Skip to main content

Showing 1–50 of 53 results for author: Shafie, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2208.03618  [pdf, ps, other

    cs.LG

    An Unsupervised Learning Approach for Spectrum Allocation in Terahertz Communication Systems

    Authors: Akram Shafie, Chunhui Li, Nan Yang, Xiangyun Zhou, Trung Q. Duong

    Abstract: We propose a new spectrum allocation strategy, aided by unsupervised learning, for multiuser terahertz communication systems. In this strategy, adaptive sub-band bandwidth is considered such that the spectrum of interest can be divided into sub-bands with unequal bandwidths. This strategy reduces the variation in molecular absorption loss among the users, leading to the improved data rate performa… ▽ More

    Submitted 6 August, 2022; originally announced August 2022.

    Comments: This paper has been accepted for publication in IEEE Global Communications Conferences (GLOBECOM) 2022. Copyright may be transferred without notice, after which this version may no longer be accessible

  2. arXiv:2110.08707  [pdf, other

    cs.IT eess.SP

    Novel Secret-Key-Assisted Schemes for Secure MISOME-OFDM Systems

    Authors: Mohamed Marzban, Ahmed El Shafie, Naofal Al-Dhahir

    Abstract: We propose a new secure transmission scheme for uplink multiple-input single-output (MISO) orthogonal-frequency multiplexing (OFDM) systems in the presence of multiple eavesdroppers. Our proposed scheme utilizes the sub-channels orthogonality of OFDM systems to simultaneously transmit data and secret key symbols. The base station, Bob, shares secret key symbols with the legitimate user, Alice, usi… ▽ More

    Submitted 16 October, 2021; originally announced October 2021.

  3. arXiv:2101.10002  [pdf, other

    cs.IT

    Securing Full-Duplex Amplify-and-Forward Relay-Aided Transmissions Through Processing-Time Optimization

    Authors: Mohamed Marzban, Ahmed El Shafie, Ahmed Sultan, Naofal Al-Dhahir

    Abstract: We investigate physical-layer security of the full-duplex (FD) amplify-and-forward (AF) relay channel. We provide a new perspective on the problem and show that the processing time (delay) at the relay can be exploited to improve the system's security. We show that the FD AF relay channel can be seen as an intersymbol-interference (ISI) channel, hence, the discrete-Fourier transform (DFT) can be u… ▽ More

    Submitted 25 January, 2021; originally announced January 2021.

  4. arXiv:2008.07039  [pdf, other

    cs.IT

    Securing OFDM-Based NOMA SWIPT Systems

    Authors: Ahmed Badawy, Ahmed El Shafie

    Abstract: In this paper, we present a physical-layer security scheme that exploits artificial noise (AN) to secure the downlink legitimate communications and transfer energy to nodes operating under non-cooperative non-orthogonal multiple-access (NOMA) scenario. The nodes employ a joint time-switching and power-switching scheme to maximize the harvested energy. We provide necessary analysis and derivations… ▽ More

    Submitted 16 August, 2020; originally announced August 2020.

    Comments: Accepted for publication in IEEE TVT (August 11, 2020)

  5. arXiv:2004.07469  [pdf, ps, other

    eess.SP cs.IT

    Multi-Connectivity for Indoor Terahertz Communication with Self and Dynamic Blockage

    Authors: Akram Shafie, Nan Yang, Chong Han

    Abstract: We derive new expressions for the connection probability and the average ergodic capacity to evaluate the performance achieved by multi-connectivity (MC) in an indoor ultra-wideband terahertz (THz) communication system. In this system, the user is affected by both self-blockage and dynamic human blockers. We first build up a three-dimensional propagation channel in this system to characterize the… ▽ More

    Submitted 16 April, 2020; originally announced April 2020.

    Comments: Accepted to appear in IEEE ICC 2020

  6. arXiv:2004.07466  [pdf, ps, other

    eess.SP cs.IT

    Coverage Analysis for 3D Terahertz Communication Systems with Blockage and Directional Antennas

    Authors: Akram Shafie, Nan Yang, Zhuo Sun, Salman Durrani

    Abstract: The scarcity of spectrum resources in current wireless communication systems has sparked enormous research interest in the terahertz (THz) frequency band. This band is characterized by fundamentally different propagation properties resulting in different interference structures from what we have observed so far at lower frequencies. In this paper, we derive a new expression for the coverage probab… ▽ More

    Submitted 16 April, 2020; originally announced April 2020.

    Comments: Accepted to appear in IEEE ICC 2020

  7. arXiv:2001.07828  [pdf, other

    cs.IT cs.NI

    On the Performance of Quickest Detection Spectrum Sensing: The Case of Cumulative Sum

    Authors: Ahmed Badawy, Ahmed El Shafie, Tamer Khattab

    Abstract: Quickest change detection (QCD) is a fundamental problem in many applications. Given a sequence of measurements that exhibits two different distributions around a certain flip** point, the goal is to detect the change in distribution around the flip** point as quickly as possible. The QCD problem appears in many practical applications, e.g., quality control, power system line outage detection,… ▽ More

    Submitted 21 January, 2020; originally announced January 2020.

    Comments: This paper is accepted for publication in IEEE Communication Letters Jan 2020

  8. arXiv:1805.04768  [pdf, other

    cs.NI cs.IT

    Security-Enhanced SC-FDMA Transmissions Using Temporal Artificial-Noise and Secret-Key Aided Schemes

    Authors: Mohamed F. Marzban, Ahmed El Shafie, Naofal Al-Dhahir, Ridha Hamila

    Abstract: We investigate the physical layer security of uplink single-carrier frequency-division multiple-access (SC-FDMA) systems. Multiple users, Alices, send confidential messages to a common legitimate base-station, Bob, in the presence of an eavesdropper, Eve. To secure the legitimate transmissions, each user superimposes an artificial noise (AN) signal on the time-domain SC-FDMA data block. We reduce… ▽ More

    Submitted 12 May, 2018; originally announced May 2018.

  9. arXiv:1803.02412  [pdf, other

    cs.IT cs.NI

    Securing Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers

    Authors: Ahmed El Shafie, Asma Mabrouk, Kamel Tourki, Naofal Al-Dhahir, Mazen O. Hasna

    Abstract: This letter investigates the physical layer security in a wireless cooperative network where communication is assisted by a full-duplex (FD) untrusted relay in the presence of multiple external eavesdroppers. A cluster-based colluding eavesdrop** setting is considered, where illegitimate nodes with common interests are grouped in a cluster. In order to confuse the different eavesdrop** cluster… ▽ More

    Submitted 6 March, 2018; originally announced March 2018.

  10. arXiv:1803.00211  [pdf, other

    cs.IT cs.NI

    Securing OFDM-Based Wireless Links Using Temporal Artificial-Noise Injection

    Authors: Mohamed F. Marzban, Ahmed El Shafie, Rakan Chabaan, Naofal Al-Dhahir

    Abstract: We investigate the physical layer security of wireless single-input single-output orthogonal-division multiplexing (OFDM) when a transmitter, which we refer to as Alice, sends her information to a receiver, which we refer to as Bob, in the presence of an eavesdrop** node, Eve. To prevent information leakage, Alice sends an artificial-noise (AN) signal superimposed over her information signal. We… ▽ More

    Submitted 28 February, 2018; originally announced March 2018.

  11. arXiv:1803.00210  [pdf, other

    cs.IT cs.NI

    A Hybrid Artificial-Noise and Secret-Key Scheme for Securing OFDM Transmissions in V2G Networks

    Authors: Ahmed El Shafie, Mohamed F. Marzban, Rakan Chabaan, Naofal Al-Dhahir

    Abstract: We propose a new scheme to enhance the physical-layer security of wireless single-input single-output orthogonal-frequency division-multiplexing (OFDM) transmissions from an electric vehicle, Alice, to the aggregator, Bob, in the presence of an eavesdropper, Eve. To prevent information leakage to Eve, Alice exploits the wireless channel randomness to extract secret key symbols that are used to enc… ▽ More

    Submitted 28 February, 2018; originally announced March 2018.

    Comments: Presented in CCNC 2018

  12. arXiv:1801.02609  [pdf, other

    cs.NI cs.IT

    Secure Beamforming in Full-Duplex SWIPT Systems With Loopback Self-Interference Cancellation

    Authors: Yanjie Dong, Ahmed El Shafie, Md. Jahangir Hossain, Julian Cheng, Naofal Al-Dhahir, Victor C. M. Leung

    Abstract: Security is a critical issue in full duplex (FD) communication systems due to the broadcast nature of wireless channels. In this paper, joint design of information and artificial noise beamforming vectors is proposed for the FD simultaneous wireless information and power transferring (FD-SWIPT) systems with loopback self-interference cancellation. To guarantee high security and energy harvesting p… ▽ More

    Submitted 8 January, 2018; originally announced January 2018.

    Comments: Accepted in ICC 2018

  13. arXiv:1711.02168  [pdf, other

    cs.NI cs.IT

    On the Monetary Loss Due to Passive and Active Attacks on MIMO Smart Grid Communications

    Authors: Ahmed El Shafie, Hamadi Chihaoui, Ridha Hamila, Naofal Al-Dhahir, Adel Gastli, Lazhar Ben-Brahim

    Abstract: We consider multiple source nodes (consumers) communicating wirelessly their energy demands to the meter data-management system (MDMS) over the subarea gateway(s). We quantify the impacts of passive and active security attacks on the wireless communications system's reliability and security as well as the energy-demand estimation-error cost in dollars paid by the utility. We adopt a multiple-input… ▽ More

    Submitted 19 November, 2017; v1 submitted 6 November, 2017; originally announced November 2017.

  14. arXiv:1710.11009  [pdf, other

    cs.IT cs.NI

    An Artificial-Noise-Aided Secure Scheme for Hybrid Parallel PLC/Wireless OFDM Systems

    Authors: Ahmed El Shafie, Mohamed F. Marzban, Rakan Chabaan, Naofal Al-Dhahir

    Abstract: We investigate the physical-layer security of indoor hybrid parallel power-line/wireless orthogonal-frequency division-multiplexing (OFDM) communication systems. We propose an artificial-noise (AN) aided scheme to enhance the system's security in the presence of an eavesdropper by exploiting the decoupled nature of the power-line and wireless communication media. The proposed scheme does not requi… ▽ More

    Submitted 30 October, 2017; originally announced October 2017.

  15. arXiv:1709.06623  [pdf, other

    cs.IT

    Secure Beamforming in Full-Duplex SWIPT Systems

    Authors: Yanjie Dong, Ahmed El Shafie, Md. Jahangir Hossain, Julian Cheng, Naofal Al-Dhahir, Victor C. M. Leung

    Abstract: Physical layer security is a key issue in the full duplex (FD) communication systems due to the broadcast nature of wireless channels. In this paper, the joint design of information and artificial noise beamforming vectors is proposed for the FD simultaneous wireless information and power transferring (FD-SWIPT) systems. To guarantee high security and energy harvesting performance of the FD-SWIPT… ▽ More

    Submitted 19 September, 2017; originally announced September 2017.

    Comments: submitted for journal publication

  16. arXiv:1708.09551  [pdf, other

    cs.IT cs.NI

    Thresholds Optimization for One-Bit Feedback Multi-User Scheduling

    Authors: Mohammed Hafez, Ahmed El Shafie, Mohammed Shaqfeh, Tamer Khattab, Hussein Alnuweiri, Huseyin Arslan

    Abstract: We propose a new one-bit feedback scheme with scheduling decision based on the maximum expected weighted rate. We show the concavity of the $2$-user case and provide the optimal solution which achieves the maximum weighted rate of the users. For the general asymmetric M-user case, we provide a heuristic method to achieve the maximum expected weighted rate. We show that the sum rate of our proposed… ▽ More

    Submitted 30 August, 2017; originally announced August 2017.

  17. arXiv:1706.06225  [pdf, other

    cs.IT cs.NI

    Hybrid Spatio-Temporal Artificial Noise Design for Secure MIMOME-OFDM Systems

    Authors: Ahmed El Shafie, Zhiguo Ding, Naofal Al-Dhahir

    Abstract: This paper investigates artificial noise injection into the temporal and spatial dimensions of a legitimate wireless communication system to secure its transmissions from potential eavesdrop**. We consider a multiple-input single-output (MISO) orthogonal frequency division multiplexing (OFDM) system in the presence of a single-antenna passive eavesdropper and derive both the secrecy rate and ave… ▽ More

    Submitted 19 June, 2017; originally announced June 2017.

  18. arXiv:1706.05442  [pdf, other

    cs.IT cs.NI

    Probabilistic Jamming/Eavesdrop** Attacks to Confuse a Buffer-Aided Transmitter-Receiver Pair

    Authors: Ahmed El Shafie, Kamel Tourki, Zhiguo Ding, Naofal Al-Dhahir

    Abstract: We assume that a buffer-aided transmitter communicates with a receiving node in the presence of an attacker. We investigate the impact of a radio-frequency energy-harvesting attacker that probabilistically operates as a jammer or an eavesdropper. We show that even without the need for an external energy source, the attacker can still degrade the security of the legitimate system. We show that the… ▽ More

    Submitted 16 June, 2017; originally announced June 2017.

    Comments: Published in Comm letters March 2017

  19. arXiv:1706.03444  [pdf, other

    cs.IT cs.NI

    Secret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks

    Authors: Ahmed El Shafie, Ahmed Sultan, Asma Mabrouk, Kamel Tourki, Naofal Al-Dhahir

    Abstract: This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has been… ▽ More

    Submitted 11 June, 2017; originally announced June 2017.

  20. arXiv:1704.02596  [pdf, other

    cs.IT cs.NI

    Achievable Rates of Buffer-Aided Full-Duplex Gaussian Relay Channels

    Authors: Ahmed El Shafie, Ahmed Sultan, Ioannis Krikidis, Naofal Al-Dhahir, Ridha Hamila

    Abstract: We derive closed-form expressions for the achievable rates of a buffer-aided full-duplex (FD) multiple-input multiple-output (MIMO) Gaussian relay channel. The FD relay still suffers from residual self-interference (RSI) after the application of self-interference mitigation techniques. We investigate both cases of a slow-RSI channel where the RSI is fixed over the entire codeword, and a fast-RSI c… ▽ More

    Submitted 1 August, 2017; v1 submitted 9 April, 2017; originally announced April 2017.

  21. arXiv:1612.08076  [pdf, ps, other

    cs.NI cs.IT

    Cooperative Access Schemes for Efficient SWIPT Transmissions in Cognitive Radio Networks

    Authors: Ahmed El Shafie, Naofal Al-Dhahir, Ridha Hamila

    Abstract: We investigate joint information and energy cooperative schemes in a slotted-time cognitive radio network with a primary transmitter-receiver pair and a set of secondary transmitter-receiver pairs. The primary transmitter is assumed to be an energy-harvesting node. We propose a three-stage cooperative transmission protocol. During the first stage, the primary user releases a portion of its time sl… ▽ More

    Submitted 23 December, 2016; originally announced December 2016.

    Comments: Presented in Globecom 2015

  22. arXiv:1612.08067  [pdf, ps, other

    cs.NI cs.IT

    A Secure Multiple-Access Scheme for Rechargeable Wireless Sensors in the Presence of an Eavesdropper

    Authors: Ahmed El Shafie, Naofal Al-Dhahir

    Abstract: We propose a simple yet efficient scheme for a set of energy-harvesting sensors to establish secure communication with a common destination (a master node). An eavesdropper attempts to decode the data sent from the sensors to their common destination. We assume a single modulation scheme that can be implemented efficiently for energy-limited applications. We design a multiple-access scheme for the… ▽ More

    Submitted 23 December, 2016; originally announced December 2016.

    Comments: Published in IEEE Communications Letters http://ieeexplore.ieee.org/document/7073605/

  23. arXiv:1612.06056  [pdf, ps, other

    cs.NI cs.IT

    An Artificial-Noise-Aided Hybrid TS/PS Scheme for OFDM-Based SWIPT Systems

    Authors: Ahmed El Shafie, Kamel Tourki, Naofal Al-Dhahir

    Abstract: We propose a new artificial-noise aided hybrid time-switching/power-splitting scheme for orthogonal frequency-division multiplexing (OFDM) systems to securely transmit data and transfer energy to a legitimate receiving node. In our proposed scheme, the cyclic prefix has two more benefits in addition to the cancellation of the inter-symbol interference between the OFDM blocks. Firstly, it enables t… ▽ More

    Submitted 19 December, 2016; originally announced December 2016.

    Comments: Accepted for publication in IEEE Communications Letters Dec 2016

  24. arXiv:1612.05887  [pdf, ps, other

    cs.IT cs.NI

    Secure Communications in the Presence of a Buffer-Aided Wireless-Powered Relay With Self-Energy Recycling

    Authors: Ahmed El Shafie, Naofal Al-Dhahir

    Abstract: We consider a relay-assisted wireless network, where the energy-harvesting buffer-aided relay node is powered by radio-frequency signals from a source node wishing to communicate with its destination. We propose two secure cooperative protocols for a network composed of a source node equipped with a data buffer communicating with its destination in the presence of a buffer-aided relay node and an… ▽ More

    Submitted 18 December, 2016; originally announced December 2016.

    Comments: Published in IEEE Wireless Communications Letters in October 2015, http://ieeexplore.ieee.org/document/7296606/

  25. arXiv:1612.05885  [pdf, ps, other

    cs.NI cs.IT

    Security of Rechargeable Energy-Harvesting Transmitters in Wireless Networks

    Authors: Ahmed El Shafie, Dusit Niyato, Naofal Al-Dhahir

    Abstract: In this letter, we investigate the security of a single-antenna rechargeable source node in the presence of a multi-antenna rechargeable cooperative jammer and a potential single-antenna eavesdropper. The batteries at the legitimate transmitting nodes (i.e. the source node and the jamming node) are assumed to be limited in capacity and are modeled as queueing systems. We investigate the impact of… ▽ More

    Submitted 18 December, 2016; originally announced December 2016.

    Comments: IEEE Wireless Communications Letters 2016, http://ieeexplore.ieee.org/document/7467443/

  26. arXiv:1612.05881  [pdf, ps, other

    cs.NI cs.IT

    Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying~System

    Authors: Ahmed El Shafie, Ahmed Sultan, Naofal Al-Dhahir

    Abstract: This letter proposes a novel hybrid half-/full-duplex relaying scheme to enhance the relay channel security. A source node (Alice) communicates with her destination node (Bob) in the presence of a buffer-aided full-duplex relay node (Rooney) and a potential eavesdropper (Eve). Rooney adopts two different relaying strategies, namely randomize-and-forward and decode-and-forward relaying strategies,… ▽ More

    Submitted 18 December, 2016; originally announced December 2016.

    Comments: Published in IEEE Comm Letters http://ieeexplore.ieee.org/document/7506333/

  27. arXiv:1612.05715  [pdf, ps, other

    cs.NI

    Sparsity-Cognizant Multiple-Access Schemes for Large Wireless Networks With Node Buffers

    Authors: Ahmed El Shafie, Naofal Al-Dhahir, Ridha Hamila

    Abstract: This paper proposes efficient multiple-access schemes for large wireless networks based on the transmitters' buffer state information and their transceivers' duplex transmission capability. First, we investigate the case of half-duplex nodes where a node can either transmit or receive in a given time instant. The network is said to be naturally sparse if the number of nonempty-queue transmitters i… ▽ More

    Submitted 17 December, 2016; originally announced December 2016.

    Comments: Accepted IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems 2015

  28. arXiv:1610.09449  [pdf, ps, other

    cs.NI cs.IT

    Cognitive Access Protocol for Alleviating Sensing Errors in Cognitive Multiple-Access Systems

    Authors: Ahmed El Shafie

    Abstract: This letter studies a time-slotted multiple-access system with a primary user (PU) and a secondary user (SU) sharing the same channel resource. We propose a novel secondary access protocol which alleviates sensing errors and detects the availability of primary channels with the highest ability of detection. Under the proposed protocol, the SU may access the channel at one of a predefined instants… ▽ More

    Submitted 28 October, 2016; originally announced October 2016.

    Comments: Published in IEEE Wireless Communications Letters: IEEE Wireless Communications Letters, Vol. 3, No. 3, June 2014

  29. arXiv:1409.1272  [pdf, ps, other

    cs.IT cs.NI

    Optimal Spectrum Access for a Rechargeable Cognitive Radio User Based on Energy Buffer State

    Authors: Ahmed El Shafie, Mahmoud Ashour, Amr Mohamed, Tamer Khattab

    Abstract: This paper investigates the maximum throughput for a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable power supply. The SU maintains a finite energy queue and harvests energy from natural resources, e.g., solar, wind and acoustic noise. We propose a probabilistic access strategy by the SU based on the number of packets at its energy queue. We inv… ▽ More

    Submitted 3 September, 2014; originally announced September 2014.

    Comments: arXiv admin note: text overlap with arXiv:1407.7267

  30. arXiv:1407.7267  [pdf, ps, other

    cs.NI cs.IT

    On Spectrum Sharing Between Energy Harvesting Cognitive Radio Users and Primary Users

    Authors: Ahmed El Shafie, Mahmoud Ashour, Tamer Khattab, Amr Mohamed

    Abstract: This paper investigates the maximum secondary throughput for a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable power supply. The SU maintains a finite energy queue and harvests energy from natural resources and primary radio frequency (RF) transmissions. We propose a power allocation policy at the PU and analyze its effect on the throughput of b… ▽ More

    Submitted 30 July, 2014; v1 submitted 27 July, 2014; originally announced July 2014.

  31. arXiv:1406.6321  [pdf, ps, other

    cs.IT cs.NI

    Power-Optimal Feedback-Based Random Spectrum Access for an Energy Harvesting Cognitive User

    Authors: Mahmoud Ashour, Ahmed El Shafie, Amr Mohamed, Tamer Khattab

    Abstract: In this paper, we study and analyze cognitive radio networks in which secondary users (SUs) are equipped with Energy Harvesting (EH) capability. We design a random spectrum sensing and access protocol for the SU that exploits the primary link's feedback and requires less average sensing time. Unlike previous works proposed earlier in literature, we do not assume perfect feedback. Instead, we take… ▽ More

    Submitted 24 June, 2014; originally announced June 2014.

  32. arXiv:1406.2255  [pdf, other

    cs.NI cs.IT

    Energy-Efficient Cooperative Cognitive Relaying Schemes for Cognitive Radio Networks

    Authors: Ahmed El Shafie, Tamer Khattab, Amr El-Keyi

    Abstract: We investigate a cognitive radio network in which a primary user (PU) may cooperate with a cognitive radio user (i.e., a secondary user (SU)) for transmissions of its data packets. The PU is assumed to be a buffered node operating in a time-slotted fashion where the time is partitioned into equal-length slots. We develop two schemes which involve cooperation between primary and secondary users. To… ▽ More

    Submitted 26 October, 2017; v1 submitted 9 June, 2014; originally announced June 2014.

  33. arXiv:1405.2816  [pdf, ps, other

    cs.NI cs.IT

    Maximum Throughput of a Secondary User Cooperating with an Energy-Aware Primary User

    Authors: Ahmed El Shafie, Ahmed Sultan, Tamer Khattab

    Abstract: This paper proposes a cooperation protocol between a secondary user (SU) and a primary user (PU) which dedicates a free frequency subband for the SU if cooperation results in energy saving. Time is slotted and users are equipped with buffers. Under the proposed protocol, the PU releases portion of its bandwidth for secondary transmission. Moreover, it assigns a portion of the time slot duration fo… ▽ More

    Submitted 12 May, 2014; originally announced May 2014.

    Comments: Accepted WiOpt 2014

  34. arXiv:1405.2815  [pdf, ps, other

    cs.IT cs.NI

    On Orthogonal Band Allocation for Multi-User Multi-Band Cognitive Radio Networks: Stability Analysis

    Authors: Ahmed El Shafie, Tamer Khattab

    Abstract: In this work, we study the problem of band allocation of $M_s$ buffered secondary users (SUs) to $M_p$ primary bands licensed to (owned by) $M_p$ buffered primary users (PUs). The bands are assigned to SUs in an orthogonal (one-to-one) fashion such that neither band sharing nor multi-band allocations are permitted. In order to study the stability region of the secondary network, the optimization p… ▽ More

    Submitted 27 July, 2014; v1 submitted 12 May, 2014; originally announced May 2014.

    Comments: Conditional Acceptance in IEEE Transactions on Communications

  35. arXiv:1405.2814  [pdf, ps, other

    cs.NI

    Probabilistic Band-Splitting for a Buffered Cooperative Cognitive Terminal

    Authors: Ahmed El Shafie, Ahmed Sultan, Tamer Khattab

    Abstract: In this paper, we propose a cognitive protocol that involves cooperation between the primary and secondary users. In addition to its own queue, the secondary user (SU) has a queue to store, and then relay, the undelivered primary packets. When the primary queue is nonempty, the SU remains idle and attempts to decode the primary packet. When the primary queue is empty, the SU splits the total chann… ▽ More

    Submitted 8 July, 2014; v1 submitted 12 May, 2014; originally announced May 2014.

    Comments: Accepted in PIMRC 2014

  36. arXiv:1404.6667  [pdf, ps, other

    cs.NI cs.IT

    Cooperative Cognitive Relaying Under Primary and Secondary Quality of Service Satisfaction

    Authors: Ahmed El Shafie, Tamer Khattab

    Abstract: This paper proposes a new cooperative protocol which involves cooperation between primary and secondary users. We consider a cognitive setting with one primary user and multiple secondary users. The time resource is partitioned into discrete time slots. Each time slot, a secondary user is scheduled for transmission according to time division multiple access, and the remainder of the secondary user… ▽ More

    Submitted 1 July, 2014; v1 submitted 26 April, 2014; originally announced April 2014.

    Comments: This paper was accepted in PIMRC 2014

  37. arXiv:1404.1113  [pdf, ps, other

    cs.IT cs.NI

    Interference-Based Optimal Power-Efficient Access Scheme for Cognitive Radio Networks

    Authors: Ahmed H. Anwar, Ahmed El Shafie, Amr Mohamed, Tamer ElBatt, Mohsen Guizani

    Abstract: In this paper, we propose a new optimization-based access strategy of multipacket reception (MPR) channel for multiple secondary users (SUs) accessing the primary user (PU) spectrum opportunistically. We devise an analytical model that realizes the multipacket access strategy of SUs that maximizes the throughput of individual backlogged SUs subject to queue stability of the PU. All the network rec… ▽ More

    Submitted 8 July, 2014; v1 submitted 3 April, 2014; originally announced April 2014.

  38. arXiv:1403.7735  [pdf, ps, other

    cs.NI cs.IT cs.LG

    Optimal Cooperative Cognitive Relaying and Spectrum Access for an Energy Harvesting Cognitive Radio: Reinforcement Learning Approach

    Authors: Ahmed El Shafie, Tamer Khattab, Hussien Saad, Amr Mohamed

    Abstract: In this paper, we consider a cognitive setting under the context of cooperative communications, where the cognitive radio (CR) user is assumed to be a self-organized relay for the network. The CR user and the PU are assumed to be energy harvesters. The CR user cooperatively relays some of the undelivered packets of the primary user (PU). Specifically, the CR user stores a fraction of the undeliver… ▽ More

    Submitted 8 July, 2014; v1 submitted 30 March, 2014; originally announced March 2014.

  39. arXiv:1401.3387  [pdf, ps, other

    cs.IT cs.NI

    Maximum Throughput of a Cooperative Energy Harvesting Cognitive Radio User

    Authors: Ahmed El Shafie, Tamer Khattab, H. Vincent Poor

    Abstract: In this paper, we investigate the maximum throughput of a saturated rechargeable secondary user (SU) sharing the spectrum with a primary user (PU). The SU harvests energy packets (tokens) from the environment with a certain harvesting rate. All transmitters are assumed to have data buffers to store the incoming data packets. In addition to its own traffic buffer, the SU has a buffer for storing th… ▽ More

    Submitted 8 July, 2014; v1 submitted 14 January, 2014; originally announced January 2014.

    Comments: Part of this paper was accepted for publication in PIMRC 2014

  40. arXiv:1401.3174  [pdf, ps, other

    cs.IT cs.NI

    Comments on "Optimal Utilization of a Cognitive Shared Channel with a Rechargeable Primary Source Node"

    Authors: Ahmed El Shafie, Ahmed Sultan

    Abstract: In a recent paper [1], the authors investigated the maximum stable throughput region of a network composed of a rechargeable primary user and a secondary user plugged to a reliable power supply. The authors studied the cases of an infinite and a finite energy queue at the primary transmitter. However, the results of the finite case are incorrect. We show that under the proposed energy queue model… ▽ More

    Submitted 14 January, 2014; originally announced January 2014.

    Comments: Submitted to JCN

  41. arXiv:1401.3168  [pdf, ps, other

    cs.IT cs.NI

    On the Design of Relay--Assisted Primary--Secondary Networks

    Authors: Ahmed El Shafie, Tamer Khattab, Ahmed Sultan, H. Vincent Poor

    Abstract: The use of $N$ cognitive relays to assist primary and secondary transmissions in a time-slotted cognitive setting with one primary user (PU) and one secondary user (SU) is investigated. An overlapped spectrum sensing strategy is proposed for channel sensing, where the SU senses the channel for $τ$ seconds from the beginning of the time slot and the cognitive relays sense the channel for $2 τ$ seco… ▽ More

    Submitted 20 May, 2014; v1 submitted 14 January, 2014; originally announced January 2014.

  42. arXiv:1401.2119  [pdf, ps, other

    cs.IT cs.NI

    Maximum Throughput for a Cognitive Radio Multi-Antenna User with Multiple Primary Users

    Authors: Ahmed El Shafie, Tamer Khattab

    Abstract: We investigate a cognitive radio scenario involving a single cognitive transmitter equipped with $\mathcal{K}$ antennas sharing the spectrum with $\mathcal{M}$ primary users (PUs) transmitting over orthogonal bands. Each terminal has a queue to store its incoming traffic. We propose a novel protocol where the cognitive user transmits its packet over a channel formed by the aggregate of the inactiv… ▽ More

    Submitted 9 June, 2014; v1 submitted 9 January, 2014; originally announced January 2014.

  43. arXiv:1401.0340  [pdf, ps, other

    cs.IT cs.NI

    Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

    Authors: Ahmed El Shafie

    Abstract: We consider a secondary user (SU) with energy harvesting capability. We design access schemes for the SU which incorporate random spectrum sensing and random access, and which make use of the primary automatic repeat request (ARQ) feedback. We study two problem-formulations. In the first problem-formulation, we characterize the stability region of the proposed schemes. The sensing and access proba… ▽ More

    Submitted 27 April, 2014; v1 submitted 1 January, 2014; originally announced January 2014.

    Comments: ACCEPTED in EAI Endorsed Transactions on Cognitive Communications. arXiv admin note: substantial text overlap with arXiv:1208.5659

  44. arXiv:1401.0214  [pdf, ps, other

    cs.NI cs.IT

    Band Allocation for Cognitive Radios with Buffered Primary and Secondary Users

    Authors: Ahmed El Shafie, Ahmed Sultan, Tamer Khattab

    Abstract: In this paper, we study band allocation of $\mathcal{M}_s$ buffered secondary users (SUs) to $\mathcal{M}_p$ orthogonal primary licensed bands, where each primary band is assigned to one primary user (PU). Each SU is assigned to one of the available primary bands with a certain probability designed to satisfy some specified quality of service (QoS) requirements for the SUs. In the proposed system,… ▽ More

    Submitted 31 December, 2013; originally announced January 2014.

    Comments: Accepted in WCNC 2014

  45. arXiv:1311.2903  [pdf, ps, other

    cs.NI cs.IT

    Protocol Design and Stability Analysis of Cooperative Cognitive Radio Users

    Authors: Ahmed El Shafie, Tamer Khattab, H. Vincent Poor

    Abstract: A single cognitive radio transmitter--receiver pair shares the spectrum with two primary users communicating with their respective receivers. Each primary user has a local traffic queue, whereas the cognitive user has three queues; one storing its own traffic while the other two are relaying queues used to store primary relayed packets admitted from the two primary users. A new cooperative cogniti… ▽ More

    Submitted 18 January, 2014; v1 submitted 12 November, 2013; originally announced November 2013.

    Comments: Accepted in WCNC 2014

  46. arXiv:1309.6395  [pdf, ps, other

    cs.NI cs.IT

    Optimal Selection of Spectrum Sensing Duration for an Energy Harvesting Cognitive Radio

    Authors: Ahmed El Shafie, Ahmed Sultan

    Abstract: In this paper, we consider a time-slotted cognitive radio (CR) setting with buffered and energy harvesting primary and CR users. At the beginning of each time slot, the CR user probabilistically chooses the spectrum sensing duration from a predefined set. If the primary user (PU) is sensed to be inactive, the CR user accesses the channel immediately. The CR user optimizes the sensing duration prob… ▽ More

    Submitted 24 September, 2013; originally announced September 2013.

    Comments: Accepted in GLOBECOM 2013

  47. arXiv:1307.4744  [pdf, ps, other

    cs.IT cs.NI

    On the Coexistence of a Primary User with an Energy Harvesting Secondary User: A Case of Cognitive Cooperation

    Authors: Ahmed El Shafie, Tamer Khattab, Amr El-Keyi, Mohamed Nafie

    Abstract: In this paper, we consider a cognitive scenario where an energy harvesting secondary user (SU) shares the spectrum with a primary user (PU). The secondary source helps the primary source in delivering its undelivered packets during periods of silence of the primary source. The primary source has a queue for storing its data packets, whereas the secondary source has two data queues; a queue for sto… ▽ More

    Submitted 27 July, 2014; v1 submitted 6 July, 2013; originally announced July 2013.

    Comments: Accepted for publication in Wireless Communications & Mobile Computing (WCMC)

  48. arXiv:1303.2593  [pdf

    cs.OH physics.geo-ph

    Independent Component Analysis for Filtering Airwaves in Seabed Logging Application

    Authors: Adeel Ansari, Afza Bt Shafie, Abas B Md Said, Seema Ansari

    Abstract: Marine controlled source electromagnetic (CSEM) sensing method used for the detection of hydrocarbons based reservoirs in seabed logging application does not perform well due to the presence of the airwaves (or sea-surface). These airwaves interfere with the signal that comes from the subsurface seafloor and also tend to dominate in the receiver response at larger offsets. The task is to identify… ▽ More

    Submitted 4 March, 2013; originally announced March 2013.

    Comments: 7 pages, 13 figures

    Journal ref: International Journal of Advanced Studies in Computers, Science and Engineering (IJASCSE), 2013

  49. arXiv:1208.5659  [pdf, ps, other

    cs.NI cs.IT

    Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio

    Authors: Ahmed El Shafie, Ahmed Sultan

    Abstract: We consider a secondary user with energy harvesting capability. We design access schemes for the secondary user which incorporate random spectrum sensing and random access, and which make use of the primary automatic repeat request (ARQ) feedback. The sensing and access probabilities are obtained such that the secondary throughput is maximized under the constraints that both the primary and second… ▽ More

    Submitted 28 August, 2012; originally announced August 2012.

    Comments: in WiMob 2012

  50. arXiv:1208.5616  [pdf, ps, other

    cs.NI cs.IT

    Cooperative Cognitive Relaying with Ordered Cognitive Multiple Access

    Authors: Ahmed El Shafie, Ahmed Sultan

    Abstract: We investigate a cognitive radio system with two secondary users who can cooperate with the primary user in relaying its packets to the primary receiver. In addition to its own queue, each secondary user has a queue to keep the primary packets that are not received correctly by the primary receiver. The secondary users accept the unreceived primary packets with a certain probability and transmit r… ▽ More

    Submitted 28 August, 2012; originally announced August 2012.

    Comments: in Globecom 2012