-
Inflationary Gravitational Waves as a probe of the unknown post-inflationary primordial Universe
Authors:
Athul K. Soman,
Swagat S. Mishra,
Mohammed Shafi,
Soumen Basak
Abstract:
One of the key predictions of the standard inflationary paradigm is the quantum mechanical generation of the transverse and traceless tensor fluctuations due to the rapid accelerated expansion of space, which later constitute a stochastic background of primordial gravitational waves (GWs). The amplitude of the (nearly) scale-invariant inflationary tensor power spectrum at large scales provides us…
▽ More
One of the key predictions of the standard inflationary paradigm is the quantum mechanical generation of the transverse and traceless tensor fluctuations due to the rapid accelerated expansion of space, which later constitute a stochastic background of primordial gravitational waves (GWs). The amplitude of the (nearly) scale-invariant inflationary tensor power spectrum at large scales provides us with crucial information about the energy scale of inflation in the case of the minimal inflaton coupling to gravity. Furthermore, the spectral energy density, $Ω_{_{\rm GW}}(f)$, of the GWs at sufficiently small scales (or, large frequencies $f$) serves as an important observational probe of post-inflationary primordial dynamics. In fact, the small-scale spectral tilt, $n_{_{\rm GW}} = \frac{{\rm d}\log{Ω_{_{\rm GW}}}}{{\rm d}\log{f}}$, of the spectral energy density of GWs is sensitive to the (unknown) post-inflationary equation of state (EoS), $w$, of the universe; with a softer EoS ($w < 1/3$) leading to a red tilt: $n_{_{\rm GW}} < 0$, while a stiffer EoS ($w > 1/3$) resulting in a blue tilt: $n_{_{\rm GW}} > 0$. The post-inflationary dynamics, however, is generically expected to be quite complex, potentially involving a number of distinct phases. Hence, in this work, we discuss the possibility of multiple sharp transitions, namely $w_1 \to w_2 \to w_3 \to ... \to w_n$, in the EoS of the post-inflationary universe and compute the corresponding spectral energy density of the inflationary GWs. We explicitly determine the region of the parameter space $\lbrace{ w_1, \, w_2, \, w_3, ..., w_n\rbrace}$ which leads to a potentially detectable signal in the upcoming GW detectors, without violating the current constraints.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
Large Reasoning Models for 3D Floorplanning in EDA: Learning from Imperfections
Authors:
Fin Amin,
Nirjhor Rouf,
Tse-Han Pan,
Md Kamal Ibn Shafi,
Paul D. Franzon
Abstract:
In this paper, we introduce Dreamweaver, which belongs to a new class of auto-regressive decision-making models known as large reasoning models (LRMs). Dreamweaver is designed to improve 3D floorplanning in electronic design automation (EDA) via an architecture that melds advancements in sequence-to-sequence reinforcement learning algorithms. A significant advantage of our approach is its ability…
▽ More
In this paper, we introduce Dreamweaver, which belongs to a new class of auto-regressive decision-making models known as large reasoning models (LRMs). Dreamweaver is designed to improve 3D floorplanning in electronic design automation (EDA) via an architecture that melds advancements in sequence-to-sequence reinforcement learning algorithms. A significant advantage of our approach is its ability to effectively reason over large discrete action spaces, which is essential for handling the numerous potential positions for various functional blocks in floorplanning. Additionally, Dreamweaver demonstrates strong performance even when trained on entirely random trajectories, showcasing its capacity to leverage sub-optimal or non-expert trajectories to enhance its results. This innovative approach contributes to streamlining the integrated circuit (IC) design flow and reducing the high computational costs typically associated with floorplanning. We evaluate its performance against a current state-of-the-art method, highlighting notable improvements.
△ Less
Submitted 21 June, 2024; v1 submitted 15 June, 2024;
originally announced June 2024.
-
Formation and decay of oscillons after inflation in the presence of an external coupling, Part-I: Lattice simulations
Authors:
Mohammed Shafi,
Edmund J. Copeland,
Rafid Mahbub,
Swagat S. Mishra,
Soumen Basak
Abstract:
We investigate the formation and decay of oscillons during the post-inflationary reheating epoch from inflaton oscillations around asymptotically flat potentials $V(\varphi)$ in the presence of an external coupling of the form $\frac{1}{2}\, g^2 \, \varphi^2 \, χ^2$. It is well-known that in the absence of such an external coupling, the attractive self-interaction term in the potential leads to th…
▽ More
We investigate the formation and decay of oscillons during the post-inflationary reheating epoch from inflaton oscillations around asymptotically flat potentials $V(\varphi)$ in the presence of an external coupling of the form $\frac{1}{2}\, g^2 \, \varphi^2 \, χ^2$. It is well-known that in the absence of such an external coupling, the attractive self-interaction term in the potential leads to the formation of copious amounts of long-lived oscillons both for symmetric and asymmetric plateau potentials. We perform a detailed numerical analysis to study the formation of oscillons in the $α$-attractor E- and T-model potentials using the publicly available lattice simulation code ${\cal C}$osmo${\cal L}$attice. We observe the formation of nonlinear oscillon-like structures with the average equation of state $\langle w_\varphi\rangle \simeq 0$ for a range of values of the inflaton self-coupling $λ$ and the external coupling $g^2$. Our results demonstrate that oscillons form even in the presence of an external coupling and we determine the upper bound on $g^2$ which facilitates oscillon formation. We also find that eventually, these oscillons decay into the scalar inflaton radiation as well as into the quanta of the offspring field $χ$. Thus, we establish the possibility that reheating could have proceeded through the channel of oscillon decay, along with the usual decay of the oscillating inflaton condensate into $χ$ particles. For a given value of the self-coupling $λ$, we notice that the lifetime of a population of oscillons decreases with an increase in the strength of the external coupling, following an (approximately) inverse power-law dependence on $g^2$.
△ Less
Submitted 31 May, 2024;
originally announced June 2024.
-
Experimental realization of universal quantum gates and six-qubit state using photonic quantum walk
Authors:
Kanad Sengupta,
K. Muhammed Shafi,
S. P. Dinesh,
Soumya Asokan,
C. M. Chandrashekar
Abstract:
Controlled quantum walk forms the basis for various quantum algorithm and quantum simulation schemes. Though theoretical proposals are also available to realize universal quantum computation using quantum walks, no experimental demonstration of universal set of gates has been reported. Here we report the experimental realize of universal set of quantum gates using photonic quantum walk. Taking cue…
▽ More
Controlled quantum walk forms the basis for various quantum algorithm and quantum simulation schemes. Though theoretical proposals are also available to realize universal quantum computation using quantum walks, no experimental demonstration of universal set of gates has been reported. Here we report the experimental realize of universal set of quantum gates using photonic quantum walk. Taking cue from the discrete-time quantum walk formalism, we encode multiple qubits using polarization and paths degree of freedom for photon and demonstrate realization of universal set of gates with 100\% success probability and high fidelity, as characterised by quantum state tomography. For a 3-qubit system we encode first qubit with $H$ and $V-$polarization of photon and path information for the second and third qubit, closely resembling a Mach-Zehnder interference setup. To generate a 6-qubit system and demonstrate 6-qubit GHZ state, entangled photon pairs are used as source to two 3-qubit systems. We also provide insights into the map** of quantum circuits to quantum walk operations on photons and way to resourcefully scale. This work marks a significant progress towards using photonic quantum walk for quantum computing. It also provides a framework for photonic quantum computing using lesser number of photons in combination with path degree of freedom to increase the success rate of multi-qubit gate operations.
△ Less
Submitted 11 March, 2024;
originally announced March 2024.
-
Experimental demonstration of quantum illumination using polarization-entangled photon pairs and CHSH value as measure
Authors:
Kanad Sengupta,
K. Muhammed Shafi,
Soumya Asokan,
C. M. Chandrashekar
Abstract:
Entangled light sources for illuminating objects offers advantages over conventional illumination methods by enhancing the detection sensitivity of a reflecting object. The crux of the quantum advantage lies in way we can practically leverage quantum correlations to isolate the background noise and detect the low reflectivity object. In this work we experimentally demonstrated the advantages of us…
▽ More
Entangled light sources for illuminating objects offers advantages over conventional illumination methods by enhancing the detection sensitivity of a reflecting object. The crux of the quantum advantage lies in way we can practically leverage quantum correlations to isolate the background noise and detect the low reflectivity object. In this work we experimentally demonstrated the advantages of using polarization-entangled photon pairs for quantum illumination and show that the quantum correlation measure using CHSH value is robust against background noise and losses. We also show that the residual of quantum correlations help in identifying the object of reflectivity, $η$ as low as 0.05 and when signal-to-noise ratio is as low as 0.003 for $η=0.7$, surpassing the earlier demonstrated results. Robustness of correlation measure with photon attenuation in atmospheric condition is analysed to show the practical feasibility of the real time application.
△ Less
Submitted 18 January, 2024;
originally announced January 2024.
-
Harnessing Large Language Models Over Transformer Models for Detecting Bengali Depressive Social Media Text: A Comprehensive Study
Authors:
Ahmadul Karim Chowdhury,
Md. Saidur Rahman Sujon,
Md. Shirajus Salekin Shafi,
Tasin Ahmmad,
Sifat Ahmed,
Khan Md Hasib,
Faisal Muhammad Shah
Abstract:
In an era where the silent struggle of underdiagnosed depression pervades globally, our research delves into the crucial link between mental health and social media. This work focuses on early detection of depression, particularly in extroverted social media users, using LLMs such as GPT 3.5, GPT 4 and our proposed GPT 3.5 fine-tuned model DepGPT, as well as advanced Deep learning models(LSTM, Bi-…
▽ More
In an era where the silent struggle of underdiagnosed depression pervades globally, our research delves into the crucial link between mental health and social media. This work focuses on early detection of depression, particularly in extroverted social media users, using LLMs such as GPT 3.5, GPT 4 and our proposed GPT 3.5 fine-tuned model DepGPT, as well as advanced Deep learning models(LSTM, Bi-LSTM, GRU, BiGRU) and Transformer models(BERT, BanglaBERT, SahajBERT, BanglaBERT-Base). The study categorized Reddit and X datasets into "Depressive" and "Non-Depressive" segments, translated into Bengali by native speakers with expertise in mental health, resulting in the creation of the Bengali Social Media Depressive Dataset (BSMDD). Our work provides full architecture details for each model and a methodical way to assess their performance in Bengali depressive text categorization using zero-shot and few-shot learning techniques. Our work demonstrates the superiority of SahajBERT and Bi-LSTM with FastText embeddings in their respective domains also tackles explainability issues with transformer models and emphasizes the effectiveness of LLMs, especially DepGPT, demonstrating flexibility and competence in a range of learning contexts. According to the experiment results, the proposed model, DepGPT, outperformed not only Alpaca Lora 7B in zero-shot and few-shot scenarios but also every other model, achieving a near-perfect accuracy of 0.9796 and an F1-score of 0.9804, high recall, and exceptional precision. Although competitive, GPT-3.5 Turbo and Alpaca Lora 7B show relatively poorer effectiveness in zero-shot and few-shot situations. The work emphasizes the effectiveness and flexibility of LLMs in a variety of linguistic circumstances, providing insightful information about the complex field of depression detection models.
△ Less
Submitted 14 January, 2024;
originally announced January 2024.
-
Broadband miniaturized spectrometers with a van der Waals tunnel diode
Authors:
MD Gius Uddin,
Susobhan Das,
Abde Mayeen Shafi,
Lei Wang,
Xiaoqi Cui,
Fedor Nigmatulin,
Faisal Ahmed,
Andreas C. Liapis,
Weiwei Cai,
Zongyin Yang,
Harri Lipsanen,
Tawfique Hasan,
Hoon Hahn Yoon,
Zhipei Sun
Abstract:
Miniaturized spectrometers are of immense interest for various on-chip and implantable photonic and optoelectronic applications. State-of-the-art conventional spectrometer designs rely heavily on bulky dispersive components (such as gratings, photodetector arrays, and interferometric optics) to capture different input spectral components that increase their integration complexity. Here, we report…
▽ More
Miniaturized spectrometers are of immense interest for various on-chip and implantable photonic and optoelectronic applications. State-of-the-art conventional spectrometer designs rely heavily on bulky dispersive components (such as gratings, photodetector arrays, and interferometric optics) to capture different input spectral components that increase their integration complexity. Here, we report a high-performance broadband spectrometer based on a simple and compact van der Waals heterostructure diode, leveraging a careful selection of active van der Waals materials -- molybdenum disulfide and black phosphorus, their electrically tunable photoresponse, and advanced computational algorithms for spectral reconstruction. We achieve remarkably high peak wavelength accuracy of ~2 nanometers, and broad operation bandwidth spanning from ~500 to 1600 nanometers in a device with a ~30x20 μm2 footprint. This diode-based spectrometer scheme with broadband operation offers an attractive pathway for various applications, such as sensing, surveillance and spectral imaging.
△ Less
Submitted 2 January, 2024;
originally announced January 2024.
-
Design and Development of a Java Parallel I/O Library
Authors:
Muhammad Sohaib Ayub,
Muhammad Adnan,
Muhammad Yasir Shafi
Abstract:
Parallel I/O refers to the ability of scientific programs to concurrently read/write from/to a single file from multiple processes executing on distributed memory platforms like compute clusters. In the HPC world, I/O becomes a significant bottleneck for many real-world scientific applications. In the last two decades, there has been significant research in improving the performance of I/O operati…
▽ More
Parallel I/O refers to the ability of scientific programs to concurrently read/write from/to a single file from multiple processes executing on distributed memory platforms like compute clusters. In the HPC world, I/O becomes a significant bottleneck for many real-world scientific applications. In the last two decades, there has been significant research in improving the performance of I/O operations in scientific computing for traditional languages including C, C++, and Fortran. As a result of this, several mature and high-performance libraries including ROMIO (implementation of MPI-IO), parallel HDF5, Parallel I/O (PIO), and parallel netCDF are available today that provide efficient I/O for scientific applications. However, there is very little research done to evaluate and improve I/O performance of Java-based HPC applications. The main hindrance in the development of efficient parallel I/O Java libraries is the lack of a standard API (something equivalent to MPI-IO). Some adhoc solutions have been developed and used in proprietary applications, but there is no general-purpose solution that can be used by performance hungry applications. As part of this project, we plan to develop a Java-based parallel I/O API inspired by the MPI-IO bindings (MPI 2.0 standard document) for C, C++, and Fortran. Once the Java equivalent API of MPI-IO has been developed, we will develop a reference implementation on top of existing Java messaging libraries. Later, we will evaluate and compare performance of our reference Java Parallel I/O library with C/C++ counterparts using benchmarks and real-world applications.
△ Less
Submitted 12 May, 2023;
originally announced May 2023.
-
Quantum illumination using polarization-path entangled single photons for low reflectivity object detection in noisy background
Authors:
K. Muhammed Shafi,
A. Padhye,
C. M. Chandrashekar
Abstract:
Detecting object with low reflectivity embedded within a noisy background is a challenging task. Quantum correlations between pairs of quantum states of light, though are highly sensitive to background noise and losses, offer advantages over traditional illumination methods. Instead of using correlated photon pairs which are sensitive, we experimentally demonstrate the advantage of using heralded…
▽ More
Detecting object with low reflectivity embedded within a noisy background is a challenging task. Quantum correlations between pairs of quantum states of light, though are highly sensitive to background noise and losses, offer advantages over traditional illumination methods. Instead of using correlated photon pairs which are sensitive, we experimentally demonstrate the advantage of using heralded single-photons entangled in polarization and path degree of freedom for quantum illumination. In the study, the object of different reflectivity is placed along the path of the signal in a variable thermal background before taking the joint measurements and calculating the quantum correlations. We show the significant advantage of using non-interferometric measurements along the multiple paths for single photon to isolate the signal from the background noise and outperform in detecting and ranging the low reflectivity objects even when the signal-to-noise ratio is as low as 0.03. Decrease in visibility of polarization along the signal path also results in similar observations. This will have direct relevance to the development of single-photon based quantum LiDAR and quantum imaging.
△ Less
Submitted 15 September, 2023; v1 submitted 9 March, 2023;
originally announced March 2023.
-
Channel Sparsity Variation and Model-Based Analysis on 6, 26, and 132 GHz Measurements
Authors:
Ximan Liu,
Jianhua Zhang,
Pan Tang,
Lei Tian,
Harsh Tataria,
Shu Sun,
Mansoor Shafi
Abstract:
In this paper, the level of sparsity is examined at 6, 26, and 132 GHz carrier frequencies by conducting channel measurements in an indoor office environment. By using the Gini index (value between 0 and 1) as a metric for characterizing sparsity, we show that increasing carrier frequency leads to increased levels of sparsity. The measured channel impulse responses are used to derive a Third-Gener…
▽ More
In this paper, the level of sparsity is examined at 6, 26, and 132 GHz carrier frequencies by conducting channel measurements in an indoor office environment. By using the Gini index (value between 0 and 1) as a metric for characterizing sparsity, we show that increasing carrier frequency leads to increased levels of sparsity. The measured channel impulse responses are used to derive a Third-Generation Partnership Project (3GPP)-style propagation model, used to calculate the Gini index for the comparison of the channel sparsity between the measurement and simulation based on the 3GPP model. Our results show that the mean value of the Gini index in measurement is over twice the value in simulation, implying that the 3GPP channel model does not capture the effects of sparsity in the delay domain as frequency increases. In addition, a new intra-cluster power allocation model based on measurements is proposed to characterize the effects of sparsity in the delay domain of the 3GPP channel model. The accuracy of the proposed model is analyzed using theoretical derivations and simulations. Using the derived intra-cluster power allocation model, the mean value of the Gini index is 0.97, while the spread of variability is restricted to 0.01, demonstrating that the proposed model is suitable for 3GPP-type channels. To our best knowledge, this paper is the first to perform measurements and analysis at three different frequencies for the evaluation of channel sparsity in the same environment.
△ Less
Submitted 17 February, 2023;
originally announced February 2023.
-
Massive MIMO Evolution Towards 3GPP Release 18
Authors:
Huang** **,
Kunpeng Liu,
Gilwon Lee,
Emad J. Farag,
Min Zhang,
Dalin Zhu,
Leiming Zhang,
Eko Onggosanusi,
Mansoor Shafi,
Harsh Tataria
Abstract:
Since the introduction of fifth-generation new radio (5G-NR) in Third Generation Partnership Project (3GPP) Release 15, swift progress has been made to evolve 5G with 3GPP Release 18 emerging. A critical aspect is the design of massive multiple-input multiple-output (MIMO) technology. In this line, this paper makes several important contributions: We provide a comprehensive overview of the evoluti…
▽ More
Since the introduction of fifth-generation new radio (5G-NR) in Third Generation Partnership Project (3GPP) Release 15, swift progress has been made to evolve 5G with 3GPP Release 18 emerging. A critical aspect is the design of massive multiple-input multiple-output (MIMO) technology. In this line, this paper makes several important contributions: We provide a comprehensive overview of the evolution of standardized massive MIMO features from 3GPP Release 15 to 17 for both time/frequency-division duplex operation across bands FR-1 and FR-2. We analyze the progress on channel state information (CSI) frameworks, beam management frameworks and present enhancements for uplink CSI. We shed light on emerging 3GPP Release 18 problems requiring imminent attention. These include advanced codebook design and sounding reference signal design for coherent joint transmission (CJT) with multiple transmission/reception points (multi- TRPs). We discuss advancements in uplink demodulation reference signal design, enhancements for mobility to provide accurate CSI estimates, and unified transmission configuration indicator framework tailored for FR-2 bands. For each concept, we provide system level simulation results to highlight their performance benefits. Via field trials in an outdoor environment at Shanghai Jiaotong University, we demonstrate the gains of multi-TRP CJT relative to single TRP at 3.7 GHz.
△ Less
Submitted 15 October, 2022;
originally announced October 2022.
-
LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in Beyond 5G
Authors:
Misbah Shafi,
Rakesh Kumar Jha,
Sanjeev Jain
Abstract:
The advancement in wireless communication technologies is becoming more demanding and pervasive. One of the fundamental parameters that limit the efficiency of the network are the security challenges. The communication network is vulnerable to security attacks such as spoofing attacks and signal strength attacks. Intrusion detection signifies a central approach to ensuring the security of the comm…
▽ More
The advancement in wireless communication technologies is becoming more demanding and pervasive. One of the fundamental parameters that limit the efficiency of the network are the security challenges. The communication network is vulnerable to security attacks such as spoofing attacks and signal strength attacks. Intrusion detection signifies a central approach to ensuring the security of the communication network. In this paper, an Intrusion Detection System based on the framework of graph theory is proposed. A Layerwise Graph Theory-Based Intrusion Detection System (LGTBIDS) algorithm is designed to detect the attacked node. The algorithm performs the layer-wise analysis to extract the vulnerable nodes and ultimately the attacked node(s). For each layer, every node is scanned for the possibility of susceptible node(s). The strategy of the IDS is based on the analysis of energy efficiency and secrecy rate. The nodes with the energy efficiency and secrecy rate beyond the range of upper and lower thresholds are detected as the nodes under attack. Further, detected node(s) are transmitted with a random sequence of bits followed by the process of re-authentication. The obtained results validate the better performance, low time computations, and low complexity. Finally, the proposed approach is compared with the conventional solution of intrusion detection.
△ Less
Submitted 6 October, 2022;
originally announced October 2022.
-
Perspectives on a 6G Architecture
Authors:
Rainer Liebhart,
Mansoor Shafi,
Gajan Shivanandan,
Devaki Chandramouli,
Laurent Thiebaut
Abstract:
Mobile communications have been undergoing a generational change every ten years. Whilst we are just beginning to roll out 5G networks, significant efforts are planned to standardize 6G that is expected to be commercially introduced by 2030. This paper looks at the use cases for 6G and their impact on the network architecture to meet the anticipated performance requirements. The new architecture i…
▽ More
Mobile communications have been undergoing a generational change every ten years. Whilst we are just beginning to roll out 5G networks, significant efforts are planned to standardize 6G that is expected to be commercially introduced by 2030. This paper looks at the use cases for 6G and their impact on the network architecture to meet the anticipated performance requirements. The new architecture is based on integrating various network functions in virtual cloud environments, leveraging the advancement of artificial intelligence in all domains, integrating different sub-networks constituting the 6G system, and on enhanced means of exposing data and services to third parties.
△ Less
Submitted 6 October, 2022;
originally announced October 2022.
-
Second-order correlations and purity of unheralded single photons from spontaneous parametric down-conversion
Authors:
A. Padhye,
K. Muhammed Shafi,
C. M. Chandrashekar
Abstract:
Various quantum technology applications require high-purity single photons with high generation rate. Although different methods are employed to generate such photons, heralded single photons from spontaneous parametric down-conversion (SPDC) is the most commonly used approach. Photon generation rate from the heralded single-photon sources are limited by the efficiency of the detectors to record c…
▽ More
Various quantum technology applications require high-purity single photons with high generation rate. Although different methods are employed to generate such photons, heralded single photons from spontaneous parametric down-conversion (SPDC) is the most commonly used approach. Photon generation rate from the heralded single-photon sources are limited by the efficiency of the detectors to record coincidence detection of the photon pairs which are lower than the single-photon counts recorded separately on each detector. In this paper we present a revised expression to calculate second-order temporal correlation function, $g^{(2)}$ for any fixed time window (bin) and report the experimental characterization of purity of unheralded and heralded single photons from the SPDC process. With an appropriate choice of time bin for a given pump power, without heralding we show that higher rate of single photons with $g^{(2)}(0) = 0$ can be generated with very high probability.
△ Less
Submitted 14 July, 2022;
originally announced July 2022.
-
Behavioral Model For Live Detection of Apps Based Attack
Authors:
Misbah Shafi,
Rakesh Kumar Jha,
Sanjeev Jain
Abstract:
Smartphones with the platforms of applications are gaining extensive attention and popularity. The enormous use of different applications has paved the way to numerous security threats. The threats are in the form of attacks such as permission control attacks, phishing attacks, spyware attacks, botnets, malware attacks, privacy leakage attacks. Moreover, other vulnerabilities include invalid autho…
▽ More
Smartphones with the platforms of applications are gaining extensive attention and popularity. The enormous use of different applications has paved the way to numerous security threats. The threats are in the form of attacks such as permission control attacks, phishing attacks, spyware attacks, botnets, malware attacks, privacy leakage attacks. Moreover, other vulnerabilities include invalid authorization of apps, compromise on the confidentiality of data, invalid access control. In this paper, an application-based attack modeling and attack detection is proposed. Due to A novel attack vulnerability is identified based on the app execution on the smartphone. The attack modeling involves an end-user vulnerable application to initiate an attack. The vulnerable application is installed at the background end on the smartphone with hidden visibility from the end-user. Thereby, accessing the confidential information. The detection model involves the proposed technique of an Application-based Behavioral Model Analysis (ABMA) scheme to address the attack model. The model incorporates application-based comparative parameter analysis to perform the process of intrusion detection. The ABMA is estimated by using the parameters of power, battery level, and the data usage. Based on the source internet accessibility, the analysis is performed using three different configurations as, WiFi, mobile data, and the combination of the two. The simulation results verify and demonstrates the effectiveness of the proposed model.
△ Less
Submitted 14 July, 2022;
originally announced July 2022.
-
Artificial Dust Based Attack Modelling: A Threat to the Security of Next Generation WCN
Authors:
Misbah Shafi,
Rakesh Kumar Jha
Abstract:
This paper introduces a systematic and novel mechanism for devising a security attack in the WCN (Wireless Communication Network). The proposed model involves the implementation of the AD (Artificial Dust) by the intruder, followed by the execution of the HD (Half-Duplex) attack. The communication network is based on the deployment of urban and rural scenarios with an unknown CSI (Channel State In…
▽ More
This paper introduces a systematic and novel mechanism for devising a security attack in the WCN (Wireless Communication Network). The proposed model involves the implementation of the AD (Artificial Dust) by the intruder, followed by the execution of the HD (Half-Duplex) attack. The communication network is based on the deployment of urban and rural scenarios with an unknown CSI (Channel State Information). Depending on the achieved path loss based on the distance of the user from the BS, the user with the highest path loss is particularized for the attack. The formulation of AD divulges the increased susceptibilities of the secure network specifically for the selected legitimate user. The parameter of visibility defines the amount of AD present in the communication channel. Based on the enumerated attenuation created by the artificial dust, the parameter of secrecy rate is evaluated with varying distance of the user from the BS and the operating frequency. Furthermore, the proposed scheme of the HD attack is initiated by the intruder at the specified valid user. The strategy of the attack focuses on the continuous monitor of the uplink and attempts the spoofing attack on the downlink wherein the allocation of the resources takes place. The efficacy of the proposed approach is corroborated through the examination of simulation results. The assessment of the proposed mechanism highlights notable characteristics as compared to the conventional methodology of the FD (Full- Duplex) attack.
△ Less
Submitted 14 July, 2022;
originally announced July 2022.
-
Bright and polarized fiber in-line single photon source based on plasmon-enhanced emission into nanofiber guided modes
Authors:
K. Muhammed Shafi,
Ramachandrarao Yalla,
Kali P. Nayak
Abstract:
We demonstrate a bright and polarized fiber in-line single photon source based on plasmon-enhanced emission of colloidal single quantum dots into an optical nanofiber. We show that emission properties of single quantum dots can be strongly enhanced in the presence of single gold nanorods leading to a bright and strongly polarized single photon emission. The single photons are efficiently coupled t…
▽ More
We demonstrate a bright and polarized fiber in-line single photon source based on plasmon-enhanced emission of colloidal single quantum dots into an optical nanofiber. We show that emission properties of single quantum dots can be strongly enhanced in the presence of single gold nanorods leading to a bright and strongly polarized single photon emission. The single photons are efficiently coupled to guided modes of the nanofiber and eventually to a single mode optical fiber. The brightness (fiber-coupled photon count rate) of the single photon source is estimated to be 12.2(0.6) MHz, with high single photon purity (g2(0) = 0.20(0.04)) and degree of polarization as high as 94-97%. The present device can be integrated into fiber networks paving the way for potential applications in quantum networks.
△ Less
Submitted 26 June, 2022;
originally announced June 2022.
-
Integration of silicon-vacancy centers in nanodiamonds with an optical nanofiber
Authors:
Ramachandrarao Yalla,
Y. Kojima,
Y. Fukumoto,
H. Suzuki,
O. Ariyada,
K. Muhammed Shafi,
Kali P. Nayak,
Kohzo Hakuta
Abstract:
We experimentally demonstrate the integration of silicon-vacancy centers in nanodiamonds (SiV-NDs) with an optical nanofiber (ONF). We grow SiV-NDs on seed NDs dispersed on a quartz substrate using a microwave plasma-assisted chemical vapor deposition method. First, we search and characterize SiV-NDs on a quartz substrate using an inverted confocal microscope and an atomic force microscope (AFM).…
▽ More
We experimentally demonstrate the integration of silicon-vacancy centers in nanodiamonds (SiV-NDs) with an optical nanofiber (ONF). We grow SiV-NDs on seed NDs dispersed on a quartz substrate using a microwave plasma-assisted chemical vapor deposition method. First, we search and characterize SiV-NDs on a quartz substrate using an inverted confocal microscope and an atomic force microscope (AFM). Subsequently, we pick up SiV-NDs from the quartz substrate and deposit them on the surface of a free-standing ONF using the AFM tip. The fluorescence emission spectrum, photon count rate, and intensity correlations for SiV-NDs are systematically measured.
△ Less
Submitted 3 May, 2022;
originally announced May 2022.
-
Multi-bit quantum random number generator from path-entangled single photons
Authors:
K. Muhammed Shafi,
Prateek Chawla,
Abhaya S. Hegde,
R. S. Gayatri,
A. Padhye,
C. M. Chandrashekar
Abstract:
Measurement outcomes on quantum systems exhibit inherent randomness and are fundamentally nondeterministic. This has enabled quantum physics to set new standards for the generation of true randomness with significant applications in the fields of cryptography, statistical simulations, and modeling of the nondeterministic behavior in various other fields. In this work, we present a scheme for the g…
▽ More
Measurement outcomes on quantum systems exhibit inherent randomness and are fundamentally nondeterministic. This has enabled quantum physics to set new standards for the generation of true randomness with significant applications in the fields of cryptography, statistical simulations, and modeling of the nondeterministic behavior in various other fields. In this work, we present a scheme for the generation of multi-bit random numbers using path-entangled single photons. Without losing their intrinsic randomness, the protocol allows us to engineer the distribution from which we sample random numbers. For the experimental demonstration, we use single photons generated using spontaneous parametric down-conversion (SPDC), and assign a multi-bit commitment along the path. One-bit and two-bit random numbers are then generated from measuring entangled states in the path basis. In addition to passing the NIST tests for randomness, we also demonstrate the certification of quantumness and self-certification of quantum random number generator (QRNG) using Clauser, Horne, Shimony and Holt (CHSH) inequality violation. The path-entangled states can generate higher bitrates compared to heralded single photon or entangled photon schemes which are limited by the coincidence counts. The scheme involves distribution of photons along multiple paths resulting in multiple bits from one photon and avoids the limitation imposed by the detection dead time of one detector. We demonstrate this by generating a high rate of about 80 Mbps when the single photon detector saturates at around 28 Mcps.
△ Less
Submitted 13 October, 2023; v1 submitted 22 February, 2022;
originally announced February 2022.
-
One-sided composite cavity on an optical nanofiber for cavity QED
Authors:
Ramachandrarao Yalla,
K. Muhammed Shafi,
Kali P. Nayak,
Kohzo Hakuta
Abstract:
We demonstrate a one-sided cavity on an optical nanofiber (ONF) using a composite method. The one-sided composite cavity is created by mounting an asymmetric defect mode grating on an ONF. We design the one-sided composite cavity on an ONF to enhance channeling efficiency into one side of ONF while operating from under- to critical- and over-coupling regimes using numerical simulations. Experiment…
▽ More
We demonstrate a one-sided cavity on an optical nanofiber (ONF) using a composite method. The one-sided composite cavity is created by mounting an asymmetric defect mode grating on an ONF. We design the one-sided composite cavity on an ONF to enhance channeling efficiency into one side of ONF while operating from under- to critical- and over-coupling regimes using numerical simulations. Experimentally, we demonstrate coupling characteristics of the one-sided composite cavity, showing good correspondence with simulation results.
△ Less
Submitted 2 February, 2022;
originally announced February 2022.
-
Bell-inequality in path-entangled single photon and purity of single photon state
Authors:
K. Muhammed Shafi,
R. S. Gayatri,
A. Padhye,
C. M. Chandrashekar
Abstract:
Different degrees of freedom of single photons have been entangled and are used as a resource for various quantum technology applications. We present a simple scheme to perform Bell's test and show the violation of CHSH inequality in a path-entangled single photon state using interferometric and its equivalent non-interferometric approach in beam splitter setting. We demonstrate this experimentall…
▽ More
Different degrees of freedom of single photons have been entangled and are used as a resource for various quantum technology applications. We present a simple scheme to perform Bell's test and show the violation of CHSH inequality in a path-entangled single photon state using interferometric and its equivalent non-interferometric approach in beam splitter setting. We demonstrate this experimentally by generating and controlling path-entangled state using both, heralded and un-heralded single photons from spontaneous parametric down-conversion. The experimental results we present show the transition to violation of CHSH inequality when the purity of single photons state visibility increase above 70\% , $\mathcal{P} > 0.7$. Our procedure using single beam splitter and two detector module for un-heralded single photon source allows a simple way to test for purity of any single photon source and to study quantum correlations on systems driven by dynamics where single particle entanglement with position space is prominent.
△ Less
Submitted 8 February, 2023; v1 submitted 9 December, 2021;
originally announced December 2021.
-
Sum Capacity Loss Quantification With Optimal and Sub-Optimal Precoding in Heterogeneous Multiuser Channels
Authors:
Harsh Tataria,
Mansoor Shafi,
Dino Pjanić
Abstract:
We analytically approximate the expected sum capacity loss between the optimal downlink precoding technique of dirty paper coding (DPC), and the sub-optimal technique of zero-forcing precoding, for multiuser channels. We also consider the most general case of multi-stream transmission to multiple users, where we evaluate the expected sum capacity loss between DPC and block diagonalization precodin…
▽ More
We analytically approximate the expected sum capacity loss between the optimal downlink precoding technique of dirty paper coding (DPC), and the sub-optimal technique of zero-forcing precoding, for multiuser channels. We also consider the most general case of multi-stream transmission to multiple users, where we evaluate the expected sum capacity loss between DPC and block diagonalization precoding. Unlike previously, assuming heterogeneous Ricean fading, we utilize the well known affine approximation to predict the expected sum capacity difference between both precoder types (optimal and sub-optimal) over a wide range of system and propagation parameters. Furthermore, for single-stream transmission, we consider the problem of weighted sum capacity maximization, where a similar quantification of the sum capacity difference between the two precoder types is presented. In doing so, we disclose that power allocation to different users proportional to their individual weights asymptotically maximizes the weighted sum capacity. Numerical simulations are presented to demonstrate the tightness of the developed expressions relative to their simulated counterparts.
△ Less
Submitted 19 November, 2021;
originally announced November 2021.
-
Six Critical Challenges for 6G Wireless Systems
Authors:
Harsh Tataria,
Mansoor Shafi,
Mischa Dohler,
Shu Sun
Abstract:
A large number of papers are now appearing on sixth-generation (6G) wireless systems, covering different aspects, ranging from vision, architecture, applications, and technology breakthroughs. With cellular systems in mind, this paper presents six critical, yet fundamental challenges that must be overcome before development and deployment of 6G systems. These include: Opening the sub-terahertz (su…
▽ More
A large number of papers are now appearing on sixth-generation (6G) wireless systems, covering different aspects, ranging from vision, architecture, applications, and technology breakthroughs. With cellular systems in mind, this paper presents six critical, yet fundamental challenges that must be overcome before development and deployment of 6G systems. These include: Opening the sub-terahertz (sub-THz) spectrum for increased bandwidths and the ability to utilize these bandwidths, pushing the limits of semiconductor technologies for operation within the sub-THz bands, transceiver design and architectures to realize the high peak data rates, and realizations of sub-millisecond latencies at the network-level to achieve the 6G key performance indicators. Additionally, since 6G systems will not be introduced in a green fields environment, backwards compatibility with existing systems is discussed. Where possible, we present practical solutions to realize the identified challenges.
△ Less
Submitted 16 November, 2021;
originally announced November 2021.
-
Simple Framework of ZF Precoding Analysis for Full-Dimensional Massive MIMO Systems
Authors:
Harsh Tataria,
Mansoor Shafi
Abstract:
We provide a simple, yet general and accurate framework for analyzing zero-forcing (ZF) precoding performance for a full-dimensional massive multiple-input multiple-output system. Exploiting an order two Neumann series, our framework approximates the expected (average) ZF signal-to-noise ratio and ergodic sum spectral efficiency, while catering for a finite multipath propagation model, as well as…
▽ More
We provide a simple, yet general and accurate framework for analyzing zero-forcing (ZF) precoding performance for a full-dimensional massive multiple-input multiple-output system. Exploiting an order two Neumann series, our framework approximates the expected (average) ZF signal-to-noise ratio and ergodic sum spectral efficiency, while catering for a finite multipath propagation model, as well as correlated and uncorrelated user equipment (UE) positions in both azimuth and elevation domains. The analysis provides clear insights on the influence of propagation and system parameters on ZF performance. We identify how far UEs must lie in azimuth and elevation for the ZF precoder to approach uncorrelated channels. Our framework is useful for predicting the ZF performance degradation arising from channel correlation. For optimal performance, UEs could be separated by around 30$^\circ$ in azimuth and 15$^\circ$ in elevation - conditions which are difficult to meet in reality.
△ Less
Submitted 1 August, 2021;
originally announced August 2021.
-
AR Based Half-Duplex Attack in Beyond 5G networks
Authors:
Misbah Shafi,
Rakesh Kumar Jha
Abstract:
With the evolution of WCN (Wireless communication networks), the absolute fulfillment of security occupies the fundamental concern. In view of security, we have identified another research direction based on the attenuation impact of rain in WCN. An approach is initiated by an eavesdropper in which a secure communication environment is degraded by generating Artificial Rain (AR), which creates an…
▽ More
With the evolution of WCN (Wireless communication networks), the absolute fulfillment of security occupies the fundamental concern. In view of security, we have identified another research direction based on the attenuation impact of rain in WCN. An approach is initiated by an eavesdropper in which a secure communication environment is degraded by generating Artificial Rain (AR), which creates an abatement in the secrecy rate, and the cybersecurity gets compromised. By doing so, an attacking scenario is perceived, in which an intruder models a Half-Duplex (HD) attack. Half-Duplex specifies the attack on the downlink instead of targeting both uplink and downlink. This allows the attacker to alleviate the miss-rate of the attacking attempts. The layout for the HD attack is explained using RRC (Radio Resource Control)-setup. Further, we have determined and examined the performance parameters such as secrecy rate, energy efficiency, miss-rate, sensitivity in the presence of AR. Further comparison of rural and urban scenarios in the presence and absence of AR is carried out concerning the variation in secrecy rate with respect to the millimeter-wave frequencies and distance. Lastly, the methodology of the HD attack is simulated, revealing that the HD attack maintains a low miss rate with improved performance as compared to the performance and miss-rate attained by the full-duplex attack
△ Less
Submitted 8 April, 2021;
originally announced April 2021.
-
A Survey on Security Issues of 5G NR: Perspective of Artificial Dust and Artificial Rain
Authors:
Misbah Shafi,
Rakesh Kumar Jha,
Manish Sabraj
Abstract:
5G NR (New Radio) incorporates concepts of novel technologies such as spectrum sharing, D2D communication, UDN, and massive MIMO. However, providing security and identifying the security threats to these technologies occupies the prime concern. This paper intends to provide an ample survey of security issues and their countermeasures encompassed in the technologies of 5G NR. Further, security conc…
▽ More
5G NR (New Radio) incorporates concepts of novel technologies such as spectrum sharing, D2D communication, UDN, and massive MIMO. However, providing security and identifying the security threats to these technologies occupies the prime concern. This paper intends to provide an ample survey of security issues and their countermeasures encompassed in the technologies of 5G NR. Further, security concerns of each technology are defined mathematically. Thereby defining the impact on the factors of security. Moreover, a methodology is developed in which the influence on security due to artificially generated rain and artificially generated dust on the wireless communication network is studied. By doing so, an attacking scenario is identified, where a half-duplex attack in D2D communication is attained. Half-duplex attack specifies the attack solely on the downlink to spoof the allocated resources, with reduced miss-rate. Thus, ultra-reliable and adequate advances are required to be addressed to remove the obstacles that create a hindrance in achieving the secured and authenticated communicating network
△ Less
Submitted 8 April, 2021;
originally announced April 2021.
-
Half-Duplex Attack: An Effectual Attack Modelling in D2D Communication
Authors:
Misbah Shafi,
Rakesh Kumar Jha
Abstract:
The visualization of future generation Wireless Communication Network WCN redirects the presumption of onward innovations, the fulfillment of user demands in the form of high data rates, energy efficiency, low latency, and long-range services. To content these demands, various technologies such as massive MIMO Multiple Input Multiple Output, UDN Ultra Dense Network, spectrum sharing, D2D Device to…
▽ More
The visualization of future generation Wireless Communication Network WCN redirects the presumption of onward innovations, the fulfillment of user demands in the form of high data rates, energy efficiency, low latency, and long-range services. To content these demands, various technologies such as massive MIMO Multiple Input Multiple Output, UDN Ultra Dense Network, spectrum sharing, D2D Device to Device communication were improvised in the next generation WCN. In comparison to previous technologies, these technologies exhibit flat architecture, the involvement of clouds in the network, centralized architecture incorporating small cells which creates vulnerable breaches initiating menaces to the security of the network. The half-duplex attack is another threat to the WCN, where the resource spoofing mechanism is attained in the downlink phase of D2D communication. Instead of triggering an attack on both uplink and downlink, solely downlink is targeted by the attacker. This scheme allows the reduced failed attempt rate of the attacker as compared to the conventional attacks. The analysis is determined on the basis of Poissons distribution to determine the probability of failed attempts of half duplex attack in contrast to a full duplex attack
△ Less
Submitted 8 April, 2021;
originally announced April 2021.
-
6G Wireless Systems: Vision, Requirements, Challenges, Insights, and Opportunities
Authors:
Harsh Tataria,
Mansoor Shafi,
Andreas F. Molisch,
Mischa Dohler,
Henrik Sjöland,
Fredrik Tufvesson
Abstract:
Mobile communications have been undergoing a generational change every ten years or so. However, the time difference between the so-called "G's" is also decreasing. While fifth-generation (5G) systems are becoming a commercial reality, there is already significant interest in systems beyond 5G, which we refer to as the sixth-generation (6G) of wireless systems. In contrast to the already published…
▽ More
Mobile communications have been undergoing a generational change every ten years or so. However, the time difference between the so-called "G's" is also decreasing. While fifth-generation (5G) systems are becoming a commercial reality, there is already significant interest in systems beyond 5G, which we refer to as the sixth-generation (6G) of wireless systems. In contrast to the already published papers on the topic, we take a top-down approach to 6G. We present a holistic discussion of 6G systems beginning with lifestyle and societal changes driving the need for next generation networks. This is followed by a discussion into the technical requirements needed to enable 6G applications, based on which we dissect key challenges, as well as possibilities for practically realizable system solutions across all layers of the Open Systems Interconnection stack. Since many of the 6G applications will need access to an order-of-magnitude more spectrum, utilization of frequencies between 100 GHz and 1 THz becomes of paramount importance. As such, the 6G eco-system will feature a diverse range of frequency bands, ranging from below 6 GHz up to 1 THz. We comprehensively characterize the limitations that must be overcome to realize working systems in these bands; and provide a unique perspective on the physical, as well as higher layer challenges relating to the design of next generation core networks, new modulation and coding methods, novel multiple access techniques, antenna arrays, wave propagation, radio-frequency transceiver design, as well as real-time signal processing. We rigorously discuss the fundamental changes required in the core networks of the future that serves as a major source of latency for time-sensitive applications. While evaluating the strengths and weaknesses of key 6G technologies, we differentiate what may be achievable over the next decade, relative to what is possible.
△ Less
Submitted 18 March, 2021; v1 submitted 7 August, 2020;
originally announced August 2020.
-
Standardization of Propagation Models: 800 MHz to 100 GHz -- A Historical Perspective
Authors:
Harsh Tataria,
Katsuyuki Haneda,
Andreas F. Molisch,
Mansoor Shafi,
Fredrik Tufvesson
Abstract:
Propagation models constitute a fundamental building block of wireless communications research. Before we build and operate real systems, we must understand the science of radio propagation, and develop channel models that both reflect the important propagation processes and allow a fair comparison of different systems. In the past five decades, wireless systems have gone through five generations,…
▽ More
Propagation models constitute a fundamental building block of wireless communications research. Before we build and operate real systems, we must understand the science of radio propagation, and develop channel models that both reflect the important propagation processes and allow a fair comparison of different systems. In the past five decades, wireless systems have gone through five generations, from supporting voice applications to enhanced mobile broadband. To meet the ever increasing data rate demands of wireless systems, frequency bands covering a wide range from 800 MHz to 100 GHz have been allocated for use. The standardization of these systems started in the early/mid 1980's in Europe by the European Telecommunications Standards Institute with the advent of Global System for Mobile Communications. This motivated the development of the first standardized propagation model by the European Cooperation in Science and Technology (COST) 207 working group. These standardization activities were continued and expanded for the third, fourth, and fifth generations of COST, as well as by the Third Generation Partnership Project, and the International Telecommunication Union. This paper presents a historical overview of the standardized propagation models covering first to fifth-generation systems. In particular, we discuss the evolution and standardization of pathloss models, as well as large and small-scale fading parameters for single antenna and multiple antenna systems. Furthermore, we present insights into the progress of deterministic modelling across the five generations of systems, as well as discuss more advanced modelling components needed for the detailed simulations of millimeter-wave channels. A comprehensive bibliography at the end of the paper will aid the interested reader to dig deeper.
△ Less
Submitted 15 June, 2020;
originally announced June 2020.
-
Occurrence control of charged exciton for a single CdSe quantum dot at cryogenic temperatures on an optical nanofiber
Authors:
K. Muhammed Shafi,
Kazunori Iida,
Emi Tsutsumi,
Akiharu Miyanaga,
Kohzo Hakuta
Abstract:
We discuss photo-luminescence characteristics of CdSe core/shell quantum dots at cryogenic temperatures using a hybrid system of a single quantum dot and an optical nanofiber. The key point is to control the emission species of quantum dot to charged excitons, known as trions, which have superior characteristics to neutral excitons. We investigate the photocharging behavior for the quantum dots by…
▽ More
We discuss photo-luminescence characteristics of CdSe core/shell quantum dots at cryogenic temperatures using a hybrid system of a single quantum dot and an optical nanofiber. The key point is to control the emission species of quantum dot to charged excitons, known as trions, which have superior characteristics to neutral excitons. We investigate the photocharging behavior for the quantum dots by varying the wavelength and intensity of irradiating laser light, and establish a method to create a permanently charged situation which lasts as long as the cryogenic temperature is maintained. The present photocharging method may open a new route to applying the CdSe quantum dots in quantum photonics, and the hybrid system of photocharged quantum-dot and optical nanofiber may readily be applicable to a fiber-in-line single-photon generator.
△ Less
Submitted 23 March, 2020;
originally announced March 2020.
-
Efficient fiber in-line single photon source based on colloidal single quantum dots on an optical nanofiber
Authors:
K. Muhammed Shafi,
Kali P. Nayak,
Akiharu Miyanaga,
Kohzo Hakuta
Abstract:
We demonstrate a fiber in-line single photon source based on a hybrid system of colloidal single quantum dots deposited on an optical nanofiber and cooled down to cryogenic temperature (3.7 K). We show that a charged state (trion) of the single quantum dot exhibits a photo-stable emission of single photons with high quantum efficiency, narrow linewidth (3 meV FWHM) and fast decay time (…
▽ More
We demonstrate a fiber in-line single photon source based on a hybrid system of colloidal single quantum dots deposited on an optical nanofiber and cooled down to cryogenic temperature (3.7 K). We show that a charged state (trion) of the single quantum dot exhibits a photo-stable emission of single photons with high quantum efficiency, narrow linewidth (3 meV FWHM) and fast decay time ($10.0\pm0.5$ ns). The single photons are efficiently coupled to the guided modes of the nanofiber and eventually to a single mode optical fiber. The brightness (efficiency) of the single photon source is estimated to be $16\pm2\%$ with a maximum photon count rate of $1.6\pm0.2$ MHz and a high single photon purity ($g^2(0)=0.11\pm0.02$). The device can be easily integrated to the fiber networks paving the way for potential applications in quantum networks.
△ Less
Submitted 13 March, 2020;
originally announced March 2020.
-
Real-Time Deployment Aspects of C-Band and Millimeter-Wave 5G-NR Systems
Authors:
Mansoor Shafi,
Harsh Tataria,
Andreas F. Molisch,
Fredrik Tufvesson,
Geoff Tunnicliffe
Abstract:
Fifth-generation (5G) new radio (NR) deployments are being rolled out in both the C-band (3.3 - 5.0 GHz) and millimeter-wave (mmWave) band (24.5 - 29.5 GHz). For outdoor scenarios, the C-band is expected to provide wide area coverage and throughput uniformity, whereas the mmWave band is expected to provide ultra-high throughput to dedicated areas within the C-band coverage. Due to the differences…
▽ More
Fifth-generation (5G) new radio (NR) deployments are being rolled out in both the C-band (3.3 - 5.0 GHz) and millimeter-wave (mmWave) band (24.5 - 29.5 GHz). For outdoor scenarios, the C-band is expected to provide wide area coverage and throughput uniformity, whereas the mmWave band is expected to provide ultra-high throughput to dedicated areas within the C-band coverage. Due to the differences in the frequency bands, both systems are expected to be designed with different transmit and receive parameters, naturally resulting in performance variations proportional to the chosen parameters. Unlike many previous works, this paper presents measurement evaluations in central Auckland, New Zealand, from a pre-commercial deployment of a single-user, single-cell 5G-NR system operating in both bands. The net throughput, coverage reliability, and channel rank are analyzed across the two bands with baseband and analog beamforming. Our results show that the C-band coverage is considerably better than mmWave, with a consistently higher channel rank. Furthermore, the spatial stationarity region (SSR) for the azimuth angles-of-departure (AODs) is characterized, and a model derived from the measured beam identities is presented. The SSR of azimuth AODs is seen to closely follow a gamma distribution.
△ Less
Submitted 31 January, 2020;
originally announced January 2020.
-
Realisation of Highly Precise and Low Power Tunable Voltage Amplifier Based on the Translinear Circuit Scheme of CCCII+
Authors:
Umar Mohammad,
Mir Aamir Shafi
Abstract:
In the past few years, advancements in the field of nano circuit design has become tougher than the demand. Low power devices have emerged tremendously.Both voltage mode aswell as current mode devices have proven alternative to each other for satisfying the demand of the growing market. As such, current conveyors have equitably established their uniqueness as an important circuit design element. T…
▽ More
In the past few years, advancements in the field of nano circuit design has become tougher than the demand. Low power devices have emerged tremendously.Both voltage mode aswell as current mode devices have proven alternative to each other for satisfying the demand of the growing market. As such, current conveyors have equitably established their uniqueness as an important circuit design element. The literature available to us during the few years in the field of analog VLSI design, quotes a huge number of application elements based on current conveyors. Likely, in this paper, a new tunable low power voltage amplifier based on the translinear circuit scheme of second generation current controlled current conveyor has been proposed. The modeling of the circuit presented in this paper employs the minimum number of passive elements. The magnitude of the tuning or the amplitude of the voltage presented here, is being controlled by means of two variable resistors. Current conveyor second generation translinear circuit scheme is taken into consideration to implement the proposed tunable voltage amplifier. CCCII works on the outlines of low power and low voltage design. Tunable voltage amplifiers find use in analog as well as in digital signal processing applications.
△ Less
Submitted 6 November, 2018;
originally announced November 2018.
-
Hybrid Beamforming for 5G Millimeter-Wave Multi-Cell Networks
Authors:
Shu Sun,
Theodore S. Rappaport,
Mansoor Shafi
Abstract:
Multi-cell wireless systems usually suffer both intra-cell and inter-cell interference, which can be mitigated via coordinated multipoint (CoMP) techniques. Previous works on multi-cell analysis for the microwave band generally consider fully digital beamforming that requires a complete radio-frequency chain behind each antenna, which is less practical for millimeter-wave (mmWave) systems where la…
▽ More
Multi-cell wireless systems usually suffer both intra-cell and inter-cell interference, which can be mitigated via coordinated multipoint (CoMP) techniques. Previous works on multi-cell analysis for the microwave band generally consider fully digital beamforming that requires a complete radio-frequency chain behind each antenna, which is less practical for millimeter-wave (mmWave) systems where large amounts of antennas are necessary to provide sufficient beamforming gain and to enable transmission and reception of multiple data streams per user. This paper proposes four analog and digital hybrid beamforming schemes for multi-cell multi-user multi-stream mmWave communication, leveraging CoMP. Spectral efficiency performances of the proposed hybrid beamforming approaches are investigated and compared using both the 3rd Generation Partnership Project and NYUSIM channel models. Simulation results show that CoMP based on maximizing signal-to-leakage-plus-noise ratio can improve spectral efficiency as compared to the no-coordination case, and spectral efficiency gaps between different beamforming approaches depend on the interference level that is influenced by the cell radius and the number of users per cell.
△ Less
Submitted 11 March, 2018;
originally announced March 2018.
-
Investigation and Comparison of 3GPP and NYUSIM Channel Models for 5G Wireless Communications
Authors:
Theodore S. Rappaport,
Shu Sun,
Mansoor Shafi
Abstract:
Channel models describe how wireless channel parameters behave in a given scenario, and help evaluate link- and system-level performance. A proper channel model should be able to faithfully reproduce the channel parameters obtained in field measurements and accurately predict the spatial and temporal channel impulse response along with large-scale fading. This paper compares two popular channel mo…
▽ More
Channel models describe how wireless channel parameters behave in a given scenario, and help evaluate link- and system-level performance. A proper channel model should be able to faithfully reproduce the channel parameters obtained in field measurements and accurately predict the spatial and temporal channel impulse response along with large-scale fading. This paper compares two popular channel models for next generation wireless communications: the 3rd Generation Partnership Project (3GPP) TR 38.900 Release 14 channel model and the statistical spatial channel model NYUSIM developed by New York University (NYU). The two channel models employ different modeling approaches in many aspects, such as the line-of-sight probability, path loss, and clustering methodology. Simulations are performed using the two channel models to analyze the channel eigenvalue distribution and spectral efficiency leveraging the analog/digital hybrid beamforming methods found in the literature. Simulation results show that the 3GPP model produces different eigenvalue and spectral efficiency distributions for mmWave bands, as compared to the outcome from NYUSIM that is based on massive amounts of real-world measured data in New York City. This work shows NYUSIM is more accurate for realistic simulations than 3GPP in urban environments.
△ Less
Submitted 10 July, 2017; v1 submitted 2 July, 2017;
originally announced July 2017.
-
Coordinated Regularized Zero-Forcing Precoding for Multicell MISO Systems with Limited Feedback
Authors:
Jawad Mirza,
Peter J. Smith,
Pawel A. Dmochowski,
Mansoor Shafi
Abstract:
We investigate coordinated regularized zero-forcing precoding for limited feedback multicell multiuser multiple-input single-output systems. We begin by deriving an approximation to the expected signal-to-interference-plus-noise ratio for the proposed scheme with perfect channel direction information (CDI) at the base station (BS). We also derive an expected SINR approximation for limited feedback…
▽ More
We investigate coordinated regularized zero-forcing precoding for limited feedback multicell multiuser multiple-input single-output systems. We begin by deriving an approximation to the expected signal-to-interference-plus-noise ratio for the proposed scheme with perfect channel direction information (CDI) at the base station (BS). We also derive an expected SINR approximation for limited feedback systems with random vector quantization (RVQ) based codebook CDI at the BS. Using the expected interference result for the RVQ based limited feedback CDI, we propose an adaptive feedback bit allocation strategy to minimize the expected interference by partitioning the total number of bits between the serving and out-of-cell interfering channels. Numerical results show that the proposed adaptive feedback bit allocation method offers a spectral efficiency gain over the existing coordinated zero-forcing scheme.
△ Less
Submitted 17 February, 2016; v1 submitted 28 August, 2015;
originally announced August 2015.
-
Coordinated Two-Tier Heterogeneous Cellular Networks with Leakage Based Beamforming
Authors:
Harsh Tataria,
Mansoor Shafi,
Peter J. Smith,
Pawel A. Dmochowski
Abstract:
In this paper we demonstrate the rate gains achieved by two-tier heterogeneous cellular networks (HetNets) with varying degrees of coordination between macrocell and microcell base stations (BSs). We show that without the presence of coordination, network densification does not provide any gain in the sum rate and rapidly decreases the mean per-user signal-to-interference-plus-noise-ratio (SINR).…
▽ More
In this paper we demonstrate the rate gains achieved by two-tier heterogeneous cellular networks (HetNets) with varying degrees of coordination between macrocell and microcell base stations (BSs). We show that without the presence of coordination, network densification does not provide any gain in the sum rate and rapidly decreases the mean per-user signal-to-interference-plus-noise-ratio (SINR). Our results show that coordination reduces the rate of SINR decay with increasing numbers of microcell BSs in the system. Validity of the analytically approximated mean per-user SINR over a wide range of signal-to-noise-ratio (SNR) is demonstrated via comparison with the simulated results.
△ Less
Submitted 5 March, 2015;
originally announced March 2015.
-
On the Convergence and Performance of MF Precoding in Distributed Massive MU-MIMO Systems
Authors:
Peter J. Smith,
Callum T. Neil,
Mansoor Shafi,
Pawel A. Dmochowski
Abstract:
In this paper, we analyze both the rate of convergence and the performance of a matched-filter (MF) precoder in a massive multi-user (MU) multiple-input-multiple-output (MIMO) system, with the aim of determining the impact of distributing the transmit antennas into multiple clusters. We consider cases of transmit spatial correlation, unequal link gains and imperfect channel state information (CSI)…
▽ More
In this paper, we analyze both the rate of convergence and the performance of a matched-filter (MF) precoder in a massive multi-user (MU) multiple-input-multiple-output (MIMO) system, with the aim of determining the impact of distributing the transmit antennas into multiple clusters. We consider cases of transmit spatial correlation, unequal link gains and imperfect channel state information (CSI). Furthermore, we derive a MF signal-to-interference-plus-noise-ratio (SINR) limit as both the number of transmit antennas and the number of users tend to infinity. In our results, we show that both the rate of convergence and performance is strongly dependent on spatial correlation. In the presence of spatial correlation, distributing the antennas into multiple clusters renders significant gains over a co-located antenna array scenario. In uncorrelated scenarios, a co-located antenna cluster has a marginally better mean per-user SINR performance due to its superior single-user signal-to-noise-ratio (SNR) regime, i.e., when a user is close to the base station (BS), the links between the user and all transmit antennas becomes strong.
△ Less
Submitted 2 March, 2015;
originally announced March 2015.
-
Deployment Issues for Massive MIMO Systems
Authors:
Callum T. Neil,
Mansoor Shafi,
Peter J. Smith,
Pawel A. Dmochowski
Abstract:
In this paper we examine a number of deployment issues which arise from practical considerations in massive multiple-input-multiple-output (MIMO) systems. We show both spatial correlation and line-of-sight (LOS) introduce an interference component to the system which causes non-orthogonality between user channels. Distributing the antennas into multiple clusters is shown to reduce spatial correlat…
▽ More
In this paper we examine a number of deployment issues which arise from practical considerations in massive multiple-input-multiple-output (MIMO) systems. We show both spatial correlation and line-of-sight (LOS) introduce an interference component to the system which causes non-orthogonality between user channels. Distributing the antennas into multiple clusters is shown to reduce spatial correlation and improve performance. Furthermore, due to its ability to minimize interference, zero forcing (ZF) precoding performs well in massive MIMO systems compared to matched filter (MF) precoding which suffers large penalties. However, the noise component in the ZF signal-to-noise-ratio (SNR) increases significantly in the case of imperfect transmit channel state information (CSI).
△ Less
Submitted 2 March, 2015;
originally announced March 2015.
-
On the Impact of Antenna Topologies for Massive MIMO Systems
Authors:
Callum T. Neil,
Mansoor Shafi,
Peter J. Smith,
Pawel A. Dmochowski
Abstract:
Approximate expressions for the spatial correlation of cylindrical and uniform rectangular arrays (URA) are derived using measured distributions of angles of departure (AOD) for both the azimuth and zenith domains. We examine massive multiple-input-multiple-output (MIMO) convergence properties of the correlated channels by considering a number of convergence metrics. The per-user matched filter (M…
▽ More
Approximate expressions for the spatial correlation of cylindrical and uniform rectangular arrays (URA) are derived using measured distributions of angles of departure (AOD) for both the azimuth and zenith domains. We examine massive multiple-input-multiple-output (MIMO) convergence properties of the correlated channels by considering a number of convergence metrics. The per-user matched filter (MF) signal-to-interference-plus-noise ratio (SINR) performance and convergence rate, to respective limiting values, of the two antenna topologies is also explored.
△ Less
Submitted 2 March, 2015;
originally announced March 2015.
-
On the Convergence of Massive MIMO Systems
Authors:
Peter J. Smith,
Callum T. Neil,
Mansoor Shafi,
Pawel A. Dmochowski
Abstract:
In this paper we examine convergence properties of massive MIMO systems with the aim of determining the number of antennas required for massive MIMO gains. We consider three characteristics of a channel matrix and study their asymptotic behaviour. Furthermore, we derive ZF SNR and MF SINR for a scenario of unequal receive powers. In our results we include the effects of spatial correlation. We sho…
▽ More
In this paper we examine convergence properties of massive MIMO systems with the aim of determining the number of antennas required for massive MIMO gains. We consider three characteristics of a channel matrix and study their asymptotic behaviour. Furthermore, we derive ZF SNR and MF SINR for a scenario of unequal receive powers. In our results we include the effects of spatial correlation. We show that the rate of convergence of channel metrics is much slower than that of the ZF/MF precoder properties.
△ Less
Submitted 28 January, 2015;
originally announced January 2015.
-
Limited Feedback Massive MISO Systems with Trellis Coded Quantization for Correlated Channels
Authors:
Jawad Mirza,
Mansoor Shafi,
Peter J. Smith,
Pawel A. Dmochowski
Abstract:
In this paper, we propose trellis coded quantization (TCQ) based limited feedback techniques for massive multiple-input single-output (MISO) frequency division duplexing (FDD) systems in temporally and spatially correlated channels. We exploit the correlation present in the channel to effectively quantize channel direction information (CDI). For multiuser (MU) systems with matched-filter (MF) prec…
▽ More
In this paper, we propose trellis coded quantization (TCQ) based limited feedback techniques for massive multiple-input single-output (MISO) frequency division duplexing (FDD) systems in temporally and spatially correlated channels. We exploit the correlation present in the channel to effectively quantize channel direction information (CDI). For multiuser (MU) systems with matched-filter (MF) precoding, we show that the number of feedback bits required by the random vector quantization (RVQ) codebook to match even a small fraction of the perfect CDI signal-to-interference-plus-noise ratio (SINR) performance is large. With such large numbers of bits, the exhaustive search required by conventional codebook approaches make them infeasible for massive MISO systems. Motivated by this, we propose a differential TCQ scheme for temporally correlated channels that transforms the source constellation at each stage in a trellis using 2D translation and scaling techniques. We derive a scaling parameter for the source constellation as a function of the temporal correlation and the number of BS antennas. We also propose a TCQ based limited feedback scheme for spatially correlated channels where the channel is quantized directly without performing decorrelation at the receiver. Simulation results show that the proposed TCQ schemes outperform the existing noncoherent TCQ (NTCQ) schemes, by improving the spectral efficiency and beamforming gain of the system. The proposed differential TCQ also reduces the feedback overhead of the system compared to the differential NTCQ method.
△ Less
Submitted 1 December, 2015; v1 submitted 23 May, 2014;
originally announced May 2014.
-
A Study on the Open Source Digital Library Software's: Special Reference to DSpace, EPrints and Greenstone
Authors:
Shahkar Tramboo,
Humma,
S M Shafi,
Sumeer Gul
Abstract:
The richness in knowledge has changed access methods for all stake holders in retrieving key knowledge and relevant information. This paper presents a study of three open source digital library management software used to assimilate and disseminate information to world audience. The methodology followed involves online survey and study of related software documentation and associated technical man…
▽ More
The richness in knowledge has changed access methods for all stake holders in retrieving key knowledge and relevant information. This paper presents a study of three open source digital library management software used to assimilate and disseminate information to world audience. The methodology followed involves online survey and study of related software documentation and associated technical manuals.
△ Less
Submitted 20 December, 2012;
originally announced December 2012.
-
The Effects of Limited Channel Knowledge on Cognitive Radio System Capacity
Authors:
Peter J. Smith,
Pawel A. Dmochowski,
Himal A. Suraweera,
Mansoor Shafi
Abstract:
We examine the impact of limited channel knowledge on the secondary user (SU) in a cognitive radio system. Under a minimum signal-to-interference-and-noise ratio (SINR) constraint for the primary user (PU) receiver, we determine the SU capacity under five channel knowledge scenarios. We derive analytical expressions for the capacity cumulative distribution functions and the probability of SU block…
▽ More
We examine the impact of limited channel knowledge on the secondary user (SU) in a cognitive radio system. Under a minimum signal-to-interference-and-noise ratio (SINR) constraint for the primary user (PU) receiver, we determine the SU capacity under five channel knowledge scenarios. We derive analytical expressions for the capacity cumulative distribution functions and the probability of SU blocking as a function of allowable interference. We show that imperfect knowledge of the PU-PU channel gain by the SU-Tx often prohibits SU transmission or necessitates a high interference level at the PU. We also show that errored knowledge of the PU-PU channel is more beneficial than statistical channel knowledge and imperfect knowledge of the SU-Tx to PU-Rx link has a limited impact on SU capacity.
△ Less
Submitted 26 August, 2012;
originally announced August 2012.
-
Search Engine Optimization Techniques Practiced in Organizations: A Study of Four Organizations
Authors:
Muhammad Akram,
Imran Sohail,
Sikandar Hayat,
M. Imran Shafi,
Umer Saeed
Abstract:
Web spammers used Search Engine Optimization (SEO) techniques to increase search-ranking of web sites. In this paper we have study the essentials SEO techniques, such as; directory submission, keyword generation and link exchanges. The impact of SEO techniques can be applied as marketing technique and to get top listing in major search engines like Google, Yahoo, and MSN. Our study focuses on thes…
▽ More
Web spammers used Search Engine Optimization (SEO) techniques to increase search-ranking of web sites. In this paper we have study the essentials SEO techniques, such as; directory submission, keyword generation and link exchanges. The impact of SEO techniques can be applied as marketing technique and to get top listing in major search engines like Google, Yahoo, and MSN. Our study focuses on these techniques from four different companies' perspectives of United Kingdom and Pakistan. According to the these companies, these techniques are low cost and high impacts in profit, because mostly customers focus on major search engine to find different products on internet, so SEO technique provides best opportunity to grow their business. This paper also describes the pros and cons of using these searh engine optimization techniques in above four companies. We have concluded that these techniques are essential to increase their business profit and minimize their marketing cost.
△ Less
Submitted 23 June, 2010;
originally announced June 2010.
-
Effectiveness of Intrusion Prevention Systems (IPS) in Fast Networks
Authors:
Muhammad Imran Shafi,
Muhammad Akram,
Sikandar Hayat,
Imran Sohail
Abstract:
Computer systems are facing biggest threat in the form of malicious data which causing denial of service, information theft, financial and credibility loss etc. No defense technique has been proved successful in handling these threats. Intrusion Detection and Prevention Systems (IDPSs) being best of available solutions. These techniques are getting more and more attention. Although Intrusion Preve…
▽ More
Computer systems are facing biggest threat in the form of malicious data which causing denial of service, information theft, financial and credibility loss etc. No defense technique has been proved successful in handling these threats. Intrusion Detection and Prevention Systems (IDPSs) being best of available solutions. These techniques are getting more and more attention. Although Intrusion Prevention Systems (IPSs) show a good level of success in detecting and preventing intrusion attempts to networks, they show a visible deficiency in their performance when they are employed on fast networks. In this paper we have presented a design including quantitative and qualitative methods to identify improvement areas in IPSs. Focus group is used for qualitative analysis and experiment is used for quantitative analysis. This paper also describes how to reduce the responding time for IPS when an intrusion occurs on network, and how can IPS be made to perform its tasks successfully without effecting network speed negatively.
△ Less
Submitted 23 June, 2010;
originally announced June 2010.
-
On the Statistics of Cognitive Radio Capacity in Shadowing and Fast Fading Environments
Authors:
Muhammad Fainan Hanif,
Peter J. Smith,
Mansoor Shafi
Abstract:
In this paper we consider the capacity of the cognitive radio channel in a fading environment under a "low interference regime". This capacity depends critically on a power loss parameter, $α$, which governs how much transmit power the cognitive radio dedicates to relaying the primary message. We derive a simple, accurate approximation to $α$ which gives considerable insight into system capacity…
▽ More
In this paper we consider the capacity of the cognitive radio channel in a fading environment under a "low interference regime". This capacity depends critically on a power loss parameter, $α$, which governs how much transmit power the cognitive radio dedicates to relaying the primary message. We derive a simple, accurate approximation to $α$ which gives considerable insight into system capacity. We also investigate the effects of system parameters and propagation environment on $α$ and the cognitive radio capacity. In all cases, the use of the approximation is shown to be extremely accurate. Finally, we derive the probability that the "low interference regime" holds and demonstrate that this is the dominant case, especially in practical cognitive radio deployment scenarios.
△ Less
Submitted 20 May, 2009;
originally announced May 2009.
-
Performance of Cognitive Radio Systems with Imperfect Radio Environment Map Information
Authors:
Muhammad Fainan Hanif,
Peter J. Smith,
Mansoor Shafi
Abstract:
In this paper we describe the effect of imperfections in the radio environment map (REM) information on the performance of cognitive radio (CR) systems. Via simulations we explore the relationship between the required precision of the REM and various channel/system properties. For example, the degree of spatial correlation in the shadow fading is a key factor as is the interference constraint em…
▽ More
In this paper we describe the effect of imperfections in the radio environment map (REM) information on the performance of cognitive radio (CR) systems. Via simulations we explore the relationship between the required precision of the REM and various channel/system properties. For example, the degree of spatial correlation in the shadow fading is a key factor as is the interference constraint employed by the primary user. Based on the CR interferers obtained from the simulations, we characterize the temporal behavior of such systems by computing the level crossing rates (LCRs) of the cumulative interference represented by these CRs. This evaluates the effect of short term fluctuations above acceptable interference levels due to the fast fading. We derive analytical formulae for the LCRs in Rayleigh and Rician fast fading conditions. The analytical results are verified by Monte Carlo simulations.
△ Less
Submitted 20 May, 2009; v1 submitted 19 May, 2009;
originally announced May 2009.
-
Interference and Deployment Issues for Cognitive Radio Systems in Shadowing Environments
Authors:
Muhammad Fainan Hanif,
Mansoor Shafi,
Peter J. Smith,
Pawel A. Dmochowski
Abstract:
In this paper we describe a model for calculating the aggregate interference encountered by primary receivers in the presence of randomly placed cognitive radios (CRs). We show that incorporating the impact of distance attenuation and lognormal fading on each constituent interferer in the aggregate, leads to a composite interference that cannot be satisfactorily modeled by a lognormal. Using the…
▽ More
In this paper we describe a model for calculating the aggregate interference encountered by primary receivers in the presence of randomly placed cognitive radios (CRs). We show that incorporating the impact of distance attenuation and lognormal fading on each constituent interferer in the aggregate, leads to a composite interference that cannot be satisfactorily modeled by a lognormal. Using the interference statistics we determine a number of key parameters needed for the deployment of CRs. Examples of these are the exclusion zone radius, needed to protect the primary receiver under different types of fading environments and acceptable interference levels, and the numbers of CRs that can be deployed. We further show that if the CRs have apriori knowledge of the radio environment map (REM), then a much larger number of CRs can be deployed especially in a high density environment. Given REM information, we also look at the CR numbers achieved by two different types of techniques to process the scheduling information.
△ Less
Submitted 20 May, 2009; v1 submitted 19 May, 2009;
originally announced May 2009.
-
Channel Capacity Limits of Cognitive Radio in Asymmetric Fading Environments
Authors:
Himal A. Suraweera,
Jason Gao,
Peter J. Smith,
Mansoor Shafi,
Michael Faulkner
Abstract:
Cognitive radio technology is an innovative radio design concept which aims to increase spectrum utilization by exploiting unused spectrum in dynamically changing environments. By extending previous results, we investigate the capacity gains achievable with this dynamic spectrum approach in asymmetric fading channels. More specifically, we allow the secondary-to-primary and secondary-to-secondar…
▽ More
Cognitive radio technology is an innovative radio design concept which aims to increase spectrum utilization by exploiting unused spectrum in dynamically changing environments. By extending previous results, we investigate the capacity gains achievable with this dynamic spectrum approach in asymmetric fading channels. More specifically, we allow the secondary-to-primary and secondary-to-secondary user channels to undergo Rayleigh or Rician fading, with arbitrary link power. In order to compute the capacity, we derive the distributions of ratios of Rayleigh and Rician variables. Compared to the symmetric fading scenario, our results indicate several interesting features of the capacity behaviour under both average and peak received power constraints. Finally, the impact of multiple primary users on the capacity under asymmetric fading has also been studied.
△ Less
Submitted 5 June, 2008;
originally announced June 2008.