Skip to main content

Showing 1–7 of 7 results for author: Sidhu, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.01576  [pdf, other

    cs.RO

    Training Adversarial yet Safe Agent to Characterize Safety Performance of Highly Automated Vehicles

    Authors: Minghao Zhu, Anmol Sidhu, Keith A. Redmill

    Abstract: This paper focuses on safety performance testing and characterization of black-box highly automated vehicles (HAV). Existing testing approaches typically obtain the testing outcomes by deploying the HAV into a specific testing environment. Such a testing environment can involve various passively given testing strategies presented by other traffic participants such as (i) the naturalistic driving p… ▽ More

    Submitted 2 February, 2024; originally announced February 2024.

  2. arXiv:1910.12657  [pdf, other

    eess.SP cs.IT cs.NI

    Power Allocation and User Assignment Scheme for Beyond 5G Heterogeneous Networks

    Authors: Khush Bakht, Furqan Jameel, Zain Ali, Wali Ullah Khan, Imran Khan, Guftaar Ahmad Sardar Sidhu, Jeong Woo Lee

    Abstract: The issue of spectrum scarcity in wireless networks is becoming prominent and critical with each passing year. Although several promising solutions have been proposed to provide a solution to spectrum scarcity, most of them have many associated tradeoffs. In this context, one of the emerging ideas relates to the utilization of cognitive radios (CR) for future heterogeneous networks (HetNets). This… ▽ More

    Submitted 25 October, 2019; originally announced October 2019.

    Comments: Beyond 5G, Cognitive Radio (CR), Dual Decomposition, User Fairness, Heterogeneous Networks (HetNets)

  3. arXiv:1902.09101  [pdf, ps, other

    cs.IT eess.SP

    Clustering-Based Codebook Design for MIMO Communication System

    Authors: **g Jiang, Xiao**g Wang, Guftaar Ahmad Sardar Sidhu, Li Zhen, Runchen Gao

    Abstract: Codebook design is one of the core technologies in limited feedback multi-input multi-output (MIMO) communication systems. However, the conventional codebook designs usually assume MIMO vectors are uniformly distributed or isotropic. Motivated by the excellent classfication and analysis ability of clustering algorithms, we propose a K-means clustering based codebook design. First, large amounts of… ▽ More

    Submitted 25 February, 2019; originally announced February 2019.

  4. arXiv:1807.01556  [pdf, other

    cs.IT

    Maximizing Secrecy Rate of an OFDM-based Multi-hop Underwater Acoustic Sensor Network

    Authors: Waqas Aman, M. Mahboob Ur Rahman, Zeeshan Haider, Junaid Qadir, M. Wasim Nawaz, Guftaar Ahmad Sardar Sidhu

    Abstract: In this paper, we consider an eavesdrop** attack on a multi-hop, UnderWater Acoustic Sensor Network (UWASN) that consists of $M+1$ underwater sensors which report their sensed data via Orthogonal Frequency Division Multiplexing (OFDM) scheme to a sink node on the water surface. Furthermore, due to the presence of a passive malicious node in nearby vicinity, the multi-hop UnderWater Acoustic (UWA… ▽ More

    Submitted 19 July, 2020; v1 submitted 4 July, 2018; originally announced July 2018.

    Comments: This paper has been accepted for publication in Transactions on Emerging Telecommunications Technologies (ETT), 2020

  5. Enhancing Physical Layer Security in AF Relay Assisted Multi-Carrier Wireless Transmission

    Authors: Waqas Aman, Guftaar Ahmad Sardar Sidhu, Haji M. Furqan, Zain Ali

    Abstract: In this paper, we study the physical layer security (PLS) problem in the dual hop orthogonal frequency division multiplexing (OFDM) based wireless communication system. First, we consider a single user single relay system and study a joint power optimization problem at the source and relay subject to individual power constraint at the two nodes. The aim is to maximize the end to end secrecy rate w… ▽ More

    Submitted 11 January, 2018; originally announced January 2018.

    Comments: 10 pages, 7 figures, accepted in Transactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT)

  6. Enhancing Physical Layer Security in Dual-Hop Multiuser Transmission

    Authors: Waqas Aman, Guftaar Ahmad Sardar Sidhu, Tayyaba Jabeen, Feifei Gao, Shi **

    Abstract: In this paper, we consider the Physical Layer Security(PLS) problem in orthogonal frequency division multiple access (OFDMA) based dual-hop system which consists of multiple users, multiple amplify and forward relays, and an eavesdropper. The aim is to enhance PLS of the entire system by maximizing sum secrecy rate of secret users through optimal resource allocation under various practical constra… ▽ More

    Submitted 19 March, 2017; originally announced March 2017.

  7. arXiv:1501.03058  [pdf

    cs.CV

    An Adaptive Neuro-Fuzzy Inference System Modeling for Grid-Adaptive Interpolation over Depth Images

    Authors: Arbaaz Singh Sidhu

    Abstract: A suitable interpolation method is essential to keep the noise level minimum along with the time-delay. In recent years, many different interpolation filters have been developed for instance H.264-6 tap filter, and AVS- 4 tap filter. The present work uses Adaptive Neuro-Fuzzy Inference System (ANFIS) technique to model and investigate the effects of a four-tap low-pass tap filter (Grid-adaptive fi… ▽ More

    Submitted 13 January, 2015; originally announced January 2015.

    Comments: 8 pages, 6 figures, International conference on Signal, Image Processing and Management (SPM) 2014