Skip to main content

Showing 1–4 of 4 results for author: Keshavarz-Haddad, A

.
  1. arXiv:1906.00284  [pdf, other

    cs.NI

    Proportional Fair RAT Aggregation in HetNets

    Authors: Ehsan Aryafar, Alireza Keshavarz-Haddad, Carlee Joe-Wong

    Abstract: Heterogeneity in wireless network architectures (i.e., the coexistence of 3G, LTE, 5G, WiFi, etc.) has become a key component of current and future generation cellular networks. Simultaneous aggregation of each client's traffic across multiple such radio access technologies (RATs) / base stations (BSs) can significantly increase the system throughput, and has become an important feature of cellula… ▽ More

    Submitted 1 June, 2019; originally announced June 2019.

    Comments: Extended version of the 31st International Teletraffic Congress (ITC 2019) conference paper

    ACM Class: C.2

  2. arXiv:1904.06576  [pdf, other

    cs.CR eess.SP

    Statistical-Based Privacy-Preserving Scheme with Malicious Consumers Identification for Smart Grid

    Authors: Alireza Ahadipour, Mojtaba Mohammadi, Alireza Keshavarz-Haddad

    Abstract: As smart grids are getting popular and being widely implemented, preserving the privacy of consumers is becoming more substantial. Power generation and pricing in smart grids depends on the continuously gathered information from the consumers. However, having access to the data relevant to the electricity consumption of each individual consumer is in conflict with its privacy. One common approach… ▽ More

    Submitted 15 May, 2019; v1 submitted 13 April, 2019; originally announced April 2019.

  3. arXiv:1804.01408  [pdf

    eess.SP

    Optimal Relay Location in Diffusion Based Molecular Communications

    Authors: Ghazaleh Ardeshiri, Ali Jamshidi, Alireza Keshavarz-Haddad

    Abstract: Molecular Communications via Diffusion (MCvD) is a promising paradigm which enables nano-machines to communicate with each other. However, the reliability of existing systems degrade rapidly as the distance between the transmitters and the receivers grows. To solve this issue, relaying schemes must be implemented in practice. In this paper, we study two relaying schemes: In the first case, the rel… ▽ More

    Submitted 2 April, 2018; originally announced April 2018.

    Comments: arXiv admin note: text overlap with arXiv:1401.3410, arXiv:1410.5585, arXiv:1504.03738, arXiv:1410.4258 by other authors

  4. arXiv:1310.3637  [pdf

    cs.NI cs.CR

    Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks

    Authors: Mohammad Reza Rohbanian, Mohammad Rafi Kharazmi, Alireza Keshavarz-Haddad, Manije Keshtgary

    Abstract: Wireless sensor network comprises of small sensor nodes with limited resources. Clustered networks have been proposed in many researches to reduce the power consumption in sensor networks. LEACH is one of the most interested techniques that offer an efficient way to minimize the power consumption in sensor networks. However, due to the characteristics of restricted resources and operation in a hos… ▽ More

    Submitted 14 October, 2013; originally announced October 2013.

    Journal ref: ACSIJ Advances in Computer Science: an International Journal 2 (2013) 105-117