Loading...
Search for: mobile-telecommunication-systems
0.011 seconds
Total 110 records

    Efficient codebook design for digital communication through compressed voice channels

    , Article IET Communications ; Volume 10, Issue 18 , 2016 , Pages 2613-2620 ; 17518628 (ISSN) Boloursaz Mashhadi, M ; Behnia, F ; Sharif University of Technology
    Institution of Engineering and Technology  2016
    Abstract
    The common voice channels existing in cellular communication networks provide reliable, ubiquitously available and top priority communication mediums. These properties make voice dedicated channels an ideal choice for high priority, real time communication. However, such channels include voice codecs that hamper the data flow by compressing the waveforms prior to transmission. This study designs codebooks of speech-like symbols for reliable data transfer through the voice channel of cellular networks. An efficient algorithm is proposed to select proper codebook symbols from a database of natural speech to optimise a desired objective. Two variants of this codebook optimisation algorithm are... 

    Analytical studies of fragmented-spectrum multi-level OFDM-CDMA technique in cognitive radio networks

    , Article 7th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, UEMCON 2016, 20 October 2016 through 22 October 2016 ; 2016 ; 9781509014965 (ISBN) Akhoundi, F ; Sharifi Malvajerdi, S ; Poursaeed, O ; Salehi, J. A
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    In this paper, we present a multi-user resource allocation framework using fragmented-spectrum synchronous OFDM-CDMA modulation over a frequency-selective fading channel. In particular, given pre-existing communications in the spectrum where the system is operating, a channel sensing and estimation method is used to obtain information of subcarrier availability. Given this information, some real-valued multi-level orthogonal codes, which are orthogonal codes with values of {±1, ±2, ±3, ±4,...}, are provided for emerging new users, i.e., cognitive radio users. Additionally, we have obtained a closed form expression for bit error rate of cognitive radio receivers in terms of detection... 

    Role of cooling rate in selective synthesis of graphene and carbon nanotube on Fe foil using hot filament chemical vapor deposition

    , Article 2016 IEEE 7th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, UEMCON 2016, 20 October 2016 through 22 October 2016 ; 2016 ; 9781509014965 (ISBN) Abdolahi, M ; Kaminska, B ; Akhavan, O ; Talebi, S ; Ghoranneviss, M ; Arab, Z ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    In this study, graphene sheets and carbon nanotubes (CNTs) were selectively grown on Fe foil at a relatively low growth temperature and varying cooling rates using a hot filament chemical vapor deposition (HFCVD) apparatus with C2H2 as the precursor. The results of the scanning electron microscopy and Raman spectroscopy revealed that the increase of the cooling rate from 7 to 10 or 20 °C/min provoked a structure transition from CNT to graphene. The optimum crystal quality of the graphene sheets (Iq/Id ∼1.1) was achieved at the cooling rate of 20 °C/min. According to the AFM analysis, the thickness of the stacked graphene sheets was found to be ∼2.9-3.8 nm containing ∼8-11 monolayers. The XRD... 

    Data hiding robust to mobile communication vocoders

    , Article IEEE Transactions on Multimedia ; Volume 18, Issue 12 , 2016 , Pages 2345-2357 ; 15209210 (ISSN) Kazemi, R ; Perez Gonzalez, F ; Akhaee, M. A ; Behnia, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    The swift growth of cellular mobile networks in recent years has made voice channels almost accessible everywhere. Besides, data hiding has recently attracted significant attention due to its ability to imperceptibly embed side information that can be used for signal enhancement, security improvement, and two-way authentication purposes. In this regard, we aim at proposing efficient schemes for hiding data in the widespread voice channel of cellular networks. To this aim, our first contribution is to model the channel accurately by considering a linear filter plus a nonlinear scaling function. This model is validated through experiments with true speech signals. Then we leverage on this... 

    Joint user pairing, subchannel, and power allocation in full-duplex multi-user OFDMA networks

    , Article IEEE Transactions on Wireless Communications ; Volume 15, Issue 12 , 2016 , Pages 8260-8272 ; 15361276 (ISSN) Di, B ; Bayat, S ; Song, L ; Li, Y ; Han, Z ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    In this paper, the resource allocation and scheduling problem for a full-duplex (FD) orthogonal frequency-division multiple-access network is studied where an FD base station simultaneously communicates with multiple pairs of uplink (UL) and downlink (DL) half-duplex (HD) users bidirectionally. In this paper, we aim to maximize the network sum-rate through joint UL and DL user pairing, OFDM subchannel assignment, and power allocation. We formulate the problem as a non-convex optimization problem. The optimal algorithm requires an exhaustive search, which will become prohibitively complicated as the numbers of users and subchannels increase. To tackle this complex problem more efficiently, we... 

    Fine-grained access control for hybrid mobile applications in Android using restricted paths

    , Article 13th International ISC Conference on Information Security and Cryptology, 7 September 2016 through 8 September 2016 ; 2016 , Pages 85-90 ; 9781509039494 (ISBN) Pooryousef, S ; Amini, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    Hybrid Mobile Applications are a new generation of mobile applications that have recently introduced new security challenges. In these applications, untrusted web content, such as an advertisement inside an embedded browser, has the same privileges as the entire application and can directly access the device resources. Unfortunately, existing access control mechanisms are very coarse-grained and do not provide adequate facilities for fine-grained access rule definition and enforcement in hybrid mobile applications. In this paper, we propose a fine-grained access control mechanism for privilege separation in hybrid mobile applications. Our proposed access control mechanism, called... 

    Coverage improvement in femtocell networks via efficient utility pricing

    , Article IET Communications ; Volume 10, Issue 16 , 2016 , Pages 2215-2221 ; 17518628 (ISSN) Shafiei kordshouli, M ; Zeinalpour Yazdi, Z ; Ramezanian, R ; Sharif University of Technology
    Institution of Engineering and Technology 
    Abstract
    Employing femtocell technology noticeably improves both the indoor coverage and the overall cellular network's capacity. In the downlink scenario, when macrocell users (MUs) are far from the macro base station (MBS) and close to the femto access points (FAPs), the transmitted signals of FAPs to their users cause severe interference on MUs. One solution to overcome this issue is serving MUs by neighbouring FAPs. Generally femtocells are selfish and have no desire to allocate their resources to MUs. In this study, a framework to motivate femtocells to share their free resources with MUs is proposed. In this framework, the femtocells are assumed to belong to a specific unit. The unit encourages... 

    Capacity bounds and detection schemes for data over voice

    , Article IEEE Transactions on Vehicular Technology ; Volume 65, Issue 11 , 2016 , Pages 8964-8977 ; 00189545 (ISSN) Kazemi, R ; Boloursaz, M ; Etemadi, S. M ; Behnia, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    Cellular networks provide widespread and reliable voice communications among subscribers through mobile voice channels. These channels benefit from superior priority and higher availability compared with conventional cellular data communication services, such as General Packet Radio Service, Enhanced Data Rates for GSM Evolution, and High-Speed Downlink Packet Access. These properties are of major interest to applications that require transmitting small volumes of data urgently and reliably, such as an emergency call in vehicular applications. This encourages excessive research to make digital communication through voice channels feasible, leading to the emergence of Data over Voice (DoV)... 

    Travel mode detection exploiting cellular network data

    , Article MATEC Web of Conferences, 6 July 2016 through 10 July 2016 ; Volume 81 , 2016 ; 2261236X (ISSN) Kalatian, A ; Shafahi, Y ; Sharif University of Technology
    EDP Sciences  2016
    Abstract
    There has been growing interest in exploiting cellular network data for transportation planning purposes in recent years. In this paper, we utilize these data for determining mode of travel in the city of Shiraz, Iran. Cellular data records -including location updates in 5minute time intervals- of 300,000 users from the city of Shiraz has been collected for 40 hours in three consecutive days in a cooperation with the major telecommunications service provider of the country. Depending on the density of mobile BTS's in different zones of the city, the user location can be located within an average of 200 meters. Considering data filtering and smoothing, data preparation and converting them to... 

    Radio resource allocation for downlink non-orthogonal multiple access (NOMA) networks using matching theory

    , Article 58th IEEE Global Communications Conference, GLOBECOM 2015, 6 December 2015 through 10 December 2015 ; 2015 ; 9781479959525 (ISBN) Di, B ; Bayat, S ; Song, L ; Li, Y ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    In this paper, we study the resource allocation and scheduling problem for a downlink non- orthogonal multiple access (NOMA) network where the base station (BS) allocates the spectrum resources and power to the set of users. We aim to optimize the sub-channel assignment and power allocation to achieve a balance between the number of scheduled users and total sum-rate maximization. To solve the above problem, we propose a many-to-many two-sided user-subchannel matching algorithm in which the set of users and sub-channels are considered as two sets of players pursuing their own interests. The algorithm converges to a pair-wise stable matching after a limited number of iterations. Simulation... 

    Femtocell base station clustering and logistic smooth transition autoregressive-based predicted signal-to-interference-plus-noise ratio for performance improvement of two-tier macro/femtocell networks

    , Article IET Signal Processing ; Volume 10, Issue 1 , 2016 , Pages 1-11 ; 17519675 (ISSN) Lotfollahzadeh, T ; Kabiri, S ; Kalbkhani, H ; Shayesteh, M. G ; Sharif University of Technology
    Institution of Engineering and Technology 
    Abstract
    The aim of this study is to improve the performance of two-tier macro/femtocell networks using a power control approach. In wireless networks, power control plays an important role in improving a number of performance parameters such as co-channel interference and outage probability reduction, throughput increasing, and power saving. This study explores the evolution of centralised power control algorithm based on femtocell base station (FBS) clustering and predicted signal-to-interference-plus-noise ratio (SINR) of users. To reduce the computational complexity of centralised algorithm, dense deployed femtocells are considered in different clusters. In this case, femtocells inside one... 

    Quality of service in the network layer of vehicular Ad hoc networks

    , Article 2016 World Congress on Engineering and Computer Science, WCECS 2016, 19 October 2016 through 21 October 2016 ; Volume 2225 , 2016 , Pages 114-118 ; 20780958 (ISSN); 9789881404718 (ISBN) Tabar, S ; Najjar, L ; Gholamalitabar, M ; Sharif University of Technology
    Newswood Limited  2016
    Abstract
    Vehicular Ad-hoc Networks (VANET) has attracted a great deal of attention during the last decade. This type of wireless network is predicted to play a key role in future automotive innovation. VANET as a foundation for Intelligent Transportation System (ITS) promises many improvements in terms of safety, resource efficiency and passenger assistance services. Among these three main categories, safety applications are the most important ones because they deal with the lives of large numbers of people who drive every day. Safety applications are classified as real-time applications; they must act within a certain period of time, otherwise their implementation will be worthless. As a result,... 

    Joint optimization for optimal power allocation in OFDMA femtocell networks

    , Article IEEE Communications Letters ; Volume 20, Issue 1 , 2016 , Pages 133-136 ; 10897798 (ISSN) Mili, M. R ; Hamdi, K. A ; Marvasti, F ; Bennis, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    This letter is concerned with the optimal power allocation in femtocell networks using a new technique based on multiobjective optimization. In this letter, we consider a cochannel framework for the coexistence of orthogonal frequency division multiple access (OFDMA)-based macrocell and femtocell networks. We jointly maximize the total rate of OFDMA femtocell network and minimize the total transmit power of femtocell base stations while satisfying a target constraint on transmit power when either the cross femtocell interference is included or excluded. Additionally, the results show that the proposed method for power transmission contributes toward improving the energy efficiency of... 

    Toward 5G: FiWi Enhanced LTE-A HetNets with Reliable Low-Latency Fiber Backhaul Sharing and WiFi Offloading

    , Article IEEE/ACM Transactions on Networking ; Volume PP, Issue 99 , 2016 ; 10636692 (ISSN) Beyranvand, H ; Levesque, M ; Maier, M ; Salehi, J. A ; Verikoukis, C ; Tipper, D ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    To cope with the unprecedented growth of mobile data traffic, we investigate the performance gains obtained from unifying coverage-centric 4G mobile networks and capacity-centric fiber-wireless (FiWi) broadband access networks based on data-centric Ethernet technologies with resulting fiber backhaul sharing and WiFi offloading capabilities. Despite recent progress on backhaul-aware 4G studies with capacity-limited backhaul links, the performance-limiting impact of backhaul latency and reliability has not been examined in sufficient detail previously. In this paper, we evaluate the maximum aggregate throughput, offloading efficiency, and in particular, the delay performance of FiWi enhanced... 

    Technique for order of preference by similarity to ideal solution based predictive handoff for heterogeneous networks

    , Article IET Communications ; Volume 10, Issue 13 , 2016 , Pages 1682-1690 ; 17518628 (ISSN) Kabiri, S ; Kalbkhani, H ; Lotfollahzadeh, T ; Shayesteh, M. G ; Solouk, V ; Sharif University of Technology
    Institution of Engineering and Technology 
    Abstract
    This study presents an efficient handoff algorithm for heterogeneous networks comprising macrocells, microcells, picocells, and femtocells. The proposed algorithm is based on call admission control (CAC) for selecting target base station (BS) from a list of neighbouring candidate BSs, as well as using the technique for order of preference by similarity to ideal solution (TOPSIS) as decision method. The introduced algorithm takes into account multiple criteria including measured received signal strength (RSS) and signal-to-interference-plus noise ratio (SINR), predicted RSS and SINR, and number of free resource blocks of neighbouring BSs. With the use of TOPSIS, neighbouring BSs are ordered... 

    A learning automata and clustering-based routing protocol for named data networking

    , Article Telecommunication Systems ; 2016 , Pages 1-21 ; 10184864 (ISSN) Shariat, Z ; Movaghar, A ; Hoseinzadeh, M ; Sharif University of Technology
    Springer New York LLC 
    Abstract
    Named Data Networking (NDN) is a new information-centric networking architecture in which data or content is identified by a unique name and saved pieces of the content are used in the cache of routers. Certainly, routing is one of the major challenges in these networks. In NDN, to achieve the required data for users, interest messages containing the names of data are sent. Because the source and destination addresses are not included in this package, routers forward them using the names that carried in packages. This forward will continue until the interest package is served. In this paper, we propose a routing algorithm for NDN. The purpose of this protocol is to choose a path with the... 

    Collaboration alignment in distributed interference management in uplink cellular systems

    , Article 2016 IEEE International Symposium on Information Theory, 10 July 2016 through 15 July 2016 ; Volume 2016-August , 2016 , Pages 1456-1460 ; 21578095 (ISSN) ; 9781509018062 (ISBN) Kananian, B ; Maddah Ali, M. A ; Shariatpanahi, S. P ; Khalaj, B. H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    We consider a cellular wireless system including several interfering multi-user multi-antenna uplink channels, where the base station of each cell has to locally recover the messages of its corresponding users. We use a linear Wyner model, where each base station experiences interference only from the users in the two neighboring cells. Each base station is connected to the two nearby base stations through a backhaul link. The objective is to achieve the maximum degrees of freedom per cell, with minimum aggregated load in the backhaul. We propose a successive cooperative alignment scheme, in which each base station forms backhaul messages by combining the previous received backhaul messages... 

    Delay and stability analysis of caching in heterogeneous cellular networks

    , Article 2016 23rd International Conference on Telecommunications, ICT 2016, 16 May 2016 through 18 May 2016 ; 2016 ; 9781509019908 (ISBN) Rezaei, F ; Khalaj, B. H ; Xiao, M ; Skoglund, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    In this paper, we propose a general delay and stability performance analysis in Heterogeneous Cellular Caching Networks (HCCNs), based on queuing theory. We introduce new performance metrics in HCCNs and propose an optimization problem which minimizes the average experienced delay for users by ensuring the stability of the network. In addition, from the design perspective, we address the problem of finding the minimum cache size for the small cell base stations (SBSs) for having a tolerable average delay and also a stable network. Finally, the analytic expressions derived in this paper are validated through real trace-driven experiments on traffic of YouTube video requests  

    A novel approach for avoiding wormhole attacks in VANET

    , Article 1st South Central Asian Himalayas Regional IEEE/IFIP International Conference on Internet, AH-ICI 2009, 3 November 2009 through 5 November 2009, Kathmundu ; 2009 ; 9781424445707 (ISBN) Safi, S. M ; Movaghar, A ; Mohammadizadeh, M ; Sharif University of Technology
    Abstract
    Different attacks on routing protocols in ad hoc networks occur that one of the most dangerous types is called wormhole attack. This attack happens with the assistance of at least two or more malicious nodes. In this attack nodes create a private tunnel which if a packet comes to one of them, it will be guided to other pair of these malicious nodes by this tunnel and that node broadcasts it into network. This action provides a short connection in the network that is controlled by these malicious nodes. Hence they control all Packets that come to them and threaten the security of data within packets or delete them. Totally, what a wormhole does is an incorrect understanding of network... 

    A methodology for mobile network security risk management

    , Article ITNG 2009 - 6th International Conference on Information Technology: New Generations, 27 April 2009 through 29 April 2009, Las Vegas, NV ; 2009 , Pages 1572-1573 Seify, M ; Bijani, S ; Sharif University of Technology
    Abstract
    Based on the risk analysis done in the GSM network of Iran a methodology for cellular mobile network risk management is established. Primarily we focus on the importance of risk management in the GSM Network and then introduce very briefly the suggested method for managing risk in Iranian GSM security. GSM Security risk evaluation is a method for increasing the efficiency of security policy in the manner that security threats and vulnerabilities against the mobile network is identified and prioritized. © 2009 IEEE