about.jpg

Filter by

The wiretap channel with feedback: Encryption over the channel

In this work, the critical role of noisy feedback in enhancing the secrecy capacity of the wiretap channel is established. Unlike previous works, where a noiseless public discussion channel is used for feedback, the feed-forward and feedback signals share the same noisy channel in the present model. Quite interestingly, this noisy feedback model is shown to be more advantageous in the current

Software and Communications

On the secrecy capacity of fading channels

We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized under the assumption of asymptotically long coherence intervals. We first consider the full channel state information (CSI) case, where the

Software and Communications

The relay-eavesdropper channel: Cooperation for secrecy

This paper establishes the utility of user cooperation in facilitating secure wireless communications. In particular, the four-terminal relay-eavesdropper channel is introduced and an outer-bound on the optimal rate-equivocation region is derived. Several cooperation strategies are then devised and the corresponding achievable rate-equivocation region are characterized. Of particular interest is

Software and Communications

Towards a federated network architecture

The layered architecture that guided the design of the Internet is deemed inadequate as a reference model for engineering protocols for NGN. Layered protocol suites impose a strict sequential order on protocol execution conflicting with the efficient engineering of end systems, as well as failing to express vertical functional integration, the separation of control and data planes, and the

Software and Communications

The water-filling game in fading multiple-access channels

A game-theoretic framework is developed to design and analyze the resource allocation algorithms in fading multiple-access channels (MACs), where the users are assumed to be selfish, rational, and limited by average power constraints. The maximum sum-rate point on the boundary of the MAC capacity region is shown to be the unique Nash equilibrium of the corresponding water-filling game. This result

Software and Communications

Optimal medium access protocols for cognitive radio networks

This paper focuses on the design of medium access control protocols for cognitive radio networks. The scenario in which a single cognitive user wishes to opportunistically exploit the availability of empty frequency bands within parts of the radio spectrum having multiple bands is first considered. In this scenario, the availability probability of each channel is unknown a priori to the cognitive

Cardiac MRI steam images denoising using bayes classifier

Imaging of the heart anatomy and function using magnetic resonance imaging (MRI) is an important diagnosis tool for heart diseases. Several techniques have been developed to increase the contrast-to-noise ratio (CNR) between myocardium and background. Recently, a technique that acquires cine cardiac images with black-blood contrast has been proposed. Although the technique produces cine sequence

Artificial Intelligence
Healthcare

Performance evaluation of cardiac MRI image denoising techniques

Black-blood cardiac Magnetic Resonance Imaging (MRI) plays an important role in diagnosing a number of heart diseases. The technique suffers inherently from low contrast-tonoise ratio between the myocardium and the blood. In this work, we examined the performance of different classification techniques that can be used. The three techniques successfully removed the noise with different performance

Artificial Intelligence

Novel computational apoptosis-neurogenesis model for multi-abstraction level perception

artificial neural network provides a cybernetic model that is similar to human intelligence in terms of parallel processing, generalization and memory stacking on the same neural network. From the era of neurogenesis, research models expect the rules that govern new neuron to depend on old mature circuitry. Other research models show the existence of catastrophic interference associated with new

Artificial Intelligence

Modeling intrastromal photorefractive keratectomy procedures

The main idea to correct sight disorders using lasers is to modify corneal curvature by applying laser to specific layers of the cornea. Intrastromal Photorefractive keratectomy is a laser technique used to correct sight disorders by evaporating corneal tissue, which results in small cavities that may coincide to form a larger cavity that will collapse to deform the curvature of the cornea. In

Artificial Intelligence