Essaid Sabir - Academia.edu (original) (raw)
Papers by Essaid Sabir
IEEE Access
The initial access in Millimeter wave (mmWave) 5G communications is very challenging and time con... more The initial access in Millimeter wave (mmWave) 5G communications is very challenging and time consuming. In general, mmWave and terahertz communications require the use of directional antennas to seek narrow beams. However, due to this directionality, many issues can impact the beam alignment between transmitter and receiver. In this paper, we present a comprehensive survey of beam alignment and initial access in mmWave and terahertz 5G/6G systems. First, we present a detailed overview of initial access methods, techniques, and beam management procedures. Then, we classify recent works related to beam alignment based on their objective functions (i.e., latency, power allocation, QoS, energy consumption, cost). We also highlight the beam alignment in terahertz 6G, where we find that deep learning and reconfigurable intelligent surface are the two protagonists that help to achieve fast beam alignment. INDEX TERMS 5G/6G, mmWave, terahertz, beamforming, initial access, beam alignment, beam steering, reconfigurable intelligent surface.
2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)
Using millimeter wave (mmWave) bands in 5G self-organizing networks has a significant potential t... more Using millimeter wave (mmWave) bands in 5G self-organizing networks has a significant potential to provide high bandwidth. However, the major challenge lies in initial access beamforming where mmWave communications suffer from deafness problem that may cause a significant loss in the received power especially when narrow beams are adopted. This paper tackles the problem of beam alignment in mmWave 5G. The problem is formulated as a non-cooperative game between transmitter and receiver where each player tries to align its beamforming direction in a way to obtain maximum throughput. We first provide a full characterization of pure Nash equilibria. Then, we propose a gradient descent algorithm that allows users to learn their optimal beamwidth. Simulation results prove the performance of our beam alignment model since mmWave frequencies deliver narrow beams with high gain and significant capacity.
Annals of Telecommunications
IEEE Transactions on Network and Service Management
With the growing demand for openness, scalability, and granularity, mobile network function virtu... more With the growing demand for openness, scalability, and granularity, mobile network function virtualization (NFV) has emerged as a key enabler for the most of mobile network operators. NFV decouples network functions from hardware devices. This decoupling allows network services, called Virtualized Network Functions (VNFs), to be hosted on commodity hardware which simplifies and enhances service deployment and management for providers, improves flexibility, and leads to efficient and scalable resource usage, and lower costs. The proper placement of VNFs in the hosting infrastructures is one of the main technical challenges. This placement significantly influences the network's performance, reliability, and operating costs. The VNF placement is NP-Hard. Therefore, there is a need for placement methods that can cope with the complexity of the problem and find appropriate solutions in a reasonable duration. The primary purpose of this study is to provide a taxonomy of optimization techniques used to tackle the VNF placement problems. We classify the studied papers based on performance metrics, methods, algorithms, and environment. Virtualization is not limited to simply replacing physical machines with virtual machines or VNFs, but may also include microservices, containers, and cloud-native systems. In this context, the second part of our article focuses on the placement of Containers Network Functions (CNFs) in edge/fog computing. Many issues have been considered as traffic congestion, resource utilization, energy consumption, performance degradation, etc. For each matter, various solutions are proposed through different surveys and research papers in which each one addresses the placement problem in a specific manner by suggesting single objective or multi-objective methods based on different types of algorithms such as heuristic, meta-heuristic, and machine learning algorithms.
2019 IEEE Wireless Communications and Networking Conference (WCNC)
Streaming service is continuously growing, which makes it the killer application of current 4G ne... more Streaming service is continuously growing, which makes it the killer application of current 4G networks, as it demands more resources from mobile networks. The cellular network receives a large number of requests, most times for the same content, consuming the spectrum, energy, in addition to monetary costs inefficiently. In order to optimize spectrum utilization and reduce the induced costs, we propose a noncooperative game framework allowing to understand the user's behaviors. We observed a volunteer Dilemma-like situation when a mobile user could stream the requested video to its neighbors over a D2D link. Afterward, we provide a full description of both pure and mixed Nash equilibria (NE). Furthermore, to ensure convergence to NE points, we use linear reward-inaction and Gibbs Boltzmann learning algorithms. Finally, we show how our scheme could be exploited through extensive numerical simulation. Our framework capture the user's selfish behavior and provides a solution regarding setting and parameters allowing to reach high performance in terms of spectrum utilization, energy efficiency, and overall cost.
2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2020
Cyber incidents are occurring every day using various attack strategies. Deploying security solut... more Cyber incidents are occurring every day using various attack strategies. Deploying security solutions with strong configurations will reduce the attack surface and improve the forensic readiness, but will increase the security overhead and cost. In contrast, using moderate or low security configurations will reduce that overhead, but will inevitably decrease the investigation readiness. To avoid the use of cost-prohibitive approaches in developing forensic-ready systems, we present in this paper a game theoretic approach for deploying an investigation-ready infrastructure. The proposed game is a non-cooperative two-player game between an adaptive cyber defender that uses a cognitive security solution to increase the investigation readiness and reduce the attackers’ untraceability, and a cyber attacker that wants to execute non-provable attacks with a low cost. The cognitive security solution takes its strategic decision, mainly based on its ability to make forensic experts able to differentiate between provable identifiable, provable non-identifiable, and non-provable attack scenarios, starting from the expected evidences to be generated. We study the behavior of the two strategic players, looking for a mixed Nash equilibrium during competition and computing the probabilities of attacking and defending. A simulation is conducted to prove the efficiency of the proposed model in terms of the mean percentage of gained security cost, the number of stepping stones that an attacker creates and the rate of defender false decisions compared to two different approaches.
2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), 2020
Power control is originally used in wireless networks, to compute optimal transmit power and deal... more Power control is originally used in wireless networks, to compute optimal transmit power and deal with undesired interference. It is also a flexible mechanism that can provide Quality of Service (QoS) and strategically allow to meet the user requirements. This paper introduces a QoS-aware Satisfactory Power Allocation (SPA) for ultra dense networks, using a mean field perspective. In this setting, the user devices are partitioned into several classes based on their throughput requirements. Now, instead of seeking to maximize their QoS, the user devices from each class only aims to meet their respective throughput demands. Yet, by leveraging stochastic geometry analysis and mean field approximation, we investigate the uplink power control problem in a large scale ultra dense network that guarantees a satisfactory performance per class. Next, we formulate the problem as a mean field optimal control where the optimality conditions are derived using Lagrangian dual formulation. Finally, the effectiveness of the SPA policies is illustrated via extensive numerical analysis, and many insightful discussions are presented.
Advances in Intelligent Systems and Computing, 2018
To ensure connectivity in a large-scale networks, we consider a multiple drones flying mesh netwo... more To ensure connectivity in a large-scale networks, we consider a multiple drones flying mesh network (DFMN) built on IEEE 802.11s. In DFMN, drones fly above a target area, collecting data from Internet of Things (IoT) devices and forward it throughout drones in a multi-hop fashion till arriving to the processing unit. Moreover, each drone generates its own packets, and they mainly contain hello messages and beacon frames advertising their presence. In this paper, we propose a queueing framework which analyze the performance of such a mesh network in view of forwarding queues’ stability and end-to-end throughput.
Ubiquitous Networking, 2020
With the explosion of data, the evolution of 5G networks towards 2020–2030 will be mostly based o... more With the explosion of data, the evolution of 5G networks towards 2020–2030 will be mostly based on machine learning techniques. They provide the first era of intelligent networks which we call learning networks. The second era of beyond 5G intelligent network for the period 2030–2040 are networks which are able to think. This requires new advanced mathematical tools which go beyond the perceptual framework of machine learning now. This can be done by linking the topology of perception and the logic of thinking, using category theory and its deeper notion of topos, invented by Alexandre Grothendieck at IHES in the 60s. As a bonus, this intriguing connection makes the notion of semantics appear naturally. Can we finally now start to build the foundations of semantic communication evoked by Shannon and Weaver in the early 50s? Jean-Claude Belfiore graduated from Supelec, France, received a PhD from Télécom ParisTech, and the Habilitation (HdR) from Université Pierre et Marie Curie (UPM...
Nowadays, unmanned aerial vehicles (UAVs) as flying base stations have attracted significant inte... more Nowadays, unmanned aerial vehicles (UAVs) as flying base stations have attracted significant interest in telecommunications service field; Thanks to their low-cost, high maneuverability, flexible deployment and mobility advantages, they have become a main stream solution, to provide wireless communication in exceptional scenarios such as hard to reach areas or massive-attended events. Because UAVs are energy budget constrained, optimal availability control for energy efficiency is proposed in this paper. Within such a situation, the most important objective of a UAVs operator is to provide a service with acceptable availability and cost effective, so that, to realize a satisfactory benefit. The conducted study provides a non-cooperative duopoly game where UAVs Service Providers (SP) are competing to serve a geographical area. We focus on the scheduling of beaconing periods as an efficient mean of energy consumption optimization that results in temporary unavailability of network con...
2021 International Wireless Communications and Mobile Computing (IWCMC), 2021
LoRaWAN (Long Range Wide Area Network) is one of the most popular low power wide area networks te... more LoRaWAN (Long Range Wide Area Network) is one of the most popular low power wide area networks technologies for the Internet of Things (IoT). It provides higher coverage, lower energy consumption and cost. A key parameter of LoRa modulation is the Spreading Factor (SF), which can be tuned to achieve a desired tradeoff between data rate and range. The six LoRa spreading factors (SF7 through SF12) are inherently orthogonal, which implies that communications using different SFs can coexist simultaneously on the same frequency channel without impacting performance. However, multiple devices using the same SF must compete for channel access and packet collisions must be managed. In this work, we present a comprehensive framework for Slotted-Aloha-based LoRa with random SF selection. Detailed analysis of the steady state of the system allows numerical derivation of the optimal retransmission probability. Furthermore, we assess the system's achievable performance in terms of average throughput and expected delay.
Proceedings of the 18th International Conference on Advances in Mobile Computing & Multimedia, 2020
The accurate localization of wireless devices plays an important role in several real-time Intern... more The accurate localization of wireless devices plays an important role in several real-time Internet of Things (IoT) applications. In a network composed of many IoT sensors, a distributed collaborative localization approach can give more accurate localization performance based on a decentralized and low-complexity processing. However, the presence of Non-Line of Sight links between IoT devices detrimentally impacts the localization accuracy. In this paper, we propose a distributed localization algorithm based on a convex relaxation of the Huber loss function. Moreover, to reduce the algorithm convergence time, an iterative stochastic gradient descent algorithm is proposed. Through numerical simulations, we show that the proposed algorithm when used with optimal relaxation parameters of the Huber loss function achieves very low root mean square error and outperforms existing algorithms in the literature. Finally, we validate our proposed scheme using real experimental data.
2020 International Wireless Communications and Mobile Computing (IWCMC), 2020
Food security has been always a critical challenge for humankind, especially for developing count... more Food security has been always a critical challenge for humankind, especially for developing countries. Different players around the world are engaged at different levels to resolve and overcome this challenge. Smart farming is one of the areas of interest in which Internet of Things (IoT) is presented as one of many paradigms that can be explored to manage crops in real-time. Crop's Management that is practicable through introducing of new practices, surveying important parameters and eventually improving the quality of crops. In this paper, we present an IoT-based low-cost architecture for smart farming based on wireless sensors network technology. The architecture supports the plug-and-play nodes approach. The system is based on the implementation of the change point detection algorithm and leach protocol for network clustering. This solution supports near real-time monitoring, data processing, and aid to improve decision-making. Heterogeneous wireless sensor nodes timely survey parameters such as soil moisture, ambient temperature, air quality, etc. Generated data is periodically transmitted to the relevant cluster heads. The Base Station gathers data from the cluster heads for eventual processing and storing. Extensive simulation runs show an improvement of 137% in terms of first dead node and improvement of 123% in terms of network lifetime.
IEEE Network, 2019
This article has been accepted for inclusion in a future issue of this magazine. Content is final... more This article has been accepted for inclusion in a future issue of this magazine. Content is final as presented, with the exception of pagination.
International Journal of Autonomous and Adaptive Communications Systems, 2019
Cognitive radio allows flexible self-organising solution for spectrum scarcity management. It can... more Cognitive radio allows flexible self-organising solution for spectrum scarcity management. It can be used to improve spectrum utilisation while protecting larger range of coexisting users. In this article, we present a new spectrum leasing solution using the matching theory. Based on this Nobel Prize winning framework, a novel distributed scheme, for joint resource management and business side, is built. Yet, we exhibit a new scheme, whereby multiple primary users (PUs) and secondary users (SUs) interact with one another to select their best possible partner optimising their own benefits. To efficiently use available spectrum, each SU seeks to be allocated a channel with sufficient bandwidth and low cost. Numerical investigations illustrate how stable the matching scheme and how it outperforms standard resource allocation. It is also compared with flat rate multiple access scheme via implementing the two schedulers in terms of network size, SUs' QoS demand and bandwidth fee.
2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), 2016
During the last years, both academicians and professional researchers attribute an interest to th... more During the last years, both academicians and professional researchers attribute an interest to the future of cities. They conclude that the technological leap will influence the both architecture and infrastructure, which will give birth to the smart cities vision. This essay aims to provide a comprehensive understanding of the movement towards smartness by providing a study on divers smart city definitions which depend on geographical, environmental, economical and social constraints of each city, next to presenting dimensions that let smart city a 3D concept and highlighting some smart city Models. It gives an overview of smart city characteristics: Smart Economy, Smart Environment, Smart Governance, Smart Mobility, Smart Living and Smart Human Level and shows some big pictures of the components of each paradigm and how they been illustrated. People usually moves to cities in order to fulfil their needs in job, relationships tpand enjoy the modern life, the urbanization phenomenon, climate change and resources depletion took place and addressed a significant number of Smart cities challenges were appeared in urban areas. However, thanks to ICT, Smart City provides opportunities for people to create, invent, test and experience new things in order to optimize their quality of life.
2016 IEEE International Conference on Communications (ICC), 2016
Cognitive radio is emerging as a promising technique to improve the utilization of the radio freq... more Cognitive radio is emerging as a promising technique to improve the utilization of the radio frequency spectrum in wireless networks. In this paper, we propose a hybrid CR (cognitive radio) system where underlay and overlay CR approaches are combined under SINR (Signal to Interference plus Noise Ratio) constraints. This new access type allows to optimize the spectrum sensing time with throughput improvement. The goal of this paper is to provide a new access mode in order to enhance the cognitive system performance while reducing the power spent for detecting the presence of the primary user and the spectrum holes. We consider the problem of spectrum sharing among primary (or “licensed”) users (PUs) and secondary (or “unlicensed”) users (SUs). In this scheme, the spectrum allocation problem is modeled as a non cooperative game, with each CR user acting as a player. Nash equilibrium is considered as the solution of this game.
IEEE Access
The initial access in Millimeter wave (mmWave) 5G communications is very challenging and time con... more The initial access in Millimeter wave (mmWave) 5G communications is very challenging and time consuming. In general, mmWave and terahertz communications require the use of directional antennas to seek narrow beams. However, due to this directionality, many issues can impact the beam alignment between transmitter and receiver. In this paper, we present a comprehensive survey of beam alignment and initial access in mmWave and terahertz 5G/6G systems. First, we present a detailed overview of initial access methods, techniques, and beam management procedures. Then, we classify recent works related to beam alignment based on their objective functions (i.e., latency, power allocation, QoS, energy consumption, cost). We also highlight the beam alignment in terahertz 6G, where we find that deep learning and reconfigurable intelligent surface are the two protagonists that help to achieve fast beam alignment. INDEX TERMS 5G/6G, mmWave, terahertz, beamforming, initial access, beam alignment, beam steering, reconfigurable intelligent surface.
2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)
Using millimeter wave (mmWave) bands in 5G self-organizing networks has a significant potential t... more Using millimeter wave (mmWave) bands in 5G self-organizing networks has a significant potential to provide high bandwidth. However, the major challenge lies in initial access beamforming where mmWave communications suffer from deafness problem that may cause a significant loss in the received power especially when narrow beams are adopted. This paper tackles the problem of beam alignment in mmWave 5G. The problem is formulated as a non-cooperative game between transmitter and receiver where each player tries to align its beamforming direction in a way to obtain maximum throughput. We first provide a full characterization of pure Nash equilibria. Then, we propose a gradient descent algorithm that allows users to learn their optimal beamwidth. Simulation results prove the performance of our beam alignment model since mmWave frequencies deliver narrow beams with high gain and significant capacity.
Annals of Telecommunications
IEEE Transactions on Network and Service Management
With the growing demand for openness, scalability, and granularity, mobile network function virtu... more With the growing demand for openness, scalability, and granularity, mobile network function virtualization (NFV) has emerged as a key enabler for the most of mobile network operators. NFV decouples network functions from hardware devices. This decoupling allows network services, called Virtualized Network Functions (VNFs), to be hosted on commodity hardware which simplifies and enhances service deployment and management for providers, improves flexibility, and leads to efficient and scalable resource usage, and lower costs. The proper placement of VNFs in the hosting infrastructures is one of the main technical challenges. This placement significantly influences the network's performance, reliability, and operating costs. The VNF placement is NP-Hard. Therefore, there is a need for placement methods that can cope with the complexity of the problem and find appropriate solutions in a reasonable duration. The primary purpose of this study is to provide a taxonomy of optimization techniques used to tackle the VNF placement problems. We classify the studied papers based on performance metrics, methods, algorithms, and environment. Virtualization is not limited to simply replacing physical machines with virtual machines or VNFs, but may also include microservices, containers, and cloud-native systems. In this context, the second part of our article focuses on the placement of Containers Network Functions (CNFs) in edge/fog computing. Many issues have been considered as traffic congestion, resource utilization, energy consumption, performance degradation, etc. For each matter, various solutions are proposed through different surveys and research papers in which each one addresses the placement problem in a specific manner by suggesting single objective or multi-objective methods based on different types of algorithms such as heuristic, meta-heuristic, and machine learning algorithms.
2019 IEEE Wireless Communications and Networking Conference (WCNC)
Streaming service is continuously growing, which makes it the killer application of current 4G ne... more Streaming service is continuously growing, which makes it the killer application of current 4G networks, as it demands more resources from mobile networks. The cellular network receives a large number of requests, most times for the same content, consuming the spectrum, energy, in addition to monetary costs inefficiently. In order to optimize spectrum utilization and reduce the induced costs, we propose a noncooperative game framework allowing to understand the user's behaviors. We observed a volunteer Dilemma-like situation when a mobile user could stream the requested video to its neighbors over a D2D link. Afterward, we provide a full description of both pure and mixed Nash equilibria (NE). Furthermore, to ensure convergence to NE points, we use linear reward-inaction and Gibbs Boltzmann learning algorithms. Finally, we show how our scheme could be exploited through extensive numerical simulation. Our framework capture the user's selfish behavior and provides a solution regarding setting and parameters allowing to reach high performance in terms of spectrum utilization, energy efficiency, and overall cost.
2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2020
Cyber incidents are occurring every day using various attack strategies. Deploying security solut... more Cyber incidents are occurring every day using various attack strategies. Deploying security solutions with strong configurations will reduce the attack surface and improve the forensic readiness, but will increase the security overhead and cost. In contrast, using moderate or low security configurations will reduce that overhead, but will inevitably decrease the investigation readiness. To avoid the use of cost-prohibitive approaches in developing forensic-ready systems, we present in this paper a game theoretic approach for deploying an investigation-ready infrastructure. The proposed game is a non-cooperative two-player game between an adaptive cyber defender that uses a cognitive security solution to increase the investigation readiness and reduce the attackers’ untraceability, and a cyber attacker that wants to execute non-provable attacks with a low cost. The cognitive security solution takes its strategic decision, mainly based on its ability to make forensic experts able to differentiate between provable identifiable, provable non-identifiable, and non-provable attack scenarios, starting from the expected evidences to be generated. We study the behavior of the two strategic players, looking for a mixed Nash equilibrium during competition and computing the probabilities of attacking and defending. A simulation is conducted to prove the efficiency of the proposed model in terms of the mean percentage of gained security cost, the number of stepping stones that an attacker creates and the rate of defender false decisions compared to two different approaches.
2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), 2020
Power control is originally used in wireless networks, to compute optimal transmit power and deal... more Power control is originally used in wireless networks, to compute optimal transmit power and deal with undesired interference. It is also a flexible mechanism that can provide Quality of Service (QoS) and strategically allow to meet the user requirements. This paper introduces a QoS-aware Satisfactory Power Allocation (SPA) for ultra dense networks, using a mean field perspective. In this setting, the user devices are partitioned into several classes based on their throughput requirements. Now, instead of seeking to maximize their QoS, the user devices from each class only aims to meet their respective throughput demands. Yet, by leveraging stochastic geometry analysis and mean field approximation, we investigate the uplink power control problem in a large scale ultra dense network that guarantees a satisfactory performance per class. Next, we formulate the problem as a mean field optimal control where the optimality conditions are derived using Lagrangian dual formulation. Finally, the effectiveness of the SPA policies is illustrated via extensive numerical analysis, and many insightful discussions are presented.
Advances in Intelligent Systems and Computing, 2018
To ensure connectivity in a large-scale networks, we consider a multiple drones flying mesh netwo... more To ensure connectivity in a large-scale networks, we consider a multiple drones flying mesh network (DFMN) built on IEEE 802.11s. In DFMN, drones fly above a target area, collecting data from Internet of Things (IoT) devices and forward it throughout drones in a multi-hop fashion till arriving to the processing unit. Moreover, each drone generates its own packets, and they mainly contain hello messages and beacon frames advertising their presence. In this paper, we propose a queueing framework which analyze the performance of such a mesh network in view of forwarding queues’ stability and end-to-end throughput.
Ubiquitous Networking, 2020
With the explosion of data, the evolution of 5G networks towards 2020–2030 will be mostly based o... more With the explosion of data, the evolution of 5G networks towards 2020–2030 will be mostly based on machine learning techniques. They provide the first era of intelligent networks which we call learning networks. The second era of beyond 5G intelligent network for the period 2030–2040 are networks which are able to think. This requires new advanced mathematical tools which go beyond the perceptual framework of machine learning now. This can be done by linking the topology of perception and the logic of thinking, using category theory and its deeper notion of topos, invented by Alexandre Grothendieck at IHES in the 60s. As a bonus, this intriguing connection makes the notion of semantics appear naturally. Can we finally now start to build the foundations of semantic communication evoked by Shannon and Weaver in the early 50s? Jean-Claude Belfiore graduated from Supelec, France, received a PhD from Télécom ParisTech, and the Habilitation (HdR) from Université Pierre et Marie Curie (UPM...
Nowadays, unmanned aerial vehicles (UAVs) as flying base stations have attracted significant inte... more Nowadays, unmanned aerial vehicles (UAVs) as flying base stations have attracted significant interest in telecommunications service field; Thanks to their low-cost, high maneuverability, flexible deployment and mobility advantages, they have become a main stream solution, to provide wireless communication in exceptional scenarios such as hard to reach areas or massive-attended events. Because UAVs are energy budget constrained, optimal availability control for energy efficiency is proposed in this paper. Within such a situation, the most important objective of a UAVs operator is to provide a service with acceptable availability and cost effective, so that, to realize a satisfactory benefit. The conducted study provides a non-cooperative duopoly game where UAVs Service Providers (SP) are competing to serve a geographical area. We focus on the scheduling of beaconing periods as an efficient mean of energy consumption optimization that results in temporary unavailability of network con...
2021 International Wireless Communications and Mobile Computing (IWCMC), 2021
LoRaWAN (Long Range Wide Area Network) is one of the most popular low power wide area networks te... more LoRaWAN (Long Range Wide Area Network) is one of the most popular low power wide area networks technologies for the Internet of Things (IoT). It provides higher coverage, lower energy consumption and cost. A key parameter of LoRa modulation is the Spreading Factor (SF), which can be tuned to achieve a desired tradeoff between data rate and range. The six LoRa spreading factors (SF7 through SF12) are inherently orthogonal, which implies that communications using different SFs can coexist simultaneously on the same frequency channel without impacting performance. However, multiple devices using the same SF must compete for channel access and packet collisions must be managed. In this work, we present a comprehensive framework for Slotted-Aloha-based LoRa with random SF selection. Detailed analysis of the steady state of the system allows numerical derivation of the optimal retransmission probability. Furthermore, we assess the system's achievable performance in terms of average throughput and expected delay.
Proceedings of the 18th International Conference on Advances in Mobile Computing & Multimedia, 2020
The accurate localization of wireless devices plays an important role in several real-time Intern... more The accurate localization of wireless devices plays an important role in several real-time Internet of Things (IoT) applications. In a network composed of many IoT sensors, a distributed collaborative localization approach can give more accurate localization performance based on a decentralized and low-complexity processing. However, the presence of Non-Line of Sight links between IoT devices detrimentally impacts the localization accuracy. In this paper, we propose a distributed localization algorithm based on a convex relaxation of the Huber loss function. Moreover, to reduce the algorithm convergence time, an iterative stochastic gradient descent algorithm is proposed. Through numerical simulations, we show that the proposed algorithm when used with optimal relaxation parameters of the Huber loss function achieves very low root mean square error and outperforms existing algorithms in the literature. Finally, we validate our proposed scheme using real experimental data.
2020 International Wireless Communications and Mobile Computing (IWCMC), 2020
Food security has been always a critical challenge for humankind, especially for developing count... more Food security has been always a critical challenge for humankind, especially for developing countries. Different players around the world are engaged at different levels to resolve and overcome this challenge. Smart farming is one of the areas of interest in which Internet of Things (IoT) is presented as one of many paradigms that can be explored to manage crops in real-time. Crop's Management that is practicable through introducing of new practices, surveying important parameters and eventually improving the quality of crops. In this paper, we present an IoT-based low-cost architecture for smart farming based on wireless sensors network technology. The architecture supports the plug-and-play nodes approach. The system is based on the implementation of the change point detection algorithm and leach protocol for network clustering. This solution supports near real-time monitoring, data processing, and aid to improve decision-making. Heterogeneous wireless sensor nodes timely survey parameters such as soil moisture, ambient temperature, air quality, etc. Generated data is periodically transmitted to the relevant cluster heads. The Base Station gathers data from the cluster heads for eventual processing and storing. Extensive simulation runs show an improvement of 137% in terms of first dead node and improvement of 123% in terms of network lifetime.
IEEE Network, 2019
This article has been accepted for inclusion in a future issue of this magazine. Content is final... more This article has been accepted for inclusion in a future issue of this magazine. Content is final as presented, with the exception of pagination.
International Journal of Autonomous and Adaptive Communications Systems, 2019
Cognitive radio allows flexible self-organising solution for spectrum scarcity management. It can... more Cognitive radio allows flexible self-organising solution for spectrum scarcity management. It can be used to improve spectrum utilisation while protecting larger range of coexisting users. In this article, we present a new spectrum leasing solution using the matching theory. Based on this Nobel Prize winning framework, a novel distributed scheme, for joint resource management and business side, is built. Yet, we exhibit a new scheme, whereby multiple primary users (PUs) and secondary users (SUs) interact with one another to select their best possible partner optimising their own benefits. To efficiently use available spectrum, each SU seeks to be allocated a channel with sufficient bandwidth and low cost. Numerical investigations illustrate how stable the matching scheme and how it outperforms standard resource allocation. It is also compared with flat rate multiple access scheme via implementing the two schedulers in terms of network size, SUs' QoS demand and bandwidth fee.
2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), 2016
During the last years, both academicians and professional researchers attribute an interest to th... more During the last years, both academicians and professional researchers attribute an interest to the future of cities. They conclude that the technological leap will influence the both architecture and infrastructure, which will give birth to the smart cities vision. This essay aims to provide a comprehensive understanding of the movement towards smartness by providing a study on divers smart city definitions which depend on geographical, environmental, economical and social constraints of each city, next to presenting dimensions that let smart city a 3D concept and highlighting some smart city Models. It gives an overview of smart city characteristics: Smart Economy, Smart Environment, Smart Governance, Smart Mobility, Smart Living and Smart Human Level and shows some big pictures of the components of each paradigm and how they been illustrated. People usually moves to cities in order to fulfil their needs in job, relationships tpand enjoy the modern life, the urbanization phenomenon, climate change and resources depletion took place and addressed a significant number of Smart cities challenges were appeared in urban areas. However, thanks to ICT, Smart City provides opportunities for people to create, invent, test and experience new things in order to optimize their quality of life.
2016 IEEE International Conference on Communications (ICC), 2016
Cognitive radio is emerging as a promising technique to improve the utilization of the radio freq... more Cognitive radio is emerging as a promising technique to improve the utilization of the radio frequency spectrum in wireless networks. In this paper, we propose a hybrid CR (cognitive radio) system where underlay and overlay CR approaches are combined under SINR (Signal to Interference plus Noise Ratio) constraints. This new access type allows to optimize the spectrum sensing time with throughput improvement. The goal of this paper is to provide a new access mode in order to enhance the cognitive system performance while reducing the power spent for detecting the presence of the primary user and the spectrum holes. We consider the problem of spectrum sharing among primary (or “licensed”) users (PUs) and secondary (or “unlicensed”) users (SUs). In this scheme, the spectrum allocation problem is modeled as a non cooperative game, with each CR user acting as a player. Nash equilibrium is considered as the solution of this game.
International Journal of Computer Science and Information Security (IJCSIS – established in 2009)... more International Journal of Computer Science and Information Security (IJCSIS – established in 2009), is an online academic journal that adheres to the highest standards of peer review and engages established and emerging scholars from anywhere in the world. The journal focuses on innovative developments, research challenges/solutions in computer science and information technologies. We are pleased to mention that we are committed to placing this journal at the forefront for the dissemination of novel and exciting research output and findings in the fields of computer science. We strongly believe that the direct communication between the editors and authors are important for the quality and well being of the IJCSIS Journal and its contents.
IJCSIS archives all publications in major academic/scientific databases; abstracting/indexing, editorial board and other important information are available online on homepage.