Loading...
Search for: codes--symbols
0.027 seconds
Total 242 records

    On the secrecy of the cognitive interference channel with partial channel states

    , Article Transactions on Emerging Telecommunications Technologies ; Volume 27, Issue 11 , 2016 , Pages 1472-1485 ; 21615748 (ISSN) Bafghi, H. G ; Seyfe, B ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Wiley Blackwell  2016
    Abstract
    The secrecy problem in the state-dependent cognitive interference channel is considered in this paper. In our model, there are a primary and a secondary (cognitive) transmitter–receiver pairs, in which the cognitive transmitter has the message of the primary one as side information. In addition, the channel is affected by two channel state sequences, which are known at the cognitive transmitter and the corresponding receiver, separately. The cognitive transmitter should cooperate with the primary one, and it wishes to keep its message secure at the primary receiver. The achievable equivocation-rate regions for this channel are derived using two approaches: the binning scheme coding and... 

    Stability of linear dynamic systems over the packet erasure channel: A co-design approach

    , Article International Journal of Control ; Volume 88, Issue 12 , May , 2015 , Pages 2488-2498 ; 00207179 (ISSN) Farhadi, A ; Sharif University of Technology
    Taylor and Francis Ltd  2015
    Abstract
    This paper is concerned with the stability of linear time-invariant dynamic systems over the packet erasure channel subject to minimum bit rate constraint when an encoder and a decoder are unaware of the control signal. This assumption results in co-designing the encoder, decoder and controller. The encoder, decoder, controller and conditions relating transmission rate to packet erasure probability and eigenvalues of the system matrix A are presented for almost sure asymptotic stability of linear time-invariant dynamic systems over the packet erasure channel with feedback acknowledgment. When the eigenvalues of the system matrix A are real valued, it is shown that the obtained condition for... 

    Modification of a dynamic monte carlo technique to simplify and accelerate transient analysis with feedback

    , Article Nuclear Science and Engineering ; 2021 ; 00295639 (ISSN) Ghaderi Mazaher, M ; Salehi, A. A ; Vosoughi, N ; Sharif University of Technology
    Taylor and Francis Ltd  2021
    Abstract
    In this paper, a simpler approach compared to the existing approaches is developed to analyze nuclear reactor dynamics based on the explicit Monte Carlo method. A new population control method is also introduced to prevent neutron population growth and consequent computer memory shortages, which also increases simulation speed. The scheme is applied for time-dependent particle tracking in three-dimensional arbitrary geometries in the presence of feedbacks through a code named MCSP-Explicit. Changes in material density, as well as geometry dimensions, are also considered during simulation. MCSP-Explicit can be run with either continuous or multigroup data libraries, and it is further boosted... 

    Modification of a dynamic monte carlo technique to simplify and accelerate transient analysis with feedback

    , Article Nuclear Science and Engineering ; Volume 196, Issue 4 , 2022 , Pages 395-408 ; 00295639 (ISSN) Ghaderi Mazaher, M ; Salehi, A. A ; Vosoughi, N ; Sharif University of Technology
    Taylor and Francis Ltd  2022
    Abstract
    In this paper, a simpler approach compared to the existing approaches is developed to analyze nuclear reactor dynamics based on the explicit Monte Carlo method. A new population control method is also introduced to prevent neutron population growth and consequent computer memory shortages, which also increases simulation speed. The scheme is applied for time-dependent particle tracking in three-dimensional arbitrary geometries in the presence of feedbacks through a code named MCSP-Explicit. Changes in material density, as well as geometry dimensions, are also considered during simulation. MCSP-Explicit can be run with either continuous or multigroup data libraries, and it is further boosted... 

    Addressing NoC reliability through an efficient fibonacci-based crosstalk avoidance codec design

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 18 November 2015 through 20 November 2015 ; Volume 9530 , 2015 , Pages 756-770 ; 03029743 (ISSN); 9783319271361 (ISBN) Shirmohammadi, Z ; Miremadi, S. G ; Wang, G ; Perez, G. M ; Zomaya, A ; Li, K ; Sharif University of Technology
    Springer Verlag  2015
    Abstract
    The reliable transfer in Network on Chips (NoCs) can be threatened by crosstalk fault occurring in wires. Crossstalk fault is due to inter-wire coupling capacitance that based on the patterns of transitions appearing on the wires, significantly limits the reliability of NoCs. Among these transitions, 101 and 010 bit patterns impose the worst crosstalk effects to wires. This work intends to increase the reliability of NoCs against crosstalk faults by applying an improved Fibonacci-based numeral system, called Doubled-Penultimate Fibonacci (DP-Fibo). In the DP-Fibo coding algorithm, code words without ‘101’ and ‘010’ bit patterns are produced to reduce crosstalk faults. Experimental results... 

    Return code schemes for electronic voting systems

    , Article 2nd International Joint Conference on Electronic Voting, E-Vote-ID 2017, 24 October 2017 through 27 October 2017 ; Volume 10615 LNCS , 2017 , Pages 198-209 ; 03029743 (ISSN); 9783319686868 (ISBN) Khazaei, S ; Wikström, D ; Sharif University of Technology
    Springer Verlag  2017
    Abstract
    We describe several return code schemes for secure vote submission in electronic voting systems. We consider a unified treatment where a return code is generated as a multiparty computation of a secure MAC tag applied on an encrypted message submitted by a voter. Our proposals enjoy a great level of flexibility with respect to various usability, security, and performance tradeoffs. © 2017, Springer International Publishing AG  

    Cluster-based sparse topical coding for topic mining and document clustering

    , Article Advances in Data Analysis and Classification ; Volume 12, Issue 3 , 2018 , Pages 537-558 ; 18625347 (ISSN) Ahmadi, P ; Gholampour, I ; Tabandeh, M ; Sharif University of Technology
    Springer Verlag  2018
    Abstract
    In this paper, we introduce a document clustering method based on Sparse Topical Coding, called Cluster-based Sparse Topical Coding. Topic modeling is capable of improving textual document clustering by describing documents via bag-of-words models and projecting them into a topic space. The latent semantic descriptions derived by the topic model can be utilized as features in a clustering process. In our proposed method, document clustering and topic modeling are integrated in a unified framework in order to achieve the highest performance. This framework includes Sparse Topical Coding, which is responsible for topic mining, and K-means that discovers the latent clusters in documents... 

    Synthesis of Reo circuits for implementation of component-connector automata specifications

    , Article 7th International Conference on Coordination Models and Languages, COORDINATION 2005, Namur, 20 April 2005 through 23 April 2005 ; Volume 3454 , 2005 , Pages 236-251 ; 03029743 (ISSN) Arbab, F ; Baier, C ; De Boer, F ; Rutten, J ; Sirjani, M ; Sharif University of Technology
    Springer Verlag  2005
    Abstract
    Composition of a concurrent system out of components involves coordination of their mutual interactions. In component-based construction, this coordination becomes the responsibility of the glue-code language and its underlying run-time middle-ware. Reo offers an expressive glue-language for construction of coordinating component connectors out of primitive channels. In this paper we consider the problem of synthesizing Reo coordination code from a specification of a behavior as a relation on scheduled-data streams. The specification is given as a constraint automaton that describes the desired input/output behavior at the ports of the components. The main contribution in this paper is an... 

    A novel iterative decoding method for DFT codes in erasure channels

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 3124 , 2004 , Pages 548-553 ; 03029743 (ISSN); 3540225714 (ISBN); 9783540225713 (ISBN) Azmi, P ; Marvasti, F ; Sharif University of Technology
    Springer Verlag  2004
    Abstract
    One of the categories of decoding techniques for DFT codes in erasure channels is the class of iterative algorithms. Iterative algorithms can be considered as kind of alternating mapping methods using the given information in a repetitive way. In this paper, we propose a new iterative method for decoding DFT codes. It will be shown that the proposed method outperforms the well-known methods such as Wiley/Marvasti, and ADPW methods in the decoding of DFT codes in erasure channels. © Springer-Verlag 2004  

    Secret key cryptosystem based on non-systematic polar codes

    , Article Wireless Personal Communications ; Volume 84, Issue 2 , September , 2015 , Pages 1345-1373 ; 09296212 (ISSN) Hooshmand, R ; Aref, M. R ; Eghlidos, T ; Sharif University of Technology
    Springer New York LLC  2015
    Abstract
    Polar codes are a new class of error correcting linear block codes, whose generator matrix is specified by the knowledge of transmission channel parameters, code length and code dimension. Moreover, regarding computational security, it is assumed that an attacker with a restricted processing power has unlimited access to the transmission media. Therefore, the attacker can construct the generator matrix of polar codes, especially in the case of binary erasure channels, on which this matrix can be easily constructed. In this paper, we introduce a novel method to keep the generator matrix of polar codes in secret in a way that the attacker cannot access the required information to decode the... 

    Tracing distributed collaborative development in apache software foundation projects

    , Article Empirical Software Engineering ; 2016 , Pages 1-36 ; 13823256 (ISSN) Gharehyazie, M ; Filkov, V ; Sharif University of Technology
    Springer New York LLC  2016
    Abstract
    Developing and maintaining large software systems typically requires that developers collaborate on many tasks. During such collaborations, when multiple people work on the same chunk of code at the same time, they communicate with each other and employ safeguards in various ways. Recent studies have considered group co-development in OSS projects and found that it is an essential part of many projects. However, those studies were limited to groups of size two, i.e., pairs of developers. Here we go further and characterize co-development in larger groups. We develop an effective methodology for capturing distributed collaboration beyond groups of size two, based on synchronized commit... 

    Tracing distributed collaborative development in apache software foundation projects

    , Article Empirical Software Engineering ; Volume 22, Issue 4 , 2017 , Pages 1795-1830 ; 13823256 (ISSN) Gharehyazie, M ; Filkov, V ; Sharif University of Technology
    Springer New York LLC  2017
    Abstract
    Developing and maintaining large software systems typically requires that developers collaborate on many tasks. During such collaborations, when multiple people work on the same chunk of code at the same time, they communicate with each other and employ safeguards in various ways. Recent studies have considered group co-development in OSS projects and found that it is an essential part of many projects. However, those studies were limited to groups of size two, i.e., pairs of developers. Here we go further and characterize co-development in larger groups. We develop an effective methodology for capturing distributed collaboration beyond groups of size two, based on synchronized commit... 

    Public key cryptosystem based on low density lattice codes

    , Article Wireless Personal Communications ; Volume 92, Issue 3 , 2017 , Pages 1107-1123 ; 09296212 (ISSN) Hooshmand, R ; Aref, M. R ; Sharif University of Technology
    Springer New York LLC  2017
    Abstract
    McEliece and Goldreich–Goldwasser–Halevi (GGH) cryptosystems are two instances of code and lattice-based cryptosystems whose security are based on the hardness of coding theoretic and lattice problems, respectively. However, such cryptosystems have a number of drawbacks which make them inefficient in practice. On the other hand, low density lattice codes (LDLCs) are practical lattice codes which can achieve capacity over additive white Gaussian noise channel and also can be encoded and decoded efficiently. This paper introduces a public key cryptosystem based on Latin square LDLCs, by which a relationship can be attained between code and lattice-based cryptography. In this way, we can... 

    Power allocation and relay selection for network-coded D2D communication underlay heterogeneous cellular networks

    , Article Telecommunication Systems ; Volume 67, Issue 4 , April , 2018 , Pages 699-715 ; 10184864 (ISSN) Kalbkhani, H ; Shayesteh, M. G ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    Underlay device-to-device (D2D) communication is an attractive technology enabling nearby cellular users to communicate with each other directly in order to increase data rate and spectral efficiency. The current cellular heterogeneous networks consist of macrocell base stations and small cell base stations with different transmit powers and coverage areas. Femtocell is the most popular small cell which is expected to be utilized in dense and ultra-dense scenarios in the future. Network coding in relay-assisted multi-hop communications improves achievable transmission rate and coverage of D2D communications. In this paper, two-hop random linear network coding network in cooperative D2D... 

    Cross-project code clones in GitHub

    , Article Empirical Software Engineering ; 2018 ; 13823256 (ISSN) Gharehyazie, M ; Ray, B ; Keshani, M ; Zavosht, M. S ; Heydarnoori, A ; Filkov, V ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    Code reuse has well-known benefits on code quality, coding efficiency, and maintenance. Open Source Software (OSS) programmers gladly share their own code and they happily reuse others’. Social programming platforms like GitHub have normalized code foraging via their common platforms, enabling code search and reuse across different projects. Removing project borders may facilitate more efficient code foraging, and consequently faster programming. But looking for code across projects takes longer and, once found, may be more challenging to tailor to one’s needs. Learning how much code reuse goes on across projects, and identifying emerging patterns in past cross-project search behavior may... 

    Cross-project code clones in GitHub

    , Article Empirical Software Engineering ; Volume 24, Issue 3 , 2019 , Pages 1538-1573 ; 13823256 (ISSN) Gharehyazie, M ; Ray, B ; Keshani, M ; Soleimani Zavosht, M ; Heydarnoori, A ; Filkov, V ; Sharif University of Technology
    Springer New York LLC  2019
    Abstract
    Code reuse has well-known benefits on code quality, coding efficiency, and maintenance. Open Source Software (OSS) programmers gladly share their own code and they happily reuse others’. Social programming platforms like GitHub have normalized code foraging via their common platforms, enabling code search and reuse across different projects. Removing project borders may facilitate more efficient code foraging, and consequently faster programming. But looking for code across projects takes longer and, once found, may be more challenging to tailor to one’s needs. Learning how much code reuse goes on across projects, and identifying emerging patterns in past cross-project search behavior may... 

    Computing on quantum shared secrets for general quantum access structures

    , Article Quantum Information Processing ; Volume 18, Issue 4 , 2019 ; 15700755 (ISSN) Bassirian, R ; Boreiri, S ; Karimipour, V ; Sharif University of Technology
    Springer New York LLC  2019
    Abstract
    Quantum secret sharing is a method for sharing a secret quantum state among a number of individuals such that certain authorized subsets of participants can recover the secret shared state by collaboration and other subsets cannot. In this paper, we first propose a method for sharing a quantum secret in a basic (2, 3) threshold scheme, only by using qubits and the 7-qubit CSS code. Based on this (2, 3) scheme, we propose a new (n, n) scheme, and we also construct a quantum secret sharing scheme for any quantum access structure by induction. Secondly, based on the techniques of performing quantum computation on 7-qubit CSS codes, we introduce a method that authorized subsets can perform... 

    Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension

    , Article Designs, Codes, and Cryptography ; Volume 80, Issue 2 , 2016 , Pages 359-377 ; 09251022 (ISSN) Löndahl, C ; Johansson, T ; Koochak Shooshtari, M ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
    Springer New York LLC 
    Abstract
    We present a general purpose algorithm for finding low-weight codewords as well as for decoding a received codeword in any quasi-cyclic code whose length and dimension is a multiple of a power of 2. In this paper, we apply the algorithm on a McEliece variant recently proposed by Misoczki et al. (MDPC-McEliece: New McEliece variants from moderate density parity-check codes, 2013). In their paper, the authors present instances of LDPC codes with increased weight for use in a McEliece type PKC. They claim that all message-recovery and key-recovery attacks can be avoided. We show that this is not true for certain parameters and public-key matrices  

    A fine-grained data set and analysis of tangling in bug fixing commits

    , Article Empirical Software Engineering ; Volume 27, Issue 6 , 2022 ; 13823256 (ISSN) Herbold, S ; Trautsch, A ; Ledel, B ; Aghamohammadi, A ; Ghaleb, T. A ; Chahal, K. K ; Bossenmaier, T ; Nagaria, B ; Makedonski, P ; Ahmadabadi, M. N ; Szabados, K ; Spieker, H ; Madeja, M ; Hoy, N ; Lenarduzzi, V ; Wang, S ; Rodríguez-Pérez, G ; Colomo-Palacios, R ; Verdecchia, R ; Singh, P ; Qin, Y ; Chakroborti, D ; Davis, W ; Walunj, V ; Wu, H ; Marcilio, D ; Alam, O ; Aldaeej, A ; Amit, I ; Turhan, B ; Eismann, S ; Wickert, A. K ; Malavolta, I ; Sulír, M ; Fard, F ; Henley, A. Z ; Kourtzanidis, S ; Tuzun, E ; Treude, C ; Shamasbi, S. M ; Pashchenko, I ; Wyrich, M ; Davis, J ; Serebrenik, A ; Albrecht, E ; Aktas, E. U ; Strüber, D ; Erbel, J ; Sharif University of Technology
    Springer  2022
    Abstract
    Context: Tangled commits are changes to software that address multiple concerns at once. For researchers interested in bugs, tangled commits mean that they actually study not only bugs, but also other concerns irrelevant for the study of bugs. Objective: We want to improve our understanding of the prevalence of tangling and the types of changes that are tangled within bug fixing commits. Methods: We use a crowd sourcing approach for manual labeling to validate which changes contribute to bug fixes for each line in bug fixing commits. Each line is labeled by four participants. If at least three participants agree on the same label, we have consensus. Results: We estimate that between 17% and... 

    Numerical investigation of back pressure and free-stream effects on a mixed compression inlet performance

    , Article Scientia Iranica ; Volume 25, Issue 2B , 2018 , Pages 751-761 ; 10263098 (ISSN) Ebrahimi, A ; Zare Chavoshi, M ; Sharif University of Technology
    Sharif University of Technology  2018
    Abstract
    Inlet performance has an important role in the operation of air-breathing propulsion systems. In this study, performance of a supersonic axisymmetric mixedcompression inlet in the supercritical operating condition is numerically studied. The effects of free-stream Mach number and engine-face pressure on performance parameters, including mass flow ratio, drag coefficient, total pressure recovery, and flow distortion, are investigated. For this sake, a multi-block density-based finite volume CFD code is developed, and Reynolds-averaged Navier-Stokes equations with Spalart-Allmaras oneequation turbulence model are employed. The code is validated by comparing numerical results against other...