Skip to main content

Showing 1–15 of 15 results for author: Qaraqe, K

Searching in archive cs. Search in all archives.
.
  1. Error Rate and Ergodic Capacity of RF-FSO System with Partial Relay Selection in the Presence of Pointing Errors

    Authors: Milica I. Petkovic, Imran Shafique Ansari, Goran T. Djordjevic, Khalid A. Qaraqe

    Abstract: This paper presents an analysis of a multiple dual-hop relaying system, which is composed of km-class radio frequency (RF)-free-space optical (FSO) links. Partial relay selection based on outdated channel state information (CSI) is employed in order to select active relay for further transmission. Amplify-and-forward relaying protocol is utilized. The RF links are assumed to be subject to Rayleigh… ▽ More

    Submitted 28 September, 2022; v1 submitted 27 September, 2022; originally announced September 2022.

    Comments: Published at Optics Communications

  2. arXiv:2208.01726  [pdf, other

    cs.IT

    Can Artificial Noise Boost Further the Secrecy of Dual-hop RIS-aided Networks?

    Authors: Elmehdi Illi, Marwa K. Qaraqe, Faissal El Bouanani, Saif M. Al-Kuwari

    Abstract: In this paper, we quantify the physical layer security of a dual-hop regenerative relaying-based wireless communication system assisted by reconfigurable intelligent surfaces (RISs). In particular, the setup consists of a source node communicating with a destination node via a regenerative relay. In this setup, a RIS is installed in each hop to increase the source-relay and relay-destination commu… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

  3. arXiv:2205.07231  [pdf, other

    cs.IT

    On the Physical Layer Security of a Dual-Hop UAV-based Network in the Presence of per-hop Eavesdrop** and Imperfect CSI

    Authors: Elmehdi Illi, Marwa K. Qaraqe, F. El Bouanani, Saif M. Al-Kuwari

    Abstract: In this paper, the physical layer security of a dual-hop unmanned aerial vehicle-based wireless network, subject to imperfect channel state information (CSI) and mobility effects, is analyzed. Specifically, a source node $(S)$ communicates with a destination node $(D)$ through a decode-and-forward relay $(R)$, in the presence of two wiretappers $\left(E_{1},E_{2}\right)$ independently trying to co… ▽ More

    Submitted 15 May, 2022; originally announced May 2022.

  4. arXiv:2007.06825  [pdf, other

    eess.SP cs.IT

    On the Effective Capacity of IRS-assisted wireless communication

    Authors: Waqas Aman, M. Mahboob Ur Rahman, Shuja Ansari, Ali Arshad Nasir, Khalid Qaraqe, M. Ali Imran, Qammer H. Abbasi

    Abstract: We consider futuristic, intelligent reflecting surfaces (IRS)-aided communication between a base station (BS) and a user equipment (UE) for two distinct scenarios: a single-input, single-output (SISO) system whereby the BS has a single antenna, and a multi-input, single-output (MISO) system whereby the BS has multiple antennas. For the considered IRS-assisted downlink, we compute the effective cap… ▽ More

    Submitted 21 January, 2021; v1 submitted 14 July, 2020; originally announced July 2020.

  5. arXiv:2003.08359  [pdf, other

    eess.SP cs.LG stat.ML

    Spectrum Sensing and Signal Identification with Deep Learning based on Spectral Correlation Function

    Authors: Kürşat Tekbıyık, Özkan Akbunar, Ali Rıza Ekti, Ali Görçin, Güneş Karabulut Kurt, Khalid A. Qaraqe

    Abstract: Spectrum sensing is one of the means of utilizing the scarce source of wireless spectrum efficiently. In this paper, a convolutional neural network (CNN) model employing spectral correlation function which is an effective characterization of cyclostationarity property, is proposed for wireless spectrum sensing and signal identification. The proposed method classifies wireless signals without a pri… ▽ More

    Submitted 28 April, 2021; v1 submitted 17 March, 2020; originally announced March 2020.

  6. arXiv:1809.01774  [pdf, other

    cs.LG cs.CR stat.ML

    Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters

    Authors: Mahmoud Nabil, Muhammad Ismail, Mohamed Mahmoud, Mostafa Shahin, Khalid Qaraqe, Erchin Serpedin

    Abstract: Modern smart grids rely on advanced metering infrastructure (AMI) networks for monitoring and billing purposes. However, such an approach suffers from electricity theft cyberattacks. Different from the existing research that utilizes shallow, static, and customer-specific-based electricity theft detectors, this paper proposes a generalized deep recurrent neural network (RNN)-based electricity thef… ▽ More

    Submitted 5 September, 2018; originally announced September 2018.

  7. arXiv:1703.10719  [pdf, other

    cs.NI

    From D2D to Ds2D: Prolonging the Battery Life of Mobile Devices via Ds2D Communications

    Authors: Muhammad Z. Shakir, Muhammad Ismail, Xianbin Wang, Khalid A. Qaraqe, Erchin Serpedin

    Abstract: Emerging device centric systems (DCS) such as device-to-device (D2D) communications are considered as a standard part of future mobile networks, where operators/consumers involve the devices in direct communication to improve the cellular system throughput, latency, fairness, and energy efficiency. However, battery life of mobile devices involved in such communications is crucial for 5G smartphone… ▽ More

    Submitted 30 March, 2017; originally announced March 2017.

    Comments: Accepted for publication in IEEE Wireless Communications, Mar 21, 2017

  8. arXiv:1703.07765  [pdf, ps, other

    cs.ET

    Cooperative In-Vivo Nano-Network Communication at Terahertz Frequencies

    Authors: Qammer H. Abbasi, Ali Arshad Nasir, Ke Yang, Khalid Qaraqe, Akram Alomainy

    Abstract: Nano devices have great potential to play a vital role in future medical diagnostics and treatment technologies because of its non-invasive nature and ability to reach delicate body sites easily as compared to conventional devices. In this paper, a novel concept of cooperative communication for in-vivo nano-network is presented to enhance the communication among these devices. The effect on the sy… ▽ More

    Submitted 22 March, 2017; originally announced March 2017.

    Comments: 5 pages, 8 figures

  9. arXiv:1305.5913  [pdf, ps, other

    cs.IT

    Performance of Opportunistic Fixed Gain Bidirectional Relaying With Outdated CSI

    Authors: Fahd Ahmed Khan, Kamel Tourki, Mohamed-Slim Alouini, Khalid A. Qaraqe

    Abstract: This paper studies the impact of using outdated channel state information for relay selection on the performance of a network where two sources communicate with each other via fixed-gain amplifyand- forward relays. For a Rayleigh faded channel, closed-form expressions for the outage probability, moment generating function and symbol error rate are derived. Simulations results are also presented to… ▽ More

    Submitted 25 May, 2013; originally announced May 2013.

  10. Gaussian Assumption: the Least Favorable but the Most Useful

    Authors: Sangwoo Park, Erchin Serpedin, Khalid Qaraqe

    Abstract: This paper focuses on three contributions. First, a connection between the result, proposed by Stoica and Babu, and the recent information theoretic results, the worst additive noise lemma and the isoperimetric inequality for entropies, is illustrated. Second, information theoretic and estimation theoretic justifications for the fact that the Gaussian assumption leads to the largest Cramér-Rao low… ▽ More

    Submitted 20 November, 2012; originally announced November 2012.

  11. arXiv:1211.4795  [pdf, ps, other

    cs.IT

    A Unifying Variational Perspective on Some Fundamental Information Theoretic Inequalities

    Authors: Sangwoo Park, Erchin Serpedin, Khalid Qaraqe

    Abstract: This paper proposes a unifying variational approach for proving and extending some fundamental information theoretic inequalities. Fundamental information theory results such as maximization of differential entropy, minimization of Fisher information (Cramér-Rao inequality), worst additive noise lemma, entropy power inequality (EPI), and extremal entropy inequality (EEI) are interpreted as functio… ▽ More

    Submitted 4 February, 2016; v1 submitted 20 November, 2012; originally announced November 2012.

  12. arXiv:1207.0484  [pdf, other

    cs.IT math.PR math.ST

    Random Subcarrier Allocation in OFDM-Based Cognitive Radio Networks

    Authors: Sabit Ekin, Mohamed M. Abdallah, Khalid A. Qaraqe, Erchin Serpedin

    Abstract: This paper investigates the performance of an orthogonal frequency-division multiplexing (OFDM)-based cognitive radio (CR) spectrum sharing communication system that assumes random allocation and absence of the primary user's (PU) channel occupation information, i.e., no spectrum sensing is employed to acquire information about the availability of unused subcarriers. In case of a single secondary… ▽ More

    Submitted 2 July, 2012; originally announced July 2012.

    Comments: To appear in IEEE Transactions on Signal Processing

  13. arXiv:1202.0015  [pdf, ps, other

    cs.IT

    On the equivalence between Stein and de Bruijn identities

    Authors: Sangwoo Park, Erchin Serpedin, Khalid Qaraqe

    Abstract: This paper focuses on proving the equivalence between Stein's identity and de Bruijn's identity. Given some conditions, we prove that Stein's identity is equivalent to de Bruijn's identity. In addition, some extensions of de Bruijn's identity are presented. For arbitrary but fixed input and noise distributions, there exist relations between the first derivative of the differential entropy and the… ▽ More

    Submitted 22 July, 2012; v1 submitted 31 January, 2012; originally announced February 2012.

    Comments: This is the final version, which was accepted in IEEE trans. on Information Theory

  14. arXiv:1201.6681  [pdf, ps, other

    cs.IT

    An Alternative Proof of an Extremal Entropy Inequality

    Authors: Sangwoo Park, Erchin Serpedin, Khalid Qaraqe

    Abstract: This paper first focuses on deriving an alternative approach for proving an extremal entropy inequality (EEI), originally presented in [11]. The proposed approach does not rely on the channel enhancement technique, and has the advantage that it yields an explicit description of the optimal solution as opposed to the implicit approach of [11]. Compared with the proofs in [11], the proposed alternat… ▽ More

    Submitted 20 November, 2012; v1 submitted 31 January, 2012; originally announced January 2012.

  15. Time Delay Estimation in Cognitive Radio Systems

    Authors: Fatih Kocak, Hasari Celebi, Sinan Gezici, Khalid A. Qaraqe, Huseyin Arslan, H. Vincent Poor

    Abstract: In cognitive radio systems, secondary users can utilize multiple dispersed bands that are not used by primary users. In this paper, time delay estimation of signals that occupy multiple dispersed bands is studied. First, theoretical limits on time delay estimation are reviewed. Then, two-step time delay estimators that provide trade-offs between computational complexity and performance are inves… ▽ More

    Submitted 24 October, 2009; originally announced October 2009.

    Comments: To appear at CAMSAP 2009