-
Curvature Inequalities and Extremal Operators
Authors:
Gadadhar Misra,
Md. Ramiz Reza
Abstract:
A curvature inequality is established for contractive commuting tuples of operators in the Cowen-Douglas class of rank n. Properties of the extremal operators, that is, the operators which achieve equality, are investigated. Specifically, a substantial part of a well known question due to R. G. Douglas involving these extremal operators, in the case of the unit disc, is answered.
A curvature inequality is established for contractive commuting tuples of operators in the Cowen-Douglas class of rank n. Properties of the extremal operators, that is, the operators which achieve equality, are investigated. Specifically, a substantial part of a well known question due to R. G. Douglas involving these extremal operators, in the case of the unit disc, is answered.
△ Less
Submitted 5 February, 2018;
originally announced February 2018.
-
Prodorshok I: A Bengali Isolated Speech Dataset for Voice-Based Assistive Technologies - A comparative analysis of the effects of data augmentation on HMM-GMM and DNN classifiers
Authors:
Mohi Reza,
Warida Rashid,
Moin Mostakim
Abstract:
Prodorshok I is a Bengali isolated word dataset tailored to help create speaker-independent, voice-command driven automated speech recognition (ASR) based assistive technologies to help improve human-computer interaction (HCI). This paper presents the results of an objective analysis that was undertaken using a subset of words from Prodorshok I to assess its reliability in ASR systems that utilize…
▽ More
Prodorshok I is a Bengali isolated word dataset tailored to help create speaker-independent, voice-command driven automated speech recognition (ASR) based assistive technologies to help improve human-computer interaction (HCI). This paper presents the results of an objective analysis that was undertaken using a subset of words from Prodorshok I to assess its reliability in ASR systems that utilize Hidden Markov Models (HMM) with Gaussian emissions and Deep Neural Networks (DNN). The results show that simple data augmentation involving a small pitch shift can make surprisingly tangible improvements to accuracy levels in speech recognition.
△ Less
Submitted 10 December, 2017;
originally announced December 2017.
-
Heterointerface effects in the electro-intercalation of van der Waals heterostructures
Authors:
D. Kwabena Bediako,
Mehdi Rezaee,
Hyobin Yoo,
Daniel T. Larson,
Shu Yang Frank Zhao,
Takashi Taniguchi,
Kenji Watanabe,
Tina L. Brower-Thomas,
Efthimios Kaxiras,
Philip Kim
Abstract:
Molecular-scale manipulation of electronic/ionic charge accumulation in materials is a preeminent challenge, particularly in electrochemical energy storage. Layered van der Waals (vdW) crystals exemplify a diverse family of materials that permit ions to reversibly associate with a host atomic lattice by intercalation into interlamellar gaps. Motivated principally by the search for high-capacity ba…
▽ More
Molecular-scale manipulation of electronic/ionic charge accumulation in materials is a preeminent challenge, particularly in electrochemical energy storage. Layered van der Waals (vdW) crystals exemplify a diverse family of materials that permit ions to reversibly associate with a host atomic lattice by intercalation into interlamellar gaps. Motivated principally by the search for high-capacity battery anodes, ion intercalation in composite materials is a subject of intense study. Yet the precise role and ability of heterolayers to modify intercalation reactions remains elusive. Previous studies of vdW hybrids represented ensemble measurements at macroscopic films/powders, which do not permit the isolation and investigation of the chemistry at individual 2-dimensional (2D) interfaces. Here, we demonstrate the intercalation of lithium at the level of individual atomic interfaces of dissimilar vdW layers. Electrochemical devices based on vdW heterostructures comprised of deterministically stacked hexagonal boron nitride, graphene (G) and molybdenum dichalcogenide (MoX2; X = S, Se) layers are fabricated, enabling the direct resolution of intermediate stages in the intercalation of discrete heterointerfaces and the extent of charge transfer to individual layers. Operando magnetoresistance and optical spectroscopy coupled with low-temperature quantum magneto-oscillation measurements show that the creation of intimate vdW heterointerfaces between G and MoX2 engenders over 10-fold accumulation of charge in MoX2 compared to MoX2/MoX2 homointerfaces, while enforcing a more negative intercalation potential than that of bulk MoX2 by at least 0.5 V. Beyond energy storage, our new combined experimental and computational methodology to manipulate and characterize the electrochemical behavior of layered systems opens up new pathways to control the charge density in 2D (opto)electronic devices.
△ Less
Submitted 26 March, 2018; v1 submitted 9 November, 2017;
originally announced November 2017.
-
Germanium-Vacancy Color Center in Diamond as a Non-invasive Temperature Sensor
Authors:
Jing-Wei Fan,
Ivan Cojocaru,
Joe Becker,
Abdulrahman Alajlan,
Sean Blakley,
Mohammadreza Rezaee,
Anna Lyamkina,
Yuri N. Palyanov,
Yuri M. Borzdov,
Ya-Ping Yang,
Aleksei Zheltikov,
Phil Hemmer,
Alexey V Akimov
Abstract:
We present high-resolution, all-optical thermometry based on ensembles of GeV color center in diamond. Due to the unique properties of diamond, an all-optical approach using this method opens a way to produce non-invasive, back-action-free temperature measurements in a wide range of temperatures, from a few Kelvin to 1100 Kelvin.
We present high-resolution, all-optical thermometry based on ensembles of GeV color center in diamond. Due to the unique properties of diamond, an all-optical approach using this method opens a way to produce non-invasive, back-action-free temperature measurements in a wide range of temperatures, from a few Kelvin to 1100 Kelvin.
△ Less
Submitted 9 September, 2017; v1 submitted 1 September, 2017;
originally announced September 2017.
-
The Optimal Route and Stops for a Group of Users in a Road Network
Authors:
Radi Muhammad Reza,
Mohammed Eunus Ali,
Muhammad Aamir Cheema
Abstract:
Recently, with the advancement of the GPS-enabled cellular technologies, the location-based services (LBS) have gained in popularity. Nowadays, an increasingly larger number of map-based applications enable users to ask a wider variety of queries. Researchers have studied the ride-sharing, the carpooling, the vehicle routing, and the collective travel planning problems extensively in recent years.…
▽ More
Recently, with the advancement of the GPS-enabled cellular technologies, the location-based services (LBS) have gained in popularity. Nowadays, an increasingly larger number of map-based applications enable users to ask a wider variety of queries. Researchers have studied the ride-sharing, the carpooling, the vehicle routing, and the collective travel planning problems extensively in recent years. Collective traveling has the benefit of being environment-friendly by reducing the global travel cost, the greenhouse gas emission, and the energy consumption. In this paper, we introduce several optimization problems to recommend a suitable route and stops of a vehicle, in a road network, for a group of users intending to travel collectively. The goal of each problem is to minimize the aggregate cost of the individual travelers' paths and the shared route under various constraints. First, we formulate the problem of determining the optimal pair of end-stops, given a set of queries that originate and terminate near the two prospective end regions. We outline a baseline polynomial-time algorithm and propose a new faster solution - both calculating an exact answer. In our approach, we utilize the path-coherence property of road networks to develop an efficient algorithm. Second, we define the problem of calculating the optimal route and intermediate stops of a vehicle that picks up and drops off passengers en-route, given its start and end stoppages, and a set of path queries from users. We outline an exact solution of both time and space complexities exponential in the number of queries. Then, we propose a novel polynomial-time-and-space heuristic algorithm that performs reasonably well in practice. We also analyze several variants of this problem under different constraints. Last, we perform extensive experiments that demonstrate the efficiency and accuracy of our algorithms.
△ Less
Submitted 23 June, 2017;
originally announced June 2017.
-
A Vector Matroid-Theoretic Approach in the Study of Structural Controllability Over F(z)
Authors:
Yupeng Yuan,
Zhixiong Li,
Malekian Reza,
Yongzhi Chen,
Ying Chen
Abstract:
In this paper, the structural controllability of the systems over F(z) is studied using a new mathematical method-matroids. Firstly, a vector matroid is defined over F(z). Secondly, the full rank conditions of [sI-A|B] are derived in terms of the concept related to matroid theory, such as rank, base and union. Then the sufficient condition for the linear system and composite system over F(z) to be…
▽ More
In this paper, the structural controllability of the systems over F(z) is studied using a new mathematical method-matroids. Firstly, a vector matroid is defined over F(z). Secondly, the full rank conditions of [sI-A|B] are derived in terms of the concept related to matroid theory, such as rank, base and union. Then the sufficient condition for the linear system and composite system over F(z) to be structurally controllable is obtained. Finally, this paper gives several examples to demonstrate that the married-theoretic approach is simpler than other existing approaches.
△ Less
Submitted 1 April, 2017;
originally announced April 2017.
-
On Optimal Online Algorithms for Energy Harvesting Systems with Continuous Energy and Data Arrivals
Authors:
Milad Rezaee,
Mahtab Mirmohseni,
Mohammad Reza Aref
Abstract:
Energy harvesting (EH) has been developed to extend the lifetimes of energy-limited communication systems. In this letter, we consider a single-user EH communication system, in which both of the arrival data and the harvested energy curves are modeled as general functions. Unlike most of the works in the field, we investigate the online algorithms which only acquire the causal information of the a…
▽ More
Energy harvesting (EH) has been developed to extend the lifetimes of energy-limited communication systems. In this letter, we consider a single-user EH communication system, in which both of the arrival data and the harvested energy curves are modeled as general functions. Unlike most of the works in the field, we investigate the online algorithms which only acquire the causal information of the arrival data and the harvested energy processes. We study how well the optimal online algorithm works compared with the optimal offline algorithm, and thus our goal is to find the lower and upper bounds for the ratio of the completion time in the optimal online algorithm to the optimal offline algorithm. We propose two online algorithms which achieve the upper bound of 2 on this ratio. Also, we show that this ratio is 2 for the optimal online algorithm.
△ Less
Submitted 19 January, 2017;
originally announced January 2017.
-
Hydrodynamic of surge wave energy converters
Authors:
Abbas Yeganeh-Bakhtiary,
Milad Rezaee
Abstract:
Ocean wave energy is a new renewable energy resource which is going to become one of the reliable and alternative resources for fossil fuels during recent decades. The majority of studies have focused on extract wave energy at an effective rate; whilst, there are a few studies to explore the hydrodynamic of wave and surge wave energy converters. In this study a 2D numerical model based on RANS equ…
▽ More
Ocean wave energy is a new renewable energy resource which is going to become one of the reliable and alternative resources for fossil fuels during recent decades. The majority of studies have focused on extract wave energy at an effective rate; whilst, there are a few studies to explore the hydrodynamic of wave and surge wave energy converters. In this study a 2D numerical model based on RANS equations is closured with SST turbulence model employed to simulate the hydrodynamic of the flap type wave energy devices. The results indicate that a partially standing wave induced by the interaction of incident and reflected waves occurs in front of device due to its rotating movements.
△ Less
Submitted 4 January, 2017;
originally announced January 2017.
-
Optimal Transmission Policies for Multi-hop Energy Harvesting Systems
Authors:
Milad Rezaee,
Mahtab Mirmohseni,
Vaneet Aggarwal,
Mohammad Reza Aref
Abstract:
In this paper, we consider a multi-hop energy harvesting (EH) communication system in a full-duplex mode, where arrival data and harvested energy curves in the source and the relays are modeled as general functions. This model includes the EH system with discrete arrival processes as a special case. We investigate the throughput maximization problem considering minimum utilized energy in the sourc…
▽ More
In this paper, we consider a multi-hop energy harvesting (EH) communication system in a full-duplex mode, where arrival data and harvested energy curves in the source and the relays are modeled as general functions. This model includes the EH system with discrete arrival processes as a special case. We investigate the throughput maximization problem considering minimum utilized energy in the source and relays and find the optimal offline algorithm. We show that the optimal solution of the two-hop transmission problem have three main steps: (i) Solving a point-to-point throughput maximization problem at the source; (ii) Solving a point-to-point throughput maximization problem at the relay (after applying the solution of first step as the input of this second problem); (iii) Minimizing utilized energy in the source. In addition, we show that how the optimal algorithm for the completion time minimization problem can be derived from the proposed algorithm for throughput maximization problem. Also, for the throughput maximization problem, we propose an online algorithm and show that it is more efficient than the benchmark one (which is a direct application of an existing point-to-point online algorithm to the multi-hop system).
△ Less
Submitted 30 December, 2016;
originally announced December 2016.
-
Multiview RGB-D Dataset for Object Instance Detection
Authors:
Georgios Georgakis,
Md Alimoor Reza,
Arsalan Mousavian,
Phi-Hung Le,
Jana Kosecka
Abstract:
This paper presents a new multi-view RGB-D dataset of nine kitchen scenes, each containing several objects in realistic cluttered environments including a subset of objects from the BigBird dataset. The viewpoints of the scenes are densely sampled and objects in the scenes are annotated with bounding boxes and in the 3D point cloud. Also, an approach for detection and recognition is presented, whi…
▽ More
This paper presents a new multi-view RGB-D dataset of nine kitchen scenes, each containing several objects in realistic cluttered environments including a subset of objects from the BigBird dataset. The viewpoints of the scenes are densely sampled and objects in the scenes are annotated with bounding boxes and in the 3D point cloud. Also, an approach for detection and recognition is presented, which is comprised of two parts: i) a new multi-view 3D proposal generation method and ii) the development of several recognition baselines using AlexNet to score our proposals, which is trained either on crops of the dataset or on synthetically composited training images. Finally, we compare the performance of the object proposals and a detection baseline to the Washington RGB-D Scenes (WRGB-D) dataset and demonstrate that our Kitchen scenes dataset is more challenging for object detection and recognition. The dataset is available at: http://cs.gmu.edu/~robot/gmu-kitchens.html.
△ Less
Submitted 25 September, 2016;
originally announced September 2016.
-
Reinforcement Learning for Semantic Segmentation in Indoor Scenes
Authors:
Md. Alimoor Reza,
Jana Kosecka
Abstract:
Future advancements in robot autonomy and sophistication of robotics tasks rest on robust, efficient, and task-dependent semantic understanding of the environment. Semantic segmentation is the problem of simultaneous segmentation and categorization of a partition of sensory data. The majority of current approaches tackle this using multi-class segmentation and labeling in a Conditional Random Fiel…
▽ More
Future advancements in robot autonomy and sophistication of robotics tasks rest on robust, efficient, and task-dependent semantic understanding of the environment. Semantic segmentation is the problem of simultaneous segmentation and categorization of a partition of sensory data. The majority of current approaches tackle this using multi-class segmentation and labeling in a Conditional Random Field (CRF) framework or by generating multiple object hypotheses and combining them sequentially. In practical settings, the subset of semantic labels that are needed depend on the task and particular scene and labelling every single pixel is not always necessary. We pursue these observations in developing a more modular and flexible approach to multi-class parsing of RGBD data based on learning strategies for combining independent binary object-vs-background segmentations in place of the usual monolithic multi-label CRF approach. Parameters for the independent binary segmentation models can be learned very efficiently, and the combination strategy---learned using reinforcement learning---can be set independently and can vary over different tasks and environments. Accuracy is comparable to state-of-art methods on a subset of the NYU-V2 dataset of indoor scenes, while providing additional flexibility and modularity.
△ Less
Submitted 3 June, 2016;
originally announced June 2016.
-
Operator Space Structures on $\ell^1(n).$
Authors:
Rajeev Gupta,
Md Ramiz Reza
Abstract:
We show that the complex normed linear space $\ell^1(n),$ $n>1,$ has no isometric embedding into $k\times k$ complex matrices for any $k\in \mathbb{N}$ and discuss a class of infinite dimensional operator space structures on it.
We show that the complex normed linear space $\ell^1(n),$ $n>1,$ has no isometric embedding into $k\times k$ complex matrices for any $k\in \mathbb{N}$ and discuss a class of infinite dimensional operator space structures on it.
△ Less
Submitted 12 May, 2016;
originally announced May 2016.
-
Curvature inequalities for operators in the Cowen-Douglas class of a planar domain
Authors:
Md. Ramiz Reza
Abstract:
Fix a bounded planar domain $Ω.$ If an operator $T,$ in the Cowen-Douglas class $B_1(Ω),$ admits the compact set $\barΩ$ as a spectral set, then the curvature inequality $\mathcal K_T(w) \leq - 4 π^2 S_Ω(w,w)^2,$ where $S_Ω$ is the Szego kernel of the domain $Ω,$ is evident. Except when $Ω$ is simply connected, the existence of an operator for which $\mathcal K_T(w) = 4 π^2 S_Ω(w,w)^2$ for all…
▽ More
Fix a bounded planar domain $Ω.$ If an operator $T,$ in the Cowen-Douglas class $B_1(Ω),$ admits the compact set $\barΩ$ as a spectral set, then the curvature inequality $\mathcal K_T(w) \leq - 4 π^2 S_Ω(w,w)^2,$ where $S_Ω$ is the Szego kernel of the domain $Ω,$ is evident. Except when $Ω$ is simply connected, the existence of an operator for which $\mathcal K_T(w) = 4 π^2 S_Ω(w,w)^2$ for all $w$ in $Ω$ is not known. However, one knows that if $w$ is a fixed but arbitrary point in $Ω,$ then there exists a bundle shift of rank $1,$ say $S,$ depending on this $w,$ such that $\mathcal K_{S^*}(w) = 4 π^2 S_Ω(w,w)^2.$ We prove that these {\em extremal} operators are uniquely determined: If $T_1$ and $T_2$ are two operators in $B_1(Ω)$ each of which is the adjoint of a rank $1$ bundle shift and $\mathcal{K}_{T_1}({w}) = -4π^2 S(w,w)^2 = \mathcal{K}_{T_2}(w)$ for a fixed $w$ in $Ω,$ then $T_1$ and $T_2$ are unitarily equivalent. A surprising consequence is that the adjoint of only some of the bundle shifts of rank $1$ occur as extremal operators in domains of connectivity greater than $1.$ These are described explicitly.
△ Less
Submitted 26 April, 2016;
originally announced April 2016.
-
The Prime Index Graph of a Group
Authors:
S. Akbari,
A. Ashtab,
F. Heydari,
M. Rezaee,
F. Sherafati
Abstract:
Let $G$ be a group. The prime index graph of $G$, denoted by $Π(G)$, is the graph whose vertex set is the set of all subgroups of $G$ and two distinct comparable vertices $H$ and $K$ are adjacent if and only if the index of $H$ in $K$ or the index of $K$ in $H$ is prime. In this paper, it is shown that for every group $G$, $Π(G)$ is bipartite and the girth of $Π(G)$ is contained in the set…
▽ More
Let $G$ be a group. The prime index graph of $G$, denoted by $Π(G)$, is the graph whose vertex set is the set of all subgroups of $G$ and two distinct comparable vertices $H$ and $K$ are adjacent if and only if the index of $H$ in $K$ or the index of $K$ in $H$ is prime. In this paper, it is shown that for every group $G$, $Π(G)$ is bipartite and the girth of $Π(G)$ is contained in the set $\{4,\infty\}$. Also we prove that if $G$ is a finite solvable group, then $Π(G)$ is connected.
△ Less
Submitted 5 August, 2015;
originally announced August 2015.
-
A Decision-Theoretic Comparison of Treatments to Resolve Air Leaks After Lung Surgery Based on Nonparametric Modeling
Authors:
Yanxun Xu,
Peter F. Thall,
Peter Mueller,
Mehran J. Reza
Abstract:
We propose a Bayesian nonparametric utility-based group sequential design for a randomized clinical trial to compare a gel sealant to standard care for resolving air leaks after pulmonary resection. Clinically, resolving air leaks in the days soon after surgery is highly important, since longer resolution time produces undesirable complications that require extended hospitalization. The problem of…
▽ More
We propose a Bayesian nonparametric utility-based group sequential design for a randomized clinical trial to compare a gel sealant to standard care for resolving air leaks after pulmonary resection. Clinically, resolving air leaks in the days soon after surgery is highly important, since longer resolution time produces undesirable complications that require extended hospitalization. The problem of comparing treatments is complicated by the fact that the resolution time distributions are skewed and multi-modal, so using means is misleading. We address these challenges by assuming Bayesian nonparametric probability models for the resolution time distributions and basing the comparative test on weighted means. The weights are elicited as clinical utilities of the resolution times. The proposed design uses posterior expected utilities as group sequential test criteria. The procedure's frequentist properties are studied by extensive simulations.
△ Less
Submitted 18 July, 2016; v1 submitted 25 June, 2015;
originally announced June 2015.
-
Energy Harvesting Systems with Continuous Energy and Data Arrivals: the Optimal Offline and a Heuristic Online Algorithms
Authors:
Milad Rezaee,
Mahtab Mirmohseni,
Mohammad Reza Aref
Abstract:
Energy harvesting has been developed as an effective technology for communication systems in order to extend the lifetime of these systems. In this work, we consider a singleuser energy harvesting wireless communication system, in which arrival data and harvested energy curves are modeled as continuous functions. For the single-user model, our first goal is to find an offline algorithm, which maxi…
▽ More
Energy harvesting has been developed as an effective technology for communication systems in order to extend the lifetime of these systems. In this work, we consider a singleuser energy harvesting wireless communication system, in which arrival data and harvested energy curves are modeled as continuous functions. For the single-user model, our first goal is to find an offline algorithm, which maximizes the amount of data which is transmitted to the receiver node by a given deadline. If more than one scheme exists that transmits the maximum data, we choose the one with minimum utilized energy at the transmitter node. Next, we propose an online algorithm for this system. We also consider a multi-hop energy harvesting wireless communication system in a full-duplex mode and find the optimal offline algorithm to maximize the throughput.
△ Less
Submitted 22 January, 2016; v1 submitted 12 June, 2015;
originally announced June 2015.
-
Interference Alignment via Message-Passing
Authors:
Maxime Guillaud,
Mohsen Rezaee,
Gerald Matz
Abstract:
We introduce an iterative solution to the problem of interference alignment (IA) over MIMO channels based on a message-passing formulation. We propose a parameterization of the messages that enables the computation of IA precoders by a min-sum algorithm over continuous variable spaces -- under this parameterization, suitable approximations of the messages can be computed in closed-form. We show th…
▽ More
We introduce an iterative solution to the problem of interference alignment (IA) over MIMO channels based on a message-passing formulation. We propose a parameterization of the messages that enables the computation of IA precoders by a min-sum algorithm over continuous variable spaces -- under this parameterization, suitable approximations of the messages can be computed in closed-form. We show that the iterative leakage minimization algorithm of Cadambe et al. is a special case of our message-passing algorithm, obtained for a particular schedule. Finally, we show that the proposed algorithm compares favorably to iterative leakage minimization in terms of convergence speed, and discuss a distributed implementation.
△ Less
Submitted 9 October, 2013;
originally announced October 2013.
-
Measuring the similarity of PML documents with RFID-based sensors
Authors:
Zhong-qin Wang,
Ning Ye,
Malekian Reza,
Ting-ting Zhao,
Ru-chuan Wang
Abstract:
The Electronic Product Code (EPC) Network is an important part of the Internet of Things. The Physical Mark-Up Language (PML) is to represent and de-scribe data related to objects in EPC Network. The PML documents of each component to exchange data in EPC Network system are XML documents based on PML Core schema. For managing theses huge amount of PML documents of tags captured by Radio frequency…
▽ More
The Electronic Product Code (EPC) Network is an important part of the Internet of Things. The Physical Mark-Up Language (PML) is to represent and de-scribe data related to objects in EPC Network. The PML documents of each component to exchange data in EPC Network system are XML documents based on PML Core schema. For managing theses huge amount of PML documents of tags captured by Radio frequency identification (RFID) readers, it is inevitable to develop the high-performance technol-ogy, such as filtering and integrating these tag data. So in this paper, we propose an approach for meas-uring the similarity of PML documents based on Bayesian Network of several sensors. With respect to the features of PML, while measuring the similarity, we firstly reduce the redundancy data except information of EPC. On the basis of this, the Bayesian Network model derived from the structure of the PML documents being compared is constructed.
△ Less
Submitted 12 September, 2013;
originally announced September 2013.
-
CSIT Sharing over Finite Capacity Backhaul for Spatial Interference Alignment
Authors:
Mohsen Rezaee,
Maxime Guillaud,
Fredrik Lindqvist
Abstract:
Cellular systems that employ time division duplexing (TDD) transmission are good candidates for implementation of interference alignment (IA) in the downlink since channel reciprocity enables the estimation of the channel state by the base stations (BS) in the uplink phase. However, the interfering BSs need to share their channel estimates via backhaul links of finite capacity. A quantization sche…
▽ More
Cellular systems that employ time division duplexing (TDD) transmission are good candidates for implementation of interference alignment (IA) in the downlink since channel reciprocity enables the estimation of the channel state by the base stations (BS) in the uplink phase. However, the interfering BSs need to share their channel estimates via backhaul links of finite capacity. A quantization scheme is proposed which reduces the amount of information exchange (compared to conventional methods) required to achieve IA in a TDD system. The scaling (with the transmit power) of the number of bits to be exchanged between the BSs that is sufficient to preserve the multiplexing gain of IA is derived.
△ Less
Submitted 5 February, 2013;
originally announced February 2013.
-
Interference Alignment with Quantized Grassmannian Feedback in the K-user Constant MIMO Interference Channel
Authors:
Mohsen Rezaee,
Maxime Guillaud
Abstract:
A simple channel state information (CSI) feedback scheme is proposed for interference alignment (IA) over the K-user constant Multiple-Input-Multiple-Output Interference Channel (MIMO IC). The proposed technique relies on the identification of invariants in the IA equations, which enables the reformulation of the CSI quantization problem as a single quantization on the Grassmann manifold at each r…
▽ More
A simple channel state information (CSI) feedback scheme is proposed for interference alignment (IA) over the K-user constant Multiple-Input-Multiple-Output Interference Channel (MIMO IC). The proposed technique relies on the identification of invariants in the IA equations, which enables the reformulation of the CSI quantization problem as a single quantization on the Grassmann manifold at each receiver. The scaling of the number of feedback bits with the transmit power sufficient to preserve the multiplexing gain that can be achieved under perfect CSI is established. We show that the CSI feedback requirements of the proposed technique are better (lower) than what is required when using previously published methods, for system dimensions (number of users and antennas) of practical interest. Furthermore, we show through simulations that this advantage persists at low SNR, in the sense that the proposed technique yields a higher sum-rate performance for a given number of feedback bits. Finally, to complement our analysis, we introduce a statistical model that faithfully captures the properties of the quantization error obtained for random vector quantization (RVQ) on the Grassmann manifold for large codebooks; this enables the numerical (Monte-Carlo) analysis of general Grassmannian RVQ schemes for codebook sizes that would be impractically large to simulate.
△ Less
Submitted 15 February, 2015; v1 submitted 30 July, 2012;
originally announced July 2012.
-
Transmission of Voice Signal: BER Performance Analysis of Different FEC Schemes Based OFDM System over Various Channels
Authors:
Md. Golam Rashed,
M. Hasnat Kabir,
Md. Selim Reza,
Md. Matiqul Islam,
Rifat Ara Shams,
Saleh Masum,
Sheikh Enayet Ullah
Abstract:
In this paper, we investigate the impact of Forward Error Correction (FEC) codes namely Cyclic Redundancy Code and Convolution Code on the performance of OFDM wireless communication system for speech signal transmission over both AWGN and fading (Rayleigh and Rician) channels in term of Bit Error Probability. The simulation has been done in conjunction with QPSK digital modulation and compared wit…
▽ More
In this paper, we investigate the impact of Forward Error Correction (FEC) codes namely Cyclic Redundancy Code and Convolution Code on the performance of OFDM wireless communication system for speech signal transmission over both AWGN and fading (Rayleigh and Rician) channels in term of Bit Error Probability. The simulation has been done in conjunction with QPSK digital modulation and compared with uncoded resultstal modulation. In the fading channels, it is found via computer simulation that the performance of the Convolution interleaved based OFDM systems outperform than that of CRC interleaved OFDM system as well as uncoded OFDM channels.
△ Less
Submitted 17 July, 2012;
originally announced July 2012.
-
An Approach of Digital Image Copyright Protection by Using Watermarking Technology
Authors:
Md. Selim Reza,
Mohammed Shafiul Alam Khan,
Md. Golam Robiul Alam,
Serajul Islam
Abstract:
Digital watermarking system is a paramount for safeguarding valuable resources and information. Digital watermarks are generally imperceptible to the human eye and ear. Digital watermark can be used in video, audio and digital images for a wide variety of applications such as copy prevention right management, authentication and filtering of internet content. The proposed system is able to protect…
▽ More
Digital watermarking system is a paramount for safeguarding valuable resources and information. Digital watermarks are generally imperceptible to the human eye and ear. Digital watermark can be used in video, audio and digital images for a wide variety of applications such as copy prevention right management, authentication and filtering of internet content. The proposed system is able to protect copyright or owner identification of digital media, such as audio, image, video, or text. The system permutated the watermark and embed the permutated watermark into the wavelet coefficients of the original image by using a key. The key is randomly generated and used to select the locations in the wavelet domain in which to embed the permutated watermark. Finally, the system combines the concept of cryptography and digital watermarking techniques to implement a more secure digital watermarking system.
△ Less
Submitted 28 May, 2012;
originally announced May 2012.
-
Performance Evaluation of SCM-WDM System Using Different Linecoding
Authors:
Md. Shamim Reza,
Md. Maruf Hossain,
Adnan Ahmed Chowdhury,
S. M. Shamim Reza,
Md. Moshiur Rahman
Abstract:
This paper investigates the theoretical performance analysis for a subcarrier multiplexed (SCM) wavelength division multiplexing (WDM) optical transmission system in presence of optical beat interference (OBI) which occurs during the photo detection process. We have presented a comparison for improving the performance of SCM-WDM system in presence of OBI. Non-return-to zero (NRZ), Manchester and M…
▽ More
This paper investigates the theoretical performance analysis for a subcarrier multiplexed (SCM) wavelength division multiplexing (WDM) optical transmission system in presence of optical beat interference (OBI) which occurs during the photo detection process. We have presented a comparison for improving the performance of SCM-WDM system in presence of OBI. Non-return-to zero (NRZ), Manchester and Miller code (MC) line coding are used for performance investigation of SCM-WDM system. A suitable signal bandwidth is selected and 200 KHz is considered as channel bandwidth. Power spectrum of signal and cross component for those line coding are analyzed. Comparison results are evaluated in terms of signal to OBI ratio for the three linecoding schemes which is called signal to interference ratio (SIR). It is found that there is a significant increase in the SIR by employing Miller code compared to NRZ and Manchester for the same data rate. For example, for a number of subcarriers of 10, the achievable SIR is about -24 dB for Miller coded system compared to -46 dB for NRZ coded system and -49 dB for Manchester coded system. The results are found to be satisfactorily agreed with the expected results.
△ Less
Submitted 26 April, 2010;
originally announced April 2010.
-
Evaluation of Burst Loss Rate of an Optical Burst Switching (OBS) Network with Wavelength Conversion Capability
Authors:
Md. Shamim Reza,
Md. Maruf Hossain,
Satya Prasad Majumder
Abstract:
This paper presents a new analytical model for calculating burst loss rate (BLR) in a slotted optical burst switched network. The analytical result leads to a framework which provides guidelines for optical burst switched networks. Wavelength converter is used for burst contention resolution. The effect of several design parameters such as burst arrival probability, wavelength conversion capabilit…
▽ More
This paper presents a new analytical model for calculating burst loss rate (BLR) in a slotted optical burst switched network. The analytical result leads to a framework which provides guidelines for optical burst switched networks. Wavelength converter is used for burst contention resolution. The effect of several design parameters such as burst arrival probability, wavelength conversion capability, number of slots per burst and number of wavelengths is incorporated on the above performance measure. We also extend the analytical result of BLR for different types of service classes where each service class has a reserved number of wavelengths in a network with fixed number of wavelengths. We also introduce an algorithm to calculate the resultant number of wavelength for each service classes depending on the various scenarios.
△ Less
Submitted 26 April, 2010;
originally announced April 2010.
-
Quantum tomography with wavelet transform in Banach space on Homogeneous space
Authors:
M. A. Jafarizadeh,
M. Mirzaee,
M. Rezaee
Abstract:
The intimate connection between the Banach space wavelet reconstruction method on homogeneous spaces with both singular and nonsingular vacuum vectors, and some of well known quantum tomographies, such as: Moyal-representation for a spin, discrete phase space tomography, tomography of a free particle, Homodyne tomography, phase space tomography and SU(1,1) tomography is explained. Also both the…
▽ More
The intimate connection between the Banach space wavelet reconstruction method on homogeneous spaces with both singular and nonsingular vacuum vectors, and some of well known quantum tomographies, such as: Moyal-representation for a spin, discrete phase space tomography, tomography of a free particle, Homodyne tomography, phase space tomography and SU(1,1) tomography is explained. Also both the atomic decomposition and banach frame nature of these quantum tomographic examples is explained in details. Finally the connection between the wavelet formalism on Banach space and Q-function is discussed.
△ Less
Submitted 25 January, 2008;
originally announced January 2008.
-
Finite quantum tomography via semidefinite programming
Authors:
M. A. Jafarizadeh,
M. Mirzaee,
M. Rezaee
Abstract:
Using the the convex semidefinite programming method and superoperator formalism we obtain the finite quantum tomography of some mixed quantum states such as: qudit tomography, N-qubit tomography, phase tomography and coherent spin state tomography, where that obtained results are in agreement with those of References \cite{schack,Pegg,Barnett,Buzek,Weigert}.
Using the the convex semidefinite programming method and superoperator formalism we obtain the finite quantum tomography of some mixed quantum states such as: qudit tomography, N-qubit tomography, phase tomography and coherent spin state tomography, where that obtained results are in agreement with those of References \cite{schack,Pegg,Barnett,Buzek,Weigert}.
△ Less
Submitted 26 July, 2007;
originally announced July 2007.
-
Evaluation of relative entropy of entanglement and derivation of optimal Lewenstein-Sanpera decomposition of Bell decomposable states via convex optimization
Authors:
M. A. Jafarizadeh,
M. Mirzaee,
M. Rezaee
Abstract:
We provide an analytical expression for optimal Lewenstein-Sanpera decomposition of Bell decomposable states by using semi-definite programming. Also using the Karush-Kuhn-Tucker optimization method, the minimum relative entropy of entanglement of Bell decomposable states has been evaluated and it is shown that the same separable Bell decomposable state lying at the boundary of convex set of sep…
▽ More
We provide an analytical expression for optimal Lewenstein-Sanpera decomposition of Bell decomposable states by using semi-definite programming. Also using the Karush-Kuhn-Tucker optimization method, the minimum relative entropy of entanglement of Bell decomposable states has been evaluated and it is shown that the same separable Bell decomposable state lying at the boundary of convex set of separable Bell decomposable states, optimizes both Lewenstein-Sanpera decomposition and relative entropy of entanglement.
{\bf Keywords: Minimum relative entropy of entanglement, Semi-definite programming, Convex optimization, Lewenstein-Sanpera decomposition, Bell decomposable states.}
{\bf PACs Index: 03.65.Ud}
△ Less
Submitted 29 August, 2006;
originally announced August 2006.
-
Exact calculation of robustness of entanglement via convex semi-definite programming
Authors:
M. A. Jafarizadeh,
M. Mirzaee,
M. Rezaee
Abstract:
In general the calculation of robustness of entanglement for the mixed entangled quantum states is rather difficult to handle analytically. Using the the convex semi-definite programming method, the robustness of entanglement of some mixed entangled quantum states such as: $2\otimes 2$ Bell decomposable (BD) states, a generic two qubit state in Wootters basis, iso-concurrence decomposable states…
▽ More
In general the calculation of robustness of entanglement for the mixed entangled quantum states is rather difficult to handle analytically. Using the the convex semi-definite programming method, the robustness of entanglement of some mixed entangled quantum states such as: $2\otimes 2$ Bell decomposable (BD) states, a generic two qubit state in Wootters basis, iso-concurrence decomposable states, $2\otimes 3$ Bell decomposable states, $d\otimes d$ Werner and isotropic states, a one parameter $3\otimes 3$ state and finally multi partite isotropic state, is calculated exactly, where thus obtained results are in agreement with those of :$2\otimes 2$ density matrices, already calculated by one of the authors in \cite{Bell1,Rob3}. Also an analytic expression is given for separable states that wipe out all entanglement and it is further shown that they are on the boundary of separable states as pointed out in \cite{du}.
{\bf Keywords: Robustness of entanglement, Semi-definite programming, Bell decomposable states, Werner and isotropic states.}
△ Less
Submitted 29 August, 2006;
originally announced August 2006.
-
Best separable approximation with semi-definite programming method
Authors:
M. A. Jafarizadeh,
M. Mirzaee,
M. Rezaee
Abstract:
The present methods for obtaining the optimal Lewenestein- Sanpera decomposition of a mixed state are difficult to handle analytically. We provide a simple analytical expression for the optimal Lewenstein-Sanpera decomposition by using semidefinite programming. Specially, we obtain the optimal Lewenstein-Sanpera decomposition for some examples such as: Bell decomposable state, Iso-concurrence st…
▽ More
The present methods for obtaining the optimal Lewenestein- Sanpera decomposition of a mixed state are difficult to handle analytically. We provide a simple analytical expression for the optimal Lewenstein-Sanpera decomposition by using semidefinite programming. Specially, we obtain the optimal Lewenstein-Sanpera decomposition for some examples such as: Bell decomposable state, Iso-concurrence state, generic two qubit state in Wootters's basis, $2\otimes 3$ Bell decomposable state, $d\otimes d$ Werner and isotropic states, a one parameter $3\otimes 3$ state and finally multi partite isotropic state.
△ Less
Submitted 8 June, 2006;
originally announced June 2006.
-
Bell states diagonal entanglement witnesses
Authors:
M. A. Jafarizadeh,
M. Rezaee,
S. K. A. Seyed Yagoobi
Abstract:
It has been shown that finding generic Bell states diagonal entanglement witnesses (BDEW) for $d_{1}\otimes d_{2}\otimes ....\otimes d_{n}$ systems exactly reduces to a linear programming if the feasible region be a polygon by itself and approximately obtains via linear programming if the feasible region is not a polygon. Since solving linear programming for generic case is difficult, the multi-…
▽ More
It has been shown that finding generic Bell states diagonal entanglement witnesses (BDEW) for $d_{1}\otimes d_{2}\otimes ....\otimes d_{n}$ systems exactly reduces to a linear programming if the feasible region be a polygon by itself and approximately obtains via linear programming if the feasible region is not a polygon. Since solving linear programming for generic case is difficult, the multi-qubits, $2\otimes N$ and $3 \otimes 3$ systems for the special case of generic BDEW for some particular choice of their parameters have been considered. In the rest of this paper we obtain the optimal non decomposable entanglement witness for $3 \otimes 3$ system for some particular choice of its parameters. By proving the optimality of the well known reduction map and combining it with the optimal and non-decomposable 3 $\otimes$ 3 BDEW (named critical entanglement witnesses) the family of optimal and non-decomposable 3 $\otimes$ 3 BDEW have also been obtained. Using the approximately critical entanglement witnesses, some 3 $\otimes$ 3 bound entangled states are so detected. So the well known Choi map as a particular case of the positive map in connection with this witness via Jamiolkowski isomorphism has been considered which approximately is obtained via linear programming.
△ Less
Submitted 22 October, 2005; v1 submitted 4 July, 2005;
originally announced July 2005.