Loading...
Search for: mobile-telecommunication-systems
0.005 seconds
Total 110 records

    GSLHA: Group-based secure lightweight handover authentication protocol for M2M communication

    , Article 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2019, 28 August 2019 through 29 August 2019 ; 2019 , Pages 15-20 ; 9781728143736 (ISBN) Modiri, M. M ; Mohajeri, J ; Salmasizadeh, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, various protocols and schemes were proposed to achieve security requirements in M2M communication and reduce computational and communication costs. In this paper, we propose the group-based secure lightweight handover authentication (GSLHA) protocol for M2M communication in LTE and future 5G networks.... 

    Download elastic traffic rate optimization via NOMA protocols

    , Article IEEE Transactions on Vehicular Technology ; Volume 68, Issue 1 , 2019 , Pages 713-727 ; 00189545 (ISSN) Mokhtari, F ; Mili, M. R ; Eslami, F ; Ashtiani, F ; Makki, B ; Mirmohseni, M ; Nasiri Kenari, M ; Svensson, T ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    Non-orthogonal multiple access (NOMA) is a promising scheme for the fifth generation (5G) of mobile communication systems. In this scheme, transmission to multiple users is performed on the same subchannel using superposition coding and successive interference cancellation. In this paper, we focus on a multi-cell network with two users' data traffic models, namely elastic and streaming. We exploit the NOMA scheme in order to maximize the download elastic traffic rate at cells, without degrading the download streaming traffic rates. Since elastic traffic rates at different cells are interactive, we maximize the total elastic traffic rates assuming either perfect or partial channel state... 

    Download elastic traffic rate optimization via NOMA protocols

    , Article IEEE Transactions on Vehicular Technology ; Volume 68, Issue 1 , 2019 , Pages 713-727 ; 00189545 (ISSN) Mokhtari, F ; Robat Mili, M ; Eslami, F ; Ashtiani, F ; Makki, B ; Mirmohseni, M ; Nasiri Kenari, M ; Svensson, T ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    Non-orthogonal multiple access (NOMA) is a promising scheme for the fifth generation (5G) of mobile communication systems. In this scheme, transmission to multiple users is performed on the same subchannel using superposition coding and successive interference cancellation. In this paper, we focus on a multi-cell network with two users' data traffic models, namely elastic and streaming. We exploit the NOMA scheme in order to maximize the download elastic traffic rate at cells, without degrading the download streaming traffic rates. Since elastic traffic rates at different cells are interactive, we maximize the total elastic traffic rates assuming either perfect or partial channel state... 

    Joint optimization of power consumption and transmission delay in a cache-enabled C-RAN

    , Article IEEE Wireless Communications Letters ; Volume 9, Issue 8 , 2020 , Pages 1137-1140 Abdollahi Bafghi, A. H ; Mirmohseni, M ; Ashtiani, F ; Nasiri Kenari, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    In this letter, we consider a cache-enabled cloud radio access network with single-antenna base stations and single-antenna mobile users. Each base station can access the central processor of the network via a separate backhaul link with limited capacity. We utilize the interference alignment scheme as the transmission strategy between base stations and users. By assuming a block transmission scheme, we define a related data transmission delay. We derive the transmission delay and network power consumption. At last, we solve the problem of joint optimization of data transmission delay and network power consumption using DC programming algorithm. In our numerical results, we investigate the... 

    Energy-spectral efficient resource allocation and power control in heterogeneous networks with D2D communication

    , Article Wireless Networks ; Volume 26, Issue 1 , August , 2020 , Pages 253-267 Khazali, A ; Sobhi Givi, S ; Kalbkhani, H ; Shayesteh, M. G ; Sharif University of Technology
    Springer  2020
    Abstract
    Heterogeneous networks (HetNets) provide the demand for high data rates. In this study, we analyze the coexistence of femtocells and device-to-device (D2D) communication with macrocells. Interference management and decreasing energy consumption are two important issues in HetNets. To this end, we propose an efficient fractional frequency reuse (FFR)-based spectrum partitioning scheme to reduce the cross-tier interference. We also propose to use different optimization problems for resource allocation in different tiers. For this purpose, an energy efficient optimization problem is applied to D2D user equipment. Further, an optimization problem based on the spectral efficiency, i.e.,... 

    A comparison of various routing protocols in Mobile Ad-hoc Networks (MANETs) with the use of Fluid flow simulation method

    , Article 4th International Conference on Wireless and Mobile Communications, ICWMC 2008, Athens, 27 July 2008 through 1 August 2008 ; 2008 , Pages 260-267 ; 9780769532745 (ISBN) Salehan, A ; Robatmili, M ; Abrishami, M ; Movaghar, A ; IARIA ; Sharif University of Technology
    2008
    Abstract
    One of the most important challenges in mobile Ad-hoc networks is simulation. The simulation of these networks based on the accessible simulation techniques, which are based on packet, is a demanding and time-consuming task. Moreover, with the complexity of the network and the increase in the numbers of the nodes, it is likely to take a long time. This is because these simulators, one by one, regard the acts of all moving packets in one part of the network, and process these acts as a series of events. Since the number of the events is high in this method, the simulation takes time. Nowadays, in wired networks, several methods have been suggested to lessen the time of simulation; one example... 

    An overlay multicast protocol for multimedia applications in mobile ad-hoc networks

    , Article 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, 9 December 2008 through 12 December 2008 ; 2008 , Pages 162-167 ; 9780769534732 (ISBN) Naderan Tahan, M ; Rabiee, H. R ; Saremi, F ; Iranmanesh, Z ; Sharif University of Technology
    IEEE Computer Society  2008
    Abstract
    Overlay multicast has gained much attention in recent years as an alternative method to network layer multicast, especially for mobile ad hoc networks (MANETs). In this paper, we propose a new overlay multicast protocol to achieve simplicity of deployment, rapid adaptation of overlay structure when nodes move, and reduced delay. In our algorithm, to join or leave a multicast group, it is only sufficient for a member node to inform its first upstream member node. This updates the tree structure more rapidly when nodes move. In addition, join and leave delays are reduced and this makes the protocol suitable for multimedia multicasting in MANETs. Simulation results compared to that of ODMRP and... 

    On social-aware content caching for d2d-enabled cellular networks with matching theory

    , Article IEEE Internet of Things Journal ; Volume 6, Issue 1 , 2019 , Pages 297-310 ; 23274662 (ISSN) Li, J ; Liu, M ; Lu, J ; Shu, F ; Zhang, Y ; Bayat, S ; Jayakody, D. N. K ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, the problem of content caching in 5G cellular networks relying on social-aware device-to-device communications (DTD) is investigated. Our focus is on how to efficiently select important users (IUs) and how to allocate content files to the storage of these selected IUs to form a distributed caching system. We aim at proposing a novel approach for minimizing the downloading latency and maximizing the social welfare simultaneously. In particular, we first model the problem of maximizing the social welfare as a many-to-one matching game based on the social property of mobile users. We study this game by exploiting users' social properties to generate the utility functions of the... 

    MobiSim: A framework for simulation of mobility models in mobile ad-hoc networks

    , Article 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2007, White Plains, NY, 8 October 2007 through 10 October 2007 ; December , 2007 ; 0769528899 (ISBN); 9780769528892 (ISBN) Mousavi, S. M ; Rabiee, H. R ; Moshref, M ; Dabirmoghaddam, A ; Sharif University of Technology
    2007
    Abstract
    A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes forming a self-configuring network without using any existing infrastructure. Since MANETs are not currently deployed on a large scale, research in this area is mostly simulation based. Among other simulation parameters, the mobility model plays a very important role in determining the protocol performance in MANET. Thus, it is essential to study and analyze various mobility models and their effect on MANET protocols. In this paper we introduce a new framework for simulation of mobility models in mobile Ad-Hoc networks. This simulator can generate mobility traces in various mobility models. The mobility traces can be... 

    Taking multiple-choise quiz by SMS on mobile phones including analyzing property

    , Article Journal of Computers (Finland) ; Volume 2, Issue 2 , 2007 , Pages 53-60 ; 1796203X (ISSN) Shirali Shahreza, M ; Sharif University of Technology
    Academy Publisher  2007
    Abstract
    Recently Mobile Learning (M-Learning) has attracted much attention. Due to advantages of SMS (Short Messaging Service) on mobile phones we present a safe and protected method for taking multiple-choice quizzes by using the SMS on mobile phones in this paper. In this method questions of quiz are sent to students along with their answers through some SMS messages. The students will receive their grades immediately after answering the questions and this grade is also sent to the instructor or professor along with the student's answers through an SMS Picture Message. Answers of questions and the student's grade are hidden in SMS picture message through stenography and then they are sent. The... 

    Mobility pattern recognition in mobile ad-hoc networks

    , Article 4th International Conference on Mobile Technology, Applications and Systems, Mobility 2007, Incorporating the 1st International Symposium on Computer Human Interaction in Mobile Technology, IS-CHI 2007, Singapore, 10 September 2007 through 12 September 2007 ; 2007 , Pages 302-309 ; 9781595938190 (ISBN) Mousavi, S. M ; Rabiee, H. R ; Moshref, M ; Dabirmoghaddam, A ; Sharif University of Technology
    2007
    Abstract
    A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes forming a self-configuring network without using any existing infrastructure. Network nodes in a mobile Ad-hoc network move in some motion patterns called mobility models. The mobility models play a very important role in determining the protocol performance in MANET. Thus, it is essential to study and analyze various mobility models and their effect on MANET protocols. If we can recognize the mobility pattern of motion of mobile nodes in our environment we can customize our network protocols to deal with that existing mobility model. In this paper we introduce a new method for classification and pattern recognition of... 

    New methods of reducing the phase quantization error effects on beam pointing and parasitic side lobe level of the phased array antennas

    , Article 2006 Asia-Pacific Microwave Conference, APMC, Yokohama, 12 December 2006 through 15 December 2006 ; Volume 3 , 2006 , Pages 2114-2117 ; 4902339102 (ISBN); 9784902339109 (ISBN) Taheri, S ; Farzaneh, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2006
    Abstract
    Usually the digital phase shifters are used to steer the beam of a phased array antenna, and the accuracy of beam steering and other properties of the radiation pattern is dependent on the number of bits of the phase shifter and its resolution. In this paper the results of simulations, accomplished using a number of phase feeding methods in order to reduce the phase quantization error effects are presented and three new methods are introduced and compared with the previous works. Copyright 2006 IEICE  

    Application of Markov decision process in generating units maintenance scheduling

    , Article 2006 9th International Conference on Probabilistic Methods Applied to Power Systems, PMAPS, Stockholm, 11 June 2006 through 15 June 2006 ; 2006 ; 9171783520 (ISBN); 9789171783523 (ISBN) Rajabi Ghahnavie, A ; Fotuhi Firuzabad, M ; Sharif University of Technology
    2006
    Abstract
    An important issue in power system planning is maintenance scheduling of generating units. In a traditional power system, the problem of maintenance scheduling is of high importance and has various technical and economical constraints. Different methods have been used to solve the problem. On the other hand, changes in legal environment of electricity industry poses new bound and requirements on the maintenance scheduling problem. This paper presents a new approach on maintenance scheduling of generating units in a generating company (GENCO). The proposed approach uses Markov Decision Process (MDP) to minimize total costs of unserved energy and reserve. The impacts on maintenance scheduling... 

    Energy-efficient relay selection and power allocation for multi-source multicast network-coded D2D communications

    , Article AEU - International Journal of Electronics and Communications ; Volume 128 , 2021 ; 14348411 (ISSN) Hayati, M ; Kalbkhani, H ; Shayesteh, M. G ; Sharif University of Technology
    Elsevier GmbH  2021
    Abstract
    Device-to-device (D2D) communication improves spectrum efficiency (SE) and increases system capacity. Heterogeneous networks comprise macrocell and several small cells, such as picocells and femtocells, where femtocells are more efficient. In cooperative communications, one or several additional nodes help to send data from source to destination to improve the quality of service (QoS). Network coding (NC) in cooperative networks can extend data rate and coverage area of D2D communication. The purpose of this article is to minimize power consumption of transmitting nodes during network-coded cooperative D2D transmission to reduce the interference on co-channel transmissions. In this study, we... 

    An adaptive call admission algorithm for cellular networks

    , Article Computers and Electrical Engineering ; Volume 31, Issue 2 , 2005 , Pages 132-151 ; 00457906 (ISSN) Beigy, H ; Meybodi, M. R ; Sharif University of Technology
    2005
    Abstract
    In this paper, we first propose a new continuous action-set learning automaton and theoretically study its convergence properties and show that it converges to the optimal action. Then we give an adaptive and autonomous call admission algorithm for cellular mobile networks, which uses the proposed learning automaton to minimize the blocking probability of the new calls subject to the constraint on the dropping probability of the handoff calls. The simulation results show that the performance of the proposed algorithm is close to the performance of the limited fractional guard channel algorithm for which we need to know all the traffic parameters in advance. © 2005 Elsevier Ltd. All rights... 

    Diversity gain analysis of a novel dual-frequency multiple access relay transmission scheme

    , Article 4th IEEE International Symposium on Wireless Communication Systems 2007, ISWCS'07, Trondheim, 16 October 2007 through 19 October 2007 ; 2007 , Pages 460-464 ; 1424409799 (ISBN); 9781424409792 (ISBN) Khalaj, B. H ; Del Ser, J ; Crespo, P. M ; Gutierrez Gutierrez, J ; Sharif University of Technology
    2007
    Abstract
    In this paper, we will present diversity gain analysis of a novel channel assignment scheme at the relay for the case in which two non-cooperative independent users communicate with their destination through a single relay and by using only two frequency channels. The analysis of two main relay techniques, namely the Amplify-and-Forward (AF) and Decode-and-Forward (DF) will be provided. As the results show, the DF approach provide a higher diversity gain especially in scenarios in which the relay is closer to the receiver. © 2007 IEEE  

    Dynamic joint functional split and resource allocation optimization in elastic optical fronthaul

    , Article IEEE Transactions on Network and Service Management ; 2022 ; 19324537 (ISSN) Vajd, F. S ; Hadi, M ; Bhar, C ; Pakravan, M. R ; Agrell, E ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    Dynamic reconfigurability in optical and mobile networks can facilitate heterogeneous service provisioning while utilizing minimal resources. This allows cost-efficient service delivery resulting in high revenues for network operators. Deployment of elastic mobile and optical networks is a key driver for enabling reconfigurability in modern networks. Elastic optical networks can be exploited as the fronthaul portion of new generation of mobile networks. Such elastic optical fronthaul networks facilitate joint reconfiguration of flexible radio and optical elements and provide considerable performance improvements. In this paper, we focus on the joint dynamic selection of functional splits and... 

    Design and Implementation of Time and Frequency Synchronization in LTE

    , Article IEEE Transactions on Very Large Scale Integration (VLSI) Systems ; Volume 23, Issue 12 , January , 2015 , Pages 2970-2982 ; 10638210 (ISSN) Golnari, A ; Shabany, M ; Nezamalhosseini, A ; Gulak, G ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    A novel architecture for efficient time and frequency synchronization, applied to the long-term evolution (LTE) standard, is proposed. For symbol timing, we propose applying a symbol-folding method on top of the sign-bit reduction technique, leading to a novel algorithm for the cyclic prefix-type recognition in LTE. Following the symbol timing, the fractional carrier frequency offset is estimated and compensated using an adaptive gain loop, which allows for a high-accuracy compensation in a short interval. In the frequency domain, for cell search, we propose a sign-bit reduction technique on top of the matched filter method for the primary synchronization signal detection. In addition, we... 

    Analytical studies of fragmented-spectrum multi-level OFDM-CDMA technique in cognitive radio networks

    , Article 7th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, UEMCON 2016, 20 October 2016 through 22 October 2016 ; 2016 ; 9781509014965 (ISBN) Akhoundi, F ; Sharifi Malvajerdi, S ; Poursaeed, O ; Salehi, J. A
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    In this paper, we present a multi-user resource allocation framework using fragmented-spectrum synchronous OFDM-CDMA modulation over a frequency-selective fading channel. In particular, given pre-existing communications in the spectrum where the system is operating, a channel sensing and estimation method is used to obtain information of subcarrier availability. Given this information, some real-valued multi-level orthogonal codes, which are orthogonal codes with values of {±1, ±2, ±3, ±4,...}, are provided for emerging new users, i.e., cognitive radio users. Additionally, we have obtained a closed form expression for bit error rate of cognitive radio receivers in terms of detection... 

    Capacity bounds and detection schemes for data over voice

    , Article IEEE Transactions on Vehicular Technology ; Volume 65, Issue 11 , 2016 , Pages 8964-8977 ; 00189545 (ISSN) Kazemi, R ; Boloursaz, M ; Etemadi, S. M ; Behnia, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    Cellular networks provide widespread and reliable voice communications among subscribers through mobile voice channels. These channels benefit from superior priority and higher availability compared with conventional cellular data communication services, such as General Packet Radio Service, Enhanced Data Rates for GSM Evolution, and High-Speed Downlink Packet Access. These properties are of major interest to applications that require transmitting small volumes of data urgently and reliably, such as an emergency call in vehicular applications. This encourages excessive research to make digital communication through voice channels feasible, leading to the emergence of Data over Voice (DoV)...