-
OPSD: an Offensive Persian Social media Dataset and its baseline evaluations
Authors:
Mehran Safayani,
Amir Sartipi,
Amir Hossein Ahmadi,
Parniyan Jalali,
Amir Hossein Mansouri,
Mohammad Bisheh-Niasar,
Zahra Pourbahman
Abstract:
The proliferation of hate speech and offensive comments on social media has become increasingly prevalent due to user activities. Such comments can have detrimental effects on individuals' psychological well-being and social behavior. While numerous datasets in the English language exist in this domain, few equivalent resources are available for Persian language. To address this gap, this paper in…
▽ More
The proliferation of hate speech and offensive comments on social media has become increasingly prevalent due to user activities. Such comments can have detrimental effects on individuals' psychological well-being and social behavior. While numerous datasets in the English language exist in this domain, few equivalent resources are available for Persian language. To address this gap, this paper introduces two offensive datasets. The first dataset comprises annotations provided by domain experts, while the second consists of a large collection of unlabeled data obtained through web crawling for unsupervised learning purposes. To ensure the quality of the former dataset, a meticulous three-stage labeling process was conducted, and kappa measures were computed to assess inter-annotator agreement. Furthermore, experiments were performed on the dataset using state-of-the-art language models, both with and without employing masked language modeling techniques, as well as machine learning algorithms, in order to establish the baselines for the dataset using contemporary cutting-edge approaches. The obtained F1-scores for the three-class and two-class versions of the dataset were 76.9% and 89.9% for XLM-RoBERTa, respectively.
△ Less
Submitted 8 April, 2024;
originally announced April 2024.
-
Rapidly Deployable Intelligent 5G Aerial Neutral Host Networks: an O-RAN-Based Approach
Authors:
Yi Chu,
David Grace,
Josh Shackleton,
Andy White,
David Hunter,
Hamed Ahmadi
Abstract:
Arxiv is acting weird and throwing error: "Bad character(s) in field Abstract." for no reason. Please refer to the manuscript.
Arxiv is acting weird and throwing error: "Bad character(s) in field Abstract." for no reason. Please refer to the manuscript.
△ Less
Submitted 18 March, 2024;
originally announced March 2024.
-
Joint Network Lifetime Maximization and Relay Selection Design in Underwater Acoustic Sensor Networks
Authors:
Z. Mohammadi,
M. Soleimanpour-Moghadam,
S. Talebi,
H. Ahmadi
Abstract:
The paper proposes a new approach to minimize the number of relays while maximizing the lifetime of underwater acoustic sensor networks (UASNs). This involves formulating the relay node placement (RNP) problem as a multi-objective optimization problem and employing the multi-objective lexico-graphic method (MOLM) to solve it. To achieve the optimal solution, the MOLM consists of two steps. First,…
▽ More
The paper proposes a new approach to minimize the number of relays while maximizing the lifetime of underwater acoustic sensor networks (UASNs). This involves formulating the relay node placement (RNP) problem as a multi-objective optimization problem and employing the multi-objective lexico-graphic method (MOLM) to solve it. To achieve the optimal solution, the MOLM consists of two steps. First, the problem of lifetime maximization is tackled to find RNP solutions. This transforms the RNP into a non-convex optimization problem which is then converted into a convex programming equivalent. The proposed method has the same computational complexity as previous relay-node adjustment (RA) and difference convex algorithm (DCA) methods. The second step introduces a novel relay node selection to reach the optimal number of relays. Simulation results demonstrate that it has superior network lifetime and efficiency compared to RA and DCA.
△ Less
Submitted 4 October, 2023;
originally announced October 2023.
-
Dynamic Prioritization and Adaptive Scheduling using Deep Deterministic Policy Gradient for Deploying Microservice-based VNFs
Authors:
Swarna B. Chetty,
Hamed Ahmadi,
Avishek Nag
Abstract:
The Network Function Virtualization (NFV)-Resource Allocation (RA) problem is NP-Hard. Traditional deployment methods revealed the existence of a starvation problem, which the researchers failed to recognize. Basically, starvation here, means the longer waiting times and eventual rejection of low-priority services due to a 'time out'. The contribution of this work is threefold: a) explain the exis…
▽ More
The Network Function Virtualization (NFV)-Resource Allocation (RA) problem is NP-Hard. Traditional deployment methods revealed the existence of a starvation problem, which the researchers failed to recognize. Basically, starvation here, means the longer waiting times and eventual rejection of low-priority services due to a 'time out'. The contribution of this work is threefold: a) explain the existence of the starvation problem in the existing methods and their drawbacks, b) introduce 'Adaptive Scheduling' (AdSch) which is an 'intelligent scheduling' scheme using a three-factor approach (priority, threshold waiting time, and reliability), which proves to be more reasonable than traditional methods solely based on priority, and c) a 'Dynamic Prioritization' (DyPr), allocation method is also proposed for unseen services and the importance of macro- and micro-level priority. We presented a zero-touch solution using Deep Deterministic Policy Gradient (DDPG) for adaptive scheduling and an online-Ridge Regression (RR) model for dynamic prioritization. The DDPG successfully identified the 'Beneficial and Starving' services, efficiently deploying twice as many low-priority services as others, reducing the starvation problem. Our online-RR model learns the pattern in less than 100 transitions, and the prediction model has an accuracy rate of more than 80%.
△ Less
Submitted 17 February, 2023;
originally announced March 2023.
-
Automatic summarisation of Instagram social network posts Combining semantic and statistical approaches
Authors:
Kazem Taghandiki,
Mohammad Hassan Ahmadi,
Elnaz Rezaei Ehsan
Abstract:
The proliferation of data and text documents such as articles, web pages, books, social network posts, etc. on the Internet has created a fundamental challenge in various fields of text processing under the title of "automatic text summarisation". Manual processing and summarisation of large volumes of textual data is a very difficult, expensive, time-consuming and impossible process for human use…
▽ More
The proliferation of data and text documents such as articles, web pages, books, social network posts, etc. on the Internet has created a fundamental challenge in various fields of text processing under the title of "automatic text summarisation". Manual processing and summarisation of large volumes of textual data is a very difficult, expensive, time-consuming and impossible process for human users. Text summarisation systems are divided into extractive and abstract categories. In the extractive summarisation method, the final summary of a text document is extracted from the important sentences of the same document without any modification. In this method, it is possible to repeat a series of sentences and to interfere with pronouns. However, in the abstract summarisation method, the final summary of a textual document is extracted from the meaning and significance of the sentences and words of the same document or other documents. Many of the works carried out have used extraction methods or abstracts to summarise the collection of web documents, each of which has advantages and disadvantages in the results obtained in terms of similarity or size. In this work, a crawler has been developed to extract popular text posts from the Instagram social network with appropriate preprocessing, and a set of extraction and abstraction algorithms have been combined to show how each of the abstraction algorithms can be used. Observations made on 820 popular text posts on the social network Instagram show the accuracy (80%) of the proposed system.
△ Less
Submitted 14 March, 2023;
originally announced March 2023.
-
YA-DA: YAng-Based DAta Model for Fine-Grained IIoT Air Quality Monitoring
Authors:
Yagmur Yigit,
Khayal Huseynov,
Hamed Ahmadi,
Berk Canberk
Abstract:
With the development of industrialization, air pollution is also steadily on the rise since both industrial and daily activities generate a massive amount of air pollution. Since decreasing air pollution is critical for citizens' health and well-being, air pollution monitoring is becoming an essential topic. Industrial Internet of Things (IIoT) research focuses on this crucial area. Several attemp…
▽ More
With the development of industrialization, air pollution is also steadily on the rise since both industrial and daily activities generate a massive amount of air pollution. Since decreasing air pollution is critical for citizens' health and well-being, air pollution monitoring is becoming an essential topic. Industrial Internet of Things (IIoT) research focuses on this crucial area. Several attempts already exist for air pollution monitoring. However, none of them are improving the performance of IoT data collection at the desired level. Inspired by the genuine Yet Another Next Generation (YANG) data model, we propose a YAng-based DAta model (YA-DA) to improve the performance of IIoT data collection. Moreover, by taking advantage of digital twin (DT) technology, we propose a DT-enabled fine-grained IIoT air quality monitoring system using YA-DA. As a result, DT synchronization becomes fine-grained. In turn, we improve the performance of IIoT data collection resulting in lower round-trip time (RTT), higher DT synchronization, and lower DT latency.
△ Less
Submitted 25 October, 2023; v1 submitted 28 November, 2022;
originally announced November 2022.
-
A Transfer Learning Approach for UAV Path Design with Connectivity Outage Constraint
Authors:
Gianluca Fontanesi,
Anding Zhu,
Mahnaz Arvaneh,
Hamed Ahmadi
Abstract:
The connectivity-aware path design is crucial in the effective deployment of autonomous Unmanned Aerial Vehicles (UAVs). Recently, Reinforcement Learning (RL) algorithms have become the popular approach to solving this type of complex problem, but RL algorithms suffer slow convergence. In this paper, we propose a Transfer Learning (TL) approach, where we use a teacher policy previously trained in…
▽ More
The connectivity-aware path design is crucial in the effective deployment of autonomous Unmanned Aerial Vehicles (UAVs). Recently, Reinforcement Learning (RL) algorithms have become the popular approach to solving this type of complex problem, but RL algorithms suffer slow convergence. In this paper, we propose a Transfer Learning (TL) approach, where we use a teacher policy previously trained in an old domain to boost the path learning of the agent in the new domain. As the exploration processes and the training continue, the agent refines the path design in the new domain based on the subsequent interactions with the environment. We evaluate our approach considering an old domain at sub-6 GHz and a new domain at millimeter Wave (mmWave). The teacher path policy, previously trained at sub-6 GHz path, is the solution to a connectivity-aware path problem that we formulate as a constrained Markov Decision Process (CMDP). We employ a Lyapunov-based model-free Deep Q-Network (DQN) to solve the path design at sub-6 GHz that guarantees connectivity constraint satisfaction. We empirically demonstrate the effectiveness of our approach for different urban environment scenarios. The results demonstrate that our proposed approach is capable of reducing the training time considerably at mmWave.
△ Less
Submitted 7 November, 2022;
originally announced November 2022.
-
Networked Twins and Twins of Networks: an Overview on the Relationship Between Digital Twins and 6G
Authors:
Hamed Ahmadi,
Avishek Nag,
Zaheer Khan,
Kamran Sayrafian,
Susanto Rahadrja
Abstract:
Digital Twin (DT) is a promising technology for the new immersive digital life with a variety of applications in areas such as Industry 4.0, aviation, and healthcare. Proliferation of this technology requires higher data rates, reliability, resilience, and lower latency beyond what is currently offered by 5G. Thus, DT can become a major driver for 6G research and development. Alternatively, 6G net…
▽ More
Digital Twin (DT) is a promising technology for the new immersive digital life with a variety of applications in areas such as Industry 4.0, aviation, and healthcare. Proliferation of this technology requires higher data rates, reliability, resilience, and lower latency beyond what is currently offered by 5G. Thus, DT can become a major driver for 6G research and development. Alternatively, 6G network development can benefit from Digital Twin technology and its powerful features such as modularity and remote intelligence. Using DT, a 6G network (or some of its components) will have the opportunity to use Artificial Intelligence more proactively in order to enhance its resilience. DT's application in telecommunications is still in its infancy. In this article we highlight some of the most promising research and development directions for this technology.
△ Less
Submitted 12 August, 2021;
originally announced August 2021.
-
Cooperative NOMA-Based User Pairing for URLLC: A Max-Min Fairness Approach
Authors:
Fateme Salehi,
Naaser Neda,
Mohammad-Hassan Majidi,
Hamed Ahmadi
Abstract:
In this paper, cooperative non-orthogonal multiple access (C-NOMA) is considered in short packet communications with finite blocklength (FBL) codes. The performance of a decode-and-forward (DF) relaying along with selection combining (SC) and maximum ratio combining (MRC) strategies at the receiver side is examined. We explore joint user pairing and resource allocation to maximize fair throughput…
▽ More
In this paper, cooperative non-orthogonal multiple access (C-NOMA) is considered in short packet communications with finite blocklength (FBL) codes. The performance of a decode-and-forward (DF) relaying along with selection combining (SC) and maximum ratio combining (MRC) strategies at the receiver side is examined. We explore joint user pairing and resource allocation to maximize fair throughput in a downlink (DL) scenario. In each pair, the user with a stronger channel (strong user) acts as a relay for the other one (weak user), and optimal power and blocklength are allocated to achieve max-min throughput. To this end, first, only one pair is considered, and optimal resource allocation is explored. Also, a suboptimal algorithm is suggested, which converges to a near-optimal solution. Finally, the problem is extended to a general scenario, and a suboptimal C-NOMA-based user pairing is proposed. Numerical results show that the proposed C-NOMA scheme in both SC and MRC strategies significantly improves the users' fair throughput compared to the NOMA and OMA. It is also investigated that the proposed pairing scheme based on C-NOMA outperforms the Hybrid NOMA/OMA scheme from the average throughput perspective, while the fairness index degrades slightly.
△ Less
Submitted 5 October, 2021; v1 submitted 19 January, 2021;
originally announced January 2021.
-
Fair Pricing In Heterogeneous Internet of Things Wireless Access Networks Using Crowdsourcing
Authors:
Vahid Haghighatdoost,
Siavash Khorsandi,
Hamed Ahmadi
Abstract:
Price and the quality of service are two key factors taken into account by wireless network users when they choose their network provider. The recent advances in wireless technology and massive infrastructure deployments has led to better coverage, and currently at each given wirelessly covered area there are a few network providers and each have different pricing strategies. These providers can p…
▽ More
Price and the quality of service are two key factors taken into account by wireless network users when they choose their network provider. The recent advances in wireless technology and massive infrastructure deployments has led to better coverage, and currently at each given wirelessly covered area there are a few network providers and each have different pricing strategies. These providers can potentially set unfair expensive prices for their services. In this paper, we propose a novel crowdsourcing-based approach for fair wireless service pricing in Internet of Things (IoT). In our considered oligopoly, the regulatory sets a dynamic maximum allowed price of service to prevent anti-trust behaviour and unfair service pricing. We propose a three-tire pricing model where the regulator, wireless network providers and clients are the players of our game. Our method takes client preferences into account in pricing and discovers the fair service pricing just above the marginal costs of each network provider. Our results show that our model is not prone to collusion and will converges only if one network announces the fair price
△ Less
Submitted 10 October, 2020;
originally announced October 2020.
-
Towards scalable user-deployed ultra-dense networks: Blockchain-enabled small cells as a service
Authors:
Emanuele Di Pascale,
Hamed Ahmadi,
Linda Doyle,
Irene Macaluso
Abstract:
Neutral Host Small Cell Providers (SCP) represent a key element of the 5G vision of ultra-dense mobile networks. However, current business models mostly focus on multi-year agreements for large venues, such as stadiums and hotel chains. These business agreements are regulated through binding Service Level Agreements (SLAs), which tend to be too cumbersome and costly for smaller scale SCPs. As a re…
▽ More
Neutral Host Small Cell Providers (SCP) represent a key element of the 5G vision of ultra-dense mobile networks. However, current business models mostly focus on multi-year agreements for large venues, such as stadiums and hotel chains. These business agreements are regulated through binding Service Level Agreements (SLAs), which tend to be too cumbersome and costly for smaller scale SCPs. As a result, the neutral host model does not scale up to its full potential. In this paper, we propose a framework to enable the participation of small- to medium-sized players in the cellular market as providers offering network resources to Mobile Network Operators (MNOs). To this purpose, we review the current and emerging spectrum and technology opportunities that SCPs can use for neutral host deployments. We also propose the use of blockchain-enabled smart contracts as a simple and cost-efficient alternative to traditional SLAs for small-scale SCPs. To demonstrate this, we describe a proof of concept implementation of an Ethereum-based smart contract platform for best-effort service between an SCP and an MNO. Our simulations on potential smart contract-based deployments in city centre Dublin show that the received signal strength in the considered area will increase by an average of $10$ percent.
△ Less
Submitted 30 April, 2020;
originally announced May 2020.
-
Evaluation of electrical efficiency of photovoltaic thermal solar collector
Authors:
Mohammad Hossein Ahmadi,
Alireza Baghban,
Milad Sadeghzadeh,
Mohammad Zamen,
Amir Mosavi,
Shahaboddin Shamshirband,
Ravinder Kumar,
Mohammad Mohammadi-Khanaposhtani
Abstract:
Solar energy is a renewable resource of energy that is broadly utilized and has the least emissions among renewable energies. In this study, machine learning methods of artificial neural networks (ANNs), least squares support vector machines (LSSVM), and neuro-fuzzy are used for advancing prediction models for the thermal performance of a photovoltaic-thermal solar collector (PV/T). In the propose…
▽ More
Solar energy is a renewable resource of energy that is broadly utilized and has the least emissions among renewable energies. In this study, machine learning methods of artificial neural networks (ANNs), least squares support vector machines (LSSVM), and neuro-fuzzy are used for advancing prediction models for the thermal performance of a photovoltaic-thermal solar collector (PV/T). In the proposed models, the inlet temperature, flow rate, heat, solar radiation, and the sun heat have been considered as the inputs variables. Data set has been extracted through experimental measurements from a novel solar collector system. Different analyses are performed to examine the credibility of the introduced approaches and evaluate their performance. The proposed LSSVM model outperformed ANFIS and ANNs models. LSSVM model is reported suitable when the laboratory measurements are costly and time-consuming, or achieving such values requires sophisticated interpretations.
△ Less
Submitted 11 February, 2020;
originally announced February 2020.
-
Graph Model Implementation of Attribute-Based Access Control Policies
Authors:
Hadi Ahmadi,
Derek Small
Abstract:
Attribute-based access control (ABAC) promises a powerful way of formalizing access policies in support of a wide range of access management scenarios. Efficient implementation of ABAC in its general form is still a challenge, especially when addressing the complexity of privacy regulations and access management required to support the explosive growth of social and IoT networks. In this paper, we…
▽ More
Attribute-based access control (ABAC) promises a powerful way of formalizing access policies in support of a wide range of access management scenarios. Efficient implementation of ABAC in its general form is still a challenge, especially when addressing the complexity of privacy regulations and access management required to support the explosive growth of social and IoT networks. In this paper, we introduce a graph model implementation for expressing and evaluating access policies and illustrate a sample use-case implementation over Neo4 Graph Database. Graph databases excel at querying connected data and hence can evaluate complex policies efficiently via graph traversal algorithms.
△ Less
Submitted 21 September, 2019;
originally announced September 2019.
-
Saving Lives at Sea with UAV-assisted Wireless Networks
Authors:
Gianluca Fontanesi,
Anding Zhu,
Hamed Ahmadi
Abstract:
In this paper, we investigate traits and trade-offs of a system combining UAVs with BS or C-RAN for extending the terrestrial wireless coverage over the sea in emergency situations. Results for an over the sea deployment link budget show the trade-off between power consumption and throughput to meet the Search and Rescue targets.
In this paper, we investigate traits and trade-offs of a system combining UAVs with BS or C-RAN for extending the terrestrial wireless coverage over the sea in emergency situations. Results for an over the sea deployment link budget show the trade-off between power consumption and throughput to meet the Search and Rescue targets.
△ Less
Submitted 4 September, 2018;
originally announced September 2018.
-
A Novel Airborne Self-organising Architecture for 5G+ Networks
Authors:
Hamed Ahmadi,
Konstantinos Katzis,
Muhammad Zeeshan Shakir
Abstract:
Network Flying Platforms (NFPs) such as unmanned aerial vehicles, unmanned balloons or drones flying at low/medium/high altitude can be employed to enhance network coverage and capacity by deploying a swarm of flying platforms that implement novel radio resource management techniques. In this paper, we propose a novel layered architecture where NFPs, of various types and flying at low/medium/high…
▽ More
Network Flying Platforms (NFPs) such as unmanned aerial vehicles, unmanned balloons or drones flying at low/medium/high altitude can be employed to enhance network coverage and capacity by deploying a swarm of flying platforms that implement novel radio resource management techniques. In this paper, we propose a novel layered architecture where NFPs, of various types and flying at low/medium/high layers in a swarm of flying platforms, are considered as an integrated part of the future cellular networks to inject additional capacity and expand the coverage for exceptional scenarios (sports events, concerts, etc.) and hard-to-reach areas (rural or sparsely populated areas). Successful roll-out of the proposed architecture depends on several factors including, but are not limited to: network optimisation for NFP placement and association, safety operations of NFP for network/equipment security, and reliability for NFP transport and control/signaling mechanisms. In this work, we formulate the optimum placement of NFP at a Lower Layer (LL) by exploiting the airborne Self-organising Network (SON) features. Our initial simulations show the NFP-LL can serve more User Equipment (UE)s using this placement technique.
△ Less
Submitted 14 July, 2017;
originally announced July 2017.
-
Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization
Authors:
Jonathan van de Belt,
Hamed Ahmadi,
Linda E. Doyle
Abstract:
Virtualization is a topic of great interest in the area of mobile and wireless communication systems. However the term virtualization is used in an inexact manner which makes it difficult to compare and contrast work that has been carried out to date. The purpose of this paper is twofold. In the first place, the paper develops a formal theory for defining virtualization. In the second instance, th…
▽ More
Virtualization is a topic of great interest in the area of mobile and wireless communication systems. However the term virtualization is used in an inexact manner which makes it difficult to compare and contrast work that has been carried out to date. The purpose of this paper is twofold. In the first place, the paper develops a formal theory for defining virtualization. In the second instance, this theory is used as a way of surveying a body of work in the field of wireless link virtualization, a subspace of wireless network virtualization. The formal theory provides a means for distinguishing work that should be classed as resource allocation as distinct from virtualization. It also facilitates a further classification of the representation level at which the virtualization occurs, which makes comparison of work more meaningful. The paper provides a comprehensive survey and highlights gaps in the research that make for fruitful future work.
△ Less
Submitted 4 July, 2018; v1 submitted 10 May, 2017;
originally announced May 2017.
-
An EM Based Probabilistic Two-Dimensional CCA with Application to Face Recognition
Authors:
Mehran Safayani,
Seyed Hashem Ahmadi,
Homayun Afrabandpey,
Abdolreza Mirzaei
Abstract:
Recently, two-dimensional canonical correlation analysis (2DCCA) has been successfully applied for image feature extraction. The method instead of concatenating the columns of the images to the one-dimensional vectors, directly works with two-dimensional image matrices. Although 2DCCA works well in different recognition tasks, it lacks a probabilistic interpretation. In this paper, we present a pr…
▽ More
Recently, two-dimensional canonical correlation analysis (2DCCA) has been successfully applied for image feature extraction. The method instead of concatenating the columns of the images to the one-dimensional vectors, directly works with two-dimensional image matrices. Although 2DCCA works well in different recognition tasks, it lacks a probabilistic interpretation. In this paper, we present a probabilistic framework for 2DCCA called probabilistic 2DCCA (P2DCCA) and an iterative EM based algorithm for optimizing the parameters. Experimental results on synthetic and real data demonstrate superior performance in loading factor estimation for P2DCCA compared to 2DCCA. For real data, three subsets of AR face database and also the UMIST face database confirm the robustness of the proposed algorithm in face recognition tasks with different illumination conditions, facial expressions, poses and occlusions.
△ Less
Submitted 25 February, 2017;
originally announced February 2017.
-
LSA-Advanced and C-RAN: A (5G) Romance of Many Dimensions
Authors:
Elma Avdic,
Irene Macaluso,
Hamed Ahmadi,
Ismael Gomez-Miguelez,
Laura Ingolotti,
Nicola Marchetti,
Linda Doyle
Abstract:
We examine the dimensional limitations of Licensed Shared Access (LSA) regulatory framework for spectrum sharing and propose a solution for its more dynamic implementation. We consider an additional dimension for sharing, beyond those of time, space and frequency, i.e. the sharing of the infrastructure. We explain why we believe that the emerging regulations and use-case scenarios are limiting the…
▽ More
We examine the dimensional limitations of Licensed Shared Access (LSA) regulatory framework for spectrum sharing and propose a solution for its more dynamic implementation. We consider an additional dimension for sharing, beyond those of time, space and frequency, i.e. the sharing of the infrastructure. We explain why we believe that the emerging regulations and use-case scenarios are limiting the potential of LSA, and with this in mind make a set of recommendations to unlock it fully. As a specific case study, we present our architectural work around Cloud-based Radio Access Network (C-RAN) and LSA to demonstrate the possibility of a dynamic implementation of multiple incumbents and multiple LSA licensees engaged in sharing. Our case study highlights multiple ways for LSA framework to evolve into a global and flexible sharing model, and prove that LSA and C-RAN are a good match to rethink how we look at networks targeting a more flexible, efficient and profitable way of operating them.
△ Less
Submitted 7 June, 2016;
originally announced June 2016.
-
Substitutability of Spectrum and Cloud-based Antennas in Virtualised Wireless Networks
Authors:
Hamed Ahmadi,
Irene Macaluso,
Ismael Gomez,
Linda Doyle,
Luiz DaSilva
Abstract:
Some of the new trends emerging in future wireless networks enable a vastly increased fluidity in accessing a wide range of resources, thus supporting flexible network composition and dynamic allocation of resources to virtual network operators (VNOs). In this work we study a new resource allocation opportunity that is enabled by the cloud radio access network architecture. In particular, we inves…
▽ More
Some of the new trends emerging in future wireless networks enable a vastly increased fluidity in accessing a wide range of resources, thus supporting flexible network composition and dynamic allocation of resources to virtual network operators (VNOs). In this work we study a new resource allocation opportunity that is enabled by the cloud radio access network architecture. In particular, we investigate the relationship between the cloud-based antennas and spectrum as two important resources in virtualized wireless networks. We analyze the interplay between spectrum and antennas in the context of an auction-based allocation mechanism through which VNOs can bid for a combination of the two types of resources. Our analysis shows that the complementarity and partial substitutability of the two resources significantly impact the results of the allocation of those resources and uncovers the possibility of divergent interests between the spectrum and the infrastructure providers.
△ Less
Submitted 16 March, 2016;
originally announced March 2016.
-
Energy and Spectral Efficiency Gains From Multi-User MIMO-based Small Cell Reassignments
Authors:
Danny Finn,
Hamed Ahmadi,
Rouzbeh Razavi,
Holger Claussen,
Luiz DaSilva
Abstract:
In this work we investigate the reassignment of User Equipments (UEs) between adjacent small cells to concurrently enable spatial multiplexing gains through Multi-User MIMO (MU-MIMO) and reductions in energy consumption though switching emptied small cells to a sleep state. We consider a case where UEs can be reassigned between adjacent small cells provided that the targeted neighbouring cell cont…
▽ More
In this work we investigate the reassignment of User Equipments (UEs) between adjacent small cells to concurrently enable spatial multiplexing gains through Multi-User MIMO (MU-MIMO) and reductions in energy consumption though switching emptied small cells to a sleep state. We consider a case where UEs can be reassigned between adjacent small cells provided that the targeted neighbouring cell contains a UE with which the reassigned UE can perform MU-MIMO without experiencing excessive multi-user interference, and whilst achieving a minimum expected gain in spectral efficiency over the previous original cell transmissions as a result. We formulate the selection decision of which UEs to reassign as a set covering problem with the objective of maximising the number of small cell base stations to switch to a sleep state. Our results show that, for both indoor and outdoor LTE small cell scenarios, the proposed MU-MIMO-based reassignments achieve significant reductions in the required number of active small cell base stations, whilst simultaneously achieving increases in spectral efficiency.
△ Less
Submitted 7 February, 2016;
originally announced February 2016.
-
5G Waveforms for Overlay D2D Communications: Effects of Time-Frequency Misalignment
Authors:
Quentin Bodinier,
Arman Farhang,
Faouzi Bader,
Hamed Ahmadi,
Jacques Palicot,
Luiz A. DaSilva
Abstract:
This paper analyses a scenario where a Device-To-Device (D2D) pair coexists with an Orthogonal Frequency Division Multiplexing (OFDM) based incumbent network. D2D transmitter communicates in parts of spectrum left free by cellular users, while respecting a given spectral mask. The D2D pair is misaligned in time and frequency with the cellular users. Furthermore, the D2D pair utilizes alternative w…
▽ More
This paper analyses a scenario where a Device-To-Device (D2D) pair coexists with an Orthogonal Frequency Division Multiplexing (OFDM) based incumbent network. D2D transmitter communicates in parts of spectrum left free by cellular users, while respecting a given spectral mask. The D2D pair is misaligned in time and frequency with the cellular users. Furthermore, the D2D pair utilizes alternative waveforms to OFDM proposed for 5G. In this study, we show that it is not worth synchronising the D2D pair in time with respect to the cellular users. Indeed, the interference injected into the incumbent network has small variations with respect to time misalignment. We provide interference tables that encompass both time and frequency misalignment. We use them to analyse the maximum rate achievable by the D2D pair when it uses different waveforms. Then, we present numerical results showing what waveform should be utilized by the D2D pair according to the time-frequency resources that are not used by the incumbent network. Our results show that the delay induced by linearly convolved waveforms make them hardly applicable to short time windows, but that they dominate OFDM for long transmissions, mainly in the case where cellular users are very sensitive to interference.
△ Less
Submitted 2 February, 2016;
originally announced February 2016.
-
Simulating Dense Small Cell Networks
Authors:
Pedro Alvarez,
Carlo Galiotto,
Jonathan van de Belt,
Danny Finn,
Hamed Ahmadi,
Luiz DaSilva
Abstract:
Through massive deployment of additional small cell infrastructure, Dense Small cell Networks (DSNs) are expected to help meet the foreseen increase in traffic demand on cellular networks. Performance assessment of architectural and protocol solutions tailored to DSNs will require system and network level simulators that can appropriately model the complex interference environment found in those n…
▽ More
Through massive deployment of additional small cell infrastructure, Dense Small cell Networks (DSNs) are expected to help meet the foreseen increase in traffic demand on cellular networks. Performance assessment of architectural and protocol solutions tailored to DSNs will require system and network level simulators that can appropriately model the complex interference environment found in those networks. This paper identifies the main features of DSN simulators, and guides the reader in the selection of an appropriate simulator for their desired investigations. We extend our discussion with a comparison of representative DSN simulators.
△ Less
Submitted 9 October, 2015;
originally announced October 2015.
-
Optimization of Demand Hotspot Capacities using Switched Multi-Element Antenna Equipped Small Cells
Authors:
Hamed Ahmadi,
Danny Finn,
Rouzbeh Razavi,
Holger Claussen,
Luiz A. DaSilva
Abstract:
This paper presents switched Multi- Element Antennas (MEAs) as a simple, yet effective, method of enhancing the performance of small cell heterogeneous networks and compensating for the small cell base station sub-optimal placement. The switched MEA system is a low-cost system which enables the small cell to dynamically direct its transmission power toward locations of high user density, in other…
▽ More
This paper presents switched Multi- Element Antennas (MEAs) as a simple, yet effective, method of enhancing the performance of small cell heterogeneous networks and compensating for the small cell base station sub-optimal placement. The switched MEA system is a low-cost system which enables the small cell to dynamically direct its transmission power toward locations of high user density, in other words demand hotspots. Our simulation results show that small cell base stations equipped with switched MEA systems offer greater performance than base stations equipped with omni-directional antennas in terms of both the number of users that can be served (and hence offloaded from the macrocell network) and in terms of overall network capacity. We also compare the performance of the switched MEA with fixed directional antennas and show that fixed-directional antennas can only outperform the switched MEA if the misalignment between their direction of transmission and the direction to the demand hotspot is less than 22.5 degrees.
△ Less
Submitted 16 July, 2015;
originally announced July 2015.
-
A Prioritised Traffic Embedding Mechanism enabling a Public Safety Virtual Operator
Authors:
Jonathan van de Belt,
Hamed Ahmadi,
Linda E. Doyle,
Oriol Sallent
Abstract:
Public Protection and Distaster Relief (PPDR) services can benefit greatly from the availability of mobile broadband communications in disaster and emergency scenarios. While undoubtedly offering full control and reliability, dedicated networks for PPDR have resulted in high operating costs and a lack of innovation in comparison to the commercial domain. Driven by the many benefits of broadband co…
▽ More
Public Protection and Distaster Relief (PPDR) services can benefit greatly from the availability of mobile broadband communications in disaster and emergency scenarios. While undoubtedly offering full control and reliability, dedicated networks for PPDR have resulted in high operating costs and a lack of innovation in comparison to the commercial domain. Driven by the many benefits of broadband communications, PPDR operators are increasingly interested in adopting mainstream commercial technologies such as Long Term Evolution (LTE) in favour of expensive, dedicated narrow-band networks.
In addition, the emergence of virtualization for wireless networks offers a new model for sharing infrastructure between several operators in a flexible and customizable manner. In this context, we propose a virtual Public Safety (PS) operator that relies on shared infrastructure of commercial LTE networks to deliver services to its users. We compare several methods of allocating spectrum resources between virtual operators at peak times and examine how this influences differing traffic services. We show that it is possible to provide services to the PS users reliably during both normal and emergency operation, and examine the impact on the commercial operators.
△ Less
Submitted 15 May, 2015;
originally announced May 2015.
-
A Dynamic Embedding Algorithm for Wireless Network Virtualization
Authors:
Jonathan van de Belt,
Hamed Ahmadi,
Linda E. Doyle
Abstract:
Wireless network virtualization enables multiple virtual wireless networks to coexist on shared physical infrastructure. However, one of the main challenges is the problem of assigning the physical resources to virtual networks in an efficient manner. Although some work has been done on solving the embedding problem for wireless networks, few solutions are applicable to dynamic networks with chang…
▽ More
Wireless network virtualization enables multiple virtual wireless networks to coexist on shared physical infrastructure. However, one of the main challenges is the problem of assigning the physical resources to virtual networks in an efficient manner. Although some work has been done on solving the embedding problem for wireless networks, few solutions are applicable to dynamic networks with changing traffic patterns. In this paper we propose a dynamic greedy embedding algorithm for wireless virtualization. Virtual networks can be re-embedded dynamically using this algorithm, enabling increased resource usage and lower rejection rates. We compare the dynamic greedy algorithm to a static embedding algorithm and also to its dynamic version. We show that the dynamic algorithms provide increased performance to previous methods using simulated traffic. In addition we formulate the embedding problem with multiple priority levels for the static and dynamic case.
△ Less
Submitted 15 May, 2015; v1 submitted 26 June, 2014;
originally announced June 2014.
-
Multipath Private Communication: An Information Theoretic Approach
Authors:
Hadi Ahmadi,
Reihaneh Safavi-Naini
Abstract:
Sending private messages over communication environments under surveillance is an important challenge in communication security and has attracted attentions of cryptographers through time. We believe that resources other than cryptographic keys can be used for communication privacy. We consider private message transmission (PMT) in an abstract multipath communication model between two communicants…
▽ More
Sending private messages over communication environments under surveillance is an important challenge in communication security and has attracted attentions of cryptographers through time. We believe that resources other than cryptographic keys can be used for communication privacy. We consider private message transmission (PMT) in an abstract multipath communication model between two communicants, Alice and Bob, in the presence of an eavesdropper, Eve. Alice and Bob have pre-shared keys and Eve is computationally unbounded. There are a total of $n$ paths and the three parties can have simultaneous access to at most $t_a$, $t_b$, and $t_e$ paths. The parties can switch their paths after every $λ$ bits of communication. We study perfect (P)-PMT versus asymptotically-perfect (AP)-PMT protocols. The former has zero tolerance of transmission error and leakage, whereas the latter allows for positive error and leakage that tend to zero as the message length increases. We derive the necessary and sufficient conditions under which P-PMT and AP-PMT are possible. We also introduce explicit P-PMT and AP-PMT constructions. Our results show AP-PMT protocols attain much higher information rates than P-PMT ones. Interestingly, AP-PMT is possible even in poorest condition where $t_a=t_b=1$ and $t_e=n-1$. It remains however an open question whether the derived rates can be improved by more sophisticated AP-PMT protocols.
We study applications of our results to private communication over the real-life scenarios of multiple-frequency links and multiple-route networks. We show practical examples of such scenarios that can be abstracted by the multipath setting: Our results prove the possibility of keyless information-theoretic private message transmission at rates $17\%$ and $20\%$ for the two example scenarios, respectively. We discuss open problems and future work at the end.
△ Less
Submitted 15 January, 2014;
originally announced January 2014.
-
Secure Distance Bounding Verification using Physical-Channel Properties
Authors:
Hadi Ahmadi,
Reihaneh Safavi-Naini
Abstract:
We consider the problem of distance bounding verification (DBV), where a proving party claims a distance and a verifying party ensures that the prover is within the claimed distance. Current approaches to "secure" distance estimation use signal's time of flight, which requires the verifier to have an accurate clock. We study secure DBV using physical channel properties as an alternative to time me…
▽ More
We consider the problem of distance bounding verification (DBV), where a proving party claims a distance and a verifying party ensures that the prover is within the claimed distance. Current approaches to "secure" distance estimation use signal's time of flight, which requires the verifier to have an accurate clock. We study secure DBV using physical channel properties as an alternative to time measurement. We consider a signal propagation environment that attenuates signal as a function of distance, and then corrupts it by an additive noise.
We consider three attacking scenarios against DBV, namely distance fraud (DFA), mafia fraud (MFA) and terrorist fraud (TFA) attacks. We show it is possible to construct efficient DBV protocols with DFA and MFA security, even against an unbounded adversary; on the other hand, it is impossible to design TFA-secure protocols without time measurement, even with a computationally-bounded adversary. We however provide a TFA-secure construction under the condition that the adversary's communication capability is limited to the bounded retrieval model (BRM). We use numerical analysis to examine the communication complexity of the introduced DBV protocols. We discuss our results and give directions for future research.
△ Less
Submitted 1 March, 2013;
originally announced March 2013.
-
New Results on Secret Key Establishment over a Pair of Broadcast Channels
Authors:
Hadi Ahmadi,
Reihaneh Safavi-Naini
Abstract:
The problem of Secret Key Establishment (SKE) over a pair of independent Discrete Memoryless Broadcast Channels (DMBCs) has already been studied in \cite{Ah10}, where we provided lower and upper bounds on the secret-key capacity. In this paper, we study the above setup under each of the following two cases: (1) the DMBCs have secrecy potential, and (2) the DMBCs are stochastically degraded with in…
▽ More
The problem of Secret Key Establishment (SKE) over a pair of independent Discrete Memoryless Broadcast Channels (DMBCs) has already been studied in \cite{Ah10}, where we provided lower and upper bounds on the secret-key capacity. In this paper, we study the above setup under each of the following two cases: (1) the DMBCs have secrecy potential, and (2) the DMBCs are stochastically degraded with independent channels. In the former case, we propose a simple SKE protocol based on a novel technique, called Interactive Channel Coding (ICC), and prove that it achieves the lower bound. In the latter case, we give a simplified expression for the lower bound and prove a single-letter capacity formula under the condition that one of the legitimate parties sends only i.i.d. variables.
△ Less
Submitted 25 April, 2010;
originally announced April 2010.
-
Secret Key Establishment over a Pair of Independent Broadcast Channels
Authors:
Hadi Ahmadi,
Reihaneh Safavi-Naini
Abstract:
This paper considers the problem of information-theoretic Secret Key Establishment (SKE) in the presence of a passive adversary, Eve, when Alice and Bob are connected by a pair of independent discrete memoryless broadcast channels in opposite directions. We refer to this setup as 2DMBC. We define the secret-key capacity in the 2DMBC setup and prove lower and upper bounds on this capacity. The lowe…
▽ More
This paper considers the problem of information-theoretic Secret Key Establishment (SKE) in the presence of a passive adversary, Eve, when Alice and Bob are connected by a pair of independent discrete memoryless broadcast channels in opposite directions. We refer to this setup as 2DMBC. We define the secret-key capacity in the 2DMBC setup and prove lower and upper bounds on this capacity. The lower bound is achieved by a two-round SKE protocol that uses a two-level coding construction. We show that the lower and the upper bounds coincide in the case of degraded DMBCs.
△ Less
Submitted 21 April, 2010; v1 submitted 22 January, 2010;
originally announced January 2010.