fatemeh moshfegh - Academia.edu (original) (raw)

Master's degree , Telecommunications Engineering
guilan university

less

Uploads

Papers by fatemeh moshfegh

Research paper thumbnail of A Study of Various Steganographic Techniques Used for Information Hiding

The art of information hiding has received much attention in the recent years as security of info... more The art of information hiding has received much attention in the recent years as security of information has become a big concern in this internet era. As sharing of sensitive information via a common communication channel has become inevitable, Steganography – the art and science of hiding information has gained much attention. We are also surrounded by a world of secret communication, where people of all types are transmitting information as innocent as an encrypted credit card number to an online-store and as insidious as a terrorist plot to hijackers. Steganography derives from the Greek word steganos, meaning covered or secret, and graphy (writing or drawing) [1]. Steganography is a technology where modern data compression, information theory, spread spectrum, and cryptography technologies are brought together to satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various techniques used in steganography and to identify areas in which this technique can be applied, so that the human race can be benefited at large.

Research paper thumbnail of MIMO and Beamforming Solutions for 5G Technology

Multi-antenna technologies such as beamforming and Multi p le-In p ut, Multi p le-Out p ut (MIMO)... more Multi-antenna technologies such as beamforming and Multi p le-In p ut, Multi p le-Out p ut (MIMO) are antici p ated to p lay a key role in "5G" systems, which are ex p ected to be de­ p loyed in the year 2020 and beyond. With a class of 5G systems expected to be deployed in both cm-wave (3-30 GHz) and mm­ wave (30-300 GHz) bands, the unique characteristics and chal­ lenges of those bands have prompted a revisiting of the design and performance tradeoffs associated with existing multi­ antenna techniques in order to determine the preferred frame­ work for deploying MIMO technology in 5G systems. In this paper, we discuss key implementation issues surrounding the deployment of transmit MIMO processing for 5G systems. We describe MIMO architectures where the transmit MIMO pro­ cessing is implemented at baseband, RF, and a combination of RF and baseband (a hybrid approach). We focus on the perfor­ mance and implementation issues surrounding several candidate techniques for multiuser -MIMO (MU-MIMO) transmission in the mm-wave bands.

Research paper thumbnail of Beyond 5G Challenges: White Paper

This white paper was prepared as an output from the highly successful EPSRC sponsored CommNet 5G ... more This white paper was prepared as an output from the highly successful EPSRC sponsored CommNet 5G workshop on 13 March 2014. The objective of the paper is to describe some of the major research challenges as perceived by the research community, where successful solutions ought to be implemented in future wireless systems in the next ten years.

Research paper thumbnail of A Study of Various Steganographic Techniques Used for Information Hiding

The art of information hiding has received much attention in the recent years as security of info... more The art of information hiding has received much attention in the recent years as security of information has become a big concern in this internet era. As sharing of sensitive information via a common communication channel has become inevitable, Steganography – the art and science of hiding information has gained much attention. We are also surrounded by a world of secret communication, where people of all types are transmitting information as innocent as an encrypted credit card number to an online-store and as insidious as a terrorist plot to hijackers. Steganography derives from the Greek word steganos, meaning covered or secret, and graphy (writing or drawing) [1]. Steganography is a technology where modern data compression, information theory, spread spectrum, and cryptography technologies are brought together to satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various techniques used in steganography and to identify areas in which this technique can be applied, so that the human race can be benefited at large.

Research paper thumbnail of MIMO and Beamforming Solutions for 5G Technology

Multi-antenna technologies such as beamforming and Multi p le-In p ut, Multi p le-Out p ut (MIMO)... more Multi-antenna technologies such as beamforming and Multi p le-In p ut, Multi p le-Out p ut (MIMO) are antici p ated to p lay a key role in "5G" systems, which are ex p ected to be de­ p loyed in the year 2020 and beyond. With a class of 5G systems expected to be deployed in both cm-wave (3-30 GHz) and mm­ wave (30-300 GHz) bands, the unique characteristics and chal­ lenges of those bands have prompted a revisiting of the design and performance tradeoffs associated with existing multi­ antenna techniques in order to determine the preferred frame­ work for deploying MIMO technology in 5G systems. In this paper, we discuss key implementation issues surrounding the deployment of transmit MIMO processing for 5G systems. We describe MIMO architectures where the transmit MIMO pro­ cessing is implemented at baseband, RF, and a combination of RF and baseband (a hybrid approach). We focus on the perfor­ mance and implementation issues surrounding several candidate techniques for multiuser -MIMO (MU-MIMO) transmission in the mm-wave bands.

Research paper thumbnail of Beyond 5G Challenges: White Paper

This white paper was prepared as an output from the highly successful EPSRC sponsored CommNet 5G ... more This white paper was prepared as an output from the highly successful EPSRC sponsored CommNet 5G workshop on 13 March 2014. The objective of the paper is to describe some of the major research challenges as perceived by the research community, where successful solutions ought to be implemented in future wireless systems in the next ten years.

Log In