-
FedCVD++: Communication-Efficient Federated Learning for Cardiovascular Risk Prediction with Parametric and Non-Parametric Model Optimization
Authors:
Abdelrhman Gaber,
Hassan Abd-Eltawab,
John Elgallab,
Youssif Abuzied,
Dineo Mpanya,
Turgay Celik,
Swarun Kumar,
Tamer ElBatt
Abstract:
Cardiovascular diseases (CVD) cause over 17 million deaths annually worldwide, highlighting the urgent need for privacy-preserving predictive systems. We introduce FedCVD++, an enhanced federated learning (FL) framework that integrates both parametric models (logistic regression, SVM, neural networks) and non-parametric models (Random Forest, XGBoost) for coronary heart disease risk prediction. To…
▽ More
Cardiovascular diseases (CVD) cause over 17 million deaths annually worldwide, highlighting the urgent need for privacy-preserving predictive systems. We introduce FedCVD++, an enhanced federated learning (FL) framework that integrates both parametric models (logistic regression, SVM, neural networks) and non-parametric models (Random Forest, XGBoost) for coronary heart disease risk prediction. To address key FL challenges, we propose: (1) tree-subset sampling that reduces Random Forest communication overhead by 70%, (2) XGBoost-based feature extraction enabling lightweight federated ensembles, and (3) federated SMOTE synchronization for resolving cross-institutional class imbalance.
Evaluated on the Framingham dataset (4,238 records), FedCVD++ achieves state-of-the-art results: federated XGBoost (F1 = 0.80) surpasses its centralized counterpart (F1 = 0.78), and federated Random Forest (F1 = 0.81) matches non-federated performance. Additionally, our communication-efficient strategies reduce bandwidth consumption by 3.2X while preserving 95% accuracy.
Compared to existing FL frameworks, FedCVD++ delivers up to 15% higher F1-scores and superior scalability for multi-institutional deployment. This work represents the first practical integration of non-parametric models into federated healthcare systems, providing a privacy-preserving solution validated under real-world clinical constraints.
△ Less
Submitted 30 July, 2025;
originally announced July 2025.
-
MIRA: A Method of Federated MultI-Task Learning for LaRge LAnguage Models
Authors:
Ahmed Elbakary,
Chaouki Ben Issaid,
Tamer ElBatt,
Karim Seddik,
Mehdi Bennis
Abstract:
In this paper, we introduce a method for fine-tuning Large Language Models (LLMs), inspired by Multi-Task learning in a federated manner. Our approach leverages the structure of each client's model and enables a learning scheme that considers other clients' tasks and data distribution. To mitigate the extensive computational and communication overhead often associated with LLMs, we utilize a param…
▽ More
In this paper, we introduce a method for fine-tuning Large Language Models (LLMs), inspired by Multi-Task learning in a federated manner. Our approach leverages the structure of each client's model and enables a learning scheme that considers other clients' tasks and data distribution. To mitigate the extensive computational and communication overhead often associated with LLMs, we utilize a parameter-efficient fine-tuning method, specifically Low-Rank Adaptation (LoRA), reducing the number of trainable parameters. Experimental results, with different datasets and models, demonstrate the proposed method's effectiveness compared to existing frameworks for federated fine-tuning of LLMs in terms of average and local performances. The proposed scheme outperforms existing baselines by achieving lower local loss for each client while maintaining comparable global performance.
△ Less
Submitted 20 October, 2024;
originally announced October 2024.
-
Fed-Sophia: A Communication-Efficient Second-Order Federated Learning Algorithm
Authors:
Ahmed Elbakary,
Chaouki Ben Issaid,
Mohammad Shehab,
Karim Seddik,
Tamer ElBatt,
Mehdi Bennis
Abstract:
Federated learning is a machine learning approach where multiple devices collaboratively learn with the help of a parameter server by sharing only their local updates. While gradient-based optimization techniques are widely adopted in this domain, the curvature information that second-order methods exhibit is crucial to guide and speed up the convergence. This paper introduces a scalable second-or…
▽ More
Federated learning is a machine learning approach where multiple devices collaboratively learn with the help of a parameter server by sharing only their local updates. While gradient-based optimization techniques are widely adopted in this domain, the curvature information that second-order methods exhibit is crucial to guide and speed up the convergence. This paper introduces a scalable second-order method, allowing the adoption of curvature information in federated large models. Our method, coined Fed-Sophia, combines a weighted moving average of the gradient with a clipping operation to find the descent direction. In addition to that, a lightweight estimation of the Hessian's diagonal is used to incorporate the curvature information. Numerical evaluation shows the superiority, robustness, and scalability of the proposed Fed-Sophia scheme compared to first and second-order baselines.
△ Less
Submitted 10 June, 2024;
originally announced June 2024.
-
Wireless energy and information transfer in networks with hybrid ARQ
Authors:
Mehdi Salehi Heydar Abad,
Ozgur Ercetin,
Tamer Elbatt,
Mohammed Nafie
Abstract:
In this paper, we consider a class of wireless powered communication devices using hybrid automatic repeat request (HARQ) protocol to ensure reliable communications. In particular, we analyze the trade-off between accumulating mutual information and harvesting RF energy at the receiver of a point-to-point link over a time-varying independent and identically distributed (i.i.d.) channel. The transm…
▽ More
In this paper, we consider a class of wireless powered communication devices using hybrid automatic repeat request (HARQ) protocol to ensure reliable communications. In particular, we analyze the trade-off between accumulating mutual information and harvesting RF energy at the receiver of a point-to-point link over a time-varying independent and identically distributed (i.i.d.) channel. The transmitter is assumed to have a constant energy source while the receiver relies, solely, on the RF energy harvested from the received signal. At each time slot, the incoming RF signal is split between information accumulation and energy accumulation with the objective of minimizing the expected number of re-transmissions. A major finding of this work is that the optimal policy minimizing the expected number of re-transmissions utilizes the incoming RF signal to either exclusively harvest energy or to accumulate mutual information. This finding enables achieving an optimal solution in feasible time by converting a two dimensional uncountable state Markov decision process (MDP) with continuous action space into a countable state MDP with binary decision space.
△ Less
Submitted 12 February, 2019;
originally announced February 2019.
-
A Converse Bound for Cache-Aided Interference Networks
Authors:
Antonious M. Girgis,
Ozgur Ercetin,
Mohammed Nafie,
Tamer ElBatt
Abstract:
In this paper, an interference network with arbitrary number of transmitters and receivers is studied, where each transmitter is equipped with a finite size cache. We obtain an information-theoretic lower bound on both the peak normalized delivery time (NDT), and the \textit{expected} NDT of cache-aided interference networks with uniform content popularity. For the peak NDT, we show that our lower…
▽ More
In this paper, an interference network with arbitrary number of transmitters and receivers is studied, where each transmitter is equipped with a finite size cache. We obtain an information-theoretic lower bound on both the peak normalized delivery time (NDT), and the \textit{expected} NDT of cache-aided interference networks with uniform content popularity. For the peak NDT, we show that our lower bound is strictly tighter than the bound in the literature for small cache sizes. Moreover, we show that the feasibility region on the expected NDT is bigger than that of the peak NDT.
△ Less
Submitted 6 December, 2018;
originally announced December 2018.
-
Towards Optimal Resource Allocation in Wireless Powered Communication Networks with Non-Orthogonal Multiple Access
Authors:
Mariam M. N. Aboelwafa,
Mohamed A. Abd-Elmagid,
Alessandro Biason,
Karim G. Seddik,
Tamer ElBatt,
Michele Zorzi
Abstract:
The optimal allocation of time and energy resources is characterized in a Wireless Powered Communication Network (WPCN) with non-Orthogonal Multiple Access (NOMA). We consider two different formulations; in the first one (max-sum), the sum-throughput of all users is maximized. In the second one (max-min), and targeting fairness among users, we consider maximizing the min-throughput of all users. U…
▽ More
The optimal allocation of time and energy resources is characterized in a Wireless Powered Communication Network (WPCN) with non-Orthogonal Multiple Access (NOMA). We consider two different formulations; in the first one (max-sum), the sum-throughput of all users is maximized. In the second one (max-min), and targeting fairness among users, we consider maximizing the min-throughput of all users. Under the above two formulations, two NOMA decoding schemes are studied, namely, low complexity decoding (LCD) and successive interference cancellation decoding (SICD). Due to the non-convexity of three of the studied optimization problems, we consider an approximation approach, in which the non-convex optimization problem is approximated by a convex optimization problem, which satisfies all the constraints of the original problem. The approximated convex optimization problem can then be solved iteratively. The results show a trade-off between maximizing the sum throughout and achieving fairness through maximizing the minimum throughput.
△ Less
Submitted 1 August, 2018;
originally announced August 2018.
-
Degrees of Freedom of Interference Networks with Transmitter-Side Caches
Authors:
Antonious M. Girgis,
Ozgur Ercetin,
Mohammed Nafie,
Tamer ElBatt
Abstract:
This paper studies cache-aided interference networks with arbitrary number of transmitters and receivers, whereby each transmitter has a cache memory of finite size. Each transmitter fills its cache memory from a content library of files in the placement phase. In the subsequent delivery phase, each receiver requests one of the library files, and the transmitters are responsible for delivering the…
▽ More
This paper studies cache-aided interference networks with arbitrary number of transmitters and receivers, whereby each transmitter has a cache memory of finite size. Each transmitter fills its cache memory from a content library of files in the placement phase. In the subsequent delivery phase, each receiver requests one of the library files, and the transmitters are responsible for delivering the requested files from their caches to the receivers. The objective is to design schemes for the placement and delivery phases to maximize the sum degrees of freedom (sum-DoF) which expresses the capacity of the interference network at the high signal-to-noise ratio regime. Our work mainly focuses on a commonly used uncoded placement strategy. We provide an information-theoretic bound on the sum-DoF for this placement strategy. We demonstrate by an example that the derived bound is tighter than the bounds existing in the literature for small cache sizes. We propose a novel delivery scheme with a higher achievable sum-DoF than those previously given in the literature. The results reveal that the reciprocal of sum-DoF decreases linearly as the transmitter cache size increases. Therefore, increasing cache sizes at transmitters translates to increasing the sum-DoF and, hence, the capacity of the interference networks.
△ Less
Submitted 16 December, 2017;
originally announced December 2017.
-
SWIPT using Hybrid ARQ over Time Varying Channels
Authors:
Mehdi Salehi Heydar Abad,
Ozgur Ercetin,
Mohamed Nafie,
Tamer Elbatt
Abstract:
We consider a class of wireless powered devices employing Hybrid Automatic Repeat reQuest (HARQ) to ensure reliable end-to-end communications over a two-state time-varying channel. A receiver, with no power source, relies on the energy transferred by a Simultaneous Wireless Information and Power Transfer (SWIPT) enabled transmitter to \emph{receive} and \emph{decode} information. Under the two-sta…
▽ More
We consider a class of wireless powered devices employing Hybrid Automatic Repeat reQuest (HARQ) to ensure reliable end-to-end communications over a two-state time-varying channel. A receiver, with no power source, relies on the energy transferred by a Simultaneous Wireless Information and Power Transfer (SWIPT) enabled transmitter to \emph{receive} and \emph{decode} information. Under the two-state channel model, information is received at two different rates while it is only possible to harvest energy in one of the states. The receiver aims to decode its messages with minimum expected number of re-transmissions. Dynamic and continuous nature of the problem motivated us to use a novel Markovian framework to bypass the complexities plaguing the conventional approaches such as MDP. Using the theory of absorbing Markov chains, we show that there exists an optimal policy utilizing the incoming RF signal solely to harvest energy or to accumulate mutual information. Hence, we convert the original problem with continuous action and state space into an equivalent one with discrete state and action space. For independent and identically distributed channels, we prove the optimality of a simple-to-implement {\em harvest-first-store-later} type policy. However, for time-correlated channels, we demonstrate that statistical knowledge of the channel may significantly improve the performance over such policies.
△ Less
Submitted 12 February, 2019; v1 submitted 8 November, 2017;
originally announced November 2017.
-
Stable Throughput of Cooperative Cognitive Networks with Energy Harvesting: Finite Relay Buffer and Finite Battery Capacity
Authors:
Mohamed A. Abd-Elmagid,
Tamer ElBatt,
Karim G. Seddik,
Ozgur Ercetin
Abstract:
This paper studies a generic model for cooperative cognitive radio networks where the secondary user is equipped with a finite relay queue as well as a finite battery queue. Our prime objective is to characterize the stable throughput region. Nevertheless, the complete characterization of the stable throughput region for such system is notoriously difficult, since the computation of the steady sta…
▽ More
This paper studies a generic model for cooperative cognitive radio networks where the secondary user is equipped with a finite relay queue as well as a finite battery queue. Our prime objective is to characterize the stable throughput region. Nevertheless, the complete characterization of the stable throughput region for such system is notoriously difficult, since the computation of the steady state distribution of the two-dimensional Markov Chain (MC) model for both finite queues is prohibitively complex. We first propose an algorithm to characterize the stable throughput region numerically, and show its sheer computational complexity for large queue lengths. To lend tractability and explore the nature of design parameters optimization at the cognitive node, we next focus on two simpler systems, namely, finite battery queue with infinite relay queue and finite relay queue with infinite battery queue (referred henceforth as dominant system $1$ and $2$, respectively). For each proposed dominant system, we investigate the maximum service rate of the cognitive node subject to stability conditions. Despite the complexity of the formulated optimization problems, due to their non-convexity, we exploit the problems' structure to transform them into linear programs. Thus, we are able to solve them efficiently using standard linear programming solvers. Our numerical results demonstrate that, in practical systems, finite battery and relay queues achieve the same level of benefits of a system with infinite queue sizes, when their sizes are sufficiently large. They also reveal that the achievable stable throughput region significantly expands when the arrival rate of the energy harvesting process increases.
△ Less
Submitted 18 June, 2018; v1 submitted 30 July, 2017;
originally announced July 2017.
-
Non-Orthogonal Multiple Access Schemes in Wireless Powered Communication Networks
Authors:
Mohamed A. Abd-Elmagid,
Alessandro Biason,
Tamer ElBatt,
Karim G. Seddik,
Michele Zorzi
Abstract:
We characterize time and power allocations to optimize the sum-throughput of a Wireless Powered Communication Network (WPCN) with Non-Orthogonal Multiple Access (NOMA). In our setup, an Energy Rich (ER) source broadcasts wireless energy to several devices, which use it to simultaneously transmit data to an Access Point (AP) on the uplink. Differently from most prior works, in this paper we conside…
▽ More
We characterize time and power allocations to optimize the sum-throughput of a Wireless Powered Communication Network (WPCN) with Non-Orthogonal Multiple Access (NOMA). In our setup, an Energy Rich (ER) source broadcasts wireless energy to several devices, which use it to simultaneously transmit data to an Access Point (AP) on the uplink. Differently from most prior works, in this paper we consider a generic scenario, in which the ER and AP do not coincide, i.e., are two separate entities. We study two NOMA decoding schemes, namely Low Complexity Decoding (LCD) and Successive Interference Cancellation Decoding (SICD). For each scheme, we formulate a sum-throughput optimization problem over a finite horizon. Despite the complexity of the LCD optimization problem, due to its non-convexity, we recast it into a series of geometric programs. On the other hand, we establish the convexity of the SICD optimization problem and propose an algorithm to find its optimal solution. Our numerical results demonstrate the importance of using successive interference cancellation in WPCNs with NOMA, and show how the energy should be distributed as a function of the system parameters.
△ Less
Submitted 3 March, 2017; v1 submitted 30 January, 2017;
originally announced January 2017.
-
Cache-Aided Heterogeneous Networks: Coverage and Delay Analysis
Authors:
Mohamed A. Abd-Elmagid,
Ozgur Ercetin,
Tamer ElBatt
Abstract:
This paper characterizes the performance of a generic $K$-tier cache-aided heterogeneous network (CHN), in which the base stations (BSs) across tiers differ in terms of their spatial densities, transmission powers, pathloss exponents, activity probabilities conditioned on the serving link and placement caching strategies. We consider that each user connects to the BS which maximizes its average re…
▽ More
This paper characterizes the performance of a generic $K$-tier cache-aided heterogeneous network (CHN), in which the base stations (BSs) across tiers differ in terms of their spatial densities, transmission powers, pathloss exponents, activity probabilities conditioned on the serving link and placement caching strategies. We consider that each user connects to the BS which maximizes its average received power and at the same time caches its file of interest. Modeling the locations of the BSs across different tiers as independent homogeneous Poisson Point processes (HPPPs), we derive closed-form expressions for the coverage probability and local delay experienced by a typical user in receiving each requested file. We show that our results for coverage probability and delay are consistent with those previously obtained in the literature for a single tier system.
△ Less
Submitted 24 January, 2017;
originally announced January 2017.
-
Decentralized Coded Caching in Wireless Networks: Trade-off between Storage and Latency
Authors:
Antonious M. Girgis,
Ozgur Ercetin,
Mohammed Nafie,
Tamer ElBatt
Abstract:
This paper studies the decentralized coded caching for a Fog Radio Access Network (F-RAN), whereby two edge-nodes (ENs) connected to a cloud server via fronthaul links with limited capacity are serving the requests of $K_r$ users. We consider all ENs and users are equipped with caches. A decentralized content placement is proposed to independently store contents at each network node during the off…
▽ More
This paper studies the decentralized coded caching for a Fog Radio Access Network (F-RAN), whereby two edge-nodes (ENs) connected to a cloud server via fronthaul links with limited capacity are serving the requests of $K_r$ users. We consider all ENs and users are equipped with caches. A decentralized content placement is proposed to independently store contents at each network node during the off-peak hours. After that, we design a coded delivery scheme in order to deliver the user demands during the peak-hours under the objective of minimizing the normalized delivery time (NDT), which refers to the worst case delivery latency. An information-theoretic lower bound on the minimum NDT is derived for arbitrary number of ENs and users. We evaluate numerically the performance of the decentralized scheme. Additionally, we prove the approximate optimality of the decentralized scheme for a special case when the caches are only available at the ENs.
△ Less
Submitted 25 January, 2017; v1 submitted 23 January, 2017;
originally announced January 2017.
-
Asymmetric Degrees of Freedom of the Full-Duplex MIMO 3-Way Channel with Unicast and Broadcast Messages
Authors:
Adel M. Elmahdy,
Amr El-Keyi,
Yahya Mohasseb,
Tamer ElBatt,
Mohammed Nafie,
Karim G. Seddik,
Tamer Khattab
Abstract:
In this paper, we characterize the asymmetric total degrees of freedom (DoF) of a multiple-input multiple-output (MIMO) 3-way channel. Each node has a separate-antenna full-duplex MIMO transceiver with a different number of antennas, where each antenna can be configured for either signal transmission or reception. We study this system under two message configurations; the first configuration is wh…
▽ More
In this paper, we characterize the asymmetric total degrees of freedom (DoF) of a multiple-input multiple-output (MIMO) 3-way channel. Each node has a separate-antenna full-duplex MIMO transceiver with a different number of antennas, where each antenna can be configured for either signal transmission or reception. We study this system under two message configurations; the first configuration is when each node has two unicast messages to be delivered to the two other nodes, while the second configuration is when each node has two unicast messages as well as one broadcast message to be delivered to the two other nodes. For each configuration, we first derive upper bounds on the total DoF of the system. Cut-set bounds in conjunction with genie-aided bounds are derived to characterize the achievable total DoF. Afterwards, we analytically derive the optimal number of transmit and receive antennas at each node to maximize the total DoF of the system, subject to the total number of antennas at each node. Finally, the achievable schemes for each configuration are constructed. The proposed schemes are mainly based on zero-forcing and null-space transmit beamforming.
△ Less
Submitted 31 July, 2016;
originally announced August 2016.
-
Sparse Spectrum Sensing in Infrastructure-less Cognitive Radio Networks via Binary Consensus Algorithms
Authors:
Mohamed Seif,
Tamer Elbatt,
Karim G. Seddik
Abstract:
Compressive Sensing has been utilized in Cognitive Radio Networks (CRNs) to exploit the sparse nature of the occupation of the primary users. Also, distributed spectrum sensing has been proposed to tackle the wireless channel problems, like node or link failures, rather than the common (centralized approach) for spectrum sensing. In this paper, we propose a distributed spectrum sensing framework b…
▽ More
Compressive Sensing has been utilized in Cognitive Radio Networks (CRNs) to exploit the sparse nature of the occupation of the primary users. Also, distributed spectrum sensing has been proposed to tackle the wireless channel problems, like node or link failures, rather than the common (centralized approach) for spectrum sensing. In this paper, we propose a distributed spectrum sensing framework based on consensus algorithms where SU nodes exchange their binary decisions to take global decisions without a fusion center to coordinate the sensing process. Each SU will share its decision with its neighbors, and at every new iteration each SU will take a new decision based on its current decision and the decisions it receives from its neighbors; in the next iteration, each SU will share its new decision with its neighbors. We show via simulations that the detection performance can tend to the performance of majority rule Fusion Center based CRNs.
△ Less
Submitted 11 June, 2016;
originally announced June 2016.
-
On Optimizing Cooperative Cognitive User Performance under Primary QoS Constraints
Authors:
Adel M. Elmahdy,
Amr El-Keyi,
Tamer ElBatt,
Karim G. Seddik
Abstract:
We study the problem of optimizing the performance of cognitive radio users with opportunistic real-time applications subject to primary users quality-of-service (QoS) constraints. Two constrained optimization problems are formulated; the first problem is maximizing the secondary user throughput while the second problem is minimizing the secondary user average delay, subject to a common constraint…
▽ More
We study the problem of optimizing the performance of cognitive radio users with opportunistic real-time applications subject to primary users quality-of-service (QoS) constraints. Two constrained optimization problems are formulated; the first problem is maximizing the secondary user throughput while the second problem is minimizing the secondary user average delay, subject to a common constraint on the primary user average delay. In spite of the complexity of the optimization problems, due to their non-convexity, we transform the first problem into a set of linear programs and the second problem into a set of quasiconvex optimization problems. We prove that both problems are equivalent with identical feasible sets and optimal solutions. We show, through numerical results, that the proposed cooperation policy represents the best compromise between enhancing the secondary users QoS and satisfying the primary users QoS requirements.
△ Less
Submitted 31 March, 2016;
originally announced March 2016.
-
Energy-Aware Cooperative Wireless Networks with Multiple Cognitive Users
Authors:
Mahmoud Ashour,
M. Majid Butt,
Amr Mohamed,
Tamer ElBatt,
Marwan Krunz
Abstract:
In this paper, we study and analyze cooperative cognitive radio networks with arbitrary number of secondary users (SUs). Each SU is considered a prospective relay for the primary user (PU) besides having its own data transmission demand. We consider a multi-packet transmission framework which allows multiple SUs to transmit simultaneously thanks to dirty-paper coding. We propose power allocation a…
▽ More
In this paper, we study and analyze cooperative cognitive radio networks with arbitrary number of secondary users (SUs). Each SU is considered a prospective relay for the primary user (PU) besides having its own data transmission demand. We consider a multi-packet transmission framework which allows multiple SUs to transmit simultaneously thanks to dirty-paper coding. We propose power allocation and scheduling policies that optimize the throughput for both PU and SU with minimum energy expenditure. The performance of the system is evaluated in terms of throughput and delay under different opportunistic relay selection policies. Towards this objective, we present a mathematical framework for deriving stability conditions for all queues in the system. Consequently, the throughput of both primary and secondary links is quantified. Furthermore, a moment generating function (MGF) approach is employed to derive a closed-form expression for the average delay encountered by the PU packets. Results reveal that we achieve better performance in terms of throughput and delay at lower energy cost as compared to equal power allocation schemes proposed earlier in literature. Extensive simulations are conducted to validate our theoretical findings.
△ Less
Submitted 21 March, 2016;
originally announced March 2016.
-
On Optimal Policies in Full-Duplex Wireless Powered Communication Networks
Authors:
Mohamed A. Abd-Elmagid,
Alessandro Biason,
Tamer ElBatt,
Karim G. Seddik,
Michele Zorzi
Abstract:
The optimal resource allocation scheme in a full-duplex Wireless Powered Communication Network (WPCN) composed of one Access Point (AP) and two wireless devices is analyzed and derived. AP operates in a full-duplex mode and is able to broadcast wireless energy signals in downlink and receive information data in uplink simultaneously. On the other hand, each wireless device is assumed to be equippe…
▽ More
The optimal resource allocation scheme in a full-duplex Wireless Powered Communication Network (WPCN) composed of one Access Point (AP) and two wireless devices is analyzed and derived. AP operates in a full-duplex mode and is able to broadcast wireless energy signals in downlink and receive information data in uplink simultaneously. On the other hand, each wireless device is assumed to be equipped with Radio-Frequency (RF) energy harvesting circuitry which gathers the energy sent by AP and stores it in a finite capacity battery. The harvested energy is then used for performing uplink data transmission tasks. In the literature, the main focus so far has been on slot-oriented optimization. In this context, all the harvested RF energy in a given slot is also consumed in the same slot. However, this approach leads to sub-optimal solutions because it does not take into account the Channel State Information (CSI) variations over future slots. Differently from most of the prior works, in this paper we focus on the long-term weighted throughput maximization problem. This approach significantly increases the complexity of the optimization problem since it requires to consider both CSI variations over future slots and the evolution of the batteries when deciding the optimal resource allocation. We formulate the problem using the Markov Decision Process (MDP) theory and show how to solve it. Our numerical results emphasize the superiority of our proposed full-duplex WPCN compared to the half-duplex WPCN and reveal interesting insights about the effects of perfect as well as imperfect self-interference cancellation techniques on the network performance.
△ Less
Submitted 16 February, 2019; v1 submitted 16 March, 2016;
originally announced March 2016.
-
Optimization of Energy-Constrained Wireless Powered Communication Networks with Heterogeneous Nodes
Authors:
Mohamed A. Abd-Elmagid,
Tamer ElBatt,
Karim G. Seddik
Abstract:
In this paper, we study wireless networks where nodes have two energy sources, namely a battery and radio frequency (RF) energy harvesting circuitry. We formulate two optimization problems with different objective functions, namely maximizing the sum throughput and maximizing the minimum throughput, for enhanced fairness. Furthermore, we show the generality of the proposed system model through cha…
▽ More
In this paper, we study wireless networks where nodes have two energy sources, namely a battery and radio frequency (RF) energy harvesting circuitry. We formulate two optimization problems with different objective functions, namely maximizing the sum throughput and maximizing the minimum throughput, for enhanced fairness. Furthermore, we show the generality of the proposed system model through characterizing the conditions under which the two formulated optimization problems can be reduced to the corresponding problems of different known wireless networks, namely, conventional wireless networks (battery-powered) and wireless powered communications networks (WPCNs) with only RF energy harvesting nodes. In addition, we introduce WPCNs with two types of nodes, with and without RF energy harvesting capability, in which the nodes without RF energy harvesting are utilized to enhance the sum throughput, even beyond WPCNs with all energy harvesting nodes. We establish the convexity of all formulated problems which opens room for efficient solution using standard techniques. Our numerical results show that the two types of wireless networks, namely WPCNs with only RF energy harvesting nodes and conventional wireless networks, are considered, respectively, as lower and upper bounds on the performance of the generalized problem setting in terms of the maximum sum throughput and the maxmin throughput. Moreover, the results reveal new insights and throughput-fairness trade-offs unique to our new problem setting.
△ Less
Submitted 30 September, 2017; v1 submitted 3 March, 2016;
originally announced March 2016.
-
An Information-theoretic Model for Knowledge Sharing in Opportunistic Social Networks
Authors:
Mai ElSherief,
Tamer ElBatt,
Ahmed Zahran,
Ahmed Helmy
Abstract:
In this paper we establish fundamental limits on the performance of knowledge sharing in opportunistic social net- works. In particular, we introduce a novel information-theoretic model to characterize the performance limits of knowledge sharing policies. Towards this objective, we first introduce the notions of knowledge gain and its upper bound, knowledge gain limit, per user. Second, we charact…
▽ More
In this paper we establish fundamental limits on the performance of knowledge sharing in opportunistic social net- works. In particular, we introduce a novel information-theoretic model to characterize the performance limits of knowledge sharing policies. Towards this objective, we first introduce the notions of knowledge gain and its upper bound, knowledge gain limit, per user. Second, we characterize these quantities for a number of network topologies and sharing policies. This work constitutes a first step towards defining and characterizing the performance limits and trade-offs associated with knowledge sharing in opportunistic social networks. Finally, we present nu- merical results characterizing the cumulative knowledge gain over time and its upper bound, using publicly available smartphone data. The results confirm the key role of the proposed model to motivate future research in this ripe area of research as well as new knowledge sharing policies.
△ Less
Submitted 12 May, 2015;
originally announced May 2015.
-
Maximum Throughput Opportunistic Network Coding in Two-Way Relay Networks
Authors:
Maha Zohdy,
Tamer ElBatt,
Mohamed Nafie
Abstract:
In this paper, we study Two-way relaying networks well-known for its throughput merits. In particular, we study the fundamental throughput delay trade-off in two-way relaying networks using opportunistic network coding. We characterize the optimal opportunistic network coding policy that maximizes the aggregate network throughput subject to an average packet delay constraint. Towards this objectiv…
▽ More
In this paper, we study Two-way relaying networks well-known for its throughput merits. In particular, we study the fundamental throughput delay trade-off in two-way relaying networks using opportunistic network coding. We characterize the optimal opportunistic network coding policy that maximizes the aggregate network throughput subject to an average packet delay constraint. Towards this objective, first, we consider a pair of nodes communicating through a common relay and develop a two dimensional Markov chain model capturing the buffers' length states at the two nodes. Second, we formulate an optimization problem for the delay constrained optimal throughput. Exploiting the structure of the problem, it can be cast as a linear programming problem. Third, we compare the optimal policy to two baseline schemes and show its merits with respect to throughput, average delay and power consumption. First, the optimal policy significantly outperforms the first baseline with respect to throughput, delay and power consumption. Moreover, it outperforms the second baseline with respect to the average delay and power consumption for asymmetrical traffic arrival rates.
△ Less
Submitted 10 February, 2015;
originally announced February 2015.
-
Stability Analysis of Slotted Aloha with Opportunistic RF Energy Harvesting
Authors:
Abdelrahman M. Ibrahim,
Ozgur Ercetin,
Tamer ElBatt
Abstract:
Energy harvesting (EH) is a promising technology for realizing energy efficient wireless networks. In this paper, we utilize the ambient RF energy, particularly interference from neighboring transmissions, to replenish the batteries of the EH enabled nodes. However, RF energy harvesting imposes new challenges into the analysis of wireless networks. Our objective in this work is to investigate the…
▽ More
Energy harvesting (EH) is a promising technology for realizing energy efficient wireless networks. In this paper, we utilize the ambient RF energy, particularly interference from neighboring transmissions, to replenish the batteries of the EH enabled nodes. However, RF energy harvesting imposes new challenges into the analysis of wireless networks. Our objective in this work is to investigate the performance of a slotted Aloha random access wireless network consisting of two types of nodes, namely Type I which has unlimited energy supply and Type II which is solely powered by an RF energy harvesting circuit. The transmissions of a Type I node are recycled by a Type II node to replenish its battery. We characterize an inner bound on the stable throughput region under half-duplex and full-duplex energy harvesting paradigms as well as for the finite capacity battery case. We present numerical results that validate our analytical results, and demonstrate their utility for the analysis of the exact system.
△ Less
Submitted 27 July, 2015; v1 submitted 27 January, 2015;
originally announced January 2015.
-
On the Stable Throughput of Cooperative Cognitive Radio Networks with Finite Relaying Buffer
Authors:
Adel M. Elmahdy,
Amr El-Keyi,
Tamer ElBatt,
Karim G. Seddik
Abstract:
In this paper, we study the problem of cooperative communications in cognitive radio systems where the secondary user has limited relaying room for the overheard primary packets. More specifically, we characterize the stable throughput region of a cognitive radio network with a finite relaying buffer at the secondary user. Towards this objective, we formulate a constrained optimization problem for…
▽ More
In this paper, we study the problem of cooperative communications in cognitive radio systems where the secondary user has limited relaying room for the overheard primary packets. More specifically, we characterize the stable throughput region of a cognitive radio network with a finite relaying buffer at the secondary user. Towards this objective, we formulate a constrained optimization problem for maximizing the secondary user throughput while guaranteeing the stability of the primary user queue. We consider a general cooperation policy where the packet admission and queue selection probabilities, at the secondary user, are both dependent on the state (length) of the finite relaying buffer. Despite the sheer complexity of the optimization problem, attributed to its non-convexity, we transform it to a linear program. Our numerical results reveal a number of valuable insights, e.g., it is always mutually beneficial to cooperate in delivering the primary packets in terms of expanding the stable throughput region. In addition, the stable throughput region of the system, compared to the case of infinite relaying queue capacity, marginally shrinks for limited relaying queue capacity.
△ Less
Submitted 9 October, 2014;
originally announced October 2014.
-
Effective Capacity of Cognitive Radio Links: Accessing Primary Feedback Erroneously
Authors:
M. Majid Butt,
Ahmed Anwar,
Amr Mohamed,
Tamer ElBatt
Abstract:
We study the performance of a cognitive system modeled by one secondary and one primary link and operating under statistical quality of service (QoS) delay constraints. We analyze the effective capacity (EC) to quantify the secondary user (SU) performance under delay constraints. The SU intends to maximize the benefit of the feedback messages on the primary link to reduce SU interference for prima…
▽ More
We study the performance of a cognitive system modeled by one secondary and one primary link and operating under statistical quality of service (QoS) delay constraints. We analyze the effective capacity (EC) to quantify the secondary user (SU) performance under delay constraints. The SU intends to maximize the benefit of the feedback messages on the primary link to reduce SU interference for primary user (PU) and makes opportunistic use of the channel to transmit his packets. We assume that SU has erroneous access to feedback information of PU. We propose a three power level scheme and study the tradeoff between degradation in EC of SU and reliability of PU defined as the success rate of the transmitted packets. Our analysis shows that increase in error in feedback access causes more interference to PU and packet success rate decreases correspondingly.
△ Less
Submitted 20 June, 2014;
originally announced June 2014.
-
Cognitive Radio Networks with Probabilistic Relaying: Stable Throughput and Delay Tradeoffs
Authors:
Mahmoud Ashour,
Amr A. El-Sherif,
Tamer ElBatt,
Amr Mohamed
Abstract:
In this paper, we study and analyze fundamental throughput and delay tradeoffs in cooperative multiple access for cognitive radio systems. We focus on the class of randomized cooperative policies, whereby the secondary user (SU) serves either the queue of its own data or the queue of the primary user (PU) relayed data with certain service probabilities. Moreover, admission control is introduced at…
▽ More
In this paper, we study and analyze fundamental throughput and delay tradeoffs in cooperative multiple access for cognitive radio systems. We focus on the class of randomized cooperative policies, whereby the secondary user (SU) serves either the queue of its own data or the queue of the primary user (PU) relayed data with certain service probabilities. Moreover, admission control is introduced at the relay queue, whereby a PU's packet is admitted to the relay queue with an admission probability. The proposed policy introduces a fundamental tradeoff between the delays of the PU and SU. Consequently, it opens room for trading the PU delay for enhanced SU delay and vice versa. Thus, the system could be tuned according to the demands of the intended application. Towards this objective, stability conditions for the queues involved in the system are derived. Furthermore, a moment generating function approach is employed to derive closed-form expressions for the average delay encountered by the packets of both users. The effect of varying the service and admission probabilities on the system's throughput and delay is thoroughly investigated. Results show that cooperation expands the stable throughput region. Moreover, numerical simulation results assert the extreme accuracy of the analytically derived delay expressions. In addition, we provide a criterion for the SU based on which it decides whether cooperation is beneficial to the PU or not. Furthermore, we show the impact of controlling the flow of data at the relay queue using the admission probability.
△ Less
Submitted 24 April, 2014;
originally announced April 2014.
-
Interference-Based Optimal Power-Efficient Access Scheme for Cognitive Radio Networks
Authors:
Ahmed H. Anwar,
Ahmed El Shafie,
Amr Mohamed,
Tamer ElBatt,
Mohsen Guizani
Abstract:
In this paper, we propose a new optimization-based access strategy of multipacket reception (MPR) channel for multiple secondary users (SUs) accessing the primary user (PU) spectrum opportunistically. We devise an analytical model that realizes the multipacket access strategy of SUs that maximizes the throughput of individual backlogged SUs subject to queue stability of the PU. All the network rec…
▽ More
In this paper, we propose a new optimization-based access strategy of multipacket reception (MPR) channel for multiple secondary users (SUs) accessing the primary user (PU) spectrum opportunistically. We devise an analytical model that realizes the multipacket access strategy of SUs that maximizes the throughput of individual backlogged SUs subject to queue stability of the PU. All the network receiving nodes have MPR capability. We aim at maximizing the throughput of the individual SUs such that the PU's queue is maintained stable. Moreover, we are interested in providing an energy-efficient cognitive scheme. Therefore, we include energy constraints on the PU and SU average transmitted energy to the optimization problem. Each SU accesses the medium with certain probability that depends on the PU's activity, i.e., active or inactive. The numerical results show the advantage in terms of SU throughput of the proposed scheme over the conventional access scheme, where the SUs access the channel randomly with fixed power when the PU is sensed to be idle.
△ Less
Submitted 8 July, 2014; v1 submitted 3 April, 2014;
originally announced April 2014.
-
Improved Spectrum Mobility using Virtual Reservation in Collaborative Cognitive Radio Networks
Authors:
Ayman T. Abdel-Hamid,
Ahmed H. Zahran,
Tamer ElBatt
Abstract:
Cognitive radio technology would enable a set of secondary users (SU) to opportunistically use the spectrum licensed to a primary user (PU). On the appearance of this PU on a specific frequency band, any SU occupying this band should free it for PUs. Typically, SUs may collaborate to reduce the impact of cognitive users on the primary network and to improve the performance of the SUs. In this pape…
▽ More
Cognitive radio technology would enable a set of secondary users (SU) to opportunistically use the spectrum licensed to a primary user (PU). On the appearance of this PU on a specific frequency band, any SU occupying this band should free it for PUs. Typically, SUs may collaborate to reduce the impact of cognitive users on the primary network and to improve the performance of the SUs. In this paper, we propose and analyze the performance of virtual reservation in collaborative cognitive networks. Virtual reservation is a novel link maintenance strategy that aims to maximize the throughput of the cognitive network through full spectrum utilization. Our performance evaluation shows significant improvements not only in the SUs blocking and forced termination probabilities but also in the throughput of cognitive users.
△ Less
Submitted 9 October, 2013;
originally announced October 2013.
-
Coverage Probability Analysis for Wireless Networks Using Repulsive Point Processes
Authors:
Abdelrahman M. Ibrahim,
Tamer ElBatt,
Amr El-Keyi
Abstract:
The recent witnessed evolution of cellular networks from a carefully planned deployment to more irregular, heterogeneous deployments of Macro, Pico and Femto-BSs motivates new analysis and design approaches. In this paper, we analyze the coverage probability in cellular networks assuming repulsive point processes for the base station deployment. In particular, we characterize, analytically using s…
▽ More
The recent witnessed evolution of cellular networks from a carefully planned deployment to more irregular, heterogeneous deployments of Macro, Pico and Femto-BSs motivates new analysis and design approaches. In this paper, we analyze the coverage probability in cellular networks assuming repulsive point processes for the base station deployment. In particular, we characterize, analytically using stochastic geometry, the downlink probability of coverage under a Matern hardcore point process to ensure minimum distance between the randomly located base stations. Assuming a mobile user connects to the nearest base station and Rayleigh fading, we derive two lower bounds expressions on the downlink probability of coverage that is within 4% from the simulated scenario. To validate our model, we compare the probability of coverage of the Matern hardcore topology against an actual base station deployment obtained from a public database. The comparison shows that the actual base station deployment can be fitted by setting the appropriate Matern point process density.
△ Less
Submitted 13 September, 2013;
originally announced September 2013.
-
Cooperative Access in Cognitive Radio Networks: Stable Throughput and Delay Tradeoffs
Authors:
Mahmoud Ashour,
Amr A. El-Sherif,
Tamer ElBatt,
Amr Mohamed
Abstract:
In this paper, we study and analyze fundamental throughput-delay tradeoffs in cooperative multiple access for cognitive radio systems. We focus on the class of randomized cooperative policies, whereby the secondary user (SU) serves either the queue of its own data or the queue of the primary user (PU) relayed data with certain service probabilities. The proposed policy opens room for trading the P…
▽ More
In this paper, we study and analyze fundamental throughput-delay tradeoffs in cooperative multiple access for cognitive radio systems. We focus on the class of randomized cooperative policies, whereby the secondary user (SU) serves either the queue of its own data or the queue of the primary user (PU) relayed data with certain service probabilities. The proposed policy opens room for trading the PU delay for enhanced SU delay. Towards this objective, stability conditions for the queues involved in the system are derived. Furthermore, a moment generating function approach is employed to derive closed-form expressions for the average delay encountered by the packets of both users. Results reveal that cooperation expands the stable throughput region of the system and significantly reduces the delay at both users. Moreover, we quantify the gain obtained in terms of the SU delay under the proposed policy, over conventional relaying that gives strict priority to the relay queue.
△ Less
Submitted 24 April, 2014; v1 submitted 4 September, 2013;
originally announced September 2013.
-
Effective Capacity of Delay Constrained Cognitive Radio Links Exploiting Primary Feedback
Authors:
Ahmed H. Anwar,
Karim G. Seddik,
Tamer ElBatt,
Ahmed H. Zahran
Abstract:
In this paper, we analyze the performance of a secondary link in a cognitive radio (CR) system operating under statistical quality of service (QoS) delay constraints. In particular, we quantify analytically the performance improvement for the secondary user (SU) when applying a feedback based sensing scheme under the "SINR Interference" model. We leverage the concept of effective capacity (EC) int…
▽ More
In this paper, we analyze the performance of a secondary link in a cognitive radio (CR) system operating under statistical quality of service (QoS) delay constraints. In particular, we quantify analytically the performance improvement for the secondary user (SU) when applying a feedback based sensing scheme under the "SINR Interference" model. We leverage the concept of effective capacity (EC) introduced earlier in the literature to quantify the wireless link performance under delay constraints, in an attempt to opportunistically support real-time applications. Towards this objective, we study a two-link network, a single secondary link and a primary network abstracted to a single primary link, with and without primary feedback exploitation. We analytically prove that exploiting primary feedback at the secondary transmitter improves the EC of the secondary user and decreases the secondary user average transmitted power. Finally, we present numerical results that support our analytical results.
△ Less
Submitted 31 March, 2013;
originally announced April 2013.
-
A Cooperative Q-learning Approach for Real-time Power Allocation in Femtocell Networks
Authors:
Hussein Saad,
Amr Mohamed,
Tamer ElBatt
Abstract:
In this paper, we address the problem of distributed interference management of cognitive femtocells that share the same frequency range with macrocells (primary user) using distributed multi-agent Q-learning. We formulate and solve three problems representing three different Q-learning algorithms: namely, centralized, distributed and partially distributed power control using Q-learning (CPC-Q, DP…
▽ More
In this paper, we address the problem of distributed interference management of cognitive femtocells that share the same frequency range with macrocells (primary user) using distributed multi-agent Q-learning. We formulate and solve three problems representing three different Q-learning algorithms: namely, centralized, distributed and partially distributed power control using Q-learning (CPC-Q, DPC-Q and PDPC-Q). CPCQ, although not of practical interest, characterizes the global optimum. Each of DPC-Q and PDPC-Q works in two different learning paradigms: Independent (IL) and Cooperative (CL). The former is considered the simplest form for applying Qlearning in multi-agent scenarios, where all the femtocells learn independently. The latter is the proposed scheme in which femtocells share partial information during the learning process in order to strike a balance between practical relevance and performance. In terms of performance, the simulation results showed that the CL paradigm outperforms the IL paradigm and achieves an aggregate femtocells capacity that is very close to the optimal one. For the practical relevance issue, we evaluate the robustness and scalability of DPC-Q, in real time, by deploying new femtocells in the system during the learning process, where we showed that DPC-Q in the CL paradigm is scalable to large number of femtocells and more robust to the network dynamics compared to the IL paradigm
△ Less
Submitted 12 March, 2013;
originally announced March 2013.
-
A Soft Sensing-Based Cognitive Access Scheme Exploiting Primary Feedback
Authors:
Ahmed M. Arafa,
Karim G. Seddik,
Ahmed K. Sultan,
Tamer ElBatt,
Amr A. El-Sherif
Abstract:
In this paper, we examine a cognitive spectrum access scheme in which secondary users exploit the primary feedback information. We consider an overlay secondary network employing a random access scheme in which secondary users access the channel by certain access probabilities that are function of the spectrum sensing metric. In setting our problem, we assume that secondary users can eavesdrop on…
▽ More
In this paper, we examine a cognitive spectrum access scheme in which secondary users exploit the primary feedback information. We consider an overlay secondary network employing a random access scheme in which secondary users access the channel by certain access probabilities that are function of the spectrum sensing metric. In setting our problem, we assume that secondary users can eavesdrop on the primary link's feedback. We study the cognitive radio network from a queuing theory point of view. Access probabilities are determined by solving a secondary throughput maximization problem subject to a constraint on the primary queues' stability. First, we formulate our problem which is found to be non-convex. Yet, we solve it efficiently by exploiting the structure of the secondary throughput equation. Our scheme yields improved results in, both, the secondary user throughput and the primary user packet delay. In addition, it comes very close to the optimal genie-aided scheme in which secondary users act upon the presumed perfect knowledge of the primary user's activity.
△ Less
Submitted 8 April, 2012;
originally announced April 2012.
-
Distributed Cooperative Q-learning for Power Allocation in Cognitive Femtocell Networks
Authors:
Hussein Saad,
Amr Mohamed,
Tamer ElBatt
Abstract:
In this paper, we propose a distributed reinforcement learning (RL) technique called distributed power control using Q-learning (DPC-Q) to manage the interference caused by the femtocells on macro-users in the downlink. The DPC-Q leverages Q-Learning to identify the sub-optimal pattern of power allocation, which strives to maximize femtocell capacity, while guaranteeing macrocell capacity level in…
▽ More
In this paper, we propose a distributed reinforcement learning (RL) technique called distributed power control using Q-learning (DPC-Q) to manage the interference caused by the femtocells on macro-users in the downlink. The DPC-Q leverages Q-Learning to identify the sub-optimal pattern of power allocation, which strives to maximize femtocell capacity, while guaranteeing macrocell capacity level in an underlay cognitive setting. We propose two different approaches for the DPC-Q algorithm: namely, independent, and cooperative. In the former, femtocells learn independently from each other while in the latter, femtocells share some information during learning in order to enhance their performance. Simulation results show that the independent approach is capable of mitigating the interference generated by the femtocells on macro-users. Moreover, the results show that cooperation enhances the performance of the femtocells in terms of speed of convergence, fairness and aggregate femtocell capacity.
△ Less
Submitted 18 March, 2012;
originally announced March 2012.
-
On the Role of Vehicular Mobility in Cooperative Content Caching
Authors:
Osama Attia,
Tamer ElBatt
Abstract:
In this paper, we analyze the performance of cooperative content caching in vehicular ad hoc networks (VANETs). In particular, we characterize, using analysis and simulations, the behavior of the probability of outage (i.e. not finding a requested data chunk at a neighbor) under freeway vehicular mobility. First, we introduce a formal definition for the probability of outage in the context of coop…
▽ More
In this paper, we analyze the performance of cooperative content caching in vehicular ad hoc networks (VANETs). In particular, we characterize, using analysis and simulations, the behavior of the probability of outage (i.e. not finding a requested data chunk at a neighbor) under freeway vehicular mobility. First, we introduce a formal definition for the probability of outage in the context of cooperative content caching. Second, we characterize, analytically, the outage probability under vehicular and random mobility scenarios. Next, we verify the analytical results using simulations and compare the performance under a number of plausible mobility scenarios. This provides key insights into the problem and the involved trade-offs and enable us to assess the potential opportunity offered by the, somewhat structured, vehicular mobility that can be exploited by cooperative content caching schemes. The presented numerical results exhibit complete agreement between the analytical and simulation studies. Finally, we observe that vehicular mobility creates opportunities for enhanced outage performance under practically relevant scenarios.
△ Less
Submitted 3 March, 2012;
originally announced March 2012.