Loading...
Search for:
doosti-aref--a
0.154 seconds
Total 14964 records
Sequency index modulation: a novel index modulation for delay-sequency domain waveforms
, Article IEEE Wireless Communications Letters ; Volume 12, Issue 11 , 2023 , Pages 1911-1915 ; 21622337 (ISSN) ; Basar, E ; Arslan, H ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2023
Abstract
In this letter, the sequency domain is introduced as a novel resource to propose a new index modulation, which is named sequency index modulation (SeIM). In SeIM, information bits are implicitly conveyed through the indices of the activated sequencies enabling bit error rate (BER), spectral efficiency, and power efficiency enhancement. Also, two strategies are proposed to allocate power among the activated sequencies revealing a trade-off between BER and power efficiency. Moreover, results are analytically derived for the BER of SeIM decoder. Finally, the recently proposed orthogonal time sequency multiplexing modulation is utilized to evaluate the performance of SeIM over doubly-spread...
Universal superposition of orthogonal states
, Article Physical Review A ; Volume 96, Issue 5 , 2017 ; 24699926 (ISSN) ; Kianvash, F ; Karimipour, V
2017
Abstract
It is known that no quantum process can produce a predetermined superposition of unknown arbitrary states. It has already been shown that with some partial information about the states, one can produce with some probability such superpositions. In general the success probability of these machines, even for orthogonal states, are less than unity. Here we show that there are specific machines that can produce superpositions of orthogonal qubit states with unit probability. © 2017 American Physical Society
Synthesis of Coordination Polymers with Different Morphologies and Their Deployment in Solid Phase Microextraction of Volatile Organic Compounds in Environmental Samples
, M.Sc. Thesis Sharif University of Technology ; Bagheri, Habib (Supervisor)
Abstract
Coordination polymers are a wide range of metal-organic polymers that have good potential for use as extraction phase in solid phase extraction and solid phase microextraction. Also, these polymers can be synthesized in various morphologies such as nanorods, microspheres, nanofibers, etc. to demonstrate the effect of morphology on extraction efficiency.In this study, the extraction efficiency of a coordination polymer with two morphologies (nanorods and microspheres) and different nitrogen percentages was investigated in needle trap device using gas chromatography-mass spectrometry to measure polycyclic aromatic hydrocarbons as model analytes.PAHs were measured in conventional cigarette...
Superposition of Orthogonal States and No-go Theorems in Quantum Mechanics
, M.Sc. Thesis Sharif University of Technology ; Karimipour, Vahid (Supervisor)
Abstract
Quantum mechanics, because of its special structure, on one hand offers us possibilities for doing un-classical tasks and on the other hand imposes limitations on performing some quantum tasks. We know these limitations as no-go theorems in Quantum mechanics. Studying these no-go theorems and properties which can be used as Quantum resources, has a wide variety of applications in Quantum information and Quantum computation, also they can lead us to a deeper understanding of the Quantum mechanics theory.One of these non-classical properties is Superposition. Quantum superposition is both a source for other Quantum properties like entanglement, and a Quantum resource for Quantum tasks. But...
Nanorod coordination polymers for needle trap extraction of E-cigarettes and cigarettes smoke
, Article Microchemical Journal ; Volume 187 , 2023 ; 0026265X (ISSN) ; Soufi, G ; Bagheri, H ; Sharif University of Technology
Elsevier Inc
2023
Abstract
Nowadays, the issue of e-cigarettes gaining popularity among never-smokers and teenagers, thus becoming an emergent public health problem. Consequently, developing methods to monitor the toxic compounds in their smoke is a lucrative object. Herein, two coordination polymers (CPs) with nanorod and microsphere morphology are proposed as extractive phases in a needle trap device (NTD). The two synthesized CPs were characterized by FT-IR, SEM, BET, EDS, XPS and TGA. The extraction efficiency of two synthesized CPs was compared for polyaromatic hydrocarbons (PAHs) and as a result, the nanorods exhibited higher extraction and desorption efficiency. The prepared NTD filled with the nanorod CP was...
Seismic Vulnerability Detection of Shear Buildings Using Wavelet Transformation of Story Responses Via Deep Learning
, M.Sc. Thesis Sharif University of Technology ; Rahimzadeh Rofooei, Fayaz (Supervisor)
Abstract
This research aims to determine the severity of structural damage under earthquakes of varying intensities, taking into account the nonlinear behavior of structures. In recent years, identifying structural damage to prevent sudden collapse and avoid heavy human and financial losses has attracted considerable attention from researchers. Generally, the subject of structural diagnostics can be divided into localized and overall identification methods, with the overall identification approach further categorized into static and dynamic methods. In this study, a dynamic-based overall identification method is employed. Additionally, the identification of damage in large structures requires more...
A novel approach to radio direction finding and detecting the number of sources simultaneously: DMSAE algorithm
, Article Conference Proceedings- 34th European Microwave Conference, London, 12 October 2004 through 14 October 2004 ; Volume 2 , 2004 , Pages 745-748 ; 1580539920 (ISBN) ; Tadaion, A. A ; Aref, M. R ; Sharif University of Technology
2004
Abstract
In smart antenna systems, The localization and direction of desired source(s) must be known. In this paper, we introduce a method called "DMSAE" (Direction finding of Multiple Sources by Alternating Eliminations) to find the radio directions of signals impinging on an arbitrary antenna array and the number of the signals. This method which is based on the Minimum Variance Distortionless Response (MVDR) algorithm, can not only detect the direction and the number of sources, simultaneously, but also has better resolution ability compared to the other conventional direction finding algorithms. This method can also detect very weak sources when other powerful sources exist in the environment. In...
When is it possible to simulate a DMC channel from another?
, Article 2013 IEEE Information Theory Workshop, ITW 2013 ; Sept , 2013 , Page(s): 1 - 5 ; 9781479913237 (ISBN) ; Yassaee, M. H ; Aref, M. R ; Gohari, A
2013
Abstract
In this paper, we study the problem of simulating a DMC channel from another DMC channel. We assume that the input to the channel we are simulating is i.i.d. and that the transmitter and receivers are provided with common randomness at limited rates. We prove bounds for simulating point-to-point, MAC and broadcast channels. As a special case, we recover the achievability part of the result of Cuff for point-to-point channel simulation via a noiseless link and shared randomness
Improved related-key boomerang cryptanalysis of AES-256
, Article 2010 International Conference on Information Science and Applications, ICISA 2010, 21 April 2010 through 23 April 2010 ; April , 2010 ; 9781424459438 (ISBN) ; Sharifi, A ; Aref, M ; Sharif University of Technology
2010
Abstract
A specific class of differential cryptanalytic approach, known as Related Key Boomerang Attack, has been successfully applied to several symmetric cryptographic primitives in particular encryption schemes such as Advanced Encryption Standard (AES). In this paper, we propose a new related-key boomerang attack on 8-round AES-256, a couple of ones on 9-round following the work of Gorski et al. In the first one, we attacked 8-round AES-256 with the time complexity of 279 and the data complexity of 259. The extended 8-round attack on 9-round AES-256 is more efficient than previous attacks from both time and data complexity perspectives
On Körner-Marton's sum modulo two problem
, Article IWCIT 2015 - Iran Workshop on Communication and Information Theory, 6 May 2015 through 7 May 2015 ; May , 2015 ; 9781479982356 (ISBN) ; Gohari, A ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2015
Abstract
In this paper we study the sum modulo two problem proposed by Körner and Marton. In this source coding problem, two transmitters who observe binary sources X and Y, send messages of limited rate to a receiver whose goal is to compute the sum modulo of X and Y. This problem has been solved for the two special cases of independent and symmetric sources. In both of these cases, the rate pair (H(X|Y), H(Y|X)) is achievable. The best known outer bound for this problem is a conventional cut-set bound, and the best known inner bound is derived by Ahlswede and Han using a combination of Slepian-Wolf and Körner-Marton's coding schemes. In this paper, we propose a new outer bound which is strictly...
Joint source-channel coding using finite state integer arithmetic codes
, Article Proceedings of 2009 IEEE International Conference on Electro/Information Technology, EIT 2009, 7 June 2009 through 9 June 2009, Windsor, ON ; 2009 , Pages 19-22 ; 9781424433551 (ISBN) ; Payandeh, A ; Aref, M. R ; Sharif University of Technology
2009
Abstract
Inserting redundancy to arithmetic codes is a common strategy to add error detection capability to this well-known family of source codes. By using this strategy error correction is possible through some decoding algorithms such as Viterbi decoder. In this paper a system has proposed that uses finite state integer arithmetic codes (FSAC) as a joint source-channel code in combination with a cyclic redundancy check (CRC) and a List Viterbi decoder. The proposed scheme has shown better performance than previous ones. © 2009 IEEE
Performance comparison of the neyman-pearson fusion rule with counting rules for spectrum sensing in cognitive radio
, Article Iranian Journal of Science and Technology - Transactions of Electrical Engineering ; Volume 36, Issue E1 , 2012 , Pages 1-17 ; 22286179 (ISSN) ; Tadaion, A. A ; Derakhtian, M ; Aref, M. R ; Sharif University of Technology
2012
Abstract
Distributed spectrum sensing (DSS) is of great importance in Cognitive Radio, especially under fading or shadowing effects. In order to evaluate the performance of a distributed system, it is commonly compared with the centralized system as an upper performance bound. Now the question is whether or not one can obtain a distributed strategy serving as an upper bound to benchmark any distributed strategy, tighter than that of the centralized scheme. Here, we suggest employing the Neyman-Pearson (NP) fusion rule to achieve an upper bound. Furthermore, the analysis of a randomized fusion rule has been provided, which is a long-existing problem in this field. For this purpose, theoretical...
From source model to quantum key distillation: An improved upper bound
, Article IWCIT 2014 - Iran Workshop on Communication and Information Theory ; 2014 ; Mahzoon, M ; Gohari, A ; Aref, M.R ; Sharif University of Technology
2014
Abstract
In this paper we derive a new upper bound on the quantum key distillation capacity. This upper bound is an extension of the classical bound of Gohari and Anantharam on the source model problem. Our bound strictly improves the quantum extension of reduced intrinsic information bound of Christandl et al. Although this bound is proposed for quantum settings, it also serves as an upper bound for the special case of classical source model, and may improve the bound of Gohari and Anantharam. The problem of quantum key distillation is one in which two distant parties, Alice and Bob, and an adversary, Eve, have access to copies of quantum systems A, B, E respectively, prepared jointly according to...
Channel simulation via interactive communications
, Article IEEE International Symposium on Information Theory - Proceedings ; 2012 , Pages 3053-3057 ; 9781467325790 (ISBN) ; Gohari, A ; Aref, M. R ; Sharif University of Technology
IEEE
2012
Abstract
In this paper, we study the problem of channel simulation via interactive communication, known as the coordination capacity, in a two-terminal network. We assume that two terminals observe i.i.d. copies of two random variables and would like to generate i.i.d. copies of two other random variables jointly distributed with the observed random variables. The terminals are provided with two-way communication links, and shared common randomness, all at limited rates. Two special cases of this problem are the interactive function computation studied by Ma and Ishwar, and the tradeoff curve between one-way communication and shared randomness studied by Cuff. The latter work had inspired Gohari and...
Adaptive random puncturing based secure block turbo coding
, Article 2010 5th International Symposium on Telecommunications, IST 2010, 4 December 2010 through 6 December 2010 ; December , 2010 , Pages 216-220 ; 9781424481835 (ISBN) ; Payandeh, A ; Aref, M. R ; Sharif University of Technology
2010
Abstract
Reliability and security are two important subjects in modern digital communications. A secure channel coding scheme provides both of reliability and security in one process to combat problems in an unreliable and insecure channel. In this paper, a secure block turbo coding scheme will be proposed and analyzed. Security and reliability are based on pseudo-random puncturing. Simulation results show that this scheme has superior performance and high security
Perfectly secure index coding
, Article IEEE International Symposium on Information Theory - Proceedings, 14 June 2015 through 19 June 2015 ; Volume 2015-June , 2015 , Pages 1432-1436 ; 21578095 (ISSN) ; 9781467377041 (ISBN) ; Gohari, A ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2015
Abstract
In this paper, we investigate the index coding problem in the presence of an eavesdropper. Messages are to be sent from one transmitter to a number of legitimate receivers who have side information about the messages, and share a set of secret keys with the transmitter. We assume perfect secrecy, meaning that the eavesdropper should not be able to retrieve any information about the message set. This problem is a generalization of the Shannon's cipher system. We study the minimum key lengths for zero-error and perfectly secure index coding problems
On the equivalency of reliability and security metrics for wireline networks
, Article IEEE International Symposium on Information Theory - Proceedings, 25 June 2017 through 30 June 2017 ; 2017 , Pages 2713-2717 ; 21578095 (ISSN) ; 9781509040964 (ISBN) ; Gohari, A ; Aref, M. R ; Sharif University of Technology
2017
Abstract
'To be considered for the 2017 IEEE Jack Keil Wolf ISIT Student Paper Award' In this paper, we show the equivalency of weak and strong secrecy conditions for a large class of secure network coding problems. When we restrict to linear operations, we show the equivalency of 'perfect secrecy with zero-error constraint' and 'weak secrecy with-error constraint'. © 2017 IEEE
Analytical computation of spatial traffic distribution in a typical region of a cellular network by proposing a general mobility model
, Article 10th International Conference on Telecommunications, ICT 2003, 23 February 2003 through 1 March 2003 ; Volume 1 , 2003 , Pages 295-301 ; 0780376617 (ISBN); 9780780376618 (ISBN) ; Salehi, J. A ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2003
Abstract
We propose a general mobility model based on region splitting and mapping each subregion on a multi-server node. By using the theory of multi-class Jackson queueing network with multiserver nodes and employing the product-form solution for such queueing networks, we obtain an analytical form for the spatial traffic distribution in a typical region with specific number of users. To this end, we consider the spatial statistical pattern for new and handoff call arrivals and the ratio between these two types of arrivals. At last, we apply our new model to some simple mobility scenarios and compute the resultant active user's location densities. © 2003 IEEE
A flexible dynamic traffic model for reverse link CDMA cellular networks
, Article IEEE Transactions on Wireless Communications ; Volume 3, Issue 1 , 2004 , Pages 159-164 ; 15361276 (ISSN) ; Salehi, J. A ; Aref, M. R ; Sharif University of Technology
2004
Abstract
In this paper, we focus on the reverse link traffic analysis of a code-division multiple-access (CDMA) cellular network in dynamic environments. In this respect, we propose a new and flexible traffic model, which takes into account the interference-limitedness attribute of CDMA capacity as well as its soft-handoff feature. This new traffic model is developed according to interference-based call admission control (ICAC) method and a geographical structure with three regions. The main advantage of this traffic model is in its flexibility when we consider different traffic conditions including time-varying status of traffic in the neighboring cells
A semi-supervised ids for cyber-physical systems using a deep learning approach
, Article ISeCure ; Volume 15, Issue 3 Special Issue , 2023 , Pages 1-8 ; 20082045 (ISSN) ; Ahmadi, S ; Aref, M. R ; Sharif University of Technology
Iranian Society of Cryptology
2023
Abstract
Industrial control systems are widely used in industrial sectors and critical infrastructures to monitor and control industrial processes. Recently, the security of industrial control systems has attracted a lot of attention, because these systems are now increasingly interacting with the Internet. Classic systems are suffering from many security problems and with the expansion of Internet connectivity, they are now exposed to new types of threats and cyber-attacks. Addressing this, intrusion detection technology is one of the most important security solutions that is used in industrial control systems to identify potential attacks and malicious activities. In this paper, we propose Stacked...