-
DFT-Based Adversarial Attack Detection in MRI Brain Imaging: Enhancing Diagnostic Accuracy in Alzheimer's Case Studies
Authors:
Mohammad Hossein Najafi,
Mohammad Morsali,
Mohammadmahdi Vahediahmar,
Saeed Bagheri Shouraki
Abstract:
Recent advancements in deep learning, particularly in medical imaging, have significantly propelled the progress of healthcare systems. However, examining the robustness of medical images against adversarial attacks is crucial due to their real-world applications and profound impact on individuals' health. These attacks can result in misclassifications in disease diagnosis, potentially leading to…
▽ More
Recent advancements in deep learning, particularly in medical imaging, have significantly propelled the progress of healthcare systems. However, examining the robustness of medical images against adversarial attacks is crucial due to their real-world applications and profound impact on individuals' health. These attacks can result in misclassifications in disease diagnosis, potentially leading to severe consequences. Numerous studies have explored both the implementation of adversarial attacks on medical images and the development of defense mechanisms against these threats, highlighting the vulnerabilities of deep neural networks to such adversarial activities. In this study, we investigate adversarial attacks on images associated with Alzheimer's disease and propose a defensive method to counteract these attacks. Specifically, we examine adversarial attacks that employ frequency domain transformations on Alzheimer's disease images, along with other well-known adversarial attacks. Our approach utilizes a convolutional neural network (CNN)-based autoencoder architecture in conjunction with the two-dimensional Fourier transform of images for detection purposes. The simulation results demonstrate that our detection and defense mechanism effectively mitigates several adversarial attacks, thereby enhancing the robustness of deep neural networks against such vulnerabilities.
△ Less
Submitted 15 August, 2024;
originally announced August 2024.
-
Late Breaking Results: Fortifying Neural Networks: Safeguarding Against Adversarial Attacks with Stochastic Computing
Authors:
Faeze S. Banitaba,
Sercan Aygun,
M. Hassan Najafi
Abstract:
In neural network (NN) security, safeguarding model integrity and resilience against adversarial attacks has become paramount. This study investigates the application of stochastic computing (SC) as a novel mechanism to fortify NN models. The primary objective is to assess the efficacy of SC to mitigate the deleterious impact of attacks on NN results. Through a series of rigorous experiments and e…
▽ More
In neural network (NN) security, safeguarding model integrity and resilience against adversarial attacks has become paramount. This study investigates the application of stochastic computing (SC) as a novel mechanism to fortify NN models. The primary objective is to assess the efficacy of SC to mitigate the deleterious impact of attacks on NN results. Through a series of rigorous experiments and evaluations, we explore the resilience of NNs employing SC when subjected to adversarial attacks. Our findings reveal that SC introduces a robust layer of defense, significantly reducing the susceptibility of networks to attack-induced alterations in their outcomes. This research contributes novel insights into the development of more secure and reliable NN systems, essential for applications in sensitive domains where data integrity is of utmost concern.
△ Less
Submitted 5 July, 2024;
originally announced July 2024.
-
Operator mean inequalities and Kwong functions
Authors:
Nahid Gharakhanlu,
Mohammad Sal Moslehian,
Hamed Najafi
Abstract:
In this paper, we study operator mean inequalities for the weighted arithmetic, geometric and harmonic means. We give a slight modification of Audenaert's result to show the relation between Kwong functions and operator monotone functions. Operator mean inequalities provide some analogs of the geometric concavity property for Kwong functions, operator convex, and operator monotone functions. Moreo…
▽ More
In this paper, we study operator mean inequalities for the weighted arithmetic, geometric and harmonic means. We give a slight modification of Audenaert's result to show the relation between Kwong functions and operator monotone functions. Operator mean inequalities provide some analogs of the geometric concavity property for Kwong functions, operator convex, and operator monotone functions. Moreover, we give our points across by way of some examples which show the usage of our main results.
△ Less
Submitted 8 May, 2024;
originally announced May 2024.
-
uHD: Unary Processing for Lightweight and Dynamic Hyperdimensional Computing
Authors:
Sercan Aygun,
Mehran Shoushtari Moghadam,
M. Hassan Najafi
Abstract:
Hyperdimensional computing (HDC) is a novel computational paradigm that operates on long-dimensional vectors known as hypervectors. The hypervectors are constructed as long bit-streams and form the basic building blocks of HDC systems. In HDC, hypervectors are generated from scalar values without taking their bit significance into consideration. HDC has been shown to be efficient and robust in var…
▽ More
Hyperdimensional computing (HDC) is a novel computational paradigm that operates on long-dimensional vectors known as hypervectors. The hypervectors are constructed as long bit-streams and form the basic building blocks of HDC systems. In HDC, hypervectors are generated from scalar values without taking their bit significance into consideration. HDC has been shown to be efficient and robust in various data processing applications, including computer vision tasks. To construct HDC models for vision applications, the current state-of-the-art practice utilizes two parameters for data encoding: pixel intensity and pixel position. However, the intensity and position information embedded in high-dimensional vectors are generally not generated dynamically in the HDC models. Consequently, the optimal design of hypervectors with high model accuracy requires powerful computing platforms for training. A more efficient approach to generating hypervectors is to create them dynamically during the training phase, which results in accurate, low-cost, and highly performable vectors. To this aim, we use low-discrepancy sequences to generate intensity hypervectors only, while avoiding position hypervectors. By doing so, the multiplication step in vector encoding is eliminated, resulting in a power-efficient HDC system. For the first time in the literature, our proposed approach employs lightweight vector generators utilizing unary bit-streams for efficient encoding of data instead of using conventional comparator-based generators.
△ Less
Submitted 16 November, 2023;
originally announced November 2023.
-
Sobol Sequence Optimization for Hardware-Efficient Vector Symbolic Architectures
Authors:
Sercan Aygun,
M. Hassan Najafi
Abstract:
Hyperdimensional computing (HDC) is an emerging computing paradigm with significant promise for efficient and robust learning. In HDC, objects are encoded with high-dimensional vector symbolic sequences called hypervectors. The quality of hypervectors, defined by their distribution and independence, directly impacts the performance of HDC systems. Despite a large body of work on the processing par…
▽ More
Hyperdimensional computing (HDC) is an emerging computing paradigm with significant promise for efficient and robust learning. In HDC, objects are encoded with high-dimensional vector symbolic sequences called hypervectors. The quality of hypervectors, defined by their distribution and independence, directly impacts the performance of HDC systems. Despite a large body of work on the processing parts of HDC systems, little to no attention has been paid to data encoding and the quality of hypervectors. Most prior studies have generated hypervectors using inherent random functions, such as MATLAB`s or Python`s random function. This work introduces an optimization technique for generating hypervectors by employing quasi-random sequences. These sequences have recently demonstrated their effectiveness in achieving accurate and low-discrepancy data encoding in stochastic computing systems. The study outlines the optimization steps for utilizing Sobol sequences to produce high-quality hypervectors in HDC systems. An optimization algorithm is proposed to select the most suitable Sobol sequences for generating minimally correlated hypervectors, particularly in applications related to symbol-oriented architectures. The performance of the proposed technique is evaluated in comparison to two traditional approaches of generating hypervectors based on linear-feedback shift registers and MATLAB random function. The evaluation is conducted for two applications: (i) language and (ii) headline classification. Our experimental results demonstrate accuracy improvements of up to 10.79%, depending on the vector size. Additionally, the proposed encoding hardware exhibits reduced energy consumption and a superior area-delay product.
△ Less
Submitted 16 November, 2023;
originally announced November 2023.
-
Ordered Reliability Direct Error Pattern Testing Decoding Algorithm
Authors:
Reza Hadavian,
Xiaoting Huang,
Dmitri Truhachev,
Kamal El-Sankary,
Hamid Ebrahimzad,
Hossein Najafi
Abstract:
We introduce a novel universal soft-decision decoding algorithm for binary block codes called ordered reliability direct error pattern testing (ORDEPT). Our results, obtained for a variety of popular short high-rate codes, demonstrate that ORDEPT outperforms state-of-the-art decoding algorithms of comparable complexity such as ordered reliability bits guessing random additive noise decoding (ORBGR…
▽ More
We introduce a novel universal soft-decision decoding algorithm for binary block codes called ordered reliability direct error pattern testing (ORDEPT). Our results, obtained for a variety of popular short high-rate codes, demonstrate that ORDEPT outperforms state-of-the-art decoding algorithms of comparable complexity such as ordered reliability bits guessing random additive noise decoding (ORBGRAND) in terms of the decoding error probability and latency. The improvements carry on to the iterative decoding of product codes and convolutional product-like codes, where we present a new adaptive decoding algorithm and demonstrate the ability of ORDEPT to efficiently find multiple candidate codewords to produce soft output.
△ Less
Submitted 18 October, 2023;
originally announced October 2023.
-
Sorting it out in Hardware: A State-of-the-Art Survey
Authors:
Amir Hossein Jalilvand,
Faeze S. Banitaba,
Seyedeh Newsha Estiri,
Sercan Aygun,
M. Hassan Najafi
Abstract:
Sorting is a fundamental operation in various applications and a traditional research topic in computer science. Improving the performance of sorting operations can have a significant impact on many application domains. For high-performance sorting, much attention has been paid to hardware-based solutions. These are often realized with application-specific integrated circuits (ASICs) or field-prog…
▽ More
Sorting is a fundamental operation in various applications and a traditional research topic in computer science. Improving the performance of sorting operations can have a significant impact on many application domains. For high-performance sorting, much attention has been paid to hardware-based solutions. These are often realized with application-specific integrated circuits (ASICs) or field-programmable gate arrays (FPGAs). Recently, in-memory sorting solutions have also been proposed to address the movement cost issue between memory and processing units, also known as Von Neumann bottleneck. Due to the complexity of the sorting algorithms, achieving an efficient hardware implementation for sorting data is challenging. A large body of prior solutions is built on compare-and-swap (CAS) units. These are categorized as comparison-based sorting. Some recent solutions offer comparison-free sorting. In this survey, we review the latest works in the area of hardware-based sorting. We also discuss the recent hardware solutions for partial and stream sorting. Finally, we will discuss some important concerns that need to be considered in the future designs of sorting systems.
△ Less
Submitted 11 October, 2023;
originally announced October 2023.
-
P2LSG: Powers-of-2 Low-Discrepancy Sequence Generator for Stochastic Computing
Authors:
Mehran Shoushtari Moghadam,
Sercan Aygun,
Mohsen Riahi Alam,
M. Hassan Najafi
Abstract:
Stochastic Computing (SC) is an unconventional computing paradigm processing data in the form of random bit-streams. The accuracy and energy efficiency of SC systems highly depend on the stochastic number generator (SNG) unit that converts the data from conventional binary to stochastic bit-streams. Recent work has shown significant improvement in the efficiency of SC systems by employing low-disc…
▽ More
Stochastic Computing (SC) is an unconventional computing paradigm processing data in the form of random bit-streams. The accuracy and energy efficiency of SC systems highly depend on the stochastic number generator (SNG) unit that converts the data from conventional binary to stochastic bit-streams. Recent work has shown significant improvement in the efficiency of SC systems by employing low-discrepancy (LD) sequences such as Sobol and Halton sequences in the SNG unit. Still, the usage of many well-known random sequences for SC remains unexplored. This work studies some new random sequences for potential application in SC. Our design space exploration proposes a promising random number generator for accurate and energy-efficient SC. We propose P2LSG, a low-cost and energy-efficient Low-discrepancy Sequence Generator derived from Powers-of-2 VDC (Van der Corput) sequences. We evaluate the performance of our novel bit-stream generator for two SC image and video processing case studies: image scaling and scene merging. For the scene merging task, we propose a novel SC design for the first time. Our experimental results show higher accuracy and lower hardware cost and energy consumption compared to the state-of-the-art.
△ Less
Submitted 13 September, 2023; v1 submitted 11 September, 2023;
originally announced September 2023.
-
Learning from Hypervectors: A Survey on Hypervector Encoding
Authors:
Sercan Aygun,
Mehran Shoushtari Moghadam,
M. Hassan Najafi,
Mohsen Imani
Abstract:
Hyperdimensional computing (HDC) is an emerging computing paradigm that imitates the brain's structure to offer a powerful and efficient processing and learning model. In HDC, the data are encoded with long vectors, called hypervectors, typically with a length of 1K to 10K. The literature provides several encoding techniques to generate orthogonal or correlated hypervectors, depending on the inten…
▽ More
Hyperdimensional computing (HDC) is an emerging computing paradigm that imitates the brain's structure to offer a powerful and efficient processing and learning model. In HDC, the data are encoded with long vectors, called hypervectors, typically with a length of 1K to 10K. The literature provides several encoding techniques to generate orthogonal or correlated hypervectors, depending on the intended application. The existing surveys in the literature often focus on the overall aspects of HDC systems, including system inputs, primary computations, and final outputs. However, this study takes a more specific approach. It zeroes in on the HDC system input and the generation of hypervectors, directly influencing the hypervector encoding process. This survey brings together various methods for hypervector generation from different studies and explores the limitations, challenges, and potential benefits they entail. Through a comprehensive exploration of this survey, readers will acquire a profound understanding of various encoding types in HDC and gain insights into the intricate process of hypervector generation for diverse applications.
△ Less
Submitted 1 August, 2023;
originally announced August 2023.
-
Application of Transformers for Nonlinear Channel Compensation in Optical Systems
Authors:
Behnam Behinaein Hamgini,
Hossein Najafi,
Ali Bakhshali,
Zhuhong Zhang
Abstract:
In this paper, we introduce a new nonlinear optical channel equalizer based on Transformers. By leveraging parallel computation and attending directly to the memory across a sequence of symbols, we show that Transformers can be used effectively for nonlinear compensation (NLC) in coherent long-haul transmission systems. For this application, we present an implementation of the encoder part of the…
▽ More
In this paper, we introduce a new nonlinear optical channel equalizer based on Transformers. By leveraging parallel computation and attending directly to the memory across a sequence of symbols, we show that Transformers can be used effectively for nonlinear compensation (NLC) in coherent long-haul transmission systems. For this application, we present an implementation of the encoder part of the Transformer and analyze its performance over a wide range of different hyper-parameters. It is shown that by proper embeddings and processing blocks of symbols at each iteration and also carefully selecting subsets of the encoder's output to be processed together, an efficient nonlinear equalization can be achieved for different complexity constraints. To reduce the computational complexity of the attention mechanism, we further propose the use of a physic-informed mask inspired by nonlinear perturbation theory. We also compare the Transformer-NLC with digital back-propagation (DBP) under different transmission scenarios in order to demonstrate the flexibility and generalizability of the proposed data-driven solution.
△ Less
Submitted 1 August, 2024; v1 submitted 25 April, 2023;
originally announced April 2023.
-
Neural Network Architectures for Optical Channel Nonlinear Compensation in Digital Subcarrier Multiplexing Systems
Authors:
Ali Bakhshali,
Hossein Najafi,
Behnam Behinaein Hamgini,
Zhuhong Zhang
Abstract:
In this work, we propose to use various artificial neural network (ANN) structures for modeling and compensation of intra- and inter-subcarrier fiber nonlinear interference in digital subcarrier multiplexing (DSCM) optical transmission systems. We perform nonlinear channel equalization by employing different ANN cores including convolutional neural networks (CNN) and long short-term memory (LSTM)…
▽ More
In this work, we propose to use various artificial neural network (ANN) structures for modeling and compensation of intra- and inter-subcarrier fiber nonlinear interference in digital subcarrier multiplexing (DSCM) optical transmission systems. We perform nonlinear channel equalization by employing different ANN cores including convolutional neural networks (CNN) and long short-term memory (LSTM) layers. We start to compensate the fiber nonlinearity distortion in DSCM systems by a fully connected network across all subcarriers. In subsequent steps, and borrowing from fiber nonlinearity analysis, we gradually upgrade the designs towards modular structures with better performance-complexity advantages. Our study shows that putting proper macro structures in design of ANN nonlinear equalizers in DSCM systems can be crucial for practical solutions in future generations of coherent optical transceivers.
△ Less
Submitted 13 April, 2023;
originally announced April 2023.
-
Characterization of some classes of graphs and their products as frame graph
Authors:
H. Najafi,
F. Abdollahi
Abstract:
To each finite frame $\varphi$ in an inner product space $\mathcal{H}$ we associate a simple graph $G(\varphi)$, called {\it frame graph}, with the vectors of the frame as vertices and there is an edge between vertices $f$ and $g$ provided that $\langle f, g\rangle \neq 0$ [1]. In this paper the relation between the order of $G(\varphi)$ and the dimension of $\mathcal{H}$ is investigated for some…
▽ More
To each finite frame $\varphi$ in an inner product space $\mathcal{H}$ we associate a simple graph $G(\varphi)$, called {\it frame graph}, with the vectors of the frame as vertices and there is an edge between vertices $f$ and $g$ provided that $\langle f, g\rangle \neq 0$ [1]. In this paper the relation between the order of $G(\varphi)$ and the dimension of $\mathcal{H}$ is investigated for some well-known classes of graphs and their products.
△ Less
Submitted 5 January, 2022;
originally announced January 2022.
-
Sorting in Memristive Memory
Authors:
Mohsen Riahi Alam,
M. Hassan Najafi,
Nima TaheriNejad
Abstract:
Sorting is needed in many application domains. The data is read from memory and sent to a general purpose processor or application specific hardware for sorting. The sorted data is then written back to the memory. Reading/writing data from/to memory and transferring data between memory and processing unit incur a large latency and energy overhead. In this work, we develop, to the best of our knowl…
▽ More
Sorting is needed in many application domains. The data is read from memory and sent to a general purpose processor or application specific hardware for sorting. The sorted data is then written back to the memory. Reading/writing data from/to memory and transferring data between memory and processing unit incur a large latency and energy overhead. In this work, we develop, to the best of our knowledge, the first architectures for in-memory sorting of data. We propose two architectures. The first architecture is applicable to the conventional format of representing data, weighted binary radix. The second architecture is proposed for the developing unary processing systems where data is encoded as uniform unary bitstreams. The two architectures have different advantages and disadvantages, making one or the other more suitable for a specific application. However, the common property of both is a significant reduction in the processing time compared to prior sorting designs. Our evaluations show on average 37x and 138x energy reduction for binary and unary designs, respectively, as compared to conventional CMOS off-memory sorting systems.
△ Less
Submitted 4 February, 2022; v1 submitted 17 December, 2020;
originally announced December 2020.
-
TaxoNN: A Light-Weight Accelerator for Deep Neural Network Training
Authors:
Reza Hojabr,
Kamyar Givaki,
Kossar Pourahmadi,
Parsa Nooralinejad,
Ahmad Khonsari,
Dara Rahmati,
M. Hassan Najafi
Abstract:
Emerging intelligent embedded devices rely on Deep Neural Networks (DNNs) to be able to interact with the real-world environment. This interaction comes with the ability to retrain DNNs, since environmental conditions change continuously in time. Stochastic Gradient Descent (SGD) is a widely used algorithm to train DNNs by optimizing the parameters over the training data iteratively. In this work,…
▽ More
Emerging intelligent embedded devices rely on Deep Neural Networks (DNNs) to be able to interact with the real-world environment. This interaction comes with the ability to retrain DNNs, since environmental conditions change continuously in time. Stochastic Gradient Descent (SGD) is a widely used algorithm to train DNNs by optimizing the parameters over the training data iteratively. In this work, first we present a novel approach to add the training ability to a baseline DNN accelerator (inference only) by splitting the SGD algorithm into simple computational elements. Then, based on this heuristic approach we propose TaxoNN, a light-weight accelerator for DNN training. TaxoNN can easily tune the DNN weights by reusing the hardware resources used in the inference process using a time-multiplexing approach and low-bitwidth units. Our experimental results show that TaxoNN delivers, on average, 0.97% higher misclassification rate compared to a full-precision implementation. Moreover, TaxoNN provides 2.1$\times$ power saving and 1.65$\times$ area reduction over the state-of-the-art DNN training accelerator.
△ Less
Submitted 11 October, 2020;
originally announced October 2020.
-
A New Hybrid Method of IPv6 Addressing in the Internet of Things
Authors:
Nasrin Sadat Zarif,
Hamed Najafi,
Mehdi Imani,
Abolfazl Qiyasi Moghadam
Abstract:
Humans have always been seeking greater control over their surrounding objects. Today, with the help of Internet of Things (IoT), we can fulfill this goal. In order for objects to be connected to the internet, they should have an address, so that they can be detected and tracked. Since the number of these objects are very large and never stop growing, addressing space should be used, which can res…
▽ More
Humans have always been seeking greater control over their surrounding objects. Today, with the help of Internet of Things (IoT), we can fulfill this goal. In order for objects to be connected to the internet, they should have an address, so that they can be detected and tracked. Since the number of these objects are very large and never stop growing, addressing space should be used, which can respond to this number of objects. In this regard, the best option is IPv6. Addressing has different methods, the most important of which are introduced in this paper. The method presented in this paper is a hybrid addressing method which uses EPC and ONS IP. The method proposed in this paper provides a unique and hierarchical IPv6 address for each object. This method is simple and does not require additional hardware for implantation. Further, the addressing time of this method is short while its scalability is high, and is compatible with different EPC standards.
△ Less
Submitted 9 April, 2020; v1 submitted 3 November, 2018;
originally announced November 2018.
-
On Memory System Design for Stochastic Computing
Authors:
S. Karen Khatamifard,
M. Hassan Najafi,
Ali Ghoreyshi,
Ulya R. Karpuzcu,
David Lilja
Abstract:
Growing uncertainty in design parameters (and therefore, in design functionality) renders stochastic computing particularly promising, which represents and processes data as quantized probabilities. However, due to the difference in data representation, integrating conventional memory (designed and optimized for non-stochastic computing) in stochastic computing systems inevitably incurs a signific…
▽ More
Growing uncertainty in design parameters (and therefore, in design functionality) renders stochastic computing particularly promising, which represents and processes data as quantized probabilities. However, due to the difference in data representation, integrating conventional memory (designed and optimized for non-stochastic computing) in stochastic computing systems inevitably incurs a significant data conversion overhead. Barely any stochastic computing proposal to-date covers the memory impact. In this paper, as the first study of its kind to the best of our knowledge, we rethink the memory system design for stochastic computing. The result is a seamless stochastic system, StochMem, which features analog memory to trade the energy and area overhead of data conversion for computation accuracy. In this manner StochMem can reduce the energy (area) overhead by up-to 52.8% (93.7%) at the cost of at most 0.7% loss in computation accuracy.
△ Less
Submitted 25 September, 2017;
originally announced September 2017.
-
Operator maps of Jensen-type
Authors:
Frank Hansen,
Mohammad Sal Moslehian,
Hamed Najafi
Abstract:
Let $\mathbb{B}_J(\mathcal H)$ denote the set of self-adjoint operators acting on a Hilbert space $\mathcal{H}$ with spectra contained in an open interval $J$. A map $Φ\colon\mathbb{B}_J(\mathcal H)\to {\mathbb B}(\mathcal H)_\text{sa} $ is said to be of Jensen-type if \[ Φ(C^*AC+D^*BD)\le C^*Φ(A)C+D^*Φ(B)D \] for all $ A, B \in B_J(\mathcal H)$ and bounded linear operators $ C,D $ acting on…
▽ More
Let $\mathbb{B}_J(\mathcal H)$ denote the set of self-adjoint operators acting on a Hilbert space $\mathcal{H}$ with spectra contained in an open interval $J$. A map $Φ\colon\mathbb{B}_J(\mathcal H)\to {\mathbb B}(\mathcal H)_\text{sa} $ is said to be of Jensen-type if \[ Φ(C^*AC+D^*BD)\le C^*Φ(A)C+D^*Φ(B)D \] for all $ A, B \in B_J(\mathcal H)$ and bounded linear operators $ C,D $ acting on $ \mathcal H $ with $ C^*C+D^*D=I$, where $I$ denotes the identity operator. We show that a Jensen-type map on a infinite dimensional Hilbert space is of the form $Φ(A)=f(A)$ for some operator convex function $ f $ defined in $ J $.
△ Less
Submitted 26 October, 2017; v1 submitted 23 August, 2017;
originally announced August 2017.
-
A High-Capacity Separable Reversible Method for Hiding Multiple Messages in Encrypted Images
Authors:
M. Hassan Najafi,
David J. Lilja
Abstract:
This work proposes a high-capacity scheme for separable reversible data hiding in encrypted images. At the sender side, the original uncompressed image is encrypted using an encryption key. One or several data hiders use the MSB of some image pixels to hide additional data. Given the encrypted image containing this additional data, with only one of those data hiding keys, the receiver can extract…
▽ More
This work proposes a high-capacity scheme for separable reversible data hiding in encrypted images. At the sender side, the original uncompressed image is encrypted using an encryption key. One or several data hiders use the MSB of some image pixels to hide additional data. Given the encrypted image containing this additional data, with only one of those data hiding keys, the receiver can extract the corresponding embedded data, although the image content will remain inaccessible. With all of the embedding keys, the receiver can extract all of the embedded data. Finally, with the encryption key, the receiver can decrypt the received data and reconstruct the original image perfectly\ignore{ without the data embedding key(s) }by exploiting the spatial correlation of natural images. Based on the proposed method a receiver could recover the original image perfectly even when it does not have the data embedding key(s) and the embedding rate is high.
△ Less
Submitted 13 December, 2016;
originally announced December 2016.
-
Estimates of operator convex and operator monotone functions on bounded intervals
Authors:
M. Fujii,
M. S. Moslehian,
H. Najafi,
R. Nakamoto
Abstract:
Recently the behavior of operator monotone functions on unbounded intervals with respect to the relation of strictly positivity has been investigated. In this paper we deeply study such behavior not only for operator monotone functions but also for operator convex functions on bounded intervals. More precisely, we prove that if $f$ is a nonlinear operator convex function on a bounded interval…
▽ More
Recently the behavior of operator monotone functions on unbounded intervals with respect to the relation of strictly positivity has been investigated. In this paper we deeply study such behavior not only for operator monotone functions but also for operator convex functions on bounded intervals. More precisely, we prove that if $f$ is a nonlinear operator convex function on a bounded interval $(a,b)$ and $A, B$ are bounded linear operators acting on a Hilbert space with spectra in $(a,b)$ and $A-B$ is invertible, then $sf(A)+(1-s)f(B)>f(sA+(1-s)B)$. A short proof for a similar known result concerning a nonconstant operator monotone function on $[0,\infty)$ is presented. Another purpose is to find a lower bound for $f(A)-f(B)$, where $f$ is a nonconstant operator monotone function, by using a key lemma. We also give an estimation of the Furuta inequality, which is an excellent extension of the Löwner--Heinz inequality.
△ Less
Submitted 13 October, 2016;
originally announced October 2016.
-
Deformation of involution and multiplication in a C*-algebra
Authors:
H. Najafi,
M. S. Moslehian
Abstract:
We investigate the deformation of involution and multiplication in a unital $C^*$-algebra when its norm is fixed. Our main result is to present all multiplications and involutions on a given $C^*$-algebra $\mathcal{A}$ under which $\mathcal{A}$ is still a $C^*$-algebra whereas we keep the norm unchanged. For each invertible element $a\in\mathcal{A}$ we also introduce an involution and a multiplica…
▽ More
We investigate the deformation of involution and multiplication in a unital $C^*$-algebra when its norm is fixed. Our main result is to present all multiplications and involutions on a given $C^*$-algebra $\mathcal{A}$ under which $\mathcal{A}$ is still a $C^*$-algebra whereas we keep the norm unchanged. For each invertible element $a\in\mathcal{A}$ we also introduce an involution and a multiplication making $\mathcal{A}$ into a $C^*$-algebra in which $a$ becomes a positive element. Further, we give a necessary and sufficient condition for that the center of a unital $C^*$-algebra $\mathcal{A}$ is trivial.
△ Less
Submitted 30 April, 2013;
originally announced April 2013.
-
An extension of the Lowner-Heinz inequality
Authors:
Mohammad Sal Moslehian,
Hamed Najafi
Abstract:
We extend the celebrated Löwner--Heinz inequality by showing that if $A, B$ are Hilbert space operators such that $A > B \geq 0$, then
A^r - B^r \geq ||A||^r-(||A||- \frac{1}{||(A-B)^{-1}||})^r > 0
for each $0 < r \leq 1$. As an application we prove that
\log A - \log B \geq \log||A||- \log(||A||-\frac{1}{||(A-B)^{-1}||})>0.
We extend the celebrated Löwner--Heinz inequality by showing that if $A, B$ are Hilbert space operators such that $A > B \geq 0$, then
A^r - B^r \geq ||A||^r-(||A||- \frac{1}{||(A-B)^{-1}||})^r > 0
for each $0 < r \leq 1$. As an application we prove that
\log A - \log B \geq \log||A||- \log(||A||-\frac{1}{||(A-B)^{-1}||})>0.
△ Less
Submitted 12 July, 2012;
originally announced July 2012.
-
On the binary relation $\leq_u$ on self-adjoint Hilbert space operators
Authors:
M. S. Moslehian,
S. M. S. Nabavi Sales,
H. Najafi
Abstract:
Given self-adjoint operators $A, B\in\mathbb{B}(\mathscr{H})$ it is said $A\leq_uB$ whenever $A\leq U^*BU$ for some unitary operator $U$. We show that $A\leq_u B$ if and only if $f(g(A)^r)\leq_uf(g(B)^r)$ for any increasing operator convex function $f$, any operator monotone function $g$ and any positive number $r$. We present some sufficient conditions under which if $B\leq A\leq U^*BU$, then…
▽ More
Given self-adjoint operators $A, B\in\mathbb{B}(\mathscr{H})$ it is said $A\leq_uB$ whenever $A\leq U^*BU$ for some unitary operator $U$. We show that $A\leq_u B$ if and only if $f(g(A)^r)\leq_uf(g(B)^r)$ for any increasing operator convex function $f$, any operator monotone function $g$ and any positive number $r$. We present some sufficient conditions under which if $B\leq A\leq U^*BU$, then $B=A=U^*BU$. Finally we prove that if $A^n\leq U^\ast A^nU$ for all $n\in\mathbb{N}$, then $A=U^\ast AU$.
△ Less
Submitted 10 April, 2012;
originally announced April 2012.
-
Around Operator Monotone Functions
Authors:
M. S. Moslehian,
H. Najafi
Abstract:
We show that the symmetrized product $AB+BA$ of two positive operators $A$ and $B$ is positive if and only if $f(A+B)\leq f(A)+f(B)$ for all non-negative operator monotone functions $f$ on $[0,\infty)$ and deduce an operator inequality. We also give a necessary and sufficient condition for that the composition $f\circ g$ of an operator convex function $f$ on $[0,\infty)$ and a non-negative operato…
▽ More
We show that the symmetrized product $AB+BA$ of two positive operators $A$ and $B$ is positive if and only if $f(A+B)\leq f(A)+f(B)$ for all non-negative operator monotone functions $f$ on $[0,\infty)$ and deduce an operator inequality. We also give a necessary and sufficient condition for that the composition $f\circ g$ of an operator convex function $f$ on $[0,\infty)$ and a non-negative operator monotone function $g$ on an interval $(a,b)$ is operator monotone and give some applications.
△ Less
Submitted 30 October, 2011;
originally announced October 2011.
-
Asynchronous Interference Alignment
Authors:
Mehdi Torbatian,
Hossein Najafi,
Mohamed Oussama Damen
Abstract:
A constant K-user interference channel in which the users are not symbol-synchronous is considered. It is shown that the asynchronism among the users facilitates aligning interfering signals at each receiver node while it does not affect the total number of degrees of freedom (DoF) of the channel. To achieve the total K/2 DoF of the channel when single antenna nodes are used, a novel practical int…
▽ More
A constant K-user interference channel in which the users are not symbol-synchronous is considered. It is shown that the asynchronism among the users facilitates aligning interfering signals at each receiver node while it does not affect the total number of degrees of freedom (DoF) of the channel. To achieve the total K/2 DoF of the channel when single antenna nodes are used, a novel practical interference alignment scheme is proposed wherein the alignment task is performed with the help of asynchronous delays which inherently exist among the received signals at each receiver node. When each node is equipped with M > 1 antennas, it is argued that the same alignment scheme is sufficient to achieve the total MK/2 DoF of the medium when all links between collocated antennas experience the same asynchronous delay.
△ Less
Submitted 9 June, 2011; v1 submitted 31 December, 2010;
originally announced January 2011.