Skip to main content

Showing 1–16 of 16 results for author: Samarasinghe, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2501.14270  [pdf, other

    cs.IT

    Max-Min Fairness for IRS-Assisted Secure Two-Way Communications

    Authors: Harindu Jayarathne, Tharindu Wickremasinghe, Kasun T. Hemachandra, Tharaka Samarasinghe, Saman Atapattu

    Abstract: This paper investigates an intelligent reflective surface (IRS) assisted secure multi-user two-way communication system. The aim of this paper is to enhance the physical layer security by optimizing the minimum secrecy-rate among all user-pairs in the presence of a malicious user. The optimization problem is converted into an alternating optimization problem consisting of two sub-problems. Transmi… ▽ More

    Submitted 24 January, 2025; originally announced January 2025.

    Comments: This paper has been accepted for presentation at IEEE Wireless Communications and Networking Conference (WCNC) 2025

  2. arXiv:2007.08874  [pdf, ps, other

    cs.NI

    The Effect of Multiple Access Categories on the MAC Layer Performance of IEEE 802.11p

    Authors: Geeth P. Wijesiri, Jussi Haapola, Tharaka Samarasinghe

    Abstract: The enhanced distributed channel access (EDCA) mechanism enables IEEE 802.11p to accommodate differential quality of service (QoS) levels in vehicle-to-vehicle (V2V) communications, through four access categories (ACs). This paper presents multi-dimensional discrete-time Markov chain (DTMC) based model to study the effect of parallel operation of the ACs on the medium access control (MAC) layer pe… ▽ More

    Submitted 17 July, 2020; originally announced July 2020.

  3. arXiv:1911.11743  [pdf, ps, other

    cs.LG cs.HC eess.SP stat.ML

    Device-Free User Authentication, Activity Classification and Tracking using Passive Wi-Fi Sensing: A Deep Learning Based Approach

    Authors: Vinoj Jayasundara, Hirunima Jayasekara, Tharaka Samarasinghe, Kasun T. Hemachandra

    Abstract: Privacy issues related to video camera feeds have led to a growing need for suitable alternatives that provide functionalities such as user authentication, activity classification and tracking in a noninvasive manner. Existing infrastructure makes Wi-Fi a possible candidate, yet, utilizing traditional signal processing methods to extract information necessary to fully characterize an event by sens… ▽ More

    Submitted 26 November, 2019; originally announced November 2019.

  4. arXiv:1911.07616  [pdf, ps, other

    cs.NI

    A Discrete-Time Markov Chain Based Comparison of the MAC Layer Performance of C-V2X Mode 4 and IEEE 802.11p

    Authors: Geeth P. Wijesiri, Jussi Haapola, Tharaka Samarasinghe

    Abstract: Vehicle-to-vehicle (V2V) communication plays a pivotal role in intelligent transport systems (ITS) with cellular-vehicle to everything (C-V2X) and IEEE 802.11p being the two competing enabling technologies. This paper presents multi-dimensional discrete-time Markov chain (DTMC) based models to study the medium access control (MAC) layer performance of the IEEE 802.11p standard and C-V2X Mode 4. Th… ▽ More

    Submitted 17 August, 2020; v1 submitted 24 October, 2019; originally announced November 2019.

  5. A Novel Content Caching and Delivery Scheme for Millimeter Wave Device-to-Device Communications

    Authors: Theshani Nuradha, Tharaka Samarasinghe, Kasun T. Hemachandra

    Abstract: A novel content caching strategy is proposed for a cache enabled device-to-device (D2D) network where the user devices are allowed to communicate using millimeter wave (mmWave) D2D links (> 6 GHz) as well as conventional sub 6 GHz cellular links. The proposed content placement strategy maximizes the successful content delivery probability of a line of sight D2D link. Furthermore, a heuristic algor… ▽ More

    Submitted 15 November, 2019; originally announced November 2019.

    Journal ref: International Symposium on Wireless Personal Multimedia Communications (WPMC), 2019

  6. arXiv:1810.05644  [pdf, ps, other

    cs.LG stat.ML

    Temporal Convolutional Memory Networks for Remaining Useful Life Estimation of Industrial Machinery

    Authors: Lahiru Jayasinghe, Tharaka Samarasinghe, Chau Yuen, Jenny Chen Ni Low, Shuzhi Sam Ge

    Abstract: Accurately estimating the remaining useful life (RUL) of industrial machinery is beneficial in many real-world applications. Estimation techniques have mainly utilized linear models or neural network based approaches with a focus on short term time dependencies. This paper, introduces a system model that incorporates temporal convolutions with both long term and short term time dependencies. The p… ▽ More

    Submitted 10 December, 2018; v1 submitted 12 October, 2018; originally announced October 2018.

    Comments: accepted to IEEE International Conference on Industrial Technology (ICIT2019)

  7. arXiv:1803.07305  [pdf, ps, other

    cs.IT

    Cluster-based Wireless Energy Transfer for Low Complex Energy Receivers

    Authors: Samith Abeywickrama, Tharaka Samarasinghe, Chau Yuen, Rui Zhang

    Abstract: This paper proposes a novel channel estimation method and a cluster-based opportunistic scheduling policy, for a wireless energy transfer (WET) system consisting of multiple low-complex energy receivers (ERs) with limited processing capabilities. Firstly, in the training stage, the energy transmitter (ET) obtains a set of Received Signal Strength Indicator (RSSI) feedback values from all ERs, and… ▽ More

    Submitted 20 March, 2018; originally announced March 2018.

    Comments: 7 pages, 3 figures, To appear in International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), 2018

  8. arXiv:1803.04195  [pdf, ps, other

    cs.IT

    Wireless Energy Transfer to a Pair of Energy Receivers using Signal Strength Feedback

    Authors: Chanaka Singhabahu, Tharaka Samarasinghe, Samith Abeywickrama, Chau Yuen

    Abstract: This paper focuses on wireless energy transfer (WET) to a pair of low complex energy receivers (ER), by only utilizing received signal strength indicator (RSSI) values that are fed back from the ERs to the energy transmitter (ET). Selecting the beamformer that maximizes the total average energy transfer between the ET and the ERs, while satisfying a minimum harvested energy criterion at each ER, i… ▽ More

    Submitted 12 March, 2018; originally announced March 2018.

    Comments: 7 pages, 2 figures, To appear in International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), 2018

  9. arXiv:1712.03531  [pdf, ps, other

    eess.SP cs.IT

    Wireless Energy Beamforming Using Signal Strength Feedback

    Authors: Samith Abeywickrama, Tharaka Samarasinghe, Chin Keong Ho

    Abstract: Multiple antenna techniques, that allow energy beamforming, have been looked upon as a possible candidate for increasing the efficiency of the transfer process between the energy transmitter (ET) and the energy receiver (ER) in wireless energy transfer. This paper introduces a novel scheme that facilitates energy beamforming by utilizing Received Signal Strength Indicator (RSSI) values to estimate… ▽ More

    Submitted 10 December, 2017; originally announced December 2017.

    Comments: 6 pages, 6 figures, in Proc. IEEE Global Communications Conference (GLOBECOM), 2016

  10. Wireless Energy Beamforming using Received Signal Strength Indicator Feedback

    Authors: Samith Abeywickrama, Tharaka Samarasinghe, Chin Keong Ho, Chau Yuen

    Abstract: Multiple antenna techniques that allow energy beamforming have been looked upon as a possible candidate for increasing the transfer efficiency between the energy transmitter (ET) and the energy receiver (ER) in wireless power transfer. This paper introduces a novel scheme that facilitates energy beamforming by utilizing Received Signal Strength Indicator (RSSI) values to estimate the channel. Firs… ▽ More

    Submitted 30 November, 2017; v1 submitted 4 April, 2017; originally announced May 2017.

    Comments: 13 pages, 13 figures, Accepted by IEEE Transactions on Signal Processing

    Journal ref: IEEE Transactions on Signal Processing ( Volume: 66, Issue: 1, Pages:224 - 235, Jan.1, 1 2018 )

  11. arXiv:1412.0883  [pdf, other

    cs.IT

    Optimizing user selection schemes in vector broadcast channels

    Authors: Meng Wang, Tharaka Samarasinghe, Jamie S. Evans

    Abstract: In this paper, we focus on the ergodic downlink sum-rate performance of a system consisting of a set of heterogeneous users. We study three user selection schemes to group near-orthogonal users for simultaneous transmission. The first scheme is a random selection policy that achieves fairness, but does not exploit multi-user diversity. The second scheme is a greedy selection policy that fully expl… ▽ More

    Submitted 2 December, 2014; originally announced December 2014.

    Comments: 12 pages, 7 figures

  12. Transmission Rank Selection for Opportunistic Beamforming with Quality of Service Constraints

    Authors: Meng Wang, Tharaka Samarasinghe, Jamie Evans

    Abstract: In this paper, we consider a multi-cell multi-user MISO broadcast channel. The system operates according to the opportunistic beamforming framework in a multi-cell environment with variable number of transmit beams (may alternatively be referred as the transmission rank) at each base station. The maximum number of co-scheduled users in a cell is equal to its transmission rank, thus increasing it w… ▽ More

    Submitted 10 May, 2014; originally announced May 2014.

    Comments: To appear in IEEE ICC 2014, Sydney, Australia

  13. arXiv:1309.6732  [pdf, ps, other

    cs.IT

    Outage Capacity of Opportunistic Beamforming with Random User Locations

    Authors: Tharaka Samarasinghe, Hazer Inaltekin, Jamie Evans

    Abstract: This paper studies the outage capacity of a network consisting of a multitude of heterogenous mobile users, and operating according to the classical opportunistic beamforming framework. The base station is located at the center of the cell, which is modeled as a disk of finite radius. The random user locations are modeled using a homogenous spatial Poisson point process. The received signals are i… ▽ More

    Submitted 26 September, 2013; originally announced September 2013.

    Comments: To appear in Globecom 2013, Atlanta, USA

  14. arXiv:1107.4822  [pdf, ps, other

    cs.IT

    Optimal Selective Feedback Policies for Opportunistic Beamforming

    Authors: Tharaka Samarasinghe, Hazer Inaltekin, Jamie S. Evans

    Abstract: This paper studies the structure of downlink sum-rate maximizing selective decentralized feedback policies for opportunistic beamforming under finite feedback constraints on the average number of mobile users feeding back. Firstly, it is shown that any sum-rate maximizing selective decentralized feedback policy must be a threshold feedback policy. This result holds for all fading channel models wi… ▽ More

    Submitted 24 July, 2011; originally announced July 2011.

    Comments: Submitted to IEEE Transactions on Information Theory

  15. Vector Broadcast Channels: Optimal Threshold Selection Problem

    Authors: Tharaka Samarasinghe, Hazer Inaltekin, Jamie Evans

    Abstract: Threshold feedback policies are well known and provably rate-wise optimal selective feedback techniques for communication systems requiring partial channel state information (CSI). However, optimal selection of thresholds at mobile users to maximize information theoretic data rates subject to feedback constraints is an open problem. In this paper, we focus on the optimal threshold selection proble… ▽ More

    Submitted 24 March, 2011; originally announced March 2011.

    Comments: Submitted to IEEE International Symposium on Information Theory, St. Petersburg, Russia, Aug 2011

  16. Vector Broadcast Channels: Optimality of Threshold Feedback Policies

    Authors: Tharaka Samarasinghe, Hazer Inaltekin, Jamie Evans

    Abstract: Beamforming techniques utilizing only partial channel state information (CSI) has gained popularity over other communication strategies requiring perfect CSI thanks to their lower feedback requirements. The amount of feedback in beamforming based communication systems can be further reduced through selective feedback techniques in which only the users with channels good enough are allowed to feed… ▽ More

    Submitted 24 March, 2011; originally announced March 2011.

    Comments: Submitted to IEEE International Symposium on Information Theory, St. Petersburg, Russia, Aug 2011