-
Uncovering the hidden core-periphery structure in hyperbolic networks
Authors:
Imran Ansari,
Pawanesh Yadav,
Niteesh Sahni
Abstract:
The hyperbolic network models exhibit very fundamental and essential features, like small-worldness, scale-freeness, high-clustering coefficient, and community structure. In this paper, we comprehensively explore the presence of an important feature, the core-periphery structure, in the hyperbolic network models, which is often exhibited by real-world networks. We focused on well-known hyperbolic…
▽ More
The hyperbolic network models exhibit very fundamental and essential features, like small-worldness, scale-freeness, high-clustering coefficient, and community structure. In this paper, we comprehensively explore the presence of an important feature, the core-periphery structure, in the hyperbolic network models, which is often exhibited by real-world networks. We focused on well-known hyperbolic models such as popularity-similarity optimization model (PSO) and S1/H2 models and studied core-periphery structures using a well-established method that is based on standard random walk Markov chain model. The observed core-periphery centralization values indicate that the core-periphery structure can be very pronounced under certain conditions. We also validate our findings by statistically testing for the significance of the observed core-periphery structure in the network geometry. This study extends network science and reveals core-periphery insights applicable to various domains, enhancing network performance and resiliency in transportation and information systems.
△ Less
Submitted 28 June, 2024;
originally announced June 2024.
-
A novel portfolio construction strategy based on the core-periphery profile of stocks
Authors:
Imran Ansari,
Charu Sharma,
Akshay Agrawal,
Niteesh Sahni
Abstract:
This paper highlights the significance of mesoscale structures, particularly the core-periphery structure, in financial networks for portfolio optimization. We build portfolios of stocks belonging to the periphery part of the Planar maximally filtered subgraphs of the underlying network of stocks created from Pearson correlations between pairs of stocks and compare its performance with some well-k…
▽ More
This paper highlights the significance of mesoscale structures, particularly the core-periphery structure, in financial networks for portfolio optimization. We build portfolios of stocks belonging to the periphery part of the Planar maximally filtered subgraphs of the underlying network of stocks created from Pearson correlations between pairs of stocks and compare its performance with some well-known strategies of Pozzi et. al. hinging around the local indices of centrality in terms of the Sharpe ratio, returns and standard deviation. Our findings reveal that these portfolios consistently outperform traditional strategies and further the core-periphery profile obtained is statistically significant across time periods. These empirical findings substantiate the efficacy of using the core-periphery profile of the stock market network for both inter-day and intraday trading and provide valuable insights for investors seeking better returns.
△ Less
Submitted 27 April, 2024;
originally announced May 2024.
-
A MASH simulation of the photoexcited dynamics of cyclobutanone
Authors:
Joseph E. Lawrence,
Imaad M. Ansari,
Jonathan R. Mannouch,
Meghna A. Manae,
Kasra Asnaashari,
Aaron Kelly,
Jeremy O. Richardson
Abstract:
In response to a community prediction challenge, we simulate the nonadiabatic dynamics of cyclobutanone using the map** approach to surface hop** (MASH). We consider the first 500 fs of relaxation following photo-excitation to the S2 state and predict the corresponding time-resolved electron-diffraction signal that will be measured by the planned experiment. 397 ab-initio trajectories were obt…
▽ More
In response to a community prediction challenge, we simulate the nonadiabatic dynamics of cyclobutanone using the map** approach to surface hop** (MASH). We consider the first 500 fs of relaxation following photo-excitation to the S2 state and predict the corresponding time-resolved electron-diffraction signal that will be measured by the planned experiment. 397 ab-initio trajectories were obtained on the fly with state-averaged complete active space self-consistent field (SA-CASSCF) using a (12,11) active space. To obtain an estimate of the potential systematic error 198 of the trajectories were calculated using an aug-cc-pVDZ basis set and 199 with a 6-31+G* basis set. MASH is a recently proposed independent trajectory method for simulating nonadiabatic dynamics, originally derived for two-state problems. As there are three relevant electronic states in this system, we used a newly developed multi-state generalisation of MASH for the simulation: the uncoupled spheres multi-state MASH method (unSMASH). This study therefore serves both as an investigation of the photo-dissociation dynamics of cyclobutanone, and also as a demonstration of the applicability of unSMASH to ab-initio simulations. In line with previous experimental studies, we observe that the simulated dynamics is dominated by three sets of dissociation products, C3H6+CO, C2H4+C2H2O and C2H4+CH2+CO, and we interpret our predicted electron-diffraction signal in terms of the key features of the associated dissociation pathways.
△ Less
Submitted 2 April, 2024; v1 submitted 15 February, 2024;
originally announced February 2024.
-
On Secure mmWave RSMA Systems
Authors:
Hongjiang Lei,
Sha Zhou,
Xinhu Chen,
Imran Shafique Ansari,
Yun Li,
Gaofeng Pan,
Mohamed-Slim Alouini
Abstract:
This work considers a multiple-input-single-output mmWave RSMA system wherein a base station serves two users in the presence of a passive eavesdropper. Different eavesdrop** scenarios are considered corresponding to the overlapped resolvable paths between the main and the wiretap channels under the considered transmission schemes. The analytical expressions for the secrecy outage probability ar…
▽ More
This work considers a multiple-input-single-output mmWave RSMA system wherein a base station serves two users in the presence of a passive eavesdropper. Different eavesdrop** scenarios are considered corresponding to the overlapped resolvable paths between the main and the wiretap channels under the considered transmission schemes. The analytical expressions for the secrecy outage probability are derived respectively through the Gaussian Chebyshev quadrature method. Monte Carlo simulation results are presented to validate the correctness of the derived analytical expressions and demonstrate the effects of system parameters on the SOP of the considered mmWave RSMA systems.
△ Less
Submitted 25 February, 2024; v1 submitted 3 February, 2024;
originally announced February 2024.
-
Trajectory and Power Design for Aerial Multi-User Covert Communications
Authors:
Hongjiang Lei,
Jiacheng Jiang,
Imran Shafique Ansari,
Gaofeng Pan,
Mohamed-Slim Alouini
Abstract:
Unmanned aerial vehicles (UAVs) can provide wireless access to terrestrial users, regardless of geographical constraints, and will be an important part of future communication systems. In this paper, a multi-user downlink dual-UAVs enabled covert communication system was investigated, in which a UAV transmits secure information to ground users in the presence of multiple wardens as well as a frien…
▽ More
Unmanned aerial vehicles (UAVs) can provide wireless access to terrestrial users, regardless of geographical constraints, and will be an important part of future communication systems. In this paper, a multi-user downlink dual-UAVs enabled covert communication system was investigated, in which a UAV transmits secure information to ground users in the presence of multiple wardens as well as a friendly jammer UAV transmits artificial jamming signals to fight with the wardens. The scenario of wardens being outfitted with a single antenna is considered, and the detection error probability (DEP) of wardens with finite observations is researched. Then, considering the uncertainty of wardens' location, a robust optimization problem with worst-case covertness constraint is formulated to maximize the average covert rate by jointly optimizing power allocation and trajectory. To cope with the optimization problem, an algorithm based on successive convex approximation methods is proposed. Thereafter, the results are extended to the case where all the wardens are equipped with multiple antennas. After analyzing the DEP in this scenario, a tractable lower bound of the DEP is obtained by utilizing Pinsker's inequality. Subsequently, the non-convex optimization problem was established and efficiently coped by utilizing a similar algorithm as in the single-antenna scenario. Numerical results indicate the effectiveness of our proposed algorithm.
△ Less
Submitted 21 October, 2023;
originally announced October 2023.
-
Trajectory and power design for aerial CRNs with colluding eavesdroppers
Authors:
Hongjiang Lei,
Jiacheng Jiang,
Haosi Yang,
Ki-Hong Park,
Imran Shafique Ansari,
Gaofeng Pan,
Mohamed-Slim Alouini
Abstract:
Unmanned aerial vehicles (UAVs) can provide wireless access services to terrestrial users without geographical limitations and will become an essential part of the future communication system. However, the openness of wireless channels and the mobility of UAVs make the security of UAV-based communication systems particularly challenging. This work investigates the security of aerial cognitive radi…
▽ More
Unmanned aerial vehicles (UAVs) can provide wireless access services to terrestrial users without geographical limitations and will become an essential part of the future communication system. However, the openness of wireless channels and the mobility of UAVs make the security of UAV-based communication systems particularly challenging. This work investigates the security of aerial cognitive radio networks (CRNs) with multiple uncertainties colluding eavesdroppers. A cognitive aerial base station transmits messages to cognitive terrestrial users using the spectrum resource of the primary users. All secondary terrestrial users and illegitimate receivers jointly decode the received message. The average secrecy rate of the aerial CRNs is maximized by jointly optimizing the UAV's trajectory and transmission power. An iterative algorithm based on block coordinate descent and successive convex approximation is proposed to solve the non-convex mixed-variable optimization problem. Numerical results verify the effectiveness of our proposed algorithm and show that our scheme improves the secrecy performance of airborne CRNs.
△ Less
Submitted 21 October, 2023;
originally announced October 2023.
-
RIS-aided Mixed RF-FSO Wireless Networks: Secrecy Performance Analysis with Simultaneous Eavesdrop**
Authors:
Md. Mijanur Rahman,
A. S. M. Badrudduza,
Noor Ahmad Sarker,
Md. Ibrahim,
Imran Shafique Ansari
Abstract:
The appearance of sixth-generation networks has resulted in the proposal of several solutions to tackle signal loss. One of these solutions is the utilization of reconfigurable intelligent surfaces (RIS), which can reflect or refract signals as required. This integration offers significant potential to improve the coverage area from the sender to the receiver. In this paper, we present a comprehen…
▽ More
The appearance of sixth-generation networks has resulted in the proposal of several solutions to tackle signal loss. One of these solutions is the utilization of reconfigurable intelligent surfaces (RIS), which can reflect or refract signals as required. This integration offers significant potential to improve the coverage area from the sender to the receiver. In this paper, we present a comprehensive framework for analyzing the secrecy performance of a RIS-aided mixed radio frequency (RF)-free space optics (FSO) system, for the first time. Our study assumes that a secure message is transmitted from a RF transmitter to a FSO receiver through an intermediate relay. The RF link experiences Rician fading while the FSO link experiences Málaga distributed turbulence with pointing errors. We examine three scenarios: 1) RF-link eavesdrop**, 2) FSO-link eavesdrop**, and 3) a simultaneous eavesdrop** attack on both RF and FSO links. We evaluate the secrecy performance using analytical expressions to compute secrecy metrics such as the average secrecy capacity, secrecy outage probability, strictly positive secrecy capacity, effective secrecy throughput, and intercept probability. Our results are confirmed via Monte-Carlo simulations and demonstrate that fading parameters, atmospheric turbulence conditions, pointing errors, and detection techniques play a crucial role in enhancing secrecy performance.
△ Less
Submitted 9 April, 2023;
originally announced April 2023.
-
Effects of Co-channel Interference on RIS Empowered Wireless Networks amid Multiple Eavesdrop** Attempts
Authors:
Md. Roisul Ajom Ruku,
Md. Ibrahim,
A. S. M. Badrudduza,
Imran Shafique Ansari
Abstract:
This letter is concerned with the secrecy performance of reconfigurable intelligent surfaces (RIS)-aided wireless networks in the existence of multiple interferers towards the destination. To be more precise, we analyze three critical issues in the design of secure RIS-assisted networks: 1) How do interferers affect the performance of secure wireless networks? 2) Which of the two groups of eavesdr…
▽ More
This letter is concerned with the secrecy performance of reconfigurable intelligent surfaces (RIS)-aided wireless networks in the existence of multiple interferers towards the destination. To be more precise, we analyze three critical issues in the design of secure RIS-assisted networks: 1) How do interferers affect the performance of secure wireless networks? 2) Which of the two groups of eavesdroppers (i.e., colluding and non-colluding) is more severe? 3) How can RIS improve network confidentiality? To do so, we develop the analytical expression of secrecy outage probability in closed-form, along with asymptotic analysis at high signal-to-noise ratio regime to better understand the impacts of different system parameters on secrecy performance. Finally, we validate our analytical results using a computer based Monte-Carlo simulation.
△ Less
Submitted 21 February, 2023;
originally announced February 2023.
-
Secrecy Outage Analysis of Energy Harvesting Relay-based Mixed UOWC-RF Network with Multiple Eavesdroppers
Authors:
Moloy Kumar Ghosh,
Milton Kumar Kundu,
Md Ibrahim,
A. S. M. Badrudduza,
Md. Shamim Anower,
Imran Shafique Ansari,
Ali A. Shaikhi,
Mohammed A. Mohandes
Abstract:
This work deals with the physical layer security performance of a dual-hop underwater optical communication (UOWC)-radio frequency (RF) network under the intruding attempts of multiple eavesdroppers via RF links. The intermediate decode and forward relay node between the underwater source and the destination transforms the optical signal into electrical form and re-transmits it to the destination…
▽ More
This work deals with the physical layer security performance of a dual-hop underwater optical communication (UOWC)-radio frequency (RF) network under the intruding attempts of multiple eavesdroppers via RF links. The intermediate decode and forward relay node between the underwater source and the destination transforms the optical signal into electrical form and re-transmits it to the destination node with the help of harvested energy by the relay from an integrated power beacon within the system. The source-to-relay link (UOWC) follows a mixture exponential generalized Gamma turbulence with pointing error impairments whereas all the remaining links (RF) undergo $κ-μ$ shadowed fading. With regards to the types of intruders, herein two scenarios are considered, i.e., colluding (\textit{Scenario-I}) and non-colluding (\textit{Scenario-II}) eavesdroppers and the analytical expressions of secure outage probability, probability of strictly positive secrecy capacity, and effective secrecy throughput are derived in closed form for each scenario. Furthermore, the impacts of UOWC and RF channel parameters as well as detection techniques on secrecy capacity are demonstrated, and following this a comparison between the two considered scenarios is demonstrated that reveals the collusion between the eavesdroppers imposes the most harmful threat on secrecy throughput but a better secrecy level can be attained adopting diversity at the destination and power beacon nodes along with heterodyne detection rather than intensity modulation and direct detection technique. Finally, all the derived expressions are corroborated via Monte Carlo simulations.
△ Less
Submitted 20 February, 2023;
originally announced February 2023.
-
SpectNet : End-to-End Audio Signal Classification Using Learnable Spectrograms
Authors:
Md. Istiaq Ansari,
Taufiq Hasan
Abstract:
Pattern recognition from audio signals is an active research topic encompassing audio tagging, acoustic scene classification, music classification, and other areas. Spectrogram and mel-frequency cepstral coefficients (MFCC) are among the most commonly used features for audio signal analysis and classification. Recently, deep convolutional neural networks (CNN) have been successfully used for audio…
▽ More
Pattern recognition from audio signals is an active research topic encompassing audio tagging, acoustic scene classification, music classification, and other areas. Spectrogram and mel-frequency cepstral coefficients (MFCC) are among the most commonly used features for audio signal analysis and classification. Recently, deep convolutional neural networks (CNN) have been successfully used for audio classification problems using spectrogram-based 2D features. In this paper, we present SpectNet, an integrated front-end layer that extracts spectrogram features within a CNN architecture that can be used for audio pattern recognition tasks. The front-end layer utilizes learnable gammatone filters that are initialized using mel-scale filters. The proposed layer outputs a 2D spectrogram image which can be fed into a 2D CNN for classification. The parameters of the entire network, including the front-end filterbank, can be updated via back-propagation. This training scheme allows for fine-tuning the spectrogram-image features according to the target audio dataset. The proposed method is evaluated in two different audio signal classification tasks: heart sound anomaly detection and acoustic scene classification. The proposed method shows a significant 1.02\% improvement in MACC for the heart sound classification task and 2.11\% improvement in accuracy for the acoustic scene classification task compared to the classical spectrogram image features. The source code of our experiments can be found at \url{https://github.com/mHealthBuet/SpectNet}
△ Less
Submitted 17 November, 2022;
originally announced November 2022.
-
Axial segregation of granular mixtures in laterally shaken multi-trapezium channels
Authors:
Mohammed Istafaul Haque Ansari,
Ashish Bhateja,
Ishan Sharma
Abstract:
We investigate axial segregation of binary mixtures in a laterally shaken horizontal channel formed by ratchet-like sidewalls that appear as concatenated trapeziums when not offset axially. Grain mixtures shaken in such a channel are observed to segregate in two stages: they first separate rapidly into two vertically arranged layers and, then, these layers move axially in opposite directions, segr…
▽ More
We investigate axial segregation of binary mixtures in a laterally shaken horizontal channel formed by ratchet-like sidewalls that appear as concatenated trapeziums when not offset axially. Grain mixtures shaken in such a channel are observed to segregate in two stages: they first separate rapidly into two vertically arranged layers and, then, these layers move axially in opposite directions, segregating the two species. Here, we conduct experiments to study the influence on the segregation process of various parameters: the size ratio of grains, the shaking frequency and the channel's geometry. We find that (a) segregation quality depends upon shaking frequency and it is possible to find a unique optimal frequency for segregation, (b) the optimal frequency lowers with increase in size ratio, (c) segregation is generally poorer when the sidewalls are more inclined to each other, and (d) segregation is improved when the sidewalls are axially offset from each other. We then carry out discrete element simulations of the segregation process in order to relate the experimental observations to the interfacial pressure gradient mechanism of Bhateja et al. [Bhateja, A., I. Sharma and J. K. Singh 2017. Segregation physics of a macroscale granular ratchet, Phys. Rev. Fluids 2, 052301]. We demonstrate that the segregation quality correlates well with the scaled interfacial pressure gradient, which is the ratio of the interfacial pressure gradient between the layers, formed in the first stage of the segregation process, to the axial body force provided by the tapered sidewalls.
△ Less
Submitted 14 October, 2022;
originally announced October 2022.
-
Error Rate and Ergodic Capacity of RF-FSO System with Partial Relay Selection in the Presence of Pointing Errors
Authors:
Milica I. Petkovic,
Imran Shafique Ansari,
Goran T. Djordjevic,
Khalid A. Qaraqe
Abstract:
This paper presents an analysis of a multiple dual-hop relaying system, which is composed of km-class radio frequency (RF)-free-space optical (FSO) links. Partial relay selection based on outdated channel state information (CSI) is employed in order to select active relay for further transmission. Amplify-and-forward relaying protocol is utilized. The RF links are assumed to be subject to Rayleigh…
▽ More
This paper presents an analysis of a multiple dual-hop relaying system, which is composed of km-class radio frequency (RF)-free-space optical (FSO) links. Partial relay selection based on outdated channel state information (CSI) is employed in order to select active relay for further transmission. Amplify-and-forward relaying protocol is utilized. The RF links are assumed to be subject to Rayleigh fading, and the FSO links are influenced by both Gamma-Gamma atmospheric turbulence and pointing errors. On the basis of our previously derived expression for cumulative distribution function of the equivalent signal-to-noise ratio of the whole system, we derive novel analytical expressions for the average bit-error rate (BER) and ergodic capacity that are presented in terms of the Meijer's G-function and extended generalized bivariate Meijer's G-function, respectively. The numerical results are confirmed by Monte Carlo simulations. Considering the effect of time-correlation between outdated CSI and actual CSI related to the RF channel at the time of transmission, the average BER and the ergodic capacity dependence on various system and channel parameters are observed and discussed. The results illustrate that the temporal correlation between outdated and actual CSI has strong effect on system performance, particularly on BER values, when FSO hop is influenced by favorable conditions. Keywords: Bit error rate, ergodic capacity, free-space optical systems, partial relay selection, radio frequency systems.
△ Less
Submitted 28 September, 2022; v1 submitted 27 September, 2022;
originally announced September 2022.
-
On the Integral and Derivative Identities of Bivariate Fox H-Function: Application in Wireless System Performance Analysis
Authors:
Puspraj Singh Chauhan,
Sandeep Kumar,
Imran Shafique Ansari
Abstract:
The present work proposes analytical solutions for the integral of bivariate Fox H-function in combination with algebraic, exponential, and complementary error functions. In addition, the work also presents the derivative identities with respect to function arguments. Further, the suitability of the proposed mathematical solutions is verified with reference to wireless communication environment, w…
▽ More
The present work proposes analytical solutions for the integral of bivariate Fox H-function in combination with algebraic, exponential, and complementary error functions. In addition, the work also presents the derivative identities with respect to function arguments. Further, the suitability of the proposed mathematical solutions is verified with reference to wireless communication environment, where a fading behaviour of the channel acquired the bivariate Fox H-function structure. Further more, asymptotic results for the outage probability and average symbol error probability are presented utilizing the origin probability density function based approach. The obtained results are free from complex analytical functions. At last, the analytical findings of the paper are compared with the numerical results and also with the Monte-Carlo simulation results to confirm their accuracy.
△ Less
Submitted 18 August, 2022;
originally announced August 2022.
-
On Secure NOMA-CDRT Systems with Physical Layer Network Coding
Authors:
Hongjiang Lei,
Xusheng She,
Ki-Hong Park,
Imran Shafique Ansari,
Zheng Shi,
**g Jiang,
Mohamed-Slim Alouini
Abstract:
This paper proposes a new scheme to enhance the secrecy performance of a NOMA-based coordinated direct relay transmission system (NOMA-CDRT) with an untrusted relay. The physical-layer network coding and the non-orthogonal multiple access scheme are combined to improve the spectrum efficiency. Furthermore, inter-user interference and friendly jamming signals are utilized to suppress the eavesdropp…
▽ More
This paper proposes a new scheme to enhance the secrecy performance of a NOMA-based coordinated direct relay transmission system (NOMA-CDRT) with an untrusted relay. The physical-layer network coding and the non-orthogonal multiple access scheme are combined to improve the spectrum efficiency. Furthermore, inter-user interference and friendly jamming signals are utilized to suppress the eavesdrop** ability of the untrusted relay without affecting the acceptance quality of legitimate users. Specifically, the far user in the first slot and the near user in the second slot act as jammers to generate jamming signals to ensure secure transmissions of the confidential signals. We investigate the secrecy performance of the proposed scheme in NOMA-CDRT systems and derive the closed-form expression for the ergodic secrecy sum rate. The asymptotic analysis at high signal-to-noise ratio is performed to obtain more insights. Finally, simulation results are presented to demonstrate the effectiveness of the proposed scheme and the correctness of the theoretical analysis.
△ Less
Submitted 25 May, 2022;
originally announced May 2022.
-
STAR-RIS-Assisted Hybrid NOMA mmWave Communication: Optimization and Performance Analysis
Authors:
Muhammad Faraz Ul Abrar,
Muhammad Talha,
Rafay Iqbal Ansari,
Syed Ali Hassan,
Haejoon Jung
Abstract:
Simultaneously reflecting and transmitting reconfigurable intelligent surfaces (STAR-RIS) has recently emerged as prominent technology that exploits the transmissive property of RIS to mitigate the half-space coverage limitation of conventional RIS operating on millimeter-wave (mmWave). In this paper, we study a downlink STAR-RIS-based multi-user multiple-input single-output (MU-MISO) mmWave hybri…
▽ More
Simultaneously reflecting and transmitting reconfigurable intelligent surfaces (STAR-RIS) has recently emerged as prominent technology that exploits the transmissive property of RIS to mitigate the half-space coverage limitation of conventional RIS operating on millimeter-wave (mmWave). In this paper, we study a downlink STAR-RIS-based multi-user multiple-input single-output (MU-MISO) mmWave hybrid non-orthogonal multiple access (H-NOMA) wireless network, where a sum-rate maximization problem has been formulated. The design of active and passive beamforming vectors, time and power allocation for H-NOMA is a highly coupled non-convex problem. To handle the problem, we propose an optimization framework based on alternating optimization (AO) that iteratively solves active and passive beamforming sub-problems. Channel correlations and channel strength-based techniques have been proposed for a specific case of two-user optimal clustering and decoding order assignment, respectively, for which analytical solutions to joint power and time allocation for H-NOMA have also been derived. Simulation results show that: 1) the proposed framework leveraging H-NOMA outperforms conventional OMA and NOMA to maximize the achievable sum-rate; 2) using the proposed framework, the supported number of clusters for the given design constraints can be increased considerably; 3) through STAR-RIS, the number of elements can be significantly reduced as compared to conventional RIS to ensure a similar quality-of-service (QoS).
△ Less
Submitted 13 May, 2022;
originally announced May 2022.
-
Outage Analysis of Aerial Semi-Grant-Free NOMA Systems
Authors:
Hongjiang Lei,
Chen Zhu,
Ki-Hong Park,
Imran Shafique Ansari,
Weijia Lei,
Hong Tang,
Kyeong ** Kim
Abstract:
In this paper, we analyze the outage performance of unmanned aerial vehicles (UAVs)-enabled downlink non-orthogonal multiple access (NOMA) communication systems with the semi-grant-free (SGF) transmission scheme. A UAV provides coverage services for a grant-based (GB) user and one user is allowed to utilize the same channel resource opportunistically. The hybrid successive interference cancellatio…
▽ More
In this paper, we analyze the outage performance of unmanned aerial vehicles (UAVs)-enabled downlink non-orthogonal multiple access (NOMA) communication systems with the semi-grant-free (SGF) transmission scheme. A UAV provides coverage services for a grant-based (GB) user and one user is allowed to utilize the same channel resource opportunistically. The hybrid successive interference cancellation scheme is implemented in the downlink NOMA scenarios for the first time. The analytical expressions for the exact and asymptotic outage probability (OP) of the grant-free (GF) user are derived. The results demonstrate that no-zero diversity order can be achieved only under stringent conditions on users' quality of service requirements. Subsequently, we propose an efficient dynamic power allocation (DPA) scheme to relax such data rate constraints to address this issue. The analytical expressions for the exact and asymptotic OP of the GF user with the DPA scheme are derived. Finally, Monte Carlo simulation results are presented to validate the correctness of the derived analytical expressions and demonstrate the effects of the UAV's location and altitude on the OP of the GF user.
△ Less
Submitted 18 February, 2024; v1 submitted 12 May, 2022;
originally announced May 2022.
-
Adaptive Multi-Strategy Market-Making Agent For Volatile Markets
Authors:
Ali Raheman,
Anton Kolonin,
Alexey Glushchenko,
Arseniy Fokin,
Ikram Ansari
Abstract:
Crypto-currency market uncertainty drives the need to find adaptive solutions to maximise gain or at least to avoid loss throughout the periods of trading activity. Given the high dimensionality and complexity of the state-action space in this domain, it can be treated as a "Narrow AGI" problem with the scope of goals and environments bound to financial markets. Adaptive Multi-Strategy Agent appro…
▽ More
Crypto-currency market uncertainty drives the need to find adaptive solutions to maximise gain or at least to avoid loss throughout the periods of trading activity. Given the high dimensionality and complexity of the state-action space in this domain, it can be treated as a "Narrow AGI" problem with the scope of goals and environments bound to financial markets. Adaptive Multi-Strategy Agent approach for market-making introduces a new solution to maximise positive "alpha" in long-term handling limit order book (LOB) positions by using multiple sub-agents implementing different strategies with a dynamic selection of these agents based on changing market conditions. AMSA provides no specific strategy of its own while being responsible for segmenting the periods of market-making activity into smaller execution sub-periods, performing internal backtesting on historical data on each of the sub-periods, doing sub- agent performance evaluation and re-selection of them at the end of each sub- period, and collecting returns and losses incrementally. With this approach, the return becomes a function of hyper-parameters such as market data granularity (refresh rate), the execution sub-period duration, number of active sub-agents, and their individual strategies. Sub-agent selection for the next trading sub-period is made based on return/loss and alpha values obtained during internal backtesting as well as real trading. Experiments with the AMSA have been performed under different market conditions relying on historical data and proved a high probability of positive alpha throughout the periods of trading activity in the case of properly selected hyper-parameters.
△ Less
Submitted 27 April, 2022;
originally announced April 2022.
-
Causal Analysis of Generic Time Series Data Applied for Market Prediction
Authors:
Anton Kolonin,
Ali Raheman,
Mukul Vishwas,
Ikram Ansari,
Juan Pinzon,
Alice Ho
Abstract:
We explore the applicability of the causal analysis based on temporally shifted (lagged) Pearson correlation applied to diverse time series of different natures in context of the problem of financial market prediction. Theoretical discussion is followed by description of the practical approach for specific environment of time series data with diverse nature and sparsity, as applied for environment…
▽ More
We explore the applicability of the causal analysis based on temporally shifted (lagged) Pearson correlation applied to diverse time series of different natures in context of the problem of financial market prediction. Theoretical discussion is followed by description of the practical approach for specific environment of time series data with diverse nature and sparsity, as applied for environments of financial markets. The data involves various financial metrics computable from raw market data such as real-time trades and snapshots of the limit order book as well as metrics determined upon social media news streams such as sentiment and different cognitive distortions. The approach is backed up with presentation of algorithmic framework for data acquisition and analysis, concluded with experimental results, and summary pointing out at the possibility to discriminate causal connections between different sorts of real field market data with further discussion on present issues and possible directions of the following work.
△ Less
Submitted 22 April, 2022;
originally announced April 2022.
-
Social Media Sentiment Analysis for Cryptocurrency Market Prediction
Authors:
Ali Raheman,
Anton Kolonin,
Igors Fridkins,
Ikram Ansari,
Mukul Vishwas
Abstract:
In this paper, we explore the usability of different natural language processing models for the sentiment analysis of social media applied to financial market prediction, using the cryptocurrency domain as a reference. We study how the different sentiment metrics are correlated with the price movements of Bitcoin. For this purpose, we explore different methods to calculate the sentiment metrics fr…
▽ More
In this paper, we explore the usability of different natural language processing models for the sentiment analysis of social media applied to financial market prediction, using the cryptocurrency domain as a reference. We study how the different sentiment metrics are correlated with the price movements of Bitcoin. For this purpose, we explore different methods to calculate the sentiment metrics from a text finding most of them not very accurate for this prediction task. We find that one of the models outperforms more than 20 other public ones and makes it possible to fine-tune it efficiently given its interpretable nature. Thus we confirm that interpretable artificial intelligence and natural language processing methods might be more valuable practically than non-explainable and non-interpretable ones. In the end, we analyse potential causal connections between the different sentiment metrics and the price movements.
△ Less
Submitted 18 April, 2022;
originally announced April 2022.
-
Joint Trajectory Design and User Scheduling of Aerial Cognitive Radio Networks
Authors:
Hongjiang Lei,
Haosi Yang,
Ki-Hong Park,
Imran Shafique Ansari,
**g Jiang,
Mohamed-Slim Alouini
Abstract:
Unmanned aerial vehicles (UAVs) have been widely employed to enhance the end-to-end performance of wireless communications since the links between UAVs and terrestrial nodes are line-of-sight (LoS) with high probability. However, the broadcast characteristics of signal propagation in LoS links make it vulnerable to being wiretapped by malicious eavesdroppers, which poses a considerable challenge t…
▽ More
Unmanned aerial vehicles (UAVs) have been widely employed to enhance the end-to-end performance of wireless communications since the links between UAVs and terrestrial nodes are line-of-sight (LoS) with high probability. However, the broadcast characteristics of signal propagation in LoS links make it vulnerable to being wiretapped by malicious eavesdroppers, which poses a considerable challenge to the security of wireless communications. This paper investigates the security of aerial cognitive radio networks (CRNs). An airborne base station transmits confidential messages to secondary users utilizing the same spectrum as the primary network. An aerial base station transmits jamming signals to suppress the eavesdropper to enhance secrecy performance. The uncertainty of eavesdrop** node locations is considered, and the average secrecy rate of the cognitive user is maximized by optimizing multiple users' scheduling, the UAVs' trajectory, and transmit power. To solve the non-convex optimization problem with mixed multiple integers variable problem, we propose an iterative algorithm based on block coordinate descent and successive convex approximation. Numerical results verify the effectiveness of our proposed algorithm and demonstrate that our scheme is beneficial to improving the secrecy performance of aerial CRNs.
△ Less
Submitted 21 April, 2022;
originally announced April 2022.
-
On Secure NOMA-Aided Semi-Grant-Free Systems
Authors:
Hongjiang Lei,
Fangtao Yang,
Hongwu Liu,
Imran Shafique Ansari,
Kyeong ** Kim,
Theodoros A. Tsiftsis
Abstract:
Semi-grant-free (SGF) transmission scheme enables grant-free (GF) users to utilize resource blocks allocated for grant-based (GB) users while maintaining the quality of service of GB users. This work investigates the secrecy performance of non-orthogonal multiple access (NOMA)-aided SGF systems. First, analytical expressions for the exact and asymptotic secrecy outage probability (SOP) of NOMA-aid…
▽ More
Semi-grant-free (SGF) transmission scheme enables grant-free (GF) users to utilize resource blocks allocated for grant-based (GB) users while maintaining the quality of service of GB users. This work investigates the secrecy performance of non-orthogonal multiple access (NOMA)-aided SGF systems. First, analytical expressions for the exact and asymptotic secrecy outage probability (SOP) of NOMA-aided SGF systems with a single GF user are derived. Then, the SGF systems with multiple GF users and the best-user scheduling scheme is considered. Analytical expressions for the exact and asymptotic SOP are derived by utilizing order statistics theory. Monte Carlo simulation results are provided and compared with two benchmark schemes. The effects of system parameters on the SOP of the considered system are demonstrated and the accuracy of the developed analytical results is verified. The results indicate that both the outage target rate for GB and the secure target rate for GF are the main factors of the secrecy performance of SGF systems.
△ Less
Submitted 27 February, 2023; v1 submitted 17 April, 2022;
originally announced April 2022.
-
Towards On-Device AI and Blockchain for 6G enabled Agricultural Supply-chain Management
Authors:
Muhammad Zawish,
Nouman Ashraf,
Rafay Iqbal Ansari,
Steven Davy,
Hassan Khaliq Qureshi,
Nauman Aslam,
Syed Ali Hassan
Abstract:
6G envisions artificial intelligence (AI) powered solutions for enhancing the quality-of-service (QoS) in the network and to ensure optimal utilization of resources. In this work, we propose an architecture based on the combination of unmanned aerial vehicles (UAVs), AI and blockchain for agricultural supply-chain management with the purpose of ensuring traceability, transparency, tracking invento…
▽ More
6G envisions artificial intelligence (AI) powered solutions for enhancing the quality-of-service (QoS) in the network and to ensure optimal utilization of resources. In this work, we propose an architecture based on the combination of unmanned aerial vehicles (UAVs), AI and blockchain for agricultural supply-chain management with the purpose of ensuring traceability, transparency, tracking inventories and contracts. We propose a solution to facilitate on-device AI by generating a roadmap of models with various resource-accuracy trade-offs. A fully convolutional neural network (FCN) model is used for biomass estimation through images captured by the UAV. Instead of a single compressed FCN model for deployment on UAV, we motivate the idea of iterative pruning to provide multiple task-specific models with various complexities and accuracy. To alleviate the impact of flight failure in a 6G enabled dynamic UAV network, the proposed model selection strategy will assist UAVs to update the model based on the runtime resource requirements.
△ Less
Submitted 12 March, 2022;
originally announced March 2022.
-
Light modulation in Silicon photonics by PZT actuated acoustic waves
Authors:
Irfan Ansari,
John P. George,
Gilles F. Feutmba,
Tessa Van de Veire,
Awanish Pandey,
Jeroen Beeckman,
Dries Van Thourhout
Abstract:
Tailoring the interaction between light and sound has opened new possibilities in photonic integrated circuits (PICs) that ranges from achieving quantum control of light to high-speed information processing. However, the actuation of sound waves in Si PICs usually requires integration of a piezoelectric thin film. Lead Zirconate Titanate (PZT) is a promising material due to its strong piezoelectri…
▽ More
Tailoring the interaction between light and sound has opened new possibilities in photonic integrated circuits (PICs) that ranges from achieving quantum control of light to high-speed information processing. However, the actuation of sound waves in Si PICs usually requires integration of a piezoelectric thin film. Lead Zirconate Titanate (PZT) is a promising material due to its strong piezoelectric and electromechanical coupling coefficient. Unfortunately, the traditional methods to grow PZT on Silicon are detrimental for photonic applications due to the presence of an optical lossy intermediate layer. In this work, we report integration of a high quality PZT thin film on a Silicon-on-insulator (SOI) photonic chip using an optically transparent buffer layer. We demonstrate acousto-optic modulation in Silicon waveguides with the PZT actuated acoustic waves. We fabricate inter digital transducers (IDTs) on the PZT film with a contact photo-lithography and electron-beam lithography to generate the acoustic waves in MHz and GHz range respectively. We obtain a V$_π$L $\sim$ 3.35 V$\cdot$cm at 576 MHz from a 350 nm thick gold (Au) IDT with 20 finger-pairs. After taking the effect of mass-loading and grating reflection into account, we measured a V$_π$L $\sim$ 3.60 V$\cdot$cm at 2 GHz from a 100 nm thick Aluminum (Al) IDT consisting of only 4 finger-pairs. Thus, without patterning the PZT film nor suspending the device, we obtained figures-of-merit comparable to state-of-the-art modulators based on SOI, making it a promising candidate for broadband and efficient acousto-optic modulator for future integration.
△ Less
Submitted 22 May, 2022; v1 submitted 15 December, 2021;
originally announced December 2021.
-
On the Physical Layer Security Performance over RIS-aided Dual-hop RF-UOWC Mixed Network
Authors:
T. Hossain,
S. Shabab,
A. S. M. Badrudduza,
M. K. Kundu,
I. S. Ansari
Abstract:
Since security has been one of the crucial issues for high-yield communications such as 5G and 6G, the researchers continuously come up with newer techniques to enhance the security and performance of these progressive wireless communications. Reconfigurable intelligent surface (RIS) is one of those techniques that artificially rearrange and optimize the propagation environment of electromagnetic…
▽ More
Since security has been one of the crucial issues for high-yield communications such as 5G and 6G, the researchers continuously come up with newer techniques to enhance the security and performance of these progressive wireless communications. Reconfigurable intelligent surface (RIS) is one of those techniques that artificially rearrange and optimize the propagation environment of electromagnetic waves to improve both spectrum and energy efficiency of wireless networks. Besides, in underwater communication, underwater optical wireless communication (UOWC) is a better alternative/replacement for conventional acoustic and radio frequency (RF) technologies. Hence, mixed RIS-aided RF-UOWC can be treated as a promising technology for future wireless networks. This work focuses on the secrecy performance of mixed dual-hop RIS-aided RF-UOWC networks under the intercepting effort of a probable eavesdropper. The RF link operates under generalized Gamma fading distribution; likewise, the UOWC link experiences the mixture exponential generalized Gamma distribution. The secrecy analysis subsumes the derivations of closed-form expressions for average secrecy capacity, exact and lower bound of secrecy outage probability, and strictly positive secrecy capacity, all in terms of Meijer G functions. Capitalizing on these derivations, the effects of heterodyne and intensity modulation/direct detection systems, underwater turbulence resulting from air bubble levels, temperature gradients, and salinity gradients, are measured. Unlike conventional models that merely deal with thermally uniform scenarios, this proposed model is likely to be unique in terms of dealing with secrecy analysis of a temperature gradient RIS-aided RF-UOWC network. Lastly, the derivations are validated via Monte-Carlo simulations.
△ Less
Submitted 13 December, 2021;
originally announced December 2021.
-
On Effective Secrecy Throughput of Underlay Spectrum Sharing $α$-$μ$/ Málaga Hybrid Model under Interference-and-Transmit Power Constraints
Authors:
Md. Ibrahim,
A. S. M. Badrudduza,
Md. Shakhawat Hossen,
M. K. Kundu,
Imran Shafique Ansari
Abstract:
The underlay cognitive radio-based hybrid radio frequency / free-space optical (RF / FSO) systems have been emerged as a promising technology due to its ability to eliminate spectrum scarcity and spectrum under-utilization problems. Consequently, this work analyzes the physical layer security aspects of a cognitive RF / FSO hybrid network that includes a primary user, a secondary source, a seconda…
▽ More
The underlay cognitive radio-based hybrid radio frequency / free-space optical (RF / FSO) systems have been emerged as a promising technology due to its ability to eliminate spectrum scarcity and spectrum under-utilization problems. Consequently, this work analyzes the physical layer security aspects of a cognitive RF / FSO hybrid network that includes a primary user, a secondary source, a secondary receiver, and an eavesdropper where the secret communication takes place between two legitimate secondary peers over the RF and FSO links simultaneously, and the eavesdropper can overhear the RF link only. In particular, the maximum transmit power limitation at the secondary user as well as the permissible interference power restriction at the primary user are also taken into consideration. All the RF links are modeled with $α$-$μ$ fading whereas the FSO link undergoes Málaga (M) turbulence with link blockage and pointing error impairments. At the receiver, the selection combining diversity technique is utilized to select the signal with the best electrical signal-to-ratio (SNR). Moreover, the closed-form expressions for the secrecy outage probability, probability of strictly positive secrecy capacity, and effective secrecy throughput are derived to analyze the secrecy performance. Besides, the impacts of fading, primary-secondary interference, detection techniques, link blockage probability, atmospheric turbulence, and pointing error are examined. Finally, Monte-Carlo simulations are performed to corroborate the derived expressions.
△ Less
Submitted 12 November, 2021;
originally announced November 2021.
-
On the Intercept Probability and Secure Outage Analysis of Mixed ($α$-$κ$-$μ$)-shadowed and Málaga Turbulent Model
Authors:
N. A. Sarker,
A. S. M. Badrudduza,
S. M. R. Islam,
S. H. Islam,
M. K. Kundu,
I. S. Ansari,
K. -S. Kwak
Abstract:
This work deals with the secrecy performance analysis of a dual-hop RF-FSO DF relaying network composed of a source, a relay, a destination, and an eavesdropper. We assume the eavesdropper is located close to the destination and overhears the relay's transmitted optical signal. The RF and FSO links undergo ($α$-$κ$-$μ$)-shadowed fading and unified Málaga turbulence with pointing error. The secrecy…
▽ More
This work deals with the secrecy performance analysis of a dual-hop RF-FSO DF relaying network composed of a source, a relay, a destination, and an eavesdropper. We assume the eavesdropper is located close to the destination and overhears the relay's transmitted optical signal. The RF and FSO links undergo ($α$-$κ$-$μ$)-shadowed fading and unified Málaga turbulence with pointing error. The secrecy performance of the mixed system is studied by deriving closed-form analytical expressions of secure outage probability (SOP), strictly positive secrecy capacity (SPSC), and intercept probability (IP). Besides, we also derive the asymptotic SOP, SPSC, and IP upon utilizing the unfolding of Meijer's G function where the electrical SNR of the FSO link tends to infinity. Finally, the Monte-Carlo simulation is performed to corroborate the analytical expressions. Our results illustrate that fading, shadowing, detection techniques (i.e., heterodyne detection (HD) and intensity modulation and direct detection (IM/DD)), atmospheric turbulence, and pointing error significantly affect the secrecy performance. In addition, better performance is obtained exploiting the HD technique at the destination relative to IM/DD technique.
△ Less
Submitted 10 September, 2021;
originally announced September 2021.
-
Secrecy Performance of α-κ-μ Shadowed Fading Channel
Authors:
A. S. M. Badrudduza,
S. H. Islam,
M. K. Kundu,
I. S. Ansari
Abstract:
In this paper, the physical layer security aspects of a wireless framework over α-\k{appa}-μ shadowed (AKMS) fading channel are examined by acquiring closed-form novel expressions of average secrecy capacity, secure outage probability (SOP), and strictly positive secrecy capacity. The lower bound of SOP is derived along with the asymptotic expression of SOP at the high signal-to-noise ratio regime…
▽ More
In this paper, the physical layer security aspects of a wireless framework over α-\k{appa}-μ shadowed (AKMS) fading channel are examined by acquiring closed-form novel expressions of average secrecy capacity, secure outage probability (SOP), and strictly positive secrecy capacity. The lower bound of SOP is derived along with the asymptotic expression of SOP at the high signal-to-noise ratio regime in order to achieve secrecy diversity gain. Capitalizing on these expressions, the consequences due to the simultaneous occurrence of fading and shadowing are quantified. Finally, Monte-Carlo simulations are demonstrated to assess the correctness of the expressions.
△ Less
Submitted 3 September, 2021;
originally announced September 2021.
-
Architecture of Automated Crypto-Finance Agent
Authors:
Ali Raheman,
Anton Kolonin,
Ben Goertzel,
Gergely Hegykozi,
Ikram Ansari
Abstract:
We present the cognitive architecture of an autonomous agent for active portfolio management in decentralized finance, involving activities such as asset selection, portfolio balancing, liquidity provision, and trading. Partial implementation of the architecture is provided and supplied with preliminary results and conclusions.
We present the cognitive architecture of an autonomous agent for active portfolio management in decentralized finance, involving activities such as asset selection, portfolio balancing, liquidity provision, and trading. Partial implementation of the architecture is provided and supplied with preliminary results and conclusions.
△ Less
Submitted 30 November, 2021; v1 submitted 16 July, 2021;
originally announced July 2021.
-
Effects of Eavesdropper on the Performance of Mixed η-μ and DGG Cooperative Relaying System
Authors:
Noor Ahmed Sarker,
A. S. M. Badrudduza,
Milton Kumar Kundu,
Imran Shafique Ansari
Abstract:
Free-space optical (FSO) channel offers line-of-sight wireless communication with high data rates and high secrecy utilizing unlicensed optical spectrum and also paves the way to the solution of the last-mile access problem. Since atmospheric turbulence is a hindrance to an enhanced secrecy performance, the mixed radio frequency (RF)-FSO system is gaining enormous research interest in recent days.…
▽ More
Free-space optical (FSO) channel offers line-of-sight wireless communication with high data rates and high secrecy utilizing unlicensed optical spectrum and also paves the way to the solution of the last-mile access problem. Since atmospheric turbulence is a hindrance to an enhanced secrecy performance, the mixed radio frequency (RF)-FSO system is gaining enormous research interest in recent days. But conventional FSO models except for the double generalized Gamma (DGG) model can not demonstrate secrecy performance for all ranges of turbulence severity. This reason has led us to propose a dual-hop eta-mu and unified DGG mixed RF-FSO network while considering eavesdrop** at both RF and FSO hops. The security of these proposed scenarios is investigated in terms of two metrics, i.e., strictly positive secrecy capacity and secure outage probability. Exploiting these expressions, we further investigate how the secrecy performance is affected by various system parameters, i.e., fading, turbulence, and pointing errors. A demonstration is made between heterodyne detection (HD) and intensity modulation and direct detection (IM/DD) techniques while exhibiting superior secrecy performance for HD technique over IM/DD technique. Finally, all analytical results are corroborated via Monte-Carlo simulations.
△ Less
Submitted 13 June, 2021;
originally announced June 2021.
-
Heart Sound Classification Considering Additive Noise and Convolutional Distortion
Authors:
Farhat Binte Azam,
Md. Istiaq Ansari,
Ian Mclane,
Taufiq Hasan
Abstract:
Cardiac auscultation is an essential point-of-care method used for the early diagnosis of heart diseases. Automatic analysis of heart sounds for abnormality detection is faced with the challenges of additive noise and sensor-dependent degradation. This paper aims to develop methods to address the cardiac abnormality detection problem when both types of distortions are present in the cardiac auscul…
▽ More
Cardiac auscultation is an essential point-of-care method used for the early diagnosis of heart diseases. Automatic analysis of heart sounds for abnormality detection is faced with the challenges of additive noise and sensor-dependent degradation. This paper aims to develop methods to address the cardiac abnormality detection problem when both types of distortions are present in the cardiac auscultation sound. We first mathematically analyze the effect of additive and convolutional noise on short-term filterbank-based features and a Convolutional Neural Network (CNN) layer. Based on the analysis, we propose a combination of linear and logarithmic spectrogram-image features. These 2D features are provided as input to a residual CNN network (ResNet) for heart sound abnormality detection. Experimental validation is performed on an open-access heart sound abnormality detection dataset involving noisy recordings obtained from multiple stethoscope sensors. The proposed method achieves significantly improved results compared to the conventional approaches, with an area under the ROC (receiver operating characteristics) curve (AUC) of 91.36%, F-1 score of 84.09%, and Macc (mean of sensitivity and specificity) of 85.08%. We also show that the proposed method shows the best mean accuracy across different source domains including stethoscope and noise variability, demonstrating its effectiveness in different recording conditions. The proposed combination of linear and logarithmic features along with the ResNet classifier effectively minimizes the impact of background noise and sensor variability for classifying phonocardiogram (PCG) signals. The proposed method paves the way towards develo** computer-aided cardiac auscultation systems in noisy environments using low-cost stethoscopes.
△ Less
Submitted 3 June, 2021;
originally announced June 2021.
-
On Secrecy Performance of Mixed α-η-μ and Malaga RF-FSO Variable Gain Relaying Channel
Authors:
Nandita Swanan Mandira,
Milton Kumar Kundu,
Sheikh Habibul Islam,
A. S. M. Badrudduza,
Imran Shafique Ansari
Abstract:
With the completion of standardization of fifth-generation (5G) networks, the researchers have begun visioning sixth-generation (6G) networks that are predicted to be human-centric. Hence, similar to 5G networks, besides high data rate, providing secrecy and privacy will be the center of attention by the wireless research community. To support the visions beyond 5G (B5G) and 6G, in this paper we p…
▽ More
With the completion of standardization of fifth-generation (5G) networks, the researchers have begun visioning sixth-generation (6G) networks that are predicted to be human-centric. Hence, similar to 5G networks, besides high data rate, providing secrecy and privacy will be the center of attention by the wireless research community. To support the visions beyond 5G (B5G) and 6G, in this paper we propose a secure radio frequency (RF)-free-space optical (FSO) mixed framework under the attempt of wiretap** by an eavesdropper at the RF hop. We assume the RF links undergo alpha-eta-mu fading whereas the FSO link exhibits a unified Malaga turbulence model with pointing error. The secrecy performance is evaluated by deducing expressions for three secrecy metrics i.e. average secrecy capacity, secure outage probability, and probability of non-zero secrecy capacity in terms of univariate and bivariate Meijer's G and Fox's H functions. We further capitalize on these expressions to demonstrate the impacts of fading, atmospheric turbulence, and pointing errors and show a comparison between two detection techniques (i.e. heterodyne detection (HD) and intensity modulation with direct detection (IM/DD)) that clearly reveals better secrecy can be achieved with HD technique relative to the IM/DD method. The inclusion of generalized fading models at the RF and FSO hops offers unification of several classical scenarios as special cases thereby exhibiting a more generic nature relative to the existing literature. Finally, all the analytical results are corroborated via Monte-Carlo simulations.
△ Less
Submitted 25 May, 2021;
originally announced May 2021.
-
Enhancing Security of TAS/MRC Based Mixed RF-UOWC System with Induced Underwater Turbulence Effect
Authors:
Md. Ibrahim,
A. S. M. Badrudduza,
Md. Shakhawat Hossen,
Milton Kumar Kundu,
Imran Shafique Ansari
Abstract:
Post commercial deployment of fifth-generation (5G) technologies, the consideration of sixth-generation (6G) networks is drawing remarkable attention from research communities. Researchers suggest that similar to 5G, 6G technology must be human-centric where high secrecy together with high data rate will be the key features. These challenges can be easily overcome utilizing PHY security techniques…
▽ More
Post commercial deployment of fifth-generation (5G) technologies, the consideration of sixth-generation (6G) networks is drawing remarkable attention from research communities. Researchers suggest that similar to 5G, 6G technology must be human-centric where high secrecy together with high data rate will be the key features. These challenges can be easily overcome utilizing PHY security techniques over high-frequency free-space or underwater optical wireless communication (UOWC) technologies. But in long-distance communication, turbulence components drastically affect the optical signals, leading to the invention of the combination of radio-frequency (RF) links with optical links. This work deals with the secrecy performance analysis of a mixed RF-UOWC system where an eavesdropper tries to intercept RF communications. RF and optical links undergo $η-μ$ and mixture exponential generalized Gamma distributions, respectively. To keep pace with the high data rate of optical technologies, we exploit the antenna selection scheme at the source and maximal ratio combining diversity at the relay and eavesdropper, while the eavesdropper is unaware of the antenna selection scheme. We derive closed-form expressions of average secrecy capacity, secrecy outage probability, and strictly positive secrecy capacity to demonstrate the impacts of the system parameters on the secrecy behavior. Finally, the expressions are corroborated via Monte-Carlo simulations.
△ Less
Submitted 21 November, 2021; v1 submitted 19 May, 2021;
originally announced May 2021.
-
Angle-Resolved Attosecond Streaking of Twisted Attosecond Pulses
Authors:
Irfana N. Ansari,
Deependra S. Jadoun,
Gopal Dixit
Abstract:
The present work focuses on the characterisation of the amount of orbital angular momentum (OAM) encoded in the twisted attosecond pulses via energy- and angle-resolved attosecond streaking in pump-probe setup. It is found that the photoelectron spectra generated by the linearly polarised twisted pulse with different OAM values exhibit angular modulations, whereas circularly polarised twisted puls…
▽ More
The present work focuses on the characterisation of the amount of orbital angular momentum (OAM) encoded in the twisted attosecond pulses via energy- and angle-resolved attosecond streaking in pump-probe setup. It is found that the photoelectron spectra generated by the linearly polarised twisted pulse with different OAM values exhibit angular modulations, whereas circularly polarised twisted pulse yields angular isotropic spectra. It is demonstrated that the energy- and angle-resolved streaking spectra are sensitive to the OAM values of the twisted pulse. Moreover, the different combinations of the polarisation of the twisted pump pulse and strong infrared probe pulse influence the streaking spectra differently. The characterisation of the OAM carrying twisted attosecond pulses opens up the possibility to explore helical light-matter interaction on attosecond timescale.
△ Less
Submitted 2 June, 2020;
originally announced June 2020.
-
Channel Modeling for UAV-based Optical Wireless Links with Nonzero Boresight Pointing Errors
Authors:
Mohammad Taghi Dabiri,
Mohsen Rezaee,
Imran Shafique Ansari
Abstract:
The channel modeling of unnamed aerial vehicle (UAV)-based free-space optical (FSO) links with nonzero boresight pointing error is the subject of this paper. In particular, utilizing log-normal turbulence model, we propose a novel closed-form statistical channel model for UAV-based FSO links that takes into account the effect of nonzero boresight pointing errors. Subsequently, utilizing Gamma-Gamm…
▽ More
The channel modeling of unnamed aerial vehicle (UAV)-based free-space optical (FSO) links with nonzero boresight pointing error is the subject of this paper. In particular, utilizing log-normal turbulence model, we propose a novel closed-form statistical channel model for UAV-based FSO links that takes into account the effect of nonzero boresight pointing errors. Subsequently, utilizing Gamma-Gamma turbulence model, we propose a novel channel characterization for such links that is valid under moderate to strong turbulence conditions. The accuracy of the proposed models is verified via Monte-Carlo simulations. The proposed models are more tractable and suitable for analysis of such UAV-based FSO links.
△ Less
Submitted 21 April, 2020;
originally announced April 2020.
-
Towards Domain Invariant Heart Sound Abnormality Detection using Learnable Filterbanks
Authors:
Ahmed Imtiaz Humayun,
Shabnam Ghaffarzadegan,
Md. Istiaq Ansari,
Zhe Feng,
Taufiq Hasan
Abstract:
Cardiac auscultation is the most practiced non-invasive and cost-effective procedure for the early diagnosis of heart diseases. While machine learning based systems can aid in automatically screening patients, the robustness of these systems is affected by numerous factors including the stethoscope/sensor, environment, and data collection protocol. This paper studies the adverse effect of domain v…
▽ More
Cardiac auscultation is the most practiced non-invasive and cost-effective procedure for the early diagnosis of heart diseases. While machine learning based systems can aid in automatically screening patients, the robustness of these systems is affected by numerous factors including the stethoscope/sensor, environment, and data collection protocol. This paper studies the adverse effect of domain variability on heart sound abnormality detection and develops strategies to address this problem. Methods: We propose a novel Convolutional Neural Network (CNN) layer, consisting of time-convolutional (tConv) units, that emulate Finite Impulse Response (FIR) filters. The filter coefficients can be updated via backpropagation and be stacked in the front-end of the network as a learnable filterbank. Results: On publicly available multi-domain datasets, the proposed method surpasses the top-scoring systems found in the literature for heart sound abnormality detection (a binary classification task). We utilized sensitivity, specificity, F-1 score and Macc (average of sensitivity and specificity) as performance metrics. Our systems achieved relative improvements of up to 11.84% in terms of MAcc, compared to state-of-the-art methods. Conclusion: The results demonstrate the effectiveness of the proposed learnable filterbank CNN architecture in achieving robustness towards sensor/domain variability in PCG signals. Significance: The proposed methods pave the way for deploying automated cardiac screening systems in diversified and underserved communities.
△ Less
Submitted 1 October, 2020; v1 submitted 28 September, 2019;
originally announced October 2019.
-
Controlling polarization of attosecond pulses with plasmonic-enhanced bichromatic counter-rotating circularly polarised fields
Authors:
Irfana N. Ansari,
Cornelia Hofmann,
Lukas Medišauskas,
Maciej Lewenstein,
Marcelo F. Ciappina,
Gopal Dixit
Abstract:
The use of bichromatic counter-rotating laser field is known to generate high-order harmonics with non-zero ellipticity. By combining such laser field with a plasmonic-enhanced spatially inhomogeneous field, we propose a way to influence the sub-cycle dynamics of the high-harmonic generation process. Using the numerical solution of the time-dependent Schr{ö}dinger equation combined with classical…
▽ More
The use of bichromatic counter-rotating laser field is known to generate high-order harmonics with non-zero ellipticity. By combining such laser field with a plasmonic-enhanced spatially inhomogeneous field, we propose a way to influence the sub-cycle dynamics of the high-harmonic generation process. Using the numerical solution of the time-dependent Schr{ö}dinger equation combined with classical trajectory Monte Carlo simulations, we show that the change of the direction and the strength of the plasmonic field selectively enhances or suppresses certain recombining electron trajectories. This in turn modifies the ellipticity of the emitted attosecond pulses.
△ Less
Submitted 20 December, 2020; v1 submitted 10 September, 2019;
originally announced September 2019.
-
On the Physical Layer Security of a Decode and Forward Based Mixed FSO/RF Cooperative System
Authors:
Dipti R. Pattanayak,
Vivek K. Dwivedi,
Vikram Karwal,
Imran Shafique Ansari,
Hongjiang Lei,
Mohamed-Slim Alouini
Abstract:
In this letter, the secrecy performance of a mixed free space optics (FSO) and radio frequency (RF) system is analyzed from physical layer security (PHY) perspective. In this scenario, one or more eavesdroppers are trying to intercept the confidential signal in a mixed FSO/RF system. The faded FSO links are modeled by Malaga ($\mathcal{M} $) distribution and RF link is characterized by Nakagami-…
▽ More
In this letter, the secrecy performance of a mixed free space optics (FSO) and radio frequency (RF) system is analyzed from physical layer security (PHY) perspective. In this scenario, one or more eavesdroppers are trying to intercept the confidential signal in a mixed FSO/RF system. The faded FSO links are modeled by Malaga ($\mathcal{M} $) distribution and RF link is characterized by Nakagami-$m$ distribution. Exact closed form expressions for secrecy performance metrics such as secrecy outage probability and strictly positive secrecy capacity are derived and analyzed for the proposed system in terms of Fox's H-function. Furthermore, the asymptotic expressions for these performance metrics are analyzed. Finally, all the results are verified by Monte-Carlo simulations.
△ Less
Submitted 6 July, 2019;
originally announced July 2019.
-
3D Channel Modeling and Characterization for Hypersurface Empowered Indoor Environment at 60 GHz Millimeter-Wave Band
Authors:
Rashi Mehrotra,
Rafay Iqbal Ansari,
Alexandros Pitilakis,
Shuai Nie,
Christos Liaskos,
Nikolaos V. Kantartzis,
Andreas Pitsillides
Abstract:
This paper proposes a three-dimensional (3D) communication channel model for an indoor environment considering the effect of the Hypersurface. The Hypersurface is a software controlled intelligent metasurface, which can be used to manipulate electromagnetic waves, as for example for non-specular reflection and full absorption. Thus it can control the im**ing rays from a transmitter towards a rec…
▽ More
This paper proposes a three-dimensional (3D) communication channel model for an indoor environment considering the effect of the Hypersurface. The Hypersurface is a software controlled intelligent metasurface, which can be used to manipulate electromagnetic waves, as for example for non-specular reflection and full absorption. Thus it can control the im**ing rays from a transmitter towards a receiver location in both LOS and NLOS paths, e.g. to combat distance and improve wireless connectivity. We focus on the 60 GHz mmWave frequency band due to its increasing significance in 5G/6G networks and evaluate the effect of Hypersurface in an indoor environment in terms of attenuation coefficients related to the Hypersurface reflection and absorption functionalities, using CST simulation, a 3D electromagnetic simulator of high frequency components. To highlight the benefits of Hypersurface coated walls versus plain walls, we use the derived Hypersurface 3D channel model and a custom 3D ray-tracing simulator for plain walls considering a typical indoor scenario for different Tx-Rx location and separation distances.
△ Less
Submitted 28 June, 2019;
originally announced July 2019.
-
Secrecy Outage Analysis for Cooperative NOMA Systems with Relay Selection Scheme
Authors:
Hongjiang Lei,
Zixuan Yang,
Ki-Hong Park,
Imran Shafique Ansari,
Yongcai Guo,
Gaofeng Pan,
Mohamed-Slim Alouini
Abstract:
This paper considers the secrecy outage performance of a multiple-relay assisted non-orthogonal multiple access (NOMA) network over Nakagami-$m$ fading channels. Two slots are utilized to transmit signals from the base station to destination. At the first slot, the base station broadcasts the superposition signal of the two users to all decode-and-forward relays by message map** strategy. Then t…
▽ More
This paper considers the secrecy outage performance of a multiple-relay assisted non-orthogonal multiple access (NOMA) network over Nakagami-$m$ fading channels. Two slots are utilized to transmit signals from the base station to destination. At the first slot, the base station broadcasts the superposition signal of the two users to all decode-and-forward relays by message map** strategy. Then the selected relay transmits superposition signal to the two users via power-domain NOMA technology. Three relay selection (RS) schemes, i.e., optimal single relay selection (OSRS) scheme, two-step single relay selection (TSRS) scheme, and optimal dual relay selection (ODRS) scheme, are proposed and the secrecy outage performance are analyzed. As a benchmark, we also examine the secrecy outage performance of the NOMA systems with traditional multiple relays combining (TMRC) scheme in which all the relay that successfully decode signals from the source forward signals to the NOMA users with equal power. Considering the correlation between the secrecy capacity of two users and different secrecy requirement for two NOMA users, the closed-form expressions for the security outage probability (SOP) of the proposed OSRS, TSRS, and ODRS schemes along with the TMRC scheme are derived and validated via simulations. To get more insights, we also derive the closed-form expressions for the asymptotic SOP for all the schemes with fixed and dynamic power allocations. Furthermore, the secrecy diversity order (SDO) of cooperative NOMA systems is obtained. The results demonstrate that our proposed schemes can significantly enhance the secrecy performance compared to the TMRC scheme and that all the RS schemes with fixed power allocation obtain zero SDO and the OSRS scheme with dynamic power allocation obtains the same SDO as TMRC.
△ Less
Submitted 1 September, 2019; v1 submitted 7 November, 2018;
originally announced November 2018.
-
Simultaneous control of harmonic yield and energy cutoff of high-harmonic generation using seeded plasmonic-enhanced fields
Authors:
Irfana N. Ansari,
M. S. Mrudul,
Marcelo F. Ciappina,
Maciej Lewenstein,
Gopal Dixit
Abstract:
We study high-order harmonic generation (HHG) driven by seeded plasmonic-enhanced fields. On one hand, plasmonic-enhanced fields have shown a great potential to extend the HHG cutoff, an instrumental pre-requisite for the generation of attosecond pulses. On another hand, the use of XUV seeds appears to have a considerable potential to improve the HHG conversion efficiency, which is typically modes…
▽ More
We study high-order harmonic generation (HHG) driven by seeded plasmonic-enhanced fields. On one hand, plasmonic-enhanced fields have shown a great potential to extend the HHG cutoff, an instrumental pre-requisite for the generation of attosecond pulses. On another hand, the use of XUV seeds appears to have a considerable potential to improve the HHG conversion efficiency, which is typically modest when a unique fundamental laser pulse is employed. By mixing these two sources, we show it is possible to, simultaneously, boost the HHG cutoff and to increase the harmonic photon flux. The combination of these features potentially enables to generate intense and spectrally broad attosecond pulse trains.
△ Less
Submitted 15 October, 2018;
originally announced October 2018.
-
On Secure Mixed RF-FSO Systems With TAS and Imperfect CSI
Authors:
Hongjiang Lei,
Haolun Luo,
Ki-Hong Park,
Imran Shafique Ansari,
Weijia Lei,
Gaofeng Pan,
Mohamed-Slim Alouini
Abstract:
In this work, we analyze the secrecy outage performance of a dual-hop relay system composed of multiple-input-multiple-output radio-frequency (RF) links and a free-space optical (FSO) link while a multiple-antenna eavesdropper wiretaps the confidential information by decoding the received signals from the resource node. The channel state information (CSI) of the RF and FSO links is considered to b…
▽ More
In this work, we analyze the secrecy outage performance of a dual-hop relay system composed of multiple-input-multiple-output radio-frequency (RF) links and a free-space optical (FSO) link while a multiple-antenna eavesdropper wiretaps the confidential information by decoding the received signals from the resource node. The channel state information (CSI) of the RF and FSO links is considered to be outdated. We propose three transmit antenna selection (TAS) schemes to enhance the secrecy performance of the considered systems. The secrecy outage performance with different TAS schemes is analyzed and the effects of misalignment and detection technology on the secrecy outage performance of mixed systems are studied. We derive the closed-form expressions for probability density function (PDF) and cumulative distribution function (CDF) over Málaga channel with imperfect CSI. Then the closed-form expressions for the CDF and PDF of the equivalent signal-to-noise ratio (SNR) at the legitimate receiver over Nakagami-$m$ and Málaga channels are derived. Furthermore, the lower bound of the secrecy outage probability (SOP) with different TAS schemes are derived. Besides, the asymptotic results for SOP are investigated by exploiting the unfolding of Meijer's $G$-function when the electrical SNR of FSO link approaches infinity. Finally, Monte-Carlo simulation results are presented to testify the correctness of the proposed analysis. The results illustrate that the outdated CSI shows a strong effect on the secrecy outage performance. In addition, increasing the number of antennas at the source cannot significantly enhance the secrecy performance of the considered systems.
△ Less
Submitted 28 March, 2020; v1 submitted 5 September, 2018;
originally announced September 2018.
-
Performance Analysis of Free-Space Optical Links Over Málaga ($\mathcal{M}$) Turbulence Channels with Pointing Errors
Authors:
Imran Shafique Ansari,
Ferkan Yilmaz,
Mohamed-Slim Alouini
Abstract:
In this work, we present a unified performance analysis of a free-space optical (FSO) link that accounts for pointing errors and both types of detection techniques (i.e. intensity modulation/direct detection (IM/DD) as well as heterodyne detection). More specifically, we present unified exact closed-form expressions for the cumulative distribution function, the probability density function, the mo…
▽ More
In this work, we present a unified performance analysis of a free-space optical (FSO) link that accounts for pointing errors and both types of detection techniques (i.e. intensity modulation/direct detection (IM/DD) as well as heterodyne detection). More specifically, we present unified exact closed-form expressions for the cumulative distribution function, the probability density function, the moment generating function, and the moments of the end-to-end signal-to-noise ratio (SNR) of a single link FSO transmission system, all in terms of the Meijer's G function except for the moments that is in terms of simple elementary functions. We then capitalize on these unified results to offer unified exact closed-form expressions for various performance metrics of FSO link transmission systems, such as, the outage probability, the scintillation index (SI), the average error rate for binary and $M$-ary modulation schemes, and the ergodic capacity (except for IM/DD technique, where we present closed-form lower bound results), all in terms of Meijer's G functions except for the SI that is in terms of simple elementary functions. Additionally, we derive the asymptotic results for all the expressions derived earlier in terms of Meijer's G function in the high SNR regime in terms of simple elementary functions via an asymptotic expansion of the Meijer's G function. We also derive new asymptotic expressions for the ergodic capacity in the low as well as high SNR regimes in terms of simple elementary functions via utilizing moments. All the presented results are verified via computer-based Monte-Carlo simulations.
△ Less
Submitted 15 May, 2018;
originally announced May 2018.
-
Ergodic Capacity Analysis of Free-Space Optical Links With Nonzero Boresight Pointing Errors
Authors:
Imran Shafique Ansari,
Mohamed-Slim Alouini,
Julian Cheng
Abstract:
A unified capacity analysis of a free-space optical (FSO) link that accounts for nonzero boresight pointing errors and both types of detection techniques (i.e. intensity modulation/direct detection as well as heterodyne detection) is addressed in this work. More specifically, an exact closed-form expression for the moments of the end-to-end signal-to-noise ratio (SNR) of a single link FSO transmis…
▽ More
A unified capacity analysis of a free-space optical (FSO) link that accounts for nonzero boresight pointing errors and both types of detection techniques (i.e. intensity modulation/direct detection as well as heterodyne detection) is addressed in this work. More specifically, an exact closed-form expression for the moments of the end-to-end signal-to-noise ratio (SNR) of a single link FSO transmission system is presented in terms of well-known elementary functions. Capitalizing on these new moments expressions, we present approximate and simple closed-form results for the ergodic capacity at high and low SNR regimes. All the presented results are verified via computer-based Monte-Carlo simulations.
△ Less
Submitted 15 May, 2018;
originally announced May 2018.
-
Received Signal Strength for Randomly Distributed Molecular Nanonodes
Authors:
Rafay Iqbal Ansari,
Chrysostomos Chrysostomou,
Taqwa Saeed,
Marios Lestas,
Andreas Pitsillides
Abstract:
We consider nanonodes randomly distributed in a circular area and characterize the received signal strength when a pair of these nodes employ molecular communication. Two communication methods are investigated, namely free diffusion and diffusion with drift. Since the nodes are randomly distributed, the distance between them can be represented as a random variable, which results in a stochastic pr…
▽ More
We consider nanonodes randomly distributed in a circular area and characterize the received signal strength when a pair of these nodes employ molecular communication. Two communication methods are investigated, namely free diffusion and diffusion with drift. Since the nodes are randomly distributed, the distance between them can be represented as a random variable, which results in a stochastic process representation of the received signal strength. We derive the probability density function of this process for both molecular communication methods. Specifically for the case of free diffusion we also derive the cumulative distribution function, which can be used to derive transmission success probabilities. The presented work constitutes a first step towards the characterization of the signal to noise ratio in the considered setting for a number of molecular communication methods.
△ Less
Submitted 26 January, 2018;
originally announced January 2018.
-
Phase-coexisting patterns, horizontal segregation and controlled convection in vertically vibrated binary granular mixtures
Authors:
I. H. Ansari,
N. Rivas,
M. Alam
Abstract:
We report new patterns, consisting of coexistence of sub-harmonic/harmonic and asynchronous states [for example, a granular gas co-existing with (i) bouncing bed, (ii) undulatory subharmonic waves and (iii) Leidenfrost-like state], in experiments on vertically vibrated binary granular mixtures in a Heleshaw-type cell. Most experiments have been carried out with equimolar binary mixtures of glass a…
▽ More
We report new patterns, consisting of coexistence of sub-harmonic/harmonic and asynchronous states [for example, a granular gas co-existing with (i) bouncing bed, (ii) undulatory subharmonic waves and (iii) Leidenfrost-like state], in experiments on vertically vibrated binary granular mixtures in a Heleshaw-type cell. Most experiments have been carried out with equimolar binary mixtures of glass and steel balls of same diameter by varying the total layer-height ($F$) for a range of shaking acceleration ($Γ$). All patterns as well as the related phase-diagram in the ($Γ, F$)-plane have been reproduced via molecular dynamics simulations of the same system. The segregation of heavier and lighter particles along the horizontal direction is shown to be the progenitor of such phase-coexisting patterns as confirmed in both experiment and simulation. At strong shaking we uncover a {\it partial} convection state in which a pair of convection rolls is found to coexist with a Leidenfrost-like state. The crucial role of the relative number density of two species on controlling the buoyancy-driven granular convection is demonstrated. A possible model for spontaneous horizontal segregation is suggested based on anisotropic diffusion.
△ Less
Submitted 27 December, 2017;
originally announced December 2017.
-
Pattern-transition, microstructure and dynamics in two-dimensional vibrofluidized granular bed
Authors:
I. Ansari,
M. Alam
Abstract:
Experiments are conducted in a two-dimensional mono-layer vibrofluidized bed of glass beads, with a goal to understand the transition scenario and the underlying microstructure and dynamics in different patterned-states. At small shaking accelerations ($Γ=Aω^2/g <1$), the particles remain attached with the base of the vibrating container -- this is known as the solid bed (SB). With increasing $Γ$…
▽ More
Experiments are conducted in a two-dimensional mono-layer vibrofluidized bed of glass beads, with a goal to understand the transition scenario and the underlying microstructure and dynamics in different patterned-states. At small shaking accelerations ($Γ=Aω^2/g <1$), the particles remain attached with the base of the vibrating container -- this is known as the solid bed (SB). With increasing $Γ$ (at large enough shaking amplitude $A/d$) and/or with increasing $A/d$ (at large enough $Γ$), the sequence of transitions/bifurcations unfolds as follows: SB to BB ("bouncing bed") to LS ("Leidenfrost state") to "2-roll Convection" to "1-roll Convection" and finally to a gas-like state. For a given length of the container, the coarsening of multiple convection rolls leading to the genesis of a "single-roll" structure (dubbed the {\it multi-roll transition}), and its subsequent transition to a granular-gas are two novel findings of this work. We show that the critical shaking intensity ($Γ_{BB}^{LS}$) for "$BB\to LS$"-transition has a power-law dependence on the particle loading ($F=h_0/d$, where $h_0$ is the number of particle layers at rest and $d$ is the particle diameter) and the shaking amplitude ($A/d$). The characteristics of $BB$ and $LS$ states are studied by calculating (i) the coarse-grained density and temperature profiles and (ii) the pair correlation function. It is shown that while the contact network of particles in the BB represents a hexagonal-packed structure, the contact network within the LS resembles a liquid-like state. An unsteadiness of the LS has been uncovered wherein the interface (between the floating-cluster and the dilute gas underneath) and the top of the bed are found to oscillate sinusoidally, with its oscillation frequency closely matching with the frequency of external shaking.
△ Less
Submitted 12 April, 2016;
originally announced April 2016.
-
Unified Performance Analysis of Mixed Line of Sight RF-FSO Fixed Gain Dual-Hop Transmission Systems
Authors:
Emna Zedini,
Imran Shafique Ansari,
Mohamed-Slim Alouini
Abstract:
In this work, we carry out a unified performance analysis of a dual-hop fixed gain relay system over asymmetric links composed of both radio-frequency (RF) and unified free-space optics (FSO) under the effect of pointing errors. The RF link is modeled by the Nakagami-$m$ fading channel and the FSO link by the Gamma-Gamma fading channel subject to both types of detection techniques (i.e. heterodyne…
▽ More
In this work, we carry out a unified performance analysis of a dual-hop fixed gain relay system over asymmetric links composed of both radio-frequency (RF) and unified free-space optics (FSO) under the effect of pointing errors. The RF link is modeled by the Nakagami-$m$ fading channel and the FSO link by the Gamma-Gamma fading channel subject to both types of detection techniques (i.e. heterodyne detection and intensity modulation with direct detection (IM/DD)). In particular, we derive new unified closed-form expressions for the cumulative distribution function, the probability density function, the moment generation function, and the moments of the end-to-end signal-to-noise ratio of these systems in terms of the Meijer's G function. Based on these formulas, we offer exact closed-form expressions for the outage probability, the higher-order amount of fading, and the average bit-error rate of a variety of binary modulations in terms of the Meijer's G function. Further, an exact closed-form expression for the end-to-end ergodic capacity for the Nakagami-$m$-unified FSO relay links is derived in terms of the bivariate G function. All the given results are verified via Computer-based Monte-Carlo simulations.
△ Less
Submitted 31 March, 2014;
originally announced April 2014.
-
The transitive algebra problem has an affirmative answer
Authors:
Shamim I. Ansari
Abstract:
All the spaces considered are over $\bbc$. $Z$ represents any Banach space, $L(Z)$ the space of all the bounded operators on $Z$, and $H$ any Hilbert space. We will prove that for any unital proper weakly closed subalgebra (upwcsa) $R\subsetneq L(Z)$, the algebra $R^\p=\{A^* \st A\in R\}$ has nontrivial invariant subspaces (ntinvss). This solves in \lb particular, the three most famous long standi…
▽ More
All the spaces considered are over $\bbc$. $Z$ represents any Banach space, $L(Z)$ the space of all the bounded operators on $Z$, and $H$ any Hilbert space. We will prove that for any unital proper weakly closed subalgebra (upwcsa) $R\subsetneq L(Z)$, the algebra $R^\p=\{A^* \st A\in R\}$ has nontrivial invariant subspaces (ntinvss). This solves in \lb particular, the three most famous long standing open problems in operator theory, (1) the transitive algebra problem, (2) the hyperinvariant subspace problem, and (3) the invariant subspace problem. The transitive algebra problem was raised by R. V. Kadison in 1955 and it asks if every upwcsa of $L(H)$ has ntinvss. This proves also a conjecture of P. Enflo, that every operator on a reflexive space has ntinvss and a conjecture of V. I. Lomonosov, that the adjoint of any Banach space operator has ntinvss.
△ Less
Submitted 26 August, 2013; v1 submitted 27 July, 2013;
originally announced July 2013.
-
Impact of Pointing Errors on the Performance of Mixed RF/FSO Dual-Hop Transmission Systems
Authors:
Imran Shafique Ansari,
Ferkan Yilmaz,
Mohamed-Slim Alouini
Abstract:
In this work, the performance analysis of a dual-hop relay transmission system composed of asymmetric radio-frequency (RF)/free-space optical (FSO) links with pointing errors is presented. More specifically, we build on the system model presented in [1] to derive new exact closed-form expressions for the cumulative distribution function, probability density function, moment generating function, an…
▽ More
In this work, the performance analysis of a dual-hop relay transmission system composed of asymmetric radio-frequency (RF)/free-space optical (FSO) links with pointing errors is presented. More specifically, we build on the system model presented in [1] to derive new exact closed-form expressions for the cumulative distribution function, probability density function, moment generating function, and moments of the end-to-end signal-to-noise ratio in terms of the Meijer's G function. We then capitalize on these results to offer new exact closed-form expressions for the higher-order amount of fading, average error rate for binary and M-ary modulation schemes, and the ergodic capacity, all in terms of Meijer's G functions. Our new analytical results were also verified via computer-based Monte-Carlo simulation results.
△ Less
Submitted 18 February, 2013;
originally announced February 2013.
-
A Complete Solution to the Problem of Decomposing a Representation Into Irreducible Representations and its Applications to the Solutions of Three Great Problems in C*-Algebras
Authors:
Shamim I Ansari
Abstract:
In this paper we give a decomposition of a state on a $C^*$-algebra into a family of pure states and a decomposition of a representation into a family of irreducible representation. Then, we use it to solve the following three problems and/or conjectures.. (1) The noncommutative Stone-Weierstrass problem, (2) The extension problem (asked by Arveson) of a pure state on a nonseparable operator syste…
▽ More
In this paper we give a decomposition of a state on a $C^*$-algebra into a family of pure states and a decomposition of a representation into a family of irreducible representation. Then, we use it to solve the following three problems and/or conjectures.. (1) The noncommutative Stone-Weierstrass problem, (2) The extension problem (asked by Arveson) of a pure state on a nonseparable operator system to a boundary state on the generated $C^*$-algebra, and (3) The hyperrigidity problem of an operator system under the hypothesis that pure states have the unique extension property, conjectured by Arveson.
△ Less
Submitted 23 August, 2013; v1 submitted 26 December, 2012;
originally announced December 2012.