- Cooperative Communication and Network Coding
- Advanced MIMO Systems Optimization
- Advanced Wireless Communication Technologies
- Wireless Communication Security Techniques
- Caching and Content Delivery
- IoT Networks and Protocols
- Multilevel Inverters and Converters
- Advanced Wireless Network Optimization
- Age of Information Optimization
- IoT and Edge/Fog Computing
- Full-Duplex Wireless Communications
- Advanced Battery Technologies Research
- Energy Harvesting in Wireless Networks
- Advanced DC-DC Converters
- Millimeter-Wave Propagation and Modeling
- Agricultural risk and resilience
- Distributed Control Multi-Agent Systems
- Wireless Communication Networks Research
- Underwater Vehicles and Communication Systems
- Microfinance and Financial Inclusion
- Microgrid Control and Optimization
- Wind Turbine Control Systems
- UAV Applications and Optimization
- Cognitive Functions and Memory
- Advanced Wireless Communication Techniques
ICT Research Institute
2024
Tarbiat Modares University
2014-2024
University of Shahrood
2022
Baylor University
2012-2015
We propose a robust resource allocation framework to improve the physical layer security in presence of an active eavesdropper. In considered system, we assume that both legitimate receiver and eavesdropper are full-duplex (FD) while most works literature concentrate on passive eavesdroppers half-duplex (HD) receivers. this paper, adversary intends optimize its transmit jamming signal parameters so as minimize secrecy data rate transmission. literature, assuming operates HD mode,...
In delay-sensitive industrial Internet of Things (IIoT) applications, the age information (AoI) is employed to characterize freshness information. Meanwhile, emerging network function virtualization provides flexibility and agility for service providers deliver a given using sequence virtual functions (VNFs). However, suitable VNF placement scheduling in these schemes NP-hard finding globally optimal solution by traditional approaches complex. Recently, deep reinforcement learning (DRL) has...
In this paper, we propose a secure cooperative communications scheme for orthogonal frequency-division multiple-access (OFDMA) cognitive radio networks (CRNs), where primary base station (PBS) wants to transmit information some distant users (PUs) in the presence of set passive eavesdroppers. our model, transmission is performed two consecutive time slots; first slot, PBS transmits while secondary (SUs) and eavesdroppers listen. second SUs PUs, (SBS), We consider schemes eavesdropping;...
In this paper, we propose a novel joint intelligent trajectory design and resource allocation algorithm based on users' mobility their requested services for unmanned aerial vehicles (UAVs) assisted networks, where UAVs act as nodes of network function virtualization (NFV) enabled network. Our objective is to maximize energy efficiency minimize the average delay all by allocating limited radio NFV resources. addition, due traffic conditions users, let some virtual functions (VNFs) migrate...
With the considerable rise in number of devices connecting to Internet, demand for an extensive capacity communication networks is already apparent. Beam Division Multiple Access (BDMA) a system method aimed at increasing by simultaneously adapting portions antenna beam locations multiple Mobile Stations (MSs) achieve enabling more efficient and effective data transmission. However, assess best performance, Base Station (BS) must calculate exact location MSs. In this research, we propose...
In this paper, we consider the problem of resource allocation for secure communications in decode-and-forward (DF) relay-assisted orthogonal frequency-division multiple access (OFDMA) networks. our setting, users want to securely communicate base station (BS) with help a set relay stations (RSs) presence eavesdroppers. We assume that all channel state information (CSI) legitimate links and only distribution (CDI) eavesdropper are available. formulate as an optimization whose objective is...
This paper presents dynamic performance improvement of the bidirectional battery chargers using predictive current control. The proposed controller is designed small signal analyses and derived transfer functions considering equivalent circuit to extend an effective operational range for wide input voltage variations via or from variations. With analytical modeling control, achieved over load range. For validation, converter showed better fast in both steady state transient than conventional...
We propose a robust resource allocation framework to provide physical layer security for multiple input single output (MISO) communication system. In the considered system, we assume that both legitimate receiver and eavesdropper are in full-duplex (FD) mode compare corresponding performance conventional cooperative jamming frameworks where half-duplex (HD) is at hand. present paper, adversary intends optimize its transmit signal parameters so as minimize MISO secrecy rate between...
This paper studies a robust resource allocation framework to enhance physical layer security where it is assumed that the system equipped with full-duplex (FD) receiver in contrast conventional frameworks half-duplex (HD) at hand. Conventionally, relays are used as jammer reduce signal quality received by eavesdroppers so increase secrecy transmission rate between legitimate transmitter and receiver. referred cooperative jamming (CJ). In FD receiver, we propose use jammer, i.e.,...
This paper presents dynamic modeling and performance of a current-mode controlled boost DC-DC converter with slope compensation. The controller is based on average small signal models. consists two control loops; inner outer loops. loop current compensation to force the input track reference current, which determined by output voltage regulator. PI that minimizes steady state error between its reference. For validation, experimental results are provided verify superiority proposed Boost...
In this paper, the effect of channel distribution information (CDI) imperfectness on performance wireless networks is investigated. literature, ergodic resource allocation problems are solved assuming that perfect CDI available which might not be a practical assumption. Therefore, we adopt nonparametric density estimation methods for estimating gain distribution. The first carried out through well-known kernel (KDE) method. Since KDE too sensitive to contaminated data, robust (RKDE) analysis...
This paper presents the control and integration of a smart energy storage system (SESS) to permanent magnet synchronous generator (PMSG) wind power plant. For purpose long-term management fuel cell/electrolyzer (FC/ELZ) is utilized in SESS, whereas ultra-capacitor dedicated SESS order compensate for short-term transient fluctuations caused by speed variations or load changes. The schemes enable turbine determine that should be generated according amount available dc-link. By maintaining...
In this paper, we consider a communication scenario for heterogeneous networks (HetNets) in which the base stations transmit information over both microwave (μW) and millimeter wave (mmW) bands. To exploit spatial characteristics of channel, three-dimensional multiple input output (3D-MIMO) technology. addition, to increase spectral efficiency network, sparse code access (SCMA) is used as transmission technology A practical channel not known perfectly assumed, hence robust scheme developed....
This work presents a wind conversion system with integrated energy storage. The generated power from renewable source is processed by independent dc-dc converters and provided to dc bus in common storage acts as an auxiliary mitigate the fluctuations follow load demand changes, once employment not desired, supper capacitor bank used backup, order keep critical continuously supplied. From proper process, delivered main grid high factor. paper all theoretical analysis referring proposed...
Femtocell networks are expected to offer significant performance improvement with low cost. However, adaptive transmission based on maximising the sum rate of macro and femto requires perfect channel quality information (CQI) links. This assumption an infinite resolution feedback link, which is not always practical since it excessive amount bandwidth. study considers problem average under constraint maximum power at users. A suboptimal iterative algorithm developed for finding optimal CQI...
Sharing basic safety messages (BSMs) among connected vehicles (CVs) in a timely and reliable manner is of paramount importance vehicular networks. When CVs are through ad hoc networks, the delivery BSMs very challenging due to randomness medium access control (MAC) may lead collision, especially crowded Besides, although channel acquisition conventional methods via transmission reception signals results collision-free message delivery, it adds high overhead cost. In this paper, we propose an...
In this paper, fresh Basic Safety Messages (BSM) (e.g., vehicle's position and speed) are used to control the Connected Automated Vehicles (CAVs) reduce Time Collision (TTC) error which leads decrease in Risk (CR). contrast exiting works, a novel Safety-aware Age of Information (S-AoI) metric is proposed that addition AoI, takes into account risk assessment CAVs design an efficient transmission protocol for BSMs. We also deploy user-centric Cell-free-massive-MIMO (CFmMIMO) improve...
Efficient and dynamic path planning has become an important topic for urban areas with larger density of connected vehicles (CV) which results in reduction travel time directly contributes to environmental sustainability through reducing energy consumption. CVs exploit the cellular wireless vehicle-to-everything (C-V2X) communication technology disseminate vehicle-to-infrastructure (V2I) messages Base-station (BS) improve situation awareness on roads. In this paper, we investigate radio...
This paper addresses the four enabling technologies, namely multi-user sparse code multiple access (SCMA), content caching, energy harvesting, and physical layer security for proposing an spectral efficient resource allocation algorithm backhaul links in heterogeneous cellular networks. Although each of above mentioned issues could be a topic research, real situation, we would face complicated scenario where they should considered jointly, hence, our target is to consider these technologies...