-
Rises for Measuring Local Distributivity in Lattices
Authors:
Mohammad Abdulla,
Tobias Hille,
Dominik Dürrschnabel,
Gerd Stumme
Abstract:
Distributivity is a well-established and extensively studied notion in lattice theory. In the context of data analysis, particularly within Formal Concept Analysis (FCA), lattices are often observed to exhibit a high degree of distributivity. However, no standardized measure exists to quantify this property. In this paper, we introduce the notion of rises in (concept) lattices as a means to assess…
▽ More
Distributivity is a well-established and extensively studied notion in lattice theory. In the context of data analysis, particularly within Formal Concept Analysis (FCA), lattices are often observed to exhibit a high degree of distributivity. However, no standardized measure exists to quantify this property. In this paper, we introduce the notion of rises in (concept) lattices as a means to assess distributivity. Rises capture how the number of attributes or objects in covering concepts change within the concept lattice. We show that a lattice is distributive if and only if no non-unit rises occur. Furthermore, we relate rises to the classical notion of meet- and join distributivity. We observe that concept lattices from real-world data are to a high degree join-distributive, but much less meet-distributive. We additionally study how join-distributivity manifests on the level of ordered sets.
△ Less
Submitted 29 June, 2025;
originally announced June 2025.
-
Variance-Optimal Arm Selection: Regret Minimization and Best Arm Identification
Authors:
Sabrina Khurshid,
Gourab Ghatak,
Mohammad Shahid Abdulla
Abstract:
This paper focuses on selecting the arm with the highest variance from a set of $K$ independent arms. Specifically, we focus on two settings: (i) regret setting, that penalizes the number of pulls of suboptimal arms in terms of variance, and (ii) fixed-budget BAI setting, that evaluates the ability of an algorithm to determine the arm with the highest variance after a fixed number of pulls. We dev…
▽ More
This paper focuses on selecting the arm with the highest variance from a set of $K$ independent arms. Specifically, we focus on two settings: (i) regret setting, that penalizes the number of pulls of suboptimal arms in terms of variance, and (ii) fixed-budget BAI setting, that evaluates the ability of an algorithm to determine the arm with the highest variance after a fixed number of pulls. We develop a novel online algorithm called \texttt{UCB-VV} for the regret setting and show that its upper bound on regret for bounded rewards evolves as $\mathcal{O}\left(\log{n}\right)$ where $n$ is the horizon. By deriving the lower bound on the regret, we show that \texttt{UCB-VV} is order optimal. For the fixed budget BAI setting, we propose the \texttt{SHVV} algorithm. We show that the upper bound of the error probability of \texttt{SHVV} evolves as $\exp\left(-\frac{n}{\log(K) H}\right)$, where $H$ represents the complexity of the problem, and this rate matches the corresponding lower bound. We extend the framework from bounded distributions to sub-Gaussian distributions using a novel concentration inequality on the sample variance. Leveraging the same, we derive a concentration inequality for the empirical Sharpe ratio (SR) for sub-Gaussian distributions, which was previously unknown in the literature. Empirical simulations show that \texttt{UCB-VV} consistently outperforms \texttt{$ε$-greedy} across different sub-optimality gaps, though it is surpassed by \texttt{VTS}, which exhibits the lowest regret, albeit lacking in theoretical guarantees. We also illustrate the superior performance of \texttt{SHVV}, for a fixed budget setting under 6 different setups against uniform sampling. Finally, we conduct a case study to empirically evaluate the performance of the \texttt{UCB-VV} and \texttt{SHVV} in call option trading on $100$ stocks generated using geometric Brownian motion (GBM).
△ Less
Submitted 20 May, 2025; v1 submitted 17 May, 2025;
originally announced May 2025.
-
Optimizing Sharpe Ratio: Risk-Adjusted Decision-Making in Multi-Armed Bandits
Authors:
Sabrina Khurshid,
Mohammed Shahid Abdulla,
Gourab Ghatak
Abstract:
Sharpe Ratio (SR) is a critical parameter in characterizing financial time series as it jointly considers the reward and the volatility of any stock/portfolio through its variance. Deriving online algorithms for optimizing the SR is particularly challenging since even offline policies experience constant regret with respect to the best expert Even-Dar et al (2006). Thus, instead of optimizing the…
▽ More
Sharpe Ratio (SR) is a critical parameter in characterizing financial time series as it jointly considers the reward and the volatility of any stock/portfolio through its variance. Deriving online algorithms for optimizing the SR is particularly challenging since even offline policies experience constant regret with respect to the best expert Even-Dar et al (2006). Thus, instead of optimizing the usual definition of SR, we optimize regularized square SR (RSSR). We consider two settings for the RSSR, Regret Minimization (RM) and Best Arm Identification (BAI). In this regard, we propose a novel multi-armed bandit (MAB) algorithm for RM called UCB-RSSR for RSSR maximization. We derive a path-dependent concentration bound for the estimate of the RSSR. Based on that, we derive the regret guarantees of UCB-RSSR and show that it evolves as O(log n) for the two-armed bandit case played for a horizon n. We also consider a fixed budget setting for well-known BAI algorithms, i.e., sequential halving and successive rejects, and propose SHVV, SHSR, and SuRSR algorithms. We derive the upper bound for the error probability of all proposed BAI algorithms. We demonstrate that UCB-RSSR outperforms the only other known SR optimizing bandit algorithm, U-UCB Cassel et al (2023). We also establish its efficacy with respect to other benchmarks derived from the GRA-UCB and MVTS algorithms. We further demonstrate the performance of proposed BAI algorithms for multiple different setups. Our research highlights that our proposed algorithms will find extensive applications in risk-aware portfolio management problems. Consequently, our research highlights that our proposed algorithms will find extensive applications in risk-aware portfolio management problems.
△ Less
Submitted 28 May, 2024;
originally announced June 2024.
-
The Birkhoff completion of finite lattices
Authors:
Mohammad Abdulla,
Johannes Hirth,
Gerd Stumme
Abstract:
We introduce the Birkhoff completion as the smallest distributive lattice in which a given finite lattice can be embedded as semi-lattice. We discuss its relationship to implicational theories, in particular to R. Wille's simply-implicational theories. By an example, we show how the Birkhoff completion can be used as a tool for ordinal data science.
We introduce the Birkhoff completion as the smallest distributive lattice in which a given finite lattice can be embedded as semi-lattice. We discuss its relationship to implicational theories, in particular to R. Wille's simply-implicational theories. By an example, we show how the Birkhoff completion can be used as a tool for ordinal data science.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Current Studies and Applications of Shuffled Frog Leaping Algorithm: A Review
Authors:
Bestan B. Maaroof,
Tarik A. Rashid,
Jaza M. Abdulla,
Bryar A. Hassan,
Abeer Alsadoon,
Mokhtar Mohammadi,
Mohammad Khishe,
Seyedali Mirjalili
Abstract:
Shuffled Frog Leaping Algorithm (SFLA) is one of the most widespread algorithms. It was developed by Eusuff and Lansey in 2006. SFLA is a population-based metaheuristic algorithm that combines the benefits of memetics with particle swarm optimization. It has been used in various areas, especially in engineering problems due to its implementation easiness and limited variables. Many improvements ha…
▽ More
Shuffled Frog Leaping Algorithm (SFLA) is one of the most widespread algorithms. It was developed by Eusuff and Lansey in 2006. SFLA is a population-based metaheuristic algorithm that combines the benefits of memetics with particle swarm optimization. It has been used in various areas, especially in engineering problems due to its implementation easiness and limited variables. Many improvements have been made to the algorithm to alleviate its drawbacks, whether they were achieved through modifications or hybridizations with other well-known algorithms. This paper reviews the most relevant works on this algorithm. An overview of the SFLA is first conducted, followed by the algorithm's most recent modifications and hybridizations. Next, recent applications of the algorithm are discussed. Then, an operational framework of SLFA and its variants is proposed to analyze their uses on different cohorts of applications. Finally, future improvements to the algorithm are suggested. The main incentive to conduct this survey to provide useful information about the SFLA to researchers interested in working on the algorithm's enhancement or application
△ Less
Submitted 27 January, 2022;
originally announced February 2022.
-
Remote Teaching and Learning in Applied Engineering: A Post-Pandemic Perspective
Authors:
Mouhamed Abdulla,
Weijing Ma
Abstract:
The COVID-19 pandemic significantly disrupted the educational sector. Faced with this life-threatening pandemic, educators had to swiftly pivot to an alternate form of course delivery without severely impacting the quality of the educational experience. Following the transition to online learning, educators had to grapple with a host of challenges. With interrupted face-to-face delivery, limited a…
▽ More
The COVID-19 pandemic significantly disrupted the educational sector. Faced with this life-threatening pandemic, educators had to swiftly pivot to an alternate form of course delivery without severely impacting the quality of the educational experience. Following the transition to online learning, educators had to grapple with a host of challenges. With interrupted face-to-face delivery, limited access to state-of-the-art labs, barriers with educational technologies, challenges of academic integrity, and obstacles with remote teamwork and student participation, creative solutions were urgently needed. In this chapter, we provide a rationale for a variety of course delivery models at different stages of the pandemic and highlight the approaches we took to overcome some of the pressing challenges of remote education. We also discuss how we ensured that hands-on learning remains an integral part of engineering curricula, and we argue that some of the applied changes during the pandemic will likely serve as a catalyst for modernizing education.
△ Less
Submitted 5 August, 2021;
originally announced August 2021.
-
Latency of Concatenating Unlicensed LPWAN with Cellular IoT: An Experimental QoE Study
Authors:
Alvin Ramoutar,
Zohreh Motamedi,
Mouhamed Abdulla
Abstract:
Developing low-power wide-area network (LPWAN) solutions that are efficient to adopt, deploy and maintain are vital for smart cities. The poor quality-of-service of unlicensed LPWAN, and the high service cost of LTE-M/NB-IoT are key disadvantages of these technologies. Concatenating unlicensed with licensed LPWANs can overcome these limitations and harness their benefits. However, a concatenated L…
▽ More
Developing low-power wide-area network (LPWAN) solutions that are efficient to adopt, deploy and maintain are vital for smart cities. The poor quality-of-service of unlicensed LPWAN, and the high service cost of LTE-M/NB-IoT are key disadvantages of these technologies. Concatenating unlicensed with licensed LPWANs can overcome these limitations and harness their benefits. However, a concatenated LPWAN architecture will inevitably result in excess latency which may impact users' quality-of-experience (QoE). To evaluate the real-life feasibility of this system, we first propose a concatenated LPWAN architecture and experimentally measure the statistics of end-to-end (E2E) latencies. The concatenated delay margin is determined by benchmarking the latencies with different LPWAN architecture schemes, namely with unlicensed IoT (standalone LoRa), cellular IoT (standalone LTE-M), and concatenated IoT (LoRa interfaced with LTE-M). Through extensive experimental measurement campaigns of 30,000 data points of E2E latencies, we show that the excess delay due to LPWAN interfacing introduces on average less than 300 milliseconds. The proof-of-concept results suggest that the latency for concatenating unlicensed LPWAN with cellular IoT is negligible for smart city use cases where human perception and decision making is in the loop.
△ Less
Submitted 30 May, 2021; v1 submitted 22 May, 2021;
originally announced May 2021.
-
Framework for an Integrated Learning Block with CDIO-led Engineering Education
Authors:
Mouhamed Abdulla,
Meagan Troop,
Amjed Majeed
Abstract:
As a CDIO collaborating member, the School of Mechanical and Electrical Engineering of Sheridan maintains a curriculum that is deeply rooted in skills-based learning, experiential learning, and engineering design. To ensure our graduates are agile and ready for the workforce, we are taking proactive measures to further improve their learning experiences. An important challenge still impeding our s…
▽ More
As a CDIO collaborating member, the School of Mechanical and Electrical Engineering of Sheridan maintains a curriculum that is deeply rooted in skills-based learning, experiential learning, and engineering design. To ensure our graduates are agile and ready for the workforce, we are taking proactive measures to further improve their learning experiences. An important challenge still impeding our students knowledge acquisition is the perception that program courses have disjointed learning outcomes. The course map of programs is carefully designed in such a way that technical skills acquired in particular courses gradually build on each other. Despite the traditional existence of prerequisites and co-requisites, the inaccurate view that courses function independently persists among students and, occasionally, among faculty members. One feasible approach to tackle this pedagogical challenge is to combine various courses into an integrated learning block (ILB) having a unified mission and objective. At Sheridan's School of MEET, we are applying an ILB with three engineering courses offered within the same semester for all our B.Eng. degree programs. The ILB deliverables are based on the design of a chosen engineering system or subunit in a project-based learning (PBL) environment. The rationale of this paper is to share our framework for implementing an ILB in engineering programs and to examine the opportunities and challenges related to this type of curriculum design. In particular, we will discuss the methodology by which courses are selected to form an ILB while taking into account their appropriateness for an industry-driven PBL. This will be followed up with some of the strategies that are proposed to evaluate the performance of students in an ILB through formative and summative assessments based on CDIO competencies.
△ Less
Submitted 4 June, 2020;
originally announced June 2020.
-
Redesigning Telecommunication Engineering Courses with CDIO geared for Polytechnic Education
Authors:
Mouhamed Abdulla,
Zohreh Motamedi,
Amjed Majeed
Abstract:
Whether in chemical, civil, mechanical, electrical, or their related engineering subdisciplines, remaining up-to-date in the subject matter is crucial. However, due to the pace of technological evolution, information and communications technology (ICT) fields of study are impacted with much higher consequences. Meanwhile, the curricula of higher educational institutes are struggling to catch up to…
▽ More
Whether in chemical, civil, mechanical, electrical, or their related engineering subdisciplines, remaining up-to-date in the subject matter is crucial. However, due to the pace of technological evolution, information and communications technology (ICT) fields of study are impacted with much higher consequences. Meanwhile, the curricula of higher educational institutes are struggling to catch up to this reality. In order to remain competitive, engineering schools ought to offer ICT related courses that are at once modern, relevant and ultimately beneficial for the employability of their graduates. In this spirit, we were recently mandated by our engineering school to develop and design telecommunication courses with great emphasis on (i) technological modernity, and (ii) experiential learning. To accomplish these objectives, we utilized the conceive, design, implement and operate (CDIO) framework, a modern engineering education initiative of which Sheridan is a member. In this article, we chronicle the steps we took to streamline and modernize the curriculum by outlining an effective methodology for course design and development with CDIO. We then provide examples of course update and design using the proposed methodology and highlight the lessons learned from this systematic curriculum development endeavor.
△ Less
Submitted 8 May, 2019;
originally announced May 2019.
-
Footwear Size Recommendation System
Authors:
Shreya Singh,
G Mohammed Abdulla,
Sumit Borar,
Sagar Arora
Abstract:
While shopping for fashion products, customers usually prefer to try-out products to examine fit, material, overall look and feel. Due to lack of try out options during online shopping, it becomes pivotal to provide customers with as much of this information as possible to enhance their shopping experience. Also it becomes essential to provide same experience for new customers. Our work here focus…
▽ More
While shopping for fashion products, customers usually prefer to try-out products to examine fit, material, overall look and feel. Due to lack of try out options during online shopping, it becomes pivotal to provide customers with as much of this information as possible to enhance their shopping experience. Also it becomes essential to provide same experience for new customers. Our work here focuses on providing a production ready size recommendation system for shoes and address the challenge of providing recommendation for users with no previous purchases on the platform. In our work, we present a probabilistic approach based on user co-purchase data facilitated by generating a brand-brand relationship graph. Specifically we address two challenges that are commonly faced while implementing such solution. 1. Sparse signals for less popular or new products in the system 2. Extending the solution for new users. Further we compare and contrast this approach with our previous work and show significant improvement both in recommendation precision and coverage.
△ Less
Submitted 28 June, 2018;
originally announced June 2018.
-
Fine-Grained vs. Average Reliability for V2V Communications around Intersections
Authors:
Mouhamed Abdulla,
Henk Wymeersch
Abstract:
Intersections are critical areas of the transportation infrastructure associated with 47% of all road accidents. Vehicle-to-vehicle (V2V) communication has the potential of preventing up to 35% of such serious road collisions. In fact, under the 5G/LTE Rel.15+ standardization, V2V is a critical use-case not only for the purpose of enhancing road safety, but also for enabling traffic efficiency in…
▽ More
Intersections are critical areas of the transportation infrastructure associated with 47% of all road accidents. Vehicle-to-vehicle (V2V) communication has the potential of preventing up to 35% of such serious road collisions. In fact, under the 5G/LTE Rel.15+ standardization, V2V is a critical use-case not only for the purpose of enhancing road safety, but also for enabling traffic efficiency in modern smart cities. Under this anticipated 5G definition, high reliability of 0.99999 is expected for semi-autonomous vehicles (i.e., driver-in-the-loop). As a consequence, there is a need to assess the reliability, especially for accident-prone areas, such as intersections. We unpack traditional average V2V reliability in order to quantify its related fine-grained V2V reliability. Contrary to existing work on infinitely large roads, when we consider finite road segments of significance to practical real-world deployment, fine-grained reliability exhibits bimodal behavior. Performance for a certain vehicular traffic scenario is either very reliable or extremely unreliable, but nowhere in relative proximity to the average performance.
△ Less
Submitted 10 July, 2017;
originally announced July 2017.
-
Fine-Grained Reliability for V2V Communications around Suburban and Urban Intersections
Authors:
Mouhamed Abdulla,
Henk Wymeersch
Abstract:
Safe transportation is a key use-case of the 5G/LTE Rel.15+ communications, where an end-to-end reliability of 0.99999 is expected for a vehicle-to-vehicle (V2V) transmission distance of 100-200 m. Since communications reliability is related to road-safety, it is crucial to verify the fulfillment of the performance, especially for accident-prone areas such as intersections. We derive closed-form e…
▽ More
Safe transportation is a key use-case of the 5G/LTE Rel.15+ communications, where an end-to-end reliability of 0.99999 is expected for a vehicle-to-vehicle (V2V) transmission distance of 100-200 m. Since communications reliability is related to road-safety, it is crucial to verify the fulfillment of the performance, especially for accident-prone areas such as intersections. We derive closed-form expressions for the V2V transmission reliability near suburban corners and urban intersections over finite interference regions. The analysis is based on plausible street configurations, traffic scenarios, and empirically-supported channel propagation. We show the means by which the performance metric can serve as a preliminary design tool to meet a target reliability. We then apply meta distribution concepts to provide a careful dissection of V2V communications reliability. Contrary to existing work on infinite roads, when we consider finite road segments for practical deployment, fine-grained reliability per realization exhibits bimodal behavior. Either performance for a certain vehicular traffic scenario is very reliable or extremely unreliable, but nowhere in relatively proximity to the average performance. In other words, standard SINR-based average performance metrics are analytically accurate but can be insufficient from a practical viewpoint. Investigating other safety-critical point process networks at the meta distribution-level may reveal similar discrepancies.
△ Less
Submitted 5 July, 2017; v1 submitted 30 June, 2017;
originally announced June 2017.
-
Vehicle-to-Vehicle Communications with Urban Intersection Path Loss Models
Authors:
Mouhamed Abdulla,
Erik Steinmetz,
Henk Wymeersch
Abstract:
Vehicle-to-vehicle (V2V) communication can improve road safety and traffic efficiency, particularly around critical areas such as intersections. We analytically derive V2V success probability near an urban intersection, based on empirically supported line-of-sight (LOS), weak-line-of-sight (WLOS), and non-line-of-sight (NLOS) channel models. The analysis can serve as a preliminary design tool for…
▽ More
Vehicle-to-vehicle (V2V) communication can improve road safety and traffic efficiency, particularly around critical areas such as intersections. We analytically derive V2V success probability near an urban intersection, based on empirically supported line-of-sight (LOS), weak-line-of-sight (WLOS), and non-line-of-sight (NLOS) channel models. The analysis can serve as a preliminary design tool for performance assessment over different system parameters and target performance requirements.
△ Less
Submitted 9 October, 2016;
originally announced October 2016.
-
Simple Subroutine for Inhomogeneous Deployment
Authors:
Mouhamed Abdulla
Abstract:
Spatial modeling of wireless networks via analytical means has been considered as a widely practiced mechanism for inference. As a result, some geometrical deployment models have been proposed in literature. Although practical in certain simulation instances, these models do not always produce inhomogeneous nodal geometries in an effective and simple manner for practical deployment situations. The…
▽ More
Spatial modeling of wireless networks via analytical means has been considered as a widely practiced mechanism for inference. As a result, some geometrical deployment models have been proposed in literature. Although practical in certain simulation instances, these models do not always produce inhomogeneous nodal geometries in an effective and simple manner for practical deployment situations. Therefore, we conceptualized a flexible approach for realizing random inhomogeneity by proposing the area-specific deployment (ASD) algorithm, which takes into account the clustering tendency of users. Overall, the developed spatial-level network tool has the distinct advantage of automatically producing infinitely many random realizations of users' geometry by simply entering three parameters to the simulator: the size of the cellular network, the number of deployment layers, and the overall quantity of nodes.
△ Less
Submitted 25 October, 2014; v1 submitted 14 September, 2014;
originally announced September 2014.
-
Analytical Coexistence Benchmark for Assessing the Utmost Interference Tolerated by IEEE 802.20
Authors:
Mouhamed Abdulla,
Yousef R. Shayan
Abstract:
Whether it is crosstalk, harmonics, or in-band operation of wireless technologies, interference between a reference system and a host of offenders is virtually unavoidable. In past contributions, a benchmark has been established and considered for coexistence analysis with a number of technologies including FWA, UMTS, and WiMAX. However, the previously presented model does not take into account th…
▽ More
Whether it is crosstalk, harmonics, or in-band operation of wireless technologies, interference between a reference system and a host of offenders is virtually unavoidable. In past contributions, a benchmark has been established and considered for coexistence analysis with a number of technologies including FWA, UMTS, and WiMAX. However, the previously presented model does not take into account the mobility factor of the reference node in addition to a number of interdependent requirements regarding the link direction, channel state, data rate and system factors; hence limiting its applicability for the MBWA (IEEE 802.20) standard. Thus, over diverse modes, in this correspondence we analytically derived the greatest aggregate interference level tolerated for high-fidelity transmission tailored specifically for the MBWA standard. Our results, in the form of benchmark indicators, should be of particular interest to peers analyzing and researching RF coexistence scenarios with this new protocol.
△ Less
Submitted 8 June, 2013;
originally announced June 2013.
-
Design Based Teaching for Science and Engineering Students
Authors:
Yousef R. Shayan,
Mouhamed Abdulla
Abstract:
In this paper, we will explain a successfully proven lecturing method based entirely on system design. Wireless communications will be used as an example to explain this new teaching philosophy.
In this paper, we will explain a successfully proven lecturing method based entirely on system design. Wireless communications will be used as an example to explain this new teaching philosophy.
△ Less
Submitted 7 June, 2013;
originally announced June 2013.
-
Can Research be Taught?
Authors:
Mouhamed Abdulla,
Yousef R. Shayan
Abstract:
The word 'researcher' is loaded and often confusing. It takes years to become one and to master all of its aspects. In this paper, we investigate whether or not this process of 'becoming' can be catalyzed through education. The focus will be on wireless communications, though the same principle could very well be replicated to other disciplines.
The word 'researcher' is loaded and often confusing. It takes years to become one and to master all of its aspects. In this paper, we investigate whether or not this process of 'becoming' can be catalyzed through education. The focus will be on wireless communications, though the same principle could very well be replicated to other disciplines.
△ Less
Submitted 5 June, 2013;
originally announced June 2013.
-
Closed-Form Path-Loss Predictor for Gaussianly Distributed Nodes
Authors:
Mouhamed Abdulla,
Yousef R. Shayan
Abstract:
The emulation of wireless nodes spatial position is a practice used by deployment engineers and network planners to analyze the characteristics of a network. In particular, nodes geolocation will directly impact factors such as connectivity, signals fidelity, and service quality. In literature, in addition to typical homogenous scattering, normal distribution is frequently used to model mobiles co…
▽ More
The emulation of wireless nodes spatial position is a practice used by deployment engineers and network planners to analyze the characteristics of a network. In particular, nodes geolocation will directly impact factors such as connectivity, signals fidelity, and service quality. In literature, in addition to typical homogenous scattering, normal distribution is frequently used to model mobiles concentration in a cellular system. Moreover, Gaussian dropping is often considered as an effective placement method for airborne sensor deployment. Despite the practicality of this model, getting the network channel loss distribution still relies on exhaustive Monte Carlo simulation. In this paper, we argue the need for this inefficient approach and hence derived a generic and exact closed-form expression for the path-loss distribution density between a base-station and a network of nodes. Simulation was used to reaffirm the validity of the theoretical analysis using values from the new IEEE 802.20 standard.
△ Less
Submitted 4 June, 2013;
originally announced June 2013.
-
An Exact Path-Loss Density Model for Mobiles in a Cellular System
Authors:
Mouhamed Abdulla,
Yousef R. Shayan
Abstract:
In trying to emulate the spatial position of wireless nodes for purpose of analysis, we rely on stochastic simulation. And, it is customary, for mobile systems, to consider a base-station radiation coverage by an ideal cell shape. For cellular analysis, a hexagon contour is always preferred mainly because of its tessellating nature. Despite this fact, largely due to its intrinsic simplicity, in li…
▽ More
In trying to emulate the spatial position of wireless nodes for purpose of analysis, we rely on stochastic simulation. And, it is customary, for mobile systems, to consider a base-station radiation coverage by an ideal cell shape. For cellular analysis, a hexagon contour is always preferred mainly because of its tessellating nature. Despite this fact, largely due to its intrinsic simplicity, in literature only random dispersion model for a circular shape is known. However, if considered, this will result an unfair nodes density specifically at the edges of non-circular contours. As a result, in this paper, we showed the exact random number generation technique required for nodes scattering inside a hexagon. Next, motivated from a system channel perspective, we argued the need for the exhaustive random mobile dropping process, and hence derived a generic close-form expression for the path-loss distribution density between a base-station and a mobile. Last, simulation was used to reaffirm the validity of the theoretical analysis using values from the new IEEE 802.20 standard.
△ Less
Submitted 4 June, 2013;
originally announced June 2013.
-
Revisiting Circular-Based Random Node Simulation
Authors:
Mouhamed Abdulla,
Yousef R. Shayan,
Junho Baek
Abstract:
In literature, a stochastic model for spreading nodes in a cellular cell is available. Despite its existence, the current method does not offer any versatility in dealing with sectored layers. Of course, this needed adaptability could be created synthetically through heuristic means. However, due to selective sampling, such practice dissolves the true randomness sought. Hence, in this paper, a uni…
▽ More
In literature, a stochastic model for spreading nodes in a cellular cell is available. Despite its existence, the current method does not offer any versatility in dealing with sectored layers. Of course, this needed adaptability could be created synthetically through heuristic means. However, due to selective sampling, such practice dissolves the true randomness sought. Hence, in this paper, a universal exact scattering model is derived. Also, as an alternative to exhaustive simulation, a generic close-form path-loss predictor between a node and a BS is obtained. Further, using these results, an algorithm based on the superposition principle is proposed. This will ensure greater emulation flexibility, and attain a heterogeneous spatial density.
△ Less
Submitted 3 June, 2013;
originally announced June 2013.
-
Cellular-Based Statistical Model for Mobile Dispersion
Authors:
Mouhamed Abdulla,
Yousef R. Shayan
Abstract:
While analyzing mobile systems we often approximate the actual coverage surface and assume an ideal cell shape. In a multi-cellular network, because of its tessellating nature, a hexagon is more preferred than a circular geometry. Despite this reality, perhaps due to the inherent simplicity, only a model for circular based random spreading is available. However, if used, this results an unfair ter…
▽ More
While analyzing mobile systems we often approximate the actual coverage surface and assume an ideal cell shape. In a multi-cellular network, because of its tessellating nature, a hexagon is more preferred than a circular geometry. Despite this reality, perhaps due to the inherent simplicity, only a model for circular based random spreading is available. However, if used, this results an unfair terminal distribution for non-circular contours. Therefore, in this paper we specifically derived an unbiased node density model for a hexagon. We then extended the principle and established stochastic ways to handle sectored cells. Next, based on these mathematical findings, we created a generic modeling tool that can support a complex network with varying position, capacity, size, user density, and sectoring capability. Last, simulation was used to verify the theoretical analysis.
△ Less
Submitted 1 June, 2013;
originally announced June 2013.
-
Harnessing Simultaneously the Benefits of UWB and MBWA: A Practical Scenario
Authors:
Mouhamed Abdulla,
Yousef R. Shayan
Abstract:
UWB has a very large bandwidth in a WPAN network, which is best used for HD-video applications. Meanwhile, MBWA is a WMAN option optimized for wireless-IP in a fast moving vehicle. In this paper, we propose a practical engineering scenario that harnesses simultaneously the distinctive feature of both UWB and MBWA. However, this in-proximity operation of the technologies will inevitably cause mutua…
▽ More
UWB has a very large bandwidth in a WPAN network, which is best used for HD-video applications. Meanwhile, MBWA is a WMAN option optimized for wireless-IP in a fast moving vehicle. In this paper, we propose a practical engineering scenario that harnesses simultaneously the distinctive feature of both UWB and MBWA. However, this in-proximity operation of the technologies will inevitably cause mutual interference to both systems. In light of this, as a preliminary phase to coexistence, we have derived, under various circumstances, the maximum interference power limit that needs to be respected in order to ensure an acceptable system performance as requested by the new IEEE 802.20 standard.
△ Less
Submitted 30 May, 2013;
originally announced May 2013.
-
On the Peculiarities of Design: An Engineering Perspective
Authors:
Mouhamed Abdulla,
Yousef R. Shayan
Abstract:
It is a fact of our existence, that no matter where we are, we most often find ourselves either hearing, seeing, talking, or even engaged in design related activities. Despite this reality, the notion of 'design', and in particular 'engineering design', is often ambiguous, and at times obscure. Thus, the transfer of knowledge of this crucial topic to engineering students engaged in practical hands…
▽ More
It is a fact of our existence, that no matter where we are, we most often find ourselves either hearing, seeing, talking, or even engaged in design related activities. Despite this reality, the notion of 'design', and in particular 'engineering design', is often ambiguous, and at times obscure. Thus, the transfer of knowledge of this crucial topic to engineering students engaged in practical hands-on learning or analytical research is usually perplexing to accomplish. In light of this, it becomes worthwhile to dissect and reflect on the abstraction of the design process in engineering. In fact, the aim of this article is to investigate the facets of applied design, and elaborate on its diversity, complexity and elements. Eventually, by concretizing this subject matter, we hope to slightly assist engineering students in alleviating some of the vagueness associated with the principle of design, and enhance their technical skillset during innovative conceptions.
△ Less
Submitted 17 May, 2013;
originally announced May 2013.
-
Simple and Generic Simulator Algorithm for Inhomogeneous Random Spatial Deployment
Authors:
Mouhamed Abdulla,
Yousef R. Shayan
Abstract:
We conceptualized a straightforward and flexible approach for random spatial inhomogeneity by proposing the area-specific deployment (ASD) algorithm, which takes into account the clustering tendency of users. In fact, the ASD method has the advantage of achieving a more realistic heterogeneous deployment based on limited planning inputs, while still preserving the stochastic character of users pos…
▽ More
We conceptualized a straightforward and flexible approach for random spatial inhomogeneity by proposing the area-specific deployment (ASD) algorithm, which takes into account the clustering tendency of users. In fact, the ASD method has the advantage of achieving a more realistic heterogeneous deployment based on limited planning inputs, while still preserving the stochastic character of users position. We then applied this technique to different circumstances, and developed spatial-level network algorithms for controlled and uncontrolled cellular network deployments. Overall, the derived simulator tools will effectively and easily be useful for designers and deployment planners modeling a host of multi-coverage and multi-scale wireless network situations.
△ Less
Submitted 10 April, 2013;
originally announced April 2013.
-
Large-Scale Fading Behavior for a Cellular Network with Uniform Spatial Distribution
Authors:
Mouhamed Abdulla,
Yousef R. Shayan
Abstract:
Large-scale fading (LSF) between interacting nodes is a fundamental element in radio communications, responsible for weakening the propagation, and thus worsening the service quality. Given the importance of channel-losses in general, and the inevitability of random spatial geometry in real-life wireless networks, it was then natural to merge these two paradigms together in order to obtain an impr…
▽ More
Large-scale fading (LSF) between interacting nodes is a fundamental element in radio communications, responsible for weakening the propagation, and thus worsening the service quality. Given the importance of channel-losses in general, and the inevitability of random spatial geometry in real-life wireless networks, it was then natural to merge these two paradigms together in order to obtain an improved stochastical model for the LSF indicator. Therefore, in exact closed-form notation, we generically derived the LSF distribution between a prepositioned reference base-station and an arbitrary node for a multi-cellular random network model. In fact, we provided an explicit and definitive formulation that considered at once: the lattice profile, the users' random geometry, the effect of the far-field phenomenon, the path-loss behavior, and the stochastic impact of channel scatters. The veracity and accuracy of the theoretical analysis were also confirmed through Monte Carlo simulations.
△ Less
Submitted 25 December, 2014; v1 submitted 4 February, 2013;
originally announced February 2013.
-
Manual and Fast C Code Optimization
Authors:
Mohammed Fadle Abdulla
Abstract:
Developing an application with high performance through the code optimization places a greater responsibility on the programmers. While most of the existing compilers attempt to automatically optimize the program code, manual techniques remain the predominant method for performing optimization. Deciding where to try to optimize code is difficult, especially for large complex applications. For manu…
▽ More
Developing an application with high performance through the code optimization places a greater responsibility on the programmers. While most of the existing compilers attempt to automatically optimize the program code, manual techniques remain the predominant method for performing optimization. Deciding where to try to optimize code is difficult, especially for large complex applications. For manual optimization, the programmers can use his experiences in writing the code, and then he can use a software profiler in order to collect and analyze the performance data from the code. In this work, we have gathered the most experiences which can be applied to improve the style of writing programs in C language as well as we present an implementation of the manual optimization of the codes using the Intel VTune profiler. The paper includes two case studies to illustrate our optimization on the Heap Sort and Factorial functions.
△ Less
Submitted 3 March, 2012;
originally announced March 2012.