Loading...
Search for: pad--p
0.094 seconds

    Design of signature sequences for overloaded CDMA and bounds on the sum capacity with arbitrary symbol alphabets

    , Article IEEE Transactions on Information Theory ; Volume 58, Issue 3 , 2012 , Pages 1441-1469 ; 00189448 (ISSN) Alishahi, K ; Dashmiz, S ; Pad, P ; Marvasti, F ; Sharif University of Technology
    2012
    Abstract
    In this paper, we explore some of the fundamentals of synchronous Code Division Multiple Access (CDMA) as applied to wireless and optical communication systems under very general settings (of any size) for the user symbols and the signature matrix entries. The channel is modeled by real/complex additive noise of arbitrary distribution. Two problems are addressed. The first problem concerns whether uniquely detectable overloaded matrices exist in the absence of additive noise under these general settings, and if so, whether there are any practical optimum detection algorithms. The second one is about the bounds for the sum channel capacity when user data and signature matrices employ any real... 

    MMSE denoising of sparse and non-gaussian AR(1) processes

    , Article ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, 20 March 2016 through 25 March 2016 ; Volume 2016-May , 2016 , Pages 4333-4337 ; 15206149 (ISSN) ; 9781479999880 (ISBN) Tohidi, P ; Bostan, E ; Pad, P ; Unser, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    We propose two minimum-mean-square-error (MMSE) estimation methods for denoising non-Gaussian first-order autoregressive (AR(1)) processes. The first one is based on the message passing framework and gives the exact theoretic MMSE estimator. The second is an iterative algorithm that combines standard wavelet-based thresholding with an optimized non-linearity and cycle-spinning. This method is more computationally efficient than the former and appears to provide the same optimal denoising results in practice. We illustrate the superior performance of both methods through numerical simulations by comparing them with other well-known denoising schemes  

    Bounds on the sum capacity of synchronous binary CDMA channels

    , Article IEEE Transactions on Information Theory ; Volume 55, Issue 8 , 2009 , Pages 3577-3593 ; 00189448 (ISSN) Alishahi, K ; Marvasti, F ; Aref, V ; Pad, P ; Sharif University of Technology
    2009
    Abstract
    In this paper, we obtain a family of lower bounds for the sum capacity of code-division multiple-access (CDMA) channels assuming binary inputs and binary signature codes in the presence of additive noise with an arbitrary distribution. The envelope of this family gives a relatively tight lower bound in terms of the number of users, spreading gain, and the noise distribution. The derivation methods for the noiseless and the noisy channels are different but when the noise variance goes to zero, the noisy channel bound approaches the noiseless case. The behavior of the lower bound shows that for small noise power, the number of users can be much more than the spreading gain without any... 

    Errorless codes for CDMA systems with near-far effect

    , Article IEEE International Conference on Communications, 23 May 2010 through 27 May 2010, Cape Town ; 2010 ; 05361486 (ISSN) ; 9781424464043 (ISBN) Shafinia, M. H ; Kabir, P ; Pad, P ; Mansouri, S. M ; Marvasti, F ; Sharif University of Technology
    2010
    Abstract
    In this paper we propose a new model for the near-far effect in a CDMA system. We derive upper and lower bounds for the maximum near-far effect for errorless transmission. Using these bounds, we propose some near-far resistant codes. Also a very low complexity ML decoder for a subclass of the proposed codes is suggested  

    New bounds for the sum capacity of binary and nonbinary synchronous CDMA systems

    , Article IEEE International Symposium on Information Theory - Proceedings, 13 June 2010 through 18 June 2010, Austin, TX ; 2010 , Pages 2093-2097 ; 21578103 (ISSN) ; 9781424469604 (ISBN) Dashmiz, Sh ; Takapoui, M. R ; Pad, P ; Marvasti, F ; Sharif University of Technology
    2010
    Abstract
    Lower and upper bounds are derived for the sum capacity of synchronous CDMA where the signature matrix and input alphabets are binary or (2p + l)-ary, in two cases of noiseless and noisy channels. The bounds are very tight in some regions. Interestingly, simulations show that the formulas for noisy systems tend to the ones for noiseless system as noise tends to 0 while it cannot be deduced easily from the formulas. The results give good insights about the extent of the number of users in which errorless communication is possible for a system with a given chip rate  

    New rectangular partitioning methods for lossless binary image compression

    , Article International Conference on Signal Processing Proceedings, ICSP, 24 October 2010 through 28 October 2010 ; 2010 , Pages 694-697 ; 9781424458981 (ISBN) Kafashan, M ; Hosseini, H ; Beygiharchegani, S ; Pad, P ; Marvasti, F ; Sharif University of Technology
    2010
    Abstract
    In this paper, we propose two lossless compression techniques that represent a two dimensional Run-length Coding which can achieve high compression ratio. This method works by partitioning the block regions of the input image into rectangles instead of working by runs of adjacent pixels, so it is found to be more efficient than 1D RLE Run-length Coding for transmitting texts and image. In the first method, length and width of consecutive black and white rectangles are transmitted. The idea of this method is new and it can be very effective for some images which have large blocks of black or white pixels. But in the second method only black rectangles are considered in order to transmit and... 

    Sum Capacity and Optimum Codes of CDMA Systems under Different Conditions

    , M.Sc. Thesis Sharif University of Technology Pad, Pedram (Author) ; Marvasti, Farokh (Supervisor)
    Abstract
    CDMA is one of the main multiple access techniques. In this thesis, we study the channel capacity and the optimum codes for CDMA systems under different conditions. The optimality has different meaning for each studied scenario. The discussed scenarios differ from the aspects of the alphabet of the system, the ability of getting active or inactive for users, and the random fluctuation of the user powers. The first scenario is the systems with real input alphabet. In this case, by optimum codes, we mean a code that maximizes the sum channel capacity of the system. The second scenario is the systems with binary input alphabets and binary signatures. In this section, optimum codes are the codes... 

    Almost-optimum signature matrices in binary-input synchronous overloaded CDMA

    , Article 2011 18th International Conference on Telecommunications, ICT 2011, 8 May 2011 through 11 May 2011, Ayia Napa ; 2011 , Pages 195-200 ; 9781457700248 (ISBN) Khoozani, M. H ; Rashidinejad, A ; Froushani, M. H. L ; Pad, P ; Marvasti, F ; Sharif University of Technology
    2011
    Abstract
    The everlasting bandwidth limitations in wireless communication networks has directed the researchers' thrust toward analyzing the prospect of overloaded Code Division Multiple Access (CDMA). In this paper, we have proposed a Genetic Algorithm in search of optimum signature matrices for binary-input synchronous CDMA. The main measure of optimality considered in this paper, is the per-user channel capacity of the overall multiple access system. Our resulting matrices differ from the renowned Welch Bound Equality (WBE) codes, regarding the fact that our attention is specifically aimed at binary, rather than Gaussian, input distributions. Since design based on channel capacity is... 

    Capacity achieving linear codes with random binary sparse generating matrices over the binary symmetric channel

    , Article IEEE International Symposium on Information Theory - Proceedings ; 2012 , Pages 621-625 ; 9781467325790 (ISBN) Kakhaki, A. M ; Abadi, H. K ; Pad, P ; Saeedi, H ; Marvasti, F ; Alishahi, K ; Sharif University of Technology
    IEEE  2012
    Abstract
    In this paper, we prove the existence of capacity achieving linear codes with random binary sparse generating matrices over the Binary Symmetric Channel (BSC). The results on the existence of capacity achieving linear codes in the literature are limited to the random binary codes with equal probability generating matrix elements and sparse parity-check matrices. Moreover, the codes with sparse generating matrices reported in the literature are not proved to be capacity achieving for channels other than Binary Erasure Channel. As opposed to the existing results in the literature, which are based on optimal maximum a posteriori decoders, the proposed approach is based on a different decoder... 

    Constructing and decoding GWBE codes using Kronecker products

    , Article IEEE Communications Letters ; Volume 14, Issue 1 , 2010 , Pages 1-3 ; 10897798 (ISSN) Pad, P ; Faraji, M ; Marvasti, F ; Sharif University of Technology
    2010
    Abstract
    In this letter, we introduce a novel method for constructing large size Generalized Welch Bound Equality (GWBE) matrices. This method can also be used for the construction of large WBE matrices. The advantage of this method is its low complexity for constructing large size matrices and low computational complexity using Maximum Likelihood (ML) decoders for a subclass of these codes. © 2010 IEEE  

    Optimized wavelet denoising for self-similar α-stable processes

    , Article IEEE Transactions on Information Theory ; Volume 63, Issue 9 , 2017 , Pages 5529-5543 ; 00189448 (ISSN) Pad, P ; Alishahi, K ; Unser, M ; Sharif University of Technology
    2017
    Abstract
    We investigate the performance of wavelet shrinkage methods for the denoising of symmetric- α -stable (S αS) self-similar stochastic processes corrupted by additive white Gaussian noise (AWGN), where α is tied to the sparsity of the process. The wavelet transform is assumed to be orthonormal and the shrinkage function minimizes the mean-square approximation error (MMSE estimator). We derive the corresponding formula for the expected value of the averaged estimation error. We show that the predicted MMSE is a monotone function of a simple criterion that depends on the wavelet and the statistical parameters of the process. Using the calculus of variations, we then optimize this criterion to... 

    Simplified MAP-MUD for active user CDMA

    , Article IEEE Communications Letters ; Volume 15, Issue 6 , April , 2011 , Pages 599-601 ; 10897798 (ISSN) Pad, P ; Mousavi, A ; Goli, A ; Marvasti, F ; Sharif University of Technology
    2011
    Abstract
    In CDMA systems with variable number of users, the decoder consists of two stages. The first stage is the active user identification and the second one is the multi-user detection. Most of the proposed active user identification methods fail to work in overloaded CDMA systems (when the number of users is more than the spreading factor). In this paper we propose a joint active user identification and multi-user detection for binary input CDMA systems using the Viterbi algorithm. We will show that the proposed identification/detection method is Maximum A posteriori Probability (MAP) and outperforms the pervious results. In addition, some suboptimum decoders will be proposed that have lower... 

    A class of errorless codes for overloaded synchronous wireless and optical CDMA systems

    , Article IEEE Transactions on Information Theory ; Volume 55, Issue 6 , 2009 , Pages 2705-2715 ; 00189448 (ISSN) Pad, P ; Marvasti, F ; Alishahi, K ; Akbari, S ; Sharif University of Technology
    2009
    Abstract
    In this paper, we introduce a new class of codes for overloaded synchronous wireless and optical code-division multiple-access (CDMA) systems which increases the number of users for fixed number of chips without introducing any errors. Equivalently, the chip rate can be reduced for a given number of users, which implies bandwidth reduction for downlink wireless systems. An upper bound for the maximum number of users for a given number of chips is derived. Also, lower and upper bounds for the sum channel capacity of a binary overloaded CDMA are derived that can predict the existence of such overloaded codes. We also propose a simplified maximum likelihood method for decoding these types of... 

    Errorless codes for over-loaded CDMA with active user detection

    , Article 2009 IEEE International Conference on Communications, ICC 2009, Dresden, 14 June 2009 through 18 June 2009 ; 2009 ; 05361486 (ISSN); 9781424434350 (ISBN) Pad, P ; Soltanolkotabi, M ; Hadikhanlou, S ; Enayati, A ; Marvasti, F ; Sharif University of Technology
    2009
    Abstract
    In this paper we introduce a new class of codes for over-loaded synchronous wireless CDMA systems which increases the number of users for a fixed number of chips without introducing any errors. In addition these codes support active user detection. We derive an upper bound on the number of users with a fixed spreading factor. Also we propose an ML decoder for a subclass of these codes that is computationally implementable. Although for our simulations we consider a scenario that is worse than what occurs in practice, simulation results indicate that this coding/decoding scheme is robust against additive noise. As an example, for 64 chips and 88 users we propose a coding/decoding scheme that... 

    Secrecy capacity scaling in large cooperative wireless networks

    , Article IEEE Transactions on Information Theory ; Volume 63, Issue 3 , 2017 , Pages 1923-1939 ; 00189448 (ISSN) Mirmohseni, M ; Papadimitratos, P. P ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    We investigate large wireless networks subject to security constraints. In contrast to point-to-point, interferencelimited communications considered in prior works, we propose active cooperative relaying-based schemes. We consider a network with nl legitimate nodes, ne eavesdroppers, and path loss exponent α ≥ 2. As long as n2e (log(ne))γ = o(nl ), for some positive γ , we show that one can obtain unbounded secure aggregate rate. This means zero-cost secure communication, given fixed total power constraint for the entire network. We achieve this result through: 1) the source using Wyner randomized encoder and a serial (multi-stage) block Markov scheme, to cooperate with the relays and 2) the... 

    Fast estimation of connectivity in fractured reservoirs using percolation theory

    , Article SPE Journal ; Volume 12, Issue 2 , 2007 , Pages 167-178 ; 1086055X (ISSN) Masihi, M ; King, P. R ; Nuratza, P ; Sharif University of Technology
    Society of Petroleum Engineers (SPE)  2007
    Abstract
    Investigating the impact of geological uncertainty (i.e., spatial distribution of fractures) on reservoir performance may aid management decisions. The conventional approach to address this is to build a number of possible reservoir models, upscale them, and then run flow simulations. The problem with this approach is that it is computationally very expensive. In this study, we use another approach based on the permeability contrasts that control the flow, called percolation approach. This assumes that the permeability disorder of a rock can be simplified to either permeable or impermeable. The advantage is that by using some universal laws from percolation theory, the effect of the complex... 

    A new decoding scheme for errorless codes for overloaded CDMA with active user detection

    , Article 2011 18th International Conference on Telecommunications, ICT 2011, Ayia Napa, 8 May 2011 through 11 May 2011 ; 2011 , Pages 201-205 ; 9781457700248 (ISBN) Mousavi, A ; Pad, P ; Delgosha, P ; Marvasti, F ; Sharif University of Technology
    2011
    Abstract
    Recently, a new class of binary codes for overloaded CDMA systems are proposed that not only has the ability of errorless communication but also suitable for detecting active users. These codes are called COWDA. In [1], a Maximum Likelihood (ML) decoder is proposed for this class of codes. Although the proposed scheme for coding/decoding shows impressive performance, the decoder can be significantly improved. In this paper, by assuming practical conditions for the traffic in the system, we suggest and prove an algorithm that increases the performance of the decoder several orders of magnitude (the Bit-Error-Rate (BER) is divided by a factor of about 400 in some E b/N0's). The algorithm... 

    Estimation of the Effective Permeability of Heterogeneous Porous Media by Using Percolation Concepts

    , Article Transport in Porous Media ; Volume 114, Issue 1 , 2016 , Pages 169-199 ; 01693913 (ISSN) Masihi, M ; Gago, P. A ; King, P. R ; Sharif University of Technology
    Springer Netherlands  2016
    Abstract
    In this paper we present new methods to estimate the effective permeability (keff) of heterogeneous porous media with a wide distribution of permeabilities and various underlying structures, using percolation concepts. We first set a threshold permeability (kth) on the permeability density function and use standard algorithms from percolation theory to check whether the high permeable grid blocks (i.e., those with permeability higher than kth) with occupied fraction of “p” first forms a cluster connecting two opposite sides of the system in the direction of the flow (high permeability flow pathway). Then we estimate the effective permeability of the heterogeneous porous media in different... 

    Percolation-based effective permeability estimation in real heterogeneous porous media

    , Article 15th European Conference on the Mathematics of Oil Recovery, 29 August 2016 through 1 September 2016 ; 2016 ; 9462821933 (ISBN); 9789462821934 (ISBN) Masihi, M ; Gago, P ; King, P ; DCSE; Schlumberger; Shell ; Sharif University of Technology
    European Association of Geoscientists and Engineers  2016
    Abstract
    It has long been understood that flow behavior in heterogeneous porous media is largely controlled by the continuity of permeability contrasts. With this in mind, we are looking in new methods for a fast estimation of the effective permeability which concentrates on the properties of the percolating cluster. From percolation concepts we use a threshold permeability value (Kth) by which the gridblocks with the highest permeability values connect two opposite side of the system in the direction of the flow. Those methods can be applied to heterogeneous media of a range of permeabilities distribution and various underlying structures. We use power law relations and weighted power averages that... 

    Optimization of sputtering parameters for the deposition of low resistivity indium tin oxide thin films

    , Article Acta Metallurgica Sinica (English Letters) ; Vol. 27, issue. 2 , Apr , 2014 , p. 324-330 Yasrebi, N ; Bagheri, B ; Yazdanfar, P ; Rashidian, B ; Sasanpour, P ; Sharif University of Technology
    2014
    Abstract
    Indium tin oxide (ITO) thin films have been deposited using RF sputtering technique at different pressures, RF powers, and substrate temperatures. Variations in surface morphology, optical properties, and film resistances were measured and analyzed. It is shown that a very low value of sheet resistance (1.96 ω/sq.) can be achieved with suitable arrangement of the deposition experiments. First, at constant RF power, deposition at different pressure values is done, and the condition for achieving minimum sheet resistance (26.43 ω/sq.) is found. In the next step, different values of RF powers are tried, while keeping the pressure fixed on the previously found minimum point (1-2 Pa). Finally,...