-
Stochastic Analysis of Homogeneous Wireless Networks Assisted by Intelligent Reflecting Surfaces
Authors:
Ali H. Abdollahi Bafghi,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari,
Behrouz Maham,
Umberto Spagnolini
Abstract:
In this paper, we study the impact of the existence of multiple IRSs in a homogeneous wireless network, in which all BSs, users (U), and IRSs are spatially distributed by an independent homogeneous PPP, with density $λ_{\rm BS}\rm{[BS/m^2]}$, $λ_{\rm U}\rm{[U/m^2]}$, and $λ_{\rm IRS}\rm{[IRS/m^2]}$, respectively. We utilize a uniformly random serving strategy for BS and IRS to create stochastic sy…
▽ More
In this paper, we study the impact of the existence of multiple IRSs in a homogeneous wireless network, in which all BSs, users (U), and IRSs are spatially distributed by an independent homogeneous PPP, with density $λ_{\rm BS}\rm{[BS/m^2]}$, $λ_{\rm U}\rm{[U/m^2]}$, and $λ_{\rm IRS}\rm{[IRS/m^2]}$, respectively. We utilize a uniformly random serving strategy for BS and IRS to create stochastic symmetry in the network. We analyze the performance of the network and study the effect of the existence of the IRS on the network performance. To this end, for a typical user in the system, we derive analytical upper and lower bounds on the expectation of the power (second statistical moment) of the desired signal and the interference caused by BSs and other users. After that, we obtain analytical upper bounds on the decay of the probability of the power of the desired signal and the interference for the typical user (which results in a lower bound for the cumulative distribution function (CDF)). Moreover, we derive upper bounds on the decay of the probability of the capacity of one typical user, which results in a lower bound for the outage probability. In the numerical results, we observe that the numerical calculation of the power of the desired signal and the interference is near the derived lower bounds and we show that the increment of the parameter ${(λ_{\rm IRS})}$ causes increment in powers of both the desired and interference signals. We also observe that the increment of the parameter ${λ_{\rm IRS}}$ causes the decrement of outage probability.
△ Less
Submitted 11 June, 2024;
originally announced June 2024.
-
A Novel Stochastic Model for IRS-Assisted Communication Systems Based on the Sum-Product of Nakagami-$m$ Random Variables
Authors:
Hamid Amiriara,
Mahtab Mirmohseni,
Farid Ashtiani,
Masoumeh Nasiri-Kenari
Abstract:
This paper presents exact formulas for the probability distribution function (PDF) and moment generating function (MGF) of the sum-product of statistically independent but not necessarily identically distributed (i.n.i.d.) Nakagami-$m$ random variables (RVs) in terms of Meijer's G-function. Additionally, exact series representations are also derived for the sum of double-Nakagami RVs, providing us…
▽ More
This paper presents exact formulas for the probability distribution function (PDF) and moment generating function (MGF) of the sum-product of statistically independent but not necessarily identically distributed (i.n.i.d.) Nakagami-$m$ random variables (RVs) in terms of Meijer's G-function. Additionally, exact series representations are also derived for the sum of double-Nakagami RVs, providing useful insights on the trade-off between accuracy and computational cost. Simple asymptotic analytical expressions are provided to gain further insight into the derived formula, and the achievable diversity order is obtained. The suggested statistical properties are proved to be a highly useful tool for modeling parallel cascaded Nakagami-$m$ fading channels. The application of these new results is illustrated by deriving exact expressions and simple tight upper bounds for the outage probability (OP) and average symbol error rate (ASER) of several binary and multilevel modulation signals in intelligent reflecting surfaces (IRSs)-assisted communication systems operating over Nakagami-$m$ fading channels. It is demonstrated that the new asymptotic expression is highly accurate and can be extended to encompass a wider range of scenarios. To validate the theoretical frameworks and formulations, Monte-Carlo simulation results are presented. Additionally, supplementary simulations are provided to compare the derived results with two common types of approximations available in the literature, namely the central limit theorem (CLT) and gamma distribution.
△ Less
Submitted 18 January, 2024; v1 submitted 11 January, 2024;
originally announced January 2024.
-
Abnormality Detection and Localization Schemes using Molecular Communication Systems: A Survey
Authors:
Ali Etemadi,
Maryam Farahnak-Ghazani,
Hamidreza Arjmandi,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari
Abstract:
Abnormality detection and localization (ADL) have been studied widely in wireless sensor networks (WSNs) literature, where the sensors use electromagnetic waves for communication. Molecular communication (MC) has been introduced as an alternative approach for ADL in particular areas such as healthcare, being able to tackle the shortcomings of conventional WSNs, such as invasiveness, bio-incompatib…
▽ More
Abnormality detection and localization (ADL) have been studied widely in wireless sensor networks (WSNs) literature, where the sensors use electromagnetic waves for communication. Molecular communication (MC) has been introduced as an alternative approach for ADL in particular areas such as healthcare, being able to tackle the shortcomings of conventional WSNs, such as invasiveness, bio-incompatibility, and high energy consumption. In this paper, we introduce a general framework for MC-based ADL, which consists of multiple tiers for sensing the abnormality and communication between different agents, including the sensors, the fusion center (FC), the gateway (GW), and the external node (e.g., a local cloud), and describe each tier and the agents in this framework. We classify and explain different abnormality recognition methods, the functional units of the sensors, and different sensor features. Further, we describe different types of interfaces required for converting the internal and external signals at the FC and GW. Moreover, we present a unified channel model for the sensing and communication links. We categorize the MC-based abnormality detection schemes based on the sensor mobility, cooperative detection, and cooperative sensing/activation. We also classify the localization approaches based on the sensor mobility and propulsion mechanisms and present a general framework for the externally-controllable localization systems. Finally, we present some challenges and future research directions to realize and develop MC-based systems for ADL. The important challenges in the MC-based systems lie in four main directions as implementation, system design, modeling, and methods, which need considerable attention from multidisciplinary perspectives.
△ Less
Submitted 12 November, 2022; v1 submitted 13 July, 2022;
originally announced July 2022.
-
On Achievable Degrees of Freedom for the Frequency-Selective K-User Interference Channel in the Presence of an Instantaneous Relay
Authors:
Ali H. Abdollahi Bafghi,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari
Abstract:
In this paper, we study the degrees of freedom (DoF) of the frequency-selective K-user interference channel in the presence of an instantaneous relay (IR) with multiple receive and transmit antennas. We investigate two scenarios based on the IR antennas' cooperation ability. First, we assume that the IR receive and transmit antennas can coordinate with each other, where the transmitted signal of e…
▽ More
In this paper, we study the degrees of freedom (DoF) of the frequency-selective K-user interference channel in the presence of an instantaneous relay (IR) with multiple receive and transmit antennas. We investigate two scenarios based on the IR antennas' cooperation ability. First, we assume that the IR receive and transmit antennas can coordinate with each other, where the transmitted signal of each transmit antenna can depend on the received signals of all receive antennas, and we derive an achievable DoF for this model. In our interference alignment scheme, we divide receivers into two groups, called clean and dirty receivers. We design our scheme such that a part of the message of clean receivers can be demultiplexed at the IR. Thus, the IR can use these message streams for interference cancelation at the clean receivers. Next, we consider an IR, whose antennas do not have coordination with each other, where the transmitted signal of each transmit antenna only depends on the received signal of its corresponding receive antenna, and we derive an achievable DoF for it. We show that the achievable DoF decreases considerably compared with the coordinated case. In both of these models, our schemes achieve the maximum K DoFs, if the number of transmit and receive antennas is more than a finite threshold.
△ Less
Submitted 20 September, 2021;
originally announced September 2021.
-
Interference Alignment Using Reaction in Molecular Interference Channels
Authors:
Maryam Farahnak-Ghazani,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari
Abstract:
Co-channel interference (CCI) is a performance limiting factor in molecular communication (MC) systems with shared medium. Interference alignment (IA) is a promising scheme to mitigate CCI in traditional communication systems. Due to the signal-dependent noise in MC systems, the traditional IA schemes are less useful in MC systems. In this paper, we propose a novel IA scheme in molecular interfere…
▽ More
Co-channel interference (CCI) is a performance limiting factor in molecular communication (MC) systems with shared medium. Interference alignment (IA) is a promising scheme to mitigate CCI in traditional communication systems. Due to the signal-dependent noise in MC systems, the traditional IA schemes are less useful in MC systems. In this paper, we propose a novel IA scheme in molecular interference channels (IFCs), based on the choice of releasing/sampling times. To cancel the aligned interference signals and reduce the signal dependent noise, we use molecular reaction in the proposed IA scheme. We obtain the feasible region for the releasing/sampling times in the proposed scheme. Further, we investigate the error performance of the proposed scheme. Our results show that the proposed IA scheme using reaction improves the performance significantly.\blfootnote{This work was supported in part by the Iran National Science Foundation (INSF) Research Grant on Nano-Network Communications and in part by the Research Center of Sharif University of Technology.
△ Less
Submitted 26 June, 2022; v1 submitted 26 January, 2021;
originally announced January 2021.
-
Towards High Data-Rate Diffusive Molecular Communications: Performance Enhancement Strategies
Authors:
Mustafa Can Gursoy,
Masoumeh Nasiri-Kenari,
Urbashi Mitra
Abstract:
Diffusive molecular communications (DiMC) have recently gained attention as a candidate for nano- to micro- and macro-scale communications due to its simplicity and energy efficiency. As signal propagation is solely enabled by Brownian motion mechanics, DiMC faces severe inter-symbol interference (ISI), which limits reliable and high data-rate communications. Herein, recent literature on DiMC perf…
▽ More
Diffusive molecular communications (DiMC) have recently gained attention as a candidate for nano- to micro- and macro-scale communications due to its simplicity and energy efficiency. As signal propagation is solely enabled by Brownian motion mechanics, DiMC faces severe inter-symbol interference (ISI), which limits reliable and high data-rate communications. Herein, recent literature on DiMC performance enhancement strategies is surveyed; key research directions are identified. Signaling design and associated design constraints are presented. Classical and novel transceiver designs are reviewed with an emphasis on methods for ISI mitigation and performance-complexity tradeoffs. Key parameter estimation strategies such as synchronization and channel estimation are considered in conjunction with asynchronous and timing error robust receiver methods. Finally, source and channel coding in the context of DiMC is presented.
△ Less
Submitted 8 January, 2021;
originally announced January 2021.
-
Degrees of Freedom of the $K$-User Interference Channel in the Presence of Intelligent Reflecting Surfaces
Authors:
Ali H. Abdollahi Bafghi,
Vahid Jamali,
Masoumeh Nasiri-Kenari,
Robert Schober
Abstract:
In this paper, we study the degrees of freedom (DoF) region and sum DoF of the time-selective $K$-user interference channel in the presence of intelligent reflecting surfaces (IRSs). We consider four types of IRSs, namely 1) active IRSs, which are able to amplify, attenuate, and add a phase shift to the received signal, 2) passive IRSs, which are able to attenuate and add a phase shift to the rece…
▽ More
In this paper, we study the degrees of freedom (DoF) region and sum DoF of the time-selective $K$-user interference channel in the presence of intelligent reflecting surfaces (IRSs). We consider four types of IRSs, namely 1) active IRSs, which are able to amplify, attenuate, and add a phase shift to the received signal, 2) passive IRSs, which are able to attenuate and add a phase shift to the received signal, 3) passive lossless IRSs, which are only able to add a phase shift to the received signal, and 4) $\varepsilon$-relaxed passive lossless IRSs, which are able to scale the received signal by a number between $1-\varepsilon$ and $1$ in addition to adding a phase shift. We derive inner and outer bounds for the DoF region and lower and upper bounds for the sum DoF of the $K$-user interference channel in the presence of an active IRS and prove that the maximum value $K$ for the sum DoF can be achieved if the number of IRS elements exceeds a certain finite value. Then, we introduce probabilistic inner and outer bounds for the DoF region and probabilistic lower and upper bounds for the sum DoF of the $K$-user interference channel in the presence of a passive IRS and prove that the lower bound for the sum DoF asymptotically approaches $K$ as the number of IRS elements grows large. For the DoF analysis of passive lossless IRSs, first, we approximate it by the $\varepsilon$-relaxed passive lossless IRS and introduce a probabilistic lower bound for the corresponding sum DoF. We prove that this bound asymptotically tends to $K$. In addition, we define a relaxed type of DoF called $ρ$-limited DoF. We introduce a lower bound for the $ρ$-limited sum DoF of the passive lossless IRS-assisted $K$-user interference channel and prove that this lower bound asymptotically also tends to $K$.
△ Less
Submitted 4 November, 2021; v1 submitted 26 December, 2020;
originally announced December 2020.
-
On Molecular Flow Velocity Meters
Authors:
Maryam Farahnak-Ghazani,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari
Abstract:
Flow velocity is an important characteristic of the fluidic mediums. In this paper, we introduce a molecular based flow velocity meter consisting of a molecule releasing node and a receiver that counts these molecules. We consider both flow velocity detection and estimation problems, which are employed in different applications. For the flow velocity detection, we obtain the maximum a posteriori (…
▽ More
Flow velocity is an important characteristic of the fluidic mediums. In this paper, we introduce a molecular based flow velocity meter consisting of a molecule releasing node and a receiver that counts these molecules. We consider both flow velocity detection and estimation problems, which are employed in different applications. For the flow velocity detection, we obtain the maximum a posteriori (MAP) decision rule. To analyze the performance of the proposed flow velocity detector, we obtain the error probability, its Gaussian approximation and Chernoff information (CI) upper bound, and investigate the optimum and sub-optimum sampling times accordingly. We show that, for binary hypothesis, the sub-optimum sampling times using CI upper bound are the same. Further, the sub-optimum sampling times are close to the optimum sampling times. For the flow velocity estimation, we obtain the MAP and minimum mean square error (MMSE) estimators. We consider the mean square error (MSE) to investigate the error performance of the flow velocity estimators and obtain the Bayesian Cramer-Rao (BCR) and expected Cramer-Rao (ECR) lower bounds. Further, we obtain the optimum sampling times for each estimator. It is seen that the optimum sampling times for each estimator are nearly the same. The proposed flow velocity meter can be used to design a new modulation technique in molecular communication (MC), where information is encoded in the flow velocity of the medium instead of the concentration, type, or release time of the molecules. The setup and performance analysis of the proposed flow velocity detector and estimator for molecular communication system need further investigation.
△ Less
Submitted 11 January, 2021; v1 submitted 5 July, 2020;
originally announced July 2020.
-
On the Capacity of the Joint Time and Concentration Modulation for Molecular Communications
Authors:
Farhad Mirkarimi,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari
Abstract:
Most diffusion based molecular channels suffer from low information capacity due to the structure of the diffusion environment. To address this issue, this paper studies the capacity of the diffusion based molecular communication by exploiting both time and concentration level of the released molecules for information transfer. The transmitter releases molecules in one of the sub-intervals with a…
▽ More
Most diffusion based molecular channels suffer from low information capacity due to the structure of the diffusion environment. To address this issue, this paper studies the capacity of the diffusion based molecular communication by exploiting both time and concentration level of the released molecules for information transfer. The transmitter releases molecules in one of the sub-intervals with a level of concentration both determined by input data, hereby applying joint time and concentration (JTAC) modulation. The observation time, at the receiver, which is equal to symbol period, is divided to some sub-intervals, not necessarily equal to the number of sub-intervals in the transmitter, and the number of received molecules in each sub-interval is counted. We propose three practical schemes, depending on how the receiver uses the number of molecules counted in the sub-intervals and find the lower bound on capacity in each case. Moreover, the symmetric Kullback-Liebler (KL) divergence metric is used to obtain a computable upper bound on the JTAC channel capacity. Finally, the Blahut-Arimoto algorithm is used to compute the capacity numerically, and to determine how tight the derived bounds are. Our numerical results indicate that our bounds are tight especially in environments with high diffusion coefficient. The improvements compared to the conventional concentration based modulation and timing based modulation are also demonstrated.
△ Less
Submitted 23 June, 2020;
originally announced June 2020.
-
An Analytical Model for Molecular Communication over a Non-linear Reaction-Diffusion Medium
Authors:
Hamidreza Abin,
Amin Gohari,
Masoumeh Nasiri-Kenari
Abstract:
One of the main challenges in diffusion-based molecular communication is dealing with the non-linearity of reaction-diffusion chemical equations. While numerical methods can be used to solve these equations, a change in the input signals or the parameters of the medium requires one to redo the simulations. This makes it difficult to design modulation schemes and practically impossible to prove the…
▽ More
One of the main challenges in diffusion-based molecular communication is dealing with the non-linearity of reaction-diffusion chemical equations. While numerical methods can be used to solve these equations, a change in the input signals or the parameters of the medium requires one to redo the simulations. This makes it difficult to design modulation schemes and practically impossible to prove the optimality of a given transmission strategy. In this paper, we provide an analytical technique for modeling the non-linearity of chemical reaction equations based on the perturbation method. The perturbation method expresses the solution in terms of an infinite power series. An approximate solution can be found by kee** the leading terms of the power series. The approximate solution is shown to track the true solution if either the simulation time interval or the reaction rate is sufficiently small. Approximate solutions for long time intervals are also discussed. An illustrative example is given. For this example, it is shown that when the reaction rate (or the total time interval) is low, instead of using a continuous release waveform, it is optimal for the transmitters to release molecules at two time instances.
△ Less
Submitted 2 June, 2021; v1 submitted 28 May, 2020;
originally announced May 2020.
-
Adaptive Release Duration Modulation for Limited Molecule Production and Storage
Authors:
Ladan Khaloopour,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari
Abstract:
The nature of molecular transmitter imposes some limitations on the molecule production process and its storage. As the molecules act the role of the information carriers, the limitations affect the transmission process and the system performance considerably. In this paper, we focus on the transmitter's limitations, in particular, the limited molecule production rate and the finite storage capaci…
▽ More
The nature of molecular transmitter imposes some limitations on the molecule production process and its storage. As the molecules act the role of the information carriers, the limitations affect the transmission process and the system performance considerably. In this paper, we focus on the transmitter's limitations, in particular, the limited molecule production rate and the finite storage capacity. We consider a time-slotted communication where the transmitter opens its outlets and releases the stored molecules for a specific time duration to send bit "1" and remains silent to send bit "0". By changing the release duration, we propose an adaptive release duration modulation. The objective is to find the optimal transmission release duration to minimize the probability of error. We characterize the properties of the optimal release duration and use it to derive upper and lower bounds on the system performance. We see that the proposed modulation scheme improves the performance.
△ Less
Submitted 21 July, 2019;
originally announced July 2019.
-
Stochastic Design and Analysis of Wireless Cloud Caching Networks
Authors:
Seyed Mohammad Azimi-Abarghouyi,
Masoumeh Nasiri-Kenari,
Merouane Debbah
Abstract:
This paper develops a stochastic geometry-based approach for the modeling, analysis, and optimization of wireless cloud caching networks comprised of multiple-antenna radio units (RUs) inside clouds. We consider the Matern cluster process to model RUs and the probabilistic content placement to cache files in RUs. Accordingly, we study the exact hit probability for a user of interest for two strate…
▽ More
This paper develops a stochastic geometry-based approach for the modeling, analysis, and optimization of wireless cloud caching networks comprised of multiple-antenna radio units (RUs) inside clouds. We consider the Matern cluster process to model RUs and the probabilistic content placement to cache files in RUs. Accordingly, we study the exact hit probability for a user of interest for two strategies; closest selection, where the user is served by the closest RU that has its requested file, and best selection, where the serving RU having the requested file provides the maximum instantaneous received power at the user. As key steps for the analyses, the Laplace transform of out of cloud interference, the desired link distance distribution in the closest selection, and the desired link received power distribution in the best selection are derived. Also, we approximate the derived exact hit probabilities for both the closest and the best selections in such a way that the related objective functions for the content caching design of the network can lead to tractable concave optimization problems. Solving the optimization problems, we propose algorithms to efficiently find their optimal content placements. Finally, we investigate the impact of different parameters such as the number of antennas and the cache memory size on the caching performance.
△ Less
Submitted 5 May, 2019;
originally announced May 2019.
-
Stochastic Geometry Modeling and Analysis of Finite Millimeter Wave Wireless Networks
Authors:
Seyed Mohammad Azimi-Abarghouyi,
Behrooz Makki,
Masoumeh Nasiri-Kenari,
Tommy Svensson
Abstract:
This paper develops a stochastic geometry-based approach for the modeling and analysis of finite millimeter wave (mmWave) wireless networks where a random number of transmitters and receivers are randomly located inside a finite region. We consider a selection strategy to serve a reference receiver by the transmitter providing the maximum average received power among all transmitters. Considering…
▽ More
This paper develops a stochastic geometry-based approach for the modeling and analysis of finite millimeter wave (mmWave) wireless networks where a random number of transmitters and receivers are randomly located inside a finite region. We consider a selection strategy to serve a reference receiver by the transmitter providing the maximum average received power among all transmitters. Considering the unique features of mmWave communications such as directional transmit and receive beamforming and having different channels for line-of-sight (LOS) and non-line-of-sight (NLOS) links according to the blockage process, we study the coverage probability and the ergodic rate for the reference receiver that can be located everywhere inside the network region. As key steps for the analyses, the distribution of the distance from the reference receiver to its serving LOS or NLOS transmitter and LOS and NLOS association probabilities are derived. We also derive the Laplace transform of the interferences from LOS and NLOS transmitters. Finally, we propose upper and lower bounds on the coverage probability that can be evaluated easier than the exact results, and investigate the impact of different parameters including the receiver location, the beamwidth, and the blockage process exponent on the system performance.
△ Less
Submitted 27 July, 2018;
originally announced July 2018.
-
Asynchronous Downlink Massive MIMO Networks: A Stochastic Geometry Approach
Authors:
Elahe Sadeghabadi,
Seyed Mohammad Azimi-Abarghouyi,
Behrooz Makki,
Masoumeh Nasiri-Kenari
Abstract:
Massive multiple-input multiple-output (MIMO) is recognized as a promising technology for the next generation of wireless networks because of its potential to increase the spectral efficiency. In initial studies of massive MIMO, the system has been considered to be perfectly synchronized throughout the entire cells. However, perfect synchronization may be hard to attain in practice. Therefore, we…
▽ More
Massive multiple-input multiple-output (MIMO) is recognized as a promising technology for the next generation of wireless networks because of its potential to increase the spectral efficiency. In initial studies of massive MIMO, the system has been considered to be perfectly synchronized throughout the entire cells. However, perfect synchronization may be hard to attain in practice. Therefore, we study a massive MIMO system whose cells are not synchronous to each other, while transmissions in a cell are still synchronous. We analyze an asynchronous downlink massive MIMO system in terms of the coverage probability and the ergodic rate by means of the stochastic geometry tool. For comparison, we also obtain the results for the synchronous systems. In addition, we investigate the effect of the uplink power control and the number of pilot symbols on the downlink ergodic rate, and we observe that there is an optimal value for the number of pilot symbols maximizing the downlink ergodic rate of a cell. Our results also indicate that, compared to the cases with synchronous transmission, the downlink ergodic rate is more sensitive to the uplink power control in the asynchronous mode.
△ Less
Submitted 7 June, 2018;
originally announced June 2018.
-
Early Cancer Detection in Blood Vessels Using Mobile Nanosensors
Authors:
Reza Mosayebi,
Arman Ahmadzadeh,
Wayan Wicke,
Vahid Jamali,
Robert Schober,
Masoumeh Nasiri-Kenari
Abstract:
In this paper, we propose using mobile nanosensors (MNSs) for early stage anomaly detection. For concreteness, we focus on the detection of cancer cells located in a particular region of a blood vessel. These cancer cells produce and emit special molecules, so-called biomarkers, which are symptomatic for the presence of anomaly, into the cardiovascular system. Detection of cancer biomarkers with c…
▽ More
In this paper, we propose using mobile nanosensors (MNSs) for early stage anomaly detection. For concreteness, we focus on the detection of cancer cells located in a particular region of a blood vessel. These cancer cells produce and emit special molecules, so-called biomarkers, which are symptomatic for the presence of anomaly, into the cardiovascular system. Detection of cancer biomarkers with conventional blood tests is difficult in the early stages of a cancer due to the very low concentration of the biomarkers in the samples taken. However, close to the cancer cells, the concentration of the cancer biomarkers is high. Hence, detection is possible if a sensor with the ability to detect these biomarkers is placed in the vicinity of the cancer cells. Therefore, in this paper, we study the use of MNSs that are injected at a suitable injection site and can move through the blood vessels of the cardiovascular system, which potentially contain cancer cells. These MNSs can be activated by the biomarkers close to the cancer cells, where the biomarker concentration is sufficiently high. Eventually, the MNSs are collected by a fusion center (FC) where their activation levels are read and exploited to declare the presence of anomaly. We analytically derive the biomarker concentration as well as the probability mass function of the MNSs' activation levels and validate the obtained results via particle-based simulations. Then, we derive the optimal decision rule for the FC regarding the presence of anomaly assuming that the entire network is known at the FC. Finally, for the FC, we propose a simple sum detector that does not require knowledge of the network topology. Our simulations reveal that while the optimal detector achieves a higher performance than the sum detector, both proposed detectors significantly outperform a benchmark scheme that used fixed nanosensors at the FC.
△ Less
Submitted 22 May, 2018;
originally announced May 2018.
-
Advanced Target Detection via Molecular Communication
Authors:
Reza Mosayebi,
Wayan Wicke,
Vahid Jamali,
Arman Ahmadzadeh,
Robert Schober,
Masoumeh Nasiri-Kenari
Abstract:
In this paper, we consider target detection in suspicious tissue via diffusive molecular communications (MCs). If a target is present, it continuously and with a constant rate secretes molecules of a specific type, so-called biomarkers, into the medium, which are symptomatic for the presence of the target. Detection of these biomarkers is challenging since due to the diffusion and degradation, the…
▽ More
In this paper, we consider target detection in suspicious tissue via diffusive molecular communications (MCs). If a target is present, it continuously and with a constant rate secretes molecules of a specific type, so-called biomarkers, into the medium, which are symptomatic for the presence of the target. Detection of these biomarkers is challenging since due to the diffusion and degradation, the biomarkers are only detectable in the vicinity of the target. In addition, the exact location of the target within the tissue is not known. In this paper, we propose to distribute several reactive nanosensors (NSs) across the tissue such that at least some of them are expected to come in contact with biomarkers, which cause them to become activated. Upon activation, an NS releases a certain number of molecules of a secondary type into the medium to alert a fusion center (FC), where the final decision regarding the presence of the target is made. In particular, we consider a composite hypothesis testing framework where it is assumed that the location of the target and the biomarker secretion rate are unknown, whereas the locations of the NSs are known. We derive the uniformly most powerful (UMP) test for the detection at the NSs. For the final decision at the FC, we show that the UMP test does not exist. Hence, we derive a genie-aided detector as an upper bound on performance. We then propose two sub-optimal detectors and evaluate their performance via simulations
△ Less
Submitted 3 May, 2018;
originally announced May 2018.
-
Diffusion Based Molecular Communication with Limited Molecule Production Rate
Authors:
Hamid G. Bafghi,
Amin Gohari,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari
Abstract:
This paper studies the impact of a transmitter's molecule generation process on the capacity of a concentration based Molecular Communication (MC) system. Constraints caused by the molecule generation process affect the availability of the molecules at the transmitter. The transmitter has a storage of molecules, and should decide whether to release or save the currently produced molecules. As a re…
▽ More
This paper studies the impact of a transmitter's molecule generation process on the capacity of a concentration based Molecular Communication (MC) system. Constraints caused by the molecule generation process affect the availability of the molecules at the transmitter. The transmitter has a storage of molecules, and should decide whether to release or save the currently produced molecules. As a result, the MC system has conceptual connections with energy harvesting systems. In this paper, we consider two scenarios on the propagation channel. The first scenario assumes a channel with no Inter-symbol Interference (ISI), \emph{i.e.,} a memoryless channel. We derive bounds on the capacity of the MC system in this scenario. The second scenario assumes the MC network with ISI, in which the output of the channel depends on the history of released molecules in the previous time-slots. Based on the assumptions that either the transmitter or the receiver knows the channel statistics, we compute a lower bound on the channel capacity.
△ Less
Submitted 25 February, 2018;
originally announced February 2018.
-
Stochastic Geometry Modeling and Analysis of Single- and Multi-Cluster Wireless Networks
Authors:
Seyed Mohammad Azimi-Abarghouyi,
Behrooz Makki,
Martin Haenggi,
Masoumeh Nasiri-Kenari,
Tommy Svensson
Abstract:
This paper develops a stochastic geometry-based approach for the modeling and analysis of single- and multi-cluster wireless networks. We first define finite homogeneous Poisson point processes to model the number and locations of the transmitters in a confined region as a single-cluster wireless network. We study the coverage probability for a reference receiver for two strategies; closest-select…
▽ More
This paper develops a stochastic geometry-based approach for the modeling and analysis of single- and multi-cluster wireless networks. We first define finite homogeneous Poisson point processes to model the number and locations of the transmitters in a confined region as a single-cluster wireless network. We study the coverage probability for a reference receiver for two strategies; closest-selection, where the receiver is served by the closest transmitter among all transmitters, and uniform-selection, where the serving transmitter is selected randomly with uniform distribution. Second, using Matern cluster processes, we extend our model and analysis to multi-cluster wireless networks. Here, the receivers are modeled in two types, namely, closed- and open-access. Closed-access receivers are distributed around the cluster centers of the transmitters according to a symmetric normal distribution and can be served only by the transmitters of their corresponding clusters. Open-access receivers, on the other hand, are placed independently of the transmitters and can be served by all transmitters. In all cases, the link distance distribution and the Laplace transform (LT) of the interference are derived. We also derive closed-form lower bounds on the LT of the interference for single-cluster wireless networks. The impact of different parameters on the performance is also investigated.
△ Less
Submitted 23 December, 2017;
originally announced December 2017.
-
Joint Sum Rate And Error Probability Optimization: Finite Blocklength Analysis
Authors:
Mahdi Haghifam,
Mohammad Robat Mili,
Behrooz Makki,
Masoumeh Nasiri-Kenari,
Tommy Svensson
Abstract:
We study the tradeoff between the sum rate and the error probability in downlink of wireless networks. Using the recent results on the achievable rates of finite-length codewords, the problem is cast as a joint optimization of the network sum rate and the per-user error probability. Moreover, we develop an efficient algorithm based on the divide-and-conquer technique to simultaneously maximize the…
▽ More
We study the tradeoff between the sum rate and the error probability in downlink of wireless networks. Using the recent results on the achievable rates of finite-length codewords, the problem is cast as a joint optimization of the network sum rate and the per-user error probability. Moreover, we develop an efficient algorithm based on the divide-and-conquer technique to simultaneously maximize the network sum rate and minimize the maximum users' error probability and to evaluate the effect of the codewords length on the system performance. The results show that, in delay-constrained scenarios, optimizing the per-user error probability plays a key role in achieving high throughput.
△ Less
Submitted 1 August, 2017; v1 submitted 31 July, 2017;
originally announced July 2017.
-
Cooperative Abnormality Detection via Diffusive Molecular Communications
Authors:
Reza Mosayebi,
Vahid Jamali,
Nafiseh Ghoroghchian,
Robert Schober,
Masoumeh Nasiri-Kenari,
Mahdieh Mehrabi
Abstract:
In this paper, we consider abnormality detection via diffusive molecular communications (MCs) for a network consisting of several sensors and a fusion center (FC). If a sensor detects an abnormality, it injects into the medium a number of molecules which is proportional to the sensed value. Two transmission schemes for releasing molecules into the medium are considered. In the first scheme, referr…
▽ More
In this paper, we consider abnormality detection via diffusive molecular communications (MCs) for a network consisting of several sensors and a fusion center (FC). If a sensor detects an abnormality, it injects into the medium a number of molecules which is proportional to the sensed value. Two transmission schemes for releasing molecules into the medium are considered. In the first scheme, referred to as DTM, each sensor releases a different type of molecule, whereas in the second scheme, referred to as STM, all sensors release the same type of molecule. The molecules released by the sensors propagate through the MC channel and some may reach the FC where the final decision regarding whether or not an abnormality has occurred is made. We derive the optimal decision rules for both DTM and STM. However, the optimal detectors entail high computational complexity as log-likelihood ratios (LLRs) have to be computed. To overcome this issue, we show that the optimal decision rule for STM can be transformed into an equivalent low-complexity decision rule. Since a similar transformation is not possible for DTM, we propose simple low-complexity sub-optimal detectors based on different approximations of the LLR. The proposed low-complexity detectors are more suitable for practical MC systems than the original complex optimal decision rule, particularly when the FC is a nano-machine with limited computational capabilities. Furthermore, we analyze the performance of the proposed detectors in terms of their false alarm and missed detection probabilities. Simulation results verify our analytical derivations and reveal interesting insights regarding the trade-off between complexity and performance of the proposed detectors and the considered DTM and STM schemes.
△ Less
Submitted 29 March, 2017;
originally announced March 2017.
-
On the Capacity of a Class of Signal-Dependent Noise Channels
Authors:
Hamid Ghourchian,
Gholamali Aminian,
Amin Gohari,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari
Abstract:
In some applications, the variance of additive measurement noise depends on the signal that we aim to measure. For instance, additive Gaussian signal-dependent noise (AGSDN) channel models are used in molecular and optical communication. Herein we provide lower and upper bounds on the capacity of additive signal-dependent noise (ASDN) channels. The idea of the first lower bound is the extension of…
▽ More
In some applications, the variance of additive measurement noise depends on the signal that we aim to measure. For instance, additive Gaussian signal-dependent noise (AGSDN) channel models are used in molecular and optical communication. Herein we provide lower and upper bounds on the capacity of additive signal-dependent noise (ASDN) channels. The idea of the first lower bound is the extension of the majorization inequality, and for the second one, it uses some calculations based on the fact that $h(Y) > h (Y|Z)$. Both of them are valid for all additive signal-dependent noise (ASDN) channels defined in the paper. The upper bound is based on a previous idea of the authors ("symmetric relative entropy") and is used for the additive Gaussian signal-dependent noise (AGSDN) channels. These bounds indicate that in ASDN channels (unlike the classical AWGN channels), the capacity does not necessarily become larger by making the variance function of the noise smaller. We also provide sufficient conditions under which the capacity becomes infinity. This is complemented by a number of conditions that imply capacity is finite and a unique capacity achieving measure exists (in the sense of the output measure).
△ Less
Submitted 2 June, 2017; v1 submitted 12 February, 2017;
originally announced February 2017.
-
Integer-Forcing Message Recovering in Interference Channels
Authors:
Seyed Mohammad Azimi-Abarghouyi,
Mohsen Hejazi,
Behrooz Makki,
Masoumeh Nasiri-Kenari,
Tommy Svensson
Abstract:
In this paper, we propose a scheme referred to as integer-forcing message recovering (IFMR) to enable receivers to recover their desirable messages in interference channels. Compared to the state-of-the- art integer-forcing linear receiver (IFLR), our proposed IFMR approach needs to decode considerably less number of messages. In our method, each receiver recovers independent linear integer combin…
▽ More
In this paper, we propose a scheme referred to as integer-forcing message recovering (IFMR) to enable receivers to recover their desirable messages in interference channels. Compared to the state-of-the- art integer-forcing linear receiver (IFLR), our proposed IFMR approach needs to decode considerably less number of messages. In our method, each receiver recovers independent linear integer combinations of the desirable messages each from two independent equations. We propose an efficient algorithm to sequentially find the equations and integer combinations with maximum rates. We evaluate the performance of our scheme and compare the results with the minimum mean-square error (MMSE) and zero-forcing (ZF), as well as the IFLR schemes. The results indicate that our IFMR scheme outperforms the MMSE and ZF schemes, in terms of achievable rate, considerably. Also, compared to IFLR, the IFMR scheme achieves slightly less rates in moderate signal-to-noise ratios, with significantly less implementation complexity.
△ Less
Submitted 29 January, 2017;
originally announced January 2017.
-
Information Theory of Molecular Communication: Directions and Challenges
Authors:
Amin Gohari,
Mahtab Mirmohseni,
Masoumeh Nasiri-Kenari
Abstract:
Molecular Communication (MC) is a communication strategy that uses molecules as carriers of information, and is widely used by biological cells. As an interdisciplinary topic, it has been studied by biologists, communication theorists and a growing number of information theorists. This paper aims to specifically bring MC to the attention of information theorists. To do this, we first highlight the…
▽ More
Molecular Communication (MC) is a communication strategy that uses molecules as carriers of information, and is widely used by biological cells. As an interdisciplinary topic, it has been studied by biologists, communication theorists and a growing number of information theorists. This paper aims to specifically bring MC to the attention of information theorists. To do this, we first highlight the unique mathematical challenges of studying the capacity of molecular channels. Addressing these problems require use of known, or development of new mathematical tools. Toward this goal, we review a subjective selection of the existing literature on information theoretic aspect of molecular communication. The emphasis here is on the mathematical techniques used, rather than on the setup or modeling of a specific paper. Finally, as an example, we propose a concrete information theoretic problem that was motivated by our study of molecular communication.
△ Less
Submitted 10 December, 2016;
originally announced December 2016.
-
Wireless-powered relaying with finite block-length codes
Authors:
Mahdi Haghifam,
Behrooz Makki,
Masoumeh Nasiri-Kenari,
Tommy Svensson,
Michele Zorzi
Abstract:
This paper studies the outage probability and the throughput of amplify-and-forward relay networks with wireless information and energy transfer. We use some recent results on finite block-length codes to analyze the system performance in the cases with short codewords. Specifically, the time switching relaying and the power splitting relaying protocols are considered for energy and information tr…
▽ More
This paper studies the outage probability and the throughput of amplify-and-forward relay networks with wireless information and energy transfer. We use some recent results on finite block-length codes to analyze the system performance in the cases with short codewords. Specifically, the time switching relaying and the power splitting relaying protocols are considered for energy and information transfer. We derive tight approximations for the outage probability/throughput. Then, we analyze the outage probability in asymptotically high signal-to-noise ratios. Finally, we use numerical results to confirm the accuracy of our analysis and to evaluate the system performance in different scenarios. Our results indicate that, in delay-constrained scenarios, the codeword length affects the outage probability/throughput of the joint energy and information transfer systems considerably.
△ Less
Submitted 18 November, 2016;
originally announced November 2016.
-
On Wireless Energy and Information Transfer in Relay Networks
Authors:
Mahdi Haghifam,
Behrooz Makki,
Masoumeh Nasiri-Kenari,
Tommy Svensson
Abstract:
This paper investigates the outage probability and the throughput of relay networks with wireless information and energy transfer where the relays harvest energy from the transmitted radio-frequency signal of the source. Considering different power consumption models, we derive the outage probability for both adaptive and non-adaptive power allocations at the relay. With a total energy consumption…
▽ More
This paper investigates the outage probability and the throughput of relay networks with wireless information and energy transfer where the relays harvest energy from the transmitted radio-frequency signal of the source. Considering different power consumption models, we derive the outage probability for both adaptive and non-adaptive power allocations at the relay. With a total energy consumption constraint at the source, we provide closed-form expressions for the optimal time sharing and power allocation between the source energy and information transfer signals as well as the optimal relay positioning such that the outage probability is minimized. Finally, we extend our analysis to multi-relay networks. We show that with perfect channel state information (CSI) available at the relays and $N$ relays the opportunistic relaying scheme achieves diversity order of $\frac{N+1}{2}$. Also, we analyze the opportunistic relaying with partial CSI where either the source-relay or the relay-destination CSI is provided at its corresponding transmit terminal, and prove that the relay selection based on the source-relay CSI outperforms the relay selection based on the relay-destination CSI, in terms of outage probability. The analytical and simulation results demonstrate the efficiency of wireless energy and information transfer systems in different conditions.
△ Less
Submitted 24 July, 2016;
originally announced July 2016.
-
On Medium Chemical Reaction in Diffusion-Based Molecular Communication: a Two-Way Relaying Example
Authors:
Maryam Farahnak-Ghazani,
Gholamali Aminian,
Mahtab Mirmohseni,
Amin Gohari,
Masoumeh Nasiri-Kenari
Abstract:
Chemical reactions are a prominent feature of molecular communication (MC) systems, with no direct parallels in wireless communications. While chemical reactions may be used inside the transmitter nodes, receiver nodes or the communication medium, we focus on its utility in the medium in this paper. Such chemical reactions can be used to perform computation over the medium as molecules diffuse and…
▽ More
Chemical reactions are a prominent feature of molecular communication (MC) systems, with no direct parallels in wireless communications. While chemical reactions may be used inside the transmitter nodes, receiver nodes or the communication medium, we focus on its utility in the medium in this paper. Such chemical reactions can be used to perform computation over the medium as molecules diffuse and react with each other (physical-layer computation). We propose the use of chemical reactions for the following purposes: (i) to reduce signal-dependent observation noise of receivers by reducing the signal density, (ii) to realize molecular physical-layer network coding (molecular PNC) by performing the natural XOR operation inside the medium, and (iii) to reduce the inter-symbol interference (ISI) of other transmitters by canceling out the remaining molecules from previous transmissions. To make the ideas formal, we consider an explicit two-way relaying example with a transparent receiver (which has a signal-dependent noise). The proposed ideas are used to define a modulation scheme (which we call the PNC scheme). We compare the PNC with a previously proposed scheme for this problem where the XOR operation is performed at the relay node (using a molecular logic gate). We call the latter, the straightforward network coding (SNC). It is observed that in addition to the simplicity of the proposed PNC scheme, it outperforms the SNC scheme especially when we consider ISI.
△ Less
Submitted 24 April, 2018; v1 submitted 19 April, 2016;
originally announced April 2016.
-
Robust Successive Compute-and-Forward over Multi-User Multi-Relay Networks
Authors:
Mohsen Hejazi,
Seyed Mohammad Azimi-Abarghouyi,
Behrooz Makki,
Masoumeh Nasiri-Kenari,
Tommy Svensson
Abstract:
This paper develops efficient Compute-and-forward (CMF) schemes in multi-user multi-relay networks. To solve the rank failure problem in CMF setups and to achieve full diversity of the network, we introduce two novel CMF methods, namely, extended CMF and successive CMF. The former, having low complexity, is based on recovering multiple equations at relays. The latter utilizes successive interferen…
▽ More
This paper develops efficient Compute-and-forward (CMF) schemes in multi-user multi-relay networks. To solve the rank failure problem in CMF setups and to achieve full diversity of the network, we introduce two novel CMF methods, namely, extended CMF and successive CMF. The former, having low complexity, is based on recovering multiple equations at relays. The latter utilizes successive interference cancellation (SIC) to enhance the system performance compared to the state-of-the-art schemes. Both methods can be utilized in a network with different number of users, relays, and relay antennas, with negligible feedback channels or signaling overhead. We derive new concise formulations and explicit framework for the successive CMF method as well as an approach to reduce its computational complexity. Our theoretical analysis and computer simulations demonstrate the superior performance of our proposed CMF methods over the conventional schemes. Furthermore, based on our simulation results, the successive CMF method yields additional signal-to-noise ratio gains and shows considerable robustness against channel estimation error, compared to the extended CMF method.
△ Less
Submitted 7 January, 2016;
originally announced January 2016.
-
Integer Forcing-and-Forward Transceiver Design for MIMO Multi-Pair Two-Way Relaying
Authors:
Seyed Mohammad Azimi-Abarghouyi,
Masoumeh Nasiri-Kenari,
Behrouz Maham
Abstract:
In this paper, we propose a new transmission scheme, named as Integer Forcing-and-Forward (IFF), for communications among multi-pair multiple-antenna users in which each pair exchanges their messages with the help of a single multi antennas relay in the multiple-access and broadcast phases. The proposed scheme utilizes Integer Forcing Linear Receiver (IFLR) at relay, which uses equations, i.e., li…
▽ More
In this paper, we propose a new transmission scheme, named as Integer Forcing-and-Forward (IFF), for communications among multi-pair multiple-antenna users in which each pair exchanges their messages with the help of a single multi antennas relay in the multiple-access and broadcast phases. The proposed scheme utilizes Integer Forcing Linear Receiver (IFLR) at relay, which uses equations, i.e., linear integer-combinations of messages, to harness the intra-pair interference. Accordingly, we propose the design of mean squared error (MSE) based transceiver, including precoder and projection matrices for the relay and users, assuming that the perfect channel state information (CSI) is available. In this regards, in the multiple-access phase, we introduce two new MSE criteria for the related precoding and filter designs, i.e., the sum of the equations MSE (Sum-Equation MSE) and the maximum of the equations MSE (Max-Equation MSE), to exploit the equations in the relay. In addition, the convergence of the proposed criteria is proven as well. Moreover, in the broadcast phase, we use the two traditional MSE criteria, i.e. the sum of the users' mean squred errors (Sum MSE) and the maximum of the users' mean squared errors (Max MSE), to design the related precoding and filters for recovering relay's equations by the users. Then, we consider a more practical scenario with imperfect CSI. For this case, IFLR receiver is modified, and another transceiver design is proposed, which take into account the effect of channels estimation error. We evaluate the performance of our proposed strategy and compare the results with the conventional amplify-and-forward (AF) and denoise-and-forward (DF) strategies for the same scenario. The results indicate the substantial superiority of the proposed strategy in terms of the outage probability and the sum rate.
△ Less
Submitted 9 February, 2015; v1 submitted 31 October, 2014;
originally announced October 2014.
-
Compute-and-Forward Two-Way Relaying
Authors:
Seyed Mohammad Azimi-Abarghouyi,
Mohsen Hejazi,
Masoumeh Nasiri-Kenari
Abstract:
In this paper, a new two-way relaying scheme based on compute-and-forward (CMF) framework and relay selection strategies is proposed, which provides a higher throughput than the conventional two-way relaying schemes. Two cases of relays with or without feedback transmission capability are considered. An upper bound on the computation rate of each relay is derived, and based on that, a lower bound…
▽ More
In this paper, a new two-way relaying scheme based on compute-and-forward (CMF) framework and relay selection strategies is proposed, which provides a higher throughput than the conventional two-way relaying schemes. Two cases of relays with or without feedback transmission capability are considered. An upper bound on the computation rate of each relay is derived, and based on that, a lower bound on the outage probability of the system is presented assuming block Rayleigh fading channels. Numerical results show that while the average sum rate of the system without feedback, named as Max Compute-and-Forward (M-CMF), reaches the derived upper bound only in low SNRs, that of the system with feedback, named as Aligned Compute-and-Forward (A-CMF) reaches the bound in all SNRs. However, both schemes approach the derived lower bound on the outage probability in all SNRs.
△ Less
Submitted 10 October, 2014; v1 submitted 12 August, 2014;
originally announced August 2014.
-
Distributed Compute-and-Forward Based Relaying Strategies in Multi-User Multi-Relay Networks
Authors:
Seyed Mohammad Azimi-Abarghouyi,
Mohsen Hejazi,
Masoumeh Nasiri-Kenari
Abstract:
In this paper, we propose different practical distributed schemes to solve the rank failure problem in the compute and forward (CMF)-based multi-user multi-relay networks without central coordinator, in which the relays have no prior information about each other. First, a new relaying strategy based on CMF, named incremental compute-and-forward (ICMF), is proposed that performs quite well in terms…
▽ More
In this paper, we propose different practical distributed schemes to solve the rank failure problem in the compute and forward (CMF)-based multi-user multi-relay networks without central coordinator, in which the relays have no prior information about each other. First, a new relaying strategy based on CMF, named incremental compute-and-forward (ICMF), is proposed that performs quite well in terms of the outage probability. We show that the distributed ICMF scheme can even outperform the achievable rate of centralized optimal CMF in strong enough inter relay links, with much less complexity. Then, as the second scheme, amplify-forward and compute (AFC) is introduced in which the equations are recovered in the destination rather than in the relays. Finally, ICMF and AFC schemes are combined to present hybrid compute-amplify and forward (HCAF) relaying scheme, which takes advantages of both ICMF, and AFC and improves the performance of the ICMF considerably. We evaluate the performance of the proposed strategies in terms of the outage probability and compare the results with those of the conventional CMF strategy, the Decode and Forward (DF) strategy, and also the centralized optimal CMF. The results indicate the substantial superiority of the proposed schemes compared with the conventional schemes, specially for high number of users and relays.
△ Less
Submitted 4 April, 2015; v1 submitted 12 August, 2014;
originally announced August 2014.
-
Simplified Compute-and-Forward and Its Performance Analysis
Authors:
Mohsen Hejazi,
Masoumeh Nasiri-Kenari
Abstract:
The compute-and-forward (CMF) method has shown a great promise as an innovative approach to exploit interference toward achieving higher network throughput. The CMF was primarily introduced by means of information theory tools. While there have been some recent works discussing different aspects of efficient and practical implementation of CMF, there are still some issues that are not covered. In…
▽ More
The compute-and-forward (CMF) method has shown a great promise as an innovative approach to exploit interference toward achieving higher network throughput. The CMF was primarily introduced by means of information theory tools. While there have been some recent works discussing different aspects of efficient and practical implementation of CMF, there are still some issues that are not covered. In this paper, we first introduce a method to decrease the implementation complexity of the CMF method. We then evaluate the exact outage probability of our proposed simplified CMF scheme, and hereby provide an upper bound on the outage probability of the optimum CMF in all SNR values, and a close approximation of its outage probability in low SNR regimes. We also evaluate the effect of the channel estimation error (CEE) on the performance of both optimum and our proposed simplified CMF by simulations. Our simulation results indicate that the proposed method is more robust against CEE than the optimum CMF method for the examples considered.
△ Less
Submitted 24 April, 2013; v1 submitted 16 April, 2013;
originally announced April 2013.
-
Convolutional Network-Coded Cooperation in Multi-Source Networks with a Multi-Antenna Relay
Authors:
Alireza Karbalay-Ghareh,
Masoumeh Nasiri-Kenari,
Mohsen Hejazi
Abstract:
We propose a novel cooperative transmission scheme called "Convolutional Network-Coded Cooperation" (CNCC) for a network including N sources, one M-antenna relay, and one common destination. The source-relay (S-R) channels are assumed to be Nakagami-m fading, while the source-destination (S-D) and the relay-destination (R-D) channels are considered Rayleigh fading. The CNCC scheme exploits the gen…
▽ More
We propose a novel cooperative transmission scheme called "Convolutional Network-Coded Cooperation" (CNCC) for a network including N sources, one M-antenna relay, and one common destination. The source-relay (S-R) channels are assumed to be Nakagami-m fading, while the source-destination (S-D) and the relay-destination (R-D) channels are considered Rayleigh fading. The CNCC scheme exploits the generator matrix of a good (N+M', N, v) systematic convolutional code, with the free distance of d_free designed over GF(2), as the network coding matrix which is run by the network's nodes, such that the systematic symbols are directly transmitted from the sources, and the parity symbols are sent by the best antenna of the relay. An upper bound on the BER of the sources, and consequently, the achieved diversity orders are obtained. The numerical results indicate that the CNCC scheme outperforms the other cooperative schemes considered, in terms of the diversity order and the network throughput. The simulation results confirm the accuracy of the theoretical analysis.
△ Less
Submitted 1 September, 2013; v1 submitted 16 April, 2013;
originally announced April 2013.
-
A Cooperative MARC Scheme Using Analogue Network Coding to Achieve Second-Order Diversity
Authors:
Mohammad Shahrokh Esfahani,
Masoumeh Nasiri-Kenari
Abstract:
A multiple access relay channel (MARC) is considered in which an analogue-like network coding is implemented in the relay node. This analogue coding is a simple addition of the received signals at the relay node. Using "nulling detection" structure employed in V-BLAST receiver, we propose a detection scheme in the destination which is able to provide a diversity order of two for all users. We anal…
▽ More
A multiple access relay channel (MARC) is considered in which an analogue-like network coding is implemented in the relay node. This analogue coding is a simple addition of the received signals at the relay node. Using "nulling detection" structure employed in V-BLAST receiver, we propose a detection scheme in the destination which is able to provide a diversity order of two for all users. We analytically evaluate the performance of our proposed scheme for the MARC with two users where tight upper bounds for both uncoded and Convolutionally coded transmission blocks are provided. We verify our analytical evaluations by simulations and compare the results with those of noncooperative transmission and Alamouti's scheme for the same power and rate transmission. Our results indicate that while our proposed scheme shows a comparable performance compared to the Alamouti's scheme, it substantially outperforms the non-cooperate transmission.
△ Less
Submitted 4 March, 2013; v1 submitted 28 February, 2013;
originally announced March 2013.
-
Distributed Multiuser Sequential Channel Sensing Schemes in Multichannel Cognitive Radio Networks
Authors:
Hossein Shokri-Ghadikolaei,
Fatemeh Sheikholeslami,
Masoumeh Nasiri-Kenari
Abstract:
This paper has been withdrawn by the author due to a crucial problem associated with Figs. 2 and 3.
This paper has been withdrawn by the author due to a crucial problem associated with Figs. 2 and 3.
△ Less
Submitted 7 February, 2012; v1 submitted 5 January, 2012;
originally announced January 2012.
-
Analytical and Learning-Based Spectrum Sensing Time Optimization in Cognitive Radio Systems
Authors:
Hossein Shokri-Ghadikolaei,
Younes Abdi,
Masoumeh Nasiri-Kenari
Abstract:
Powerful spectrum sensing schemes enable cognitive radios (CRs) to find transmission opportunities in spectral resources allocated exclusively to the primary users. In this paper, maximizing the average throughput of a secondary user by optimizing its spectrum sensing time is formulated assuming that a prior knowledge of the presence and absence probabilities of the primary users is available. The…
▽ More
Powerful spectrum sensing schemes enable cognitive radios (CRs) to find transmission opportunities in spectral resources allocated exclusively to the primary users. In this paper, maximizing the average throughput of a secondary user by optimizing its spectrum sensing time is formulated assuming that a prior knowledge of the presence and absence probabilities of the primary users is available. The energy consumed for finding a transmission opportunity is evaluated and a discussion on the impact of the number of the primary users on the secondary user throughput and consumed energy is presented. In order to avoid the challenges associated with the analytical method, as a second solution, a systematic neural network-based sensing time optimization approach is also proposed in this paper. The proposed adaptive scheme is able to find the optimum value of the channel sensing time without any prior knowledge or assumption about the wireless environment. The structure, performance, and cooperation of the artificial neural networks used in the proposed method are disclosed in detail and a set of illustrative simulation results is presented to validate the analytical results as well as the performance of the proposed learning-based optimization scheme.
△ Less
Submitted 29 December, 2011; v1 submitted 20 November, 2011;
originally announced November 2011.
-
Sensing Matrix Setting Schemes for Cognitive Networks and Their Performance Analysis
Authors:
Hossein Shokri-Ghadikolaei,
Masoumeh Nasiri-Kenari
Abstract:
Powerful spectrum decision schemes enable cognitive radios (CRs) to find transmission opportunities in spectral resources allocated exclusively to the primary users. One of the key effecting factor on the CR network throughput is the spectrum sensing sequence used by each secondary user. In this paper, secondary users' throughput maximization through finding an appropriate sensing matrix (SM) is i…
▽ More
Powerful spectrum decision schemes enable cognitive radios (CRs) to find transmission opportunities in spectral resources allocated exclusively to the primary users. One of the key effecting factor on the CR network throughput is the spectrum sensing sequence used by each secondary user. In this paper, secondary users' throughput maximization through finding an appropriate sensing matrix (SM) is investigated. To this end, first the average throughput of the CR network is evaluated for a given SM. Then, an optimization problem based on the maximization of the network throughput is formulated in order to find the optimal SM. As the optimum solution is very complicated, to avoid its major challenges, three novel sub optimum solutions for finding an appropriate SM are proposed for various cases including perfect and non-perfect sensing. Despite of having less computational complexities as well as lower consumed energies, the proposed solutions perform quite well compared to the optimum solution (the optimum SM). The structure and performance of the proposed SM setting schemes are discussed in detail and a set of illustrative simulation results is presented to validate their efficiencies.
△ Less
Submitted 2 January, 2012; v1 submitted 20 November, 2011;
originally announced November 2011.
-
Performance Analysis of Sequential Method for Handover in Cognitive Radio Systems
Authors:
Hossein Shokri-Ghadikolaei,
Mohammad Mozaffari,
Masoumeh Nasiri-Kenari
Abstract:
Powerful spectrum handover schemes enable cognitive radios (CRs) to use transmission opportunities in primary users' channels appropriately. In this paper, we consider the cognitive access of primary channels by a secondary user. We evaluate the average detection time and the maximum achievable average throughput of the secondary user when the sequential method for hand-over (SMHO) is used. We ass…
▽ More
Powerful spectrum handover schemes enable cognitive radios (CRs) to use transmission opportunities in primary users' channels appropriately. In this paper, we consider the cognitive access of primary channels by a secondary user. We evaluate the average detection time and the maximum achievable average throughput of the secondary user when the sequential method for hand-over (SMHO) is used. We assume that a prior knowledge of the primary users' presence and absence probabilities are available. When investigating the maximum achievable throughput of the secondary user, we end into an optimization problem, in which the optimum value of sensing time must be selected. In our optimization problem, we take into account the spectrum hand over due to false detection of the primary user. We also propose a weighted based hand-over (WBHO) scheme in which the impacts of channels conditions and primary users' presence probability are considered. This Spectrum handover scheme provides higher average throughput for the SU than the SMHO method. The tradeoff between the maximum achievable throughput and consumed energy is discussed, and finally an energy efficient optimization formulation for finding a proper sensing time is provided.
△ Less
Submitted 2 January, 2012; v1 submitted 8 November, 2011;
originally announced November 2011.
-
Performance Analysis of Sequential Method for HandOver in Cognitive Radio Networks
Authors:
Hossein Shokri,
Mohammad Mozaffari,
Adnan Gavili,
Masoumeh Nasiri-Kenari
Abstract:
This paper has been withdrawn by the author due to a crucial problem in Lemma 3. This equation must be changed.
This paper has been withdrawn by the author due to a crucial problem in Lemma 3. This equation must be changed.
△ Less
Submitted 7 February, 2012; v1 submitted 5 June, 2011;
originally announced June 2011.