Skip to main content

Showing 1–40 of 40 results for author: Nafie, M

.
  1. arXiv:1902.04568  [pdf, ps, other

    cs.PF cs.NI

    Wireless energy and information transfer in networks with hybrid ARQ

    Authors: Mehdi Salehi Heydar Abad, Ozgur Ercetin, Tamer Elbatt, Mohammed Nafie

    Abstract: In this paper, we consider a class of wireless powered communication devices using hybrid automatic repeat request (HARQ) protocol to ensure reliable communications. In particular, we analyze the trade-off between accumulating mutual information and harvesting RF energy at the receiver of a point-to-point link over a time-varying independent and identically distributed (i.i.d.) channel. The transm… ▽ More

    Submitted 12 February, 2019; originally announced February 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1711.02878

    Journal ref: 2018 IEEE Wireless Communications and Networking Conference (WCNC)

  2. arXiv:1812.07372  [pdf, other

    cs.IT

    Cache-Aided Combination Networks with Interference

    Authors: Ahmed Roushdy, Abolfazl Seyed Motahari, Mohammed Nafie, Deniz Gunduz

    Abstract: Centralized coded caching and delivery is studied for a radio access combination network (RACN), whereby a set of $H$ edge nodes (ENs), connected to a cloud server via orthogonal fronthaul links with limited capacity, serve a total of $K$ user equipments (UEs) over wireless links. Each user, equipped with a cache of size $μ_R N F$ bits, is connected to a distinct set of $r$ ENs each of which equip… ▽ More

    Submitted 28 September, 2019; v1 submitted 15 December, 2018; originally announced December 2018.

    Comments: Submitted for Publication. arXiv admin note: substantial text overlap with arXiv:1802.09087

  3. arXiv:1812.02388  [pdf, other

    cs.IT

    A Converse Bound for Cache-Aided Interference Networks

    Authors: Antonious M. Girgis, Ozgur Ercetin, Mohammed Nafie, Tamer ElBatt

    Abstract: In this paper, an interference network with arbitrary number of transmitters and receivers is studied, where each transmitter is equipped with a finite size cache. We obtain an information-theoretic lower bound on both the peak normalized delivery time (NDT), and the \textit{expected} NDT of cache-aided interference networks with uniform content popularity. For the peak NDT, we show that our lower… ▽ More

    Submitted 6 December, 2018; originally announced December 2018.

    Comments: To appear in IEEE Asilomar Conference on Signals, Systems, and Computers 2018

  4. arXiv:1802.09087  [pdf, other

    cs.IT

    Cache-Aided Fog Radio Access Networks with Partial Connectivity

    Authors: Ahmed Roushdy, Abolfazl Seyed Motahari, Mohammed Nafie, Deniz Gunduz

    Abstract: Centralized coded caching and delivery is studied for a partially-connected fog radio access network (F-RAN), whereby a set of H edge nodes (ENs) (without caches), connected to a cloud server via orthogonal fronthaul links, serve K users over the wireless edge. The cloud server is assumed to hold a library of N files, each of size F bits; and each user, equipped with a cache of size MF bits, is co… ▽ More

    Submitted 25 February, 2018; originally announced February 2018.

    Comments: To appear at the 2018 IEEE Wireless Communications and Networking Conference (WCNC)

  5. arXiv:1801.04352  [pdf, other

    cs.IT

    On the Capacity Region of the Deterministic Y-Channel with Common and Private Messages

    Authors: Mohamed S. Ibrahim, Mohammed Nafie, Yahya Mohasseb

    Abstract: In multi user Gaussian relay networks, it is desirable to transmit private information to each user as well as common information to all of them. However, the capacity region of such networks with both kinds of information is not easy to characterize. The prior art used simple linear deterministic models in order to approximate the capacities of these Gaussian networks. This paper discusses the ca… ▽ More

    Submitted 12 January, 2018; originally announced January 2018.

    Comments: 4 figures, 7 pages

  6. arXiv:1712.05957  [pdf, other

    cs.IT

    Degrees of Freedom of Interference Networks with Transmitter-Side Caches

    Authors: Antonious M. Girgis, Ozgur Ercetin, Mohammed Nafie, Tamer ElBatt

    Abstract: This paper studies cache-aided interference networks with arbitrary number of transmitters and receivers, whereby each transmitter has a cache memory of finite size. Each transmitter fills its cache memory from a content library of files in the placement phase. In the subsequent delivery phase, each receiver requests one of the library files, and the transmitters are responsible for delivering the… ▽ More

    Submitted 16 December, 2017; originally announced December 2017.

  7. SWIPT using Hybrid ARQ over Time Varying Channels

    Authors: Mehdi Salehi Heydar Abad, Ozgur Ercetin, Mohamed Nafie, Tamer Elbatt

    Abstract: We consider a class of wireless powered devices employing Hybrid Automatic Repeat reQuest (HARQ) to ensure reliable end-to-end communications over a two-state time-varying channel. A receiver, with no power source, relies on the energy transferred by a Simultaneous Wireless Information and Power Transfer (SWIPT) enabled transmitter to \emph{receive} and \emph{decode} information. Under the two-sta… ▽ More

    Submitted 12 February, 2019; v1 submitted 8 November, 2017; originally announced November 2017.

    Journal ref: IEEE Transactions on Green Communications and Networking ( Volume: 2 , Issue: 4 , Dec. 2018 )

  8. arXiv:1702.05528  [pdf, other

    cs.IT

    Degrees of Freedom in Cached MIMO Relay Networks With Multiple Base Stations

    Authors: Osama A. Hanna, Amr El-Keyi, Mohammed Nafie

    Abstract: The ability of physical layer relay caching to increase the degrees of freedom (DoF) of a single cell was recently illustrated. In this paper, we extend this result to the case of multiple cells in which a caching relay is shared among multiple non-cooperative base stations (BSs). In particular, we show that a large DoF gain can be achieved by exploiting the benefits of having a shared relay that… ▽ More

    Submitted 17 February, 2017; originally announced February 2017.

  9. Decentralized Coded Caching in Wireless Networks: Trade-off between Storage and Latency

    Authors: Antonious M. Girgis, Ozgur Ercetin, Mohammed Nafie, Tamer ElBatt

    Abstract: This paper studies the decentralized coded caching for a Fog Radio Access Network (F-RAN), whereby two edge-nodes (ENs) connected to a cloud server via fronthaul links with limited capacity are serving the requests of $K_r$ users. We consider all ENs and users are equipped with caches. A decentralized content placement is proposed to independently store contents at each network node during the off… ▽ More

    Submitted 25 January, 2017; v1 submitted 23 January, 2017; originally announced January 2017.

    Comments: To appear in IEEE ISIT 2017

  10. arXiv:1608.00209  [pdf, other

    cs.IT

    Asymmetric Degrees of Freedom of the Full-Duplex MIMO 3-Way Channel with Unicast and Broadcast Messages

    Authors: Adel M. Elmahdy, Amr El-Keyi, Yahya Mohasseb, Tamer ElBatt, Mohammed Nafie, Karim G. Seddik, Tamer Khattab

    Abstract: In this paper, we characterize the asymmetric total degrees of freedom (DoF) of a multiple-input multiple-output (MIMO) 3-way channel. Each node has a separate-antenna full-duplex MIMO transceiver with a different number of antennas, where each antenna can be configured for either signal transmission or reception. We study this system under two message configurations; the first configuration is wh… ▽ More

    Submitted 31 July, 2016; originally announced August 2016.

  11. Optimal Energy Allocation For Delay-Constrained Traffic Over Fading Multiple Access Channels

    Authors: Antonious M. Girgis, Amr El-Keyi, Mohammed Nafie

    Abstract: In this paper, we consider a multiple-access fading channel where $N$ users transmit to a single base station (BS) within a limited number of time slots. We assume that each user has a fixed amount of energy available to be consumed over the transmission window. We derive the optimal energy allocation policy for each user that maximizes the total system throughput under two different assumptions o… ▽ More

    Submitted 12 September, 2016; v1 submitted 3 July, 2016; originally announced July 2016.

    Comments: IEEE Global Communications Conference: Wireless Communications (Globecom2016 WC)

  12. Proactive Location-Based Scheduling of Delay-Constrained Traffic Over Fading Channels

    Authors: Antonious M. Girgis, Amr El-Keyi, Mohammed Nafie, Ramy Gohary

    Abstract: In this paper, proactive resource allocation based on user location for point-to-point communication over fading channels is introduced, whereby the source must transmit a packet when the user requests it within a deadline of a single time slot. We introduce a prediction model in which the source predicts the request arrival $T_p$ slots ahead, where $T_p$ denotes the prediction window (PW) size. T… ▽ More

    Submitted 1 July, 2016; originally announced July 2016.

    Comments: Conference: VTC2016-Fall, At Montreal-Canada

  13. arXiv:1605.07069  [pdf, other

    cs.IT

    On the Degrees of Freedom of SISO X-networks with Synergistic Alternating Channel State Information at transmitters

    Authors: Ahmed Wagdy Shaban, Amr El-Keyi, Tamer Khattab, Mohammed Nafie

    Abstract: In this paper, we consider the two-user single-input single-output (SISO) X-channel and $K$-user SISO X-network in fast fading environment. It is assumed that the transmitters have access to synergistic alternating channel state information (CSI). Specifically, the CSIT alternates between three states, namely, perfect, delayed and no-CSIT, in a certain manner to enable these states to work togethe… ▽ More

    Submitted 23 May, 2016; originally announced May 2016.

    Comments: 30 pages, 5 Figures, To be submitted soon isA. A part of this paper was published on IEEE ISIT 2014 and available, arXiv:1404.6348

  14. arXiv:1605.02928  [pdf, other

    cs.IT

    Achievable Degrees of Freedom of the K-user MISO Broadcast Channel with Alternating CSIT via Interference Creation-Resurrection

    Authors: Mohamed Seif, Amr El-Keyi, Mohammed Nafie

    Abstract: Channel state information at the transmitter affects the degrees of freedom of the wireless networks. In this paper, we analyze the DoF for the K-user multiple-input single-output (MISO) broadcast channel (BC) with synergistic alternating channel state information at the transmitter (CSIT). Specifically, the CSIT of each user alternates between three states, namely, perfect CSIT (P), delayed CSIT… ▽ More

    Submitted 10 May, 2016; originally announced May 2016.

    Comments: 6 Pages, IEEE 84th Vehicular Technology Conference: VTC 2016-Fall, Montreal, Canada, Sept. 2016. arXiv admin note: text overlap with arXiv:1109.4314 by other authors

  15. Achievable Degrees of Freedom on K-user MIMO Multi-way Relay Channel with Common and Private Messages

    Authors: Mohamed Salah, Amr El-Keyi, Yahya Mohasseb, Mohammed Nafie

    Abstract: This paper investigates the achievable total degrees of freedom (DoF) of the MIMO multi-way relay channel that consists of K users, where each user is equipped with M antennas, and a decode-and-forward relay equipped with N antennas. In this channel, each user wants to convey K-1 private messages to the other users in addition to a common message to all of them. Due to the absence of direct links… ▽ More

    Submitted 15 October, 2015; v1 submitted 1 October, 2015; originally announced October 2015.

    Comments: 5 double-column pages, 2 figures, 1 table, the paper will be presented at the IEEE Asilomar Conference Nov. 2015

  16. arXiv:1506.08895  [pdf, ps, other

    cs.IT

    Sensing/Decision-Based Cooperative Relaying Schemes With Multi-Access Transmission: Stability Region And Average Delay Characterization

    Authors: Mohamed Salman, Amr El-Keyi, Mohammed Nafie, Mazen Omar Hasna

    Abstract: We consider a cooperative relaying system which consists of a number of source terminals, one shared relay, and a common destination with multi-packet reception (MPR) capability. In this paper, we study the stability and delay analysis for two cooperative relaying schemes; the sensing-based cooperative (SBC) scheme and the decision-based cooperative (DBC) scheme. In the SBC scheme, the relay sense… ▽ More

    Submitted 29 June, 2015; originally announced June 2015.

    Comments: 13 pages, 10 figures

  17. arXiv:1502.02868  [pdf, other

    cs.IT cs.NI

    Maximum Throughput Opportunistic Network Coding in Two-Way Relay Networks

    Authors: Maha Zohdy, Tamer ElBatt, Mohamed Nafie

    Abstract: In this paper, we study Two-way relaying networks well-known for its throughput merits. In particular, we study the fundamental throughput delay trade-off in two-way relaying networks using opportunistic network coding. We characterize the optimal opportunistic network coding policy that maximizes the aggregate network throughput subject to an average packet delay constraint. Towards this objectiv… ▽ More

    Submitted 10 February, 2015; originally announced February 2015.

    Comments: 6 pages, 4 figures

  18. A Probabilistic MAC for Cognitive Radio Systems with Energy Harvesting Nodes

    Authors: Ramy E. Ali, Fadel F. Digham, Karim G. Seddik, Mohammed Nafie, Amr El-Keyi, Zhu Han

    Abstract: In this paper, we consider a cognitive radio (CR) system where the secondary user (SU) harvests energy from both the nature resources and the primary user (PU) radio frequency(RF) signal. We propose an energy-based probabilistic access scheme in which SU probabilistically accesses and senses the primary channel. The decision is based on the available energy and the PU's activity. We investigate th… ▽ More

    Submitted 29 October, 2014; v1 submitted 1 August, 2014; originally announced August 2014.

    Comments: 5 pages, IEEE GlobalSIP 2014

  19. arXiv:1407.8348  [pdf, ps, other

    cs.IT

    On the Degrees of Freedom of SISO X-Channel with Alternating CSIT

    Authors: Ahmed Wagdy, Amr El-Keyi, Tamer Khattab, Mohammed Nafie

    Abstract: In this paper, we establish the degrees of freedom (DoF) of the two-user single input single output (SISO) X-channel with alternating channel state information at the transmitters (CSIT). Three cases are considered for the availability of CSIT; perfect, delayed and no-CSIT. Each state is associated with a fraction of time denoted by $λ_P, λ_D$ and $λ_N $, respectively. We provide new results for D… ▽ More

    Submitted 31 July, 2014; originally announced July 2014.

    Comments: It is only a draft insha'Allah. arXiv admin note: substantial text overlap with arXiv:1404.6348

  20. arXiv:1407.2981  [pdf, other

    cs.IT

    The asymmetric DoF Region for the 3-user MxN Interference Channel

    Authors: Mohamed Khalil, Tamer Khattab, Amr El-Keyi, Mohammed Nafie

    Abstract: In this paper, the 3-user Gaussian MIMO interference channel is considered. The asymmetric distribution of the DoF, where different users have different number of DoF, is studied. Two cases are presented, the first is when all transmitters and receivers have equal number of antennas $M$, the other when the transmitters have $M$ antennas each, while the receivers have $N$ antennas each. It is assum… ▽ More

    Submitted 10 July, 2014; originally announced July 2014.

  21. arXiv:1404.6348  [pdf, ps, other

    cs.IT

    A DoF-Optimal Scheme for the two-user X-channel with Synergistic Alternating CSIT

    Authors: Ahmed Wagdy, Amr El-Keyi, Tamer Khattab, Mohammed Nafie

    Abstract: In this paper, the degrees of freedom (DoF) of the two-user single input single output (SISO) X-channel are investigated. Three cases are considered for the availability of channel state information at the transmitters (CSIT); perfect, delayed, and no-CSIT. A new achievable scheme is proposed to elucidate the potency of interference creation-resurrection (IRC) when the available CSIT alternates be… ▽ More

    Submitted 25 April, 2014; originally announced April 2014.

    Comments: accepted at 2014 IEEE International Symposium on Information Theory for presentation at the symposium and for publication in the proceedings

  22. Using Network Coding to Achieve the Capacity of Deterministic Relay Networks with Relay Messages

    Authors: Ahmed A. Zewail, Yahya Mohasseb, Mohammed Nafie, Hesham El Gamal

    Abstract: In this paper, we derive the capacity of the deterministic relay networks with relay messages. We consider a network which consists of five nodes, four of which can only communicate via the fifth one. However, the fifth node is not merely a relay as it may exchange private messages with the other network nodes. First, we develop an upper bound on the capacity region based on the notion of a single… ▽ More

    Submitted 26 April, 2014; v1 submitted 18 April, 2014; originally announced April 2014.

    Comments: 12 pages, 5 figures, submitted to IEEE JSAC Network coding

  23. A Pricing-Based Cooperative Spectrum Sharing Stackelberg Game

    Authors: Ramy E. Ali, Karim G. Seddik, Mohammed Nafie, Fadel F. Digham

    Abstract: We consider the problem of cooperative spectrum sharing among a primary user (PU) and multiple secondary users (SUs) under quality of service (QoS) constraints. The SUs network is controlled by the PU through a relay which gets a revenue for amplifying and forwarding the SUs signals to their respective destinations. The relay charges each SU a different price depending on its received signal-to-in… ▽ More

    Submitted 28 March, 2014; v1 submitted 19 December, 2013; originally announced December 2013.

    Comments: 7 pages. IEEE, WiOpt 2014

  24. arXiv:1308.1761  [pdf, other

    cs.IT

    The Deterministic Capacity of Relay Networks with Relay Private Messages

    Authors: Ahmed A. Zewail, Y. Mohasseb, M. Nafie, H. EL Gamal

    Abstract: We study the capacity region of a deterministic 4-node network, where 3 nodes can only communicate via the fourth one. However, the fourth node is not merely a relay since it can exchange private messages with all other nodes. This situation resembles the case where a base station relays messages between users and delivers messages between the backbone system and the users. We assume an asymmetric… ▽ More

    Submitted 8 August, 2013; originally announced August 2013.

    Comments: 3 figures, accepted at ITW 2013

  25. arXiv:1307.4744  [pdf, ps, other

    cs.IT cs.NI

    On the Coexistence of a Primary User with an Energy Harvesting Secondary User: A Case of Cognitive Cooperation

    Authors: Ahmed El Shafie, Tamer Khattab, Amr El-Keyi, Mohamed Nafie

    Abstract: In this paper, we consider a cognitive scenario where an energy harvesting secondary user (SU) shares the spectrum with a primary user (PU). The secondary source helps the primary source in delivering its undelivered packets during periods of silence of the primary source. The primary source has a queue for storing its data packets, whereas the secondary source has two data queues; a queue for sto… ▽ More

    Submitted 27 July, 2014; v1 submitted 6 July, 2013; originally announced July 2013.

    Comments: Accepted for publication in Wireless Communications & Mobile Computing (WCMC)

  26. arXiv:1307.0685  [pdf, other

    cs.IT

    Achievable Degrees of Freedom Region of the MIMO Relay Networks using the Detour Schemes

    Authors: Ahmed A. Zewail, M. Nafie, Y. Mohasseb, H. EL Gamal

    Abstract: In this paper, we study the degrees of freedom (DoF) of the MIMO relay networks. We start with a general Y channel, where each user has $M_i$ antennas and aims to exchange messages with the other two users via a relay equipped with $N$ antennas. Then, we extend our work to a general 4-user MIMO relay network. Unlike most previous work which focused on the total DoF of the network, our aim here is… ▽ More

    Submitted 28 February, 2014; v1 submitted 2 July, 2013; originally announced July 2013.

    Comments: 6 pages, 2 figure, to appear in ICC 2014

  27. arXiv:1304.4464  [pdf, ps, other

    cs.IT

    The Deterministic Multicast Capacity of 4-Node Relay Networks

    Authors: Ahmed A. Zewail, M. Nafie, Y. Mohasseb, H. El Gamal

    Abstract: In this paper, we completely characterize the deterministic capacity region of a four-node relay network with no direct links between the nodes, where each node communicates with the three other nodes via a relay. Towards this end, we develop an upper bound on the deterministic capacity region, based on the notion of a one-sided genie. To establish achievability, we use the detour schemes that ach… ▽ More

    Submitted 16 April, 2013; originally announced April 2013.

    Comments: 5 pages, 2 figures, accepted at ISIT'13

  28. arXiv:1211.5720  [pdf, ps, other

    cs.NI

    Cognitive Radio Transmission Strategies for Primary Markovian Channels

    Authors: Ahmed ElSamadouny, Mohammed Nafie, Ahmed Sultan

    Abstract: A fundamental problem in cognitive radio systems is that the cognitive radio is ignorant of the primary channel state and, hence, of the amount of actual harm it inflicts on the primary license holder. Sensing the primary transmitter does not help in this regard. To tackle this issue, we assume in this paper that the cognitive user can eavesdrop on the ACK/NACK Automatic Repeat reQuest (ARQ) fed b… ▽ More

    Submitted 24 November, 2012; originally announced November 2012.

    Comments: Journal paper. arXiv admin note: substantial text overlap with arXiv:1008.3998

  29. arXiv:1206.6302  [pdf, ps, other

    cs.IT cs.NI

    Maximum Secondary Stable Throughput of a Cooperative Secondary Transmitter-Receiver Pair: Protocol Design and Stability Analysis

    Authors: Ahmed El Shafie, Tamer Khattab, Amr El-Keyi, Mohamed Nafie

    Abstract: In this paper, we investigate the impact of cooperation between a secondary transmitter-receiver pair and a primary transmitter (PT) on the maximum stable throughput of the primary-secondary network. Each transmitter, primary or secondary, has a buffer for storing its own traffic. In addition to its own buffer, the secondary transmitter (ST) has a buffer for storing a fraction of the undelivered p… ▽ More

    Submitted 9 June, 2014; v1 submitted 27 June, 2012; originally announced June 2012.

    Comments: Journal: Mobile Communications and Applications

  30. On the Diversity Gain Region of the Z-interference Channels

    Authors: Mohamed S. Nafea, Karim G. Seddik, Mohammed Nafie, Hesham El Gamal

    Abstract: In this work, we analyze the diversity gain region (DGR) of the single-antenna Rayleigh fading Z-Interference channel (ZIC). More specifically, we characterize the achievable DGR of the fixed-power split Han-Kobayashi (HK) approach under these assumptions. Our characterization comes in a closed form and demonstrates that the HK scheme with only a common message is a singular case, which achieves t… ▽ More

    Submitted 3 April, 2012; v1 submitted 12 February, 2012; originally announced February 2012.

    Comments: Has been accepted by IEEE ICC 2012 - Communications Theory symposium(CT)

  31. arXiv:1202.1740  [pdf, ps, other

    cs.IT

    A Diversity-Multiplexing-Delay Tradeoff of ARQ Protocols in The Z-interference Channel

    Authors: Mohamed S. Nafea, D. Hamza, Karim G. Seddik, Mohammed Nafie, Hesham El Gamal

    Abstract: In this work, we analyze the fundamental performance tradeoff of the single-antenna Automatic Retransmission reQuest (ARQ) Z-interference channel (ZIC). Specifically, we characterize the achievable three-dimensional tradeoff between diversity (reliability), multiplexing (throughput), and delay (maximum number of retransmissions) of two ARQ protocols: A non-cooperative protocol and a cooperative on… ▽ More

    Submitted 3 April, 2012; v1 submitted 8 February, 2012; originally announced February 2012.

    Comments: Submitted to International Symposium on Information Theory (ISIT) 2012

  32. arXiv:1106.0264  [pdf

    cs.IT

    Achievable Degrees of Freedom of the K-user Interference Channel with Partial Cooperation

    Authors: Ahmed A. Naguib, Khaled Elsayed, Mohammed Nafie

    Abstract: In this paper, we consider the K-user interference channel with partial cooperation, where a strict subset of the K users cooperate. For the K-user interference channel with cooperating subsets of length M, the outer bound of the total degrees of freedom is KM/(M+1). In this paper, we propose a signal space-based interference alignment scheme that proves the achievability of these degrees of freed… ▽ More

    Submitted 1 June, 2011; originally announced June 2011.

  33. Distributed Spectrum Sensing with Sequential Ordered Transmissions to a Cognitive Fusion Center

    Authors: Laila Hesham, Ahmed Sultan, Mohammed Nafie

    Abstract: Cooperative spectrum sensing is a robust strategy that enhances the detection probability of primary licensed users. However, a large number of detectors reporting to a fusion center for a final decision causes significant delay and also presumes the availability of unreasonable communication resources at the disposal of a network searching for spectral opportunities. In this work, we employ the i… ▽ More

    Submitted 30 May, 2011; originally announced May 2011.

    Comments: 14 pages, 9 figures

  34. arXiv:1105.4026  [pdf, other

    cs.IT

    A New Achievable DoF Region for the 3-user MxN Symmetric Interference Channel

    Authors: Mohamed Amir, Amr El-Keyi, Mohammed Nafie

    Abstract: In this paper, the 3-user multiple-input multiple-output Gaussian interference channel with M antennas at each transmitter and N antennas at each receiver is considered. It is assumed that the channel coefficients are constant and known to all transmitters and receivers. A novel scheme is presented that spans a new achievable degrees of freedom region. For some values of M and N, the proposed sche… ▽ More

    Submitted 20 May, 2011; originally announced May 2011.

    Comments: Submitted to ITW 2011

  35. arXiv:1102.1498  [pdf, ps, other

    cs.IT

    On Rate-Splitting by a Secondary Link in Multiple Access Primary Network

    Authors: John Tadrous, Mohammed Nafie

    Abstract: An achievable rate region is obtained for a primary multiple access network coexisting with a secondary link of one transmitter and a corresponding receiver. The rate region depicts the sum primary rate versus the secondary rate and is established assuming that the secondary link performs rate-splitting. The achievable rate region is the union of two types of achievable rate regions. The first typ… ▽ More

    Submitted 7 February, 2011; originally announced February 2011.

  36. arXiv:1012.0384  [pdf, ps, other

    math.OC cs.IT math-ph

    Adaptive Sensing and Transmission Durations for Cognitive Radios

    Authors: Wessam Afifi, Ahmed Sultan, Mohammed Nafie

    Abstract: In a cognitive radio setting, secondary users opportunistically access the spectrum allocated to primary users. Finding the optimal sensing and transmission durations for the secondary users becomes crucial in order to maximize the secondary throughput while protecting the primary users from interference and service disruption. In this paper an adaptive sensing and transmission scheme for cognitiv… ▽ More

    Submitted 3 December, 2010; v1 submitted 2 December, 2010; originally announced December 2010.

    Comments: 9 pages, 9 figures, conference

  37. arXiv:1008.3998  [pdf, ps, other

    cs.IT

    Cognitive Radio Transmission Strategies for Primary Erasure Channels

    Authors: Ahmed El-Samadony, Mohammed Nafie, Ahmed Sultan

    Abstract: A fundamental problem in cognitive radio systems is that the cognitive radio is ignorant of the primary channel state and the interference it inflicts on the primary license holder. In this paper we assume that the primary transmitter sends packets across an erasure channel and the primary receiver employs ACK/NAK feedback (ARQ) to retransmit erased packets. The cognitive radio can eavesdrop on th… ▽ More

    Submitted 24 August, 2010; originally announced August 2010.

    Comments: 7 pages

  38. arXiv:1002.1584  [pdf, ps, other

    cs.IT cs.NI math.OC

    Power Control for Maximum Throughput in Spectrum Underlay Cognitive Radio Networks

    Authors: John Tadrous, Ahmed Sultan, Mohammed Nafie, Amr El-Keyi

    Abstract: We investigate power allocation for users in a spectrum underlay cognitive network. Our objective is to find a power control scheme that allocates transmit power for both primary and secondary users so that the overall network throughput is maximized while maintaining the quality of service (QoS) of the primary users greater than a certain minimum limit. Since an optimum solution to our problem… ▽ More

    Submitted 8 February, 2010; originally announced February 2010.

  39. arXiv:0911.0820  [pdf, ps, other

    cs.IT

    Power and Transmission Duration Control for Un-Slotted Cognitive Radio Networks

    Authors: Ahmed Ahmedin, Marwa Ali, Ahmed Sultan, Mohammed Nafie

    Abstract: We consider an unslotted primary channel with alternating on/off activity and provide a solution to the problem of finding the optimal secondary transmission power and duration given some sensing outcome. The goal is to maximize a weighted sum of the primary and secondary throughput where the weight is determined by the minimum rate required by the primary terminals. The primary transmitter send… ▽ More

    Submitted 11 November, 2009; v1 submitted 4 November, 2009; originally announced November 2009.

    Comments: submitted to DySPAN 2010

  40. arXiv:0909.5310  [pdf, ps, other

    cs.IT

    Cognitive Power Control Under Correlated Fading and Primary-Link CSI

    Authors: Doha Hamza, Mohammed Nafie

    Abstract: We consider the cognitive power control problem of maximizing the secondary throughput under an outage probability constraint on a constant-power constant-rate primary link. We assume a temporally correlated primary channel with two types of feedback: perfect delayed channel state information (CSI) and one-bit automatic repeat request (ARQ). We use channel correlation to enhance the primary and… ▽ More

    Submitted 29 September, 2009; originally announced September 2009.

    Comments: 5 pages, 4 figures, submitted to ICC 2010