Skip to main content

Showing 1–7 of 7 results for author: El-Sherif, A A

Searching in archive cs. Search in all archives.
.
  1. arXiv:1810.01172  [pdf, other

    cs.NI

    Towards Mobility-Aware Proactive Caching for Vehicular Ad hoc Networks

    Authors: Yousef AlNagar, Sameh Hosny, Amr A. El-Sherif

    Abstract: Harnessing information about the user mobility pattern and daily demand can enhance the network capability to improve the quality of experience (QoE) at Vehicular Ad-Hoc Networks (VANETs). Proactive caching, as one of the key features offered by 5G networks, has lately received much interest. However, more research is still needed to convey large-sized multimedia content including video, audio and… ▽ More

    Submitted 2 October, 2018; originally announced October 2018.

  2. arXiv:1604.03633  [pdf

    cs.NI cs.IT

    Cooperation and Underlay Mode Selection in Cognitive Radio Network

    Authors: Ramy Amer, Amr A. El-Sherif, Hanaa Ebrahim, Amr Mokhtar

    Abstract: In this research, we proposes a new method for cooperation and underlay mode selection in cognitive radio networks. We characterize the maximum achievable throughput of our proposed method of hybrid spectrum sharing. Hybrid spectrum sharing is assumed where the Secondary User (SU) can access the Primary User (PU) channel in two modes, underlay mode or cooperative mode with admission control. In ad… ▽ More

    Submitted 12 April, 2016; originally announced April 2016.

  3. arXiv:1509.04110  [pdf

    cs.IT

    Cooperative Cognitive Radio Network with Energy Harvesting: Stability Analysis

    Authors: Ramy Amer, Amr A. El-Sherif, Hanaa Ebrahim, Amr Mokhtar

    Abstract: This paper investigates the maximum stable throughput of a cooperative cognitive radio system with energy harvesting Primary User and Secondary User. Each PU and SU has a data queue for data storage and a battery for energy storage. These batteries harvest energy from the environment and store it for data transmission in next time slots. The SU is allowed to access the PU channel only when the PU… ▽ More

    Submitted 14 September, 2015; originally announced September 2015.

    Comments: 7 pages, 10 figures

  4. arXiv:1412.4999  [pdf

    cs.NI

    DDSAT: Distributed Dynamic Spectrum Access Protocol Implementation Using GNURadio and USRP

    Authors: Medhat H. M. Elsayed, Amr A. El-Sherif, Amr Mohamed

    Abstract: Frequency spectrum is one of the valuable resources in wireless communications. Using cognitive radio, spectrum efficiency will increase by making use of the spectrum holes. Dynamic Spectrum Access techniques allows secondary users to transmit on an empty channel not used by a primary user for a given time. In this paper, a Distributed Dynamic Spectrum Access based TDMA protocol (DDSAT) is designe… ▽ More

    Submitted 17 December, 2014; v1 submitted 16 December, 2014; originally announced December 2014.

    Comments: 6 pages, 9 figures, conference paper

  5. arXiv:1404.6112  [pdf, ps, other

    cs.NI

    Cognitive Radio Networks with Probabilistic Relaying: Stable Throughput and Delay Tradeoffs

    Authors: Mahmoud Ashour, Amr A. El-Sherif, Tamer ElBatt, Amr Mohamed

    Abstract: In this paper, we study and analyze fundamental throughput and delay tradeoffs in cooperative multiple access for cognitive radio systems. We focus on the class of randomized cooperative policies, whereby the secondary user (SU) serves either the queue of its own data or the queue of the primary user (PU) relayed data with certain service probabilities. Moreover, admission control is introduced at… ▽ More

    Submitted 24 April, 2014; originally announced April 2014.

    Comments: arXiv admin note: substantial text overlap with arXiv:1309.1200

  6. Cooperative Access in Cognitive Radio Networks: Stable Throughput and Delay Tradeoffs

    Authors: Mahmoud Ashour, Amr A. El-Sherif, Tamer ElBatt, Amr Mohamed

    Abstract: In this paper, we study and analyze fundamental throughput-delay tradeoffs in cooperative multiple access for cognitive radio systems. We focus on the class of randomized cooperative policies, whereby the secondary user (SU) serves either the queue of its own data or the queue of the primary user (PU) relayed data with certain service probabilities. The proposed policy opens room for trading the P… ▽ More

    Submitted 24 April, 2014; v1 submitted 4 September, 2013; originally announced September 2013.

    Comments: accepted for publication in IEEE 12th Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), 2014

  7. arXiv:1204.1730  [pdf, ps, other

    math.OC cs.NI

    A Soft Sensing-Based Cognitive Access Scheme Exploiting Primary Feedback

    Authors: Ahmed M. Arafa, Karim G. Seddik, Ahmed K. Sultan, Tamer ElBatt, Amr A. El-Sherif

    Abstract: In this paper, we examine a cognitive spectrum access scheme in which secondary users exploit the primary feedback information. We consider an overlay secondary network employing a random access scheme in which secondary users access the channel by certain access probabilities that are function of the spectrum sensing metric. In setting our problem, we assume that secondary users can eavesdrop on… ▽ More

    Submitted 8 April, 2012; originally announced April 2012.

    Comments: Accepted for publication in WiOpt 2012