Skip to main content

Showing 1–15 of 15 results for author: Azmi, P

Searching in archive eess. Search in all archives.
.
  1. arXiv:2205.01533  [pdf, other

    cs.IT cs.CR eess.SY

    Average Age of Information Minimization in Reliable Covert Communication on Time-Varying Channels

    Authors: Shima Salar Hosseini, Paeiz Azmi, Nader Mokari

    Abstract: In this letter, we propose reliable covert communications with the aim of minimizing age of information (AoI) in the time-varying channels. We named the time duration that channel state information (CSI) is valid as a new metric, as age of channel variation (AoC). To find reliable covert communication in a fresh manner in dynamic environments, this work considers a new constraint that shows a rela… ▽ More

    Submitted 3 May, 2022; originally announced May 2022.

  2. arXiv:2202.05131  [pdf, other

    eess.SP

    AI-based Robust Resource Allocation in End-to-End Network Slicing under Demand and CSI Uncertainties

    Authors: Amir Gharehgoli, Ali Nouruzi, Nader Mokari, Paeiz Azmi, Mohamad Reza Javan, Eduard A. Jorswieck

    Abstract: Network slicing (NwS) is one of the main technologies in the fifth-generation of mobile communication and beyond (5G+). One of the important challenges in the NwS is information uncertainty which mainly involves demand and channel state information (CSI). Demand uncertainty is divided into three types: number of users requests, amount of bandwidth, and requested virtual network functions workloads… ▽ More

    Submitted 10 February, 2022; originally announced February 2022.

  3. arXiv:2107.00340  [pdf, other

    eess.SY

    AoI Minimization in Energy Harvesting and Spectrum Sharing Enabled 6G Networks

    Authors: Amir Hossein Zarif, Paeiz Azmi, Nader Mokari, Mohammad Reza Javan, Eduard Jorswieck

    Abstract: Spectrum sharing is a method to solve the problem of frequency spectrum deficiency. This paper studies a novel AI based spectrum sharing and energy harvesting system in which the freshness of information (AoI) is guaranteed. The system includes a primary user with access rights to the spectrum and a secondary user. The secondary user is an energy harvesting sensor that intends to use the primary u… ▽ More

    Submitted 1 July, 2021; originally announced July 2021.

  4. arXiv:2101.04337  [pdf

    cs.LG eess.SP

    Blind Modulation Classification via Combined Machine Learning and Signal Feature Extraction

    Authors: Jafar Norolahi, Paeiz Azmi

    Abstract: In this study, an algorithm to blind and automatic modulation classification has been proposed. It well benefits combined machine leaning and signal feature extraction to recognize diverse range of modulation in low signal power to noise ratio (SNR). The presented algorithm contains four. First, it advantages spectrum analyzing to branching modulated signal based on regular and irregular spectrum… ▽ More

    Submitted 12 January, 2021; originally announced January 2021.

  5. arXiv:2011.14080  [pdf, ps, other

    eess.SP

    Theoretical Accuracy Analysis of RSS-Based Range Estimation for Visible Light Communication

    Authors: Changeez Amini, Paeiz Azmi, Seyed Sadra Kashef

    Abstract: In this paper, an improved channel model of visible light communication (VLC) for ranging in presented. For indoor channel model of VLC, distance is estimated based on received signal strength. In this model, received shot noise as a distance-dependent parameter is considered in range estimation accuracy. Moreover, based on this model, the Cramer-Rao lower bound is computed as the theoretical limi… ▽ More

    Submitted 28 November, 2020; originally announced November 2020.

    Comments: 14 pages, 6 figures

  6. arXiv:2009.07021  [pdf, other

    eess.SP

    Cross Layer Resource Allocation in H-CRAN with Spectrum and Energy Cooperation

    Authors: Nazanin Moosavi, Mahnaz Sinaie, Paeiz Azmi, Pin-Hsun Lin, Eduard Jorswieck

    Abstract: 5G and beyond wireless networks are the upcoming evolution for the current cellular networks to provide the essential requirement of future demands such as high data rate, low energy consumption, and low latency to provide seamless communication for the emerging applications. Heterogeneous cloud radio access network (H-CRAN) is envisioned as a new trend of 5G that uses the advantages of heterogene… ▽ More

    Submitted 15 September, 2020; originally announced September 2020.

  7. arXiv:2007.05502  [pdf, other

    eess.SP

    Joint Information Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden

    Authors: Moslem Forouzesh, Paeiz Azmi, Ali Kuhestani, Phee Lep Yeoh

    Abstract: In this paper, we investigate joint information theoretic secrecy and covert communication in a single-input multi-output (SIMO) system where a transmitter (Alice) is communicating with two legitimate users (Bob and Carol). We consider that an untrusted user and a warden node are also present in the network attempting to attack the secure and covert communications to Bob and Carol, respectively. S… ▽ More

    Submitted 10 July, 2020; originally announced July 2020.

    Comments: 9 pages, 5 figures, 1 table

  8. arXiv:1907.01350  [pdf, other

    eess.SP

    Covert Communication Using Null Space and 3D Beamforming

    Authors: Moslem Forouzesh, Paeiz Azmi, Nader Mokari, Dennis Goeckel

    Abstract: Covert communication is often limited in rate because it is difficult to hide the signal in the background noise. Recent work has shown that jamming can significantly improve the rate at which covert communications can be conducted; however, the rate could be improved further if the jamming incident on the intended receiver can be mitigated. Here, we consider a multiple-antenna jammer that employs… ▽ More

    Submitted 3 July, 2019; v1 submitted 2 July, 2019; originally announced July 2019.

    Comments: 4 figure, 1 algorithm

  9. arXiv:1907.01334  [pdf, ps, other

    eess.SP

    Bit Error Probability Instead of Secrecy Rate Criterion to Enhance Performance for Secure Wireless Communication Systems

    Authors: Javad Taghipour, Paeiz Azmi, Nader Mokari, Moslem Forouzesh, Hossein Pishro-Nik

    Abstract: In this paper, we propose a new practical power allocation technique based on bit error probability (BEP) for physical layer security systems. It is shown that the secrecy rate that is the most commonly used in physical layer security systems, cannot be a suitable criterion lonely. Large positive values are suitable for the secrecy rate in physical layer security, but it does not consider the perf… ▽ More

    Submitted 2 July, 2019; originally announced July 2019.

    Comments: 11 pages, 9 figures

  10. arXiv:1902.09879  [pdf, other

    cs.IT eess.SP

    Robust Resource Allocation for PD-NOMA-Based MISO Heterogeneous Networks with CoMP Technology

    Authors: Atefeh Rezaei, Paeiz Azmi, Nader Mokari, Mohammad Reza Javan

    Abstract: In this paper, we consider a hybrid scheme of coordinated multi-point (CoMP) technology in MISO heterogeneous communication networks based on power domain non-orthogonal multiple access (PD-NOMA). We propose a novel method based on matching game with externalities to realize the hybrid scheme where the number of the cooperative nodes are variable. Moreover, we propose a new matching utility functi… ▽ More

    Submitted 19 September, 2019; v1 submitted 26 February, 2019; originally announced February 2019.

  11. arXiv:1901.06650  [pdf

    eess.SP

    Fading Model Deviation in The NLOS Communication Channel in Limited Reflection

    Authors: Zabihollah Hasanshahi, Paeiz Azmi, Mohammad Khajezadeh

    Abstract: Statistical models are employed to characterize the clutter in the radar and the reflective signals of the telecommunication receivers. End to this, Rayliegh distribution is the simplest fading models in NLOS channels possessing low-accuracy in the high-resolution radars and distant telecommunication receivers. At present, high accuracy models such as the m-type Nakagami and hybrid GG distribution… ▽ More

    Submitted 20 January, 2019; originally announced January 2019.

    Comments: 7 pages,10 figures, 3 tables

  12. arXiv:1901.04914  [pdf, other

    eess.SP

    Robust Power Allocation in Covert Communication: Imperfect CDI

    Authors: Moslem Forouzesh, Paeiz Azmi, Nader Mokari, Dennis Goeckel

    Abstract: The study of the fundamental limits of covert communications, where a transmitter Alice wants to send information to a desired recipient Bob without detection of that transmission by an attentive and capable warden Willie, has emerged recently as a topic of great research interest. Critical to these analyses is a characterization of the detection problem that is presented to Willie. Previous work… ▽ More

    Submitted 15 January, 2019; originally announced January 2019.

    Comments: 11 page, 5 figures, one table

  13. arXiv:1812.10312  [pdf, other

    eess.SP

    Covert Transmission with Antenna Selection and Using an External Jammer

    Authors: Morteza Sarkheil, Paeiz Azmi, Moslem Forouzesh, Ali Kuhestani

    Abstract: This paper adopts the antenna selection technique to enhance the covert rate in a wireless communication network comprised of a source, a destination , an external jammer and an eavesdropper. In the covert communication, the level of transmit power is low and hence a source with multiple antennas can be adopted to send the information toward the single antenna destination while concurrently, the j… ▽ More

    Submitted 26 December, 2018; originally announced December 2018.

  14. arXiv:1806.02013  [pdf, other

    cs.CR cs.IT eess.SP

    Robust Physical Layer Security for Power Domain Non-orthogonal Multiple Access-Based HetNets and HUDNs, SIC Avoidance at Eavesdroppers

    Authors: Moslem Forouzesh, Paeiz Azmi, Nader Mokari, Kai Kit Wong

    Abstract: In this paper, we investigate the physical layer security in downlink of Power Domain Non Orthogonal Multiple Access based heterogeneous cellular network in presence of multiple eavesdroppers. Our aim is to maximize the sum secrecy rate of the network. To this end, we formulate joint subcarrier and power allocation optimization problems to increase sum secrecy rate. Moreover, we propose a novel sc… ▽ More

    Submitted 6 June, 2018; originally announced June 2018.

    Comments: 14 pages, 7 figures

  15. arXiv:1803.07772  [pdf, other

    eess.SP cs.IT

    Cross-Layer Energy Efficient Resource Allocation in PD-NOMA based H-CRANs: Implementation via GPU

    Authors: Ali Mokdad, Paeiz Azmi, Nader Mokari, Mohammad Moltafet, Mohsen Ghaffari-Miab

    Abstract: In this paper, we propose a cross layer energy efficient resource allocation and remote radio head (RRH) selection algorithm for heterogeneous traffic in power domain - non-orthogonal multiple access (PD-NOMA) based heterogeneous cloud radio access networks (H-CRANs). The main aim is to maximize the EE of the elastic users subject to the average delay constraint of the streaming users and the cons… ▽ More

    Submitted 21 March, 2018; originally announced March 2018.