{"title":"Cooperative Abnormality Detection in Fluidic Medium Molecular Communication","authors":"Ladan Khaloopour, M. Mirmohseni, M. Nasiri-Kenari","doi":"10.1109/iwcit50667.2020.9163534","DOIUrl":"https://doi.org/10.1109/iwcit50667.2020.9163534","url":null,"abstract":"In this paper, we study the problem of cooperative abnormality detection using mobile sensors in a fluidic medium, based on a molecular communication setup. The sensors are injected into the medium to search the environment for the abnormality. To reduce the effects of sensor imperfection, we propose a cooperative scheme where the sensors activate each other by releasing some molecules (i.e., markers), into the medium after they sense an abnormality. A number of fusion centers (FC) are placed at specific locations in the medium, which absorb all sensors arrived at their locations. By observing the states of the received sensors, each FC decides whether an abnormality exists in its corresponding region or not. Then, it resets the sensors’ activation flags and releases them again into the medium to proceed with the next regions. In our model, both sensors’ imperfection and markers’ background noise are taken into account. We consider two sensor types, the memoryless sensors that get active based on the number of received markers in each sampling time and the aggregate sensors that get active based on the summation of received markers in all sampling times, before they reach the FC. We analyze the related binary hypothesis testing problem and obtain the probabilities of false alarm and misdetection for the memoryless and aggregate sensors. Then, we obtain the probability of error. It is shown that using sensors with the ability of activating each other can significantly improves the performance in terms of probability of error.","PeriodicalId":360380,"journal":{"name":"2020 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130385118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Peak Age of Information Analysis for Virtual Reality in Terahertz Communications","authors":"Yasaman Khorsandmanesh, M. Emadi","doi":"10.1109/IWCIT50667.2020.9163486","DOIUrl":"https://doi.org/10.1109/IWCIT50667.2020.9163486","url":null,"abstract":"Virtual Reality (VR) is one of the new promising use cases of the next generation wireless communications which requires high-throughput, low-latency, and reliable communications. For such services, the freshness of data could be measured by the age of information (AoI) metric. In this paper, we assume indoor small-cell Terahertz communications to serve VR users. Taking into account the wave propagation characteristics of the Terahertz communications and interference modeling in the small-cell networks, average peak AoI (PAoI) is investigated to analyse downlink data transmission to the VR users. Each small base station (SBS) is modeled by two M/M/1 and M/G/1 queues; One for data processing of VR data and the other for storing and transmitting information over the Terahertz channel in presence of blockage probability. Then, the average PAoI is extended to simultaneously support multi VR users with an SBS, and for a special case of large signaling bandwidth, average PAoI is also discussed. Finally, numerical results are provided to investigate the effects of signaling bandwidth, blockage probability, cell-density, and interference coverage of SBSs on the average PAoI of the considered system.","PeriodicalId":360380,"journal":{"name":"2020 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"95 22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129169408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IRS-based Secrecy Rate Analysis in Presence of an Energy Harvesting Eavesdropper","authors":"Mohammad Amin Saeidi, M. Emadi","doi":"10.1109/IWCIT50667.2020.9163399","DOIUrl":"https://doi.org/10.1109/IWCIT50667.2020.9163399","url":null,"abstract":"In this paper, we investigate an intelligent reflecting surface (IRS) based wireless system wherein an untrusted energy harvesting node wiretaps the legitimate signal. The achievable secrecy rate and the harvested energy are derived as functions of IRS phase coefficients. Then to maximize the secrecy rate while meeting the minimum required harvested energy, the non-convex optimization problem is analyzed. By utilizing the Charnes-Cooper transformation and semidefinite relaxation technique, the optimization problem is transformed into a convex one. Finally, the numerical results are presented to clarify the effects of size of the IRS and optimizing its phase elements on enlarging the secrecy rate-energy harvesting region.","PeriodicalId":360380,"journal":{"name":"2020 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124912942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IWCIT 2020 List of Authors","authors":"","doi":"10.1109/iwcit50667.2020.9163479","DOIUrl":"https://doi.org/10.1109/iwcit50667.2020.9163479","url":null,"abstract":"","PeriodicalId":360380,"journal":{"name":"2020 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130203945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Information & Mutual Information Ratio for Counting Image Features and Their Matches","authors":"Ali Khajegili Mirabadi, S. Rini","doi":"10.1109/iwcit50667.2020.9163458","DOIUrl":"https://doi.org/10.1109/iwcit50667.2020.9163458","url":null,"abstract":"Feature extraction and description is an important topic of computer vision, as it is the starting point of a number of tasks such as image reconstruction, stitching, registration, and recognition among many others. In this paper, two new image features are proposed: the Information Ratio (IR) and the Mutual Information Ratio (MIR). The IR is a feature of a single image, while the MIR describes features common across two or more images. We begin by introducing the IR and the MIR and motivate these features in an information theoretical context as the ratio of the self-information of an intensity level over the information contained over the pixels of the same intensity. Notably, the relationship of the IR and MIR with the image entropy and mutual information, classic information measures, are discussed. Finally, the effectiveness of these features is tested through feature extraction over INRIA Copydays datasets and feature matching over the Oxford’s Affine Covariant Regions. These numerical evaluations validate the relevance of the IR and MIR in practical computer vision tasks.","PeriodicalId":360380,"journal":{"name":"2020 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114306139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IWCIT 2020 Table of Content","authors":"","doi":"10.1109/iwcit50667.2020.9163466","DOIUrl":"https://doi.org/10.1109/iwcit50667.2020.9163466","url":null,"abstract":"","PeriodicalId":360380,"journal":{"name":"2020 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127192850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Private Information Retrieval from Non-Replicated Databases with Optimal Message Size","authors":"S. N. Keramaati, Sadaf Salehkalaibar","doi":"10.1109/IWCIT50667.2020.9163525","DOIUrl":"https://doi.org/10.1109/IWCIT50667.2020.9163525","url":null,"abstract":"In this paper, we consider the private information retrieval problem over a storage system where the files are not replicated at all databases. This kind of storage system represents a non-replicated database structure and was first introduced by Banawan-Ulukus. Specifically, we assume that M out of K messages are stored across R databases. When R=M=2, the storage system can be modeled by a cyclic graph structure. For this case, we show that the message length of one bit is sufficient to achieve the capacity. Our achievable scheme uses the method of Tian-Sun-Chen where an asymmetric structure for answers from databases is proposed. A main characteristic of our proposed scheme is the fact that the query structure does not depend on the number of databases implying the scalability of the scheme. Finally, we discuss an example where our proposed scheme can achieve a larger retrieval rate than the one derived by Banawan-Ulukus.","PeriodicalId":360380,"journal":{"name":"2020 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114791473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Algorithm for Comparison-limited Vector Quantization","authors":"Joseph Chataignon, S. Rini","doi":"10.1109/IWCIT50667.2020.9163531","DOIUrl":"https://doi.org/10.1109/IWCIT50667.2020.9163531","url":null,"abstract":"In [1] we have introduced the comparison-limited vector quantization (CLVQ) problem as a variation of the classic vector quantization problem in which the analog-to-digital (A2D) conversion is not constrained by the cardinality of the output but rather by the number of comparators available for quantization. More precisely, we consider the problem of producing a bit-restricted representation of a random vector of dimension d so as to minimize a given distortion between the quantizer input and output. This bit-restricted representation is obtained through k comparators, each receiving a linear combination of the inputs and producing zero/one when this signal is above/below a threshold. This vector quantizer architecture naturally arises in many analog-to-digital conversion scenarios in which the A2D performance is not limited by the number of bits used to represent the quantizer output, but rather on the limited availability of comparators in the quantizer. In this paper, we focus on the design of quantizer for the CLVQ problem through a polynomial-time algorithm. The quantizer design problem has a super-exponential complexity and thus determining the optimal solution, even for moderate values of d, is computationally very challenging. For this reason, we develop a genetic algorithm for the optimization of the quantizer structure. This algorithm is aimed at producing a large number of quantizer designs to be used for initialization. For each candidate, the quantizer configuration is partially optimized using particle filters. After this optimization, quantizer configurations are again selected for fitness and recombined. Simulations are provided to numerically validate the proposed algorithm and compare the CLVQ performance to the classic Linde–Buzo–Gray algorithm.","PeriodicalId":360380,"journal":{"name":"2020 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131753255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IWCIT 2020 Committees","authors":"","doi":"10.1109/iwcit50667.2020.9163452","DOIUrl":"https://doi.org/10.1109/iwcit50667.2020.9163452","url":null,"abstract":"","PeriodicalId":360380,"journal":{"name":"2020 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117101795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sima Sobhi-Givi, M. Shayesteh, H. Kalbkhani, Nandana Rajatheva
{"title":"Resource Allocation and User Association for Load Balancing in NOMA-Based Cellular Heterogeneous Networks","authors":"Sima Sobhi-Givi, M. Shayesteh, H. Kalbkhani, Nandana Rajatheva","doi":"10.1109/IWCIT50667.2020.9163529","DOIUrl":"https://doi.org/10.1109/IWCIT50667.2020.9163529","url":null,"abstract":"Small cells, specially femtocells, are deployed in the coverage of macrocells and form underlay heterogeneous networks (HetNets) to increase the capacity of cellular networks. Load balancing is necessary to increase the resource utilization in HetNets. Non-orthogonal multiple access (NOMA) technique has been proposed to increase the spectral efficiency in the fifth-generation (5G) of cellular networks. The aim of this paper is to present a user association and resource block (RB) allocation scheme in NOMA-based cellular HetNet for maximization of Jain’s fairness index and spectral efficiency. The maximization problem is decomposed into two sub-problems. At first, the number of RBs that each small cell base station (SBS) can allocate for connection requests, is obtained. Then, the NOMA groups and RB allocation are optimized to increase the spectral efficiency. The results indicate the efficiency of the proposed scheme in enhancing the fairness index and spectral efficiency in HetNets compared to the conventional scheme.","PeriodicalId":360380,"journal":{"name":"2020 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125654379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}