronics in Agriculture ; Volume 124 , 2016 , Pages 150-160 ; 01681699 (ISSN) Nahvi, B ; Habibi, J ; Mohammadi, K ; Shamshirband, S ; Al Razgan, O. S ; Sharif University of Technology
    Elsevier B.V 
    Abstract
    In this study, the self-adaptive evolutionary (SaE) agent is employed to structure the contributing elements to process the management of extreme learning machine (ELM) architecture based on a logical procedure. In fact, the SaE algorithm is utilized for possibility of enhancing the performance of the ELM to estimate daily soil temperature (ST) at 6 different depths of 5, 10, 20, 30, 50 and 100 cm. In the developed SaE-ELM model, the network hidden node parameters of the ELM are optimized using SaE algorithm. The precision of the SaE-ELM is then compared with the ELM model. Daily weather data sets including minimum, maximum and average air temperatures (Tmin, Tmax and Tavg), atmospheric... 

    A distortion outer bound for communicating correlated gaussian sources over a gaussian MAC

    , Article IEEE Communications Letters ; Volume 21, Issue 7 , 2017 , Pages 1457-1460 ; 10897798 (ISSN) Setayesh, M ; Behroozi, H ; Khalaj, B. H ; Sharif University of Technology
    Abstract
    In this letter, we consider two problems of sending a bivariate Gaussian source through a two-user Gaussian non-orthogonal multiple-access channel. We provide a new distortion outer bound for the considered joint source-channel coding problems, which significantly reduces the gap between inner and outer bounds of the distortion for correlation coefficients below a threshold. Furthermore, numerical results show, that under some conditions, our proposed outer bound matches with the inner bound obtained via the separate source-channel coding scheme, which proves the optimality of this scheme. © 1997-2012 IEEE  

    Finite state machine based countermeasure for cryptographic algorithms

    , Article 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, 6 September 2017 through 7 September 2017 ; 2018 , Pages 58-63 ; 9781538665602 (ISBN) Attari, S ; Rezaei Shahmirzadi, A ; Salmasizadeh, M ; Gholampour, I ; Sharif University of Technology
    Abstract
    In this work, we present a novel FPGA-based implementation of the AES algorithm which has a two-layered resistance against power analysis attacks. Our countermeasure is based on the concept of finite state machine equipped with a random number generator. Beyond masking the intermediate variables as the first layer of defense, we randomize the sequences of operations and add dummy computations as the second layer of defense. Therefore, the first order attack is prevented and the number of power traces needed for a successful second order attack is vastly increased and the correlation coefficient is decreased, as expected. © 2017 IEEE