-
On Nil-semicommutative Modules
Authors:
M. Rhoades,
Kh. Herachandra,
Nazeer Ansari
Abstract:
In this paper, we introduce a new concept in Nil-semicommutative modules and present it as an extension of Nil-semicommutative rings to modules. We prove that the class of Nil-semicommutative modules is contained in the class of Weakly semicommutative modules while that of the converse may not be true. We also show that in case of Semicommutative modules and Nil-semicommutative modules, one does n…
▽ More
In this paper, we introduce a new concept in Nil-semicommutative modules and present it as an extension of Nil-semicommutative rings to modules. We prove that the class of Nil-semicommutative modules is contained in the class of Weakly semicommutative modules while that of the converse may not be true. We also show that in case of Semicommutative modules and Nil-semicommutative modules, one does not imply the other. Moreover, for a given Nil-semicommutative ring, we provide the conditions under which the same can be extended to a Nil-semicommutative module. Lastly, we also prove that for a left $R$-module $M$, $_RM$ is Nil-semicommutative iff it's localization $S^{-1}M$ over the ring $S^{-1}R$ is also Nil-semicommutative.Various other examples and propositions highlighting the comparative studies of this new class of modules with different classes of modules are also discussed in order to validate the concept.
△ Less
Submitted 28 June, 2024;
originally announced June 2024.
-
Self-Supervised Learning for User Localization
Authors:
Ankan Dash,
**gyi Gu,
Guiling Wang,
Nirwan Ansari
Abstract:
Machine learning techniques have shown remarkable accuracy in localization tasks, but their dependency on vast amounts of labeled data, particularly Channel State Information (CSI) and corresponding coordinates, remains a bottleneck. Self-supervised learning techniques alleviate the need for labeled data, a potential that remains largely untapped and underexplored in existing research. Addressing…
▽ More
Machine learning techniques have shown remarkable accuracy in localization tasks, but their dependency on vast amounts of labeled data, particularly Channel State Information (CSI) and corresponding coordinates, remains a bottleneck. Self-supervised learning techniques alleviate the need for labeled data, a potential that remains largely untapped and underexplored in existing research. Addressing this gap, we propose a pioneering approach that leverages self-supervised pretraining on unlabeled data to boost the performance of supervised learning for user localization based on CSI. We introduce two pretraining Auto Encoder (AE) models employing Multi Layer Perceptrons (MLPs) and Convolutional Neural Networks (CNNs) to glean representations from unlabeled data via self-supervised learning. Following this, we utilize the encoder portion of the AE models to extract relevant features from labeled data, and finetune an MLP-based Position Estimation Model to accurately deduce user locations. Our experimentation on the CTW-2020 dataset, which features a substantial volume of unlabeled data but limited labeled samples, demonstrates the viability of our approach. Notably, the dataset covers a vast area spanning over 646x943x41 meters, and our approach demonstrates promising results even for such expansive localization tasks.
△ Less
Submitted 19 April, 2024;
originally announced April 2024.
-
TrustMol: Trustworthy Inverse Molecular Design via Alignment with Molecular Dynamics
Authors:
Kevin Tirta Wijaya,
Navid Ansari,
Hans-Peter Seidel,
Vahid Babaei
Abstract:
Data-driven generation of molecules with desired properties, also known as inverse molecular design (IMD), has attracted significant attention in recent years. Despite the significant progress in the accuracy and diversity of solutions, existing IMD methods lag behind in terms of trustworthiness. The root issue is that the design process of these methods is increasingly more implicit and indirect,…
▽ More
Data-driven generation of molecules with desired properties, also known as inverse molecular design (IMD), has attracted significant attention in recent years. Despite the significant progress in the accuracy and diversity of solutions, existing IMD methods lag behind in terms of trustworthiness. The root issue is that the design process of these methods is increasingly more implicit and indirect, and this process is also isolated from the native forward process (NFP), the ground-truth function that models the molecular dynamics. Following this insight, we propose TrustMol, an IMD method built to be trustworthy. For this purpose, TrustMol relies on a set of technical novelties including a new variational autoencoder network. Moreover, we propose a latent-property pairs acquisition method to effectively navigate the complexities of molecular latent optimization, a process that seems intuitive yet challenging due to the high-frequency and discontinuous nature of molecule space. TrustMol also integrates uncertainty-awareness into molecular latent optimization. These lead to improvements in both explainability and reliability of the IMD process. We validate the trustworthiness of TrustMol through a wide range of experiments.
△ Less
Submitted 26 February, 2024;
originally announced February 2024.
-
Large-Batch, Iteration-Efficient Neural Bayesian Design Optimization
Authors:
Navid Ansari,
Hans-Peter Seidel,
Vahid Babaei
Abstract:
Bayesian optimization (BO) provides a powerful framework for optimizing black-box, expensive-to-evaluate functions. It is therefore an attractive tool for engineering design problems, typically involving multiple objectives. Thanks to the rapid advances in fabrication and measurement methods as well as parallel computing infrastructure, querying many design problems can be heavily parallelized. Th…
▽ More
Bayesian optimization (BO) provides a powerful framework for optimizing black-box, expensive-to-evaluate functions. It is therefore an attractive tool for engineering design problems, typically involving multiple objectives. Thanks to the rapid advances in fabrication and measurement methods as well as parallel computing infrastructure, querying many design problems can be heavily parallelized. This class of problems challenges BO with an unprecedented setup where it has to deal with very large batches, shifting its focus from sample efficiency to iteration efficiency. We present a novel Bayesian optimization framework specifically tailored to address these limitations. Our key contribution is a highly scalable, sample-based acquisition function that performs a non-dominated sorting of not only the objectives but also their associated uncertainty. We show that our acquisition function in combination with different Bayesian neural network surrogates is effective in data-intensive environments with a minimal number of iterations. We demonstrate the superiority of our method by comparing it with state-of-the-art multi-objective optimizations. We perform our evaluation on two real-world problems -- airfoil design and 3D printing -- showcasing the applicability and efficiency of our approach. Our code is available at: https://github.com/an-on-ym-ous/lbn_mobo
△ Less
Submitted 4 October, 2023; v1 submitted 1 June, 2023;
originally announced June 2023.
-
Heuristic Barycenter Modeling of Fully Absorbing Receivers in Diffusive Molecular Communication Channels
Authors:
Fardad Vakilipoor,
Abdulhamid N. M. Ansari,
Maurizio Magarini
Abstract:
In a recent paper it has been shown that to model a diffusive molecular communication (MC) channel with multiple fully absorbing (FA) receivers, these can be interpreted as sources of negative particles from the other receivers' perspective. The barycenter point is introduced as the best position where to place the negative sources. The barycenter is obtained from the spatial mean of the molecules…
▽ More
In a recent paper it has been shown that to model a diffusive molecular communication (MC) channel with multiple fully absorbing (FA) receivers, these can be interpreted as sources of negative particles from the other receivers' perspective. The barycenter point is introduced as the best position where to place the negative sources. The barycenter is obtained from the spatial mean of the molecules im**ing on the surface of each FA receiver. This paper derives an expression that captures the position of the barycenter in a diffusive MC channel with multiple FA receivers. In this work, an analytical model inspired by Newton's law of gravitation is found to describe the barycenter, and the result is compared with particle-based simulation (PBS) data. Since the barycenter depends on the distance between the transmitter and receiver and the observation time, the condition that the barycenter can be assumed to be at the center of the receiver is discussed. This assumption simplifies further modeling of any diffusive MC system containing multiple FA receivers. The resulting position of the barycenter is used in channel models to calculate the cumulative number of absorbed molecules and it has been verified with PBS data in a variety of scenarios.
△ Less
Submitted 26 April, 2023;
originally announced April 2023.
-
Jamming Modulation: An Active Anti-Jamming Scheme
Authors:
Jianhui Ma,
Qiang Li,
Zilong Liu,
Linsong Du,
Hongyang Chen,
Nirwan Ansari
Abstract:
Providing quality communications under adversarial electronic attacks, e.g., broadband jamming attacks, is a challenging task. Unlike state-of-the-art approaches which treat jamming signals as destructive interference, this paper presents a novel active anti-jamming (AAJ) scheme for a jammed channel to enhance the communication quality between a transmitter node (TN) and receiver node (RN), where…
▽ More
Providing quality communications under adversarial electronic attacks, e.g., broadband jamming attacks, is a challenging task. Unlike state-of-the-art approaches which treat jamming signals as destructive interference, this paper presents a novel active anti-jamming (AAJ) scheme for a jammed channel to enhance the communication quality between a transmitter node (TN) and receiver node (RN), where the TN actively exploits the jamming signal as a carrier to send messages. Specifically, the TN is equipped with a programmable-gain amplifier, which is capable of re-modulating the jamming signals for jamming modulation. Considering four typical jamming types, we derive both the bit error rates (BER) and the corresponding optimal detection thresholds of the AAJ scheme. The asymptotic performances of the AAJ scheme are discussed under the high jamming-to-noise ratio (JNR) and sampling rate cases. Our analysis shows that there exists a BER floor for sufficiently large JNR. Simulation results indicate that the proposed AAJ scheme allows the TN to communicate with the RN reliably even under extremely strong and/or broadband jamming. Additionally, we investigate the channel capacity of the proposed AAJ scheme and show that the channel capacity of the AAJ scheme outperforms that of the direct transmission when the JNR is relatively high.
△ Less
Submitted 5 September, 2022;
originally announced September 2022.
-
Autoinverse: Uncertainty Aware Inversion of Neural Networks
Authors:
Navid Ansari,
Hans-Peter Seidel,
Nima Vahidi Ferdowsi,
Vahid Babaei
Abstract:
Neural networks are powerful surrogates for numerous forward processes. The inversion of such surrogates is extremely valuable in science and engineering. The most important property of a successful neural inverse method is the performance of its solutions when deployed in the real world, i.e., on the native forward process (and not only the learned surrogate). We propose Autoinverse, a highly aut…
▽ More
Neural networks are powerful surrogates for numerous forward processes. The inversion of such surrogates is extremely valuable in science and engineering. The most important property of a successful neural inverse method is the performance of its solutions when deployed in the real world, i.e., on the native forward process (and not only the learned surrogate). We propose Autoinverse, a highly automated approach for inverting neural network surrogates. Our main insight is to seek inverse solutions in the vicinity of reliable data which have been sampled form the forward process and used for training the surrogate model. Autoinverse finds such solutions by taking into account the predictive uncertainty of the surrogate and minimizing it during the inversion. Apart from high accuracy, Autoinverse enforces the feasibility of solutions, comes with embedded regularization, and is initialization free. We verify our proposed method through addressing a set of real-world problems in control, fabrication, and design.
△ Less
Submitted 17 October, 2022; v1 submitted 29 August, 2022;
originally announced August 2022.
-
Rare Event Kinetics from Adaptive Bias Enhanced Sampling
Authors:
Dhiman Ray,
Narjes Ansari,
Valerio Rizzi,
Michele Invernizzi,
Michele Parrinello
Abstract:
We introduce a novel enhanced sampling approach named OPES flooding for calculating the kinetics of rare events from atomistic molecular dynamics simulation. This method is derived from the On-the-fly-Probability-Enhanced-Sampling (OPES) approach [Invernizzi and Parrinello, JPC Lett. 2020], which has been recently developed for calculating converged free energy surfaces for complex systems. In thi…
▽ More
We introduce a novel enhanced sampling approach named OPES flooding for calculating the kinetics of rare events from atomistic molecular dynamics simulation. This method is derived from the On-the-fly-Probability-Enhanced-Sampling (OPES) approach [Invernizzi and Parrinello, JPC Lett. 2020], which has been recently developed for calculating converged free energy surfaces for complex systems. In this paper, we describe the theoretical details of the OPES flooding technique and demonstrate the application on three systems of increasing complexity: barrier crossing in a two-dimensional double well potential, conformational transition in the alanine dipeptide in gas phase, and the folding and unfolding of the chignolin polypeptide in aqueous environment. From extensive tests, we show that the calculation of accurate kinetics not only requires the transition state to be bias-free, but the amount of bias deposited should also not exceed the effective barrier height measured along the chosen collective variables. In this vein, the possibility of computing rates from biasing suboptimal order parameters has also been explored. Furthermore, we describe the choice of optimum parameter combinations for obtaining accurate results from limited computational effort.
△ Less
Submitted 16 September, 2022; v1 submitted 8 August, 2022;
originally announced August 2022.
-
AI in 6G: Energy-Efficient Distributed Machine Learning for Multilayer Heterogeneous Networks
Authors:
Mohammad Arif Hossain,
Abdullah Ridwan Hossain,
Nirwan Ansari
Abstract:
Adept network management is key for supporting extremely heterogeneous applications with stringent quality of service (QoS) requirements; this is more so when envisioning the complex and ultra-dense 6G mobile heterogeneous network (HetNet). From both the environmental and economical perspectives, non-homogeneous QoS demands obstruct the minimization of the energy footprints and operational costs o…
▽ More
Adept network management is key for supporting extremely heterogeneous applications with stringent quality of service (QoS) requirements; this is more so when envisioning the complex and ultra-dense 6G mobile heterogeneous network (HetNet). From both the environmental and economical perspectives, non-homogeneous QoS demands obstruct the minimization of the energy footprints and operational costs of the envisioned robust networks. As such, network intelligentization is expected to play an essential role in the realization of such sophisticated aims. The fusion of artificial intelligence (AI) and mobile networks will allow for the dynamic and automatic configuration of network functionalities. Machine learning (ML), one of the backbones of AI, will be instrumental in forecasting changes in network loads and resource utilization, estimating channel conditions, optimizing network slicing, and enhancing security and encryption. However, it is well known that ML tasks themselves incur massive computational burdens and energy costs. To overcome such obstacles, we propose a novel layer-based HetNet architecture which optimally distributes tasks associated with different ML approaches across network layers and entities; such a HetNet boasts multiple access schemes as well as device-to-device (D2D) communications to enhance energy efficiency via collaborative learning and communications.
△ Less
Submitted 4 June, 2022;
originally announced July 2022.
-
Charge gradients around dendritic voids cause nanoscale inhomogeneities in liquid water
Authors:
Tereza Schonfeldova,
Nathan Dupertuis,
Yixing Chen,
Narjes Ansari,
Emiliano Poli,
David M. Wilkins,
Ali Hassanali,
Sylvie Roke
Abstract:
Water is the matrix of life and is generally considered a homogeneous, uniform, liquid. Recent experiments report that water is instead a two-state liquid. However, subsequently, these findings were contested. The structure of water and whether we should think of it as uniform therefore remains an open question. Here, we report femtosecond elastic second harmonic scattering (fs-ESHS) of liquid wat…
▽ More
Water is the matrix of life and is generally considered a homogeneous, uniform, liquid. Recent experiments report that water is instead a two-state liquid. However, subsequently, these findings were contested. The structure of water and whether we should think of it as uniform therefore remains an open question. Here, we report femtosecond elastic second harmonic scattering (fs-ESHS) of liquid water in comparison to an isotropic liquid (CCl4) and show that water is indeed a non-uniform liquid, The coherent fs-ESHS intensity was interpreted, using molecular dynamics simulations, as arising from charge density fluctuations and consequentially enhanced nanoscale polarizabilities around transient voids having an average lifetime of 300 fs. Although voids were also present in CCl4, they were not characterized by hydrogen bond defects and did not show strong polarizability fluctuations, leading to fs-ESHS of an isotropic liquid. The voids increased in number at higher temperatures above room temperature, in agreement with the fs-ESHS results. The measured nanoscale-femtosecond inhomogeneities therefore do not necessarily relate to the proposed two state model of water, but instead underscore the elusive nature of liquid water, and undoubtedly have an impact on any type of transition that occurs in liquid water.
△ Less
Submitted 26 April, 2022;
originally announced April 2022.
-
Water regulates the residence time of Benzamidine in Trypsin
Authors:
Narjes Ansari,
Valerio Rizzi,
Michele Parrinello
Abstract:
The process of ligand-protein unbinding is crucial in biophysics. Water is an essential part of any biological system and yet, many aspects of its role remain elusive. Here, we simulate with state-of-the-art enhanced sampling techniques the binding of Benzamidine to Trypsin which is a much studied and paradigmatic ligand-protein system. We use machine learning methods to determine efficient collec…
▽ More
The process of ligand-protein unbinding is crucial in biophysics. Water is an essential part of any biological system and yet, many aspects of its role remain elusive. Here, we simulate with state-of-the-art enhanced sampling techniques the binding of Benzamidine to Trypsin which is a much studied and paradigmatic ligand-protein system. We use machine learning methods to determine efficient collective coordinates for the complex non-local network of water. These coordinates are used to perform On-the-fly Probability Enhanced Sampling simulations, which we adapt to calculate also the ligand residence time. Our results, both static and dynamic, are in good agreement with experiments. We find that the presence of a water molecule located at the bottom of the binding pocket allows via a network of hydrogen bonds the ligand to be released into the solution. On a finer scale, even when unbinding is allowed, another water molecule further modulates the exit time.
△ Less
Submitted 28 September, 2022; v1 submitted 12 April, 2022;
originally announced April 2022.
-
Mixed Integer Neural Inverse Design
Authors:
Navid Ansari,
Hans-Peter Seidel,
Vahid Babaei
Abstract:
In computational design and fabrication, neural networks are becoming important surrogates for bulky forward simulations. A long-standing, intertwined question is that of inverse design: how to compute a design that satisfies a desired target performance? Here, we show that the piecewise linear property, very common in everyday neural networks, allows for an inverse design formulation based on mix…
▽ More
In computational design and fabrication, neural networks are becoming important surrogates for bulky forward simulations. A long-standing, intertwined question is that of inverse design: how to compute a design that satisfies a desired target performance? Here, we show that the piecewise linear property, very common in everyday neural networks, allows for an inverse design formulation based on mixed-integer linear programming. Our mixed-integer inverse design uncovers globally optimal or near optimal solutions in a principled manner. Furthermore, our method significantly facilitates emerging, but challenging, combinatorial inverse design tasks, such as material selection. For problems where finding the optimal solution is not desirable or tractable, we develop an efficient yet near-optimal hybrid optimization. Eventually, our method is able to find solutions provably robust to possible fabrication perturbations among multiple designs with similar performances.
△ Less
Submitted 31 January, 2022; v1 submitted 27 September, 2021;
originally announced September 2021.
-
Smart Traffic Monitoring System using Computer Vision and Edge Computing
Authors:
Guanxiong Liu,
Hang Shi,
Abbas Kiani,
Abdallah Khreishah,
Jo Young Lee,
Nirwan Ansari,
Chengjun Liu,
Mustafa Yousef
Abstract:
Traffic management systems capture tremendous video data and leverage advances in video processing to detect and monitor traffic incidents. The collected data are traditionally forwarded to the traffic management center (TMC) for in-depth analysis and may thus exacerbate the network paths to the TMC. To alleviate such bottlenecks, we propose to utilize edge computing by equip** edge nodes that a…
▽ More
Traffic management systems capture tremendous video data and leverage advances in video processing to detect and monitor traffic incidents. The collected data are traditionally forwarded to the traffic management center (TMC) for in-depth analysis and may thus exacerbate the network paths to the TMC. To alleviate such bottlenecks, we propose to utilize edge computing by equip** edge nodes that are close to cameras with computing resources (e.g. cloudlets). A cloudlet, with limited computing resources as compared to TMC, provides limited video processing capabilities. In this paper, we focus on two common traffic monitoring tasks, congestion detection, and speed detection, and propose a two-tier edge computing based model that takes into account of both the limited computing capability in cloudlets and the unstable network condition to the TMC. Our solution utilizes two algorithms for each task, one implemented at the edge and the other one at the TMC, which are designed with the consideration of different computing resources. While the TMC provides strong computation power, the video quality it receives depends on the underlying network conditions. On the other hand, the edge processes very high-quality video but with limited computing resources. Our model captures this trade-off. We evaluate the performance of the proposed two-tier model as well as the traffic monitoring algorithms via test-bed experiments under different weather as well as network conditions and show that our proposed hybrid edge-cloud solution outperforms both the cloud-only and edge-only solutions.
△ Less
Submitted 7 September, 2021;
originally announced September 2021.
-
The role of water in host-guest interaction
Authors:
Valerio Rizzi,
Luigi Bonati,
Narjes Ansari,
Michele Parrinello
Abstract:
One of the main applications of atomistic computer simulations is the calculation of ligand binding energies. The accuracy of these calculations depends on the force field quality and on the thoroughness of configuration sampling. Sampling is an obstacle in modern simulations due to the frequent appearance of kinetic bottlenecks in the free energy landscape. Very often this difficulty is circumven…
▽ More
One of the main applications of atomistic computer simulations is the calculation of ligand binding energies. The accuracy of these calculations depends on the force field quality and on the thoroughness of configuration sampling. Sampling is an obstacle in modern simulations due to the frequent appearance of kinetic bottlenecks in the free energy landscape. Very often this difficulty is circumvented by enhanced sampling techniques. Typically, these techniques depend on the introduction of appropriate collective variables that are meant to capture the system's degrees of freedom. In ligand binding, water has long been known to play a key role, but its complex behaviour has proven difficult to fully capture. In this paper we combine machine learning with physical intuition to build a non-local and highly efficient water-describing collective variable. We use it to study a set of of host-guest systems from the SAMPL5 challenge. We obtain highly accurate binding energies and good agreement with experiments. The role of water during the binding process is then analysed in some detail.
△ Less
Submitted 8 January, 2021; v1 submitted 23 June, 2020;
originally announced June 2020.
-
Angle-Resolved Attosecond Streaking of Twisted Attosecond Pulses
Authors:
Irfana N. Ansari,
Deependra S. Jadoun,
Gopal Dixit
Abstract:
The present work focuses on the characterisation of the amount of orbital angular momentum (OAM) encoded in the twisted attosecond pulses via energy- and angle-resolved attosecond streaking in pump-probe setup. It is found that the photoelectron spectra generated by the linearly polarised twisted pulse with different OAM values exhibit angular modulations, whereas circularly polarised twisted puls…
▽ More
The present work focuses on the characterisation of the amount of orbital angular momentum (OAM) encoded in the twisted attosecond pulses via energy- and angle-resolved attosecond streaking in pump-probe setup. It is found that the photoelectron spectra generated by the linearly polarised twisted pulse with different OAM values exhibit angular modulations, whereas circularly polarised twisted pulse yields angular isotropic spectra. It is demonstrated that the energy- and angle-resolved streaking spectra are sensitive to the OAM values of the twisted pulse. Moreover, the different combinations of the polarisation of the twisted pump pulse and strong infrared probe pulse influence the streaking spectra differently. The characterisation of the OAM carrying twisted attosecond pulses opens up the possibility to explore helical light-matter interaction on attosecond timescale.
△ Less
Submitted 2 June, 2020;
originally announced June 2020.
-
Density Functional Theory based Electric Field Gradient Database
Authors:
Kamal Choudhary,
Jaafar N. Ansari,
Igor I. Mazin,
Karen L. Sauer
Abstract:
The deviation of the electron density around the nuclei from spherical symmetry determines the electric field gradient (EFG), which can be measured by various types of spectroscopy. Nuclear Quadrupole Resonance (NQR) is particularly sensitive to the EFG. The EFGs, and by implication NQR frequencies, vary dramatically across materials. Consequently, searching for NQR spectral lines in previously un…
▽ More
The deviation of the electron density around the nuclei from spherical symmetry determines the electric field gradient (EFG), which can be measured by various types of spectroscopy. Nuclear Quadrupole Resonance (NQR) is particularly sensitive to the EFG. The EFGs, and by implication NQR frequencies, vary dramatically across materials. Consequently, searching for NQR spectral lines in previously uninvestigated materials represents a major challenge. Calculated EFGs can significantly aid at the search inception. To facilitate this task, we have applied high-throughput density functional theory calculations to predict EFGs for 15187 materials in the JARVIS-DFT database. This database, which will include EFG as a standard entry, is continuously increasing. Given the large scope of the database, it is impractical to verify each calculation. However, we assess accuracy by singling out cases for which reliable experimental information is readily available and compare them to the calculations. We further present a statistical analysis of the results. The database and tools associated with our work are made publicly available by JARVIS-DFT ( https://www.ctcms.nist.gov/~knc6/JVASP.html ) and NIST-JARVIS API ( http://jarvis.nist.gov ).
△ Less
Submitted 19 May, 2020;
originally announced May 2020.
-
Molecular Mechanism of Gas Solubility in Liquid: Constant Chemical Potential Molecular Dynamics Simulations
Authors:
Narjes Ansari,
Tarak Karmakar,
Michele Parrinello
Abstract:
Accurate prediction of a gas solubility in a liquid is crucial in many areas of chemistry, and a detailed understanding of the molecular mechanism of the gas solvation continues to be an active area of research. Here, we extend the idea of constant chemical potential molecular dynamics (CμMD) approach to the calculation of the gas solubility in the liquid under constant gas chemical potential cond…
▽ More
Accurate prediction of a gas solubility in a liquid is crucial in many areas of chemistry, and a detailed understanding of the molecular mechanism of the gas solvation continues to be an active area of research. Here, we extend the idea of constant chemical potential molecular dynamics (CμMD) approach to the calculation of the gas solubility in the liquid under constant gas chemical potential conditions. As a representative example, we utilize this method to calculate the isothermal solubility of carbon dioxide in water. Additionally, we provide microscopic insight into the mechanism of solvation that preferentially occurs in areas of the surface where the hydrogen network is broken.
△ Less
Submitted 6 May, 2020;
originally announced May 2020.
-
Identifying Semantically Duplicate Questions Using Data Science Approach: A Quora Case Study
Authors:
Navedanjum Ansari,
Rajesh Sharma
Abstract:
Identifying semantically identical questions on, Question and Answering social media platforms like Quora is exceptionally significant to ensure that the quality and the quantity of content are presented to users, based on the intent of the question and thus enriching overall user experience. Detecting duplicate questions is a challenging problem because natural language is very expressive, and a…
▽ More
Identifying semantically identical questions on, Question and Answering social media platforms like Quora is exceptionally significant to ensure that the quality and the quantity of content are presented to users, based on the intent of the question and thus enriching overall user experience. Detecting duplicate questions is a challenging problem because natural language is very expressive, and a unique intent can be conveyed using different words, phrases, and sentence structuring. Machine learning and deep learning methods are known to have accomplished superior results over traditional natural language processing techniques in identifying similar texts. In this paper, taking Quora for our case study, we explored and applied different machine learning and deep learning techniques on the task of identifying duplicate questions on Quora's dataset. By using feature engineering, feature importance techniques, and experimenting with seven selected machine learning classifiers, we demonstrated that our models outperformed previous studies on this task. Xgboost model with character level term frequency and inverse term frequency is our best machine learning model that has also outperformed a few of the Deep learning baseline models. We applied deep learning techniques to model four different deep neural networks of multiple layers consisting of Glove embeddings, Long Short Term Memory, Convolution, Max pooling, Dense, Batch Normalization, Activation functions, and model merge. Our deep learning models achieved better accuracy than machine learning models. Three out of four proposed architectures outperformed the accuracy from previous machine learning and deep learning research work, two out of four models outperformed accuracy from previous deep learning study on Quora's question pair dataset, and our best model achieved accuracy of 85.82% which is close to Quora state of the art accuracy.
△ Less
Submitted 18 April, 2020;
originally announced April 2020.
-
Impulse Denoising From Hyper-Spectral Images: A Blind Compressed Sensing Approach
Authors:
Angshul Majumdar,
Naushad Ansari,
Hemant Aggarwal,
Pravesh Biyani
Abstract:
In this work we propose a technique to remove sparse impulse noise from hyperspectral images. Our algorithm accounts for the spatial redundancy and spectral correlation of such images. The proposed method is based on the recently introduced Blind Compressed Sensing (BCS) framework, i.e. it empirically learns the spatial and spectral sparsifying dictionaries while denoising the images. The BCS fram…
▽ More
In this work we propose a technique to remove sparse impulse noise from hyperspectral images. Our algorithm accounts for the spatial redundancy and spectral correlation of such images. The proposed method is based on the recently introduced Blind Compressed Sensing (BCS) framework, i.e. it empirically learns the spatial and spectral sparsifying dictionaries while denoising the images. The BCS framework differs from existing CS techniques - which assume the sparsifying dictionaries to be data independent, and from prior dictionary learning studies which learn the dictionary in an offline training phase. Our proposed formulation have shown over 5 dB improvement in PSNR over other techniques.
△ Less
Submitted 11 December, 2019;
originally announced December 2019.
-
Machine Learning-based Signal Detection for PMH Signals in Load-modulated MIMO System
Authors:
**le Zhu,
Qiang Li,
Li Hu,
Hongyang Chen,
Nirwan Ansari
Abstract:
Phase Modulation on the Hypersphere (PMH) is a power efficient modulation scheme for the \textit{load-modulated} multiple-input multiple-output (MIMO) transmitters with central power amplifiers (CPA). However, it is difficult to obtain the precise channel state information (CSI), and the traditional optimal maximum likelihood (ML) detection scheme incurs high complexity which increases exponential…
▽ More
Phase Modulation on the Hypersphere (PMH) is a power efficient modulation scheme for the \textit{load-modulated} multiple-input multiple-output (MIMO) transmitters with central power amplifiers (CPA). However, it is difficult to obtain the precise channel state information (CSI), and the traditional optimal maximum likelihood (ML) detection scheme incurs high complexity which increases exponentially with the number of antennas and the number of bits carried per antenna in the PMH modulation. To detect the PMH signals without knowing the prior CSI, we first propose a signal detection scheme, termed as the hypersphere clustering scheme based on the expectation maximization (EM) algorithm with maximum likelihood detection (HEM-ML). By leveraging machine learning, the proposed detection scheme can accurately obtain information of the channel from a few of the received symbols with little resource cost and achieve comparable detection results as that of the optimal ML detector. To further reduce the computational complexity in the ML detection in HEM-ML, we also propose the second signal detection scheme, termed as the hypersphere clustering scheme based on the EM algorithm with KD-tree detection (HEM-KD). The CSI obtained from the EM algorithm is used to build a spatial KD-tree receiver codebook and the signal detection problem can be transformed into a nearest neighbor search (NNS) problem. The detection complexity of HEM-KD is significantly reduced without any detection performance loss as compared to HEM-ML. Extensive simulation results verify the effectiveness of our proposed detection schemes.
△ Less
Submitted 24 November, 2019;
originally announced November 2019.
-
Backhaul-aware Uplink Communications in Full-Duplex DBS-aided HetNets
Authors:
Liang Zhang,
Nirwan Ansari
Abstract:
Drone-mounted base stations (DBSs) are promising solutions to provide ubiquitous connections to users and support many applications in the fifth generation of mobile networks while full duplex communications has the potential to improve the spectrum efficiency. In this paper, we have investigated the backhaul-aware uplink communications in a full-duplex DBS-aided HetNet (BUD) problem with the obje…
▽ More
Drone-mounted base stations (DBSs) are promising solutions to provide ubiquitous connections to users and support many applications in the fifth generation of mobile networks while full duplex communications has the potential to improve the spectrum efficiency. In this paper, we have investigated the backhaul-aware uplink communications in a full-duplex DBS-aided HetNet (BUD) problem with the objective to maximize the total throughput of the network, and this problem is decomposed into two sub-problems: the DBS Placement problem (including the vertical dimension and horizontal dimensions) and the joint UE association, power and bandwidth assignment (Joint-UPB) problem. Since the BUD problem is NP-hard, we propose approximation algorithms to solve the sub-problems and another, named the AA-BUD algorithm, to solve the BUD problem with guaranteed performance. The performance of the AA-BUD algorithm has been demonstrated via extensive simulations, and it is superior to two benchmark algorithms with up to 45.8% throughput improvement.
△ Less
Submitted 30 October, 2019;
originally announced October 2019.
-
Learning-Assisted Secure End-to-End Network Slicing for Cyber-Physical Systems
Authors:
Qiang Liu,
Tao Han,
Nirwan Ansari
Abstract:
There is a pressing need to interconnect physical systems such as power grid and vehicles for efficient management and safe operations. Owing to the diverse features of physical systems, there is hardly a one-size-fits-all networking solution for develo** cyber-physical systems. Network slicing is a promising technology that allows network operators to create multiple virtual networks on top of…
▽ More
There is a pressing need to interconnect physical systems such as power grid and vehicles for efficient management and safe operations. Owing to the diverse features of physical systems, there is hardly a one-size-fits-all networking solution for develo** cyber-physical systems. Network slicing is a promising technology that allows network operators to create multiple virtual networks on top of a shared network infrastructure. These virtual networks can be tailored to meet the requirements of different cyber-physical systems. However, it is challenging to design secure network slicing solutions that can efficiently create end-to-end network slices for diverse cyber-physical systems. In this article, we discuss the challenges and security issues of network slicing, study learning-assisted network slicing solutions, and analyze their performance under the denial-of-service attack. We also present a design and implementation of a small-scale testbed for evaluating the network slicing solutions.
△ Less
Submitted 29 October, 2019;
originally announced October 2019.
-
Controlling polarization of attosecond pulses with plasmonic-enhanced bichromatic counter-rotating circularly polarised fields
Authors:
Irfana N. Ansari,
Cornelia Hofmann,
Lukas Medišauskas,
Maciej Lewenstein,
Marcelo F. Ciappina,
Gopal Dixit
Abstract:
The use of bichromatic counter-rotating laser field is known to generate high-order harmonics with non-zero ellipticity. By combining such laser field with a plasmonic-enhanced spatially inhomogeneous field, we propose a way to influence the sub-cycle dynamics of the high-harmonic generation process. Using the numerical solution of the time-dependent Schr{ö}dinger equation combined with classical…
▽ More
The use of bichromatic counter-rotating laser field is known to generate high-order harmonics with non-zero ellipticity. By combining such laser field with a plasmonic-enhanced spatially inhomogeneous field, we propose a way to influence the sub-cycle dynamics of the high-harmonic generation process. Using the numerical solution of the time-dependent Schr{ö}dinger equation combined with classical trajectory Monte Carlo simulations, we show that the change of the direction and the strength of the plasmonic field selectively enhances or suppresses certain recombining electron trajectories. This in turn modifies the ellipticity of the emitted attosecond pulses.
△ Less
Submitted 20 December, 2020; v1 submitted 10 September, 2019;
originally announced September 2019.
-
A Secure Cloud with Minimal Provider Trust
Authors:
Amin Mosayyebzadeh,
Gerardo Ravago,
Apoorve Mohan,
Ali Raza,
Sahil Tikale,
Nabil Schear,
Trammell Hudson,
Jason Hennessey,
Naved Ansari,
Kyle Hogan,
Charles Munson,
Larry Rudolph,
Gene Cooperman,
Peter Desnoyers,
Orran Krieger
Abstract:
Bolted is a new architecture for a bare metal cloud with the goal of providing security-sensitive customers of a cloud the same level of security and control that they can obtain in their own private data centers. It allows tenants to elastically allocate secure resources within a cloud while being protected from other previous, current, and future tenants of the cloud. The provisioning of a new s…
▽ More
Bolted is a new architecture for a bare metal cloud with the goal of providing security-sensitive customers of a cloud the same level of security and control that they can obtain in their own private data centers. It allows tenants to elastically allocate secure resources within a cloud while being protected from other previous, current, and future tenants of the cloud. The provisioning of a new server to a tenant isolates a bare metal server, only allowing it to communicate with other tenant's servers once its critical firmware and software have been attested to the tenant. Tenants, rather than the provider, control the tradeoffs between security, price, and performance. A prototype demonstrates scalable end-to-end security with small overhead compared to a less secure alternative.
△ Less
Submitted 13 July, 2019;
originally announced July 2019.
-
Building a Benchmark Dataset and Classifiers for Sentence-Level Findings in AP Chest X-rays
Authors:
Tanveer Syeda-Mahmood,
Hassan M. Ahmad,
Nadeem Ansari,
Yaniv Gur,
Satyananda Kashyap,
Alexandros Karargyris,
Mehdi Moradi,
Anup Pillai,
Karthik Sheshadri,
Weiting Wang,
Ken C. L. Wong,
Joy T. Wu
Abstract:
Chest X-rays are the most common diagnostic exams in emergency rooms and hospitals. There has been a surge of work on automatic interpretation of chest X-rays using deep learning approaches after the availability of large open source chest X-ray dataset from NIH. However, the labels are not sufficiently rich and descriptive for training classification tools. Further, it does not adequately address…
▽ More
Chest X-rays are the most common diagnostic exams in emergency rooms and hospitals. There has been a surge of work on automatic interpretation of chest X-rays using deep learning approaches after the availability of large open source chest X-ray dataset from NIH. However, the labels are not sufficiently rich and descriptive for training classification tools. Further, it does not adequately address the findings seen in Chest X-rays taken in anterior-posterior (AP) view which also depict the placement of devices such as central vascular lines and tubes. In this paper, we present a new chest X-ray benchmark database of 73 rich sentence-level descriptors of findings seen in AP chest X-rays. We describe our method of obtaining these findings through a semi-automated ground truth generation process from crowdsourcing of clinician annotations. We also present results of building classifiers for these findings that show that such higher granularity labels can also be learned through the framework of deep learning classifiers.
△ Less
Submitted 21 June, 2019;
originally announced June 2019.
-
Beam with Adaptive Divergence Angle in Free-Space Optical Communications for High-Speed Trains
Authors:
Yagiz Kaymak,
Sina Fathi-Kazerooni,
Roberto Rojas-Cessa,
JiangHua Feng,
Nirwan Ansari,
MengChu Zhou,
Tairan Zhang
Abstract:
In this paper, we propose an adaptive beam that adapts its divergence angle according to the receiver aperture diameter and the communication distance to improve the received power and ease the alignment between the communicating optical transceivers in a free-space optical communications (FSOC) system for high-speed trains (HSTs). We compare the received power, signal-to-noise ratio, bit error ra…
▽ More
In this paper, we propose an adaptive beam that adapts its divergence angle according to the receiver aperture diameter and the communication distance to improve the received power and ease the alignment between the communicating optical transceivers in a free-space optical communications (FSOC) system for high-speed trains (HSTs). We compare the received power, signal-to-noise ratio, bit error rate, and the maximum communication distance of the proposed adaptive beam with a beam that uses a fixed divergence angle of 1 mrad. The proposed adaptive beam yields a higher received power with an increase of 33 dB in average over the fixed-divergence beam under varying visibility conditions and distance. Moreover, the proposed adaptive divergence angle extends the communication distance of a FSOC system for HSTs to about three times under different visibility conditions as compared to a fixed divergence beam. We also propose a new ground transceiver placement that places the ground transceivers of a FSOC system for HSTs on gantries placed above the train passage instead of placing them next to track. The proposed transceiver placement provides a received-power increase of 3.8 dB in average over the conventional placement of ground-station transceivers next to the track.
△ Less
Submitted 28 December, 2018;
originally announced December 2018.
-
NOMA Aided Narrowband IoT for Machine Type Communications with User Clustering
Authors:
Ali Shahini,
Nirwan Ansari
Abstract:
To support Machine Type Communications (MTC) in next generation mobile networks, NarrowBand-IoT (NB-IoT) has been released by the Third Generation Partnership Project (3GPP) as a promising solution to provide extended coverage and low energy consumption for low cost MTC devices. However, the existing Orthogonal Multiple Access (OMA) scheme in NB-IoT cannot provide connectivity for a massive number…
▽ More
To support Machine Type Communications (MTC) in next generation mobile networks, NarrowBand-IoT (NB-IoT) has been released by the Third Generation Partnership Project (3GPP) as a promising solution to provide extended coverage and low energy consumption for low cost MTC devices. However, the existing Orthogonal Multiple Access (OMA) scheme in NB-IoT cannot provide connectivity for a massive number of MTC devices. In parallel with the development of NB-IoT, Non-Orthogonal Multiple Access (NOMA), introduced for the fifth generation wireless networks, is deemed to significantly improve the network capacity by providing massive connectivity through sharing the same spectral resources. To leverage NOMA in the context of NB-IoT, we propose a power domain NOMA scheme with user clustering for an NB-IoT system. In particular, the MTC devices are assigned to different ranks within the NOMA clusters where they transmit over the same frequency resources. Then, we formulate an optimization problem to maximize the total throughput of the network by optimizing the resource allocation of MTC devices and NOMA clustering while satisfying the transmission power and quality of service requirements. We prove the NP-hardness of the proposed optimization problem. We further design an efficient heuristic algorithm to solve the proposed optimization problem by jointly optimizing NOMA clustering and resource allocation of MTC devices. Furthermore, we prove that the reduced optimization problem of power control is a convex optimization task. Simulation results are presented to demonstrate the efficiency of the proposed scheme.
△ Less
Submitted 20 December, 2018;
originally announced December 2018.
-
Simultaneous control of harmonic yield and energy cutoff of high-harmonic generation using seeded plasmonic-enhanced fields
Authors:
Irfana N. Ansari,
M. S. Mrudul,
Marcelo F. Ciappina,
Maciej Lewenstein,
Gopal Dixit
Abstract:
We study high-order harmonic generation (HHG) driven by seeded plasmonic-enhanced fields. On one hand, plasmonic-enhanced fields have shown a great potential to extend the HHG cutoff, an instrumental pre-requisite for the generation of attosecond pulses. On another hand, the use of XUV seeds appears to have a considerable potential to improve the HHG conversion efficiency, which is typically modes…
▽ More
We study high-order harmonic generation (HHG) driven by seeded plasmonic-enhanced fields. On one hand, plasmonic-enhanced fields have shown a great potential to extend the HHG cutoff, an instrumental pre-requisite for the generation of attosecond pulses. On another hand, the use of XUV seeds appears to have a considerable potential to improve the HHG conversion efficiency, which is typically modest when a unique fundamental laser pulse is employed. By mixing these two sources, we show it is possible to, simultaneously, boost the HHG cutoff and to increase the harmonic photon flux. The combination of these features potentially enables to generate intense and spectrally broad attosecond pulse trains.
△ Less
Submitted 15 October, 2018;
originally announced October 2018.
-
Energy Efficient Resource Allocation in EH-enabled CR Networks for IoT
Authors:
Ali Shahini,
Abbas Kiani,
Nirwan Ansari
Abstract:
With the rapid growth of Internet of Things (IoT) devices, the next generation mobile networks demand for more operating frequency bands. By leveraging the underutilized radio spectrum, the cognitive radio (CR) technology is considered as a promising solution for spectrum scarcity problem of IoT applications. In parallel with the development of CR techniques, Wireless Energy Harvesting (WEH) is co…
▽ More
With the rapid growth of Internet of Things (IoT) devices, the next generation mobile networks demand for more operating frequency bands. By leveraging the underutilized radio spectrum, the cognitive radio (CR) technology is considered as a promising solution for spectrum scarcity problem of IoT applications. In parallel with the development of CR techniques, Wireless Energy Harvesting (WEH) is considered as one of the emerging technologies to eliminate the need of recharging or replacing the batteries for IoT and CR networks. To this end, we propose to utilize WEH for CR networks in which the CR devices are not only capable of sensing the available radio frequencies in a collaborative manner but also harvesting the wireless energy transferred by an Access Point (AP). More importantly, we design an optimization framework that captures a fundamental tradeoff between energy efficiency (EE) and spectral efficiency (SE) of the network. In particular, we formulate a Mixed Integer Nonlinear Programming (MINLP) problem that maximizes EE while taking into consideration of users' buffer occupancy, data rate fairness, energy causality constraints and interference constraints. We further prove that the proposed optimization framework is an NP-Hard problem. Thus, we propose a low complex heuristic algorithm, called INSTANT, to solve the resource allocation and energy harvesting optimization problem. The proposed algorithm is shown to be capable of achieving near optimal solution with high accuracy while having polynomial complexity. The efficiency of our proposal is validated through well designed simulations.
△ Less
Submitted 6 July, 2018;
originally announced July 2018.
-
Hierarchical Capacity Provisioning for Fog Computing
Authors:
Abbas Kiani,
Nirwan Ansari,
Abdallah Khreishah
Abstract:
The concept of fog computing is centered around providing computation resources at the edge of network, thereby reducing the latency and improving the quality of service. However, it is still desirable to investigate how and where at the edge of the network the computation capacity should be provisioned. To this end, we propose a hierarchical capacity provisioning scheme. In particular, we conside…
▽ More
The concept of fog computing is centered around providing computation resources at the edge of network, thereby reducing the latency and improving the quality of service. However, it is still desirable to investigate how and where at the edge of the network the computation capacity should be provisioned. To this end, we propose a hierarchical capacity provisioning scheme. In particular, we consider a two-tier network architecture consisting of shallow and deep cloudlets and explore the benefits of hierarchical capacity based on queueing analysis. Moreover, we explore two different network scenarios in which the network delay between the two tiers is negligible as well as the case that the deep cloudlet is located somewhere deeper in the network and thus the delay is significant. More importantly, we model the first network delay scenario with bufferless shallow cloudlets as well as the second scenario with finite-size buffer shallow cloudlets, and formulate an optimization problem for each model. We also use stochastic ordering to solve the optimization problem formulated for the first model and an upper bound based technique is proposed for the second model. The performance of the proposed scheme is evaluated via simulations in which we show the accuracy of the proposed upper bound technique as well as the queue length estimation approach for both randomly generated input and real trace data.
△ Less
Submitted 3 July, 2018;
originally announced July 2018.
-
A Hybrid RF-VLC System for Energy Efficient Wireless Access
Authors:
Abdallah Khreishah,
Sihua Shao,
Ammar Gharaibeh,
Moussa Ayyash,
Hany Elgala,
Nirwan Ansari
Abstract:
In this paper, we propose a new paradigm in designing and realizing energy efficient wireless indoor access networks, namely, a hybrid system enabled by traditional RF access, such as WiFi, as well as the emerging visible light communication (VLC). VLC facilitates the great advantage of being able to jointly perform illumination and communications, and little extra power beyond illumination is req…
▽ More
In this paper, we propose a new paradigm in designing and realizing energy efficient wireless indoor access networks, namely, a hybrid system enabled by traditional RF access, such as WiFi, as well as the emerging visible light communication (VLC). VLC facilitates the great advantage of being able to jointly perform illumination and communications, and little extra power beyond illumination is required to empower communications, thus rendering wireless access with almost zero power consumption. On the other hand, when illumination is not required from the light source, the energy consumed by VLC could be more than that consumed by the RF. By capitalizing on the above properties, the proposed hybrid RF-VLC system is more energy efficient and more adaptive to the illumination conditions than the individual VLC or RF systems. To demonstrate the viability of the proposed system, we first formulate the problem of minimizing the power consumption of the hybrid RF-VLC system while satisfying the users requests and maintaining acceptable level of illumination, which is NP-complete. Therefore, we divide the problem into two subproblems. In the first subproblems, we determine the set of VLC access points (AP) that needs to be turned on to satisfy the illumination requirements. Given this set, we turn our attention to satisfying the users' requests for real-time communications, and we propose a randomized online algorithm that, against an oblivious adversary, achieves a competitive ratio of $\log(N)\log(M)$ with probability of success $1 - \frac{1}{N}$, where $N$ is the number of users and $M$ is the number of VLC and RF APs. We also show that the best online algorithm to solve this problem can achieve a competitive ratio of $\log(M)$. Simulation results further demonstrate the advantages of the hybrid system.
△ Less
Submitted 18 July, 2018; v1 submitted 13 June, 2018;
originally announced June 2018.
-
Distributed Energy and Resource Management for Full-Duplex Dense Small Cells for 5G
Authors:
Animesh Yadav,
Octavia A. Dobre,
Nirwan Ansari
Abstract:
We consider a multi-carrier and densely deployed small cell network, where small cells are powered by renewable energy source and operate in a full-duplex mode. We formulate an energy and traffic aware resource allocation optimization problem, where a joint design of the beamformers, power and sub-carrier allocation, and users scheduling is proposed. The problem minimizes the sum data buffer lengt…
▽ More
We consider a multi-carrier and densely deployed small cell network, where small cells are powered by renewable energy source and operate in a full-duplex mode. We formulate an energy and traffic aware resource allocation optimization problem, where a joint design of the beamformers, power and sub-carrier allocation, and users scheduling is proposed. The problem minimizes the sum data buffer lengths of each user in the network by using the harvested energy. A practical uplink user rate-dependent decoding energy consumption is included in the total energy consumption at the small cell base stations. Hence, harvested energy is shared with both downlink and uplink users. Owing to the non-convexity of the problem, a faster convergence sub-optimal algorithm based on successive parametric convex approximation framework is proposed. The algorithm is implemented in a distributed fashion, by using the alternating direction method of multipliers, which offers not only the limited information exchange between the base stations, but also fast convergence. Numerical results advocate the redesigning of the resource allocation strategy when the energy at the base station is shared among the downlink and uplink transmissions.
△ Less
Submitted 24 March, 2018;
originally announced March 2018.
-
Edge Computing Aware NOMA for 5G Networks
Authors:
Abbas Kiani,
Nirwan Ansari
Abstract:
With the fast development of Internet of things (IoT), the fifth generation (5G) wireless networks need to provide massive connectivity of IoT devices and meet the demand for low latency. To satisfy these requirements, Non-Orthogonal Multiple Access (NOMA) has been recognized as a promising solution for 5G networks to significantly improve the network capacity. In parallel with the development of…
▽ More
With the fast development of Internet of things (IoT), the fifth generation (5G) wireless networks need to provide massive connectivity of IoT devices and meet the demand for low latency. To satisfy these requirements, Non-Orthogonal Multiple Access (NOMA) has been recognized as a promising solution for 5G networks to significantly improve the network capacity. In parallel with the development of NOMA techniques, Mobile Edge Computing (MEC) is becoming one of the key emerging technologies to reduce the latency and improve the Quality of Service (QoS) for 5G networks. In order to capture the potential gains of NOMA in the context of MEC, this paper proposes an edge computing aware NOMA technique which can enjoy the benefits of uplink NOMA in reducing MEC users' uplink energy consumption. To this end, we formulate a NOMA based optimization framework which minimizes the energy consumption of MEC users via optimizing the user clustering, computing and communication resource allocation, and transmit powers. In particular, similar to frequency Resource Blocks (RBs), we divide the computing capacity available at the cloudlet to computing RBs. Accordingly, we explore the joint allocation of the frequency and computing RBs to the users that are assigned to different order indices within the NOMA clusters. We also design an efficient heuristic algorithm for user clustering and RBs allocation, and formulate a convex optimization problem for the power control to be solved independently per NOMA cluster. The performance of the proposed NOMA scheme is evaluated via simulations.
△ Less
Submitted 13 December, 2017;
originally announced December 2017.
-
Energy-Aware Virtual Machine Management in Inter-datacenter Networks over Elastic Optical Infrastructure
Authors:
Liang Zhang,
Tao Han,
Nirwan Ansari
Abstract:
Datacenters (DCs), deployed in a large scale to support the ever increasing demand for data processing applications, consume tremendous energy. Powering DCs with renewable energy can effectively reduce the brown energy consumption. Owing to geographically distributed deployment of DCs, the renewable energy generation and the data processing demands usually vary in different DCs. Migrating virtual…
▽ More
Datacenters (DCs), deployed in a large scale to support the ever increasing demand for data processing applications, consume tremendous energy. Powering DCs with renewable energy can effectively reduce the brown energy consumption. Owing to geographically distributed deployment of DCs, the renewable energy generation and the data processing demands usually vary in different DCs. Migrating virtual machines (VMs) among DCs according to the availability of renewable energy helps match the energy demands and the renewable energy generation in DCs, and thus maximizes the utilization of renewable energy. We first elicit the renewable energy-aware inter-datacenter (inter-DC) VM migration problem in an inter-DC network over the elastic optical infrastructure, present it as a many-manycast communications problem, and then formulate it as an integer linear programming problem. The objective is to minimize the total cost of the brown energy consumption of DCs in such inter-DC network via VM migration. We use CVX and Gurobi to solve this problem for small network configurations, and we propose a few heuristic algorithms that approximate the optimal solution for large network configurations. Through extensive simulations, we show that the proposed algorithms, by migrating VM among DCs, can reduce up to 19.7% cost of the brown energy consumption.
△ Less
Submitted 17 February, 2018; v1 submitted 2 November, 2017;
originally announced November 2017.
-
M-RWTL: Learning Signal-Matched Rational Wavelet Transform in Lifting Framework
Authors:
Naushad Ansari,
Anubha Gupta
Abstract:
Transform learning is being extensively applied in several applications because of its ability to adapt to a class of signals of interest. Often, a transform is learned using a large amount of training data, while only limited data may be available in many applications. Motivated with this, we propose wavelet transform learning in the lifting framework for a given signal. Significant contributions…
▽ More
Transform learning is being extensively applied in several applications because of its ability to adapt to a class of signals of interest. Often, a transform is learned using a large amount of training data, while only limited data may be available in many applications. Motivated with this, we propose wavelet transform learning in the lifting framework for a given signal. Significant contributions of this work are: 1) the existing theory of lifting framework of the dyadic wavelet is extended to more generic rational wavelet design, where dyadic is a special case and 2) the proposed work allows to learn rational wavelet transform from a given signal and does not require large training data. Since it is a signal-matched design, the proposed methodology is called Signal-Matched Rational Wavelet Transform Learning in the Lifting Framework (M-RWTL). The proposed M-RWTL method inherits all the advantages of lifting, i.e., the learned rational wavelet transform is always invertible, method is modular, and the corresponding M-RWTL system can also incorporate nonlinear filters, if required. This may enhance the use of RWT in applications which is so far restricted. M-RWTL is observed to perform better compared to standard wavelet transforms in the applications of compressed sensing based signal reconstruction.
△ Less
Submitted 28 October, 2017;
originally announced October 2017.
-
Latency Aware Drone Base Station Placement in Heterogeneous Networks
Authors:
Xiang Sun,
Nirwan Ansari
Abstract:
Different from traditional static small cells, Drone Base Stations (DBSs) exhibit their own advantages, i.e., faster and cheaper to deploy, more flexibly reconfigured, and likely to have better communications channels owing to the presence of short-range line-of-sight links. Thus, applying DBSs into the cellular network has great potential to increase the throughput of the network and improve Qual…
▽ More
Different from traditional static small cells, Drone Base Stations (DBSs) exhibit their own advantages, i.e., faster and cheaper to deploy, more flexibly reconfigured, and likely to have better communications channels owing to the presence of short-range line-of-sight links. Thus, applying DBSs into the cellular network has great potential to increase the throughput of the network and improve Quality of Service (QoS) of Mobile Users (MUs). In this paper, we focus on how to place the DBS (i.e., jointly determining the location and the association coverage of a DBS) in order to improve the QoS in terms of minimizing the total average latency ratio of MUs by considering the energy capacity limitation of the DBS. We formulate the DBS placement problem as an optimization problem and design a Latency aware dronE bAse station Placement (LEAP) algorithm to solve it efficiently. The performance of LEAP is demonstrated via simulations as compared to other two baseline methods.
△ Less
Submitted 22 September, 2017;
originally announced October 2017.
-
Mobile Edge Computing Empowers Internet of Things
Authors:
Nirwan Ansari,
Xiang Sun
Abstract:
In this paper, we propose a Mobile Edge Internet of Things (MEIoT) architecture by leveraging the fiber-wireless access technology, the cloudlet concept, and the software defined networking framework. The MEIoT architecture brings computing and storage resources close to Internet of Things (IoT) devices in order to speed up IoT data sharing and analytics. Specifically, the IoT devices (belonging t…
▽ More
In this paper, we propose a Mobile Edge Internet of Things (MEIoT) architecture by leveraging the fiber-wireless access technology, the cloudlet concept, and the software defined networking framework. The MEIoT architecture brings computing and storage resources close to Internet of Things (IoT) devices in order to speed up IoT data sharing and analytics. Specifically, the IoT devices (belonging to the same user) are associated to a specific proxy Virtual Machine (VM) in the nearby cloudlet. The proxy VM stores and analyzes the IoT data (generated by its IoT devices) in real-time. Moreover, we introduce the semantic and social IoT technology in the context of MEIoT to solve the interoperability and inefficient access control problem in the IoT system. In addition, we propose two dynamic proxy VM migration methods to minimize the end-to-end delay between proxy VMs and their IoT devices and to minimize the total on-grid energy consumption of the cloudlets, respectively. Performance of the proposed methods are validated via extensive simulations.
△ Less
Submitted 1 November, 2017; v1 submitted 1 September, 2017;
originally announced September 2017.
-
Joint Spectrum Allocation and Structure Optimization in Green Powered Heterogeneous Cognitive Radio Networks
Authors:
Ali Shahini,
Nirwan Ansari
Abstract:
We aim at maximizing the sum rate of secondary users (SUs) in OFDM-based Heterogeneous Cognitive Radio (CR) Networks using RF energy harvesting. Assuming SUs operate in a time switching fashion, each time slot is partitioned into three non-overlap** parts devoted for energy harvesting, spectrum sensing and data transmission. The general problem of joint resource allocation and structure optimiza…
▽ More
We aim at maximizing the sum rate of secondary users (SUs) in OFDM-based Heterogeneous Cognitive Radio (CR) Networks using RF energy harvesting. Assuming SUs operate in a time switching fashion, each time slot is partitioned into three non-overlap** parts devoted for energy harvesting, spectrum sensing and data transmission. The general problem of joint resource allocation and structure optimization is formulated as a Mixed Integer Nonlinear Programming task which is NP-hard and intractable. Thus, we propose to tackle it by decomposing it into two subproblems. We first propose a sub-channel allocation scheme to approximately satisfy SUs' rate requirements and remove the integer constraints. For the second step, we prove that the general optimization problem is reduced to a convex optimization task. Considering the trade-off among fractions of each time slot, we focus on optimizing the time slot structures of SUs that maximize the total throughput while guaranteeing the rate requirements of both real-time and non-real-time SUs. Since the reduced optimization problem does not have a simple closed-form solution, we thus propose a near optimal closed-form solution by utilizing Lambert-W function. We also exploit iterative gradient method based on Lagrangian dual decomposition to achieve near optimal solutions. Simulation results are presented to validate the optimality of the proposed schemes.
△ Less
Submitted 11 May, 2017;
originally announced May 2017.
-
Statistical learning of rational wavelet transform for natural images
Authors:
Naushad Ansari,
Anubha Gupta
Abstract:
Motivated with the concept of transform learning and the utility of rational wavelet transform in audio and speech processing, this paper proposes Rational Wavelet Transform Learning in Statistical sense (RWLS) for natural images. The proposed RWLS design is carried out via lifting framework and is shown to have a closed form solution. The efficacy of the learned transform is demonstrated in the a…
▽ More
Motivated with the concept of transform learning and the utility of rational wavelet transform in audio and speech processing, this paper proposes Rational Wavelet Transform Learning in Statistical sense (RWLS) for natural images. The proposed RWLS design is carried out via lifting framework and is shown to have a closed form solution. The efficacy of the learned transform is demonstrated in the application of compressed sensing (CS) based reconstruction. The learned RWLS is observed to perform better than the existing standard dyadic wavelet transforms.
△ Less
Submitted 2 May, 2017;
originally announced May 2017.
-
Indoor Localization by Fusing a Group of Fingerprints Based on Random Forests
Authors:
Xiansheng Guo,
Nirwan Ansari,
Huiyong Li
Abstract:
Indoor localization based on SIngle Of Fingerprint (SIOF) is rather susceptible to the changing environment, multipath, and non-line-of-sight (NLOS) propagation. Building SIOF is also a very time-consuming process. Recently, we first proposed a GrOup Of Fingerprints (GOOF) to improve the localization accuracy and reduce the burden of building fingerprints. However, the main drawback is the timelin…
▽ More
Indoor localization based on SIngle Of Fingerprint (SIOF) is rather susceptible to the changing environment, multipath, and non-line-of-sight (NLOS) propagation. Building SIOF is also a very time-consuming process. Recently, we first proposed a GrOup Of Fingerprints (GOOF) to improve the localization accuracy and reduce the burden of building fingerprints. However, the main drawback is the timeliness. In this paper, we propose a novel localization framework by Fusing A Group Of fingerprinTs (FAGOT) based on random forests. In the offline phase, we first build a GOOF from different transformations of the received signals of multiple antennas. Then, we design multiple GOOF strong classifiers based on Random Forests (GOOF-RF) by training each fingerprint in the GOOF. In the online phase, we input the corresponding transformations of the real measurements into these strong classifiers to obtain multiple independent decisions. Finally, we propose a Sliding Window aIded Mode-based (SWIM) fusion algorithm to balance the localization accuracy and time. Our proposed approaches can work better in an unknown indoor scenario. The burden of building fingerprints can also be reduced drastically. We demonstrate the performance of our algorithms through simulations and real experimental data using two Universal Software Radio Peripheral (USRP) platforms.
△ Less
Submitted 6 March, 2017;
originally announced March 2017.
-
Indoor Localization Using Visible Light Via Fusion Of Multiple Classifiers
Authors:
Xiansheng Guo,
Sihua Shao,
Nirwan Ansari,
Abdallah Khreishah
Abstract:
A multiple classifiers fusion localization technique using received signal strengths (RSSs) of visible light is proposed, in which the proposed system transmits different intensity modulated sinusoidal signals by LEDs and the signals received by a Photo Diode (PD) placed at various grid points. First, we obtain some {\emph{approximate}} received signal strengths (RSSs) fingerprints by capturing th…
▽ More
A multiple classifiers fusion localization technique using received signal strengths (RSSs) of visible light is proposed, in which the proposed system transmits different intensity modulated sinusoidal signals by LEDs and the signals received by a Photo Diode (PD) placed at various grid points. First, we obtain some {\emph{approximate}} received signal strengths (RSSs) fingerprints by capturing the peaks of power spectral density (PSD) of the received signals at each given grid point. Unlike the existing RSSs based algorithms, several representative machine learning approaches are adopted to train multiple classifiers based on these RSSs fingerprints. The multiple classifiers localization estimators outperform the classical RSS-based LED localization approaches in accuracy and robustness. To further improve the localization performance, two robust fusion localization algorithms, namely, grid independent least square (GI-LS) and grid dependent least square (GD-LS), are proposed to combine the outputs of these classifiers. We also use a singular value decomposition (SVD) based LS (LS-SVD) method to mitigate the numerical stability problem when the prediction matrix is singular. Experiments conducted on intensity modulated direct detection (IM/DD) systems have demonstrated the effectiveness of the proposed algorithms. The experimental results show that the probability of having mean square positioning error (MSPE) of less than 5cm achieved by GD-LS is improved by 93.03\% and 93.15\%, respectively, as compared to those by the RSS ratio (RSSR) and RSS matching methods with the FFT length of 2000.
△ Less
Submitted 20 December, 2017; v1 submitted 6 March, 2017;
originally announced March 2017.
-
Image Reconstruction using Matched Wavelet Estimated from Data Sensed Compressively using Partial Canonical Identity Matrix
Authors:
Naushad Ansari,
Anubha Gupta
Abstract:
This paper proposes a joint framework wherein lifting-based, separable, image-matched wavelets are estimated from compressively sensed (CS) images and used for the reconstruction of the same. Matched wavelet can be easily designed if full image is available. Also matched wavelet may provide better reconstruction results in CS application compared to standard wavelet sparsifying basis. Since in CS…
▽ More
This paper proposes a joint framework wherein lifting-based, separable, image-matched wavelets are estimated from compressively sensed (CS) images and used for the reconstruction of the same. Matched wavelet can be easily designed if full image is available. Also matched wavelet may provide better reconstruction results in CS application compared to standard wavelet sparsifying basis. Since in CS application, we have compressively sensed image instead of full image, existing methods of designing matched wavelet cannot be used. Thus, we propose a joint framework that estimates matched wavelet from the compressively sensed images and also reconstructs full images. This paper has three significant contributions. First, lifting-based, image-matched separable wavelet is designed from compressively sensed images and is also used to reconstruct the same. Second, a simple sensing matrix is employed to sample data at sub-Nyquist rate such that sensing and reconstruction time is reduced considerably without any noticeable degradation in the reconstruction performance. Third, a new multi-level L-Pyramid wavelet decomposition strategy is provided for separable wavelet implementation on images that leads to improved reconstruction performance. Compared to CS-based reconstruction using standard wavelets with Gaussian sensing matrix and with existing wavelet decomposition strategy, the proposed methodology provides faster and better image reconstruction in compressive sensing application.
△ Less
Submitted 7 February, 2017;
originally announced February 2017.
-
Design of Image Matched Non-Separable Wavelet using Convolutional Neural Network
Authors:
Naushad Ansari,
Anubha Gupta,
Rahul Duggal
Abstract:
Image-matched nonseparable wavelets can find potential use in many applications including image classification, segmen- tation, compressive sensing, etc. This paper proposes a novel design methodology that utilizes convolutional neural net- work (CNN) to design two-channel non-separable wavelet matched to a given image. The design is proposed on quin- cunx lattice. The loss function of the convolu…
▽ More
Image-matched nonseparable wavelets can find potential use in many applications including image classification, segmen- tation, compressive sensing, etc. This paper proposes a novel design methodology that utilizes convolutional neural net- work (CNN) to design two-channel non-separable wavelet matched to a given image. The design is proposed on quin- cunx lattice. The loss function of the convolutional neural network is setup with total squared error between the given input image to CNN and the reconstructed image at the output of CNN, leading to perfect reconstruction at the end of train- ing. Simulation results have been shown on some standard images.
△ Less
Submitted 15 December, 2016;
originally announced December 2016.
-
On The Fundamental Energy Tradeoffs of Geographical Load Balancing
Authors:
Abbas Kiani,
Nirwan Ansari
Abstract:
Geographical load balancing can optimize the utilization of green energy and the cost of electricity by taking the advantages of green and price diversities at geographical dispersed data centers. However, higher green energy utilization or lower electricity cost may actually increase the total energy consumption, and is not necessarily the best option. The achievable energy tradeoffs can be captu…
▽ More
Geographical load balancing can optimize the utilization of green energy and the cost of electricity by taking the advantages of green and price diversities at geographical dispersed data centers. However, higher green energy utilization or lower electricity cost may actually increase the total energy consumption, and is not necessarily the best option. The achievable energy tradeoffs can be captured by taking into consideration of a defined service efficiency parameter for geo-dispersed data centers.
△ Less
Submitted 2 December, 2016;
originally announced December 2016.
-
Towards Hierarchical Mobile Edge Computing: An Auction-Based Profit Maximization Approach
Authors:
Abbas Kiani,
Nirwan Ansari
Abstract:
The multi-tiered concept of Internet of Things (IoT) devices, cloudlets and clouds is facilitating a user-centric IoT. However, in such three tier network, it is still desirable to investigate efficient strategies to offer the computing, storage and communications resources to the users. To this end, this paper proposes a new hierarchical model by introducing the concept of field, shallow, and dee…
▽ More
The multi-tiered concept of Internet of Things (IoT) devices, cloudlets and clouds is facilitating a user-centric IoT. However, in such three tier network, it is still desirable to investigate efficient strategies to offer the computing, storage and communications resources to the users. To this end, this paper proposes a new hierarchical model by introducing the concept of field, shallow, and deep cloudlets where the cloudlet tier itself is designed in three hierarchical levels based on the principle of LTE-Advanced backhaul network. Accordingly, we explore a two time scale approach in which the computing resources are offered in an auction-based profit maximization manner and then the communications resources are allocated to satisfy the users' QoS.
△ Less
Submitted 30 November, 2016;
originally announced December 2016.
-
Localization by Fusing a Group of Fingerprints via Multiple Antennas in Indoor Environment
Authors:
Xiansheng Guo,
Nirwan Ansari
Abstract:
Most existing fingerprints-based indoor localization approaches are based on some single fingerprints, such as received signal strength (RSS), channel impulse response (CIR), and signal subspace. However, the localization accuracy obtained by the single fingerprint approach is rather susceptible to the changing environment, multi-path, and non-line-of-sight (NLOS) propagation. Furthermore, buildin…
▽ More
Most existing fingerprints-based indoor localization approaches are based on some single fingerprints, such as received signal strength (RSS), channel impulse response (CIR), and signal subspace. However, the localization accuracy obtained by the single fingerprint approach is rather susceptible to the changing environment, multi-path, and non-line-of-sight (NLOS) propagation. Furthermore, building the fingerprints is a very time consuming process. In this paper, we propose a novel localization framework by Fusing A Group Of fingerprinTs (FAGOT) via multiple antennas for the indoor environment. We first build a GrOup Of Fingerprints (GOOF), which includes five different fingerprints, namely, RSS, covariance matrix, signal subspace, fractional low order moment, and fourth-order cumulant, which are obtained by different transformations of the received signals from multiple antennas in the offline stage. Then, we design a parallel GOOF multiple classifiers based on AdaBoost (GOOF-AdaBoost) to train each of these fingerprints in parallel as five strong multiple classifiers. In the online stage, we input the corresponding transformations of the real measurements into these strong classifiers to obtain independent decisions. Finally, we propose an efficient combination fusion algorithm, namely, MUltiple Classifiers mUltiple Samples (MUCUS) fusion algorithm to improve the accuracy of localization by combining the predictions of multiple classifiers with different samples. As compared with the single fingerprint approaches, the prediction probability of our proposed approach is improved significantly. The process for building fingerprints can also be reduced drastically. We demonstrate the feasibility and performance of the proposed algorithm through extensive simulations as well as via real experimental data using a Universal Software Radio Peripheral (USRP) platform with four antennas.
△ Less
Submitted 20 December, 2017; v1 submitted 1 September, 2016;
originally announced September 2016.
-
Green Cloudlet Network: A Distributed Green Mobile Cloud Network
Authors:
Xiang Sun,
Nirwan Ansari
Abstract:
This article introduces a Green Cloudlet Network (GCN) architecture in the context of mobile cloud computing. The proposed architecture is aimed at providing seamless and low End-to-End (E2E) delay between a User Equipment (UE) and its Avatar (its software clone) in the cloudlets to facilitate the application workloads offloading process. Furthermore, Software Define Networking (SDN) based core ne…
▽ More
This article introduces a Green Cloudlet Network (GCN) architecture in the context of mobile cloud computing. The proposed architecture is aimed at providing seamless and low End-to-End (E2E) delay between a User Equipment (UE) and its Avatar (its software clone) in the cloudlets to facilitate the application workloads offloading process. Furthermore, Software Define Networking (SDN) based core network is introduced in the GCN architecture by replacing the traditional Evolved Packet Core (EPC) in the LTE network in order to provide efficient communications connections between different end points. Cloudlet Network File System (CNFS) is designed based on the proposed architecture in order to protect Avatars' dataset against hardware failure and improve the Avatars' performance in terms of data access latency. Moreover, green energy supplement is proposed in the architecture in order to reduce the extra Operational Expenditure (OPEX) and CO2 footprint incurred by running the distributed cloudlets. Owing to the temporal and spatial dynamics of both the green energy generation and energy demands of Green Cloudlet Systems (GCSs), designing an optimal green energy management strategy based on the characteristics of the green energy generation and the energy demands of eNBs and cloudlets to minimize the on-grid energy consumption is critical to the cloudlet provider.
△ Less
Submitted 24 May, 2016; v1 submitted 24 May, 2016;
originally announced May 2016.
-
Content Caching and Distribution in Smart Grid Enabled Wireless Networks
Authors:
Xueqing Huang,
Nirwan Ansari
Abstract:
To facilitate wireless transmission of multimedia content to mobile users, we propose a content caching and distribution framework for smart grid enabled OFDM networks, where each popular multimedia file is coded and distributively stored in multiple energy harvesting enabled serving nodes (SNs), and the green energy distributively harvested by SNs can be shared with each other through the smart g…
▽ More
To facilitate wireless transmission of multimedia content to mobile users, we propose a content caching and distribution framework for smart grid enabled OFDM networks, where each popular multimedia file is coded and distributively stored in multiple energy harvesting enabled serving nodes (SNs), and the green energy distributively harvested by SNs can be shared with each other through the smart grid. The distributive caching, green energy sharing and the on-grid energy backup have improved the reliability and performance of the wireless multimedia downloading process. To minimize the total on-grid power consumption of the whole network, while guaranteeing that each user can retrieve the whole content, the user association scheme is jointly designed with consideration of resource allocation, including subchannel assignment, power allocation and power flow among nodes, where the user association scheme decides which SN serves which user. First, the optimal power allocated to each subchannel and the power flows among nodes are derived analytically. Then, the user association problem is decoupled from the subchannel assignment problem, and the proposed user association scheme has leveraged the multicasting nature of the content download process. To decide which subchannel is assigned to which node, the number of subchannels assigned to each node is first determined, according to the green energy generating rate and the associated traffic offload, and then the corresponding subchannels are selected from the total assigned system spectrum. Simulation results demonstrate that bringing content, green energy and serving node closer to the end user can notably reduce the on-grid energy consumption.
△ Less
Submitted 17 March, 2016;
originally announced March 2016.
-
PRIMAL: PRofIt Maximization Avatar pLacement for Mobile Edge Computing
Authors:
Xiang Sun,
Nirwan Ansari
Abstract:
We propose a cloudlet network architecture to bring the computing resources from the centralized cloud to the edge. Thus, each User Equipment (UE) can communicate with its Avatar, a software clone located in a cloudlet, with lower end-to-end (E2E) delay. However, UEs are moving over time, and so the low E2E delay may not be maintained if UEs' Avatars stay in their original cloudlets. Thus, live Av…
▽ More
We propose a cloudlet network architecture to bring the computing resources from the centralized cloud to the edge. Thus, each User Equipment (UE) can communicate with its Avatar, a software clone located in a cloudlet, with lower end-to-end (E2E) delay. However, UEs are moving over time, and so the low E2E delay may not be maintained if UEs' Avatars stay in their original cloudlets. Thus, live Avatar migration (i.e., migrating a UE's Avatar to a suitable cloudlet based on the UE's location) is enabled to maintain low E2E delay between each UE and its Avatar. On the other hand, the migration itself incurs extra overheads in terms of resources of the Avatar, which compromise the performance of applications running in the Avatar. By considering the gain (i.e., the E2E delay reduction) and the cost (i.e., the migration overheads) of the live Avatar migration, we propose a PRofIt Maximization Avatar pLacement (PRIMAL) strategy for the cloudlet network in order to optimize the tradeoff between the migration gain and the migration cost by selectively migrating the Avatars to their optimal locations. Simulation results demonstrate that as compared to the other two strategies (i.e., Follow Me Avatar and Static), PRIMAL maximizes the profit in terms of maintaining the low average E2E delay between UEs and their Avatars and minimizing the migration cost simultaneously.
△ Less
Submitted 14 October, 2015;
originally announced October 2015.
-
Design and Analysis of Green Optical Line Terminal for TDM Passive Optical Networks
Authors:
Mina Taheri,
Nirwan Ansari
Abstract:
This paper proposes a novel scheme which can efficiently reduce the energy consumption of Optical Line Terminals (OLTs) in Time Division Multiplexing (TDM) Passive Optical Networks (PONs) such as EPON and GPON. Currently, OLTs consume a significant amount of energy in PON, which is one of the major FTTx technologies. To be environmentally friendly, it is desirable to reduce energy consumption of O…
▽ More
This paper proposes a novel scheme which can efficiently reduce the energy consumption of Optical Line Terminals (OLTs) in Time Division Multiplexing (TDM) Passive Optical Networks (PONs) such as EPON and GPON. Currently, OLTs consume a significant amount of energy in PON, which is one of the major FTTx technologies. To be environmentally friendly, it is desirable to reduce energy consumption of OLT as much as possible; such requirement becomes even more urgent as OLT keeps increasing its provisioning data rate, and higher data rate provisioning usually implies higher energy consumption. In this paper, we propose a novel energy-efficient OLT structure which guarantees services of end users with the smallest number of power-on OLT line cards. More specifically, we adapt the number of power-on OLT line cards to the real-time incoming traffic. Also, in order to avoid service disruption resulted by powering off OLT line cards, proper optical switches are equipped in OLT to dynamically configure the communications between OLT line cards and ONUs.
△ Less
Submitted 24 August, 2015;
originally announced September 2015.