Mohammad Jawid Ahmadi - Academia.edu (original) (raw)

Mohammad Jawid Ahmadi

Uploads

Papers by Mohammad Jawid Ahmadi

Research paper thumbnail of Distributed resource scheduling in grid computing using fuzzy approach

Research paper thumbnail of Random Spreading for Unsourced MAC with Power Diversity

IEEE Communications Letters, 2021

We propose an improvement of the random spreading approach with polar codes for unsourced multipl... more We propose an improvement of the random spreading approach with polar codes for unsourced multiple access, for which each user first encodes its message by a polar code, and then the coded bits are spread using a random spreading sequence. The proposed approach divides the active users into different groups, and employs different power levels for each group in such a way that the average power constraint is satisfied. We formulate and solve an optimization problem to determine the number of groups, and the corresponding user numbers and power levels. Extensive simulations show that the proposed approach outperforms the existing methods, especially when the number of active users is large.

Research paper thumbnail of Distributed resource scheduling in grid computing using fuzzy approach

Research paper thumbnail of Random Spreading for Unsourced MAC with Power Diversity

IEEE Communications Letters, 2021

We propose an improvement of the random spreading approach with polar codes for unsourced multipl... more We propose an improvement of the random spreading approach with polar codes for unsourced multiple access, for which each user first encodes its message by a polar code, and then the coded bits are spread using a random spreading sequence. The proposed approach divides the active users into different groups, and employs different power levels for each group in such a way that the average power constraint is satisfied. We formulate and solve an optimization problem to determine the number of groups, and the corresponding user numbers and power levels. Extensive simulations show that the proposed approach outperforms the existing methods, especially when the number of active users is large.

Log In