Skip to main content

Showing 1–4 of 4 results for author: Shaban, W

.
  1. arXiv:2402.12595  [pdf, ps, other

    eess.SP cs.LG

    Truncated Polynomial Expansion-Based Detection in Massive MIMO: A Model-Driven Deep Learning Approach

    Authors: Kazem Izadinasab, Ahmed Wagdy Shaban, Oussama Damen

    Abstract: In this paper, we propose a deep learning (DL)-based approach for efficiently computing the inverse of Hermitian matrices using truncated polynomial expansion (TPE). Our model-driven approach involves optimizing the coefficients of the TPE during an offline training procedure for a given number of TPE terms. We apply this method to signal detection in uplink massive multiple-input multiple-output… ▽ More

    Submitted 19 February, 2024; originally announced February 2024.

    Comments: 5 pages, 2 figures, 2 tables

  2. arXiv:1812.06390  [pdf, ps, other

    math-ph math.AP

    Radiation Conditions for the Difference Schrödinger Operators

    Authors: W. Shaban, B. Vainberg

    Abstract: The problem of determining a unique solution of the Schrödinger equation $\left(Δ+q-λ\right) ψ=f$ on the lattice $\mathbb{Z}^{d}$ is considered, where $Δ$ is the difference Laplacian and both $f$ and $q$ have finite supports$.$ It is shown that there is an exceptional set $S_{0}$ of points on $Sp(Δ)=[-2d,2d]$ for which the limiting absorption principle fails, even for unperturbed operator (… ▽ More

    Submitted 16 December, 2018; originally announced December 2018.

    MSC Class: 35P25; 47B39

    Journal ref: Published in "Applicable Analysis", 80 (2001), 525-556

  3. arXiv:1605.07069  [pdf, other

    cs.IT

    On the Degrees of Freedom of SISO X-networks with Synergistic Alternating Channel State Information at transmitters

    Authors: Ahmed Wagdy Shaban, Amr El-Keyi, Tamer Khattab, Mohammed Nafie

    Abstract: In this paper, we consider the two-user single-input single-output (SISO) X-channel and $K$-user SISO X-network in fast fading environment. It is assumed that the transmitters have access to synergistic alternating channel state information (CSI). Specifically, the CSIT alternates between three states, namely, perfect, delayed and no-CSIT, in a certain manner to enable these states to work togethe… ▽ More

    Submitted 23 May, 2016; originally announced May 2016.

    Comments: 30 pages, 5 Figures, To be submitted soon isA. A part of this paper was published on IEEE ISIT 2014 and available, arXiv:1404.6348

  4. arXiv:1501.03617  [pdf

    cs.CR

    Confidential Algorithm for Golden Cryptography Using Haar Wavelet

    Authors: Marghny H. Mohamed, Yousef B. Mahdy, Wafaa Abd El-Wahed Shaban

    Abstract: One of the most important consideration techniques when one want to solve the protecting of digital signal is the golden matrix. The golden matrices can be used for creation of a new kind of cryptography called the golden cryptography. Many research papers have proved that the method is very fast and simple for technical realization and can be used for cryptographic protection of digital signals.… ▽ More

    Submitted 15 January, 2015; originally announced January 2015.