-
RefreshNet: Learning Multiscale Dynamics through Hierarchical Refreshing
Authors:
Junaid Farooq,
Danish Rafiq,
Pantelis R. Vlachas,
Mohammad Abid Bazaz
Abstract:
Forecasting complex system dynamics, particularly for long-term predictions, is persistently hindered by error accumulation and computational burdens. This study presents RefreshNet, a multiscale framework developed to overcome these challenges, delivering an unprecedented balance between computational efficiency and predictive accuracy. RefreshNet incorporates convolutional autoencoders to identi…
▽ More
Forecasting complex system dynamics, particularly for long-term predictions, is persistently hindered by error accumulation and computational burdens. This study presents RefreshNet, a multiscale framework developed to overcome these challenges, delivering an unprecedented balance between computational efficiency and predictive accuracy. RefreshNet incorporates convolutional autoencoders to identify a reduced order latent space capturing essential features of the dynamics, and strategically employs multiple recurrent neural network (RNN) blocks operating at varying temporal resolutions within the latent space, thus allowing the capture of latent dynamics at multiple temporal scales. The unique "refreshing" mechanism in RefreshNet allows coarser blocks to reset inputs of finer blocks, effectively controlling and alleviating error accumulation. This design demonstrates superiority over existing techniques regarding computational efficiency and predictive accuracy, especially in long-term forecasting. The framework is validated using three benchmark applications: the FitzHugh-Nagumo system, the Reaction-Diffusion equation, and Kuramoto-Sivashinsky dynamics. RefreshNet significantly outperforms state-of-the-art methods in long-term forecasting accuracy and speed, marking a significant advancement in modeling complex systems and opening new avenues in understanding and predicting their behavior.
△ Less
Submitted 24 January, 2024;
originally announced January 2024.
-
Deep Reinforcement Learning Based Placement for Integrated Access Backhauling in UAV-Assisted Wireless Networks
Authors:
Yuhui Wang,
Junaid Farooq
Abstract:
The advent of fifth generation (5G) networks has opened new avenues for enhancing connectivity, particularly in challenging environments like remote areas or disaster-struck regions. Unmanned aerial vehicles (UAVs) have been identified as a versatile tool in this context, particularly for improving network performance through the Integrated access and backhaul (IAB) feature of 5G. However, existin…
▽ More
The advent of fifth generation (5G) networks has opened new avenues for enhancing connectivity, particularly in challenging environments like remote areas or disaster-struck regions. Unmanned aerial vehicles (UAVs) have been identified as a versatile tool in this context, particularly for improving network performance through the Integrated access and backhaul (IAB) feature of 5G. However, existing approaches to UAV-assisted network enhancement face limitations in dynamically adapting to varying user locations and network demands. This paper introduces a novel approach leveraging deep reinforcement learning (DRL) to optimize UAV placement in real-time, dynamically adjusting to changing network conditions and user requirements. Our method focuses on the intricate balance between fronthaul and backhaul links, a critical aspect often overlooked in current solutions. The unique contribution of this work lies in its ability to autonomously position UAVs in a way that not only ensures robust connectivity to ground users but also maintains seamless integration with central network infrastructure. Through various simulated scenarios, we demonstrate how our approach effectively addresses these challenges, enhancing coverage and network performance in critical areas. This research fills a significant gap in UAV-assisted 5G networks, providing a scalable and adaptive solution for future mobile networks.
△ Less
Submitted 21 December, 2023;
originally announced December 2023.
-
Randomize to Generalize: Domain Randomization for Runway FOD Detection
Authors:
Javaria Farooq,
Nayyer Aafaq,
M Khizer Ali Khan,
Ammar Saleem,
M Ibraheem Siddiqui
Abstract:
Tiny Object Detection is challenging due to small size, low resolution, occlusion, background clutter, lighting conditions and small object-to-image ratio. Further, object detection methodologies often make underlying assumption that both training and testing data remain congruent. However, this presumption often leads to decline in performance when model is applied to out-of-domain(unseen) data.…
▽ More
Tiny Object Detection is challenging due to small size, low resolution, occlusion, background clutter, lighting conditions and small object-to-image ratio. Further, object detection methodologies often make underlying assumption that both training and testing data remain congruent. However, this presumption often leads to decline in performance when model is applied to out-of-domain(unseen) data. Techniques like synthetic image generation are employed to improve model performance by leveraging variations in input data. Such an approach typically presumes access to 3D-rendered datasets. In contrast, we propose a novel two-stage methodology Synthetic Randomized Image Augmentation (SRIA), carefully devised to enhance generalization capabilities of models encountering 2D datasets, particularly with lower resolution which is more practical in real-world scenarios. The first stage employs a weakly supervised technique to generate pixel-level segmentation masks. Subsequently, the second stage generates a batch-wise synthesis of artificial images, carefully designed with an array of diverse augmentations. The efficacy of proposed technique is illustrated on challenging foreign object debris (FOD) detection. We compare our results with several SOTA models including CenterNet, SSD, YOLOv3, YOLOv4, YOLOv5, and Outer Vit on a publicly available FOD-A dataset. We also construct an out-of-distribution test set encompassing 800 annotated images featuring a corpus of ten common categories. Notably, by harnessing merely 1.81% of objects from source training data and amalgamating with 29 runway background images, we generate 2227 synthetic images. Subsequent model retraining via transfer learning, utilizing enriched dataset generated by domain randomization, demonstrates significant improvement in detection accuracy. We report that detection accuracy improved from an initial 41% to 92% for OOD test set.
△ Less
Submitted 23 September, 2023;
originally announced September 2023.
-
Zero Touch Coordinated UAV Network Formation for 360° Views of a Moving Ground Target in Remote VR Applications
Authors:
Yuhui Wang,
Junaid Farooq
Abstract:
Unmanned aerial vehicles (UAVs) with on-board cameras are widely used for remote surveillance and video capturing applications. In remote virtual reality (VR) applications, multiple UAVs can be used to capture different partially overlap** angles of the ground target, which can be stitched together to provide 360° views. This requires coordinated formation of UAVs that is adaptive to movements o…
▽ More
Unmanned aerial vehicles (UAVs) with on-board cameras are widely used for remote surveillance and video capturing applications. In remote virtual reality (VR) applications, multiple UAVs can be used to capture different partially overlap** angles of the ground target, which can be stitched together to provide 360° views. This requires coordinated formation of UAVs that is adaptive to movements of the ground target. In this paper, we propose a joint UAV formation and tracking framework to capture 360° angles of the target. The proposed framework uses a zero touch approach for automated and adaptive reconfiguration of multiple UAVs in a coordinated manner without the need for human intervention. This is suited to both military and civilian applications. Simulation results demonstrate the convergence and configuration of the UAVs with arbitrary initial locations and orientations. The performance has been tested for various number of UAVs and different mobility patterns of the ground target.
△ Less
Submitted 5 November, 2022;
originally announced November 2022.
-
Proactive and Resilient UAV Orchestration for QoS Driven Connectivity and Coverage of Ground Users
Authors:
Yuhui Wang,
Junaid Farooq
Abstract:
Unmanned aerial vehicles (UAVs) are being successfully used to deliver communication services in applications such as extending the coverage of 5G cellular networks in remote areas, emergency situations, and enhancing the service quality in regions of dense user populations. While optimized placement solutions have been proposed in literature for ensuring quality of service (QoS) of users, they ma…
▽ More
Unmanned aerial vehicles (UAVs) are being successfully used to deliver communication services in applications such as extending the coverage of 5G cellular networks in remote areas, emergency situations, and enhancing the service quality in regions of dense user populations. While optimized placement solutions have been proposed in literature for ensuring quality of service (QoS) of users, they may not be ideal in highly mobile, autonomous, and diverse network scenarios. This paper proposes a proactive and resilient framework for distributed and dynamic orchestration of UAV small cells to provide QoS differentiation in the network. The UAV locations are tailored to end-user locations and service needs while ensuring that UAVs maintain localized backhaul connectivity. Simulation experiments show that under scenarios where physical placement can achieve service differentiation, the developed framework leads to a stable configurations of UAVs satisfying above 90% of user QoS requirements.
△ Less
Submitted 9 September, 2022;
originally announced September 2022.
-
QoE Based Revenue Maximizing Dynamic Resource Allocation and Pricing for Fog-Enabled Mission-Critical IoT Applications
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
Fog computing is becoming a vital component for Internet of things (IoT) applications, acting as its computational engine. Mission-critical IoT applications are highly sensitive to latency, which depends on the physical location of the cloud server. Fog nodes of varying response rates are available to the cloud service provider (CSP) and it is faced with a challenge of forwarding the sequentially…
▽ More
Fog computing is becoming a vital component for Internet of things (IoT) applications, acting as its computational engine. Mission-critical IoT applications are highly sensitive to latency, which depends on the physical location of the cloud server. Fog nodes of varying response rates are available to the cloud service provider (CSP) and it is faced with a challenge of forwarding the sequentially received IoT data to one of the fog nodes for processing. Since the arrival times and nature of requests is random, it is important to optimally classify the requests in real-time and allocate available virtual machine instances (VMIs) at the fog nodes to provide a high QoE to the users and consequently generate higher revenues for the CSP. In this paper, we use a pricing policy based on the QoE of the applications as a result of the allocation and obtain an optimal dynamic allocation rule based on the statistical information of the computational requests. The developed solution is statistically optimal, dynamic, and implementable in real-time as opposed to other static matching schemes in the literature. The performance of the proposed framework has been evaluated using simulations and the results show significant improvement as compared with benchmark schemes.
△ Less
Submitted 2 June, 2020;
originally announced June 2020.
-
Modeling and Assessment of IoT Supply Chain Security Risks: The Role of Structural and Parametric Uncertainties
Authors:
Timothy Kieras,
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
Supply chain security threats pose new challenges to security risk modeling techniques for complex ICT systems such as the IoT. With established techniques drawn from attack trees and reliability analysis providing needed points of reference, graph-based analysis can provide a framework for considering the role of suppliers in such systems. We present such a framework here while highlighting the n…
▽ More
Supply chain security threats pose new challenges to security risk modeling techniques for complex ICT systems such as the IoT. With established techniques drawn from attack trees and reliability analysis providing needed points of reference, graph-based analysis can provide a framework for considering the role of suppliers in such systems. We present such a framework here while highlighting the need for a component-centered model. Given resource limitations when applying this model to existing systems, we study various classes of uncertainties in model development, including structural uncertainties and uncertainties in the magnitude of estimated event probabilities. Using case studies, we find that structural uncertainties constitute a greater challenge to model utility and as such should receive particular attention. Best practices in the face of these uncertainties are proposed.
△ Less
Submitted 20 March, 2020;
originally announced March 2020.
-
PhD Forum: Enabling Autonomic IoT for Smart Urban Services
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
The development of autonomous cyber-physical systems (CPS) and advances towards the fifth generation (5G) of wireless technology is promising to revolutionize many industry verticals such as Healthcare, Transportation, Energy, Retail Services, Building Automation, Education, etc., leading to the realization of the smart city paradigm. The Internet of Things (IoT), enables powerful and unprecedente…
▽ More
The development of autonomous cyber-physical systems (CPS) and advances towards the fifth generation (5G) of wireless technology is promising to revolutionize many industry verticals such as Healthcare, Transportation, Energy, Retail Services, Building Automation, Education, etc., leading to the realization of the smart city paradigm. The Internet of Things (IoT), enables powerful and unprecedented capabilities for intelligent and autonomous operation. We leverage ideas from Network Science, Optimization & Decision Theory, Incentive Mechanism Design, and Data Science/Machine Learning to achieve key design goals, in IoT-enabled urban systems, such as efficiency, security & resilience, and economics.
△ Less
Submitted 24 December, 2019;
originally announced January 2020.
-
RIoTS: Risk Analysis of IoT Supply Chain Threats
Authors:
Timothy Kieras,
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
Securing the supply chain of information and communications technology (ICT) has recently emerged as a critical concern for national security and integrity. With the proliferation of Internet of Things (IoT) devices and their increasing role in controlling real world infrastructure, there is a need to analyze risks in networked systems beyond established security analyses. Existing methods in lite…
▽ More
Securing the supply chain of information and communications technology (ICT) has recently emerged as a critical concern for national security and integrity. With the proliferation of Internet of Things (IoT) devices and their increasing role in controlling real world infrastructure, there is a need to analyze risks in networked systems beyond established security analyses. Existing methods in literature typically leverage attack and fault trees to analyze malicious activity and its impact. In this paper, we develop RIoTS, a security risk assessment framework borrowing from system reliability theory to incorporate the supply chain. We also analyze the impact of grou** within suppliers that may pose hidden risks to the systems from malicious supply chain actors. The results show that the proposed analysis is able to reveal hidden threats posed to the IoT ecosystem from potential supplier collusion.
△ Less
Submitted 28 November, 2019;
originally announced November 2019.
-
IoT Supply Chain Security: Overview, Challenges, and the Road Ahead
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
Supply chain is emerging as the next frontier of threats in the rapidly evolving IoT ecosystem. It is fundamentally more complex compared to traditional ICT systems. We analyze supply chain risks in IoT systems and their unique aspects, discuss research challenges in supply chain security, and identify future research directions.
Supply chain is emerging as the next frontier of threats in the rapidly evolving IoT ecosystem. It is fundamentally more complex compared to traditional ICT systems. We analyze supply chain risks in IoT systems and their unique aspects, discuss research challenges in supply chain security, and identify future research directions.
△ Less
Submitted 21 July, 2019;
originally announced August 2019.
-
Optimal Dynamic Contract for Spectrum Reservation in Mission-Critical UNB-IoT Systems
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
Spectrum reservation is emerging as one of the potential solutions to cater for the communication needs of massive number of wireless Internet of Things (IoT) devices with reliability constraints particularly in mission-critical scenarios. In most mission-critical systems, the true utility of a reservation may not be completely known ahead of time as the unforseen events might not be completely pr…
▽ More
Spectrum reservation is emerging as one of the potential solutions to cater for the communication needs of massive number of wireless Internet of Things (IoT) devices with reliability constraints particularly in mission-critical scenarios. In most mission-critical systems, the true utility of a reservation may not be completely known ahead of time as the unforseen events might not be completely predictable. In this paper, we present a dynamic contract approach where an advance payment is made at the time of reservation based on partial information about spectrum reservation utility. Once the complete information is obtained, a rebate on the payment is made if the reservation is released. In this paper, we present a contract theoretic approach to design an incentivized mechanism that coerces the applications to reveal their true application type resulting in greater profitability of the IoT network operator. The operator offers a menu of contracts with advanced payments and rebate to the IoT applications without having knowledge about the types of applications. The decision of the applications in selecting a contract leads to a revelation of their true type to the operator which allows it to generate higher profits than a traditional spectrum auction mechanism. Under some assumptions on distribution of the utility of the applications, closed form solutions for the optimal dynamic spectrum reservation contract are provided and the sensitivity against system parameters is analyzed.
△ Less
Submitted 21 March, 2018;
originally announced March 2018.
-
Cognitive Connectivity Resilience in Multi-layer Remotely Deployed Mobile Internet of Things
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
Enabling the Internet of things in remote areas without traditional communication infrastructure requires a multi-layer network architecture. The devices in the overlay network are required to provide coverage to the underlay devices as well as to remain connected to other overlay devices. The coordination, planning, and design of such two-layer heterogeneous networks is an important problem to ad…
▽ More
Enabling the Internet of things in remote areas without traditional communication infrastructure requires a multi-layer network architecture. The devices in the overlay network are required to provide coverage to the underlay devices as well as to remain connected to other overlay devices. The coordination, planning, and design of such two-layer heterogeneous networks is an important problem to address. Moreover, the mobility of the nodes and their vulnerability to adversaries pose new challenges to the connectivity. For instance, the connectivity of devices can be affected by changes in the network, e.g., the mobility of the underlay devices or the unavailability of overlay devices due to failure or adversarial attacks. To this end, this work proposes a feedback based adaptive, self-configurable, and resilient framework for the overlay network that cognitively adapts to the changes in the network to provide reliable connectivity between spatially dispersed smart devices. Our results show that if sufficient overlay devices are available, the framework leads to a connected configuration that ensures a high coverage of the mobile underlay network. Moreover, the framework can actively reconfigure itself in the event of varying levels of device failure.
△ Less
Submitted 2 September, 2017;
originally announced September 2017.
-
Adaptive and Resilient Revenue Maximizing Dynamic Resource Allocation and Pricing for Cloud-Enabled IoT Systems
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
Cloud computing is becoming an essential component of modern computer and communication systems. The available resources at the cloud such as computing nodes, storage, databases, etc. are often packaged in the form of virtual machines (VMs) to be used by remotely located client applications for computational tasks. However, the cloud has a limited number of VMs available, which have to be efficien…
▽ More
Cloud computing is becoming an essential component of modern computer and communication systems. The available resources at the cloud such as computing nodes, storage, databases, etc. are often packaged in the form of virtual machines (VMs) to be used by remotely located client applications for computational tasks. However, the cloud has a limited number of VMs available, which have to be efficiently utilized to generate higher productivity and subsequently generate maximum revenue. Client applications generate requests with computational tasks at random times with random complexity to be processed by the cloud. The cloud service provider (CSP) has to decide whether to allocate a VM to a task at hand or to wait for a higher complexity task in the future. We propose a threshold-based mechanism to optimally decide the allocation and pricing of VMs to sequentially arriving requests in order to maximize the revenue of the CSP over a finite time horizon. Moreover, we develop an adaptive and resilient framework based that can counter the effect of realtime changes in the number of available VMs at the cloud server, the frequency and nature of arriving tasks on the revenue of the CSP.
△ Less
Submitted 2 March, 2018; v1 submitted 26 July, 2017;
originally announced July 2017.
-
Green Virtualization for Multiple Collaborative Cellular Operators
Authors:
Muhammad Junaid Farooq,
Hakim Ghazzai,
Elias Yaacoub,
Abdullah Kadri,
Mohamed-Slim Alouini
Abstract:
This paper proposes and investigates a green virtualization framework for infrastructure sharing among multiple cellular operators whose networks are powered by a combination of conventional and renewable sources of energy. Under the proposed framework, the virtual network formed by unifying radio access infrastructures of all operators is optimized for minimum energy consumption by deactivating b…
▽ More
This paper proposes and investigates a green virtualization framework for infrastructure sharing among multiple cellular operators whose networks are powered by a combination of conventional and renewable sources of energy. Under the proposed framework, the virtual network formed by unifying radio access infrastructures of all operators is optimized for minimum energy consumption by deactivating base stations (BSs) with low traffic loads. The users initially associated to those BSs are off-loaded to neighboring active ones. A fairness criterion for collaboration based on roaming prices is introduced to cover the additional energy costs incurred by host operators. The framework also ensures that any collaborating operator is not negatively affected by its participation in the proposed virtualization. A multi-objective linear programming problem is formulated to achieve energy and cost efficiency of the networks' operation by identifying the set of inter-operator roaming prices. For the case when collaboration among all operators is infeasible due to profitability, capacity, or power constraints, an iterative algorithm is proposed to determine the groups of operators that can viably collaborate. Results show significant energy savings using the proposed virtualization as compared to the standalone case. Moreover, collaborative operators exploiting locally generated renewable energy are rewarded more than traditional ones.
△ Less
Submitted 31 May, 2017;
originally announced June 2017.
-
Optimizing Mission Critical Data Dissemination in Massive IoT Networks
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
Mission critical data dissemination in massive Internet of things (IoT) networks imposes constraints on the message transfer delay between devices. Due to low power and communication range of IoT devices, data is foreseen to be relayed over multiple device-to-device (D2D) links before reaching the destination. The coexistence of a massive number of IoT devices poses a challenge in maximizing the s…
▽ More
Mission critical data dissemination in massive Internet of things (IoT) networks imposes constraints on the message transfer delay between devices. Due to low power and communication range of IoT devices, data is foreseen to be relayed over multiple device-to-device (D2D) links before reaching the destination. The coexistence of a massive number of IoT devices poses a challenge in maximizing the successful transmission capacity of the overall network alongside reducing the multi-hop transmission delay in order to support mission critical applications. There is a delicate interplay between the carrier sensing threshold of the contention based medium access protocol and the choice of packet forwarding strategy selected at each hop by the devices. The fundamental problem in optimizing the performance of such networks is to balance the tradeoff between conflicting performance objectives such as the spatial frequency reuse, transmission quality, and packet progress towards the destination. In this paper, we use a stochastic geometry approach to quantify the performance of multi-hop massive IoT networks in terms of the spatial frequency reuse and the transmission quality under different packet forwarding schemes. We also develop a comprehensive performance metric that can be used to optimize the system to achieve the best performance. The results can be used to select the best forwarding scheme and tune the carrier sensing threshold to optimize the performance of the network according to the delay constraints and transmission quality requirements.
△ Less
Submitted 19 April, 2017;
originally announced April 2017.
-
Secure and Reconfigurable Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)
Authors:
Muhammad Junaid Farooq,
Quanyan Zhu
Abstract:
The Internet of things (IoT) is revolutionizing the management and control of automated systems leading to a paradigm shift in areas such as smart homes, smart cities, health care, transportation, etc. The IoT technology is also envisioned to play an important role in improving the effectiveness of military operations in battlefields. The interconnection of combat equipment and other battlefield r…
▽ More
The Internet of things (IoT) is revolutionizing the management and control of automated systems leading to a paradigm shift in areas such as smart homes, smart cities, health care, transportation, etc. The IoT technology is also envisioned to play an important role in improving the effectiveness of military operations in battlefields. The interconnection of combat equipment and other battlefield resources for coordinated automated decisions is referred to as the Internet of battlefield things (IoBT). IoBT networks are significantly different from traditional IoT networks due to the battlefield specific challenges such as the absence of communication infrastructure, and the susceptibility of devices to cyber and physical attacks. The combat efficiency and coordinated decision-making in war scenarios depends highly on real-time data collection, which in turn relies on the connectivity of the network and the information dissemination in the presence of adversaries. This work aims to build the theoretical foundations of designing secure and reconfigurable IoBT networks. Leveraging the theories of stochastic geometry and mathematical epidemiology, we develop an integrated framework to study the communication of mission-critical data among different types of network devices and consequently design the network in a cost effective manner.
△ Less
Submitted 1 March, 2017;
originally announced March 2017.
-
A Hybrid Energy Sharing Framework for Green Cellular Networks
Authors:
Muhammad Junaid Farooq,
Hakim Ghazzai,
Abdullah Kadri,
Hesham ElSawy,
Mohamed-Slim Alouini
Abstract:
Cellular operators are increasingly turning towards renewable energy (RE) as an alternative to using traditional electricity in order to reduce operational expenditure and carbon footprint. Due to the randomness in both RE generation and mobile traffic at each base station (BS), a surplus or shortfall of energy may occur at any given time. To increase energy self-reliance and minimize the network'…
▽ More
Cellular operators are increasingly turning towards renewable energy (RE) as an alternative to using traditional electricity in order to reduce operational expenditure and carbon footprint. Due to the randomness in both RE generation and mobile traffic at each base station (BS), a surplus or shortfall of energy may occur at any given time. To increase energy self-reliance and minimize the network's energy cost, the operator needs to efficiently exploit the RE generated across all BSs. In this paper, a hybrid energy sharing framework for cellular network is proposed, where a combination of physical power lines and energy trading with other BSs using smart grid is used. Algorithms for physical power lines deployment between BSs, based on average and complete statistics of the net RE available, are developed. Afterwards, an energy management framework is formulated to optimally determine the quantities of electricity and RE to be procured and exchanged among BSs, respectively, while considering battery capacities and real-time energy pricing. Three cases are investigated where RE generation is unknown, perfectly known, and partially known ahead of time. Results investigate the time varying energy management of BSs and demonstrate considerable reduction in average energy cost thanks to the hybrid energy sharing scheme.
△ Less
Submitted 5 December, 2016;
originally announced January 2017.
-
Green Networking in Cellular HetNets: A Unified Radio Resource Management Framework with Base Station ON/OFF Switching
Authors:
Hakim Ghazzai,
Muhammad Junaid Farooq,
Ahmad Alsharoa,
Elias Yaacoub,
Abdullah Kadri,
Mohamed-Slim Alouini
Abstract:
In this paper, the problem of energy efficiency in cellular heterogeneous networks (HetNets) is investigated using radio resource and power management combined with the base station (BS) ON/OFF switching. The objective is to minimize the total power consumption of the network while satisfying the quality of service (QoS) requirements of each connected user. We consider the case of co-existing macr…
▽ More
In this paper, the problem of energy efficiency in cellular heterogeneous networks (HetNets) is investigated using radio resource and power management combined with the base station (BS) ON/OFF switching. The objective is to minimize the total power consumption of the network while satisfying the quality of service (QoS) requirements of each connected user. We consider the case of co-existing macrocell BS, small cell BSs, and private femtocell access points (FAPs). Three different network scenarios are investigated, depending on the status of the FAPs, i.e., HetNets without FAPs, HetNets with closed FAPs, and HetNets with semi-closed FAPs. A unified framework is proposed to simultaneously allocate spectrum resources to users in an energy efficient manner and switch off redundant small cell BSs. The high complexity dual decomposition technique is employed to achieve optimal solutions for the problem. A low complexity iterative algorithm is also proposed and its performances are compared to those of the optimal technique. The particularly interesting case of semi-closed FAPs, in which the FAPs accept to serve external users, achieves the highest energy efficiency due to increased degrees of freedom. In this paper, a cooperation scheme between FAPs and mobile operator is also investigated. The incentives for FAPs, e.g., renewable energy sharing and roaming prices, enabling cooperation are discussed to be considered as a useful guideline for inter-operator agreements.
△ Less
Submitted 5 December, 2016;
originally announced December 2016.