Amir Hossein Fahim Raouf

ORCID: 0000-0001-9822-021X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Optical Wireless Communication Technologies
  • Energy Harvesting in Wireless Networks
  • Quantum Information and Cryptography
  • Telecommunications and Broadcasting Technologies
  • Advanced MIMO Systems Optimization
  • Cryptographic Implementations and Security
  • Wireless Communication Security Techniques
  • Orbital Angular Momentum in Optics
  • Underwater Vehicles and Communication Systems
  • Caching and Content Delivery
  • Advanced Wireless Communication Technologies
  • UAV Applications and Optimization
  • Satellite Communication Systems
  • Quantum Computing Algorithms and Architecture
  • Molecular Communication and Nanonetworks
  • Opportunistic and Delay-Tolerant Networks
  • Wireless Communication Networks Research
  • Peer-to-Peer Network Technologies
  • Advanced Photonic Communication Systems
  • Millimeter-Wave Propagation and Modeling
  • Photonic and Optical Devices
  • Semiconductor Lasers and Optical Devices
  • Image and Video Quality Assessment
  • Soil Moisture and Remote Sensing
  • solar cell performance optimization

North Carolina State University
2022-2024

Ericsson (United States)
2024

North Atlantic Treaty Organization
2023

Özyeğin University
2018-2023

Yazd University
2018-2020

This paper introduces an innovative spectrum monitoring setup and a new performance metric, airtime utilization, which quantifies the extent of usage. Our design offers protocol-independent solution for detailed analysis across frequency, time, power dimensions, is essential effective management. The presented experimental monitor cost-effective large-scale deployment. Extensive measurements in 3.1 to 3.7 GHz frequency range are reported demonstrate practical application our setup....

10.36227/techrxiv.172226650.00985212/v2 preprint EN cc-by 2025-01-21

The cache replacement policy is a crucial phase in caching-based systems that deal with the process of selecting applicable contents. In this paper, we propose two novel algorithms based on dataset obtained from typical wireless femto network. first algorithm, called Weighted Least Frequently used an Adaptive Time Window (WLF-ATW), aim to make balance between network's traffic and recognition popular WLF-ATW algorithm takes frequency recency information files into account ascertain...

10.1109/tmc.2018.2864164 article EN IEEE Transactions on Mobile Computing 2018-08-07

The current literature on quantum key distribution is limited mainly to transmissions over fiber optic, atmospheric, or satellite links and not directly applicable underwater environments with different channel characteristics. In this paper, we analyze the bit error rate (QBER) secret (SKR) performance of well-known BB84 protocol in channels. As a path loss model, consider modified version Beer–Lambert formula, which takes into account effect scattering. We derive closed-form expression for...

10.1364/josab.376267 article EN Journal of the Optical Society of America B 2020-01-02

Due to the scarcity of spectrum resources, emergence new technologies and ever-increasing number wireless devices operating in radio frequency lead data congestion interference. In this work, we study effect altitude on sub-6 GHz measurement results obtained at a Helikite flying over two distinct scenarios; i.e., urban rural environments. Specifically, aim investigating occupancy various long-term evolution (LTE), 5 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/vtc2023-spring57618.2023.10200994 article EN 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring) 2023-06-01

Decoy state quantum key distribution protocols have been studied for atmospheric, fiber, and satellite links; however, those results are not directly applicable to underwater environments with different channel characteristics. In this paper, we investigate the fundamental performance limits of decoy BB84 protocol over turbulent channels provide a comprehensive characterization. We adopt near field analysis determine average power transfer path use obtain lower bound on secret rate. quantify...

10.1364/josab.451242 article EN Journal of the Optical Society of America B 2022-04-14

The growing importance of underwater networks (UNs) in mission-critical activities at sea enforces the need for secure communications (UCs). Classical encryption techniques can be used to achieve data exchange UNs. However, advent quantum computing will pose threats classical cryptography, thus challenging UCs. Currently, cryptosystems mostly adopt symmetric ciphers, which are considered computationally robust but challenge distributing secret key upfront. Post-quantum public-key (PQPK)...

10.1155/2023/7185329 article EN cc-by Quantum Engineering 2023-12-23

&lt;p&gt;The growing importance of Underwater Networks (UNs) in mission-critical activities at sea enforces the need for secure Communications (UCs). Classical encryption techniques can be used to achieve data exchange UNs. However, advent Quantum Computing will pose threats classical cryptography, thus challenging also UCs. Currently, underwater crypto-systems mostly adopt symmetric ciphers, which are considered computationally quantum-robust, but challenge distributing secret key upfront....

10.36227/techrxiv.22299160.v1 preprint EN cc-by 2023-03-21

Uneven load distribution is one of the main issues in wireless mesh networks (WMNs) which leads to an inefficient use network resources, increases latency some routes, and decreases average packet delivery ratio. To tackle this problem, we propose two balancing algorithms based on Ad-hoc On-demand Distance Vector (AODV) routing protocol for WMNs, called AODV-Mean Queue (AODV-MQ) AODV-Weighted Mean (AODV-WMQ). The provide essential solution dealing with congestion gateway nodes. idea consider...

10.1109/icee.2018.8472705 article EN 2018-05-01

Absorption, scattering, and turbulence experienced in underwater channels severely limit the range of quantum communication links. In this paper, as a potential solution to overcome limitations, we investigate multi-hop key distribution (QKD) where intermediate nodes between source destination help distribution. We consider deployment passive relays that simply redirect qubits next relay node or receiver without any measurement. Based on near-field analysis, present performance...

10.1364/josab.404245 article EN Journal of the Optical Society of America B 2020-10-02

The current literature on quantum key distribution (QKD) is mainly limited to the transmissions over fiber optic, atmospheric or satellite links and are not directly applicable underwater environments with different channel characteristics. Absorption, scattering, turbulence experienced in channels severely limit range of communication links. In first part this thesis, we analyze bit error rate (QBER) secret (SKR) performance well-known BB84 protocol channels. As path loss model, consider a...

10.48550/arxiv.2208.11493 preprint EN cc-by arXiv (Cornell University) 2022-01-01

In this paper, we consider an indoor hybrid visible light communication (VLC) and radio frequency (RF) scenario with two-hop downlink transmission. The LED carries both data energy in the first phase, VLC, to harvester relay node, which then uses harvested re-transmit decoded information RF user second communication. direct current (DC) bias assigned time duration for VLC transmission are taken into account as design parameters. optimization problem is formulated maximize rate assumption of...

10.48550/arxiv.2302.02575 preprint EN cc-by arXiv (Cornell University) 2023-01-01

&lt;p&gt;The growing importance of Underwater Networks (UNs) in mission-critical activities at sea enforces the need for secure Communications (UCs). Classical encryption techniques can be used to achieve data exchange UNs. However, advent Quantum Computing will pose threats classical cryptography, thus challenging also UCs. Currently, underwater crypto-systems mostly adopt symmetric ciphers, which are considered computationally quantum-robust, but challenge distributing secret key upfront....

10.36227/techrxiv.22299160.v2 preprint EN cc-by 2023-06-23

Absorption, scattering, and turbulence experienced in underwater channels severely limit the range of quantum communications. In this paper, to overcome limitations, we investigate a multi-hop key distribution (QKD) where intermediate nodes help between source destination nodes. We consider deployment passive-relays which simply redirect qubits next relay node or receiver without any measurement. Based on nearfield analysis, present performance relay-assisted QKD scheme clear ocean under...

10.1109/csndsp49049.2020.9249621 article EN 2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP) 2020-07-20

In this paper, we study the effect of various transmitter and receiver parameters on quantum bit error rate (QBER) performance underwater key distribution. We utilize a Monte Carlo approach to simulate trajectories emitted photons transmitting in water from towards receiver. Based propagation delay results, first determine proper value for period avoid intersymbol interference as result possible multiple scattering events. Then, based angle arrival received photons, field-of-view limit...

10.1364/josab.451237 article EN Journal of the Optical Society of America B 2022-06-10

In this paper, we explore an indoor downlink cooperative hybrid visible light communication (VLC)/radio frequency (RF) scenario using a relay node to reduce system outage probability. particular, information can be transmitted the end user either directly through VLC link or via node. To re-transmit decoded RF utilizes harvested energy from source emitting diode (LED) at ceiling. We derive analytical expression for probability of relayaided VLC/RF system, considering randomness location and...

10.36227/techrxiv.170840691.11014504/v1 preprint EN cc-by 2024-02-20

This paper introduces an innovative spectrum measurement setup and a new performance metric, airtime utilization, which quantifies the extent of usage. Our design offers protocol-independent solution for detailed analysis across frequency, time, power dimensions, is essential effective management. The presented experimental Wireless Community Testbed (WCT) cost-effective large-scale deployment. Extensive measurements in 3.1 to 3.7 GHz frequency range are reported demonstrate practical...

10.36227/techrxiv.172226650.00985212/v1 preprint EN 2024-07-29

The growing demand for wireless communication technologies has led to introducing hybrid visible light (VLC) and radio frequency (RF) system.In this paper, we present the design optimization of a VLC-RF system with energy harvesting indoor environments.We consider two-hop downlink transmission, where relay first harvests via VLC link along received data, then retransmits decoded information an RF end user.The objective study is jointly optimize direct current (DC) bias time allocation...

10.36227/techrxiv.23025401.v1 preprint EN cc-by 2023-05-22

&lt;p&gt;The growing importance of Underwater Networks (UNs) in mission-critical activities at sea enforces the need for secure Communications (UCs). Classical encryption techniques can be used to achieve data exchange UNs. However, advent Quantum Computing will pose threats classical cryptography, thus challenging also UCs. Currently, underwater crypto-systems mostly adopt symmetric ciphers, which are considered computationally quantum-robust, but challenge distributing secret key upfront....

10.36227/techrxiv.22299160.v3 preprint EN cc-by 2023-11-07

In this paper, we consider an indoor downlink dual-hop hybrid visible light communication (VLC)/radio frequency (RF) scenario. For each transmission block, dynamically allocate a portion of time resources to VLC and the other RF transmission. first phase (i.e., transmission), LED carries both data energy harvester relay node. second communication), utilizes harvested retransmit decoded information far user. During phase, continues transmit power (no information) node, aiming harvest that can...

10.1109/gcwkshps56602.2022.10008721 article EN 2022 IEEE Globecom Workshops (GC Wkshps) 2022-12-04

In this paper, we propose a novel two-phased cache replacement algorithm based on the dataset obtained from typical wireless mesh network. first phase, aim to make trade-off between networks resources and refresh content. To deal with issue, apply sliding window new parameter, called equivalent active time, forecast user's behaviour pattern, i.e., decision whether update contents or utilize network's for other services. second introduce, parameter time live (TTL) that shows video popularity...

10.1109/icee.2018.8472723 article EN 2018-05-01
Coming Soon ...