- Cooperative Communication and Network Coding
- Advanced Wireless Communication Techniques
- Advanced MIMO Systems Optimization
- Wireless Communication Networks Research
- Wireless Networks and Protocols
- Mobile Ad Hoc Networks
- Advanced Wireless Network Optimization
- Advanced Wireless Communication Technologies
- Wireless Communication Security Techniques
- Error Correcting Code Techniques
- PAPR reduction in OFDM
- UAV Applications and Optimization
- Cognitive Radio Networks and Spectrum Sensing
- Wireless Signal Modulation Classification
- Full-Duplex Wireless Communications
- Opportunistic and Delay-Tolerant Networks
- Satellite Communication Systems
- Blind Source Separation Techniques
- Distributed Control Multi-Agent Systems
- Coding theory and cryptography
- Energy Harvesting in Wireless Networks
- Power Line Communications and Noise
- Age of Information Optimization
- IoT and Edge/Fog Computing
- Interconnection Networks and Systems
National University of Defense Technology
2016-2025
Propagation des Ondes : Étude Mathématique et Simulation
2022
University of Oulu
2021
China Institute Of Communications
2018
COMSATS University Islamabad
2015
Beijing Institute of Petrochemical Technology
2015
China Center of Advanced Science and Technology
2015
Peking University
2015
Changsha University of Science and Technology
2015
Institute of High Energy Physics
2015
Mobile edge computing (MEC) brings computation capacity to the of mobile networks in close proximity smart devices (SMDs) and contributes energy saving compared with local computing, but resulting increased network load transmission latency. To investigate tradeoff between consumption latency, we present an energy-aware offloading scheme, which jointly optimizes communication resource allocation under limited sensitive In this paper, single multicell MEC scenarios are considered at same...
Due to the flying nature of unmanned aerial vehicles (UAVs), it is very attractive deploy UAVs as base stations and construct airborne networks provide service for on-ground users at temporary events (such disaster relief, military operation, so on). In constructing UAV networks, a challenging problem how multiple on-demand coverage while same time maintaining connectivity among UAVs. To solve this problem, we propose two algorithms: centralized deployment algorithm distributed motion...
Unmanned aerial vehicle (UAV) has been witnessed as a promising approach for offering extensive coverage and additional computation capability to smart mobile devices (SMDs), especially in the scenario without available infrastructures. In this paper, UAV-assisted edge computing system with stochastic tasks is investigated. The aims minimize average weighted energy consumption of SMDs UAV, subject constraints on offloading, resource allocation, flying trajectory scheduling UAV. Due...
Unmanned aerial vehicle (UAV) networks are playing an important role in various areas due to their agility and versatility, which have attracted significant attentions from both the academia industry recent years. As integration of embedded systems with communication devices, computation capabilities control modules, UAV network could build a closed loop data perceiving, information exchanging, decision making final execution, tightly integrates cyber processes into physical devices....
The emergence of mobile edge computing (MEC) and unmanned aerial vehicles (UAVs) is great significance for the prospective development Internet Things (IoT). additional computation capability extensive network coverage provide energy-limited smart devices (SMDs) with more opportunities to experience diverse intelligent applications. In this paper, a efficiency maximization problem formulated in multi-UAV assisted MEC system, where both bits energy consumption are considered. Based on partial...
The sixth generation (6G) mobile networks will reshape the world by offering instant, efficient, and intelligent hyper-connectivity, as envisioned previously proposed Ubiquitous-X 6G networks. Such hyper-massive global connectivity introduce tremendous challenges into operation management of networks, calling for revolutionary theories technological innovations. To this end, we propose a new route to boost network capabilities toward wisdom-evolutionary primitive-concise (WePCN) vision...
We propose a new analytical approach to evaluate the average packet error rate (PER) of conventional transmission system over quasi static fading channel, by presenting an integral inequality lemma. The basic idea is that, given PER for AWGN channel as function signal-to-noise ratio (SNR), Rayleigh can be generally upper bounded quite simple inequality, i.e.,1 - exp(-w <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">o</sub> /γ̅), both coded and...
Mobile edge computing (MEC) has risen as a promising paradigm to provide high quality of experience via relocating the cloud server in close proximity smart mobile devices (SMDs). In MEC networks, with computation capability and storage resource can jointly execute latency-sensitive offloading tasks cache contents requested by SMDs. order minimize total latency consumption tasks, we consider offloading, content caching, allocation an integrated model, which is formulated mixed integer...
Exploiting unmanned aerial vehicles (UAVs) as flying base stations (BSs) to assist the terrestrial cellular networks is promising in 5G and beyond. Despite inherent potentials, one challenging problem how optimally deploy multiple UAVs achieve on-demand coverage for ground user equipment (UE). In this article, we model deployment minimizing number of maximizing load balance among them, which subject two main constraints, i.e., should form a robust backbone network they keep connected with...
Due to the flexibility in 3-D space and high probability of line-of-sight (LoS) air-to-ground communications, unmanned aerial vehicles (UAVs) have been considered as means support energy-efficient data collection. However, emergency applications, mission completion time should be main concerns. In this article, we propose a UAV-aided collection design gather from number ground users (GUs). The objective is optimize UAV's trajectory, altitude, velocity, links with GUs minimize total time....
Multiaccess edge computing (MEC) is regarded as a promising solution to overcome the limit on computation capacity of mobile devices. This article investigates an energy-efficient unmanned aerial vehicle (UAV)-enabled MEC framework incorporating nonorthogonal multiple access (NOMA), where UAVs are deployed servers provide assistance terrestrial users and NOMA adopted reduce energy consumption task offloading. A utility formed mathematically evaluate weighted cost system. Due coupling...
Extremely diverse service requirements are one of the critical challenges for upcoming fifth-generation (5G) radio access technologies. As a solution, mixed numerologies transmission is proposed as new air interface by assigning different to subbands. However, coexistence multiple induces inter-numerology interference (INI), which deteriorates system performance. In this paper, theoretical model INI established windowed orthogonal frequency division multiplexing (W-OFDM) systems. The...
Machine learning-based channel estimation and equalization methods may improve the robustness bit error rate (BER) performance of communication systems. However, implementation these has been blocked by some limitations, mainly including model-based offline training high-computational complexity for deep neural network (DNN). To overcome those we propose an online fully complex extreme learning machine (C-ELM)-based scheme with a single hidden layer feedforward (SLFN) orthogonal...
With the development of wireless communication and Internet Things (IoT), there are massive devices that need to share limited spectrum resources. Dynamic access (DSA) is a promising paradigm remedy problem inefficient utilization brought upon by historical command-and-control approach allocation. In this article, we investigate distributed DSA for multiusers in typical multichannel cognitive radio network. The formulated as decentralized partially observable Markov decision process...
Semantic communication is a promising technology used to overcome the challenges of large bandwidth and power requirements caused by data explosion. representation an important issue in semantic communication. The knowledge graph, powered deep learning, can improve accuracy while removing ambiguity. Therefore, we propose system based on graph. Specifically, our system, transmitted sentences are converted into triplets using Triplets be viewed as basic symbols for extraction restoration...
Unmanned aerial vehicles as base stations (UAV-BSs) are recognized effective means for tackling eruptive communication service requirements especially when terrestrial infrastructures unavailable. Quality of (QoS) received by ground terminals (GTs) highly depends on the spatial movement UAV-BSs. In this paper, we investigate cooperative trajectory design problem multiple UAV-BSs towards fair throughput maximization GTs. Considering restriction coverage and sensing, first propose a...
This letter investigates masked beamforming schemes for multiuser multiple-input multiple-output (MIMO) downlink systems in the presence of an eavesdropper. With noisy and outdated channel state information (CSI) at base station (BS), we aim to maximize transmit power artificial noise, which is broadcast jam any potential eavesdropper, while meeting individual minimum mean square error (MMSE) constraints desired user links. To this end, adopt a Bayesian approach derive average MSE...
Massive multiple-input multiple-output (MIMO) has been extensively studied and considered as a key enabling technology for the fifth generation (5G) wireless communication systems, due to its potential achieve high energy efficiency spectral efficiency. As concept of massive MIMO becomes more popular, it is plausible that eavesdroppers will also employ antennas, which may remarkably enhance their ability intercept information. In this paper, motivated by need protect against equipped with...
In this paper, we consider a dual-hop amplify-and-forward (AF) multiple-input-multiple-output (MIMO) relay network, where the source, relay, and destination are each equipped with multiple antennas. The is untrusted if it willing to forward signal and, at same time, acts as potential eavesdropper interpret message from source. Since there exists no direct link between source destination, positive secrecy rate cannot be obtained. Addressing issue, propose joint destination-aided cooperative...
Cognitive radio (CR) has emerged as an advanced and promising technology to exploit the wireless spectrum opportunistically. In cognitive networks (CRNs), any pairwise communicating nodes are required rendezvous on a commonly available channel prior exchange information. earlier research, most popular method is selecting Common Control Channel (CCC) in CRNs establish rendezvous. However, employing CCC many problems such control saturation, vulnerability jamming attacks, inapplicability...
Machine learning (ML) has been widely used for efficient resource allocation (RA) in wireless networks. Although superb performance is achieved on small and simple networks, most existing ML-based approaches are confronted with difficulties when heterogeneity occurs network size expands. In this paper, specifically focusing power control/beamforming (PC/BF) heterogeneous device-to-device (D2D) we propose a novel unsupervised learning-based framework named interference graph neural (HIGNN) to...
In this paper, we investigate the timing and carrier frequency offset (CFO) synchronization problem in decode forward cooperative systems operating over selective channels. A training sequence which consists of one orthogonal frequency-division multiplexing (OFDM) block having a tile structure domain is proposed to perform synchronization. Timing offsets are estimated using correlation-type algorithms. By inserting some null subcarriers structure, propose computationally efficient subspace...
In this letter, we aim to achieve secure communication for a multiple-input single-output (MISO) wiretap channel in the presence of multiple non-colluding eavesdroppers. It is assumed that eavesdroppers' channels are unavailable transmitter, and artificial noise (AN) used provide masked beamforming degrading channels. First, derive secrecy rate outage probability system then optimal power allocation between data AN obtained closed form minimizing under total constraint. The effects number...