Mohammad Reza Abedi

ORCID: 0000-0003-4114-1339
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cooperative Communication and Network Coding
  • Advanced MIMO Systems Optimization
  • Advanced Wireless Communication Technologies
  • Wireless Communication Security Techniques
  • Caching and Content Delivery
  • IoT Networks and Protocols
  • Multilevel Inverters and Converters
  • Advanced Wireless Network Optimization
  • Age of Information Optimization
  • IoT and Edge/Fog Computing
  • Full-Duplex Wireless Communications
  • Advanced Battery Technologies Research
  • Energy Harvesting in Wireless Networks
  • Advanced DC-DC Converters
  • Millimeter-Wave Propagation and Modeling
  • Agricultural risk and resilience
  • Distributed Control Multi-Agent Systems
  • Wireless Communication Networks Research
  • Underwater Vehicles and Communication Systems
  • Microfinance and Financial Inclusion
  • Microgrid Control and Optimization
  • Wind Turbine Control Systems
  • UAV Applications and Optimization
  • Cognitive Functions and Memory
  • Advanced Wireless Communication Techniques

ICT Research Institute
2024

Tarbiat Modares University
2014-2024

University of Shahrood
2022

Baylor University
2012-2015

We propose a robust resource allocation framework to improve the physical layer security in presence of an active eavesdropper. In considered system, we assume that both legitimate receiver and eavesdropper are full-duplex (FD) while most works literature concentrate on passive eavesdroppers half-duplex (HD) receivers. this paper, adversary intends optimize its transmit jamming signal parameters so as minimize secrecy data rate transmission. literature, assuming operates HD mode,...

10.1109/twc.2016.2633336 article EN IEEE Transactions on Wireless Communications 2016-11-29

In delay-sensitive industrial Internet of Things (IIoT) applications, the age information (AoI) is employed to characterize freshness information. Meanwhile, emerging network function virtualization provides flexibility and agility for service providers deliver a given using sequence virtual functions (VNFs). However, suitable VNF placement scheduling in these schemes NP-hard finding globally optimal solution by traditional approaches complex. Recently, deep reinforcement learning (DRL) has...

10.1109/jsac.2021.3087264 article EN IEEE Journal on Selected Areas in Communications 2021-06-09

In this paper, we propose a secure cooperative communications scheme for orthogonal frequency-division multiple-access (OFDMA) cognitive radio networks (CRNs), where primary base station (PBS) wants to transmit information some distant users (PUs) in the presence of set passive eavesdroppers. our model, transmission is performed two consecutive time slots; first slot, PBS transmits while secondary (SUs) and eavesdroppers listen. second SUs PUs, (SBS), We consider schemes eavesdropping;...

10.1109/tvt.2016.2555946 article EN IEEE Transactions on Vehicular Technology 2016-04-21

In this paper, we propose a novel joint intelligent trajectory design and resource allocation algorithm based on users' mobility their requested services for unmanned aerial vehicles (UAVs) assisted networks, where UAVs act as nodes of network function virtualization (NFV) enabled network. Our objective is to maximize energy efficiency minimize the average delay all by allocating limited radio NFV resources. addition, due traffic conditions users, let some virtual functions (VNFs) migrate...

10.1109/tgcn.2022.3186911 article EN IEEE Transactions on Green Communications and Networking 2022-06-28

With the considerable rise in number of devices connecting to Internet, demand for an extensive capacity communication networks is already apparent. Beam Division Multiple Access (BDMA) a system method aimed at increasing by simultaneously adapting portions antenna beam locations multiple Mobile Stations (MSs) achieve enabling more efficient and effective data transmission. However, assess best performance, Base Station (BS) must calculate exact location MSs. In this research, we propose...

10.1109/tgcn.2023.3294448 article EN IEEE Transactions on Green Communications and Networking 2023-07-11

In this paper, we consider the problem of resource allocation for secure communications in decode-and-forward (DF) relay-assisted orthogonal frequency-division multiple access (OFDMA) networks. our setting, users want to securely communicate base station (BS) with help a set relay stations (RSs) presence eavesdroppers. We assume that all channel state information (CSI) legitimate links and only distribution (CDI) eavesdropper are available. formulate as an optimization whose objective is...

10.1109/twc.2015.2505728 article EN IEEE Transactions on Wireless Communications 2015-12-04

This paper presents dynamic performance improvement of the bidirectional battery chargers using predictive current control. The proposed controller is designed small signal analyses and derived transfer functions considering equivalent circuit to extend an effective operational range for wide input voltage variations via or from variations. With analytical modeling control, achieved over load range. For validation, converter showed better fast in both steady state transient than conventional...

10.1109/pesgm.2012.6345724 article EN 2012-07-01

We propose a robust resource allocation framework to provide physical layer security for multiple input single output (MISO) communication system. In the considered system, we assume that both legitimate receiver and eavesdropper are in full-duplex (FD) mode compare corresponding performance conventional cooperative jamming frameworks where half-duplex (HD) is at hand. present paper, adversary intends optimize its transmit signal parameters so as minimize MISO secrecy rate between...

10.1109/vtcfall.2015.7391133 article EN 2015-09-01

This paper studies a robust resource allocation framework to enhance physical layer security where it is assumed that the system equipped with full-duplex (FD) receiver in contrast conventional frameworks half-duplex (HD) at hand. Conventionally, relays are used as jammer reduce signal quality received by eavesdroppers so increase secrecy transmission rate between legitimate transmitter and receiver. referred cooperative jamming (CJ). In FD receiver, we propose use jammer, i.e.,...

10.1109/iccw.2015.7247229 article EN 2015-06-01

This paper presents dynamic modeling and performance of a current-mode controlled boost DC-DC converter with slope compensation. The controller is based on average small signal models. consists two control loops; inner outer loops. loop current compensation to force the input track reference current, which determined by output voltage regulator. PI that minimizes steady state error between its reference. For validation, experimental results are provided verify superiority proposed Boost...

10.1109/itec.2012.6243479 article EN 2012-06-01

In this paper, the effect of channel distribution information (CDI) imperfectness on performance wireless networks is investigated. literature, ergodic resource allocation problems are solved assuming that perfect CDI available which might not be a practical assumption. Therefore, we adopt nonparametric density estimation methods for estimating gain distribution. The first carried out through well-known kernel (KDE) method. Since KDE too sensitive to contaminated data, robust (RKDE) analysis...

10.1109/wcnc.2014.6952401 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2014-04-01

This paper presents the control and integration of a smart energy storage system (SESS) to permanent magnet synchronous generator (PMSG) wind power plant. For purpose long-term management fuel cell/electrolyzer (FC/ELZ) is utilized in SESS, whereas ultra-capacitor dedicated SESS order compensate for short-term transient fluctuations caused by speed variations or load changes. The schemes enable turbine determine that should be generated according amount available dc-link. By maintaining...

10.1109/pesgm.2015.7286428 article EN 2015-07-01

In this paper, we consider a communication scenario for heterogeneous networks (HetNets) in which the base stations transmit information over both microwave (μW) and millimeter wave (mmW) bands. To exploit spatial characteristics of channel, three-dimensional multiple input output (3D-MIMO) technology. addition, to increase spectral efficiency network, sparse code access (SCMA) is used as transmission technology A practical channel not known perfectly assumed, hence robust scheme developed....

10.1109/tvt.2020.2993904 article EN IEEE Transactions on Vehicular Technology 2020-05-20

This work presents a wind conversion system with integrated energy storage. The generated power from renewable source is processed by independent dc-dc converters and provided to dc bus in common storage acts as an auxiliary mitigate the fluctuations follow load demand changes, once employment not desired, supper capacitor bank used backup, order keep critical continuously supplied. From proper process, delivered main grid high factor. paper all theoretical analysis referring proposed...

10.1109/pesmg.2013.6673035 article EN 2013-01-01

Femtocell networks are expected to offer significant performance improvement with low cost. However, adaptive transmission based on maximising the sum rate of macro and femto requires perfect channel quality information (CQI) links. This assumption an infinite resolution feedback link, which is not always practical since it excessive amount bandwidth. study considers problem average under constraint maximum power at users. A suboptimal iterative algorithm developed for finding optimal CQI...

10.1049/iet-com.2014.0315 article EN IET Communications 2014-10-30

Sharing basic safety messages (BSMs) among connected vehicles (CVs) in a timely and reliable manner is of paramount importance vehicular networks. When CVs are through ad hoc networks, the delivery BSMs very challenging due to randomness medium access control (MAC) may lead collision, especially crowded Besides, although channel acquisition conventional methods via transmission reception signals results collision-free message delivery, it adds high overhead cost. In this paper, we propose an...

10.36227/techrxiv.170793914.44595665/v1 preprint EN cc-by 2024-02-14

In this paper, fresh Basic Safety Messages (BSM) (e.g., vehicle's position and speed) are used to control the Connected Automated Vehicles (CAVs) reduce Time Collision (TTC) error which leads decrease in Risk (CR). contrast exiting works, a novel Safety-aware Age of Information (S-AoI) metric is proposed that addition AoI, takes into account risk assessment CAVs design an efficient transmission protocol for BSMs. We also deploy user-centric Cell-free-massive-MIMO (CFmMIMO) improve...

10.1109/tnsm.2024.3382301 article EN IEEE Transactions on Network and Service Management 2024-03-28

Efficient and dynamic path planning has become an important topic for urban areas with larger density of connected vehicles (CV) which results in reduction travel time directly contributes to environmental sustainability through reducing energy consumption. CVs exploit the cellular wireless vehicle-to-everything (C-V2X) communication technology disseminate vehicle-to-infrastructure (V2I) messages Base-station (BS) improve situation awareness on roads. In this paper, we investigate radio...

10.48550/arxiv.2405.08053 preprint EN arXiv (Cornell University) 2024-05-13

This paper addresses the four enabling technologies, namely multi-user sparse code multiple access (SCMA), content caching, energy harvesting, and physical layer security for proposing an spectral efficient resource allocation algorithm backhaul links in heterogeneous cellular networks. Although each of above mentioned issues could be a topic research, real situation, we would face complicated scenario where they should considered jointly, hence, our target is to consider these technologies...

10.1109/access.2019.2948389 article EN cc-by IEEE Access 2019-01-01
Coming Soon ...