-
Cost-Effective Activity Control of Asymptomatic Carriers in Layered Temporal Social Networks
Authors:
Masoumeh Moradian,
Aresh Dadlani,
Rasul Kairgeldin,
Ahmad Khonsari
Abstract:
The robustness of human social networks against epidemic propagation relies on the propensity for physical contact adaptation. During the early phase of infection, asymptomatic carriers exhibit the same activity level as susceptible individuals, which presents challenges for incorporating control measures in epidemic projection models. This paper focuses on modeling and cost-efficient activity con…
▽ More
The robustness of human social networks against epidemic propagation relies on the propensity for physical contact adaptation. During the early phase of infection, asymptomatic carriers exhibit the same activity level as susceptible individuals, which presents challenges for incorporating control measures in epidemic projection models. This paper focuses on modeling and cost-efficient activity control of susceptible and carrier individuals in the context of the susceptible-carrier-infected-removed (SCIR) epidemic model over a two-layer contact network. In this model, individuals switch from a static contact layer to create new links in a temporal layer based on state-dependent activation rates. We derive conditions for the infection to die out or persist in a homogeneous network. Considering the significant costs associated with reducing the activity of susceptible and carrier individuals, we formulate an optimization problem to minimize the disease decay rate while constrained by a limited budget. We propose the use of successive geometric programming (SGP) approximation for this optimization task. Through simulation experiments on Poisson random graphs, we assess the impact of different parameters on disease prevalence. The results demonstrate that our SGP framework achieves a cost reduction of nearly 33% compared to conventional methods based on degree and closeness centrality.
△ Less
Submitted 1 March, 2024;
originally announced March 2024.
-
Hybrid Coded-Uncoded Caching in Multi-Access Networks with Non-uniform Demands
Authors:
Abdollah Ghaffari Sheshjavani,
Ahmad Khonsari,
Masoumeh Moradian,
Seyed Pooya Shariatpanahi,
Seyedeh Bahereh Hassanpour
Abstract:
To address the massive growth of data traffic over cellular networks, increasing spatial reuse of the frequency spectrum by the deployment of small base stations (SBSs) has been considered. For rapid deployment of SBSs in the networks, caching popular content along with new coded caching schemes are proposed. To maximize the cellular network's capacity, densifying it with small base stations is in…
▽ More
To address the massive growth of data traffic over cellular networks, increasing spatial reuse of the frequency spectrum by the deployment of small base stations (SBSs) has been considered. For rapid deployment of SBSs in the networks, caching popular content along with new coded caching schemes are proposed. To maximize the cellular network's capacity, densifying it with small base stations is inevitable. In ultra-dense cellular networks, coverage of SBSs may overlap. To this aim, the multi-access caching system, where users potentially can access multiple cache nodes simultaneously, has attracted more attention in recent years. Most previous works on multi-access coded caching, only consider specific conditions such as cyclic wrap-around network topologies. In this paper, we investigate caching in ultra-dense cellular networks, where different users can access different numbers of caches under non-uniform content popularity distribution, and propose Multi-Access Hybrid coded-uncoded Caching (MAHC). We formulate the optimization problem of the proposed scheme for general network topologies and evaluate it for 2-SBS network scenarios. The numerical and simulation results show that the proposed MAHC scheme outperforms optimal conventional uncoded and previous multi-access coded caching (MACC) schemes.
△ Less
Submitted 14 January, 2024;
originally announced January 2024.
-
Age-Aware Dynamic Frame Slotted ALOHA for Machine-Type Communications
Authors:
Masoumeh Moradian,
Aresh Dadlani,
Ahmad Khonsari,
Hina Tabassum
Abstract:
Information aging has gained prominence in characterizing communication protocols for timely remote estimation and control applications. This work proposes an Age of Information (AoI)-aware threshold-based dynamic frame slotted ALOHA (T-DFSA) for contention resolution in random access machine-type communication networks. Unlike conventional DFSA that maximizes the throughput in each frame, the fra…
▽ More
Information aging has gained prominence in characterizing communication protocols for timely remote estimation and control applications. This work proposes an Age of Information (AoI)-aware threshold-based dynamic frame slotted ALOHA (T-DFSA) for contention resolution in random access machine-type communication networks. Unlike conventional DFSA that maximizes the throughput in each frame, the frame length and age-gain threshold in T-DFSA are determined to minimize the normalized average AoI reduction of the network in each frame. At the start of each frame in the proposed protocol, the common Access Point (AP) stores an estimate of the age-gain distribution of a typical node. Depending on the observed status of the slots, age-gains of successful nodes, and maximum available AoI, the AP adjusts its estimation in each frame. The maximum available AoI is exploited to derive the maximum possible age-gain at each frame and thus, to avoid overestimating the age-gain threshold, which may render T-DFSA unstable. Numerical results validate our theoretical analysis and demonstrate the effectiveness of the proposed T-DFSA compared to the existing optimal frame slotted ALOHA, threshold-ALOHA, and age-based thinning protocols in a considerable range of update generation rates.
△ Less
Submitted 2 January, 2024;
originally announced January 2024.
-
On the Age of Status Updates in Unreliable Multi-Source M/G/1 Queueing Systems
Authors:
Muthukrishnan Senthil Kumar,
Aresh Dadlani,
Masoumeh Moradian,
Ahmad Khonsari,
Theodoros A. Tsiftsis
Abstract:
The timeliness of status message delivery in communications networks is subjective to time-varying wireless channel transmissions. In this paper, we investigate the age of information (AoI) of each source in a multi-source M/G/1 queueing update system with active server failures. In particular, we adopt the method of supplementary variables to derive a closed-form expression for the average AoI in…
▽ More
The timeliness of status message delivery in communications networks is subjective to time-varying wireless channel transmissions. In this paper, we investigate the age of information (AoI) of each source in a multi-source M/G/1 queueing update system with active server failures. In particular, we adopt the method of supplementary variables to derive a closed-form expression for the average AoI in terms of system parameters, where the server repair time follows a general distribution and the service time of packets generated by independent sources is a general random variable. Numerical results are provided to validate the effectiveness of the proposed packet serving policy under different parametric settings.
△ Less
Submitted 31 October, 2022; v1 submitted 2 August, 2022;
originally announced August 2022.
-
Privacy-Preserving Edge Caching: A Probabilistic Approach
Authors:
Seyedeh Bahereh Hassanpour,
Ahmad Khonsari,
Masoumeh Moradian,
Seyed Pooya Shariatpanahi
Abstract:
Edge caching (EC) decreases the average access delay of the end-users through caching popular content at the edge network, however, it increases the leakage probability of valuable information such as users preferences. Most of the existing privacy-preserving approaches focus on adding layers of encryption, which confronts the network with more challenges such as energy and computation limitations…
▽ More
Edge caching (EC) decreases the average access delay of the end-users through caching popular content at the edge network, however, it increases the leakage probability of valuable information such as users preferences. Most of the existing privacy-preserving approaches focus on adding layers of encryption, which confronts the network with more challenges such as energy and computation limitations. We employ a chunk-based joint probabilistic caching (JPC) approach to mislead an adversary eavesdropping on the communication inside an EC and maximizing the adversary's error in estimating the requested file and requesting cache. In JPC, we optimize the probability of each cache placement to minimize the communication cost while guaranteeing the desired privacy and then, formulate the optimization problem as a linear programming (LP) problem. Since JPC inherits the curse of dimensionality, we also propose scalable JPC (SPC), which reduces the number of feasible cache placements by dividing files into non-overlapping subsets. We also compare the JPC and SPC approaches against an existing probabilistic method, referred to as disjoint probabilistic caching (DPC) and random dummy-based approach (RDA). Results obtained through extensive numerical evaluations confirm the validity of the analytical approach, the superiority of JPC and SPC over DPC and RDA.
△ Less
Submitted 30 July, 2022;
originally announced August 2022.
-
Scaling Power Management in Cloud Data Centers: A Multi-Level Continuous-Time MDP Approach
Authors:
Behzad Chitsaz,
Ahmad Khonsari,
Masoumeh Moradian,
Aresh Dadlani,
Mohammad Sadegh Talebi
Abstract:
Power management in multi-server data centers~especially at scale is a vital issue of increasing importance in cloud computing paradigm. Existing studies mostly consider thresholds on the number of idle servers to switch the servers on or off and suffer from scalability issues. As a natural approach in view~of~the Markovian assumption, we present a multi-level continuous-time Markov decision proce…
▽ More
Power management in multi-server data centers~especially at scale is a vital issue of increasing importance in cloud computing paradigm. Existing studies mostly consider thresholds on the number of idle servers to switch the servers on or off and suffer from scalability issues. As a natural approach in view~of~the Markovian assumption, we present a multi-level continuous-time Markov decision process (CTMDP) model based on state aggregation of multi-server data centers with setup times that interestingly overcomes the inherent intractability of traditional MDP approaches due to their colossal state-action space. The beauty of the presented model is that, while it keeps loyalty to the Markovian behavior, it approximates the calculation of the transition probabilities in a way that keeps the accuracy of the results at a desirable level. Moreover, near-optimal performance is attained at the expense of the increased state-space dimensionality by tuning the number of levels in the multi-level approach. The simulation results were promising and confirm that in many scenarios of interest, the proposed approach attains noticeable improvements, namely a near 50% reduction in the size of CTMDP while yielding better rewards as compared to existing fixed threshold-based policies and aggregation methods.
△ Less
Submitted 19 July, 2023; v1 submitted 3 August, 2021;
originally announced August 2021.
-
Content Caching for Shared Medium Networks Under Heterogeneous Users' Behaviours
Authors:
Abdollah Ghaffari Sheshjavani,
Ahmad Khonsari,
Seyed Pooya Shariatpanahi,
Masoumeh Moradian
Abstract:
Content caching is a widely studied technique aimed to reduce the network load imposed by data transmission during peak time while ensuring users' quality of experience. It has been shown that when there is a common link between caches and the server, delivering contents via the coded caching scheme can significantly improve performance over conventional caching. However, finding the optimal conte…
▽ More
Content caching is a widely studied technique aimed to reduce the network load imposed by data transmission during peak time while ensuring users' quality of experience. It has been shown that when there is a common link between caches and the server, delivering contents via the coded caching scheme can significantly improve performance over conventional caching. However, finding the optimal content placement is a challenge in the case of heterogeneous users' behaviours. In this paper we consider heterogeneous number of demands and non-uniform content popularity distribution in the case of homogeneous and heterogeneous user preferences. We propose a hybrid coded-uncoded caching scheme to trade-off between popularity and diversity. We derive explicit closed-form expressions of the server load for the proposed hybrid scheme and formulate the corresponding optimization problem. Results show that the proposed hybrid caching scheme can reduce the server load significantly and outperforms the baseline pure coded and pure uncoded and previous works in the literature for both homogeneous and heterogeneous user preferences.
△ Less
Submitted 7 May, 2021;
originally announced May 2021.
-
Optimal Relaying in Energy Harvesting Wireless Networks with Wireless-Powered Relays
Authors:
Masoumeh Moradian,
Farid Ashtiani,
Ying Jun Zhang
Abstract:
In this paper, we consider a wireless cooperative network with an energy harvesting relay which is powered by the energy harvested from ambient RF waves, such as that of a data packet. At any given time, the relay operates either in the energy harvesting (EH) mode or the data decoding (DD) mode, but not both. Separate energy and data buffers are kept at the relay to store the harvested energy and…
▽ More
In this paper, we consider a wireless cooperative network with an energy harvesting relay which is powered by the energy harvested from ambient RF waves, such as that of a data packet. At any given time, the relay operates either in the energy harvesting (EH) mode or the data decoding (DD) mode, but not both. Separate energy and data buffers are kept at the relay to store the harvested energy and decoded data packets, respectively. In this paper, we optimize a time switching policy that switches between the EH mode and DD mode to maximize the system throughput or minimize the average transmission delay. Both static and dynamic time switching policies are derived. In particular, static policies are the ones where EH or DD mode is selected with a pre-determined probability. In contrast, in a dynamic policy, the mode is selected dynamically according to the states of data and energy buffers. We prove that the throughput-optimal static and dynamic policies keep the relay data buffer at the boundary of stability. More specifically, we show that the throughput-optimal dynamic policy has a threshold-based structure. Moreover, we prove that the delay-optimal dynamic policy also has a threshold-based structure and keeps at most one packet at the relay. We notice that the delay-optimal and throughput-optimal dynamic policies coincide in most cases. However, it is not true for optimal static policies. Finally, through extensive numerical results, we show the efficiency of optimal dynamic policies compared with the static ones in different conditions.
△ Less
Submitted 4 June, 2017;
originally announced June 2017.
-
Hoffmann-Ostenhof's conjecture for traceable cubic graphs
Authors:
F. Abdolhosseini,
S. Akbari,
H. Hashemi,
M. S. Moradian
Abstract:
It was conjectured by Hoffmann-Ostenhof that the edge set of every connected cubic graph can be decomposed into a spanning tree, a matching and a family of cycles. In this paper, we show that this conjecture holds for traceable cubic graphs.
It was conjectured by Hoffmann-Ostenhof that the edge set of every connected cubic graph can be decomposed into a spanning tree, a matching and a family of cycles. In this paper, we show that this conjecture holds for traceable cubic graphs.
△ Less
Submitted 16 July, 2016;
originally announced July 2016.