-
A Parametric Rate-Distortion Model for Video Transcoding
Authors:
Maedeh Jamali,
Nader Karimi,
Shadrokh Samavi,
Shahram Shirani
Abstract:
Over the past two decades, the surge in video streaming applications has been fueled by the increasing accessibility of the internet and the growing demand for network video. As users with varying internet speeds and devices seek high-quality video, transcoding becomes essential for service providers. In this paper, we introduce a parametric rate-distortion (R-D) transcoding model. Our model excel…
▽ More
Over the past two decades, the surge in video streaming applications has been fueled by the increasing accessibility of the internet and the growing demand for network video. As users with varying internet speeds and devices seek high-quality video, transcoding becomes essential for service providers. In this paper, we introduce a parametric rate-distortion (R-D) transcoding model. Our model excels at predicting transcoding distortion at various rates without the need for encoding the video. This model serves as a versatile tool that can be used to achieve visual quality improvement (in terms of PSNR) via trans-sizing. Moreover, we use our model to identify visually lossless and near-zero-slope bitrate ranges for an ingest video. Having this information allows us to adjust the transcoding target bitrate while introducing visually negligible quality degradations. By utilizing our model in this manner, quality improvements up to 2 dB and bitrate savings of up to 46% of the original target bitrate are possible. Experimental results demonstrate the efficacy of our model in video transcoding rate distortion prediction.
△ Less
Submitted 13 April, 2024;
originally announced April 2024.
-
Unveiling Theory of Mind in Large Language Models: A Parallel to Single Neurons in the Human Brain
Authors:
Mohsen Jamali,
Ziv M. Williams,
**g Cai
Abstract:
With their recent development, large language models (LLMs) have been found to exhibit a certain level of Theory of Mind (ToM), a complex cognitive capacity that is related to our conscious mind and that allows us to infer another's beliefs and perspective. While human ToM capabilities are believed to derive from the neural activity of a broadly interconnected brain network, including that of dors…
▽ More
With their recent development, large language models (LLMs) have been found to exhibit a certain level of Theory of Mind (ToM), a complex cognitive capacity that is related to our conscious mind and that allows us to infer another's beliefs and perspective. While human ToM capabilities are believed to derive from the neural activity of a broadly interconnected brain network, including that of dorsal medial prefrontal cortex (dmPFC) neurons, the precise processes underlying LLM's capacity for ToM or their similarities with that of humans remains largely unknown. In this study, we drew inspiration from the dmPFC neurons subserving human ToM and employed a similar methodology to examine whether LLMs exhibit comparable characteristics. Surprisingly, our analysis revealed a striking resemblance between the two, as hidden embeddings (artificial neurons) within LLMs started to exhibit significant responsiveness to either true- or false-belief trials, suggesting their ability to represent another's perspective. These artificial embedding responses were closely correlated with the LLMs' performance during the ToM tasks, a property that was dependent on the size of the models. Further, the other's beliefs could be accurately decoded using the entire embeddings, indicating the presence of the embeddings' ToM capability at the population level. Together, our findings revealed an emergent property of LLMs' embeddings that modified their activities in response to ToM features, offering initial evidence of a parallel between the artificial model and neurons in the human brain.
△ Less
Submitted 4 September, 2023;
originally announced September 2023.
-
ProductAE: Toward Deep Learning Driven Error-Correction Codes of Large Dimensions
Authors:
Mohammad Vahid Jamali,
Hamid Saber,
Homayoon Hatami,
Jung Hyun Bae
Abstract:
While decades of theoretical research have led to the invention of several classes of error-correction codes, the design of such codes is an extremely challenging task, mostly driven by human ingenuity. Recent studies demonstrate that such designs can be effectively automated and accelerated via tools from machine learning (ML), thus enabling ML-driven classes of error-correction codes with promis…
▽ More
While decades of theoretical research have led to the invention of several classes of error-correction codes, the design of such codes is an extremely challenging task, mostly driven by human ingenuity. Recent studies demonstrate that such designs can be effectively automated and accelerated via tools from machine learning (ML), thus enabling ML-driven classes of error-correction codes with promising performance gains compared to classical designs. A fundamental challenge, however, is that it is prohibitively complex, if not impossible, to design and train fully ML-driven encoder and decoder pairs for large code dimensions. In this paper, we propose Product Autoencoder (ProductAE) -- a computationally-efficient family of deep learning driven (encoder, decoder) pairs -- aimed at enabling the training of relatively large codes (both encoder and decoder) with a manageable training complexity. We build upon ideas from classical product codes and propose constructing large neural codes using smaller code components. ProductAE boils down the complex problem of training the encoder and decoder for a large code dimension $k$ and blocklength $n$ to less-complex sub-problems of training encoders and decoders for smaller dimensions and blocklengths. Our training results show successful training of ProductAEs of dimensions as large as $k = 300$ bits with meaningful performance gains compared to state-of-the-art classical and neural designs. Moreover, we demonstrate excellent robustness and adaptivity of ProductAEs to channel models different than the ones used for training.
△ Less
Submitted 28 March, 2023;
originally announced March 2023.
-
Machine Learning-Aided Efficient Decoding of Reed-Muller Subcodes
Authors:
Mohammad Vahid Jamali,
Xiyang Liu,
Ashok Vardhan Makkuva,
Hessam Mahdavifar,
Sewoong Oh,
Pramod Viswanath
Abstract:
Reed-Muller (RM) codes achieve the capacity of general binary-input memoryless symmetric channels and are conjectured to have a comparable performance to that of random codes in terms of scaling laws. However, such results are established assuming maximum-likelihood decoders for general code parameters. Also, RM codes only admit limited sets of rates. Efficient decoders such as successive cancella…
▽ More
Reed-Muller (RM) codes achieve the capacity of general binary-input memoryless symmetric channels and are conjectured to have a comparable performance to that of random codes in terms of scaling laws. However, such results are established assuming maximum-likelihood decoders for general code parameters. Also, RM codes only admit limited sets of rates. Efficient decoders such as successive cancellation list (SCL) decoder and recently-introduced recursive projection-aggregation (RPA) decoders are available for RM codes at finite lengths. In this paper, we focus on subcodes of RM codes with flexible rates. We first extend the RPA decoding algorithm to RM subcodes. To lower the complexity of our decoding algorithm, referred to as subRPA, we investigate different approaches to prune the projections. Next, we derive the soft-decision based version of our algorithm, called soft-subRPA, that not only improves upon the performance of subRPA but also enables a differentiable decoding algorithm. Building upon the soft-subRPA algorithm, we then provide a framework for training a machine learning (ML) model to search for \textit{good} sets of projections that minimize the decoding error rate. Training our ML model enables achieving very close to the performance of full-projection decoding with a significantly smaller number of projections. We also show that the choice of the projections in decoding RM subcodes matters significantly, and our ML-aided projection pruning scheme is able to find a \textit{good} selection, i.e., with negligible performance degradation compared to the full-projection case, given a reasonable number of projections.
△ Less
Submitted 31 July, 2023; v1 submitted 15 January, 2023;
originally announced January 2023.
-
Low-Complexity Decoding of a Class of Reed-Muller Subcodes for Low-Capacity Channels
Authors:
Mohammad Vahid Jamali,
Mohammad Fereydounian,
Hessam Mahdavifar,
Hamed Hassani
Abstract:
We present a low-complexity and low-latency decoding algorithm for a class of Reed-Muller (RM) subcodes that are defined based on the product of smaller RM codes. More specifically, the input sequence is shaped as a multi-dimensional array, and the encoding over each dimension is done separately via a smaller RM encoder. Similarly, the decoding is performed over each dimension via a low-complexity…
▽ More
We present a low-complexity and low-latency decoding algorithm for a class of Reed-Muller (RM) subcodes that are defined based on the product of smaller RM codes. More specifically, the input sequence is shaped as a multi-dimensional array, and the encoding over each dimension is done separately via a smaller RM encoder. Similarly, the decoding is performed over each dimension via a low-complexity decoder for smaller RM codes. The proposed construction is of particular interest to low-capacity channels that are relevant to emerging low-rate communication scenarios. We present an efficient soft-input soft-output (SISO) iterative decoding algorithm for the product of RM codes and demonstrate its superiority compared to hard decoding over RM code components. The proposed coding scheme has decoding (as well as encoding) complexity of $\mathcal{O}(n\log n)$ and latency of $\mathcal{O}(\log n)$ for blocklength $n$. This research renders a general framework toward efficient decoding of RM codes.
△ Less
Submitted 8 February, 2022;
originally announced February 2022.
-
ProductAE: Towards Training Larger Channel Codes based on Neural Product Codes
Authors:
Mohammad Vahid Jamali,
Hamid Saber,
Homayoon Hatami,
Jung Hyun Bae
Abstract:
There have been significant research activities in recent years to automate the design of channel encoders and decoders via deep learning. Due the dimensionality challenge in channel coding, it is prohibitively complex to design and train relatively large neural channel codes via deep learning techniques. Consequently, most of the results in the literature are limited to relatively short codes hav…
▽ More
There have been significant research activities in recent years to automate the design of channel encoders and decoders via deep learning. Due the dimensionality challenge in channel coding, it is prohibitively complex to design and train relatively large neural channel codes via deep learning techniques. Consequently, most of the results in the literature are limited to relatively short codes having less than 100 information bits. In this paper, we construct ProductAEs, a computationally efficient family of deep-learning driven (encoder, decoder) pairs, that aim at enabling the training of relatively large channel codes (both encoders and decoders) with a manageable training complexity. We build upon the ideas from classical product codes, and propose constructing large neural codes using smaller code components. More specifically, instead of directly training the encoder and decoder for a large neural code of dimension $k$ and blocklength $n$, we provide a framework that requires training neural encoders and decoders for the code parameters $(n_1,k_1)$ and $(n_2,k_2)$ such that $n_1 n_2=n$ and $k_1 k_2=k$. Our training results show significant gains, over all ranges of signal-to-noise ratio (SNR), for a code of parameters $(225,100)$ and a moderate-length code of parameters $(441,196)$, over polar codes under successive cancellation (SC) decoder. Moreover, our results demonstrate meaningful gains over Turbo Autoencoder (TurboAE) and state-of-the-art classical codes. This is the first work to design product autoencoders and a pioneering work on training large channel codes.
△ Less
Submitted 10 September, 2022; v1 submitted 9 October, 2021;
originally announced October 2021.
-
KO codes: Inventing Nonlinear Encoding and Decoding for Reliable Wireless Communication via Deep-learning
Authors:
Ashok Vardhan Makkuva,
Xiyang Liu,
Mohammad Vahid Jamali,
Hessam Mahdavifar,
Sewoong Oh,
Pramod Viswanath
Abstract:
Landmark codes underpin reliable physical layer communication, e.g., Reed-Muller, BCH, Convolution, Turbo, LDPC and Polar codes: each is a linear code and represents a mathematical breakthrough. The impact on humanity is huge: each of these codes has been used in global wireless communication standards (satellite, WiFi, cellular). Reliability of communication over the classical additive white Gaus…
▽ More
Landmark codes underpin reliable physical layer communication, e.g., Reed-Muller, BCH, Convolution, Turbo, LDPC and Polar codes: each is a linear code and represents a mathematical breakthrough. The impact on humanity is huge: each of these codes has been used in global wireless communication standards (satellite, WiFi, cellular). Reliability of communication over the classical additive white Gaussian noise (AWGN) channel enables benchmarking and ranking of the different codes. In this paper, we construct KO codes, a computationaly efficient family of deep-learning driven (encoder, decoder) pairs that outperform the state-of-the-art reliability performance on the standardized AWGN channel. KO codes beat state-of-the-art Reed-Muller and Polar codes, under the low-complexity successive cancellation decoding, in the challenging short-to-medium block length regime on the AWGN channel. We show that the gains of KO codes are primarily due to the nonlinear map** of information bits directly to transmit real symbols (bypassing modulation) and yet possess an efficient, high performance decoder. The key technical innovation that renders this possible is design of a novel family of neural architectures inspired by the computation tree of the {\bf K}ronecker {\bf O}peration (KO) central to Reed-Muller and Polar codes. These architectures pave way for the discovery of a much richer class of hitherto unexplored nonlinear algebraic structures. The code is available at \href{https://github.com/deepcomm/KOcodes}{https://github.com/deepcomm/KOcodes}
△ Less
Submitted 29 August, 2021;
originally announced August 2021.
-
Robust Watermarking using Diffusion of Logo into Autoencoder Feature Maps
Authors:
Maedeh Jamali,
Nader Karim,
Pejman Khadivi,
Shahram Shirani,
Shadrokh Samavi
Abstract:
Digital contents have grown dramatically in recent years, leading to increased attention to copyright. Image watermarking has been considered one of the most popular methods for copyright protection. With the recent advancements in applying deep neural networks in image processing, these networks have also been used in image watermarking. Robustness and imperceptibility are two challenging feature…
▽ More
Digital contents have grown dramatically in recent years, leading to increased attention to copyright. Image watermarking has been considered one of the most popular methods for copyright protection. With the recent advancements in applying deep neural networks in image processing, these networks have also been used in image watermarking. Robustness and imperceptibility are two challenging features of watermarking methods that the trade-off between them should be satisfied. In this paper, we propose to use an end-to-end network for watermarking. We use a convolutional neural network (CNN) to control the embedding strength based on the image content. Dynamic embedding helps the network to have the lowest effect on the visual quality of the watermarked image. Different image processing attacks are simulated as a network layer to improve the robustness of the model. Our method is a blind watermarking approach that replicates the watermark string to create a matrix of the same size as the input image. Instead of diffusing the watermark data into the input image, we inject the data into the feature space and force the network to do this in regions that increase the robustness against various attacks. Experimental results show the superiority of the proposed method in terms of imperceptibility and robustness compared to the state-of-the-art algorithms.
△ Less
Submitted 24 May, 2021;
originally announced May 2021.
-
Coded Computing via Binary Linear Codes: Designs and Performance Limits
Authors:
Mahdi Soleymani,
Mohammad Vahid Jamali,
Hessam Mahdavifar
Abstract:
We consider the problem of coded distributed computing where a large linear computational job, such as a matrix multiplication, is divided into $k$ smaller tasks, encoded using an $(n,k)$ linear code, and performed over $n$ distributed nodes. The goal is to reduce the average execution time of the computational job. We provide a connection between the problem of characterizing the average executio…
▽ More
We consider the problem of coded distributed computing where a large linear computational job, such as a matrix multiplication, is divided into $k$ smaller tasks, encoded using an $(n,k)$ linear code, and performed over $n$ distributed nodes. The goal is to reduce the average execution time of the computational job. We provide a connection between the problem of characterizing the average execution time of a coded distributed computing system and the problem of analyzing the error probability of codes of length $n$ used over erasure channels. Accordingly, we present closed-form expressions for the execution time using binary random linear codes and the best execution time any linear-coded distributed computing system can achieve. It is also shown that there exist \textit{good} binary linear codes that not only attain (asymptotically) the best performance that any linear code (not necessarily binary) can achieve but also are numerically stable against the inevitable rounding errors in practice. We then develop a low-complexity algorithm for decoding Reed-Muller (RM) codes over erasure channels. Our decoder only involves additions, subtractions, {and inversion of relatively small matrices of dimensions at most $\log n+1$}, and enables coded computation over real-valued data. Extensive numerical analysis of the fundamental results as well as RM- and polar-coded computing schemes demonstrate the excellence of the RM-coded computation in achieving close-to-optimal performance while having a low-complexity decoding and explicit construction. The proposed framework in this paper enables efficient designs of distributed computing systems given the rich literature in the channel coding theory.
△ Less
Submitted 4 October, 2021; v1 submitted 2 March, 2021;
originally announced March 2021.
-
Reed-Muller Subcodes: Machine Learning-Aided Design of Efficient Soft Recursive Decoding
Authors:
Mohammad Vahid Jamali,
Xiyang Liu,
Ashok Vardhan Makkuva,
Hessam Mahdavifar,
Sewoong Oh,
Pramod Viswanath
Abstract:
Reed-Muller (RM) codes are conjectured to achieve the capacity of any binary-input memoryless symmetric (BMS) channel, and are observed to have a comparable performance to that of random codes in terms of scaling laws. On the negative side, RM codes lack efficient decoders with performance close to that of a maximum likelihood decoder for general parameters. Also, they only admit certain discrete…
▽ More
Reed-Muller (RM) codes are conjectured to achieve the capacity of any binary-input memoryless symmetric (BMS) channel, and are observed to have a comparable performance to that of random codes in terms of scaling laws. On the negative side, RM codes lack efficient decoders with performance close to that of a maximum likelihood decoder for general parameters. Also, they only admit certain discrete sets of rates. In this paper, we focus on subcodes of RM codes with flexible rates that can take any code dimension from 1 to n, where n is the blocklength. We first extend the recursive projection-aggregation (RPA) algorithm proposed recently by Ye and Abbe for decoding RM codes. To lower the complexity of our decoding algorithm, referred to as subRPA in this paper, we investigate different ways for pruning the projections. We then derive the soft-decision based version of our algorithm, called soft-subRPA, that is shown to improve upon the performance of subRPA. Furthermore, it enables training a machine learning (ML) model to search for \textit{good} sets of projections in the sense of minimizing the decoding error rate. Training our ML model enables achieving very close to the performance of full-projection decoding with a significantly reduced number of projections. For instance, our simulation results on a (64,14) RM subcode show almost identical performance for full-projection decoding and pruned-projection decoding with 15 projections picked via training our ML model. This is equivalent to lowering the complexity by a factor of more than 4 without sacrificing the decoding performance.
△ Less
Submitted 2 February, 2021;
originally announced February 2021.
-
Weighted Fuzzy-Based PSNR for Watermarking
Authors:
Maedeh Jamali,
Nader Karimi,
Shadrokh Samavi
Abstract:
One of the problems of conventional visual quality evaluation criteria such as PSNR and MSE is the lack of appropriate standards based on the human visual system (HVS). They are calculated based on the difference of the corresponding pixels in the original and manipulated image. Hence, they practically do not provide a correct understanding of the image quality. Watermarking is an image processing…
▽ More
One of the problems of conventional visual quality evaluation criteria such as PSNR and MSE is the lack of appropriate standards based on the human visual system (HVS). They are calculated based on the difference of the corresponding pixels in the original and manipulated image. Hence, they practically do not provide a correct understanding of the image quality. Watermarking is an image processing application in which the image's visual quality is an essential criterion for its evaluation. Watermarking requires a criterion based on the HVS that provides more accurate values than conventional measures such as PSNR. This paper proposes a weighted fuzzy-based criterion that tries to find essential parts of an image based on the HVS. Then these parts will have larger weights in computing the final value of PSNR. We compare our results against standard PSNR, and our experiments show considerable consequences.
△ Less
Submitted 21 January, 2021;
originally announced January 2021.
-
Covert Millimeter-Wave Communication: Design Strategies and Performance Analysis
Authors:
Mohammad Vahid Jamali,
Hessam Mahdavifar
Abstract:
In this paper, we investigate covert communication over millimeter-wave (mmWave) frequencies. In particular, a mmWave transmitter, referred to as Alice, attempts to reliably communicate to a receiver, referred to as Bob, while hiding the existence of communication from a warden, referred to as Willie.
In this regard, operating over the mmWave bands not only increases the covertness thanks to dir…
▽ More
In this paper, we investigate covert communication over millimeter-wave (mmWave) frequencies. In particular, a mmWave transmitter, referred to as Alice, attempts to reliably communicate to a receiver, referred to as Bob, while hiding the existence of communication from a warden, referred to as Willie.
In this regard, operating over the mmWave bands not only increases the covertness thanks to directional beams, but also increases the transmission data rates given much more available bandwidths and enables ultra-low form factor transceivers due to the lower wavelengths used compared to the conventional radio frequency (RF) counterpart. We first assume that the transmitter Alice employs two independent antenna arrays in which one of the arrays is to form a directive beam for data transmission to Bob. The other antenna array is used by Alice to generate another beam toward Willie as a jamming signal while changing the transmit power independently across the transmission blocks in order to achieve the desired covertness. For this dual-beam setup, we characterize Willie's detection error rate with the optimal detector and the closed-form of its expected value from Alice's perspective. We then derive the closed-form expression for the outage probability of the Alice-Bob link, which enables characterizing the optimal covert rate that can be achieved using the proposed setup. We further obtain tractable forms for the ergodic capacity of the Alice-Bob link involving only one-dimensional integrals that can be computed in closed forms for most ranges of the channel parameters. Finally, we highlight how the results can be extended to more practical scenarios, particularly to the cases where perfect information about the location of the passive warden is not available.
△ Less
Submitted 24 October, 2021; v1 submitted 24 July, 2020;
originally announced July 2020.
-
Massive Coded-NOMA for Low-Capacity Channels: A Low-Complexity Recursive Approach
Authors:
Mohammad Vahid Jamali,
Hessam Mahdavifar
Abstract:
In this paper, we present a low-complexity recursive approach for massive and scalable code-domain nonorthogonal multiple access (NOMA) with applications to emerging low-capacity scenarios. The problem definition in this paper is inspired by three major requirements of the next generations of wireless networks. Firstly, the proposed scheme is particularly beneficial in low-capacity regimes which i…
▽ More
In this paper, we present a low-complexity recursive approach for massive and scalable code-domain nonorthogonal multiple access (NOMA) with applications to emerging low-capacity scenarios. The problem definition in this paper is inspired by three major requirements of the next generations of wireless networks. Firstly, the proposed scheme is particularly beneficial in low-capacity regimes which is important in practical scenarios of utmost interest such as the Internet-of-Things (IoT) and massive machine-type communication (mMTC). Secondly, we employ code-domain NOMA to efficiently share the scarce common resources among the users. Finally, the proposed recursive approach enables code-domain NOMA with low-complexity detection algorithms that are scalable with the number of users to satisfy the requirements of massive connectivity. To this end, we propose a novel encoding and decoding scheme for code-domain NOMA based on factorizing the pattern matrix, for assigning the available resource elements to the users, as the Kronecker product of several smaller factor matrices. As a result, both the pattern matrix design at the transmitter side and the mixed symbols' detection at the receiver side can be performed over matrices with dimensions that are much smaller than the overall pattern matrix. Consequently, this leads to significant reduction in both the complexity and the latency of the detection. We present the detection algorithm for the general case of factor matrices. The proposed algorithm involves several recursions each involving certain sets of equations corresponding to a certain factor matrix. We then characterize the system performance in terms of average sum rate, latency, and detection complexity. Our latency and complexity analysis confirm the superiority of our proposed scheme in enabling large pattern matrices.
△ Less
Submitted 10 March, 2021; v1 submitted 11 June, 2020;
originally announced June 2020.
-
Graphs and codes produced by a new method for dividing a natural number by two
Authors:
M. Zeynali Azim,
M. A. Jabraeil Jamali,
B. Anari,
S. Alikhani,
S. Akbarpour
Abstract:
In this paper, we introduce a new method which we call it MZ-method, for dividing a natural number $x$ by two and then we use graph as a model to show MZ-algorithm. Applying (recursively) $k$-times of the MZ-method for the number $x$, produces a graph with unique structure that is denoted by $G_k(x)$. We investigate the structure of $G_k(x)$. Also from the natural number $x$ and graph $G_k(x)$ we…
▽ More
In this paper, we introduce a new method which we call it MZ-method, for dividing a natural number $x$ by two and then we use graph as a model to show MZ-algorithm. Applying (recursively) $k$-times of the MZ-method for the number $x$, produces a graph with unique structure that is denoted by $G_k(x)$. We investigate the structure of $G_k(x)$. Also from the natural number $x$ and graph $G_k(x)$ we produce codes which are important and applicable in the information security and cryptography.
△ Less
Submitted 3 March, 2020;
originally announced March 2020.
-
Saliency Based Fire Detection Using Texture and Color Features
Authors:
Maedeh Jamali,
Nader Karimi,
Shadrokh Samavi
Abstract:
Due to industry deployment and extension of urban areas, early warning systems have an essential role in giving emergency. Fire is an event that can rapidly spread and cause injury, death, and damage. Early detection of fire could significantly reduce these injuries. Video-based fire detection is a low cost and fast method in comparison with conventional fire detectors. Most available fire detecti…
▽ More
Due to industry deployment and extension of urban areas, early warning systems have an essential role in giving emergency. Fire is an event that can rapidly spread and cause injury, death, and damage. Early detection of fire could significantly reduce these injuries. Video-based fire detection is a low cost and fast method in comparison with conventional fire detectors. Most available fire detection methods have a high false-positive rate and low accuracy. In this paper, we increase accuracy by using spatial and temporal features. Captured video sequences are divided into Spatio-temporal blocks. Then a saliency map and combination of color and texture features are used for detecting fire regions. We use the HSV color model as a spatial feature and LBP-TOP for temporal processing of fire texture. Fire detection tests on publicly available datasets have shown the accuracy and robustness of the algorithm.
△ Less
Submitted 20 December, 2019;
originally announced December 2019.
-
Robustness and Imperceptibility Enhancement in Watermarked Images by Color Transformation
Authors:
Maedeh Jamali,
Mahnoosh Bagheri,
Nader Karimi,
Shadrokh Samavi
Abstract:
One of the effective methods for the preservation of copyright ownership of digital media is watermarking. Different watermarking techniques try to set a tradeoff between robustness and transparency of the process. In this research work, we have used color space conversion and frequency transform to achieve high robustness and transparency. Due to the distribution of image information in the RGB d…
▽ More
One of the effective methods for the preservation of copyright ownership of digital media is watermarking. Different watermarking techniques try to set a tradeoff between robustness and transparency of the process. In this research work, we have used color space conversion and frequency transform to achieve high robustness and transparency. Due to the distribution of image information in the RGB domain, we use the YUV color space, which concentrates the visual information in the Y channel. Embedding of the watermark is performed in the DCT coefficients of the specific wavelet subbands. Experimental results show high transparency and robustness of the proposed method.
△ Less
Submitted 2 November, 2019;
originally announced November 2019.
-
Covert Millimeter-Wave Communication via a Dual-Beam Transmitter
Authors:
Mohammad Vahid Jamali,
Hessam Mahdavifar
Abstract:
In this paper, we investigate covert communication over millimeter-wave (mmWave) frequencies. In particular, a dual-beam mmWave transmitter, comprised of two independent antenna arrays, attempts to reliably communicate to a receiver Bob when hiding the existence of transmission from a warden Willie. In this regard, operating over mmWave bands not only increases the covertness thanks to directional…
▽ More
In this paper, we investigate covert communication over millimeter-wave (mmWave) frequencies. In particular, a dual-beam mmWave transmitter, comprised of two independent antenna arrays, attempts to reliably communicate to a receiver Bob when hiding the existence of transmission from a warden Willie. In this regard, operating over mmWave bands not only increases the covertness thanks to directional beams, but also increases the transmission data rates given much more available bandwidths and enables ultra-low form factor transceivers due to the lower wavelengths used compared to the conventional radio frequency (RF) counterpart. We assume that the transmitter Alice employs one of its antenna arrays to form a directive beam for transmission to Bob. The other antenna array is used by Alice to generate another beam toward Willie as a jamming signal with its transmit power changing independently from a transmission block to another block. We characterize Willie's detection performance with the optimal detector and the closed-form of its expected value from Alice's perspective. We further derive the closed-form expression for the outage probability of the Alice-Bob link, which enables characterizing the optimal covert rate that can be achieved using the proposed setup. Our results demonstrate the superiority of mmWave covert communication, in terms of covertness and rate, compared to the RF counterpart.
△ Less
Submitted 20 August, 2019;
originally announced August 2019.
-
Coded Distributed Computing: Performance Limits and Code Designs
Authors:
Mohammad Vahid Jamali,
Mahdi Soleymani,
Hessam Mahdavifar
Abstract:
We consider the problem of coded distributed computing where a large linear computational job, such as a matrix multiplication, is divided into $k$ smaller tasks, encoded using an $(n,k)$ linear code, and performed over $n$ distributed nodes. The goal is to reduce the average execution time of the computational job. We provide a connection between the problem of characterizing the average executio…
▽ More
We consider the problem of coded distributed computing where a large linear computational job, such as a matrix multiplication, is divided into $k$ smaller tasks, encoded using an $(n,k)$ linear code, and performed over $n$ distributed nodes. The goal is to reduce the average execution time of the computational job. We provide a connection between the problem of characterizing the average execution time of a coded distributed computing system and the problem of analyzing the error probability of codes of length $n$ used over erasure channels. Accordingly, we present closed-form expressions for the execution time using binary random linear codes and the best execution time any linear-coded distributed computing system can achieve. It is also shown that there exist good binary linear codes that attain, asymptotically, the best performance any linear code, not necessarily binary, can achieve. We also investigate the performance of coded distributed computing systems using polar and Reed-Muller (RM) codes that can benefit from low-complexity decoding, and superior performance, respectively, as well as explicit constructions. The proposed framework in this paper can enable efficient designs of distributed computing systems given the rich literature in the channel coding theory.
△ Less
Submitted 24 June, 2019;
originally announced June 2019.
-
Uplink Non-Orthogonal Multiple Access over Mixed RF-FSO Systems
Authors:
Mohammad Vahid Jamali,
Hessam Mahdavifar
Abstract:
In this paper, we consider a relay-assisted uplink non-orthogonal multiple access (NOMA) system. In this system, two radio frequency (RF) users are grouped for simultaneous transmissions, over each resource block, to an intermediate relay. The relay then forwards the amplified version of the users' aggregated signals, in the presence of multiuser interference, to a relatively far destination. In o…
▽ More
In this paper, we consider a relay-assisted uplink non-orthogonal multiple access (NOMA) system. In this system, two radio frequency (RF) users are grouped for simultaneous transmissions, over each resource block, to an intermediate relay. The relay then forwards the amplified version of the users' aggregated signals, in the presence of multiuser interference, to a relatively far destination. In order to cope with the users' ever-increasing desire for higher data rates, a high-throughput free-space optics (FSO) link is employed as the relay-destination backhaul link. It is assumed that the FSO backhaul link is subject to Gamma-Gamma turbulence with pointing error. Also, a Rayleigh fading model is considered for the user-relay access links. Under these assumptions, we derive closed-form expressions for the outage probability and tractable forms, involving only one-dimensional integrals, for the ergodic capacity. Moreover, the outage probability and ergodic capacity analysis are extended to the conventional RF-backhauled systems in the presence of multiuser interference to both relay and destination nodes, and Rician fading for the relay-destination RF link. Our results reveal the superiority of FSO backhauling for high-throughput and high-reliability NOMA systems compared to RF backhauling. This work can be considered as a general analysis of dual-hop uplink NOMA systems as well as the first attempt to incorporate power-domain NOMA in mixed RF-FSO systems.
△ Less
Submitted 16 February, 2020; v1 submitted 1 March, 2019;
originally announced March 2019.
-
Channel Coding at Low Capacity
Authors:
Mohammad Fereydounian,
Hamed Hassani,
Mohammad Vahid Jamali,
Hessam Mahdavifar
Abstract:
Low-capacity scenarios have become increasingly important in the technology of the Internet of Things (IoT) and the next generation of wireless networks. Such scenarios require efficient and reliable transmission over channels with an extremely small capacity. Within these constraints, the state-of-the-art coding techniques may not be directly applicable. Moreover, the prior work on the finite-len…
▽ More
Low-capacity scenarios have become increasingly important in the technology of the Internet of Things (IoT) and the next generation of wireless networks. Such scenarios require efficient and reliable transmission over channels with an extremely small capacity. Within these constraints, the state-of-the-art coding techniques may not be directly applicable. Moreover, the prior work on the finite-length analysis of optimal channel coding provides inaccurate predictions of the limits in the low-capacity regime. In this paper, we study channel coding at low capacity from two perspectives: fundamental limits at finite length and code constructions. We first specify what a low-capacity regime means. We then characterize finite-length fundamental limits of channel coding in the low-capacity regime for various types of channels, including binary erasure channels (BECs), binary symmetric channels (BSCs), and additive white Gaussian noise (AWGN) channels. From the code construction perspective, we characterize the optimal number of repetitions for transmission over binary memoryless symmetric (BMS) channels, in terms of the code blocklength and the underlying channel capacity, such that the capacity loss due to the repetition is negligible. Furthermore, it is shown that capacity-achieving polar codes naturally adopt the aforementioned optimal number of repetitions.
△ Less
Submitted 4 February, 2023; v1 submitted 10 November, 2018;
originally announced November 2018.
-
Outage Probability Analysis of Uplink NOMA over Ultra-High-Speed FSO-Backhauled Systems
Authors:
Mohammad Vahid Jamali,
Seyed Mohammad Azimi-Abarghouyi,
Hessam Mahdavifar
Abstract:
In this paper, we consider a relay-assisted uplink non-orthogonal multiple access (NOMA) system where two radio frequency (RF) users are grouped for simultaneous transmission, over each resource block, to an intermediate relay which forwards the amplified version of the users' aggregated signals in the presence of multiuser interference to a relatively far destination. In order to cope with the us…
▽ More
In this paper, we consider a relay-assisted uplink non-orthogonal multiple access (NOMA) system where two radio frequency (RF) users are grouped for simultaneous transmission, over each resource block, to an intermediate relay which forwards the amplified version of the users' aggregated signals in the presence of multiuser interference to a relatively far destination. In order to cope with the users' ever-increasing desire for higher data rates, a high-throughput free-space optics (FSO) link is employed as the relay-destination backhaul link. Dynamic-order decoding is employed at the destination to determine the priority of the users based on their instantaneous channel state information (CSI). Closed-form expressions for the individual- and sum-rate outage probability formulas are derived in the case of independent Rayleigh fading for the users-relay access links when the FSO backhaul link is subject to Gamma-Gamma turbulence with pointing error. This work can be regarded as an initial attempt to incorporate power-domain NOMA over ultra-high-speed FSO-backhauled systems, known as mixed RF-FSO systems.
△ Less
Submitted 8 September, 2018;
originally announced September 2018.
-
A Low-Complexity Recursive Approach Toward Code-Domain NOMA for Massive Communications
Authors:
Mohammad Vahid Jamali,
Hessam Mahdavifar
Abstract:
Nonorthogonal multiple access (NOMA) is a promising technology to meet the demands of the next generation wireless networks on massive connectivity, high throughput and reliability, improved fairness, and low latency. In this context, code-domain NOMA which attempts to serve $K$ users in $M\leq K$ orthogonal resource blocks, using a pattern matrix, is of utmost interest. However, extending the pat…
▽ More
Nonorthogonal multiple access (NOMA) is a promising technology to meet the demands of the next generation wireless networks on massive connectivity, high throughput and reliability, improved fairness, and low latency. In this context, code-domain NOMA which attempts to serve $K$ users in $M\leq K$ orthogonal resource blocks, using a pattern matrix, is of utmost interest. However, extending the pattern matrix dimensions severely increases the detection complexity and hampers on the significant advantages that can be achieved using large pattern matrices. In this paper, we propose a novel approach toward code-domain NOMA which factorizes the pattern matrix as the Kronecker product of some other factor matrices each with a smaller dimension. Therefore, both the pattern matrix design at the transmitter side and the mixed symbols' detection at the receiver side can be performed over much smaller dimensions and with a remarkably reduced complexity and latency. As a consequence, the system can significantly be overloaded to effectively support the requirements of the next generation wireless networks without any considerable increase on the system complexity.
△ Less
Submitted 14 April, 2018;
originally announced April 2018.
-
Statistical Studies of Fading in Underwater Wireless Optical Channels in the Presence of Air Bubble, Temperature, and Salinity Random Variations (Long Version)
Authors:
Mohammad Vahid Jamali,
Ali Mirani,
Alireza Parsay,
Bahman Abolhassani,
Pooya Nabavi,
Ata Chizari,
Pirazh Khorramshahi,
Sajjad Abdollahramezani,
Jawad A. Salehi
Abstract:
Optical signal propagation through underwater channels is affected by three main degrading phenomena, namely absorption, scattering, and fading. In this paper, we experimentally study the statistical distribution of intensity fluctuations in underwater wireless optical channels with random temperature and salinity variations as well as the presence of air bubbles. In particular, we define differen…
▽ More
Optical signal propagation through underwater channels is affected by three main degrading phenomena, namely absorption, scattering, and fading. In this paper, we experimentally study the statistical distribution of intensity fluctuations in underwater wireless optical channels with random temperature and salinity variations as well as the presence of air bubbles. In particular, we define different scenarios to produce random fluctuations on the water refractive index across the propagation path, and then examine the accuracy of various statistical distributions in terms of their goodness of fit to the experimental data. We also obtain the channel coherence time to address the average period of fading temporal variations. The scenarios under consideration cover a wide range of scintillation index from weak to strong turbulence. Moreover, the effects of beam-collimator at the transmitter side and aperture averaging lens at the receiver side are experimentally investigated. We show that the use of a transmitter beam-collimator and/or a receiver aperture averaging lens suits single-lobe distributions such that the generalized Gamma and exponential Weibull distributions can excellently match the histograms of the acquired data. Our experimental results further reveal that the channel coherence time is on the order of $10^{-3}$ seconds and larger which implies to the slow fading turbulent channels.
△ Less
Submitted 4 February, 2018; v1 submitted 23 January, 2018;
originally announced January 2018.
-
Adaptive Blind Image Watermarking Using Fuzzy Inference System Based on Human Visual Perception
Authors:
Maedeh Jamali,
Shima Rafiei,
S. M. Reza Soroushmehr,
Nader Karimi,
Shahram Shirani,
Kayvan Najarian,
Shadrokh Samavi
Abstract:
Development of digital content has increased the necessity of copyright protection by means of watermarking. Imperceptibility and robustness are two important features of watermarking algorithms. The goal of watermarking methods is to satisfy the tradeoff between these two contradicting characteristics. Recently watermarking methods in transform domains have displayed favorable results. In this pa…
▽ More
Development of digital content has increased the necessity of copyright protection by means of watermarking. Imperceptibility and robustness are two important features of watermarking algorithms. The goal of watermarking methods is to satisfy the tradeoff between these two contradicting characteristics. Recently watermarking methods in transform domains have displayed favorable results. In this paper, we present an adaptive blind watermarking method which has high transparency in areas that are important to human visual system. We propose a fuzzy system for adaptive control of the embedding strength factor. Features such as saliency, intensity, and edge-concentration, are used as fuzzy attributes. Redundant embedding in discrete cosine transform (DCT) of wavelet domain has increased the robustness of our method. Experimental results show the efficiency of the proposed method and better results are obtained as compared to comparable methods with same size of watermark logo.
△ Less
Submitted 17 October, 2018; v1 submitted 5 September, 2017;
originally announced September 2017.
-
Publication Trends in Physics Education: A Bibliometric study
Authors:
Seyedh Mahboobeh Jamali,
Ahmad Nurulazam Md Zain,
Mohd Ali Samsudin,
Nader Ale Ebrahim
Abstract:
A publication trend in Physics Education by employing bibliometric analysis leads the researchers to describe current scientific movement. This paper tries to answer "What do Physics education scientists concentrate in their publications?" by analyzing the productivity and development of publications on the subject category of Physics Education in the period 1980--2013. The Web of Science database…
▽ More
A publication trend in Physics Education by employing bibliometric analysis leads the researchers to describe current scientific movement. This paper tries to answer "What do Physics education scientists concentrate in their publications?" by analyzing the productivity and development of publications on the subject category of Physics Education in the period 1980--2013. The Web of Science databases in the research areas of "EDUCATION - EDUCATIONAL RESEARCH" was used to extract the publication trends. The study involves 1360 publications, including 840 articles, 503 proceedings paper, 22 reviews, 7 editorial material, 6 Book review, and one Biographical item. Number of publications with "Physical Education" in topic increased from 0.14 % (n = 2) in 1980 to 16.54 % (n = 225) in 2011. Total number of receiving citations is 8071, with approximately citations per papers of 5.93. The results show the publication and citations in Physic Education has increased dramatically while the Malaysian share is well ranked.
△ Less
Submitted 6 June, 2017;
originally announced June 2017.
-
MIMO Underwater Visible Light Communications: Comprehensive Channel Study, Performance Analysis, and Multiple-Symbol Detection
Authors:
Mohammad Vahid Jamali,
Pooya Nabavi,
Jawad A. Salehi
Abstract:
In this paper, we analytically study the bit error rate (BER) performance of underwater visible light communication (UVLC) systems with binary pulse position modulation (BPPM). We simulate the channel fading-free impulse response (FFIR) based on Monte Carlo numerical method to take into account the absorption and scattering effects. Additionally, to characterize turbulence effects, we multiply the…
▽ More
In this paper, we analytically study the bit error rate (BER) performance of underwater visible light communication (UVLC) systems with binary pulse position modulation (BPPM). We simulate the channel fading-free impulse response (FFIR) based on Monte Carlo numerical method to take into account the absorption and scattering effects. Additionally, to characterize turbulence effects, we multiply the aforementioned FFIR by a fading coefficient which for weak oceanic turbulence can be modeled as a lognormal random variable (RV). Moreover, to mitigate turbulence effects, we employ multiple transmitters and/or receivers, i.e., spatial diversity technique over UVLC links. Closed-form expressions for the system BER are provided, when equal gain combiner (EGC) is employed at the receiver side, thanks to Gauss-Hermite quadrature formula and approximation to the sum of lognormal RVs. We further apply saddle-point approximation, an accurate photon-counting-based method, to evaluate the system BER in the presence of shot noise. Both laser-based collimated and light emitting diode (LED)-based diffusive links are investigated. Since multiple-scattering effect of UVLC channels on the propagating photons causes considerable inter-symbol interference (ISI), especially for diffusive channels, we also obtain the optimum multiple-symbol detection (MSD) algorithm to significantly alleviate ISI effects and improve the system performance. Our numerical analysis indicates good matches between the analytical and photon-counting results implying the negligibility of signal-dependent shot noise, and also between analytical results and numerical simulations confirming the accuracy of our derived closed-form expressions for the system BER. Besides, our results show that spatial diversity significantly mitigates fading impairments while MSD considerably alleviates ISI deteriorations.
△ Less
Submitted 6 November, 2017; v1 submitted 4 April, 2017;
originally announced April 2017.
-
Mining DNA Sequences Based on Spatially Coded Technique Using Spatial Light Modulator
Authors:
Masoome Fazelian,
Sajjad AbdollahRamezani,
Sima Bahrani,
Ata Chizari,
Mohammad Vahid Jamali,
Pirazh Khorramshahi,
Arvin Tashakori,
Shadi Shahsavari,
Jawad A. Salehi
Abstract:
In this paper, we present an optical computing method for string data alignment applicable to genome information analysis. By applying moire technique to spatial encoding patterns of deoxyribonucleic acid (DNA) sequences, association information of the genome and the expressed phenotypes could more effectively be extracted. Such moire fringes reveal occurrence of matching, deletion and insertion b…
▽ More
In this paper, we present an optical computing method for string data alignment applicable to genome information analysis. By applying moire technique to spatial encoding patterns of deoxyribonucleic acid (DNA) sequences, association information of the genome and the expressed phenotypes could more effectively be extracted. Such moire fringes reveal occurrence of matching, deletion and insertion between DNA sequences providing useful visualized information for prediction of gene function and classification of species. Furthermore, by applying a cylindrical lens, a new technique is proposed to map two-dimensional (2D) association information to a one-dimensional (1D) column of pixels, where each pixel in the column is representative of superposition of all bright and dark pixels in the corresponding row. By such a time-consuming preprocessing, local similarities between two intended patterns can readily be found by just using a 1D array of photodetectors and postprocessing could be performed on specified parts in the initial 2D pattern. We also evaluate our proposed circular encoding adapted for poor data alignment condition. Our simulation results together with experimental implementation verify the effectiveness of our dynamic proposed methods which significantly improve system parameters such as processing gain and signal to noise ratio (SNR).
△ Less
Submitted 26 March, 2016;
originally announced March 2016.
-
Statistical Distribution of Intensity Fluctuations for Underwater Wireless Optical Channels in the Presence of Air Bubbles
Authors:
Mohammad Vahid Jamali,
Pirazh Khorramshahi,
Arvin Tashakori,
Ata Chizari,
Shadi Shahsavari,
Sajjad AbdollahRamezani,
Masoome Fazelian,
Sima Bahrani,
Jawad A. Salehi
Abstract:
In this paper, we experimentally investigate the statistical distribution of intensity fluctuations for underwater wireless optical channels under different channel conditions, namely fresh and salty underwater channels with and without air bubbles. To do so, we first measure the received optical signal with a large number of samples. Based on the normalized acquired data the channel coherence tim…
▽ More
In this paper, we experimentally investigate the statistical distribution of intensity fluctuations for underwater wireless optical channels under different channel conditions, namely fresh and salty underwater channels with and without air bubbles. To do so, we first measure the received optical signal with a large number of samples. Based on the normalized acquired data the channel coherence time and the fluctuations probability density function (PDF) are obtained for different channel scenarios. Our experimental results show that salt attenuates the received signal while air bubbles mainly introduce severe intensity fluctuations. Moreover, we observe that log-normal distribution precisely fits the acquired data PDF for scintillation index ($σ^2_I$) values less than $0.1$, while Gamma-Gamma and K distributions aptly predict the intensity fluctuations for $σ^2_I>1$. Since neither of these distributions are capable of predicting the received irradiance for $0.1<σ^2_I<1$, we propose a combination of an exponential and a log-normal distributions to perfectly describe the acquired data PDF for such regimes of scintillation index.
△ Less
Submitted 13 March, 2016;
originally announced March 2016.
-
Performance Analysis of Multi-Hop Underwater Wireless Optical Communication Systems (Extended Version)
Authors:
Mohammad Vahid Jamali,
Ata Chizari,
Jawad A. Salehi
Abstract:
In this paper, we evaluate the end-to-end bit error rate (BER) of point-to-point underwater wireless optical communication (UWOC) systems with multi-hop transmission. To do so, we analytically derive the BER expression of a single-hop UWOC link as the building block for end-to-end BER evaluation. We also apply photon-counting method to evaluate the system BER in the presence of shot noise. Moreove…
▽ More
In this paper, we evaluate the end-to-end bit error rate (BER) of point-to-point underwater wireless optical communication (UWOC) systems with multi-hop transmission. To do so, we analytically derive the BER expression of a single-hop UWOC link as the building block for end-to-end BER evaluation. We also apply photon-counting method to evaluate the system BER in the presence of shot noise. Moreover, we use Gauss-Hermite quadrature formula to obtain the closed-form solutions for the system BER in the case of log-normal underwater fading channels. Our analytical treatment involves all the impairing effects of the underwater optical channel, namely absorption, scattering and fading. Numerical results demonstrate that multi-hop transmission by alleviating the aforementioned impairing effects of the channel, can significantly improve the system performance and extend the viable end-to-end communication distance. For example, dual-hop transmission in $22.5$ m and $45$ m coastal water links can provide $17.5$ dB and $39$ dB performance enhancement at the BER of $10^{-6}$, respectively.
△ Less
Submitted 13 March, 2016; v1 submitted 9 March, 2016;
originally announced March 2016.
-
Designing A Dimmable OPPM-Based VLC System Under Channel Constraints
Authors:
Ata Chizari,
Mohammad Vahid Jamali,
Jawad A. Salehi,
Akbar Dargahi
Abstract:
In this paper, we design a dimming compatible visible light communication (VLC) system in a standard office room according to illumination standards under channel constraints. We use overlap** pulse position modulation (OPPM) to support dimming control by changing the code weights. The system parameters such as a valid interval for dimming together with an upper bound for bit rate according to t…
▽ More
In this paper, we design a dimming compatible visible light communication (VLC) system in a standard office room according to illumination standards under channel constraints. We use overlap** pulse position modulation (OPPM) to support dimming control by changing the code weights. The system parameters such as a valid interval for dimming together with an upper bound for bit rate according to the channel delay spread are investigated. Moreover, considering the dispersive VLC channel and using Monte Carlo (MC) simulations, a method is proposed to determine the minimum code length in different dimming levels in order to achieve a valid bit error rate (BER).
Finally, trellis coded modulation (TCM) is suggested to be applied to OPPM in order to take advantage of consequent coding gain which could be up to $3$ dB.
△ Less
Submitted 28 February, 2016;
originally announced February 2016.
-
Cellular Underwater Wireless Optical CDMA Network: Potentials and Challenges
Authors:
Farhad Akhoundi,
Mohammad Vahid Jamali,
Navid Banihassan,
Hamzeh Beyranvand,
Amir Minoofar,
Jawad A. Salehi
Abstract:
Underwater wireless optical communications is an emerging solution to the expanding demand for broadband links in oceans and seas. In this paper, a cellular underwater wireless optical code division multiple-access (UW-OCDMA) network is proposed to provide broadband links for commercial and military applications. The optical orthogonal codes (OOC) are employed as signature codes of underwater mobi…
▽ More
Underwater wireless optical communications is an emerging solution to the expanding demand for broadband links in oceans and seas. In this paper, a cellular underwater wireless optical code division multiple-access (UW-OCDMA) network is proposed to provide broadband links for commercial and military applications. The optical orthogonal codes (OOC) are employed as signature codes of underwater mobile users. Fundamental key aspects of the network such as its backhaul architecture, its potential applications and its design challenges are presented. In particular, the proposed network is used as infrastructure of centralized, decentralized and relay-assisted underwater sensor networks for high-speed real-time monitoring. Furthermore, a promising underwater localization and positioning scheme based on this cellular network is presented. Finally, probable design challenges such as cell edge coverage, blockage avoidance, power control and increasing the network capacity are addressed.
△ Less
Submitted 24 February, 2016; v1 submitted 31 January, 2016;
originally announced February 2016.
-
On the BER of Multiple-Input Multiple-Output Underwater Wireless Optical Communication Systems
Authors:
Mohammad Vahid Jamali,
Jawad A. Salehi
Abstract:
In this paper we analyze and investigate the bit error rate (BER) performance of multiple-input multiple-output underwater wireless optical communication (MIMO-UWOC) systems. In addition to exact BER expressions, we also obtain an upper bound on the system BER. To effectively estimate the BER expressions, we use Gauss-Hermite quadrature formula as well as approximation to the sum of log-normal ran…
▽ More
In this paper we analyze and investigate the bit error rate (BER) performance of multiple-input multiple-output underwater wireless optical communication (MIMO-UWOC) systems. In addition to exact BER expressions, we also obtain an upper bound on the system BER. To effectively estimate the BER expressions, we use Gauss-Hermite quadrature formula as well as approximation to the sum of log-normal random variables. We confirm the accuracy of our analytical expressions by evaluating the BER through photon-counting approach. Our simulation results show that MIMO technique can mitigate the channel turbulence-induced fading and consequently, can partially extend the viable communication range, especially for channels with stronger turbulence.
△ Less
Submitted 29 October, 2015; v1 submitted 29 August, 2015;
originally announced August 2015.
-
Performance Characterization of Relay-Assisted Wireless Optical CDMA Networks in Turbulent Underwater Channel
Authors:
Mohammad Vahid Jamali,
Farhad Akhoundi,
Jawad A. Salehi
Abstract:
In this paper, we characterize the performance of relay-assisted underwater wireless optical code division multiple access (OCDMA) networks over turbulent channels. In addition to scattering and absorption effects of underwater channels, we also consider optical turbulence as a log-normal fading coefficient in our analysis. To simultaneously and asynchronously share medium among many users, we ass…
▽ More
In this paper, we characterize the performance of relay-assisted underwater wireless optical code division multiple access (OCDMA) networks over turbulent channels. In addition to scattering and absorption effects of underwater channels, we also consider optical turbulence as a log-normal fading coefficient in our analysis. To simultaneously and asynchronously share medium among many users, we assign a unique optical orthogonal code (OOC) to each user in order to actualize OCDMA-based underwater network. The most significant challenge in underwater optical communication is in the ability to extend the short range of its coverage. In order to expand the viable communication range, we consider multi-hop transmission to the destination. Moreover, we evaluate the performance of a relay-assisted point-to-point UWOC system as a special case of the proposed relay-assisted OCDMA network. Our numerical results indicate significant performance improvement by employing intermediate relays, e.g., one can achieve $32$ {dB} improvement in the bit error rate (BER) of $10^{-6}$ using only a dual-hop transmission in a $90$ {m} point-to-point clear ocean link.
△ Less
Submitted 22 February, 2016; v1 submitted 17 August, 2015;
originally announced August 2015.
-
Performance Studies of Underwater Wireless Optical Communication Systems with Spatial Diversity: MIMO Scheme
Authors:
Mohammad Vahid Jamali,
Jawad A. Salehi,
Farhad Akhoundi
Abstract:
In this paper, we analytically study the performance of multiple-input multiple-output underwater wireless optical communication (MIMO UWOC) systems with on-off keying (OOK) modulation. To mitigate turbulence-induced fading, which is amongst the major degrading effects of underwater channels on the propagating optical signal, we use spatial diversity over UWOC links. Furthermore, the effects of ab…
▽ More
In this paper, we analytically study the performance of multiple-input multiple-output underwater wireless optical communication (MIMO UWOC) systems with on-off keying (OOK) modulation. To mitigate turbulence-induced fading, which is amongst the major degrading effects of underwater channels on the propagating optical signal, we use spatial diversity over UWOC links. Furthermore, the effects of absorption and scattering are considered in our analysis. We analytically obtain the exact and an upper bound bit error rate (BER) expressions for both optimal and equal gain combining. In order to more effectively calculate the system BER, we apply Gauss-Hermite quadrature formula as well as approximation to the sum of lognormal random variables. We also apply photon-counting method to evaluate the system BER in the presence of shot noise. Our numerical results indicate an excellent match between the exact and upper bound BER curves. Also {a good match} between {the} analytical results and numerical simulations confirms the accuracy of our derived expressions. Moreover, our results show that spatial diversity can considerably improve the system performance, especially for channels with higher turbulence, e.g., a $3\times1$ MISO transmission in a $25$ {m} coastal water link with log-amplitude variance of $0.16$ can introduce $8$ {dB} performance improvement at the BER of $10^{-9}$.
△ Less
Submitted 19 December, 2016; v1 submitted 17 August, 2015;
originally announced August 2015.
-
Solving Linear Equations Using a Jacobi Based Time-Variant Adaptive Hybrid Evolutionary Algorithm
Authors:
A. R. M. Jalal Uddin Jamali,
M. M. A. Hashem,
Md. Bazlar Rahman
Abstract:
Large set of linear equations, especially for sparse and structured coefficient (matrix) equations, solutions using classical methods become arduous. And evolutionary algorithms have mostly been used to solve various optimization and learning problems. Recently, hybridization of classical methods (Jacobi method and Gauss-Seidel method) with evolutionary computation techniques have successfully bee…
▽ More
Large set of linear equations, especially for sparse and structured coefficient (matrix) equations, solutions using classical methods become arduous. And evolutionary algorithms have mostly been used to solve various optimization and learning problems. Recently, hybridization of classical methods (Jacobi method and Gauss-Seidel method) with evolutionary computation techniques have successfully been applied in linear equation solving. In the both above hybrid evolutionary methods, uniform adaptation (UA) techniques are used to adapt relaxation factor. In this paper, a new Jacobi Based Time-Variant Adaptive (JBTVA) hybrid evolutionary algorithm is proposed. In this algorithm, a Time-Variant Adaptive (TVA) technique of relaxation factor is introduced aiming at both improving the fine local tuning and reducing the disadvantage of uniform adaptation of relaxation factors. This algorithm integrates the Jacobi based SR method with time variant adaptive evolutionary algorithm. The convergence theorems of the proposed algorithm are proved theoretically. And the performance of the proposed algorithm is compared with JBUA hybrid evolutionary algorithm and classical methods in the experimental domain. The proposed algorithm outperforms both the JBUA hybrid algorithm and classical methods in terms of convergence speed and effectiveness.
△ Less
Submitted 13 April, 2013;
originally announced April 2013.
-
An Approach to Solve Linear Equations Using a Time-Variant Adaptation Based Hybrid Evolutionary Algorithm
Authors:
A. R. M. Jalal Uddin Jamali,
M. M. A. Hashem,
Md. Bazlar Rahman
Abstract:
For small number of equations, systems of linear (and sometimes nonlinear) equations can be solved by simple classical techniques. However, for large number of systems of linear (or nonlinear) equations, solutions using classical method become arduous. On the other hand evolutionary algorithms have mostly been used to solve various optimization and learning problems. Recently, hybridization of evo…
▽ More
For small number of equations, systems of linear (and sometimes nonlinear) equations can be solved by simple classical techniques. However, for large number of systems of linear (or nonlinear) equations, solutions using classical method become arduous. On the other hand evolutionary algorithms have mostly been used to solve various optimization and learning problems. Recently, hybridization of evolutionary algorithm with classical Gauss-Seidel based Successive Over Relaxation (SOR) method has successfully been used to solve large number of linear equations; where a uniform adaptation (UA) technique of relaxation factor is used. In this paper, a new hybrid algorithm is proposed in which a time-variant adaptation (TVA) technique of relaxation factor is used instead of uniform adaptation technique to solve large number of linear equations. The convergence theorems of the proposed algorithms are proved theoretically. And the performance of the proposed TVA-based algorithm is compared with the UA-based hybrid algorithm in the experimental domain. The proposed algorithm outperforms the hybrid one in terms of efficiency.
△ Less
Submitted 11 April, 2013;
originally announced April 2013.
-
For Solving Linear Equations Recombination is a Needless Operation in Time-Variant Adaptive Hybrid Algorithms
Authors:
A. R. M. Jalal Uddin Jamali,
Mohammad Arif Hossain,
G. M. Moniruzzaman,
M. M. A. Hashem
Abstract:
Recently hybrid evolutionary computation (EC) techniques are successfully implemented for solving large sets of linear equations. All the recently developed hybrid evolutionary algorithms, for solving linear equations, contain both the recombination and the mutation operations. In this paper, two modified hybrid evolutionary algorithms contained time-variant adaptive evolutionary technique are pro…
▽ More
Recently hybrid evolutionary computation (EC) techniques are successfully implemented for solving large sets of linear equations. All the recently developed hybrid evolutionary algorithms, for solving linear equations, contain both the recombination and the mutation operations. In this paper, two modified hybrid evolutionary algorithms contained time-variant adaptive evolutionary technique are proposed for solving linear equations in which recombination operation is absent. The effectiveness of the recombination operator has been studied for the time-variant adaptive hybrid algorithms for solving large set of linear equations. Several experiments have been carried out using both the proposed modified hybrid evolutionary algorithms (in which the recombination operation is absent) and corresponding existing hybrid algorithms (in which the recombination operation is present) to solve large set of linear equations. It is found that the number of generations required by the existing hybrid algorithms (i.e. the Gauss-Seidel-SR based time variant adaptive (GSBTVA) hybrid algorithm and the Jacobi-SR based time variant adaptive (JBTVA) hybrid algorithm) and modified hybrid algorithms (i.e. the modified Gauss-Seidel-SR based time variant adaptive (MGSBTVA) hybrid algorithm and the modified Jacobi-SR based time variant adaptive (MJBTVA) hybrid algorithm) are comparable. Also the proposed modified algorithms require less amount of computational time in comparison to the corresponding existing hybrid algorithms. As the proposed modified hybrid algorithms do not contain recombination operation, so they require less computational effort, and also they are more efficient, effective and easy to implement.
△ Less
Submitted 9 April, 2013;
originally announced April 2013.
-
Solving Linear Equations by Classical Jacobi-SR Based Hybrid Evolutionary Algorithm with Uniform Adaptation Technique
Authors:
R. M. Jalal Uddin Jamali,
M. M. A. Hashem,
M. Mahfuz Hasan,
Md. Bazlar Rahman
Abstract:
Solving a set of simultaneous linear equations is probably the most important topic in numerical methods. For solving linear equations, iterative methods are preferred over the direct methods especially when the coefficient matrix is sparse. The rate of convergence of iteration method is increased by using Successive Relaxation (SR) technique. But SR technique is very much sensitive to relaxation…
▽ More
Solving a set of simultaneous linear equations is probably the most important topic in numerical methods. For solving linear equations, iterative methods are preferred over the direct methods especially when the coefficient matrix is sparse. The rate of convergence of iteration method is increased by using Successive Relaxation (SR) technique. But SR technique is very much sensitive to relaxation factor, ω. Recently, hybridization of classical Gauss-Seidel based successive relaxation technique with evolutionary computation techniques have successfully been used to solve large set of linear equations in which relaxation factors are self-adapted. In this paper, a new hybrid algorithm is proposed in which uniform adaptive evolutionary computation techniques and classical Jacobi based SR technique are used instead of classical Gauss-Seidel based SR technique. The proposed Jacobi-SR based uniform adaptive hybrid algorithm, inherently, can be implemented in parallel processing environment efficiently. Whereas Gauss-Seidel-SR based hybrid algorithms cannot be implemented in parallel computing environment efficiently. The convergence theorem and adaptation theorem of the proposed algorithm are proved theoretically. And the performance of the proposed Jacobi-SR based uniform adaptive hybrid evolutionary algorithm is compared with Gauss-Seidel-SR based uniform adaptive hybrid evolutionary algorithm as well as with both classical Jacobi-SR method and Gauss-Seidel-SR method in the experimental domain. The proposed Jacobi-SR based hybrid algorithm outperforms the Gauss-Seidel-SR based hybrid algorithm as well as both classical Jacobi-SR method and Gauss-Seidel-SR method in terms of convergence speed and effectiveness.
△ Less
Submitted 8 April, 2013;
originally announced April 2013.
-
A simple method for decision making in robocup soccer simulation 3d environment
Authors:
Khashayar Niki Maleki,
Mohammad Hadi Valipour,
Sadegh Mokari,
Roohollah Yeylaghi Ashrafi,
Mohammad Reza Jamali,
Caro Lucas
Abstract:
In this paper new hierarchical hybrid fuzzy-crisp methods for decision making and action selection of an agent in soccer simulation 3D environment are presented. First, the skills of an agent are introduced, implemented and classified in two layers, the basicskills and the highlevel skills. In the second layer, a twophase mechanism for decision making is introduced. In phase one, some useful metho…
▽ More
In this paper new hierarchical hybrid fuzzy-crisp methods for decision making and action selection of an agent in soccer simulation 3D environment are presented. First, the skills of an agent are introduced, implemented and classified in two layers, the basicskills and the highlevel skills. In the second layer, a twophase mechanism for decision making is introduced. In phase one, some useful methods are implemented which check the agent's situation for performing required skills. In the next phase, the team str ategy, team for mation, agent's role and the agent's positioning system are introduced. A fuzzy logical approach is employed to recognize the team strategy and further more to tell the player the best position to move. At last, we comprised our implemented algor ithm in the Robocup Soccer Simulation 3D environment and results showed th eefficiency of the introduced methodology.
△ Less
Submitted 7 December, 2012;
originally announced December 2012.
-
Efficient Detection of Sybil Attack Based on Cryptography in Vanet
Authors:
Mina Rahbari,
Mohammad Ali Jabreil Jamali
Abstract:
Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on…
▽ More
Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.
△ Less
Submitted 10 December, 2011;
originally announced December 2011.
-
A Distributed Method for Trust-Aware Recommendation in Social Networks
Authors:
Mohsen Jamali
Abstract:
This paper contains the details of a distributed trust-aware recommendation system. Trust-base recommenders have received a lot of attention recently. The main aim of trust-based recommendation is to deal the problems in traditional Collaborative Filtering recommenders. These problems include cold start users, vulnerability to attacks, etc.. Our proposed method is a distributed approach and can be…
▽ More
This paper contains the details of a distributed trust-aware recommendation system. Trust-base recommenders have received a lot of attention recently. The main aim of trust-based recommendation is to deal the problems in traditional Collaborative Filtering recommenders. These problems include cold start users, vulnerability to attacks, etc.. Our proposed method is a distributed approach and can be easily deployed on social networks or real life networks such as sensor networks or peer to peer networks.
△ Less
Submitted 9 November, 2010;
originally announced November 2010.
-
DAMQ-Based Schemes for Efficiently Using the Buffer Spaces of a NoC Router
Authors:
Mohammad Ali Jabraeil Jamali,
Ahmad Khademzadeh
Abstract:
In this paper we present high performance dynamically allocated multi-queue (DAMQ) buffer schemes for fault tolerance systems on chip applications that require an interconnection network. Two or four virtual channels shared the same buffer space. On the message switching layer, we make improvement to boost system performance when there are faults involved in the components communication. The pro…
▽ More
In this paper we present high performance dynamically allocated multi-queue (DAMQ) buffer schemes for fault tolerance systems on chip applications that require an interconnection network. Two or four virtual channels shared the same buffer space. On the message switching layer, we make improvement to boost system performance when there are faults involved in the components communication. The proposed schemes are when a node or a physical channel is deemed as faulty, the previous hop node will terminate the buffer occupancy of messages destined to the failed link. The buffer usage decisions are made at switching layer without interactions with higher abstract layer, thus buffer space will be released to messages destined to other healthy nodes quickly. Therefore, the buffer space will be efficiently used in case fault occurs at some nodes.
△ Less
Submitted 9 October, 2009;
originally announced October 2009.