- Optical Wireless Communication Technologies
- Energy Harvesting in Wireless Networks
- Quantum Information and Cryptography
- Telecommunications and Broadcasting Technologies
- Advanced MIMO Systems Optimization
- Cryptographic Implementations and Security
- Wireless Communication Security Techniques
- Orbital Angular Momentum in Optics
- Underwater Vehicles and Communication Systems
- Caching and Content Delivery
- Advanced Wireless Communication Technologies
- UAV Applications and Optimization
- Satellite Communication Systems
- Quantum Computing Algorithms and Architecture
- Molecular Communication and Nanonetworks
- Opportunistic and Delay-Tolerant Networks
- Wireless Communication Networks Research
- Peer-to-Peer Network Technologies
- Advanced Photonic Communication Systems
- Millimeter-Wave Propagation and Modeling
- Photonic and Optical Devices
- Semiconductor Lasers and Optical Devices
- Image and Video Quality Assessment
- Soil Moisture and Remote Sensing
- solar cell performance optimization
North Carolina State University
2022-2024
Ericsson (United States)
2024
North Atlantic Treaty Organization
2023
Özyeğin University
2018-2023
Yazd University
2018-2020
This paper introduces an innovative spectrum monitoring setup and a new performance metric, airtime utilization, which quantifies the extent of usage. Our design offers protocol-independent solution for detailed analysis across frequency, time, power dimensions, is essential effective management. The presented experimental monitor cost-effective large-scale deployment. Extensive measurements in 3.1 to 3.7 GHz frequency range are reported demonstrate practical application our setup....
The cache replacement policy is a crucial phase in caching-based systems that deal with the process of selecting applicable contents. In this paper, we propose two novel algorithms based on dataset obtained from typical wireless femto network. first algorithm, called Weighted Least Frequently used an Adaptive Time Window (WLF-ATW), aim to make balance between network's traffic and recognition popular WLF-ATW algorithm takes frequency recency information files into account ascertain...
The current literature on quantum key distribution is limited mainly to transmissions over fiber optic, atmospheric, or satellite links and not directly applicable underwater environments with different channel characteristics. In this paper, we analyze the bit error rate (QBER) secret (SKR) performance of well-known BB84 protocol in channels. As a path loss model, consider modified version Beer–Lambert formula, which takes into account effect scattering. We derive closed-form expression for...
Due to the scarcity of spectrum resources, emergence new technologies and ever-increasing number wireless devices operating in radio frequency lead data congestion interference. In this work, we study effect altitude on sub-6 GHz measurement results obtained at a Helikite flying over two distinct scenarios; i.e., urban rural environments. Specifically, aim investigating occupancy various long-term evolution (LTE), 5 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML"...
Decoy state quantum key distribution protocols have been studied for atmospheric, fiber, and satellite links; however, those results are not directly applicable to underwater environments with different channel characteristics. In this paper, we investigate the fundamental performance limits of decoy BB84 protocol over turbulent channels provide a comprehensive characterization. We adopt near field analysis determine average power transfer path use obtain lower bound on secret rate. quantify...
The growing importance of underwater networks (UNs) in mission-critical activities at sea enforces the need for secure communications (UCs). Classical encryption techniques can be used to achieve data exchange UNs. However, advent quantum computing will pose threats classical cryptography, thus challenging UCs. Currently, cryptosystems mostly adopt symmetric ciphers, which are considered computationally robust but challenge distributing secret key upfront. Post-quantum public-key (PQPK)...
<p>The growing importance of Underwater Networks (UNs) in mission-critical activities at sea enforces the need for secure Communications (UCs). Classical encryption techniques can be used to achieve data exchange UNs. However, advent Quantum Computing will pose threats classical cryptography, thus challenging also UCs. Currently, underwater crypto-systems mostly adopt symmetric ciphers, which are considered computationally quantum-robust, but challenge distributing secret key upfront....
Uneven load distribution is one of the main issues in wireless mesh networks (WMNs) which leads to an inefficient use network resources, increases latency some routes, and decreases average packet delivery ratio. To tackle this problem, we propose two balancing algorithms based on Ad-hoc On-demand Distance Vector (AODV) routing protocol for WMNs, called AODV-Mean Queue (AODV-MQ) AODV-Weighted Mean (AODV-WMQ). The provide essential solution dealing with congestion gateway nodes. idea consider...
Absorption, scattering, and turbulence experienced in underwater channels severely limit the range of quantum communication links. In this paper, as a potential solution to overcome limitations, we investigate multi-hop key distribution (QKD) where intermediate nodes between source destination help distribution. We consider deployment passive relays that simply redirect qubits next relay node or receiver without any measurement. Based on near-field analysis, present performance...
The current literature on quantum key distribution (QKD) is mainly limited to the transmissions over fiber optic, atmospheric or satellite links and are not directly applicable underwater environments with different channel characteristics. Absorption, scattering, turbulence experienced in channels severely limit range of communication links. In first part this thesis, we analyze bit error rate (QBER) secret (SKR) performance well-known BB84 protocol channels. As path loss model, consider a...
In this paper, we consider an indoor hybrid visible light communication (VLC) and radio frequency (RF) scenario with two-hop downlink transmission. The LED carries both data energy in the first phase, VLC, to harvester relay node, which then uses harvested re-transmit decoded information RF user second communication. direct current (DC) bias assigned time duration for VLC transmission are taken into account as design parameters. optimization problem is formulated maximize rate assumption of...
<p>The growing importance of Underwater Networks (UNs) in mission-critical activities at sea enforces the need for secure Communications (UCs). Classical encryption techniques can be used to achieve data exchange UNs. However, advent Quantum Computing will pose threats classical cryptography, thus challenging also UCs. Currently, underwater crypto-systems mostly adopt symmetric ciphers, which are considered computationally quantum-robust, but challenge distributing secret key upfront....
Absorption, scattering, and turbulence experienced in underwater channels severely limit the range of quantum communications. In this paper, to overcome limitations, we investigate a multi-hop key distribution (QKD) where intermediate nodes help between source destination nodes. We consider deployment passive-relays which simply redirect qubits next relay node or receiver without any measurement. Based on nearfield analysis, present performance relay-assisted QKD scheme clear ocean under...
In this paper, we study the effect of various transmitter and receiver parameters on quantum bit error rate (QBER) performance underwater key distribution. We utilize a Monte Carlo approach to simulate trajectories emitted photons transmitting in water from towards receiver. Based propagation delay results, first determine proper value for period avoid intersymbol interference as result possible multiple scattering events. Then, based angle arrival received photons, field-of-view limit...
In this paper, we explore an indoor downlink cooperative hybrid visible light communication (VLC)/radio frequency (RF) scenario using a relay node to reduce system outage probability. particular, information can be transmitted the end user either directly through VLC link or via node. To re-transmit decoded RF utilizes harvested energy from source emitting diode (LED) at ceiling. We derive analytical expression for probability of relayaided VLC/RF system, considering randomness location and...
This paper introduces an innovative spectrum measurement setup and a new performance metric, airtime utilization, which quantifies the extent of usage. Our design offers protocol-independent solution for detailed analysis across frequency, time, power dimensions, is essential effective management. The presented experimental Wireless Community Testbed (WCT) cost-effective large-scale deployment. Extensive measurements in 3.1 to 3.7 GHz frequency range are reported demonstrate practical...
The growing demand for wireless communication technologies has led to introducing hybrid visible light (VLC) and radio frequency (RF) system.In this paper, we present the design optimization of a VLC-RF system with energy harvesting indoor environments.We consider two-hop downlink transmission, where relay first harvests via VLC link along received data, then retransmits decoded information an RF end user.The objective study is jointly optimize direct current (DC) bias time allocation...
<p>The growing importance of Underwater Networks (UNs) in mission-critical activities at sea enforces the need for secure Communications (UCs). Classical encryption techniques can be used to achieve data exchange UNs. However, advent Quantum Computing will pose threats classical cryptography, thus challenging also UCs. Currently, underwater crypto-systems mostly adopt symmetric ciphers, which are considered computationally quantum-robust, but challenge distributing secret key upfront....
In this paper, we consider an indoor downlink dual-hop hybrid visible light communication (VLC)/radio frequency (RF) scenario. For each transmission block, dynamically allocate a portion of time resources to VLC and the other RF transmission. first phase (i.e., transmission), LED carries both data energy harvester relay node. second communication), utilizes harvested retransmit decoded information far user. During phase, continues transmit power (no information) node, aiming harvest that can...
In this paper, we propose a novel two-phased cache replacement algorithm based on the dataset obtained from typical wireless mesh network. first phase, aim to make trade-off between networks resources and refresh content. To deal with issue, apply sliding window new parameter, called equivalent active time, forecast user's behaviour pattern, i.e., decision whether update contents or utilize network's for other services. second introduce, parameter time live (TTL) that shows video popularity...