Skip to main content

Showing 1–33 of 33 results for author: Rahman, M M U

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.14565  [pdf, other

    eess.SP cs.HC

    Non-Contact Acquisition of PPG Signal using Chest Movement-Modulated Radio Signals

    Authors: Israel Jesus Santos Filho, Muhammad Mahboob Ur Rahman, Taous-Meriem Laleg-Kirati, Tareq Al-Naffouri

    Abstract: We present for the first time a novel method that utilizes the chest movement-modulated radio signals for non-contact acquisition of the photoplethysmography (PPG) signal. Under the proposed method, a software-defined radio (SDR) exposes the chest of a subject sitting nearby to an orthogonal frequency division multiplexing signal with 64 sub-carriers at a center frequency 5.24 GHz, while another S… ▽ More

    Submitted 22 February, 2024; originally announced February 2024.

    Comments: 5 pages, 5 figures, under review with a conference

  2. arXiv:2401.05452  [pdf, other

    eess.SP cs.IT cs.LG

    Cuff-less Arterial Blood Pressure Waveform Synthesis from Single-site PPG using Transformer & Frequency-domain Learning

    Authors: Muhammad Wasim Nawaz, Muhammad Ahmad Tahir, Ahsan Mehmood, Muhammad Mahboob Ur Rahman, Kashif Riaz, Qammer H. Abbasi

    Abstract: We develop and evaluate two novel purpose-built deep learning (DL) models for synthesis of the arterial blood pressure (ABP) waveform in a cuff-less manner, using a single-site photoplethysmography (PPG) signal. We train and evaluate our DL models on the data of 209 subjects from the public UCI dataset on cuff-less blood pressure (CLBP) estimation. Our transformer model consists of an encoder-deco… ▽ More

    Submitted 8 June, 2024; v1 submitted 9 January, 2024; originally announced January 2024.

    Comments: 8 pages, 3 figures, 2 tables, submitted for review and potential publication

  3. arXiv:2310.01850  [pdf, other

    cs.CR

    Multi-class Network Intrusion Detection with Class Imbalance via LSTM & SMOTE

    Authors: Muhammad Wasim Nawaz, Rashid Munawar, Ahsan Mehmood, Muhammad Mahboob Ur Rahman, Qammer H. Abbasi

    Abstract: Monitoring network traffic to maintain the quality of service (QoS) and to detect network intrusions in a timely and efficient manner is essential. As network traffic is sequential, recurrent neural networks (RNNs) such as long short-term memory (LSTM) are suitable for building network intrusion detection systems. However, in the case of a few dataset examples of the rare attack types, even these… ▽ More

    Submitted 3 October, 2023; originally announced October 2023.

    Comments: 8 pages, 7 figures, 5 tables

  4. arXiv:2308.04355  [pdf, other

    eess.SP cs.IT

    Vascular Ageing and Smoking Habit Prediction via a Low-Cost Single-Lead ECG Module

    Authors: S. Anas Ali, M. Saqib Niaz, Mubashir Rehman, Ahsan Mehmood, M. Mahboob Ur Rahman, Kashif Riaz, Qammer H. Abbasi

    Abstract: This paper presents a novel low-cost method to predict: i) the vascular age of a healthy young person, ii) whether or not a person is a smoker, using only the lead-I of the electrocardiogram (ECG). We begin by collecting (lead-I) ECG data from 42 healthy subjects (male, female, smoker, non-smoker) aged 18 to 30 years, using our custom-built low-cost single-lead ECG module, and anthropometric data,… ▽ More

    Submitted 18 December, 2023; v1 submitted 8 August, 2023; originally announced August 2023.

    Comments: 8 pages, 7 figures, 5 tables, submitted to a journal for review

  5. arXiv:2307.15995  [pdf, other

    eess.SP cs.IT

    Pathloss-based non-Line-of-Sight Identification in an Indoor Environment: An Experimental Study

    Authors: Muhammad Asim, Muhammad Ozair Iqbal, Waqas Aman, Muhammad Mahboob Ur Rahman, Qammer H. Abbasi

    Abstract: This paper reports the findings of an experimental study on the problem of line-of-sight (LOS)/non-line-of-sight (NLOS) classification in an indoor environment. Specifically, we deploy a pair of NI 2901 USRP software-defined radios (SDR) in a large hall. The transmit SDR emits an unmodulated tone of frequency 10 KHz, on a center frequency of 2.4 GHz, using three different signal-to-noise ratios (S… ▽ More

    Submitted 29 July, 2023; originally announced July 2023.

    Comments: 5 pages, 4 figures, submitted to an IEEE conference

  6. arXiv:2306.10130  [pdf, other

    eess.SP cs.HC

    Non-Contact Monitoring of Dehydration using RF Data Collected off the Chest and the Hand

    Authors: Hasan Mujtaba Buttar, Kawish Pervez, M. Mahboob Ur Rahman, Kashif Riaz, Qammer H. Abbasi

    Abstract: We report a novel non-contact method for dehydration monitoring. We utilize a transmit software defined radio (SDR) that im**es a wideband radio frequency (RF) signal (of frequency 5.23 GHz) onto either the chest or the hand of a subject who sits nearby. Further, another SDR in the closed vicinity collects the RF signals reflected off the chest (or passed through the hand) of the subject. Note t… ▽ More

    Submitted 16 June, 2023; originally announced June 2023.

    Comments: 8 pages, 9 figures, 2 tables

  7. arXiv:2305.12583  [pdf, other

    eess.SP cs.HC

    Your smartphone could act as a pulse-oximeter and as a single-lead ECG

    Authors: Ahsan Mehmood, Asma Sarauji, M. Mahboob Ur Rahman, Tareq Y. Al-Naffouri

    Abstract: In the post-covid19 era, every new wave of the pandemic causes an increased concern among the masses to learn more about their state of well-being. Therefore, it is the need of the hour to come up with ubiquitous, low-cost, non-invasive tools for rapid and continuous monitoring of body vitals that reflect the status of one's overall health. In this backdrop, this work proposes a deep learning appr… ▽ More

    Submitted 21 May, 2023; originally announced May 2023.

    Comments: 14 pages, 16 figures

  8. arXiv:2303.11423  [pdf, other

    eess.SP cs.LG

    Heart Murmur and Abnormal PCG Detection via Wavelet Scattering Transform & a 1D-CNN

    Authors: Ahmed Patwa, Muhammad Mahboob Ur Rahman, Tareq Y. Al-Naffouri

    Abstract: Heart murmurs provide valuable information about mechanical activity of the heart, which aids in diagnosis of various heart valve diseases. This work does automatic and accurate heart murmur detection from phonocardiogram (PCG) recordings. Two public PCG datasets (CirCor Digiscope 2022 dataset and PCG 2016 dataset) from Physionet online database are utilized to train and test three custom neural n… ▽ More

    Submitted 24 May, 2024; v1 submitted 12 March, 2023; originally announced March 2023.

    Comments: 11 pages, 8 figures, 10 tables, under review with a journal

  9. arXiv:2302.13011  [pdf, other

    eess.SP cs.IT

    Myocardial Infarction Detection from ECG: A Gramian Angular Field-based 2D-CNN Approach

    Authors: Asim Yousuf, Rehan Hafiz, Saqib Riaz, Muhammad Farooq, Kashif Riaz, Muhammad Mahboob Ur Rahman

    Abstract: This paper presents a novel method for myocardial infarction (MI) detection using lead II of electrocardiogram (ECG). Under our proposed method, we first clean the noisy ECG signals using db4 wavelet, followed by an R-peak detection algorithm to segment the ECG signals into beats. We then translate the ECG timeseries dataset to an equivalent dataset of gray-scale images using Gramian Angular Summa… ▽ More

    Submitted 25 February, 2023; originally announced February 2023.

    Comments: 8 pages, 15 figures, 3 tables

  10. arXiv:2301.06549  [pdf, other

    cs.IT eess.SP

    A Deep Learning & Fast Wavelet Transform-based Hybrid Approach for Denoising of PPG Signals

    Authors: Rabia Ahmed, Ahsan Mehmood, Muhammad Mahboob Ur Rahman, Octavia A. Dobre

    Abstract: This letter presents a novel hybrid method that leverages deep learning to exploit the multi-resolution analysis capability of the wavelets, in order to denoise a photoplethysmography (PPG) signal. Under the proposed method, a noisy PPG sequence of length N is first decomposed into L detailed coefficients using the fast wavelet transform (FWT). Then, the clean PPG sequence is reconstructed as foll… ▽ More

    Submitted 16 January, 2023; originally announced January 2023.

    Comments: 4 pages, 8 figures

  11. arXiv:2301.03018  [pdf, other

    eess.SP cs.AI cs.LG

    Energy Disaggregation & Appliance Identification in a Smart Home: Transfer Learning enables Edge Computing

    Authors: M. Hashim Shahab, Hasan Mujtaba Buttar, Ahsan Mehmood, Waqas Aman, M. Mahboob Ur Rahman, M. Wasim Nawaz, Haris Pervaiz, Qammer H. Abbasi

    Abstract: Non-intrusive load monitoring (NILM) or energy disaggregation aims to extract the load profiles of individual consumer electronic appliances, given an aggregate load profile of the mains of a smart home. This work proposes a novel deep-learning and edge computing approach to solve the NILM problem and a few related problems as follows. 1) We build upon the reputed seq2-point convolutional neural n… ▽ More

    Submitted 14 March, 2024; v1 submitted 8 January, 2023; originally announced January 2023.

    Comments: 10 pages, 4 figures, 3 tables, under review with a journal

  12. arXiv:2212.06089  [pdf, other

    eess.SP cs.LG

    Hand-breathe: Non-Contact Monitoring of Breathing Abnormalities from Hand Palm

    Authors: Kawish Pervez, Waqas Aman, M. Mahboob Ur Rahman, M. Wasim Nawaz, Qammer H. Abbasi

    Abstract: In post-covid19 world, radio frequency (RF)-based non-contact methods, e.g., software-defined radios (SDR)-based methods have emerged as promising candidates for intelligent remote sensing of human vitals, and could help in containment of contagious viruses like covid19. To this end, this work utilizes the universal software radio peripherals (USRP)-based SDRs along with classical machine learning… ▽ More

    Submitted 12 December, 2022; originally announced December 2022.

  13. arXiv:2204.00838  [pdf, other

    eess.SP cs.IT math.PR

    Countering Active Attacks on RAFT-based IoT Blockchain Networks

    Authors: Hasan Mujtaba Buttar, Waqas Aman, M. Mahboob Ur Rahman, Qammer H. Abbasi

    Abstract: This paper considers an Internet of Thing (IoT) blockchain network consisting of a leader node and various follower nodes which together implement the RAFT consensus protocol to verify a blockchain transaction, as requested by a blockchain client. Further, two kinds of active attacks, i.e., jamming and impersonation, are considered on the IoT blockchain network due to the presence of multiple {\it… ▽ More

    Submitted 2 April, 2022; originally announced April 2022.

  14. arXiv:2203.02667  [pdf, other

    eess.SP cs.CR cs.ET cs.IT

    Underwater and Air-Water Wireless Communication: State-of-the-art, Channel Characteristics, Security, and Open Problems

    Authors: Waqas Aman, Saif Al-Kuwari, Ambrish Kumar, Muhammad Mahboob Ur Rahman, Muhammad Muzzammil

    Abstract: We present a first detailed survey on underwater and air-water (A-W) wireless communication networks (WCNs) that mainly focuses on the security challenges and the countermeasures proposed to date. For clarity of exposition, this survey paper is mainly divided into two parts. The first part of the paper focuses on the state-of-the-art underwater and A-W WCNs whereby we outline the benefits and draw… ▽ More

    Submitted 3 September, 2022; v1 submitted 5 March, 2022; originally announced March 2022.

  15. arXiv:2009.00271  [pdf, other

    eess.SP cs.CR

    Preventing Identity Attacks in RFID Backscatter Communication Systems: A Physical-Layer Approach

    Authors: Ahsan Mehmood, Waqas Aman, M. Mahboob Ur Rahman, M. A. Imran, Qammer H. Abbasi

    Abstract: This work considers identity attack on a radio-frequency identification (RFID)-based backscatter communication system. Specifically, we consider a single-reader, single-tag RFID system whereby the reader and the tag undergo two-way signaling which enables the reader to extract the tag ID in order to authenticate the legitimate tag (L-tag). We then consider a scenario whereby a malicious tag (M-tag… ▽ More

    Submitted 1 September, 2020; originally announced September 2020.

    Comments: Accepted for publication in the Proc. of 5th Int. Conf. on the UK/China Emerging Technologies(UCET) 2020

  16. arXiv:2007.06825  [pdf, other

    eess.SP cs.IT

    On the Effective Capacity of IRS-assisted wireless communication

    Authors: Waqas Aman, M. Mahboob Ur Rahman, Shuja Ansari, Ali Arshad Nasir, Khalid Qaraqe, M. Ali Imran, Qammer H. Abbasi

    Abstract: We consider futuristic, intelligent reflecting surfaces (IRS)-aided communication between a base station (BS) and a user equipment (UE) for two distinct scenarios: a single-input, single-output (SISO) system whereby the BS has a single antenna, and a multi-input, single-output (MISO) system whereby the BS has multiple antennas. For the considered IRS-assisted downlink, we compute the effective cap… ▽ More

    Submitted 21 January, 2021; v1 submitted 14 July, 2020; originally announced July 2020.

  17. arXiv:2007.06818  [pdf, other

    eess.SP cs.CR cs.ET

    Securing the Insecure: A First-Line-of-Defense for Nanoscale Communication Systems Operating in THz Band

    Authors: Waqas Aman, M. Mahboob Ur Rahman, Hassan T. Abbas, Muhammad Arslan Khalid, Muhammad A. Imran, Akram Alomainy, Qammer H. Abbasi

    Abstract: Nanoscale communication systems operating in Ter-ahertz (THz) band are anticipated to revolutionise the healthcaresystems of the future. Global wireless data traffic is undergoinga rapid growth. However, wireless systems, due to their broad-casting nature, are vulnerable to malicious security breaches. Inaddition, advances in quantum computing poses a risk to existingcrypto-based information secur… ▽ More

    Submitted 14 July, 2020; originally announced July 2020.

  18. arXiv:2002.05093  [pdf, other

    cs.CR cs.IT eess.SP

    On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack

    Authors: Waqas Aman, Zeeshan Haider, S. Waqas H. Shah, M. Mahboob Ur Rahman, Octavia A. Dobre

    Abstract: This paper investigates the impact of authentication on effective capacity (EC) of an underwater acoustic (UWA) channel. Specifically, the UWA channel is under impersonation attack by a malicious node (Eve) present in the close vicinity of the legitimate node pair (Alice and Bob); Eve tries to inject its malicious data into the system by making Bob believe that she is indeed Alice. To thwart the i… ▽ More

    Submitted 12 February, 2020; originally announced February 2020.

    Comments: This paper is accepted for presentation at IEEE International Conference on Communications (ICC) 2020

  19. arXiv:1907.08041  [pdf, other

    cs.CR

    Channel Impulse Response-based Physical Layer Authentication in a Diffusion-based Molecular Communication System

    Authors: Sidra Zafar, Waqas Aman, Muhammad Mahboob Ur Rahman, Akram Alomainy, Qammer H. Abbasi

    Abstract: Consider impersonation attack by an active malicious nano node (Eve) on a diffusion based molecular communication (DbMC) system---Eve transmits during the idle slots to deceive the nano receiver (Bob) that she is indeed the legitimate nano transmitter (Alice). To this end, this work exploits the 3-dimensional (3D) channel impulse response (CIR) with $L$ taps as device fingerprint for authenticatio… ▽ More

    Submitted 18 July, 2019; originally announced July 2019.

    Comments: 2 pages, 3 figures, Accepted for publication in UCET-19 as an Extended Abstract

  20. arXiv:1907.04239  [pdf, other

    eess.SP cs.IT

    Channel Impulse Response-based Source Localization in a Diffusion-based Molecular Communication System

    Authors: Henry Ernest Baidoo-Williams, Muhammad Mahboob Ur Rahman, Qammer Hussain Abbasi

    Abstract: This work localizes a molecular source in a diffusion based molecular communication (DbMC) system via a set of passive sensors and a fusion center. Molecular source localization finds its applications in future healthcare systems, including proactive diagnostics. In this paper, we propose two distinct methods which both utilize (the peak of) the channel impulse response measurements to uniquely lo… ▽ More

    Submitted 8 July, 2019; originally announced July 2019.

    Comments: 17 pages, 4 figures, submitted to Elsevier Nano Communication Networks

  21. arXiv:1902.10998  [pdf, other

    cs.CR

    Shared Secret Key Generation via Carrier Frequency Offsets

    Authors: Waqas Aman, Aneeqa Ijaz, M. Mahboob Ur Rahman, Dushanta Nalin K. Jayakody, Haris Pervaiz

    Abstract: This work presents a novel method to generate secret keys shared between a legitimate node pair (Alice and Bob) to safeguard the communication between them from an unauthorized node (Eve). To this end, we exploit the {\it reciprocal carrier frequency offset} (CFO) between the legitimate node pair to extract common randomness out of it to generate shared secret keys. The proposed key generation alg… ▽ More

    Submitted 28 February, 2019; originally announced February 2019.

    Comments: 5 pages, 6 figures, IEEE VTC-2019 Spring

  22. arXiv:1807.10964  [pdf, other

    cs.IT

    Modulation Mode Detection & Classification for in-Vivo Nano-Scale Communication Systems Operating in Terahertz Band

    Authors: M. Ozair Iqbal, M. Mahboob Ur Rahman, M. Ali Imran, Akram Alomainy, Qammer H. Abbasi

    Abstract: This work initiates the efforts to design an intelligent/cognitive nano receiver operating in Terahertz (THz) band. Specifically, we investigate two essential ingredients of an intelligent nano receiver---modulation mode detection (to differentiate between pulse based modulation and carrier based modulation), and modulation classification (to identify the exact modulation scheme in use). To implem… ▽ More

    Submitted 28 July, 2018; originally announced July 2018.

    Comments: 10 pages, 10 figures

  23. arXiv:1807.01556  [pdf, other

    cs.IT

    Maximizing Secrecy Rate of an OFDM-based Multi-hop Underwater Acoustic Sensor Network

    Authors: Waqas Aman, M. Mahboob Ur Rahman, Zeeshan Haider, Junaid Qadir, M. Wasim Nawaz, Guftaar Ahmad Sardar Sidhu

    Abstract: In this paper, we consider an eavesdrop** attack on a multi-hop, UnderWater Acoustic Sensor Network (UWASN) that consists of $M+1$ underwater sensors which report their sensed data via Orthogonal Frequency Division Multiplexing (OFDM) scheme to a sink node on the water surface. Furthermore, due to the presence of a passive malicious node in nearby vicinity, the multi-hop UnderWater Acoustic (UWA… ▽ More

    Submitted 19 July, 2020; v1 submitted 4 July, 2018; originally announced July 2018.

    Comments: This paper has been accepted for publication in Transactions on Emerging Telecommunications Technologies (ETT), 2020

  24. arXiv:1807.00862  [pdf, other

    eess.SP cs.IT

    Power Imbalance Detection in Smart Grid via Grid Frequency Deviations: A Hidden Markov Model based Approach

    Authors: Shah Hassan, Hadia Sajjad, Muhammad Mahboob Ur Rahman

    Abstract: We detect the deviation of the grid frequency from the nominal value (i.e., 50 Hz), which itself is an indicator of the power imbalance (i.e., mismatch between power generation and load demand). We first pass the noisy estimates of grid frequency through a hypothesis test which decides whether there is no deviation, positive deviation, or negative deviation from the nominal value. The hypothesis t… ▽ More

    Submitted 2 July, 2018; originally announced July 2018.

    Comments: 5 pages, 6 figures, accepted by IEEE VTC conference, Fall 2018 edition

  25. Impersonation Detection in Line-of-Sight Underwater Acoustic Sensor Networks

    Authors: Waqas Aman, Muhammad Mahboob Ur Rahman, Junaid Qadir, Haris Pervaiz, Qiang Ni

    Abstract: This work considers a line-of-sight underwater acoustic sensor network (UWASN) consisting of $M$ underwater sensor nodes randomly deployed according to uniform distribution within a vertical half-disc (the so-called trusted zone). The sensor nodes report their sensed data to a sink node on water surface on a shared underwater acoustic (UWA) reporting channel in a time-division multiple-access (TDM… ▽ More

    Submitted 7 August, 2018; v1 submitted 31 May, 2018; originally announced May 2018.

    Comments: 13 pages and 13 figures. Accepted in IEEE Access 2018

    Journal ref: IEEE Access 2018

  26. arXiv:1703.10549  [pdf, other

    cs.IT

    Random Forest Resource Allocation for 5G Systems: Performance and Robustness Study

    Authors: Sahar Imtiaz, Hadi Ghauch, Muhammad Mahboob Ur Rahman, George Koudouridis, James Gross

    Abstract: Next generation cellular networks will have to leverage large cell densifications to accomplish the ambitious goals for aggregate multi-user sum rates, for which CRAN architecture is a favored network design. This shifts the attention back to applicable resource allocation (RA), which need to be applicable for very short radio frames, large and dense sets of radio heads, and large user populations… ▽ More

    Submitted 30 March, 2017; originally announced March 2017.

  27. arXiv:1703.08559  [pdf, other

    cs.IT

    Channel Impulse Response-based Distributed Physical Layer Authentication

    Authors: Ammar Mahmood, Waqas Aman, M. Ozair Iqbal, M. Mahboob Ur Rahman, Qammer H. Abbasi

    Abstract: In this preliminary work, we study the problem of {\it distributed} authentication in wireless networks. Specifically, we consider a system where multiple Bob (sensor) nodes listen to a channel and report their {\it correlated} measurements to a Fusion Center (FC) which makes the ultimate authentication decision. For the feature-based authentication at the FC, channel impulse response has been uti… ▽ More

    Submitted 24 March, 2017; originally announced March 2017.

    Comments: 6 pages, 5 figures, accepted for presentation at IEEE VTC 2017 Spring

  28. arXiv:1703.02025  [pdf, other

    cs.IT

    Distributed Beamforming with Wirelessly Powered Relay Nodes

    Authors: Muhammad Ozair Iqbal, Ammar Mahmood, Muhammad Mahboob Ur Rahman, Qammer H. Abbasi

    Abstract: This paper studies a system where a set of $N$ relay nodes harvest energy from the signal received from a source to later utilize it when forwarding the source's data to a destination node via distributed beamforming. To this end, we derive (approximate) analytical expressions for the mean SNR at destination node when relays employ: i) time-switching based energy harvesting policy, ii) power-split… ▽ More

    Submitted 6 March, 2017; originally announced March 2017.

    Comments: 4 pages, 3 figures, accepted for presentation at IEEE VTC 2017 Spring conference

  29. arXiv:1610.02658  [pdf, other

    cs.CR

    Exploiting Lack of Hardware Reciprocity for Sender-Node Authentication at the PHY Layer

    Authors: Muhammad Mahboob Ur Rahman, Aneela Yasmeen

    Abstract: This paper proposes to exploit the so-called {\it reciprocity parameters} (modelling non-reciprocal communication hardware) to use them as decision metric for binary hypothesis testing based authentication framework at a receiver node Bob. Specifically, Bob first learns the reciprocity parameters of the legitimate sender Alice via initial training. Then, during the test phase, Bob first obtains a… ▽ More

    Submitted 9 October, 2016; originally announced October 2016.

    Comments: 5 pages, submitted to IEEE WCNC 2017

  30. arXiv:1608.07949  [pdf, ps, other

    cs.NI cs.IT cs.LG

    Learning-Based Resource Allocation Scheme for TDD-Based CRAN System

    Authors: Sahar Imtiaz, Hadi Ghauch, M. Mahboob Ur Rahman, George Koudouridis, James Gross

    Abstract: Explosive growth in the use of smart wireless devices has necessitated the provision of higher data rates and always-on connectivity, which are the main motivators for designing the fifth generation (5G) systems. To achieve higher system efficiency, massive antenna deployment with tight coordination is one potential strategy for designing 5G systems, but has two types of associated system overhead… ▽ More

    Submitted 29 August, 2016; originally announced August 2016.

    Comments: 10 pages, 9 figures, accepted for publication in MSWiM 2016

  31. Coordination and Antenna Domain Formation in Cloud-RAN systems

    Authors: Hadi Ghauch, Muhammad Mahboob Ur Rahman, Sahar Imtiaz, James Gross

    Abstract: We study here the problem of Antenna Domain Formation (ADF) in cloud RAN systems, whereby multiple remote radio-heads (RRHs) are each to be assigned to a set of antenna domains (ADs), such that the total interference between the ADs is minimized. We formulate the corresponding optimization problem, by introducing the concept of \emph{interference coupling coefficients} among pairs of radio-heads.… ▽ More

    Submitted 28 June, 2016; originally announced June 2016.

    Comments: 7 pages, IEEE International Conference on Communications 2016 (ICC 2016)

  32. arXiv:1606.08401  [pdf, ps, other

    cs.IT

    User Assignment in C-RAN Systems: Algorithms and Bounds

    Authors: Hadi Ghauch, Muhammad Mahboob Ur Rahman, Sahar Imtiaz, James Gross, Mikael Skoglund, Christer Qvarfordt

    Abstract: In this work, we investigate the problem of mitigating interference between so called antenna domains of a cloud radio access network (C-RAN). In contrast to previous work, we turn to an approach utilizing primarily the optimal assignment of users to central processors in a C-RAN deployment. We formulate this user assignment problem as an integer optimization problem, and propose an iterative algo… ▽ More

    Submitted 1 March, 2018; v1 submitted 27 June, 2016; originally announced June 2016.

    Comments: IEEE Transactions on Wireless Communications, 30 pages (single column)

  33. RRH clustering and transmit precoding for interference-limited 5G CRAN downlink

    Authors: Muhammad Mahboob Ur Rahman, Hadi Ghauch, Sahar Imtiaz, James Gross

    Abstract: In this work, we consider cloud RAN architecture and focus on the downlink of an antenna domain (AD) exposed to external interference from neighboring ADs. With system sum-rate as performance metric, and assuming that perfect channel state information is available at the aggregation node (AN), we implement i) a greedy user association algorithm, and ii) a greedy remote radio-head (RRH) clustering… ▽ More

    Submitted 26 October, 2015; originally announced October 2015.

    Comments: 7 pages, to be presented at IEEE Globecom 2015 workshops