Skip to main content

Showing 1–9 of 9 results for author: Tourki, K

.
  1. arXiv:1902.01342  [pdf, other

    cs.IT

    Self-Tuning Spectral Clustering for Adaptive Tracking Areas Design in 5G Ultra-Dense Networks

    Authors: Brahim Aamer, Hatim Chergui, Nouamane Chergui, Kamel Tourki, Mustapha Benjillali, Christos Verikoukis, Mérouane Debbah

    Abstract: In this paper, we address the issue of automatic tracking areas (TAs) planning in fifth generation (5G) ultra-dense networks (UDNs). By invoking handover (HO) attempts and measurement reports (MRs) statistics of a 4G live network, we first introduce a new kernel function map** HO attempts, MRs and inter-site distances (ISDs) into the so-called similarity weight. The corresponding matrix is then… ▽ More

    Submitted 4 February, 2019; originally announced February 2019.

    Comments: IEEE WCNC'2019 (Accepted)

  2. arXiv:1809.01583  [pdf, other

    cs.IT

    Classification Algorithms for Semi-Blind Uplink/Downlink Decoupling in sub-6 GHz/mmWave 5G Networks

    Authors: Hatim Chergui, Kamel Tourki, Redouane Lguensat, Mustapha Benjillali, Christos Verikoukis, Mérouane Debbah

    Abstract: Reliability and latency challenges in future mixed sub-6 GHz/millimeter wave (mmWave) fifth generation (5G) cell-free massive multiple-input multiple-output (MIMO) networks is to guarantee a fast radio resource management in both uplink (UL) and downlink (DL), while tackling the corresponding propagation imbalance that may arise in blockage situations. In this context, we introduce a semi-blind UL… ▽ More

    Submitted 5 September, 2018; originally announced September 2018.

    Comments: Submitted to IEEE Wireless Communications Letters

  3. arXiv:1803.02412  [pdf, other

    cs.IT cs.NI

    Securing Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers

    Authors: Ahmed El Shafie, Asma Mabrouk, Kamel Tourki, Naofal Al-Dhahir, Mazen O. Hasna

    Abstract: This letter investigates the physical layer security in a wireless cooperative network where communication is assisted by a full-duplex (FD) untrusted relay in the presence of multiple external eavesdroppers. A cluster-based colluding eavesdrop** setting is considered, where illegitimate nodes with common interests are grouped in a cluster. In order to confuse the different eavesdrop** cluster… ▽ More

    Submitted 6 March, 2018; originally announced March 2018.

  4. arXiv:1706.05442  [pdf, other

    cs.IT cs.NI

    Probabilistic Jamming/Eavesdrop** Attacks to Confuse a Buffer-Aided Transmitter-Receiver Pair

    Authors: Ahmed El Shafie, Kamel Tourki, Zhiguo Ding, Naofal Al-Dhahir

    Abstract: We assume that a buffer-aided transmitter communicates with a receiving node in the presence of an attacker. We investigate the impact of a radio-frequency energy-harvesting attacker that probabilistically operates as a jammer or an eavesdropper. We show that even without the need for an external energy source, the attacker can still degrade the security of the legitimate system. We show that the… ▽ More

    Submitted 16 June, 2017; originally announced June 2017.

    Comments: Published in Comm letters March 2017

  5. arXiv:1706.03444  [pdf, other

    cs.IT cs.NI

    Secret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks

    Authors: Ahmed El Shafie, Ahmed Sultan, Asma Mabrouk, Kamel Tourki, Naofal Al-Dhahir

    Abstract: This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has been… ▽ More

    Submitted 11 June, 2017; originally announced June 2017.

  6. arXiv:1704.03288  [pdf, ps, other

    cs.IT

    Energy Efficiency in Cell-Free Massive MIMO with Zero-Forcing Precoding Design

    Authors: L. D. Nguyen, T. Q. Duong, H. Q. Ngo, K. Tourki

    Abstract: We consider the downlink of a cell-free massive multiple-input multiple-output (MIMO) network where numerous distributed access points (APs) serve a smaller number of users under time division duplex operation. An important issue in deploying cell-free networks is high power consumption, which is proportional to the number of APs. This issue has raised the question as to their suitability for gree… ▽ More

    Submitted 11 April, 2017; originally announced April 2017.

    Comments: Accepted for publication on IEEE Communications Letters

    Journal ref: IEEE Communications Letters, 2017

  7. arXiv:1612.06056  [pdf, ps, other

    cs.NI cs.IT

    An Artificial-Noise-Aided Hybrid TS/PS Scheme for OFDM-Based SWIPT Systems

    Authors: Ahmed El Shafie, Kamel Tourki, Naofal Al-Dhahir

    Abstract: We propose a new artificial-noise aided hybrid time-switching/power-splitting scheme for orthogonal frequency-division multiplexing (OFDM) systems to securely transmit data and transfer energy to a legitimate receiving node. In our proposed scheme, the cyclic prefix has two more benefits in addition to the cancellation of the inter-symbol interference between the OFDM blocks. Firstly, it enables t… ▽ More

    Submitted 19 December, 2016; originally announced December 2016.

    Comments: Accepted for publication in IEEE Communications Letters Dec 2016

  8. arXiv:1305.5913  [pdf, ps, other

    cs.IT

    Performance of Opportunistic Fixed Gain Bidirectional Relaying With Outdated CSI

    Authors: Fahd Ahmed Khan, Kamel Tourki, Mohamed-Slim Alouini, Khalid A. Qaraqe

    Abstract: This paper studies the impact of using outdated channel state information for relay selection on the performance of a network where two sources communicate with each other via fixed-gain amplifyand- forward relays. For a Rayleigh faded channel, closed-form expressions for the outage probability, moment generating function and symbol error rate are derived. Simulations results are also presented to… ▽ More

    Submitted 25 May, 2013; originally announced May 2013.

  9. arXiv:1101.5335  [pdf, ps, other

    cs.PF

    Accurate Performance Analysis of Opportunistic Decode-and-Forward Relaying

    Authors: Kamel Tourki, Hong-Chuan Yang, Mohamed-Slim Alouni

    Abstract: In this paper, we investigate an opportunistic relaying scheme where the selected relay assists the source-destination (direct) communication. In our study, we consider a regenerative opportunistic relaying scheme in which the direct path can be considered unusable, and takes into account the effect of the possible erroneously detected and transmitted data at the best relay. We first derive statis… ▽ More

    Submitted 10 January, 2011; originally announced January 2011.

    Comments: 15 pages, 4 figures, Technical Report