-
Coordinated Deep Neural Networks: A Versatile Edge Offloading Algorithm
Authors:
Alireza Maleki,
Hamed Shah-Mansouri,
Babak H. Khalaj
Abstract:
As artificial intelligence (AI) applications continue to expand, there is a growing need for deep neural network (DNN) models. Although DNN models deployed at the edge are promising to provide AI as a service with low latency, their cooperation is yet to be explored. In this paper, we consider the DNN service providers share their computing resources as well as their models' parameters and allow o…
▽ More
As artificial intelligence (AI) applications continue to expand, there is a growing need for deep neural network (DNN) models. Although DNN models deployed at the edge are promising to provide AI as a service with low latency, their cooperation is yet to be explored. In this paper, we consider the DNN service providers share their computing resources as well as their models' parameters and allow other DNNs to offload their computations without mirroring. We propose a novel algorithm called coordinated DNNs on edge (\textbf{CoDE}) that facilitates coordination among DNN services by creating multi-task DNNs out of individual models. CoDE aims to find the optimal path that results in the lowest possible cost, where the cost reflects the inference delay, model accuracy, and local computation workload. With CoDE, DNN models can make new paths for inference by using their own or other models' parameters. We then evaluate the performance of CoDE through numerical experiments. The results demonstrate a $75\%$ reduction in the local service computation workload while degrading the accuracy by only $2\%$ and having the same inference time in a balanced load condition. Under heavy load, CoDE can further decrease the inference time by $30\%$ while the accuracy is reduced by only $4\%$.
△ Less
Submitted 31 December, 2023;
originally announced January 2024.
-
Out-Of-Domain Unlabeled Data Improves Generalization
Authors:
Amir Hossein Saberi,
Amir Najafi,
Alireza Heidari,
Mohammad Hosein Movasaghinia,
Abolfazl Motahari,
Babak H. Khalaj
Abstract:
We propose a novel framework for incorporating unlabeled data into semi-supervised classification problems, where scenarios involving the minimization of either i) adversarially robust or ii) non-robust loss functions have been considered. Notably, we allow the unlabeled samples to deviate slightly (in total variation sense) from the in-domain distribution. The core idea behind our framework is to…
▽ More
We propose a novel framework for incorporating unlabeled data into semi-supervised classification problems, where scenarios involving the minimization of either i) adversarially robust or ii) non-robust loss functions have been considered. Notably, we allow the unlabeled samples to deviate slightly (in total variation sense) from the in-domain distribution. The core idea behind our framework is to combine Distributionally Robust Optimization (DRO) with self-supervised training. As a result, we also leverage efficient polynomial-time algorithms for the training stage. From a theoretical standpoint, we apply our framework on the classification problem of a mixture of two Gaussians in $\mathbb{R}^d$, where in addition to the $m$ independent and labeled samples from the true distribution, a set of $n$ (usually with $n\gg m$) out of domain and unlabeled samples are given as well. Using only the labeled data, it is known that the generalization error can be bounded by $\propto\left(d/m\right)^{1/2}$. However, using our method on both isotropic and non-isotropic Gaussian mixture models, one can derive a new set of analytically explicit and non-asymptotic bounds which show substantial improvement on the generalization error compared to ERM. Our results underscore two significant insights: 1) out-of-domain samples, even when unlabeled, can be harnessed to narrow the generalization gap, provided that the true data distribution adheres to a form of the ``cluster assumption", and 2) the semi-supervised learning paradigm can be regarded as a special case of our framework when there are no distributional shifts. We validate our claims through experiments conducted on a variety of synthetic and real-world datasets.
△ Less
Submitted 15 February, 2024; v1 submitted 28 September, 2023;
originally announced October 2023.
-
Secure Deep-JSCC Against Multiple Eavesdroppers
Authors:
Seyyed Amirhossein Ameli Kalkhoran,
Mehdi Letafati,
Ecenaz Erdemir,
Babak Hossein Khalaj,
Hamid Behroozi,
Deniz Gündüz
Abstract:
In this paper, a generalization of deep learning-aided joint source channel coding (Deep-JSCC) approach to secure communications is studied. We propose an end-to-end (E2E) learning-based approach for secure communication against multiple eavesdroppers over complex-valued fading channels. Both scenarios of colluding and non-colluding eavesdroppers are studied. For the colluding strategy, eavesdropp…
▽ More
In this paper, a generalization of deep learning-aided joint source channel coding (Deep-JSCC) approach to secure communications is studied. We propose an end-to-end (E2E) learning-based approach for secure communication against multiple eavesdroppers over complex-valued fading channels. Both scenarios of colluding and non-colluding eavesdroppers are studied. For the colluding strategy, eavesdroppers share their logits to collaboratively infer private attributes based on ensemble learning method, while for the non-colluding setup they act alone. The goal is to prevent eavesdroppers from inferring private (sensitive) information about the transmitted images, while delivering the images to a legitimate receiver with minimum distortion. By generalizing the ideas of privacy funnel and wiretap channel coding, the trade-off between the image recovery at the legitimate node and the information leakage to the eavesdroppers is characterized. To solve this secrecy funnel framework, we implement deep neural networks (DNNs) to realize a data-driven secure communication scheme, without relying on a specific data distribution. Simulations over CIFAR-10 dataset verifies the secrecy-utility trade-off. Adversarial accuracy of eavesdroppers are also studied over Rayleigh fading, Nakagami-m, and AWGN channels to verify the generalization of the proposed scheme. Our experiments show that employing the proposed secure neural encoding can decrease the adversarial accuracy by 28%.
△ Less
Submitted 5 August, 2023;
originally announced August 2023.
-
Unlocking Metaverse-as-a-Service The three pillars to watch: Privacy and Security, Edge Computing, and Blockchain
Authors:
Vesal Ahsani,
Ali Rahimi,
Mehdi Letafati,
Babak Hossein Khalaj
Abstract:
In this article, the authors provide a comprehensive overview on three core pillars of metaverse-as-a-service (MaaS) platforms; privacy and security, edge computing, and blockchain technology. The article starts by investigating security aspects for the wireless access to the metaverse. Then it goes through the privacy and security issues inside the metaverse from data-centric, learning-centric, a…
▽ More
In this article, the authors provide a comprehensive overview on three core pillars of metaverse-as-a-service (MaaS) platforms; privacy and security, edge computing, and blockchain technology. The article starts by investigating security aspects for the wireless access to the metaverse. Then it goes through the privacy and security issues inside the metaverse from data-centric, learning-centric, and human-centric points-of-view. The authors address private and secure mechanisms for privatizing sensitive data attributes and securing machine learning algorithms running in a distributed manner within the metaverse platforms. Novel visions and less-investigated methods are reviewed to help mobile network operators and metaverse service providers facilitate the realization of secure and private MaaS through different layers of the metaverse, ranging from the access layer to the social interactions among clients. Later in the article, it has been explained how the paradigm of edge computing can strengthen different aspects of the metaverse. Along with that, the challenges of using edge computing in the metaverse have been comprehensively investigated. Additionally, the paper has comprehensively investigated and analyzed 10 main challenges of MaaS platforms and thoroughly discussed how blockchain technology provides solutions for these constraints. At the final, future vision and directions, such as content-centric security and zero-trust metaverse, some blockchain's unsolved challenges are also discussed to bring further insights for the network designers in the metaverse era.
△ Less
Submitted 11 January, 2023; v1 submitted 1 January, 2023;
originally announced January 2023.
-
Multi-Transmitter Coded Caching with Secure Delivery over Linear Networks -- Extended Version
Authors:
Mohammad Javad Sojdeh,
Mehdi Letafati,
Seyed Pooya Shariatpanahi,
Babak Hossein Khalaj
Abstract:
In this paper, we consider multiple cache-enabled end-users connected to multiple transmitters through a linear network. We also prevent a totally passive eavesdropper, who sniffs the packets in the delivery phase, from obtaining any information about the original files in cache-aided networks. Three different secure centralized multi-transmitter coded caching scenarios namely, secure multi-transm…
▽ More
In this paper, we consider multiple cache-enabled end-users connected to multiple transmitters through a linear network. We also prevent a totally passive eavesdropper, who sniffs the packets in the delivery phase, from obtaining any information about the original files in cache-aided networks. Three different secure centralized multi-transmitter coded caching scenarios namely, secure multi-transmitter coded caching, secure multi-transmitter coded caching with reduced subpacketization, and secure multi-transmitter coded caching with reduced feedback, are considered and closed-form coding delay and secret shared key storage expressions are provided. As our security guarantee, we show that the delivery phase does not reveal any information to the eavesdropper using the mutual information metric. Moreover, we investigate the secure decentralized multi-transmitter coded caching scenario, in which there is no cooperation between the clients and transmitters during the cache content placement phase and study its performance compared to the centralized scheme. We analyze the system's performance in terms of Coding Delay and guarantee the security of our presented schemes using the Mutual Information metric. Numerical evaluations verify that security incurs a negligible cost in terms of memory usage when the number of files and users are scaled up, in both centralized and decentralized scenarios. Also, we numerically show that by increasing the number of files and users, the secure coding delay of centralized and decentralized schemes became asymptotically equal.
△ Less
Submitted 26 November, 2022;
originally announced November 2022.
-
Sample Complexity Bounds for Learning High-dimensional Simplices in Noisy Regimes
Authors:
Amir Hossein Saberi,
Amir Najafi,
Seyed Abolfazl Motahari,
Babak H. Khalaj
Abstract:
In this paper, we find a sample complexity bound for learning a simplex from noisy samples. Assume a dataset of size $n$ is given which includes i.i.d. samples drawn from a uniform distribution over an unknown simplex in $\mathbb{R}^K$, where samples are assumed to be corrupted by a multi-variate additive Gaussian noise of an arbitrary magnitude. We prove the existence of an algorithm that with hi…
▽ More
In this paper, we find a sample complexity bound for learning a simplex from noisy samples. Assume a dataset of size $n$ is given which includes i.i.d. samples drawn from a uniform distribution over an unknown simplex in $\mathbb{R}^K$, where samples are assumed to be corrupted by a multi-variate additive Gaussian noise of an arbitrary magnitude. We prove the existence of an algorithm that with high probability outputs a simplex having a $\ell_2$ distance of at most $\varepsilon$ from the true simplex (for any $\varepsilon>0$). Also, we theoretically show that in order to achieve this bound, it is sufficient to have $n\ge\left(K^2/\varepsilon^2\right)e^{Ω\left(K/\mathrm{SNR}^2\right)}$ samples, where $\mathrm{SNR}$ stands for the signal-to-noise ratio. This result solves an important open problem and shows as long as $\mathrm{SNR}\geΩ\left(K^{1/2}\right)$, the sample complexity of the noisy regime has the same order to that of the noiseless case. Our proofs are a combination of the so-called sample compression technique in \citep{ashtiani2018nearly}, mathematical tools from high-dimensional geometry, and Fourier analysis. In particular, we have proposed a general Fourier-based technique for recovery of a more general class of distribution families from additive Gaussian noise, which can be further used in a variety of other related problems.
△ Less
Submitted 28 April, 2023; v1 submitted 9 September, 2022;
originally announced September 2022.
-
On Learning-Assisted Content-Based Secure Image Transmission for Delay-Aware Systems with Randomly-Distributed Eavesdroppers -- Extended Version
Authors:
Mehdi Letafati,
Hamid Behroozi,
Babak Hossein Khalaj,
Eduard A. Jorswieck
Abstract:
In this paper, a learning-aided content-based wireless image transmission scheme is proposed, where a multi-antenna-aided source wishes to securely deliver an image to a legitimate destination in the presence of randomly distributed eavesdroppers (Eves). We take into account the fact that not all regions of an image have the same importance from the security perspective. Hence, we propose a transm…
▽ More
In this paper, a learning-aided content-based wireless image transmission scheme is proposed, where a multi-antenna-aided source wishes to securely deliver an image to a legitimate destination in the presence of randomly distributed eavesdroppers (Eves). We take into account the fact that not all regions of an image have the same importance from the security perspective. Hence, we propose a transmission scheme, where the source employs a hybrid method to realize both the error-free data delivery of public regions containing less-important pixels; and an artificial noise (AN)-aided transmission scheme to provide security for the regions containing large amount of information. Moreover, in order to reinforce system's security, fountain-based packet delivery is adopted: First, the source node encodes image packets into fountain-like packets prior to sending them over the air. The secrecy of our proposed scheme will be achieved if the legitimate destination correctly receives the entire image source packets, while conforming to the latency limits of the system, before Eves can obtain the important regions. Accordingly, the secrecy performance of our scheme is characterized by deriving the closed-form expression for the quality-of-security (QoSec) violation probability. Moreover, our proposed wireless image delivery scheme leverages the deep neural network (DNN) and learns to maintain optimized transmission parameters, while achieving a low QoSec violation probability. Simulation results are provided with some useful engineering insights which illustrate that our proposed learning-assisted scheme outperforms the state-of-the-arts by achieving considerable gains in terms of security and the delay requirement.
△ Less
Submitted 19 April, 2021;
originally announced April 2021.
-
DRL-Based QoS-Aware Resource Allocation Scheme for Coexistence of Licensed and Unlicensed Users in LTE and Beyond
Authors:
Mahdi Nouri Boroujerdi,
Mohammad Akbari,
Roghayeh Joda,
Mohammad Ali Maddah-Ali,
Babak Hossein Khalaj
Abstract:
In this paper, we employ deep reinforcement learning to develop a novel radio resource allocation and packet scheduling scheme for different Quality of Service (QoS) requirements applicable to LTEadvanced and 5G networks. In addition, regarding the scarcity of spectrum in below 6GHz bands, the proposed algorithm dynamically allocates the resource blocks (RBs) to licensed users in a way to mostly p…
▽ More
In this paper, we employ deep reinforcement learning to develop a novel radio resource allocation and packet scheduling scheme for different Quality of Service (QoS) requirements applicable to LTEadvanced and 5G networks. In addition, regarding the scarcity of spectrum in below 6GHz bands, the proposed algorithm dynamically allocates the resource blocks (RBs) to licensed users in a way to mostly preserve the continuity of unallocated RBs. This would improve the efficiency of communication among the unlicensed entities by increasing the chance of uninterrupted communication and reducing the load of coordination overheads. The optimization problem is formulated as a Markov Decision Process (MDP), observing the entire queue of the demands, where failing to meet QoS constraints penalizes the goal with a multiplicative factor. Furthermore, a notion of continuity for unallocated resources is taken into account as an additive term in the objective function. Considering the variations in both channel coefficients and users requests, we utilize a deep reinforcement learning algorithm as an online and numerically efficient approach to solve the MDP. Numerical results show that the proposed method achieves higher average spectral efficiency, while considering delay budget and packet loss ratio, compared to the conventional greedy min-delay and max-throughput schemes, in which a fixed part of the spectrum is forced to be vacant for unlicensed entities.
△ Less
Submitted 16 August, 2020;
originally announced August 2020.
-
Energy Efficiency Through Joint Routing and Function Placement in Different Modes of SDN/NFV Networks
Authors:
Reza Moosavi,
Saeedeh Parsaeefard,
Mohammad Ali Maddah-Ali,
Vahid Shah-Mansouri,
Babak Hossein Khalaj,
Mehdi Bennis
Abstract:
Network function virtualization (NFV) and software defined networking (SDN) are two promising technologies to enable 5G and 6G services and achieve cost reduction, network scalability, and deployment flexibility.
However, migration to full SDN/NFV networks in order to serve these services is a time consuming process and costly for mobile operators. This paper focuses on energy efficiency during…
▽ More
Network function virtualization (NFV) and software defined networking (SDN) are two promising technologies to enable 5G and 6G services and achieve cost reduction, network scalability, and deployment flexibility.
However, migration to full SDN/NFV networks in order to serve these services is a time consuming process and costly for mobile operators. This paper focuses on energy efficiency during the transition of mobile core networks (MCN) to full SDN/NFV networks, and explores how energy efficiency can be addressed during such migration. We propose a general system model containing a combination of legacy nodes and links, in addition to newly introduced NFV and SDN nodes. We refer to this system model as partial SDN and hybrid NFV MCN which can cover different modes of SDN and NFV implementations. Based on this framework, we formulate energy efficiency by considering joint routing and function placement in the network. Since this problem belongs to the class of non-linear integer programming problems, to solve it efficiently, we present a modified Viterbi algorithm (MVA) based on multi-stage graph modeling and a modified Dijkstra's algorithm. We simulate this algorithm for a number of network scenarios with different fractions of NFV and SDN nodes, and evaluate how much energy can be saved through such transition. Simulation results confirm the expected performance of the algorithm which saves up to 70% energy compared to network where all nodes are always on. Interestingly, the amount of energy saved by the proposed algorithm in the case of hybrid NFV and partial SDN networks can reach up to 60-90% of the saved energy in full NFV/SDN networks.
△ Less
Submitted 17 October, 2020; v1 submitted 26 July, 2020;
originally announced July 2020.
-
Minimizing Uplink Delay in Delay-Sensitive 5G CRAN platforms
Authors:
Ali Ataie,
Borna Kanaanian,
Babak H. Khalaj
Abstract:
In this paper, we consider the problem of minimizing the uplink delays of users in a 5G cellular network. Such cellular network is based on a Cloud Radio Access Network (CRAN) architecture with limited fronthaul capacity, where our goal is to minimize delays of all users through an optimal resource allocation. Earlier works minimize average delay of each user assuming same transmit power for all u…
▽ More
In this paper, we consider the problem of minimizing the uplink delays of users in a 5G cellular network. Such cellular network is based on a Cloud Radio Access Network (CRAN) architecture with limited fronthaul capacity, where our goal is to minimize delays of all users through an optimal resource allocation. Earlier works minimize average delay of each user assuming same transmit power for all users. Combining Pareto optimization and Markov Decision Process (MDP), we show that every desired balance in the trade-off among infinite-horizon average-reward delays, is achievable by minimizing a properly weighted sum delays. In addition, we solve the problem in two realistic scenarios; considering both power control and different (random) service times for the users. In the latter scenario, we are able to define and minimize the more preferred criterion of total delay vs. average delay for each user. We will show that the resulting problem is equivalent to a discounted-reward infinite-horizon MDP. Simulations show significant improvement in terms of wider stability region for arrival rates in power-controlled scenario and considerably reduced sum of users total delays in the case of random service times.
△ Less
Submitted 15 April, 2019;
originally announced April 2019.
-
Cloud-Aided Interference Management with Cache-Enabled Edge Nodes and Users
Authors:
Seyed Pooya Shariatpanahi,
**g**g Zhang,
Osvaldo Simeone,
Babak Hossein Khalaj,
Mohammad-Ali Maddah-Ali
Abstract:
This paper considers a cloud-RAN architecture with cache-enabled multi-antenna Edge Nodes (ENs) that deliver content to cache-enabled end-users. The ENs are connected to a central server via limited-capacity fronthaul links, and, based on the information received from the central server and the cached contents, they transmit on the shared wireless medium to satisfy users' requests. By leveraging c…
▽ More
This paper considers a cloud-RAN architecture with cache-enabled multi-antenna Edge Nodes (ENs) that deliver content to cache-enabled end-users. The ENs are connected to a central server via limited-capacity fronthaul links, and, based on the information received from the central server and the cached contents, they transmit on the shared wireless medium to satisfy users' requests. By leveraging cooperative transmission as enabled by ENs' caches and fronthaul links, as well as multicasting opportunities provided by users' caches, a close-to-optimal caching and delivery scheme is proposed. As a result, the minimum Normalized Delivery Time (NDT), a high-SNR measure of delivery latency, is characterized to within a multiplicative constant gap of $3/2$ under the assumption of uncoded caching and fronthaul transmission, and of one-shot linear precoding. This result demonstrates the interplay among fronthaul links capacity, ENs' caches, and end-users' caches in minimizing the content delivery time.
△ Less
Submitted 20 January, 2019;
originally announced January 2019.
-
On Statistical Learning of Simplices: Unmixing Problem Revisited
Authors:
Amir Najafi,
Saeed Ilchi,
Amir H. Saberi,
Seyed Abolfazl Motahari,
Babak H. Khalaj,
Hamid R. Rabiee
Abstract:
We study the sample complexity of learning a high-dimensional simplex from a set of points uniformly sampled from its interior. Learning of simplices is a long studied problem in computer science and has applications in computational biology and remote sensing, mostly under the name of `spectral unmixing'. We theoretically show that a sufficient sample complexity for reliable learning of a $K$-dim…
▽ More
We study the sample complexity of learning a high-dimensional simplex from a set of points uniformly sampled from its interior. Learning of simplices is a long studied problem in computer science and has applications in computational biology and remote sensing, mostly under the name of `spectral unmixing'. We theoretically show that a sufficient sample complexity for reliable learning of a $K$-dimensional simplex up to a total-variation error of $ε$ is $O\left(\frac{K^2}ε\log\frac{K}ε\right)$, which yields a substantial improvement over existing bounds. Based on our new theoretical framework, we also propose a heuristic approach for the inference of simplices. Experimental results on synthetic and real-world datasets demonstrate a comparable performance for our method on noiseless samples, while we outperform the state-of-the-art in noisy cases.
△ Less
Submitted 12 August, 2020; v1 submitted 17 October, 2018;
originally announced October 2018.
-
$K$--User Interference Channel with Backhaul Cooperation: DoF vs. Backhaul Load Trade--Off
Authors:
Borna Kananian,
Mohammad Ali Maddah-ali,
Babak Hossein Khalaj
Abstract:
In this paper, we consider multiple-antenna $K$-user interference channels with backhaul collaboration in one side (among the transmitters or among the receivers) and investigate the trade-off between the rate in the channel versus the communication load in the backhaul. In this investigation, we focus on a first order approximation result, where the rate of the wireless channel is measured by the…
▽ More
In this paper, we consider multiple-antenna $K$-user interference channels with backhaul collaboration in one side (among the transmitters or among the receivers) and investigate the trade-off between the rate in the channel versus the communication load in the backhaul. In this investigation, we focus on a first order approximation result, where the rate of the wireless channel is measured by the degrees of freedom (DoF) per user, and the load of the backhaul is measured by the entropy of backhaul messages per user normalized by $\log$ of transmit power, at high power regimes. This trade-off is fully characterized for the case of even values of $K$, and approximately characterized for the case of odd values of $K$, with vanishing approximation gap as $K$ grows. For full DoF, this result establishes the optimality (approximately) of the most straightforward scheme, called Centralized Scheme, in which the messages are collected at one of the nodes, centrally processed, and forwarded back to each node. In addition, this result shows that the gain of the schemes, relying on distributed processing, through pairwise communication among the nodes (e.g., cooperative alignment) does not scale with the size of the network. For the converse, we develop a new outer-bound on the trade-off based on splitting the set of collaborative nodes (transmitters or receivers) into two subsets, and assuming full cooperation within each group. In continue, we further investigate the trade-off for the cases, where the backhaul or the wireless links (interference channel) are not fully connected.
△ Less
Submitted 23 July, 2018;
originally announced July 2018.
-
Optimum Transmission Delay for Function Computation in NFV-based Networks: the role of Network Coding and Redundant Computing
Authors:
Behrooz Tahmasebi,
Mohammad Ali Maddah-Ali,
Saeedeh Parsaeefard,
Babak Hossein Khalaj
Abstract:
In this paper, we study the problem of delay minimization in NFV-based networks. In such systems, the ultimate goal of any request is to compute a sequence of functions in the network, where each function can be computed at only a specific subset of network nodes. In conventional approaches, for each function, we choose one node from the corresponding subset of the nodes to compute that function.…
▽ More
In this paper, we study the problem of delay minimization in NFV-based networks. In such systems, the ultimate goal of any request is to compute a sequence of functions in the network, where each function can be computed at only a specific subset of network nodes. In conventional approaches, for each function, we choose one node from the corresponding subset of the nodes to compute that function. In contrast, in this work, we allow each function to be computed in more than one node, redundantly in parallel, to respond to a given request. We argue that such redundancy in computation not only improves the reliability of the network, but would also, perhaps surprisingly, reduce the overall transmission delay. In particular, we establish that by judiciously choosing the subset of nodes which compute each function, in conjunction with a linear network coding scheme to deliver the result of each computation, we can characterize and achieve the optimal end-to-end transmission delay. In addition, we show that using such technique, we can significantly reduce the transmission delay as compared to the conventional approach. In some scenarios, such reduction can even scale with the size of the network. More precisely, by increasing the number of nodes that can compute the given function in parallel by a multiplicative factor, the end-to-end delay will also decrease by the same factor. Moreover, we show that while finding the subset of nodes for each computation, in general, is a complex integer program, approximation algorithms can be proposed to reduce the computational complexity. In fact, for the case where the number of computing nodes for a given function is upper-bounded by a constant, a dynamic programming scheme can be proposed to find the optimum subsets in polynomial times. Our numerical simulations confirm the achieved gain in performance in comparison with conventional approaches.
△ Less
Submitted 11 September, 2018; v1 submitted 9 July, 2018;
originally announced July 2018.
-
Multi-agent Learning for Cooperative Large-scale Caching Networks
Authors:
Elahe Rezaei,
Hafez Eslami Manoochehri,
Babak Hossein Khalaj
Abstract:
Caching networks are designed to reduce traffic load at backhaul links, by serving demands from edge-nodes. In the past decades, many studies have been done to address the caching problem. However, in practice, finding an optimal caching policy is still challenging due to dynamicity of traffic and scalability caused by complex impact of caching strategy chosen by each individual cache on other par…
▽ More
Caching networks are designed to reduce traffic load at backhaul links, by serving demands from edge-nodes. In the past decades, many studies have been done to address the caching problem. However, in practice, finding an optimal caching policy is still challenging due to dynamicity of traffic and scalability caused by complex impact of caching strategy chosen by each individual cache on other parts of network. In this paper, we focus on cache placement to optimize the performance metrics such as hit ratio in cooperative large-scale caching networks. Our proposed solution, cooperative multi-agent based cache placement (CoM-Cache) is based on multi-agent reinforcement learning framework and can seamlessly track the content popularity dynamics in an on-line fashion. CoM-Cache is enable to solve the problems over a spectrum from isolated to interconnected caches and is designed flexibly to fit any caching networks. To deal with dimensionality issue, CoM-Cache exploits the property of locality of interactions among caches. The experimental results report CoM-Cache outperforms base-line schemes, however at the expense of reasonable additional complexity.
△ Less
Submitted 30 June, 2018;
originally announced July 2018.
-
On Multi-Server Coded Caching in the Low Memory Regime
Authors:
Seyed Pooya Shariatpanahi,
Babak Hossein Khalaj
Abstract:
In this paper we determine the delivery time for a multi-server coded caching problem when the cache size of each user is small. We propose an achievable scheme based on coded cache content placement, and employ zero-forcing techniques at the content delivery phase. Surprisingly, in contrast to previous multi-server results which were proved to be order-optimal within a multiplicative factor of 2,…
▽ More
In this paper we determine the delivery time for a multi-server coded caching problem when the cache size of each user is small. We propose an achievable scheme based on coded cache content placement, and employ zero-forcing techniques at the content delivery phase. Surprisingly, in contrast to previous multi-server results which were proved to be order-optimal within a multiplicative factor of 2, for the low memory regime we prove that our achievable scheme is optimal. Moreover, we compare the performance of our scheme with the uncoded solution, and show our proposal improvement over the uncoded scheme. Our results also apply to Degrees-of-Freedom (DoF) analysis of Multiple-Input Single-Output Broadcast Channels (MISO-BC) with cache-enabled users, where the multiple-antenna transmitter replaces the role of multiple servers. This shows that interference management in the low memory regime needs different caching techniques compared with medium-high memory regimes discussed in previous works.
△ Less
Submitted 20 March, 2018;
originally announced March 2018.
-
Physical-Layer Schemes for Wireless Coded Caching
Authors:
Seyed Pooya Shariatpanahi,
Giuseppe Caire,
Babak Hossein Khalaj
Abstract:
We investigate the potentials of applying the coded caching paradigm in wireless networks. In order to do this, we investigate physical layer schemes for downlink transmission from a multiantenna transmitter to several cache-enabled users. As the baseline scheme we consider employing coded caching on top of max-min fair multicasting, which is shown to be far from optimal at high SNR values. Our fi…
▽ More
We investigate the potentials of applying the coded caching paradigm in wireless networks. In order to do this, we investigate physical layer schemes for downlink transmission from a multiantenna transmitter to several cache-enabled users. As the baseline scheme we consider employing coded caching on top of max-min fair multicasting, which is shown to be far from optimal at high SNR values. Our first proposed scheme, which is near-optimal in terms of DoF, is the natural extension of multiserver coded caching to Gaussian channels. As we demonstrate, its finite SNR performance is not satisfactory, and thus we propose a new scheme in which the linear combination of messages is implemented in the finite field domain, and the one-shot precoding for the MISO downlink is implemented in the complex field. While this modification results in the same near-optimal DoF performance, we show that this leads to significant performance improvement at finite SNR. Finally, we extend our scheme to the previously considered cache-enabled interference channels, and moreover, we provide an Ergodic rate analysis of our scheme. Our results convey the important message that although directly translating schemes from the network coding ideas to wireless networks may work well at high SNR values, careful modifications need to be considered for acceptable finite SNR performance.
△ Less
Submitted 29 January, 2018; v1 submitted 16 November, 2017;
originally announced November 2017.
-
Multi-Antenna Coded Caching
Authors:
Seyed Pooya Shariatpanahi,
Giuseppe Caire,
Babak Hossein Khalaj
Abstract:
In this paper we consider a single-cell downlink scenario where a multiple-antenna base station delivers contents to multiple cache-enabled user terminals. Based on the multicasting opportunities provided by the so-called Coded Caching technique, we investigate three delivery approaches. Our baseline scheme employs the coded caching technique on top of max-min fair multicasting. The second one con…
▽ More
In this paper we consider a single-cell downlink scenario where a multiple-antenna base station delivers contents to multiple cache-enabled user terminals. Based on the multicasting opportunities provided by the so-called Coded Caching technique, we investigate three delivery approaches. Our baseline scheme employs the coded caching technique on top of max-min fair multicasting. The second one consists of a joint design of Zero-Forcing (ZF) and coded caching, where the coded chunks are formed in the signal domain (complex field). The third scheme is similar to the second one with the difference that the coded chunks are formed in the data domain (finite field). We derive closed-form rate expressions where our results suggest that the latter two schemes surpass the first one in terms of Degrees of Freedom (DoF). However, at the intermediate SNR regime forming coded chunks in the signal domain results in power loss, and will deteriorate throughput of the second scheme. The main message of our paper is that the schemes performing well in terms of DoF may not be directly appropriate for intermediate SNR regimes, and modified schemes should be employed.
△ Less
Submitted 11 January, 2017;
originally announced January 2017.
-
On Storage Allocation in Cache-Enabled Interference Channels with Mixed CSIT
Authors:
Mohammad Ali Tahmasbi Nejad,
Seyed Pooya Shariatpanahi,
Babak Hossein Khalaj
Abstract:
Recently, it has been shown that in a cache-enabled interference channel, the storage at the transmit and receive sides are of equal value in terms of Degrees of Freedom (DoF). This is derived by assuming full Channel State Information at the Transmitter (CSIT). In this paper, we consider a more practical scenario, where a training/feedback phase should exist for obtaining CSIT, during which insta…
▽ More
Recently, it has been shown that in a cache-enabled interference channel, the storage at the transmit and receive sides are of equal value in terms of Degrees of Freedom (DoF). This is derived by assuming full Channel State Information at the Transmitter (CSIT). In this paper, we consider a more practical scenario, where a training/feedback phase should exist for obtaining CSIT, during which instantaneous channel state is not known to the transmitters. This results in a combination of delayed and current CSIT availability, called mixed CSIT. In this setup, we derive DoF of a cache-enabled interference channel with mixed CSIT, which depends on the memory available at transmit and receive sides as well as the training/feedback phase duration. In contrast to the case of having full CSIT, we prove that, in our setup, the storage at the receive side is more valuable than the one at the transmit side. This is due to the fact that cooperation opportunities granted by transmitters' caches are strongly based on instantaneous CSIT availability. However, multi-casting opportunities provided by receivers' caches are robust to such imperfection.
△ Less
Submitted 21 January, 2017; v1 submitted 20 November, 2016;
originally announced November 2016.
-
Joint Cell Muting and User Scheduling in Multi-Cell Networks with Temporal Fairness
Authors:
Shahram Shahsavari,
Nail Akar,
Babak Hossein Khalaj
Abstract:
A semi-centralized joint cell muting and user scheduling scheme for interference coordination in a multicell network is proposed under two different temporal fairness criteria. The main principle behind the proposed scheme is that a central entity selects a cell muting pattern out of a pattern set at a decision instant, and subsequently the un-muted base stations opportunistically schedule the use…
▽ More
A semi-centralized joint cell muting and user scheduling scheme for interference coordination in a multicell network is proposed under two different temporal fairness criteria. The main principle behind the proposed scheme is that a central entity selects a cell muting pattern out of a pattern set at a decision instant, and subsequently the un-muted base stations opportunistically schedule the users in the associated cells, both decisions made on a temporal-fair basis. Although some pattern sets are easily obtainable from static frequency reuse systems, we propose a more general pattern set construction algorithm in this paper. As for the first fairness criterion, all cells are assigned to receive the same temporal share with the ratio between the temporal share of a cell center section and that of the cell edge section is set to a fixed desired value for all cells. The second fairness criterion is based on the max-min temporal fairness for which the temporal share of the network-wide worst-case user is maximized. Numerical results are provided to validate the effectiveness of the proposed scheme for both criteria. The impact of choice of the cell muting pattern set is also studied through numerical examples for various cellular topologies.
△ Less
Submitted 4 July, 2017; v1 submitted 27 September, 2016;
originally announced September 2016.
-
Fundamental Limits of Pooled-DNA Sequencing
Authors:
Amir Najafi,
Damoun Nashta-ali,
Seyed Abolfazl Motahari,
Mehrdad Khani,
Babak H. Khalaj,
Hamid R. Rabiee
Abstract:
In this paper, fundamental limits in sequencing of a set of closely related DNA molecules are addressed. This problem is called pooled-DNA sequencing which encompasses many interesting problems such as haplotype phasing, metageomics, and conventional pooled-DNA sequencing in the absence of tagging. From an information theoretic point of view, we have proposed fundamental limits on the number and l…
▽ More
In this paper, fundamental limits in sequencing of a set of closely related DNA molecules are addressed. This problem is called pooled-DNA sequencing which encompasses many interesting problems such as haplotype phasing, metageomics, and conventional pooled-DNA sequencing in the absence of tagging. From an information theoretic point of view, we have proposed fundamental limits on the number and length of DNA reads in order to achieve a reliable assembly of all the pooled DNA sequences. In particular, pooled-DNA sequencing from both noiseless and noisy reads are investigated in this paper. In the noiseless case, necessary and sufficient conditions on perfect assembly are derived. Moreover, asymptotically tight lower and upper bounds on the error probability of correct assembly are obtained under a biologically plausible probabilistic model. For the noisy case, we have proposed two novel DNA read denoising methods, as well as corresponding upper bounds on assembly error probabilities. It has been shown that, under mild circumstances, the performance of the reliable assembly converges to that of the noiseless regime when, for a given read length, the number of DNA reads is sufficiently large. Interestingly, the emergence of long DNA read technologies in recent years envisions the applicability of our results in real-world applications.
△ Less
Submitted 19 April, 2016; v1 submitted 16 April, 2016;
originally announced April 2016.
-
Multi-Server Coded Caching
Authors:
Seyed Pooya Shariatpanahi,
Seyed Abolfazl Motahari,
Babak Hossein Khalaj
Abstract:
In this paper, we consider multiple cache-enabled clients connected to multiple servers through an intermediate network. We design several topology-aware coding strategies for such networks. Based on topology richness of the intermediate network, and types of coding operations at internal nodes, we define three classes of networks, namely, dedicated, flexible, and linear networks. For each class,…
▽ More
In this paper, we consider multiple cache-enabled clients connected to multiple servers through an intermediate network. We design several topology-aware coding strategies for such networks. Based on topology richness of the intermediate network, and types of coding operations at internal nodes, we define three classes of networks, namely, dedicated, flexible, and linear networks. For each class, we propose an achievable coding scheme, analyze its coding delay, and also, compare it with an information theoretic lower bound. For flexible networks, we show that our scheme is order-optimal in terms of coding delay and, interestingly, the optimal memory-delay curve is achieved in certain regimes. In general, our results suggest that, in case of networks with multiple servers, type of network topology can be exploited to reduce service delay.
△ Less
Submitted 1 March, 2015;
originally announced March 2015.
-
Incentive Design and Market Evolution of Mobile User-Provided Networks
Authors:
Mohammad Mahdi Khalili,
Lin Gao,
Jianwei Huang,
Babak Hossein Khalaj
Abstract:
An operator-assisted user-provided network (UPN) has the potential to achieve a low cost ubiquitous Internet connectivity, without significantly increasing the network infrastructure investment. In this paper, we consider such a network where the network operator encourages some of her subscribers to operate as mobile Wi-Fi hotspots (hosts), providing Internet connectivity for other subscribers (c…
▽ More
An operator-assisted user-provided network (UPN) has the potential to achieve a low cost ubiquitous Internet connectivity, without significantly increasing the network infrastructure investment. In this paper, we consider such a network where the network operator encourages some of her subscribers to operate as mobile Wi-Fi hotspots (hosts), providing Internet connectivity for other subscribers (clients). We formulate the interaction between the operator and mobile users as a two-stage game. In Stage I, the operator determines the usage-based pricing and quota-based incentive mechanism for the data usage. In Stage II, the mobile users make their decisions about whether to be a host, or a client, or not a subscriber at all. We characterize how the users' membership choices will affect each other's payoffs in Stage II, and how the operator optimizes her decision in Stage I to maximize her profit. Our theoretical and numerical results show that the operator's maximum profit increases with the user density under the proposed hybrid pricing mechanism, and the profit gain can be up to 50\% in a dense network comparing with a pricing-only approach with no incentives.
△ Less
Submitted 19 April, 2015; v1 submitted 23 February, 2015;
originally announced February 2015.
-
ABMQ: An Agent-Based Modeler and Simulator for Self-Organization in MANETs using Qt
Authors:
Mohammad Noormohammadpour,
Mohammad Javad Salehi,
Seyed Mohammad Asghari Pari,
Babak Hossein Khalaj,
Hamidreza Bagheri,
Marcos Katz
Abstract:
Agent-Based Modeling and Simulation (ABMS) is a simple and yet powerful method for simulation of interactions among individual agents. Using ABMS, different phenomena can be modeled and simulated without spending additional time on unnecessary complexities. Although ABMS is well-matured in many different fields such as economic, social, and natural phenomena, it has not received much attention in…
▽ More
Agent-Based Modeling and Simulation (ABMS) is a simple and yet powerful method for simulation of interactions among individual agents. Using ABMS, different phenomena can be modeled and simulated without spending additional time on unnecessary complexities. Although ABMS is well-matured in many different fields such as economic, social, and natural phenomena, it has not received much attention in the context of mobile ad-hoc networks (MANETs). In this paper, we present ABMQ, a powerful Agent-Based platform suitable for modeling and simulation of self-organization in wireless networks, and particularly MANETs. By utilizing the unique potentials of Qt Application Framework, ABMQ provides the ability to easily model and simulate self-organizing algorithms, and then reuse the codes and models developed during simulation process for building real third-party applications for several desktop and mobile platforms, which substantially decreases the development time and cost, and prevents probable bugs that can happen as a result of rewriting codes.
△ Less
Submitted 8 December, 2013;
originally announced December 2013.
-
Caching Gain in Wireless Networks with Fading: A Multi-User Diversity Perspective
Authors:
Seyed Pooya Shariatpanahi,
Hamed Shah-Mansouri,
Babak Hossein Khalaj
Abstract:
We consider the effect of caching in wireless networks where fading is the dominant channel effect. First, we propose a one-hop transmission strategy for cache-enabled wireless networks, which is based on exploiting multi-user diversity gain. Then, we derive a closed-form result for throughput scaling of the proposed scheme in large networks, which reveals the inherent trade-off between cache memo…
▽ More
We consider the effect of caching in wireless networks where fading is the dominant channel effect. First, we propose a one-hop transmission strategy for cache-enabled wireless networks, which is based on exploiting multi-user diversity gain. Then, we derive a closed-form result for throughput scaling of the proposed scheme in large networks, which reveals the inherent trade-off between cache memory size and network throughput. Our results show that substantial throughput improvements are achievable in networks with sources equipped with large cache size. We also verify our analytical result through simulations.
△ Less
Submitted 31 August, 2013;
originally announced September 2013.
-
Throughput of One-Hop Wireless Networks with Noisy Feedback Channel
Authors:
Seyed Pooya Shariatpanahi,
Hamed Shah-Mansouri,
Babak Hossein Khalaj
Abstract:
In this paper, we consider the effect of feedback channel error on the throughput of one-hop wireless networks under the random connection model. The transmission strategy is based on activating source-destination pairs with strongest direct links. While these activated pairs are identified based on Channel State Information (CSI) at the receive side, the transmit side will be provided with a nois…
▽ More
In this paper, we consider the effect of feedback channel error on the throughput of one-hop wireless networks under the random connection model. The transmission strategy is based on activating source-destination pairs with strongest direct links. While these activated pairs are identified based on Channel State Information (CSI) at the receive side, the transmit side will be provided with a noisy version of this information via the feedback channel. Such error will degrade network throughput, as we investigate in this paper. Our results show that if the feedback error probability is below a given threshold, network can tolerate such error without any significant throughput loss. The threshold value depends on the number of nodes in the network and the channel fading distribution. Such analysis is crucial in design of error correction codes for feedback channel in such networks.
△ Less
Submitted 11 August, 2013;
originally announced August 2013.
-
LORD: Leader-based framework for Resource Discovery in Mobile Device Clouds
Authors:
Seyed Mohammad Asghari,
Yi-Hsuan Kao,
Mohammad Hassan Lotfi,
Mohammad Noormohammadpour,
Bhaskar Krishnamachari,
Babak Hossein Khalaj,
Marcos Katz
Abstract:
We provide a novel solution for Resource Discovery (RD) in mobile device clouds consisting of selfish nodes. Mobile device clouds (MDCs) refer to cooperative arrangement of communication-capable devices formed with resource-sharing goal in mind. Our work is motivated by the observation that with ever-growing applications of MDCs, it is essential to quickly locate resources offered in such clouds,…
▽ More
We provide a novel solution for Resource Discovery (RD) in mobile device clouds consisting of selfish nodes. Mobile device clouds (MDCs) refer to cooperative arrangement of communication-capable devices formed with resource-sharing goal in mind. Our work is motivated by the observation that with ever-growing applications of MDCs, it is essential to quickly locate resources offered in such clouds, where the resources could be content, computing resources, or communication resources. The current approaches for RD can be categorized into two models: decentralized model, where RD is handled by each node individually; and centralized model, where RD is assisted by centralized entities like cellular network. However, we propose LORD, a Leader-based framewOrk for RD in MDCs which is not only self-organized and not prone to having a single point of failure like the centralized model, but also is able to balance the energy consumption among MDC participants better than the decentralized model. Moreover, we provide a credit-based incentive to motivate participation of selfish nodes in the leader selection process, and present the first energy-aware leader selection mechanism for credit-based models. The simulation results demonstrate that LORD balances energy consumption among nodes and prolongs overall network lifetime compared to decentralized model.
△ Less
Submitted 16 April, 2017; v1 submitted 5 August, 2013;
originally announced August 2013.
-
Throughput of Large One-hop Wireless Networks with General Fading
Authors:
Seyed Pooya Shariatpanahi,
Babak Hossein Khalaj,
Kasra Alishahi,
Hamed Shah-Mansouri
Abstract:
Consider $n$ source-destination pairs randomly located in a shared wireless medium, resulting in interference between different transmissions. All wireless links are modeled by independently and identically distributed (i.i.d.) random variables, indicating that the dominant channel effect is the random fading phenomenon. We characterize the throughput of one-hop communication in such network. Firs…
▽ More
Consider $n$ source-destination pairs randomly located in a shared wireless medium, resulting in interference between different transmissions. All wireless links are modeled by independently and identically distributed (i.i.d.) random variables, indicating that the dominant channel effect is the random fading phenomenon. We characterize the throughput of one-hop communication in such network. First, we present a closed-form expression for throughput scaling of a heuristic strategy, for a completely general channel power distribution. This heuristic strategy is based on activating the source-destination pairs with the best direct links, and forcing the others to be silent. Then, we present the results for several common examples, namely, Gamma (Nakagami-$m$ fading), Weibull, Pareto, and Log-normal channel power distributions. Finally -- by proposing an upper bound on throughput of all possible strategies for super-exponential distributions -- we prove that the aforementioned heuristic method is order-optimal for Nakagami-$m$ fading.
△ Less
Submitted 22 June, 2013;
originally announced June 2013.
-
A Geometric Approach For Fully Automatic Chromosome Segmentation
Authors:
Shervin Minaee,
Mehran Fotouhi,
Babak Hossein Khalaj
Abstract:
A fundamental task in human chromosome analysis is chromosome segmentation. Segmentation plays an important role in chromosome karyoty**. The first step in segmentation is to remove intrusive objects such as stain debris and other noises. The next step is detection of touching and overlap** chromosomes, and the final step is separation of such chromosomes. Common methods for separation between…
▽ More
A fundamental task in human chromosome analysis is chromosome segmentation. Segmentation plays an important role in chromosome karyoty**. The first step in segmentation is to remove intrusive objects such as stain debris and other noises. The next step is detection of touching and overlap** chromosomes, and the final step is separation of such chromosomes. Common methods for separation between touching chromosomes are interactive and require human intervention for correct separation between touching and overlap** chromosomes. In this paper, a geometric-based method is used for automatic detection of touching and overlap** chromosomes and separating them. The proposed scheme performs segmentation in two phases. In the first phase, chromosome clusters are detected using three geometric criteria, and in the second phase, chromosome clusters are separated using a cut-line. Most of earlier methods did not work properly in case of chromosome clusters that contained more than two chromosomes. Our method, on the other hand, is quite efficient in separation of such chromosome clusters. At each step, one separation will be performed and this algorithm is repeated until all individual chromosomes are separated. Another important point about the proposed method is that it uses the geometric features of chromosomes which are independent of the type of images and it can easily be applied to any type of images such as binary images and does not require multispectral images as well. We have applied our method to a database containing 62 touching and partially overlap** chromosomes and a success rate of 91.9% is achieved.
△ Less
Submitted 1 September, 2014; v1 submitted 18 December, 2011;
originally announced December 2011.
-
One-Hop Throughput of Wireless Networks with Random Connections
Authors:
Seyed Pooya Shariatpanahi,
Babak Hossein Khalaj,
Kasra Alishahi,
Hamed Shah-Mansouri
Abstract:
We consider one-hop communication in wireless networks with random connections. In the random connection model, the channel powers between different nodes are drawn from a common distribution in an i.i.d. manner. An scheme achieving the throughput scaling of order $n^{1/3-δ}$, for any $δ>0$, is proposed, where $n$ is the number of nodes. Such achievable throughput, along with the order $n^{1/3}$ u…
▽ More
We consider one-hop communication in wireless networks with random connections. In the random connection model, the channel powers between different nodes are drawn from a common distribution in an i.i.d. manner. An scheme achieving the throughput scaling of order $n^{1/3-δ}$, for any $δ>0$, is proposed, where $n$ is the number of nodes. Such achievable throughput, along with the order $n^{1/3}$ upper bound derived by Cui et al., characterizes the throughput capacity of one-hop schemes for the class of connection models with finite mean and variance.
△ Less
Submitted 8 November, 2011;
originally announced November 2011.
-
Delay Constrained Utility Maximization in Multihop Random Access Networks
Authors:
Amir M. Khodaian,
Babak H. Khalaj
Abstract:
Multi-hop random access networks have received much attention due to their distributed nature which facilitates deploying many new applications over the sensor and computer networks. Recently, utility maximization framework is applied in order to optimize performance of such networks, however proposed algorithms result in large transmission delays. In this paper, we will analyze delay in random ac…
▽ More
Multi-hop random access networks have received much attention due to their distributed nature which facilitates deploying many new applications over the sensor and computer networks. Recently, utility maximization framework is applied in order to optimize performance of such networks, however proposed algorithms result in large transmission delays. In this paper, we will analyze delay in random access multi-hop networks and solve the delay-constrained utility maximization problem. We define the network utility as a combination of rate utility and energy cost functions and solve the following two problems: 'optimal medium access control with link delay constraint' and, 'optimal congestion and contention control with end-to-end delay constraint'. The optimal tradeoff between delay, rate, and energy is achieved for different values of delay constraint and the scaling factors between rate and energy. Eventually linear and super-linear distributed optimization solutions are proposed for each problem and their performance are compared in terms of convergence and complexity.
△ Less
Submitted 23 November, 2010;
originally announced November 2010.
-
Utility Constrained Energy Minimization In Aloha Networks
Authors:
Amir Mahdi Khodaian,
Babak H. Khalaj,
Mohammad S. Talebi
Abstract:
In this paper we consider the issue of energy efficiency in random access networks and show that optimizing transmission probabilities of nodes can enhance network performance in terms of energy consumption and fairness. First, we propose a heuristic power control method that improves throughput, and then we model the Utility Constrained Energy Minimization (UCEM) problem in which the utility cons…
▽ More
In this paper we consider the issue of energy efficiency in random access networks and show that optimizing transmission probabilities of nodes can enhance network performance in terms of energy consumption and fairness. First, we propose a heuristic power control method that improves throughput, and then we model the Utility Constrained Energy Minimization (UCEM) problem in which the utility constraint takes into account single and multi node performance. UCEM is modeled as a convex optimization problem and Sequential Quadratic Programming (SQP) is used to find optimal transmission probabilities. Numerical results show that our method can achieve fairness, reduce energy consumption and enhance lifetime of such networks.
△ Less
Submitted 23 November, 2010;
originally announced November 2010.
-
Energy and Utility Optimization in Wireless Networks with Random Access
Authors:
Amirmahdi Khodaian,
Babak H. Khalaj
Abstract:
Energy consumption is a main issue of concern in wireless networks. Energy minimization increases the time that networks' nodes work properly without recharging or substituting batteries. Another criterion for network performance is data transmission rate which is usually quantified by a network utility function. There exists an inherent tradeoff between these criteria and enhancing one of them…
▽ More
Energy consumption is a main issue of concern in wireless networks. Energy minimization increases the time that networks' nodes work properly without recharging or substituting batteries. Another criterion for network performance is data transmission rate which is usually quantified by a network utility function. There exists an inherent tradeoff between these criteria and enhancing one of them can deteriorate the other one. In this paper, we consider both Network Utility Maximization (NUM) and energy minimization in a bi-criterion optimization problem. The problem is formulated for Random Access (RA) Medium Access Control (MAC) for ad-hoc networks. First, we optimize performance of the MAC and define utility as a monotonically increasing function of link throughputs. We investigate the optimal tradeoff between energy and utility in this part. In the second part, we define utility as a function of end to end rates and optimize MAC and transport layers simultaneously. We calculate optimal persistence probabilities and end-to-end rates. Finally, by means of duality theorem, we decompose the problem into smaller subproblems, which are solved at node and network layers separately. This decomposition avoids need for a central unit while sustaining benefits of layering.
△ Less
Submitted 23 November, 2010;
originally announced November 2010.
-
Optimal Utility-Energy tradeoff in Delay Constrained Random Access Networks
Authors:
Amir Mahdi Khodaian,
Babak H. Khalaj,
Hamed Shah-mansouri
Abstract:
Rate, energy and delay are three main parameters of interest in ad-hoc networks. In this paper, we discuss the problem of maximizing network utility and minimizing energy consumption while satisfying a given transmission delay constraint for each packet. We formulate this problem in the standard convex optimization form and subsequently discuss the tradeoff between utility, energy and delay in suc…
▽ More
Rate, energy and delay are three main parameters of interest in ad-hoc networks. In this paper, we discuss the problem of maximizing network utility and minimizing energy consumption while satisfying a given transmission delay constraint for each packet. We formulate this problem in the standard convex optimization form and subsequently discuss the tradeoff between utility, energy and delay in such framework. Also, in order to adapt for the distributed nature of the network, a distributed algorithm where nodes decide on choosing transmission rates and probabilities based on their local information is introduced.
△ Less
Submitted 23 November, 2010;
originally announced November 2010.
-
State-Based Random Access: A Cross-Layer Approach
Authors:
Amir Mahdy Khodaian,
Babak H. Khalaj
Abstract:
In this paper, we propose novel state-based algorithms which dynamically control the random access network based on its current state such as channel states of wireless links and backlog states of the queues. After formulating the problem, corresponding algorithms with diverse control functions are proposed. Consequently, it will be shown that the proposed state-based schemes for control of the ra…
▽ More
In this paper, we propose novel state-based algorithms which dynamically control the random access network based on its current state such as channel states of wireless links and backlog states of the queues. After formulating the problem, corresponding algorithms with diverse control functions are proposed. Consequently, it will be shown that the proposed state-based schemes for control of the random access networks, results in significant performance gains in comparison with previously proposed control algorithms. In order to select an appropriate control function, performances of the state-based control algorithms are compared for a wide range of traffic scenarios. It is also shown that even an approximate knowledge of network statistics helps in selecting the proper state dependent control function.
△ Less
Submitted 23 November, 2010;
originally announced November 2010.
-
Delay-Constrained Utility Maximization in Multihop Random Access Networks
Authors:
Amir M. Khodaian,
Babak H. Khalaj
Abstract:
Multi-hop random access networks have received much attention due to their distributed nature which facilitates deploying many new applications over the sensor and computer networks. Recently, utility maximization framework is applied in order to optimize performance of such networks however delay is not limited and proposed algorithms result in very large transmission delays. In this paper, we…
▽ More
Multi-hop random access networks have received much attention due to their distributed nature which facilitates deploying many new applications over the sensor and computer networks. Recently, utility maximization framework is applied in order to optimize performance of such networks however delay is not limited and proposed algorithms result in very large transmission delays. In this paper, we will analyze delay in random access multi-hop networks and solve the delay-constrained utility maximization problem. We define the network utility as a combination of rate utility and energy cost functions and solve the following two problems: 'optimal medium access control with link delay constraint' and, 'optimal congestion and contention control with end-to-end delay constraint'. The optimal tradeoff between delay, rate, and energy is achieved for different values of delay constraint and the scaling factors between rate and energy. Different distributed solutions will be proposed for each problem and their performance will be compared in terms of convergence and complexity.
△ Less
Submitted 22 December, 2009;
originally announced December 2009.
-
Cooperative Transmission for Wireless Relay Networks Using Limited Feedback
Authors:
Javier M. Paredes,
Babak H. Khalaj,
Alex B. Gershman
Abstract:
To achieve the available performance gains in half-duplex wireless relay networks, several cooperative schemes have been earlier proposed using either distributed space-time coding or distributed beamforming for the transmitter without and with channel state information (CSI), respectively. However, these schemes typically have rather high implementation and/or decoding complexities, especially…
▽ More
To achieve the available performance gains in half-duplex wireless relay networks, several cooperative schemes have been earlier proposed using either distributed space-time coding or distributed beamforming for the transmitter without and with channel state information (CSI), respectively. However, these schemes typically have rather high implementation and/or decoding complexities, especially when the number of relays is high. In this paper, we propose a simple low-rate feedback-based approach to achieve maximum diversity with a low decoding and implementation complexity. To further improve the performance of the proposed scheme, the knowledge of the second-order channel statistics is exploited to design long-term power loading through maximizing the receiver signal-to-noise ratio (SNR) with appropriate constraints. This maximization problem is approximated by a convex feasibility problem whose solution is shown to be close to the optimal one in terms of the error probability. Subsequently, to provide robustness against feedback errors and further decrease the feedback rate, an extended version of the distributed Alamouti code is proposed. It is also shown that our scheme can be generalized to the differential transmission case, where it can be applied to wireless relay networks with no CSI available at the receiver.
△ Less
Submitted 29 July, 2009; v1 submitted 8 April, 2009;
originally announced April 2009.
-
A Unified Approach to Sparse Signal Processing
Authors:
F. Marvasti,
A. Amini,
F. Haddadi,
M. Soltanolkotabi,
B. H. Khalaj,
A. Aldroubi,
S. Holm,
S. Sanei,
J. Chambers
Abstract:
A unified view of sparse signal processing is presented in tutorial form by bringing together various fields. For each of these fields, various algorithms and techniques, which have been developed to leverage sparsity, are described succinctly. The common benefits of significant reduction in sampling rate and processing manipulations are revealed.
The key applications of sparse signal processi…
▽ More
A unified view of sparse signal processing is presented in tutorial form by bringing together various fields. For each of these fields, various algorithms and techniques, which have been developed to leverage sparsity, are described succinctly. The common benefits of significant reduction in sampling rate and processing manipulations are revealed.
The key applications of sparse signal processing are sampling, coding, spectral estimation, array processing, component analysis, and multipath channel estimation. In terms of reconstruction algorithms, linkages are made with random sampling, compressed sensing and rate of innovation. The redundancy introduced by channel coding in finite/real Galois fields is then related to sampling with similar reconstruction algorithms. The methods of Prony, Pisarenko, and MUSIC are next discussed for sparse frequency domain representations. Specifically, the relations of the approach of Prony to an annihilating filter and Error Locator Polynomials in coding are emphasized; the Pisarenko and MUSIC methods are further improvements of the Prony method. Such spectral estimation methods is then related to multi-source location and DOA estimation in array processing. The notions of sparse array beamforming and sparse sensor networks are also introduced. Sparsity in unobservable source signals is also shown to facilitate source separation in SCA; the algorithms developed in this area are also widely used in compressed sensing. Finally, the multipath channel estimation problem is shown to have a sparse formulation; algorithms similar to sampling and coding are used to estimate OFDM channels.
△ Less
Submitted 11 February, 2009;
originally announced February 2009.