Ekram Hossain

Ekram Hossain
University of Manitoba | UMN

About

642
Publications
148,348
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
35,603
Citations

Publications

Publications (642)
Article
Full-text available
This paper studies a simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS)-assisted wireless system where a multi-antenna base station (BS) transmits both wireless information and energy-carrying signals to single-antenna users. To explore the trade-off between spectral efficiency (SE) and energy efficiency (EE) i...
Article
Full-text available
We consider an integrated sensing and communication (ISAC) system, in which a simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) assists a base station in transmitting communication signals to mobile users and conducting sensing tasks toward specific targets. We formulate a transmit beamforming and phase shift...
Article
Full-text available
The Simultaneously Transmitting and Reflecting Reconfigurable Intelligent Surface (STAR-RIS) technology is an innovative approach that aims to enhance the performance of sixth-generation (6G) wireless networks. This study focuses on a multi-STAR-RIS and full-duplex (FD) communication system aimed at providing ultra-reliable low-latency communicatio...
Article
Channel estimation in reconfigurable intelligent surfaces (RIS)-aided systems is crucial for optimal configuration of the RIS and various downstream tasks such as user localization. In RIS-aided systems, channel estimation involves estimating two channels for the user-RIS (UE-RIS) and RIS-base station (RIS-BS) links. In the literature, two approach...
Article
Dual-function-radar-communication (DFRC) is a promising candidate technology for next-generation networks. By integrating hybrid analog-digital (HAD) beamforming into a multi-user millimeter-wave (mmWave) DFRC system, we design a new reconfigurable subarray (RS) architecture and jointly optimize the HAD beamforming to maximize the communication sum...
Article
We leverage covert communication to enhance the security of a large-scale multi-tier Low Earth Orbit (LEO) satellite network against vigilant adversarial terrestrial Base Stations (BSs) aiming at detecting satellite transmissions. This approach involves deploying massive LEO satellites at different altitudes around Earth to form a multi-tier networ...
Article
This paper analyzes the impact of imperfect communication channels on decentralized federated learning (D-FL) and subsequently determines the optimal number of local aggregations per training round, adapting to the network topology and imperfect channels. We start by deriving the bias of locally aggregated D-FL models under imperfect channels from...
Article
Multi-access edge computing (MEC) is one of the enabling technologies for high-performance computing at the edge of the 6 G networks, supporting high data rates and ultra-low service latency. Although MEC is a remedy to meet the growing demand for computation-intensive applications, the scarcity of resources at the MEC servers degrades its performa...
Preprint
We propose a variational inference (VI)-based channel state information (CSI) estimation approach in a fully-passive reconfigurable intelligent surface (RIS)-aided mmWave single-user single-input multiple-output (SIMO) communication system. Specifically, we first propose a VI-based joint channel estimation method to estimate the user-equipment (UE)...
Article
Photon counting is an effective technique to detect low-power optical signals in underwater optical wireless communications (UOWC), but undergoes signal-dependent Poisson shot noises that lead to intractable data rate expressions and hinder effective power allocation of photon-counting systems. This paper presents a new approach to the optimal powe...
Preprint
We aim to secure a large-scale device-to-device (D2D) network against adversaries. The D2D network underlays a downlink cellular network to reuse the cellular spectrum and is enabled for simultaneous wireless information and power transfer (SWIPT). In the D2D network, the transmitters communicate with the receivers, and the receivers extract inform...
Article
Full-text available
Integrating the multitude of emerging internet of things (IoT) applications with diverse requirements in beyond fifth generation (B5G) networks necessitates the coexistence of enhanced mobile broadband (eMBB) and ultra-reliable low-latency communication (URLLC) services. However, bandwidth limited and congested sub-6GHz bands are incapable of fulfi...
Conference Paper
Full-text available
Downlink transmission of a non-orthogonal multiple access visible light communication system empowered by an unmanned aerial vehicles (UAV) is considered for multiplexing enhanced mobile broadband (eMBB) and massive machine type communication (mMTC) services. Accordingly, a resource allocation problem of joint transmit power control and motion traj...
Article
We exploit both covert communication and friendly jamming to propose a friendly jamming-assisted covert communication and use it to doubly secure a large-scale device-to-device (D2D) network against eavesdroppers (i.e., wardens). The D2D transmitters defend against the wardens by: 1) hiding their transmissions with enhanced covert communication, an...
Article
Data-driven machine learning (ML) is promoted as one potential technology to be used in next-generation wireless systems. This led to a large body of research work that applies ML techniques to solve problems in different layers of the wireless transmission link. However, most of these applications rely on supervised learning which assumes that the...
Article
We aim to develop a system-level security solution for a large-scale device-to-device (D2D) network against adversaries based on covert communication. The D2D network underlays a downlink cellular network to reuse the cellular spectrum and is enabled for simultaneous wireless information and power transfer (SWIPT). In the D2D network, the D2D trans...
Article
Full-text available
Security is an issue in non-orthogonal multiple access (NOMA) and partial-NOMA because a user may decode the message of its paired-user with which it shares a resource element (RE). Three scenarios are studied where, of the paired-users, the eavesdropper is: 1) an actively malicious strong-user, 2) a passive strong-user, 3) an actively malicious we...
Article
Metaverse is an evolving orchestrator of the next-generation Internet architecture that produces an immersive and self-adapting virtual world in which humans perform activities similar to those in the real world, such as playing sports, doing work, and socializing. It is becoming a reality and is driven by ever-evolving advanced technologies such a...
Preprint
Metaverse is an evolving orchestrator of the next-generation Internet architecture that produces an immersive and self-adapting virtual world in which humans perform activities similar to those in the real world, such as playing sports, doing work, and socializing. It is becoming a reality and is driven by ever-evolving advanced technologies such a...
Conference Paper
Full-text available
Passive beamforming in reconfigurable intelligent surfaces (RISs) enables a feasible and efficient way of communication when the RIS reflection coefficients are precisely adjusted. In this paper, we present a framework to track the RIS reflection coefficients with the aid of deep learning from a time-series prediction perspective in a terahertz (TH...
Article
Full-text available
In this paper, we consider the computation offloading problem from mobile users in a heterogeneous vehicular edge computing scenario and focus on the network and base station selection problem, where the different networks have different traffic loads. In a fast-varying vehicular environment, computation offloading of users is strongly affected by...
Article
Full-text available
This work studies the meta distribution (MD) in a two-user partial non-orthogonal multiple access (pNOMA) network. Compared to NOMA where users fully share a resourceelement, pNOMA allows sharing only a fraction a of the resourceelement. The MD is computed via moment-matching using the first two moments where reduced integral expressions are derive...
Chapter
This chapter develops an iterative optimization framework to maximize the data rate of a given user by jointly optimizing the mode selection (i.e. direct mode where user is served by direct base station (BS) transmissions and indirect mode where user is served by intelligent reflecting surface (IRS)‐assisted transmissions) along with IRS phase shif...
Preprint
Full-text available
With the proliferation of deep learning techniques for wireless communication, several works have adopted learning-based approaches to solve the channel estimation problem. While these methods are usually promoted for their computational efficiency at inference time, their use is restricted to specific stationary training settings in terms of commu...
Article
We investigate the age-limited capacity of the Gaussian many channel with total N users, out of which a random subset of K<sub>a</sub> users are active in any transmission period, and a large-scale antenna array at the base station (BS). In an uplink scenario where the transmission power is fixed among the users, we consider the setting in whic...
Preprint
Full-text available
Delivering wireless ultrahigh-speed access at wider coverage is becoming considerably challenging due to the prohibitive investment costs per user and the necessary shift to range-limited millimeter-wave (mmWave) transmissions. Reconfigurable intelligent surfaces (RIS) are expected to extend the reach of mmWave and TeraHz signals more cost-effectiv...
Preprint
Full-text available
We exploit both covert communication and friendly jamming to propose a friendly jamming-assisted covert communication and use it to doubly secure a large-scale device-to-device (D2D) network against eavesdroppers (i.e., wardens). The D2D transmitters defend against the wardens by: 1) hiding their transmissions with enhanced covert communication, an...
Article
In Internet of Electric Vehicles (IoEV), mobile charging stations (MCSs) can be deployed to complement fixed charging stations. Currently, the strategy of MCSs is to move towards the EVs with insufficient energy (IEVs) only after being requested, which is not efficient. However, similar to online car-hailing services, more IEVs could be charged and...
Article
Full-text available
For enabling automatic deployment and management of cellular networks, the concept of self-organizing network (SON) was introduced. SON capabilities can enhance network performance, improve service quality, and reduce operational and capital expenditure (OPEX/CAPEX). As an important component in SON, self-healing is defined as a paradigm where the...
Article
Load balancing has become a key technique to handle the increasing traffic demand and improve the user experience. It evenly distributes the traffic across network resources by offloading users from overloaded base stations or channels to less crowded ones. Load balancing is a multi-objective optimization problem involving the automatic adjustment...
Article
In this article, we first present the vision, key performance indicators, key enabling techniques (KETs), and services of 6G wireless networks. Then, we highlight a series of general resource management (RM) challenges as well as unique RM challenges corresponding to each KET. The unique RM challenges in 6G necessitate the transformation of existin...
Article
We study the joint user association and resource allocation problem in both uplink (UL) and downlink (DL) for full-duplex heterogeneous cellular networks (HCNs), wherein base stations (BSs) are densely deployed with reusable subchannels and highly variable transmit powers. To reap the benefits of BS densification, decoupled multiple-association (DM...
Article
In a cell-free network, a large number of mobile devices are served simultaneously by several base stations (BSs)/access points(APs) using the same time/frequency resources. However, this creates high signal processing demands (e.g., for beamforming) at the transmitters and receivers. In this work, we develop centralized and distributed deep reinfo...
Article
In a cell-free wireless network, distributed access points (APs) jointly serve all user equipments (UEs) within their coverage area by using the same time/frequency resources. In this paper, we develop a novel downlink cell-free multiple-input multiple-output (MIMO) millimeter wave (mmWave) network architecture that enables all APs and UEs to dynam...
Article
Full-text available
This paper introduces a novel approach of utilizing the reconfigurable intelligent surface (RIS) for joint data modulation and signal beamforming in a multi-user downlink cellular network by leveraging the idea of backscatter communication. We present a general framework in which the RIS, referred to as modulating intelligent surface (MIS) in this...
Article
As the long-term evolution (LTE) system is reaching maturity and the fifth-generation (5G) systems are being commercially deployed, researchers have turned their attention to the development of next-generation wireless networks. Compared to current wireless networks, on the one hand, next-generation wireless networks are expected to achieve signifi...
Article
Due to the explosive growth in the number of wireless devices and diverse wireless services, such as virtual/augmented reality and Internet-of-Everything, next generation wireless networks face unprecedented challenges caused by heterogeneous data traffic, massive connectivity, and ultra-high bandwidth efficiency and ultra-low latency requirements....
Article
As the long-term evolution (LTE) system is reaching maturity and the fifth-generation (5G) systems are being commercially deployed, researchers have turned their attention to the development of next-generation wireless networks. Compared to current wireless networks, on the one hand, next-generation wireless networks are expected to achieve signifi...
Article
Using stochastic geometry tools, we develop a comprehensive framework to analyze the downlink performance of various types of users (e.g., users served by direct base station (BS) transmissions and indirect intelligent reflecting surface (IRS)-assisted transmissions) in a cellular network with multiple BSs and IRSs. For the proposed users, we provi...
Article
Full-text available
Bluetooth Low Energy (BLE) has become the de facto communication protocol for the Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption, ease of development, good enough network coverage, and data transfer speed. Due to the simplified design of this protocol, there have been lots of security and privacy vulnerabil...
Article
In multi-UAV networks, the downlink (DL) and uplink (UL) associations between a UAV and a user equipment (UE) is typically coupled, which restricts each UE to associate to the same UAV for both DL and UL. However, this mode may not be efficient since UAV networks can be heterogeneous (e.g., multi-tier UAV networks) and can experience high link unce...
Article
Full-text available
The efficient administration of network resources in Multi-Access Edge Computing (MEC) is an active research topic these days. Task sharing, in particular, is one of the fundamental problems regarding MEC architectures although the existing literature approaches the topic mostly from the mobile user point of view. In this article, we present the ch...
Article
As one of the most promising applications in future Internet of Things, Internet of Vehicles (IoV) has been acknowledged as a fundamental technology for developing the Intelligent Transportation Systems in smart cities. With the emergence of the sixth generation (6G) communications technologies, massive network infrastructures will be densely deplo...
Article
While 5G standards are being developed, research is moving toward designing the next generation of communications (e.g., 5.5G and 6G) which are expected to provide data rates of the order of 1 Tb/s using frequency bands in the range of 100 GHz to 3 THz. In addition to providing massive capacity and connectivity by exploiting new network architectur...
Preprint
Full-text available
As one of the most promising applications in future Internet of Things, Internet of Vehicles (IoV) has been acknowledged as a fundamental technology for developing the Intelligent Transportation Systems in smart cities. With the emergence of the sixth generation (6G) communications technologies, massive network infrastructures will be densely deplo...
Preprint
Full-text available
This paper introduces a novel approach of utilizing the reconfigurable intelligent surface (RIS) for joint data modulation and signal beamforming in a multi-user downlink cellular network by leveraging the idea of backscatter communication. We present a general framework in which the RIS, referred to as modulating intelligent surface (MIS) in this...
Article
The performance of wireless networks is fundamentally limited by the aggregate interference, which depends on the spatial distributions of the interferers, channel conditions, and user traffic patterns (or queueing dynamics). These factors usually exhibit spatial and temporal correlations and thus make the performance of large-scale networks enviro...
Preprint
Full-text available
Due to the explosive growth in the number of wireless devices and diverse wireless services, such as virtual/augmented reality and Internet-of-Everything, next generation wireless networks face unprecedented challenges caused by heterogeneous data traffic, massive connectivity, and ultra-high bandwidth efficiency and ultra-low latency requirements....
Preprint
Using stochastic geometry tools, we develop a comprehensive framework to analyze the downlink coverage probability, ergodic capacity, and energy efficiency (EE) of various types of users (e.g., users served by direct base station (BS) transmissions and indirect intelligent reflecting surface (IRS)-assisted transmissions) in a cellular network with...
Preprint
Full-text available
We consider an Intelligent Reflecting Surface (IRS)-aided multiple-input single-output (MISO) system for downlink transmission. We compare the performance of Deep Reinforcement Learning (DRL) and conventional optimization methods in finding optimal phase shifts of the IRS elements to maximize the user signal-to-noise (SNR) ratio. Furthermore, we ev...
Preprint
Full-text available
Multi-Agent Reinforcement Learning (MARL) is a challenging subarea of Reinforcement Learning due to the non-stationarity of the environments and the large dimensionality of the combined action space. Deep MARL algorithms have been applied to solve different task offloading problems. However, in real-world applications, information required by the a...
Article
Full-text available
This paper tackles the problem of joint active and passive beamforming optimization for an intelligent reflective surface (IRS)-assisted multi-user downlink multiple-input multiple-output (MIMO) communication system under both ideal and practical IRS phase shifts. We aim to maximize the spectral efficiency of the users by minimizing the sum mean sq...
Article
Full-text available
Automatic repeat request (ARQ) schemes, and in particular hybrid-ARQ (HARQ) schemes, which jointly adopt forward error correction (FEC) and ARQ, are essential to provide reliable data transmission in wireless communications systems. However, the feedback from the receiver to the transmitter and the retransmission process used in ARQ incurs signific...
Article
Distributed machine learning (DML) techniques, such as federated learning, partitioned learning, and distributed reinforcement learning, have been increasingly applied to wireless communications. This is due to improved capabilities of terminal devices, explosively growing data volume, congestion in the radio interfaces, and increasing concern of d...
Article
Full-text available
Code-expanded Random Access (CeRA) is a promising technique for supporting massive machine-type communications in cellular networks. However, its potentiality is limited by code ambiguity, which results from the inference of a larger number of codewords than those actually transmitted. In this letter, we propose a random access (RA) scheme to allev...
Preprint
Full-text available
Code-expanded Random Access (CeRA) is a promising technique for supporting mMTC in cellular IoT networks. However, its potentiality is limited by code ambiguity, which results from the inference of a larger number of codewords than those actually transmitted. In this letter, we propose a random access scheme to alleviate this problem by allowing de...
Preprint
Full-text available
In this paper, we consider the computation offloading problem from mobile users in a heterogeneous vehicular edge computing scenario and focus on the network and base station selection problem, where the different networks have different traffic loads. In a fast-varying vehicular environment, computation offloading of users is strongly affected by...
Article
With growth in the number of smart devices and advancements in their hardware, in recent years, data-driven machine learning techniques have drawn significant attention. However, due to privacy and communication issues, it is not possible to collect this data at a centralized location. Federated learning is a machine learning setting where the cent...
Article
In the context of Multi-access Edge Computing (MEC), the task sharing mechanism among edge servers is an activity of vital importance for speeding up the computing process and thereby improving the user experience. The distributed resources in the form of edge servers are expected to collaborate with each other in order to boost overall performance...
Preprint
Full-text available
Robotic applications nowadays are widely adopted to enhance operational automation and performance of real-world Cyber-Physical Systems (CPSs) including Industry 4.0, agriculture, healthcare, and disaster management. These applications are composed of latency-sensitive, data-heavy, and compute-intensive tasks. The robots, however, are constrained i...
Article
We study the resource sharing problem in a drone-based wireless network. We consider a distributed control setting under uncertainty (i.e. unavailability of full information). In particular, the drones cooperate in serving the users while pooling their spectrum and energy resources in the absence of prior knowledge about different system characteri...
Preprint
Full-text available
In a cell-free wireless network, distributed access points (APs) jointly serve all user equipments (UEs) within the their coverage area by using the same time/frequency resources. In this paper, we develop a novel downlink cell-free multiple-input multiple-output (MIMO) millimeter wave (mmWave) network architecture that enables all APs and UEs to d...
Article
Deep Reinforcement Learning (DRL) has recently witnessed significant advances that have led to multiple successes in solving sequential decision-making problems in various domains, particularly in wireless communications. The next generation of wireless networks is expected to provide scalable, low-latency, ultra-reliable services empowered by the...
Article
Full-text available
Robotic applications nowadays are widely adopted to enhance operational automation and performance of real-world Cyber-Physical Systems (CPSs) including Industry 4.0, agriculture, healthcare, and disaster management. These applications are composed of latency-sensitive, data-heavy, and compute-intensive tasks. The robots, however, are constrained i...
Preprint
Full-text available
div>Automatic repeat request (ARQ) schemes, and in particular hybrid-ARQ (HARQ) schemes, which jointly adopt forward error correction (FEC) and ARQ, are essential to provide reliable data transmission in wireless communications systems. However, the feedback from the receiver to the transmitter and the retransmission process used in ARQ incurs sign...
Preprint
Full-text available
div>Automatic repeat request (ARQ) schemes, and in particular hybrid-ARQ (HARQ) schemes, which jointly adopt forward error correction (FEC) and ARQ, are essential to provide reliable data transmission in wireless communications systems. However, the feedback from the receiver to the transmitter and the retransmission process used in ARQ incurs sign...
Preprint
Full-text available
Internet-of-Things (IoT) is featured with low-power communications among a massive number of ubiquitously-deployed and energy-constrained electronics, e.g., sensors and actuators. To cope with the demand, wireless-powered cooperative relaying emerges as a promising communication paradigm to extend data transmission coverage and solve energy scarcit...
Preprint
Full-text available
The performance of wireless networks is fundamentally limited by the aggregate interference, which depends on the spatial distributions of the interferers, channel conditions, and user traffic patterns (or queueing dynamics). These factors usually exhibit spatial and temporal correlations and thus make the performance of large-scale networks enviro...
Preprint
Non-orthogonal multiple access (NOMA) allows users sharing a resource-block to efficiently reuse spectrum and improve cell sum rate $\mathcal{R}_{\rm tot}$ at the expense of increased interference. Orthogonal multiple access (OMA), on the other hand, guarantees higher coverage. We introduce partial-NOMA in a large two-user downlink network to provi...
Article
We propose a novel antenna clustering-based method for simultaneous wireless information and power transfer (SWIPT) in a multiple-input multiple-output (MIMO) full-duplex (FD) system. For a point-to-point communication set up, the proposed method enables a wireless device with multiple antennas to simultaneously transmit information and harvest ene...
Preprint
Full-text available
The remarkable advancements in Deep Learning (DL) algorithms have fueled enthusiasm for using Artificial Intelligence (AI) technologies in almost every domain; however, the opaqueness of these algorithms put a question mark on their applications in safety-critical systems. In this regard, the `explainability' dimension is not only essential to both...
Preprint
With growth in the number of smart devices and advancements in their hardware, in recent years, data-driven machine learning techniques have drawn significant attention. However, due to privacy and communication issues, it is not possible to collect this data at a centralized location. Federated learning is a machine learning setting where the cent...
Article
Impact of mobility will be increasingly important in future generation wireless services and the related challenges will need to be addressed. Sojourn time, the time duration that a mobile user stays within a cell, is a mobility-aware parameter that can significantly impact the performance of mobile users and it can also be exploited to improve res...
Preprint
Deep Reinforcement Learning (DRL) has recently witnessed significant advances that have led to multiple successes in solving sequential decision-making problems in various domains, particularly in wireless communications. The future sixth-generation (6G) networks are expected to provide scalable, low-latency, ultra-reliable services empowered by th...
Article
This paper provides a tutorial on mobility-aware performance analysis of cellular networks considering both the spatially random [where base stations (BSs) are deployed according to a homogeneous point process] and deterministic grid-based network deployment topologies. We first provide a summary of users’ mobility models with no spatiotemporal cor...
Article
The joint probability density function (pdf) of the received signal of an ambient backscatter communication system is derived, assuming that on-off keying (OOK) is performed at the tag to form non-return to zero (NRZ) line codes, and that the ambient radio frequency (RF) signal is white Gaussian. The pdf of the received signal is then utilized to d...
Article
This paper presents a theoretical framework to analyze the performance of an integrated unmanned aerial vehicle (UAV)-intelligent reflecting surface (IRS) relaying system in which the IRS provides an additional degree of freedom combined with the flexible deployment of full-duplex UAV to enhance communication between ground nodes. Our framework con...
Article
To improve capacity and overcome some of the limitations of traditional terrestrial cellular wireless networks, drones with aerial base stations can be deployed (e.g. to improve coverage, alleviate congestion, support overflow traffic). The mobility of drones allows flexible network reconfiguration to adapt to dynamic traffic and channel conditions...
Article
Full-text available
To facilitate efficient cloud managed resource allocation solutions, collection of key wireless metrics from multiple access points (APs) at different locations within a given area is required. In unlicensed shared spectrum bands collection of metric data can be a challenging task for a cloud manager as indepen- dent self-interested APs can operate...
Preprint
We study the resource sharing problem in a drone-based wireless network. We consider a distributed control setting under uncertainty (i.e. unavailability of full information). In particular, the drones cooperate in serving the users while pooling their spectrum and energy resources in the absence of prior knowledge about different system characteri...
Article
Full-text available
The COVID-19 pandemic has resulted in unprecedented challenges to global society and the healthcare system in particular. The main objective of this article is to introduce an end-to-end Internet of Things (IoT) ecosystem for healthcare that uses an open source hardware and interoperable IoT standard for eHealth monitoring in general, and COVID-19...
Article
Full-text available
We put forward a new algorithmic solution to the massive unsourced random access (URA) problem, by leveraging the rich spatial dimensionality offered by large-scale antenna arrays. This paper makes an observation that spatial signature is key to URA in massive connectivity setups. The proposed scheme relies on a slotted transmission framework but e...
Article
In future cell-free (or cell-less) wireless networks, a large number of devices in a geographical area will be served simultaneously in non-orthogonal multiple access scenarios by a large number of distributed access points (APs), which coordinate with a centralized processing pool. For such a centralized cell-free network with static predefined be...
Article
We study the user association problem in full-duplex cellular networks, wherein base stations (BSs) are densely deployed with highly variable transmit powers and topologies. To enhance the system performance, decoupled UL-DL (DUDe) association is considered, which enables each user equipment (UE) to associate with different base stations in uplink...
Article
Non-orthogonal multiple access (NOMA) allows users sharing a resource-block to efficiently reuse spectrum and improve cell sum rate $\mathcal {R}_{\mathrm{ tot}}$ at the expense of increased interference. Orthogonal multiple access (OMA), on the other hand, guarantees higher coverage. We introduce partial-NOMA in a large two-user downlink network...
Article
With network slicing, physical networks are partitioned into multiple virtual networks tailored to serve different types of service with their specific requirements. In order to optimize the utilization of network resources for delay-critical applications, we propose a new multi-domain network virtualization framework based on a novel multipath mul...
Preprint
The emergence of new wireless technologies together with the requirement of massive connectivity results in several technical issues such as excessive interference, high computational demand for signal processing, and lengthy processing delays. In this work, we propose several beamforming techniques for an uplink cell-free network with centralized,...
Preprint
Full-text available
In the context of Multi-access Edge Computing (MEC), the task sharing mechanism among edge servers is an activity of vital importance for speeding up the computing process and thereby improve user experience. The distributed resources in the form of edge servers are expected to collaborate with each other in order to boost overall performance of a...
Preprint
Full-text available
This paper presents a theoretical framework to analyze the performance of integrated unmanned aerial vehicle (UAV)-intelligent reflecting surface (IRS) relaying system in which IRS provides an additional degree of freedom combined with the flexible deployment of full-duplex UAV to enhance communication between ground nodes. Our framework considers...
Preprint
To improve capacity and overcome some of the limitations of cellular wireless networks, drones with aerial base stations can be deployed to assist the terrestrial cellular wireless networks. The mobility of drones allows flexible network reconfiguration to adapt to dynamic traffic and channel conditions. However, this is achieved at the expense of...

Network

Cited By