Loading...
Search for: codes--symbols
0.01 seconds
Total 242 records

    Reducing the key length of mceliece cryptosystem using polar codes

    , Article 2014 11th International ISC Conference on Information Security and Cryptology, ISCISC 2014 ; Sept , 2014 , pp. 104-108 ; ISBN: 9781479953837 Hooshmand, R ; Koochak Shooshtari, M ; Eghlidos, T ; Aref, M. R ; Sharif University of Technology
    Abstract
    This paper introduces a public key scheme based on polar codes to improve the performance of McEliece cryptosystem. By exploiting the interesting properties of polar codes, we put the encryption matrix of the proposed scheme in systematic form. Moreover, the nonsingular matrix is constructed from the generator matrix of used polar code. These proceedings lead to decrease the public and private key lengths compared with the original McEliece public key cryptosystem. We analyze the proposed scheme against known attacks on the public key cryptosystems based on channel coding. Moreover, it benefits from high code rate and proper error correction capability for reliable communication  

    EA-EO: Endurance aware erasure code for SSD-based storage systems

    , Article Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC ; 3 December , 2014 , Pages 76-85 ; ISSN: 15410110 ; ISBN: 9781479964741 Chamazcoti, S. A ; Miremadi, S. G ; Sharif University of Technology
    Abstract
    One of the main issues in Solid State Drive (SSD)-based storage systems is endurance which is directly affected by the number of Program/Erase (P/E) cycles. The increment of P/E cycles increases the bit error rate threatening the reliability of SSDs. Erasure codes are used to leverage the reliability of storage systems but they also affect the number of P/E cycles based on their code pattern. A lower dependency between data and parities in the code pattern may lead to smaller number of P/E cycles providing better endurance. This paper introduces an Endurance Aware EVENODD (EA-EO), which minimizes the dependency between data and parities in the coding pattern. A simulation environment is used... 

    Linear index coding via graph homomorphism

    , Article Proceedings - 2014 International Conference on Control, Decision and Information Technologies, CoDIT 2014 ; 2014 , pp. 158-163 ; ISBN: 9781479967735 Ebrahimi, J. B ; Siavoshani, M. J ; Sharif University of Technology
    Abstract
    In [1], [2] it is shown that the minimum broadcast rate of a linear index code over a finite field Fq is equal to an algebraic invariant of the underlying digraph, called minrankq. In [3], it is proved that for F2 and any positive integer k, minrankq(G) ≤ k if and only if there exists a homomorphism from the complement of the graph G to the complement of a particular undirected graph family called 'graph family {Gk}'. As observed in [2], by combining these two results one can relate the linear index coding problem of undirected graphs to the graph homomorphism problem. In [4], a direct connection between linear index coding problem and graph homomorphism problem is introduced. In contrast to... 

    Receivers' placement of a MIMO radar in the presence of mountains

    , Article 2014 International Radar Conference, Radar 2014 ; 2014 ; ISBN: 9781479941957 Radmard, M ; Nazari Majd, M ; Bahrololoom, E ; Chitgarha, M. M ; Nayebi, M. M ; Sharif University of Technology
    Abstract
    This paper studies the placement of antennas in presence of mountains for widely separated multiple-input multiple-output (MIMO) radar. One of the challenges in this configuration is proper placement of the receive antennas in order to achieve good performance. We derived Neyman-Pearson decision rule for target detection. Via several scenarios we show that proper placement of receivers can provide better performance  

    On marton's inner bound for the general broadcast channel

    , Article IEEE Transactions on Information Theory ; Volume 60, Issue 7 , 2014 , Pages 3748-3762 ; ISSN: 00189448 Gohari, A ; Gamal, A. E ; Anantharam, V ; Sharif University of Technology
    Abstract
    We establish several new results on Marton's inner bound on the capacity region of the general broadcast channel. Inspired by the fact that Marton's coding scheme without superposition coding is optimal in the Gaussian case, we consider the class of binary input degraded broadcast channels with no common message that have the same property. We characterize this class. We also establish new properties of Marton's inner bound that help restrict the search space for computing the Marton sum rate. In particular, we establish an extension of the XOR case of the binary inequality of Nair, Wang, and Geng  

    Physical layer security for some classes of three-receiver broadcast channels

    , Article IET Communications ; Vol. 8, issue. 11 , July , 2014 , p. 1965-1976 Salehkalaibar, S ; Aref, M. R ; Sharif University of Technology
    Abstract
    In this study, the authors consider the secrecy of a one-receiver, two-eavesdropper broadcast channel (BC) with three degraded message sets. Consider a three-receiver BC with three messages, where the first message is decoded by all the receivers. The second message is decoded by the first and the second receivers and is to be kept secret from the third receiver. The third message is decoded by the first receiver and is to be kept secret from the second and the third receivers. The authors consider the imperfect secrecy condition at the second receiver, that is, it is allowed to partially decode the third message. However, the perfect secrecy condition at the third receiver, does not allow... 

    Dynamic behavior of a tension leg platform offshore wind turbine under environmental loads

    , Article Scientia Iranica ; Vol. 21, issue. 3 , 2014 , pp. 480-491 ; ISSN : 1026-3098 Ebrahimi, A ; Abbaspour, M ; Nasiri, R. M ; Sharif University of Technology
    Abstract
    In order to evaluate the dynamic behavior of floating offshore wind turbines, the authors consider two approaches. A numerical method is used to investigate Tension Leg Platform (TLP) offshore wind turbine response behavior under a parked condition. This code considers nonlinearities due to changes in the tension of tethers. The off-diagonal components of stiffness, damping and mass matrices are considered to calculate coupling. This code solves the nonlinear equation of motion at each time step. However, in order to validate the data generated by the code, a scaled-down model was fully tested in the marine laboratory. The importance of these series of experiments is due to the fact that... 

    A generalized multi-layer information hiding scheme using wet paper coding

    , Article 2014 11th International ISC Conference on Information Security and Cryptology, ISCISC 2014 ; 2014 , p. 210-213 Bidokhti, A ; Ghaemmaghami, S ; Sharif University of Technology
    Abstract
    Multi-layer schemes have been proposed for steganography. Also some authors have combined these methods with the idea of wet paper codes and gained higher embedding efficiency. This paper proposes a generalized multi-layer method for wet paper embedding. First, the cover bits are divided into blocks and, by combining these bits in groups of 3, a pyramid is formed. Next, the secret message is embedded through a layer-by-layer procedure. The proposed method has higher embedding efficiency in some cases and provides more flexibility for choosing the embedding payload, especially in lower payload conditions  

    Performance analysis of network coding-based content distribution in vehicular ad-hoc networks

    , Article IET Communications ; Vol. 8, issue. 9 , 2014 , p. 1447-1458 Amerimehr, M. H ; Ashtiani, F ; Sharif University of Technology
    Abstract
    The authors investigate the content distribution among the vehicles of a cluster in a vehicular ad-hoc network, exploiting network coding. The vehicles collaborate to disseminate the coded data packets, received from a roadside info-station based on IEEE 802.11 medium access control (MAC) protocol. Two types of network coding are considered: random linear network coding (RLNC) over a large finite field and random XORed network coding (RXNC). An analytical model is proposed to address the effect of random access MAC as well as the correlation among received coded packets on the performance of content distribution. First, a p-persistent carrier sense multiple access approximation for IEEE... 

    Critical graphs in index coding

    , Article IEEE International Symposium on Information Theory - Proceedings ; 2014 , p. 281-285 Tahmasbi, M ; Shahrasbi, A ; Gohari, A ; Sharif University of Technology
    Abstract
    In this paper we define critical graphs as minimal graphs that support a given set of rates for the index coding problem, and study them for both the one-shot and asymptotic setups. For the case of equal rates, we find the critical graph with minimum number of edges for both one-shot and asymptotic cases. For the general case of possibly distinct rates, we show that for one-shot and asymptotic linear index coding, as well as asymptotic non-linear index coding, each critical graph is a union of disjoint strongly connected subgraphs (USCS). On the other hand, we identify a non-USCS critical graph for a one-shot non-linear index coding problem. In addition, we show that the capacity region of... 

    Polar codes for a quadratic-Gaussian Wyner-Ziv problem

    , Article Proceedings of the International Symposium on Wireless Communication Systems ; 2013 , Pages 718-722 ; 21540217 (ISSN) ; 9783800735297 (ISBN) Eghbalian Arani, S ; Behroozi, H ; Sharif University of Technology
    2013
    Abstract
    In this work, we study the performance of polar codes for lossy compression of a Gaussian source with a side information at decoder; known as the quadratic-Gaussian Wyner-Ziv problem. First we extend the binary polar codes to q-ary for the Wyner-Ziv problem. We show that the nested q- Ary polar codes are optimal for this case. Then we present two polar coding schemes for the Gaussian Wyner-Ziv problem. In the first scheme, we achieve a rate above the Wyner-Ziv rate-distortion function with a gap of 0.5 bits compared with the optimal rate. This scheme utilizes a successive cancellation decoder and is optimal in weak side-information cases when the decoder side-information noise variance is... 

    Simulation of an innovative flow-field design based on a bio inspired pattern for PEM fuel cells

    , Article Renewable Energy ; Volume 41 , 2012 , Pages 86-95 ; 09601481 (ISSN) Roshandel, R ; Arbabi, F ; Moghaddam, G. K ; Sharif University of Technology
    2012
    Abstract
    Proton exchange membrane (PEM) fuel cell performance is directly related to the bipolar plate design and their channels pattern. Power enhancements can be achieved by optimal design of the type, size, or patterns of the channels. It has been realized that the bipolar plate design has significant role on reactant transport as well as water management in a PEM Fuel cell. Present work concentrates on improvements in the fuel cell performance by optimization of flow-field design and channels configurations. A three-dimensional, multi-component numerical model of flow distribution based on Navier-Stokes equations using individual computer code is presented. The simulation results showed excellent... 

    Kinetic parameters evaluation of PWRs using static cell and core calculation codes

    , Article Annals of Nuclear Energy ; Volume 41 , 2012 , Pages 110-114 ; 03064549 (ISSN) Jahanbin, A ; Malmir, H ; Sharif University of Technology
    Abstract
    In this paper, evaluation of the kinetic parameters (effective delayed neutron fraction and prompt neutron lifetime) in PWRs, using static cell and core calculation codes, is reported. A new software has been developed to link the WIMS, BORGES and CITATION codes in Visual C# computer programming language. Using the WIMS cell calculation code, multigroup microscopic cross-sections and number densities of different materials can be generated in a binary file. By the use of BORGES code, these binary-form cross-sections and number densities are converted to a format readable by the CITATION core calculation code, by which the kinetic parameters can be finally obtained. This software is used for... 

    Neural network-based brain tissue segmentation in MR images using extracted features from intraframe coding in H.264

    , Article Proceedings of SPIE - The International Society for Optical Engineering, 9 December 2011 through 10 December 2011, Singapore ; Volume 8349 , December , 2012 ; 0277786X (ISSN) ; 9780819490254 (ISBN) Jafari, M ; Kasaei, S ; Sharif University of Technology
    Abstract
    Automatic brain tissue segmentation is a crucial task in diagnosis and treatment of medical images. This paper presents a new algorithm to segment different brain tissues, such as white matter (WM), gray matter (GM), cerebral spinal fluid (CSF), background (BKG), and tumor tissues. The proposed technique uses the modified intraframe coding yielded from H.264/(AVC), for feature extraction. Extracted features are then imposed to an artificial back propagation neural network (BPN) classifier to assign each block to its appropriate class. Since the newest coding standard, H.264/AVC, has the highest compression ratio, it decreases the dimension of extracted features and thus yields to a more... 

    Matrices with small coherence using p-ary block codes

    , Article IEEE Transactions on Signal Processing ; Volume 60, Issue 1 , September , 2012 , Pages 172-181 ; 1053587X (ISSN) Amini, A ; Montazerhodjat, V ; Marvasti, F ; Sharif University of Technology
    2012
    Abstract
    In contrast to the vast amount of literature in random matrices in the field of compressed sensing, the subject of deterministic matrix design is at its early stages. Since these deterministic matrices are usually constructed using the polynomials in finite Galois fields, the number of rows (number of samples) is restricted to some specific integers such as prime powers. In this paper, besides extending a previous matrix design based on the binary BCH codes to the p-ary codes, we introduce matrices with wide variety of options for the number of rows. Simulation results demonstrate that these matrices perform almost as well as random matrices  

    Optimal HDA codes for sending a Gaussian source over a Gaussian channel with bandwidth compression in the presence of an interference

    , Article 2011 IEEE Information Theory Workshop, ITW 2011 ; 2011 , Pages 325-329 ; 9781457704376 (ISBN) Varasteh, M ; Behroozi, H ; Sharif University of Technology
    2011
    Abstract
    In this paper, we consider transmission of a Gaussian source over a Gaussian channel under bandwidth compression in the presence of interference known only to the transmitter. We study hybrid digital-analog (HDA) joint source-channel coding schemes and propose two novel coding schemes that achieve the optimal mean-squared error (MSE) distortion. This can be viewed as the extension of results by Wilson et al. [1], originally proposed for sending a Gaussian source over a Gaussian channel in two cases: 1) Matched bandwidth with known interference only at the transmitter, 2) bandwidth compression where there is no interference in the channel. The proposed HDA codes can cancel the interference of... 

    An algorithmic approach for finding deletion correcting codes

    , Article 2011 IEEE Information Theory Workshop, ITW 2011 ; 2011 , Pages 25-29 ; 9781457704376 (ISBN) Khajouei, F ; Zolghadr, M ; Kiyavash, N ; Sharif University of Technology
    Abstract
    A general construction for deletion/insertion correcting codes is proposed by concatenating codes derived from a heuristic maximal independent set algorithm on an appropriately defined graph. Our heuristic algorithm is polynomial with respect to the number of nodes in the graph. This methodology may be used for construction of any length n, s-deletion code. Our experimental results show that cardinalities of our codebooks exceed sizes of all previously known constructions. In fact, they are comparable to Levenshteins lower bound  

    A multi-bit error tolerant register file for a high reliable embedded processor

    , Article 2011 18th IEEE International Conference on Electronics, Circuits, and Systems, ICECS 22011, 11 December 2011 through 14 December 2011 ; December , 2011 , Pages 532-537 ; 9781457718458 (ISBN) Esmaeeli, S ; Hosseini, M ; Vahdat, B. V ; Rashidian, B ; Sharif University of Technology
    2011
    Abstract
    The vulnerability of microprocessors to soft errors is increasing due to continuous shrinking in fabrication process. Recent studies show that 1-5% of the SEUs (single event upset) can cause MBUs (multiple bit upsets). The probability of MBU generation due to SEU is increasing because of the reduction in minimum energy required to flip a memory bit in modern technologies. Register file is the most sensitive component in a microprocessor. In this paper, we present an innovative way to protect registers in a 64-bit register file for a RISC processor using extended Hamming (8, 4) code (SEC-DED code) and narrow-width values. A narrow-width value can be represented by half number of bits of the... 

    On the performance of hybrid digital-analog coding for broadcasting correlated gaussian sources

    , Article IEEE Transactions on Communications ; Volume 59, Issue 12 , 2011 , Pages 3335-3342 ; 00906778 (ISSN) Behroozi, H ; Alajaji, F ; Linder, T ; Sharif University of Technology
    Abstract
    We consider the problem of sending a bivariate Gaussian source S=(S 1,S 2) across a power-limited two-user Gaussian broadcast channel. User i (i=1,2) observes the transmitted signal corrupted by Gaussian noise with power σ i 2 and desires to estimate S i. We study hybrid digital-analog (HDA) joint source-channel coding schemes and analyze the region of (squared-error) distortion pairs that are simultaneously achievable. Two cases are considered: 1) broadcasting with bandwidth compression, and 2) broadcasting with bandwidth expansion. We modify and adapt HDA schemes of Wilson et al. and Prabhakaran et al. , originally proposed for broadcasting a single common Gaussian source, in order to... 

    The capacity region of p-transmitter/q-receiver multiple-access channels with common information

    , Article IEEE Transactions on Information Theory ; Volume 57, Issue 11 , 2011 , Pages 7359-7376 ; 00189448 (ISSN) Haghi, A ; Khosravi Farsani, R ; Aref, M. R ; Marvasti, F ; Sharif University of Technology
    Abstract
    This paper investigates the capacity problem for some multiple-access scenarios with cooperative transmitters. First, a general Multiple-Access Channel (MAC) with common information, i.e., a scenario where p transmitters send private messages and also a common message to q receivers and each receiver decodes all of the messages, is considered. The capacity region of the discrete memoryless channel is characterized. Then, the general Gaussian fading MAC with common information wherein partial Channel State Information (CSI) is available at the transmitters (CSIT) and perfect CSI is available at the receivers (CSIR) is investigated. A coding theorem is proved for this model that yields an...