-
Radio Resource Management and Path Planning in Intelligent Transportation Systems via Reinforcement Learning for Environmental Sustainability
Authors:
S. Norouzi,
N. Azarasa,
M. R. Abedi,
N. Mokari,
S. E. Seyedabrishami,
H. Saeedi,
E. A. Jorswieck
Abstract:
Efficient and dynamic path planning has become an important topic for urban areas with larger density of connected vehicles (CV) which results in reduction of travel time and directly contributes to environmental sustainability through reducing energy consumption. CVs exploit the cellular wireless vehicle-to-everything (C-V2X) communication technology to disseminate the vehicle-to-infrastructure (…
▽ More
Efficient and dynamic path planning has become an important topic for urban areas with larger density of connected vehicles (CV) which results in reduction of travel time and directly contributes to environmental sustainability through reducing energy consumption. CVs exploit the cellular wireless vehicle-to-everything (C-V2X) communication technology to disseminate the vehicle-to-infrastructure (V2I) messages to the Base-station (BS) to improve situation awareness on urban roads. In this paper, we investigate radio resource management (RRM) in such a framework to minimize the age of information (AoI) so as to enhance path planning results. We use the fact that V2I messages with lower AoI value result in less error in estimating the road capacity and more accurate path planning. Through simulations, we compare road travel times and volume over capacity (V/C) against different levels of AoI and demonstrate the promising performance of the proposed framework.
△ Less
Submitted 13 May, 2024;
originally announced May 2024.
-
AI-enabled Priority and Auction-Based Spectrum Management for 6G
Authors:
Mina Khadem,
Farshad Zeinali,
Nader Mokari,
Hamid Saeedi
Abstract:
In this paper, we present a quality of service (QoS)-aware priority-based spectrum management scheme to guarantee the minimum required bit rate of vertical sector players (VSPs) in the 5G and beyond generation, including the 6th generation (6G). VSPs are considered as spectrum leasers to optimize the overall spectrum efficiency of the network from the perspective of the mobile network operator (MN…
▽ More
In this paper, we present a quality of service (QoS)-aware priority-based spectrum management scheme to guarantee the minimum required bit rate of vertical sector players (VSPs) in the 5G and beyond generation, including the 6th generation (6G). VSPs are considered as spectrum leasers to optimize the overall spectrum efficiency of the network from the perspective of the mobile network operator (MNO) as the spectrum licensee and auctioneer. We exploit a modified Vickrey-Clarke-Groves (VCG) auction mechanism to allocate the spectrum to them where the QoS and the truthfulness of bidders are considered as two important parameters for prioritization of VSPs. The simulation is done with the help of deep deterministic policy gradient (DDPG) as a deep reinforcement learning (DRL)-based algorithm. Simulation results demonstrate that deploying the DDPG algorithm results in significant advantages. In particular, the efficiency of the proposed spectrum management scheme is about %85 compared to the %35 efficiency in traditional auction methods.
△ Less
Submitted 12 January, 2024;
originally announced January 2024.
-
Dynamic Fairness-Aware Spectrum Auction for Enhanced Licensed Shared Access in 6G Networks
Authors:
Mina Khadem,
Maryam Ansarifard,
Nader Mokari,
Mohammadreza Javan,
Hamid Saeedi,
Eduard A. Jorswieck
Abstract:
This article introduces a new approach to address the spectrum scarcity challenge in 6G networks by implementing the enhanced licensed shared access (ELSA) framework. Our proposed auction mechanism aims to ensure fairness in spectrum allocation to mobile network operators (MNOs) through a novel weighted auction called the fair Vickery-Clarke-Groves (FVCG) mechanism. Through comparison with traditi…
▽ More
This article introduces a new approach to address the spectrum scarcity challenge in 6G networks by implementing the enhanced licensed shared access (ELSA) framework. Our proposed auction mechanism aims to ensure fairness in spectrum allocation to mobile network operators (MNOs) through a novel weighted auction called the fair Vickery-Clarke-Groves (FVCG) mechanism. Through comparison with traditional methods, the study demonstrates that the proposed auction method improves fairness significantly. We suggest using spectrum sensing and integrating UAV-based networks to enhance efficiency of the LSA system. This research employs two methods to solve the problem. We first propose a novel greedy algorithm, named market share based weighted greedy algorithm (MSWGA) to achieve better fairness compared to the traditional auction methods and as the second approach, we exploit deep reinforcement learning (DRL) algorithms, to optimize the auction policy and demonstrate its superiority over other methods. Simulation results show that the deep deterministic policy gradient (DDPG) method performs superior to soft actor critic (SAC), MSWGA, and greedy methods. Moreover, a significant improvement is observed in fairness index compared to the traditional greedy auction methods. This improvement is as high as about 27% and 35% when deploying the MSWGA and DDPG methods, respectively.
△ Less
Submitted 20 December, 2023;
originally announced December 2023.
-
AI-based Radio and Computing Resource Allocation and Path Planning in NOMA NTNs: AoI Minimization under CSI Uncertainty
Authors:
Maryam Ansarifard,
Nader Mokari,
Mohammadreza Javan,
Hamid Saeedi,
Eduard A. Jorswieck
Abstract:
In this paper, we develop a hierarchical aerial computing framework composed of high altitude platform (HAP) and unmanned aerial vehicles (UAVs) to compute the fully offloaded tasks of terrestrial mobile users which are connected through an uplink non-orthogonal multiple access (UL-NOMA). To better assess the freshness of information in computation-intensive applications the criterion of age of in…
▽ More
In this paper, we develop a hierarchical aerial computing framework composed of high altitude platform (HAP) and unmanned aerial vehicles (UAVs) to compute the fully offloaded tasks of terrestrial mobile users which are connected through an uplink non-orthogonal multiple access (UL-NOMA). To better assess the freshness of information in computation-intensive applications the criterion of age of information (AoI) is considered. In particular, the problem is formulated to minimize the average AoI of users with elastic tasks, by adjusting UAVs trajectory and resource allocation on both UAVs and HAP, which is restricted by the channel state information (CSI) uncertainty and multiple resource constraints of UAVs and HAP. In order to solve this non-convex optimization problem, two methods of multi-agent deep deterministic policy gradient (MADDPG) and federated reinforcement learning (FRL) are proposed to design the UAVs trajectory, and obtain channel, power, and CPU allocations. It is shown that task scheduling significantly reduces the average AoI. This improvement is more pronounced for larger task sizes. On one hand, it is shown that power allocation has a marginal effect on the average AoI compared to using full transmission power for all users. Compared with traditional transmission schemes, the simulation results show our scheduling scheme results in a substantial improvement in average AoI.
△ Less
Submitted 29 May, 2023; v1 submitted 1 May, 2023;
originally announced May 2023.
-
Smart Resource Allocation Model via Artificial Intelligence in Software Defined 6G Networks
Authors:
Ali Nouruzi,
Atefeh Rezaei,
Ata Khalili,
Nader Mokari,
Mohammad Reza Javan,
Eduard A. Jorswieck,
Halim Yanikomeroglu
Abstract:
In this paper, we design a new flexible smart software-defined radio access network (Soft-RAN) architecture with traffic awareness for sixth generation (6G) wireless networks. In particular, we consider a hierarchical resource allocation model for the proposed smart soft-RAN model where the software-defined network (SDN) controller is the first and foremost layer of the framework. This unit dynami…
▽ More
In this paper, we design a new flexible smart software-defined radio access network (Soft-RAN) architecture with traffic awareness for sixth generation (6G) wireless networks. In particular, we consider a hierarchical resource allocation model for the proposed smart soft-RAN model where the software-defined network (SDN) controller is the first and foremost layer of the framework. This unit dynamically monitors the network to select a network operation type on the basis of distributed or centralized resource allocation procedures to intelligently perform decision-making. In this paper, our aim is to make the network more scalable and more flexible in terms of conflicting performance indicators such as achievable data rate, overhead, and complexity indicators. To this end, we introduce a new metric, i.e., throughput-overhead-complexity (TOC), for the proposed machine learning-based algorithm, which supports a trade-off between these performance indicators. In particular, the decision making based on TOC is solved via deep reinforcement learning (DRL) which determines an appropriate resource allocation policy.
Furthermore, for the selected algorithm, we employ the soft actor-critic (SAC) method which is more accurate, scalable, and robust than other learning methods. Simulation results demonstrate that the proposed smart network achieves better performance in terms of TOC compared to fixed centralized or distributed resource management schemes that lack dynamism. Moreover, our proposed algorithm outperforms conventional learning methods employed in recent state-of-the-art network designs.
△ Less
Submitted 9 February, 2023;
originally announced February 2023.
-
Two-Hop Age of Information Scheduling for Multi-UAV Assisted Mobile Edge Computing: FRL vs MADDPG
Authors:
Marjan Tajik,
Mohammadreza Maleki,
Nader Mokari,
Mohammad Reza Javan,
Hamid Saeedi,
Bile Peng,
Eduard A. Jorswieck
Abstract:
In this work, we adopt the emerging technology of mobile edge computing (MEC) in the Unmanned aerial vehicles (UAVs) for communication-computing systems, to optimize the age of information (AoI) in the network. We assume that tasks are processed jointly on UAVs and BS to enhance edge performance with limited connectivity and computing. Using UAVs and BS jointly with MEC can reduce AoI on the netwo…
▽ More
In this work, we adopt the emerging technology of mobile edge computing (MEC) in the Unmanned aerial vehicles (UAVs) for communication-computing systems, to optimize the age of information (AoI) in the network. We assume that tasks are processed jointly on UAVs and BS to enhance edge performance with limited connectivity and computing. Using UAVs and BS jointly with MEC can reduce AoI on the network. To maintain the freshness of the tasks, we formulate the AoI minimization in two-hop communication framework, the first hop at the UAVs and the second hop at the BS. To approach the challenge, we optimize the problem using a deep reinforcement learning (DRL) framework, called federated reinforcement learning (FRL). In our network we have two types of agents with different states and actions but with the same policy. Our FRL enables us to handle the two-step AoI minimization and UAV trajectory problems. In addition, we compare our proposed algorithm, which has a centralized processing unit to update the weights, with fully decentralized multi-agent deep deterministic policy gradient (MADDPG), which enhances the agent's performance. As a result, the suggested algorithm outperforms the MADDPG by about 38\%
△ Less
Submitted 19 June, 2022;
originally announced June 2022.
-
Average Age of Information Minimization in Reliable Covert Communication on Time-Varying Channels
Authors:
Shima Salar Hosseini,
Paeiz Azmi,
Nader Mokari
Abstract:
In this letter, we propose reliable covert communications with the aim of minimizing age of information (AoI) in the time-varying channels. We named the time duration that channel state information (CSI) is valid as a new metric, as age of channel variation (AoC). To find reliable covert communication in a fresh manner in dynamic environments, this work considers a new constraint that shows a rela…
▽ More
In this letter, we propose reliable covert communications with the aim of minimizing age of information (AoI) in the time-varying channels. We named the time duration that channel state information (CSI) is valid as a new metric, as age of channel variation (AoC). To find reliable covert communication in a fresh manner in dynamic environments, this work considers a new constraint that shows a relation between AoI and AoC. With the aid of the proposed constraint, this paper addresses two main challenges of reliable covert communication with the aim of minimizing AoI: 1) users packets with desirable size; 2) guaranteeing the negligible probability of Willies detection, in time-varying networks. In the simulation results, we compare the performance of the proposed constraint in reliable covert communication with the aim of minimizing AoI with conventional optimization of the requirement of information freshness in covert communications.
△ Less
Submitted 3 May, 2022;
originally announced May 2022.
-
A Comprehensive Survey of Spectrum Sharing Schemes from a Standardization and Implementation Perspective
Authors:
Mohammad Parvini,
Amir Hossein Zarif,
Ali Nouruzi,
Nader Mokari,
Mohammad Reza Javan,
Bijan Abbasi,
Amir Ghasemi,
Halim Yanikomeroglu
Abstract:
As the services and requirements of next-generation wireless networks become increasingly diversified, it is estimated that the current frequency bands of mobile network operators (MNOs) will be unable to cope with the immensity of anticipated demands. Due to spectrum scarcity, there has been a growing trend among stakeholders toward identifying practical solutions to make the most productive use…
▽ More
As the services and requirements of next-generation wireless networks become increasingly diversified, it is estimated that the current frequency bands of mobile network operators (MNOs) will be unable to cope with the immensity of anticipated demands. Due to spectrum scarcity, there has been a growing trend among stakeholders toward identifying practical solutions to make the most productive use of the exclusively allocated bands on a shared basis through spectrum sharing mechanisms. However, due to the technical complexities of these mechanisms, their design presents challenges, as it requires coordination among multiple entities. To address this challenge, in this paper, we begin with a detailed review of the recent literature on spectrum sharing methods, classifying them on the basis of their operational frequency regime that is, whether they are implemented to operate in licensed bands (e.g., licensed shared access (LSA), spectrum access system (SAS), and dynamic spectrum sharing (DSS)) or unlicensed bands (e.g., LTE-unlicensed (LTE-U), licensed assisted access (LAA), MulteFire, and new radio-unlicensed (NR-U)). Then, in order to narrow the gap between the standardization and vendor-specific implementations, we provide a detailed review of the potential implementation scenarios and necessary amendments to legacy cellular networks from the perspective of telecom vendors and regulatory bodies. Next, we analyze applications of artificial intelligence (AI) and machine learning (ML) techniques for facilitating spectrum sharing mechanisms and leveraging the full potential of autonomous sharing scenarios. Finally, we conclude the paper by presenting open research challenges, which aim to provide insights into prospective research endeavors.
△ Less
Submitted 21 March, 2022;
originally announced March 2022.
-
Toward a Smart Resource Allocation Policy via Artificial Intelligence in 6G Networks: Centralized or Decentralized?
Authors:
Ali Nouruzi,
Atefeh Rezaei,
Ata Khalili,
Nader Mokari,
Mohammad Reza Javan,
Eduard A. Jorswieck,
Halim Yanikomeroglu
Abstract:
In this paper, we design a new smart softwaredefined radio access network (RAN) architecture with important properties like flexibility and traffic awareness for sixth generation (6G) wireless networks. In particular, we consider a hierarchical resource allocation framework for the proposed smart soft-RAN model, where the software-defined network (SDN) controller is the first and foremost layer of…
▽ More
In this paper, we design a new smart softwaredefined radio access network (RAN) architecture with important properties like flexibility and traffic awareness for sixth generation (6G) wireless networks. In particular, we consider a hierarchical resource allocation framework for the proposed smart soft-RAN model, where the software-defined network (SDN) controller is the first and foremost layer of the framework. This unit dynamically monitors the network to select a network operation type on the basis of distributed or centralized resource allocation architectures to perform decision-making intelligently. In this paper, our aim is to make the network more scalable and more flexible in terms of achievable data rate, overhead, and complexity indicators. To this end, we introduce a new metric, throughput overhead complexity (TOC), for the proposed machine learning-based algorithm, which makes a trade-off between these performance indicators. In particular, the decision making based on TOC is solved via deep reinforcement learning (DRL), which determines an appropriate resource allocation policy. Furthermore, for the selected algorithm, we employ the soft actor-critic method, which is more accurate, scalable, and robust than other learning methods. Simulation results demonstrate that the proposed smart network achieves better performance in terms of TOC compared to fixed centralized or distributed resource management schemes that lack dynamism. Moreover, our proposed algorithm outperforms conventional learning methods employed in other state-of-the-art network designs.
△ Less
Submitted 18 February, 2022;
originally announced February 2022.
-
AI-based Robust Resource Allocation in End-to-End Network Slicing under Demand and CSI Uncertainties
Authors:
Amir Gharehgoli,
Ali Nouruzi,
Nader Mokari,
Paeiz Azmi,
Mohamad Reza Javan,
Eduard A. Jorswieck
Abstract:
Network slicing (NwS) is one of the main technologies in the fifth-generation of mobile communication and beyond (5G+). One of the important challenges in the NwS is information uncertainty which mainly involves demand and channel state information (CSI). Demand uncertainty is divided into three types: number of users requests, amount of bandwidth, and requested virtual network functions workloads…
▽ More
Network slicing (NwS) is one of the main technologies in the fifth-generation of mobile communication and beyond (5G+). One of the important challenges in the NwS is information uncertainty which mainly involves demand and channel state information (CSI). Demand uncertainty is divided into three types: number of users requests, amount of bandwidth, and requested virtual network functions workloads. Moreover, the CSI uncertainty is modeled by three methods: worst-case, probabilistic, and hybrid. In this paper, our goal is to maximize the utility of the infrastructure provider by exploiting deep reinforcement learning algorithms in end-to-end NwS resource allocation under demand and CSI uncertainties. The proposed formulation is a nonconvex mixed-integer non-linear programming problem. To perform robust resource allocation in problems that involve uncertainty, we need a history of previous information. To this end, we use a recurrent deterministic policy gradient (RDPG) algorithm, a recurrent and memory-based approach in deep reinforcement learning. Then, we compare the RDPG method in different scenarios with soft actor-critic (SAC), deep deterministic policy gradient (DDPG), distributed, and greedy algorithms. The simulation results show that the SAC method is better than the DDPG, distributed, and greedy methods, respectively. Moreover, the RDPG method out performs the SAC approach on average by 70%.
△ Less
Submitted 10 February, 2022;
originally announced February 2022.
-
Multi Agent Reinforcement Learning Trajectory Design and Two-Stage Resource Management in CoMP UAV VLC Networks
Authors:
Mohammad Reza Maleki,
Mohammad Robat Mili,
Mohammad Reza Javan,
Nader Mokari,
Eduard A. Jorswieck
Abstract:
In this paper, we consider unmanned aerial vehicles (UAVs) equipped with a visible light communication (VLC) access point and coordinated multipoint (CoMP) capability that allows users to connect to more than one UAV. UAVs can move in 3-dimensional (3D) at a constant acceleration, where a central server is responsible for synchronization and cooperation among UAVs. The effect of accelerated motion…
▽ More
In this paper, we consider unmanned aerial vehicles (UAVs) equipped with a visible light communication (VLC) access point and coordinated multipoint (CoMP) capability that allows users to connect to more than one UAV. UAVs can move in 3-dimensional (3D) at a constant acceleration, where a central server is responsible for synchronization and cooperation among UAVs. The effect of accelerated motion in UAV is necessary to be considered. Unlike most existing works, we examine the effects of variable speed on kinetics and radio resource allocations. For the proposed system model, we define two different time frames. In the frame, the acceleration of each UAV is specified, and in each slot, radio resources are allocated. Our goal is to formulate a multiobjective optimization problem where the total data rate is maximized, and the total communication power consumption is minimized simultaneously. To handle this multiobjective optimization, we first apply the scalarization method and then apply multi-agent deep deterministic policy gradient (MADDPG). We improve this solution method by adding two critic networks together with two-stage resources allocation. Simulation results indicate that the constant acceleration motion of UAVs shows about 8\% better results than conventional motion systems in terms of performance.
△ Less
Submitted 3 December, 2021; v1 submitted 6 November, 2021;
originally announced November 2021.
-
AI-based Radio Resource Management and Trajectory Design for PD-NOMA Communication in IRS-UAV Assisted Networks
Authors:
Hussein M. Hariz,
Saeed Sheikhzadeh,
Nader Mokari,
Mohammad R. Javan,
B. Abbasi-Arand,
Eduard A. Jorswieck
Abstract:
In this paper, we consider that the unmanned aerial vehicles (UAVs) with attached intelligent reflecting surfaces (IRSs) play the role of flying reflectors that reflect the signal of users to the destination, and utilize the power-domain non-orthogonal multiple access (PD-NOMA) scheme in the uplink. We investigate the benefits of the UAV-IRS on the internet of things (IoT) networks that improve th…
▽ More
In this paper, we consider that the unmanned aerial vehicles (UAVs) with attached intelligent reflecting surfaces (IRSs) play the role of flying reflectors that reflect the signal of users to the destination, and utilize the power-domain non-orthogonal multiple access (PD-NOMA) scheme in the uplink. We investigate the benefits of the UAV-IRS on the internet of things (IoT) networks that improve the freshness of collected data of the IoT devices via optimizing power, sub-carrier, and trajectory variables, as well as, the phase shift matrix elements. We consider minimizing the average age-of-information (AAoI) of users subject to the maximum transmit power limitations, PD-NOMA-related restriction, and the constraints related to UAV's movement. The optimization problem consists of discrete and continuous variables. Hence, we divide the resource allocation problem into two sub-problems and use two different reinforcement learning (RL) based algorithms to solve them, namely the double deep Qnetwork (DDQN) and a proximal policy optimization (PPO). Our numerical results illustrate the performance gains that can be achieved for IRS enabled UAV communication systems. Moreover, we compare our deep RL (DRL) based algorithm with matching algorithm and random trajectory, showing the combination of DDQN and PPO algorithm proposed in this paper performs 10% and 15% better than matching algorithm and random-trajectory algorithm, respectively.
△ Less
Submitted 6 November, 2021;
originally announced November 2021.
-
Online Service Provisioning in NFV-enabled Networks Using Deep Reinforcement Learning
Authors:
Ali Nouruzi,
Abolfazl Zakeri,
Mohamad Reza Javan,
Nader Mokari,
Rasheed Hussain,
Ahsan Syed Kazmi
Abstract:
In this paper, we study a Deep Reinforcement Learning (DRL) based framework for an online end-user service provisioning in a Network Function Virtualization (NFV)-enabled network. We formulate an optimization problem aiming to minimize the cost of network resource utilization. The main challenge is provisioning the online service requests by fulfilling their Quality of Service (QoS) under limited…
▽ More
In this paper, we study a Deep Reinforcement Learning (DRL) based framework for an online end-user service provisioning in a Network Function Virtualization (NFV)-enabled network. We formulate an optimization problem aiming to minimize the cost of network resource utilization. The main challenge is provisioning the online service requests by fulfilling their Quality of Service (QoS) under limited resource availability. Moreover, fulfilling the stochastic service requests in a large network is another challenge that is evaluated in this paper. To solve the formulated optimization problem in an efficient and intelligent manner, we propose a Deep Q-Network for Adaptive Resource allocation (DQN-AR) in NFV-enable network for function placement and dynamic routing which considers the available network resources as DQN states. Moreover, the service's characteristics, including the service life time and number of the arrival requests, are modeled by the Uniform and Exponential distribution, respectively. In addition, we evaluate the computational complexity of the proposed method. Numerical results carried out for different ranges of parameters reveal the effectiveness of our framework. In specific, the obtained results show that the average number of admitted requests of the network increases by 7 up to 14% and the network utilization cost decreases by 5 and 20 %.
△ Less
Submitted 3 November, 2021;
originally announced November 2021.
-
Learning based E2E Energy Efficient in Joint Radio and NFV Resource Allocation for 5G and Beyond Networks
Authors:
Narges Gholipoor,
Ali Nouruzi,
Shima Salarhosseini,
Mohammad Reza Javan,
Nader Mokari,
Eduard A. Jorswieck
Abstract:
In this paper, we propose a joint radio and core resource allocation framework for NFV-enabled networks. In the proposed system model, the goal is to maximize energy efficiency (EE), by guaranteeing end-to-end (E2E) quality of service (QoS) for different service types. To this end, we formulate an optimization problem in which power and spectrum resources are allocated in the radio part. In the co…
▽ More
In this paper, we propose a joint radio and core resource allocation framework for NFV-enabled networks. In the proposed system model, the goal is to maximize energy efficiency (EE), by guaranteeing end-to-end (E2E) quality of service (QoS) for different service types. To this end, we formulate an optimization problem in which power and spectrum resources are allocated in the radio part. In the core part, the chaining, placement, and scheduling of functions are performed to ensure the QoS of all users. This joint optimization problem is modeled as a Markov decision process (MDP), considering time-varying characteristics of the available resources and wireless channels. A soft actor-critic deep reinforcement learning (SAC-DRL) algorithm based on the maximum entropy framework is subsequently utilized to solve the above MDP. Numerical results reveal that the proposed joint approach based on the SAC-DRL algorithm could significantly reduce energy consumption compared to the case in which R-RA and NFV-RA problems are optimized separately.
△ Less
Submitted 13 July, 2021;
originally announced July 2021.
-
AoI Minimization in Energy Harvesting and Spectrum Sharing Enabled 6G Networks
Authors:
Amir Hossein Zarif,
Paeiz Azmi,
Nader Mokari,
Mohammad Reza Javan,
Eduard Jorswieck
Abstract:
Spectrum sharing is a method to solve the problem of frequency spectrum deficiency. This paper studies a novel AI based spectrum sharing and energy harvesting system in which the freshness of information (AoI) is guaranteed. The system includes a primary user with access rights to the spectrum and a secondary user. The secondary user is an energy harvesting sensor that intends to use the primary u…
▽ More
Spectrum sharing is a method to solve the problem of frequency spectrum deficiency. This paper studies a novel AI based spectrum sharing and energy harvesting system in which the freshness of information (AoI) is guaranteed. The system includes a primary user with access rights to the spectrum and a secondary user. The secondary user is an energy harvesting sensor that intends to use the primary user spectrum opportunistically. The problem is formulated as partially observable Markov decision processes (POMDPs) and solved using two methods: a deep Q-network (DQN) and dueling double deep Q-Network (D3QN) to achieve the optimal policy. The purpose is to choose the best action adaptively in every time slot based on its situation in both overlay and underlay modes to minimize the average AoI of the secondary user. Finally, simulation experiments are performed to evaluate the effectiveness of the proposed scheme compared to the overlay mode. According to the results, the average AoI in the proposed system is less than that of the existing models, including only overlay mode. The average user access improved from 30% in the overlay mode to 45% in the DQN and 48% in the D3QN.
△ Less
Submitted 1 July, 2021;
originally announced July 2021.
-
AI-Based Secure NOMA and Cognitive Radio enabled Green Communications: Channel State Information and Battery Value Uncertainties
Authors:
Saeed Sheikhzadeh,
Mohsen Pourghasemian,
Mohammad R. Javan,
Nader Mokari,
Eduard A. Jorswieck
Abstract:
In this paper, the security-aware robust resource allocation in energy harvesting cognitive radio networks is considered with cooperation between two transmitters while there are uncertainties in channel gains and battery energy value. To be specific, the primary access point harvests energy from the green resource and uses time switching protocol to send the energy and data towards the secondary…
▽ More
In this paper, the security-aware robust resource allocation in energy harvesting cognitive radio networks is considered with cooperation between two transmitters while there are uncertainties in channel gains and battery energy value. To be specific, the primary access point harvests energy from the green resource and uses time switching protocol to send the energy and data towards the secondary access point (SAP). Using power-domain non-orthogonal multiple access technique, the SAP helps the primary network to improve the security of data transmission by using the frequency band of the primary network. In this regard, we introduce the problem of maximizing the proportional-fair energy efficiency (PFEE) considering uncertainty in the channel gains and battery energy value subject to the practical constraints. Moreover, the channel gain of the eavesdropper is assumed to be unknown. Employing the decentralized partially observable Markov decision process, we investigate the solution of the corresponding resource allocation problem. We exploit multi-agent with single reward deep deterministic policy gradient (MASRDDPG) and recurrent deterministic policy gradient (RDPG) methods. These methods are compared with the state-of-the-art ones like multi-agent and single-agent DDPG. Simulation results show that both MASRDDPG and RDPG methods, outperform the state-of-the-art methods by providing more PFEE to the network.
△ Less
Submitted 30 June, 2021;
originally announced June 2021.
-
Resource Management for Transmit Power Minimization in UAV-Assisted RIS HetNets Supported by Dual Connectivity
Authors:
Ata Khalili,
Ehsan Mohammadi Monfard,
Shayan Zargari,
Mohammad Reza. Javan,
Nader Mokari,
Eduard A. Jorswieck
Abstract:
This paper proposes a novel approach to improve the performance of a heterogeneous network (HetNet) supported by dual connectivity (DC) by adopting multiple unmanned aerial vehicles (UAVs) as passive relays that carry reconfigurable intelligent surfaces (RISs). More specifically, RISs are deployed under the UAVs termed as UAVs-RISs that operate over the micro-wave ($μ$W) channel in the sky to sust…
▽ More
This paper proposes a novel approach to improve the performance of a heterogeneous network (HetNet) supported by dual connectivity (DC) by adopting multiple unmanned aerial vehicles (UAVs) as passive relays that carry reconfigurable intelligent surfaces (RISs). More specifically, RISs are deployed under the UAVs termed as UAVs-RISs that operate over the micro-wave ($μ$W) channel in the sky to sustain a strong line-of-sight (LoS) connection with the ground users. The macro-cell operates over the $μ$W channel based on orthogonal multiple access (OMA), while small base stations (SBSs) operate over the millimeter-wave (mmW) channel based on non-orthogonal multiple access (NOMA). We study the problem of total transmit power minimization by jointly optimizing the trajectory/velocity of each UAV, RISs' phase shifts, subcarrier allocations, and active beamformers at each BS. The underlying problem is highly non-convex and the global optimal solution is intractable. To handle it, we decompose the original problem into two subproblems, i.e., a subproblem which deals with the UAVs' trajectories/velocities, RISs' phase shifts, and subcarrier allocations for $μ$W; and a subproblem for active beamforming design and subcarrier allocation for mmW. In particular, we solve the first subproblem via the dueling deep Q-Network (DQN) learning approach by developing a distributed algorithm which leads to a better policy evaluation. Then, we solve the active beamforming design and subcarrier allocation for the mmW via the successive convex approximation (SCA) method. Simulation results exhibit the effectiveness of the proposed resource allocation scheme compared to other baseline schemes. In particular, it is revealed that by deploying UAVs-RISs, the transmit power can be reduced by 6 dBm while maintaining similar guaranteed QoS.
△ Less
Submitted 24 June, 2021;
originally announced June 2021.
-
AI-Based and Mobility-Aware Energy Efficient Resource Allocation and Trajectory Design for NFV Enabled Aerial Networks
Authors:
Mohsen Pourghasemian,
Mohammad Reza Abedi,
Shima Salarhosseini,
Nader Mokari,
Mohammad Reza Javan,
Eduard A. Jorswieck
Abstract:
In this paper, we propose a novel joint intelligent trajectory design and resource allocation algorithm based on user's mobility and their requested services for unmanned aerial vehicles (UAVs) assisted networks, where UAVs act as nodes of a network function virtualization (NFV) enabled network. Our objective is to maximize energy efficiency and minimize the average delay on all services by alloca…
▽ More
In this paper, we propose a novel joint intelligent trajectory design and resource allocation algorithm based on user's mobility and their requested services for unmanned aerial vehicles (UAVs) assisted networks, where UAVs act as nodes of a network function virtualization (NFV) enabled network. Our objective is to maximize energy efficiency and minimize the average delay on all services by allocating the limited radio and NFV resources. In addition, due to the traffic conditions and mobility of users, we let some Virtual Network Functions (VNFs) to migrate from their current locations to other locations to satisfy the Quality of Service requirements. We formulate our problem to find near-optimal locations of UAVs, transmit power, subcarrier assignment, placement, and scheduling the requested service's functions over the UAVs and perform suitable VNF migration. Then we propose a novel Hierarchical Hybrid Continuous and Discrete Action (HHCDA) deep reinforcement learning method to solve our problem. Finally, the convergence and computational complexity of the proposed algorithm and its performance analyzed for different parameters. Simulation results show that our proposed HHCDA method decreases the request reject rate and average delay by 31.5% and 20% and increases the energy efficiency by 40% compared to DDPG method.
△ Less
Submitted 21 May, 2021;
originally announced May 2021.
-
Age of Information Aware VNF Scheduling in Industrial IoT Using Deep Reinforcement Learning
Authors:
Mohammad Akbari,
Mohammad Reza Abedi,
Roghayeh Joda,
Mohsen Pourghasemian,
Nader Mokari,
Melike Erol-Kantarci
Abstract:
In delay-sensitive industrial internet of things (IIoT) applications, the age of information (AoI) is employed to characterize the freshness of information. Meanwhile, the emerging network function virtualization provides flexibility and agility for service providers to deliver a given network service using a sequence of virtual network functions (VNFs). However, suitable VNF placement and schedul…
▽ More
In delay-sensitive industrial internet of things (IIoT) applications, the age of information (AoI) is employed to characterize the freshness of information. Meanwhile, the emerging network function virtualization provides flexibility and agility for service providers to deliver a given network service using a sequence of virtual network functions (VNFs). However, suitable VNF placement and scheduling in these schemes is NP-hard and finding a globally optimal solution by traditional approaches is complex. Recently, deep reinforcement learning (DRL) has appeared as a viable way to solve such problems. In this paper, we first utilize single agent low-complex compound action actor-critic RL to cover both discrete and continuous actions and jointly minimize VNF cost and AoI in terms of network resources under end-to end Quality of Service constraints. To surmount the single-agent capacity limitation for learning, we then extend our solution to a multi-agent DRL scheme in which agents collaborate with each other. Simulation results demonstrate that single-agent schemes significantly outperform the greedy algorithm in terms of average network cost and AoI. Moreover, multi-agent solution decreases the average cost by dividing the tasks between the agents. However, it needs more iterations to be learned due to the requirement on the agents collaboration.
△ Less
Submitted 10 May, 2021;
originally announced May 2021.
-
AoI-Aware Resource Allocation for Platoon-Based C-V2X Networks via Multi-Agent Multi-Task Reinforcement Learning
Authors:
Mohammad Parvini,
Mohammad Reza Javan,
Nader Mokari,
Bijan Abbasi,
Eduard A. Jorswieck
Abstract:
This paper investigates the problem of age of information (AoI) aware radio resource management for a platooning system. Multiple autonomous platoons exploit the cellular wireless vehicle-to-everything (C-V2X) communication technology to disseminate the cooperative awareness messages (CAMs) to their followers while ensuring timely delivery of safety-critical messages to the Road-Side Unit (RSU). D…
▽ More
This paper investigates the problem of age of information (AoI) aware radio resource management for a platooning system. Multiple autonomous platoons exploit the cellular wireless vehicle-to-everything (C-V2X) communication technology to disseminate the cooperative awareness messages (CAMs) to their followers while ensuring timely delivery of safety-critical messages to the Road-Side Unit (RSU). Due to the challenges of dynamic channel conditions, centralized resource management schemes that require global information are inefficient and lead to large signaling overheads. Hence, we exploit a distributed resource allocation framework based on multi-agent reinforcement learning (MARL), where each platoon leader (PL) acts as an agent and interacts with the environment to learn its optimal policy. Existing MARL algorithms consider a holistic reward function for the group's collective success, which often ends up with unsatisfactory results and cannot guarantee an optimal policy for each agent. Consequently, motivated by the existing literature in RL, we propose a novel MARL framework that trains two critics with the following goals: A global critic which estimates the global expected reward and motivates the agents toward a cooperating behavior and an exclusive local critic for each agent that estimates the local individual reward. Furthermore, based on the tasks each agent has to accomplish, the individual reward of each agent is decomposed into multiple sub-reward functions where task-wise value functions are learned separately. Numerical results indicate our proposed algorithm's effectiveness compared with the conventional RL methods applied in this area.
△ Less
Submitted 10 May, 2021;
originally announced May 2021.
-
Proactive and AoI-aware Failure Recovery for Stateful NFV-enabled Zero-Touch 6G Networks: Model-Free DRL Approach
Authors:
Amirhossein Shaghaghi,
Abolfazl Zakeri,
Nader Mokari,
Mohammad Reza Javan,
Mohammad Behdadfar,
Eduard A Jorswieck
Abstract:
In this paper, we propose a Zero-Touch, deep reinforcement learning (DRL)-based Proactive Failure Recovery framework called ZT-PFR for stateful network function virtualization (NFV)-enabled networks. To this end, we formulate a resource-efficient optimization problem minimizing the network cost function including resource cost and wrong decision penalty. As a solution, we propose state-of-the-art…
▽ More
In this paper, we propose a Zero-Touch, deep reinforcement learning (DRL)-based Proactive Failure Recovery framework called ZT-PFR for stateful network function virtualization (NFV)-enabled networks. To this end, we formulate a resource-efficient optimization problem minimizing the network cost function including resource cost and wrong decision penalty. As a solution, we propose state-of-the-art DRL-based methods such as soft-actor-critic (SAC) and proximal-policy-optimization (PPO). In addition, to train and test our DRL agents, we propose a novel impending-failure model. Moreover, to keep network status information at an acceptable freshness level for appropriate decision-making, we apply the concept of age of information to strike a balance between the event and scheduling based monitoring. Several key systems and DRL algorithm design insights for ZT-PFR are drawn from our analysis and simulation results. For example, we use a hybrid neural network, consisting long short-term memory layers in the DRL agents structure, to capture impending-failures time dependency.
△ Less
Submitted 11 September, 2021; v1 submitted 2 February, 2021;
originally announced March 2021.
-
Robust Energy-Efficient Resource Management, SIC Ordering, and Beamforming Design for MC MISO-NOMA Enabled 6G
Authors:
Abolfazl Zakeri,
Ata Khalili,
Mohammad Reza Javan,
Nader Mokari,
Eduard A Jorswieck
Abstract:
This paper studies a novel approach for successive interference cancellation (SIC) ordering and beamforming in a multiple antennas non-orthogonal multiple access (NOMA) network with multi-carrier multi-user setup. To this end, we formulate a joint beamforming design, subcarrier allocation, user association, and SIC ordering algorithm to maximize the worst-case energy efficiency (EE). The formulate…
▽ More
This paper studies a novel approach for successive interference cancellation (SIC) ordering and beamforming in a multiple antennas non-orthogonal multiple access (NOMA) network with multi-carrier multi-user setup. To this end, we formulate a joint beamforming design, subcarrier allocation, user association, and SIC ordering algorithm to maximize the worst-case energy efficiency (EE). The formulated problem is a non-convex mixed integer non-linear programming (MINLP) which is generally difficult to solve. To handle it, we first adopt the linearizion technique as well as relaxing the integer variables, and then we employ the Dinkelbach algorithm to convert it into a more mathematically tractable form. The adopted non-convex optimization problem is transformed into an equivalent rank-constrained semidefinite programming (SDP) and is solved by SDP relaxation and exploiting sequential fractional programming. Furthermore, to strike a balance between complexity and performance, a low complex approach based on alternative optimization is adopted. Numerical results unveil that the proposed SIC ordering method outperforms the conventional existing works addressed in the literature.
△ Less
Submitted 17 January, 2021;
originally announced January 2021.
-
A Unified Framework for Joint Energy and AoI Optimization via Deep Reinforcement Learning for NOMA MEC-based Networks
Authors:
Abolfazl Zakeri,
Mohammad Parvini,
Mohammad Reza Javan,
Nader Mokari,
Eduard A Jorswieck
Abstract:
In this paper, we design a novel scheduling and resource allocation algorithm for a smart mobile edge computing (MEC) assisted radio access network. Different from previous energy efficiency (EE) based or the average age of information (AAoI)-based network designs, we propose a unified metric for simultaneously optimizing ESE and AAoI of the network. To further improve the system capacity, non-ort…
▽ More
In this paper, we design a novel scheduling and resource allocation algorithm for a smart mobile edge computing (MEC) assisted radio access network. Different from previous energy efficiency (EE) based or the average age of information (AAoI)-based network designs, we propose a unified metric for simultaneously optimizing ESE and AAoI of the network. To further improve the system capacity, non-orthogonal multiple access (NOMA) is proposed as a candidate for multiple access schemes for future cellular networks. Our main aim is to maximize the long-term objective function under AoI, NOMA, and resource capacity constraints using stochastic optimization. To overcome the complexities and unknown dynamics of the network parameters (e.g., wireless channel and interference), we apply the concept of reinforcement learning and implement a deep Q-network (DQN). Simulation results illustrate the effectiveness of the proposed framework and analyze different parameters impact on network performance. Based on the results, our proposed reward function converges fast with negligible loss value. Also, they illustrate our work outperforms the existing state of the art baselines up to 64% in the objective function and 51% in AAoI, which are stated as examples.
△ Less
Submitted 1 November, 2020;
originally announced November 2020.
-
Joint Radio Resource Allocation and Cooperative Caching in PD-NOMA-Based HetNets
Authors:
Maryam Moghimi,
Abolfazl Zakeri,
Mohammad Reza Javan,
Nader Mokari,
Derrick Wing Kwan Ng
Abstract:
In this paper, we propose a novel joint resource allocation and cooperative caching scheme for power-domain non-orthogonal multiple access (PD-NOMA)-based heterogeneous networks (HetNets). In our scheme, the requested content is fetched directly from the edge if it is cached in the storage of one of the base stations (BSs), and otherwise is fetched via the backhaul. Our scheme consists of two phas…
▽ More
In this paper, we propose a novel joint resource allocation and cooperative caching scheme for power-domain non-orthogonal multiple access (PD-NOMA)-based heterogeneous networks (HetNets). In our scheme, the requested content is fetched directly from the edge if it is cached in the storage of one of the base stations (BSs), and otherwise is fetched via the backhaul. Our scheme consists of two phases: 1. Caching phase where the contents are saved in the storage of the BSs, and 2. Delivery phase where the requested contents are delivered to users. We formulate a novel optimization problem over radio resources and content placement variables. We aim to minimize the network cost subject to quality-of-service (QoS), caching, subcarrier assignment, and power allocation constraints. By exploiting advanced optimization methods, such as alternative search method (ASM), Hungarian algorithm, successive convex approximation (SCA), we obtain an efficient sub-optimal solution of the optimization problem. Numerical results illustrate that our ergodic caching policy via the proposed resource management algorithm can achieve a considerable reduction on the total cost on average compared to the most popular caching and random caching policy. Moreover, our cooperative NOMA scheme outperforms orthogonal multiple access (OMA) in terms of the delivery cost in general with an acceptable complexity increase.
△ Less
Submitted 22 July, 2020;
originally announced July 2020.
-
Resource Allocation in Virtualized CoMP-NOMA HetNets: Multi-Connectivity for Joint Transmission
Authors:
Sepehr Rezvani,
Nader Mokari,
Mohammad R. Javan,
Eduard A. Jorswieck
Abstract:
In this work, we design a generalized joint transmission coordinated multi-point (JT-CoMP)-non-orthogonal multiple access (NOMA) model for a virtualized multi-infrastructure network. In this model, all users benefit from multiple joint transmissions of CoMP thanks to the multi-connectivity opportunity provided by wireless network virtualization (WNV) in multi-infrastructure networks. The NOMA prot…
▽ More
In this work, we design a generalized joint transmission coordinated multi-point (JT-CoMP)-non-orthogonal multiple access (NOMA) model for a virtualized multi-infrastructure network. In this model, all users benefit from multiple joint transmissions of CoMP thanks to the multi-connectivity opportunity provided by wireless network virtualization (WNV) in multi-infrastructure networks. The NOMA protocol in CoMP results in an unlimited NOMA clustering (UNC) scheme, where the order of each NOMA cluster is the maximum possible value. We show that UNC results in maximum successful interference cancellation (SIC) complexity at users. In this regard, we propose a limited NOMA clustering (LNC) scheme, where the SIC is performed to only a subset of users. We formulate the problem of joint power allocation and user association for the UNC and LNC schemes. Then, one globally and one locally optimal solution are proposed for each problem based on mixed-integer monotonic optimization and sequential programming, respectively. Numerical assessments reveal that WNV and LNC improves users sum-rate and reduces users SIC complexity by up to $35\%$ and $46\%$ compared to the non-virtualized CoMP-NOMA system and UNC model, respectively. Therefore, the proposed algorithms are suitable candidates for the implementation on open and intelligent radio access networks.
△ Less
Submitted 28 February, 2021; v1 submitted 20 July, 2020;
originally announced July 2020.
-
E2E Migration Strategies Towards 5G: Long-term Migration Plan and Evolution Roadmap
Authors:
Abulfazl Zakeri,
Narges Gholipoor,
Mohsen Tajallifar,
Sina Ebrahimi,
Mohammad Reza Javan,
Nader Mokari,
Ahmad Reza Sharafat
Abstract:
After freezing the first phase of the fifth generation of wireless networks (5G) standardization, it finally goes live now and the rollout of the commercial launch (most in fixed 5G broadband services) and migration has been started. However, some challenges are arising in the deployment, integration of each technology, and the interoperability in the network of the communication service providers…
▽ More
After freezing the first phase of the fifth generation of wireless networks (5G) standardization, it finally goes live now and the rollout of the commercial launch (most in fixed 5G broadband services) and migration has been started. However, some challenges are arising in the deployment, integration of each technology, and the interoperability in the network of the communication service providers (CSPs). At the same time, the evolution of 5G is not clear and many questions arise such as whether 5G has long-term evolution or when 5G will change to a next-generation one. This paper provides long-term migration options and paths towards 5G considering many key factors such as the cost, local/national data traffic, marketing, and the standardization trends in the radio access network (RAN), the transport network (TN), the core network (CN), and E2E network. Moreover, we outline some 5G evolution road maps emphasizing on the technologies, standards, and service time lines. The proposed migration paths can be the answer to some CSPs concerns about how to do long-term migration to 5G and beyond.
△ Less
Submitted 20 February, 2020;
originally announced February 2020.
-
Dynamic Frame Structure for Next Generation Wireless Networks
Authors:
Mohammad R. Abedi,
Mohammad R. Javan,
Nader Mokari,
Eduard . A. Jorswieck
Abstract:
In this paper, we devise a novel radio resource block (RB) structure named dynamic resource block structure (D-RBS) which can handle low latency traffics and large fluctuations in data rates by exploiting smart time and frequency duplexing. In our framework, the main resource block with a predefined bandwidth and time duration is divided into several small blocks with the same bandwidth and time d…
▽ More
In this paper, we devise a novel radio resource block (RB) structure named dynamic resource block structure (D-RBS) which can handle low latency traffics and large fluctuations in data rates by exploiting smart time and frequency duplexing. In our framework, the main resource block with a predefined bandwidth and time duration is divided into several small blocks with the same bandwidth and time duration. Depending on the service requirements, e.g., data rate and latency, the users are assigned to some these small blocks which could be noncontiguous both in frequency and time. This is in contrast to the previously introduced static resource block structure (S-RBS) where the size of each RB is predetermined and fixed. We provide resource allocation frameworks for this RB structure and formulate the optimization problems whose solutions are obtained by alternate search method (ASM) based on successive convex approximation approach (SCA). We provide a global optimal solution by exploiting the monotonic optimization method. By simulation we study the performance of our proposed scheme with S-RBS scheme and show it has 26% gain compared to the S-RBS scheme.
△ Less
Submitted 2 February, 2020;
originally announced February 2020.
-
Joint Resource and Admission Management for Slice-enabled Networks
Authors:
Sina Ebrahimi,
Abulfazl Zakeri,
Behzad Akbari,
Nader Mokari
Abstract:
Network slicing is a crucial part of the 5G networks that communication service providers (CSPs) seek to deploy. By exploiting three main enabling technologies, namely, software-defined networking (SDN), network function virtualization (NFV), and network slicing, communication services can be served to the end-users in an efficient, scalable, and flexible manner. To adopt these technologies, what…
▽ More
Network slicing is a crucial part of the 5G networks that communication service providers (CSPs) seek to deploy. By exploiting three main enabling technologies, namely, software-defined networking (SDN), network function virtualization (NFV), and network slicing, communication services can be served to the end-users in an efficient, scalable, and flexible manner. To adopt these technologies, what is highly important is how to allocate the resources and admit the customers of the CSPs based on the predefined criteria and available resources. In this regard, we propose a novel joint resource and admission management algorithm for slice-enabled networks. In the proposed algorithm, our target is to minimize the network cost of the CSP subject to the slice requests received from the tenants corresponding to the virtual machines and virtual links constraints. Our performance evaluation of the proposed method shows its efficiency in managing CSP's resources.
△ Less
Submitted 7 December, 2019; v1 submitted 30 November, 2019;
originally announced December 2019.
-
Drug Release Management for Dynamic TDMA-Based Molecular Communication
Authors:
Hamid Khoshfekr Rudsari,
Nader Mokari,
Mohammad Reza Javan,
Eduard A. Jorswieck,
Mahdi Orooji
Abstract:
In this paper, we design a drug release mechanism for dynamic time division multiple access (TDMA)-based molecular communication via diffusion (MCvD). In the proposed scheme, the communication frame is divided into several time slots over each of which a transmitter nanomachine is scheduled to convey its information by releasing the molecules into the medium. To optimize the number of released mol…
▽ More
In this paper, we design a drug release mechanism for dynamic time division multiple access (TDMA)-based molecular communication via diffusion (MCvD). In the proposed scheme, the communication frame is divided into several time slots over each of which a transmitter nanomachine is scheduled to convey its information by releasing the molecules into the medium. To optimize the number of released molecules and the time duration of each time slot (symbol duration), we formulate a multi-objective optimization problem whose objective functions are the bit error rate (BER) of each transmitter nanomachine. Based on the number of released molecules and symbol durations, we consider four cases, namely: "static-time static-number of molecules" (STSN), "static-time dynamic-number of molecules" (STDN), "dynamic-time static-number of molecules" (DTSN), and "dynamic-time dynamic-number of molecules" (DTDN). We consider three types of medium in which the molecules are propagated, namely: "mild diffusive environment" (MDE), "moderate diffusive environment" (MODE), and "severe diffusive environment" (SDE). For the channel model, we consider a 3-dimensional (3D) diffusive environment, such as blood, with drift in three directions. Simulation results show that the STSN approach is the least complex one with BER around $\text{10}^{\text{-2}}$, but, the DTDN is the most complex scenario with the BER around $\text{10}^{\text{-8}}$.
△ Less
Submitted 30 August, 2019; v1 submitted 18 August, 2019;
originally announced August 2019.
-
Multiple-type Transmission Multiple-type Reception Framework on Molecular Communication
Authors:
Hamid Khoshfekr Rudsari,
Mohammad Reza Javan,
Mahdi Orooji,
Nader Mokari,
Eduard A. Jorswieck
Abstract:
In this paper, we propose a new Multiple-Input Multiple-Output (MIMO) Molecular Communication (MC) system where multiple types of molecules are utilized for transmission and reception of information. We call the proposed framework as Multiple-type Transmission and Multiple-type Reception (MTMR). We also obtain the bit error rate (BER) of the system and an optimization problem is formulated to mini…
▽ More
In this paper, we propose a new Multiple-Input Multiple-Output (MIMO) Molecular Communication (MC) system where multiple types of molecules are utilized for transmission and reception of information. We call the proposed framework as Multiple-type Transmission and Multiple-type Reception (MTMR). We also obtain the bit error rate (BER) of the system and an optimization problem is formulated to minimize BER by optimizing the drug dosage for designing drug release mechanism. As numerical analysis shows, the BER of MIMO-MTMR in MC is minimized to $\text{3.7}\times\text{10}^{\text{-3}}$ by considering the budget of molecules as 10000. Furthermore, MIMO-MTMR outperforms Single-type Transmission Single-type Reception MIMO from the BER performance point of view approximately 54% for time slot 10s.
△ Less
Submitted 16 August, 2019;
originally announced August 2019.
-
Cost-Effective Radio and NFV Resource Allocation: E2E QoS Provision
Authors:
Abolfazl Zakeri,
Narges Gholipoor,
Mohammad Reza Javan,
Nader Mokari,
Eduard A. Jorswieck
Abstract:
To fend off network ossification and support high degrees of flexibility and various services, network virtualization and slicing are introduced for the next-generation wireless cellular networks. These two technologies allow diversifying attributes of the future inter-networking and time-varying workloads based resource management paradigms. In this paper, we propose an end-to-end (E2E) resource…
▽ More
To fend off network ossification and support high degrees of flexibility and various services, network virtualization and slicing are introduced for the next-generation wireless cellular networks. These two technologies allow diversifying attributes of the future inter-networking and time-varying workloads based resource management paradigms. In this paper, we propose an end-to-end (E2E) resource allocation framework for future networks considering radio and core network by leveraging network function virtualization (NFV). We aim to minimize the network cost defined based on the utilized energy and spectrum while providing E2E quality of service (QoS) for diverse services with stringent QoS requirements. This goal is realized by formulating a novel optimization problem which performs the power and spectrum allocation in radio, and service function chaining and scheduling in the NFV environment while guaranteeing the distinct QoS constraints of the requested services. The proposed optimization problem is mixed-integer non-linear programming, which is a non-convex and NP-hard problem. To solve it, we adopt an iterative algorithm with novel admission control and a greedy-based heuristic algorithm, which is shown to have a polynomial order of complexity with 13:66% global optimality gap on average for a small scaled network. To validate the proposed framework, simulation results are carried out by considering different values of the network parameters and topologies. Moreover, our proposed framework and solution algorithm are assessed and compared with the existing works. Simulation results demonstrate that the proposed heuristic algorithm and framework outperforms the existing ones by 34% on average in cost reduction.
△ Less
Submitted 22 July, 2020; v1 submitted 14 July, 2019;
originally announced July 2019.
-
Joint Radio Resource Allocation and 3D Beam-forming in MISO-NOMA-based Network with Profit Maximization for Mobile Virtual Network Operators
Authors:
Abulfazl Zakeri,
Nader Mokari,
Halim Yanikomeroglu
Abstract:
Massive connections and high data rate services are key players in 5G ecosystem and beyond. To satisfy the requirements of these types of services, non orthogonal multiple Access (NOMA) and 3-dimensional beam-forming (3DBF) can be exploited. In this paper, we devise a novel joint radio resource allocation and 3D multiple input single output (MISO) BF algorithm in NOMA-based heterogeneous networks…
▽ More
Massive connections and high data rate services are key players in 5G ecosystem and beyond. To satisfy the requirements of these types of services, non orthogonal multiple Access (NOMA) and 3-dimensional beam-forming (3DBF) can be exploited. In this paper, we devise a novel joint radio resource allocation and 3D multiple input single output (MISO) BF algorithm in NOMA-based heterogeneous networks (HetNets) at which our main aim is to maximize the profit of mobile virtual network operators (MVNOs). To this end, we consider multiple infrastructure providers (InPs) and MVNOs serving multiple users. Each InP has multiple access points as base stations (BSs) with specified spectrum and multi-beam antenna array in each transmitter that share its spectrum with users by employing NOMA. To realize this, we formulate a novel optimization problem at which the main aim is to maximize the revenue of MVNOs, subject to resource limitations and quality of service (QoS) constraints. Since our proposed optimization problem is non-convex, NP-hard and mathematically intractable, we transform it into a convex one by introducing a new optimization variable and converting the variables with adopting successive convex approximation. More importantly, the proposed solution is assessed and compared with the alternative search method and the optimal solution that is obtained with adopting the exhaustive search method. In addition, the proposed algorithm is studied from the computational complexity, convergence, and performance perspective. Our simulation results demonstrate that NOMA-3DBF has better performance and increases system throughput and revenue of MVNOs compared to orthogonal multiple access with 2DBF by approximately 64%. Especially, by exploiting 3DBF the revenue of MVNOs is improved by nearly 27% in contrast to 2DBF in a high order of antennas.
△ Less
Submitted 3 October, 2019; v1 submitted 11 July, 2019;
originally announced July 2019.
-
Covert Communication Using Null Space and 3D Beamforming
Authors:
Moslem Forouzesh,
Paeiz Azmi,
Nader Mokari,
Dennis Goeckel
Abstract:
Covert communication is often limited in rate because it is difficult to hide the signal in the background noise. Recent work has shown that jamming can significantly improve the rate at which covert communications can be conducted; however, the rate could be improved further if the jamming incident on the intended receiver can be mitigated. Here, we consider a multiple-antenna jammer that employs…
▽ More
Covert communication is often limited in rate because it is difficult to hide the signal in the background noise. Recent work has shown that jamming can significantly improve the rate at which covert communications can be conducted; however, the rate could be improved further if the jamming incident on the intended receiver can be mitigated. Here, we consider a multiple-antenna jammer that employs beamforming to place the intended receiver in the null space of the jamming and a multi-antenna transmitter equipped with three-dimensional (3D) antennas that is able to beamform toward its intended recipient. To evaluate this design, we formulate an optimization problem and present an iterative algorithm to solve it. Numerical results consider both the rate of covert communications with the proposed architecture and the gap between the result from our optimization and that obtained from exhaustive search.
△ Less
Submitted 3 July, 2019; v1 submitted 2 July, 2019;
originally announced July 2019.
-
Bit Error Probability Instead of Secrecy Rate Criterion to Enhance Performance for Secure Wireless Communication Systems
Authors:
Javad Taghipour,
Paeiz Azmi,
Nader Mokari,
Moslem Forouzesh,
Hossein Pishro-Nik
Abstract:
In this paper, we propose a new practical power allocation technique based on bit error probability (BEP) for physical layer security systems. It is shown that the secrecy rate that is the most commonly used in physical layer security systems, cannot be a suitable criterion lonely. Large positive values are suitable for the secrecy rate in physical layer security, but it does not consider the perf…
▽ More
In this paper, we propose a new practical power allocation technique based on bit error probability (BEP) for physical layer security systems. It is shown that the secrecy rate that is the most commonly used in physical layer security systems, cannot be a suitable criterion lonely. Large positive values are suitable for the secrecy rate in physical layer security, but it does not consider the performance of the legitimate and adversary users. In this paper, we consider and analyze BEP for physical layer security systems because based on it, the performance of the legitimate and adversary users are guaranteed and it is needed to use lower power. BEP is calculated for the legitimate and adversary users and it is shown that BEP can be better criterion for performance evaluation of the physical layer security systems. Based on BEP, the optimum transmit power is obtained and a new definition for outage probability is proposed and obtained theoretically. Also, the proposed approach is applied for adversary users with unknown mode and the cooperative adversary users. Simulation results show that the proposed method needs more than 5dB lower power for different scenarios.
△ Less
Submitted 2 July, 2019;
originally announced July 2019.
-
E2E Delay Guarantee for the Tactile Internet via joint NFV and Radio Resource Allocation
Authors:
Narges Gholipoor,
Hamid Saeedi,
Nader Mokari,
Eduard Jorswieck
Abstract:
The Tactile Internet (TI) is one of the next generation wireless network services with end to end (E2E) delay as low as 1~ms. Since this ultra low E2E delay cannot be met in the current 4G network architecture, it is necessary to investigate this service in the next generation wireless network by considering new technologies such as network function virtualization (NFV). On the other hand, given t…
▽ More
The Tactile Internet (TI) is one of the next generation wireless network services with end to end (E2E) delay as low as 1~ms. Since this ultra low E2E delay cannot be met in the current 4G network architecture, it is necessary to investigate this service in the next generation wireless network by considering new technologies such as network function virtualization (NFV). On the other hand, given the importance of E2E delay in the TI service, it is crucial to consider the delay of all parts of the network, including the radio access part and the NFV core part. In this paper, for the first time, we investigate the joint radio resource allocation (R-RA) and NFV resource allocation (NFV-RA) in a heterogeneous network where queuing delays, transmission delays, and delays resulting from virtual network function (VNF) execution are jointly considered. For this setup, we formulate a new resource allocation (RA) problem to minimize the total cost function subject to guaranteeing E2E delay of each user. Since the proposed optimization problem is highly non-convex, we exploit alternative search method (ASM), successive convex approximation (SCA), and heuristic algorithms to solve it. Simulation results reveal that in the proposed scheme can significantly reduce the network costs compared to the case where the two problems are optimized separately.
△ Less
Submitted 8 November, 2019; v1 submitted 30 June, 2019;
originally announced July 2019.
-
Non-Uniform BCSK Modulation in Nutrient-Limited Relay-Assisted Molecular Communication System: Optimization and Performance Evaluation
Authors:
Hamid Khoshfekr Rudsari,
Mahdi Orooji,
Mohammad Reza Javan,
Nader Mokari,
Eduard A. Jorswieck
Abstract:
In this paper, a novel non-uniform Binary Concentration Shift Keying (BCSK) modulation in the course of molecular communication is introduced. We consider the nutrient limiting as the main reason for avoiding the nanotransmitters to release huge number of molecules at once. The solution of this problem is in the utilization of the BCSK modulation. In this scheme, nanotransmitter releases the infor…
▽ More
In this paper, a novel non-uniform Binary Concentration Shift Keying (BCSK) modulation in the course of molecular communication is introduced. We consider the nutrient limiting as the main reason for avoiding the nanotransmitters to release huge number of molecules at once. The solution of this problem is in the utilization of the BCSK modulation. In this scheme, nanotransmitter releases the information molecules non-uniformly during the time slot. The 3-dimensional diffusion channel with 3-dimensional drift is considered in this paper. To boost the bit error rate (BER) performance, we consider a relay-assisted molecular communication via diffusion. Our computations demonstrate how the pulse shape of BCSK modulation affects the BER, and we also derive the energy consumption of non-uniform BCSK in the closed-form expression. We study the parameters that can affect the BER performance, in particular the distance between the nanotransmitter and the nanoreceiver, the drift velocity of the medium, and the symbol duration. Furthermore, we propose an optimization problem that is designed to find the optimal symbol duration value that maximizes the number of successful received bits. The proposed algorithm to solve the optimization problem is based on the bisection method. The analytical results show that non-uniform BCSK modulation outperforms uniform BCSK modulation in BER performance, when the aggregate energy is fixed.
△ Less
Submitted 15 May, 2019; v1 submitted 12 March, 2019;
originally announced March 2019.
-
Robust Resource Allocation for PD-NOMA-Based MISO Heterogeneous Networks with CoMP Technology
Authors:
Atefeh Rezaei,
Paeiz Azmi,
Nader Mokari,
Mohammad Reza Javan
Abstract:
In this paper, we consider a hybrid scheme of coordinated multi-point (CoMP) technology in MISO heterogeneous communication networks based on power domain non-orthogonal multiple access (PD-NOMA). We propose a novel method based on matching game with externalities to realize the hybrid scheme where the number of the cooperative nodes are variable. Moreover, we propose a new matching utility functi…
▽ More
In this paper, we consider a hybrid scheme of coordinated multi-point (CoMP) technology in MISO heterogeneous communication networks based on power domain non-orthogonal multiple access (PD-NOMA). We propose a novel method based on matching game with externalities to realize the hybrid scheme where the number of the cooperative nodes are variable. Moreover, we propose a new matching utility function to manage the interference caused by CoMP and NOMA techniques.
We also devise robust beamforming to cope with the channel uncertainty. In this regard, we focus on both no CSI and partial CSI cases to increase the achievable data rate.
We provide the complexity analysis of both schemes which shows that the complexity of the partial CSI approach is more than that of the no CSI method.
Results evaluate the performance of proposed CoMP scheme and the sensibility of our methods, Index Terms, CoMP technology, hybrid scheme, matching game with externalities, PD-NOMA, robust beamforming, probabilistic constraint, no CSI, partial CSI.
△ Less
Submitted 19 September, 2019; v1 submitted 26 February, 2019;
originally announced February 2019.
-
Robust Radio Resource Allocation in MISO-SCMA Assisted C-RAN in 5G Networks
Authors:
Mohammad. Moltafet,
Saeedeh. Parsaeefard,
Mohammad R. Javan,
Nader. Mokari
Abstract:
In this paper, by considering multiple slices, a downlink transmission of a sparse code multiple access (SCMA) based cloud-radio access network (C-RAN) is investigated. In this regard, by supposing multiple input and single output (MISO) transmission technology, a novel robust radio resource allocation is proposed where considering uncertain channel state information (CSI), the worst case approach…
▽ More
In this paper, by considering multiple slices, a downlink transmission of a sparse code multiple access (SCMA) based cloud-radio access network (C-RAN) is investigated. In this regard, by supposing multiple input and single output (MISO) transmission technology, a novel robust radio resource allocation is proposed where considering uncertain channel state information (CSI), the worst case approach is applied. The main goal of the proposed radio resource allocation is to, maximize the system sum rate with maximum available power at radio remote head (RRH), minimum rate requirement of each slice, maximum frounthaul capacity of each RRH, user association, and SCMA constraints. To solve the proposed optimization problem in an efficient manner, an iterative method is deployed where in each iteration, beamforming and joint codebook allocation and user association subproblem are solved separately. By introducing some auxiliary variables, the joint codebook allocation and user association subproblem is transformed into an integer linear programming, and to solve the beamforming optimization problem, minorization-maximization algorithm (MMA) is applied. Via numerical results, the performance of the proposed system model versus different system parameters and for different channel models are investigated.
△ Less
Submitted 6 February, 2019;
originally announced February 2019.
-
Robust Power Allocation in Covert Communication: Imperfect CDI
Authors:
Moslem Forouzesh,
Paeiz Azmi,
Nader Mokari,
Dennis Goeckel
Abstract:
The study of the fundamental limits of covert communications, where a transmitter Alice wants to send information to a desired recipient Bob without detection of that transmission by an attentive and capable warden Willie, has emerged recently as a topic of great research interest. Critical to these analyses is a characterization of the detection problem that is presented to Willie. Previous work…
▽ More
The study of the fundamental limits of covert communications, where a transmitter Alice wants to send information to a desired recipient Bob without detection of that transmission by an attentive and capable warden Willie, has emerged recently as a topic of great research interest. Critical to these analyses is a characterization of the detection problem that is presented to Willie. Previous work has assumed that the channel distribution information (CDI) is known to Alice, hence facilitating her characterization of Willie's capabilities to detect the signal. However, in practice, Willie tends to be passive and the environment heterogeneous, implying a lack of signaling interchange between the transmitter and Willie makes it difficult if not impossible for Alice to estimate the CDI exactly and provide covertness guarantees. In this paper, we address this issue by developing covert communication schemes for various assumptions on Alice's imperfect knowledge of the CDI: 1) when the transmitter knows the channel distribution is within some distance of a nominal channel distribution; 2) when only the mean and variance of the channel distribution are available at Alice; 3) when Alice knows the channel distribution is complex Gaussian but the variance is unknown. In each case, we formulate new optimization problems to find the power allocations that maximize covert rate subject to a covertness requirement under uncertain CDI. Moreover, since Willie faces similar challenges as Alice in estimating the CDI, we investigate two possible assumptions on the knowledge of the CDI at Willie: 1) CDI is known at Willie, 2) CDI is unknown at Willie. Numerical results are presented to compare the proposed schemes from various aspects, in particular the accuracy and efficiency of the proposed solutions for attaining desirable covert system performance.
△ Less
Submitted 15 January, 2019;
originally announced January 2019.
-
Robust Physical Layer Security for Power Domain Non-orthogonal Multiple Access-Based HetNets and HUDNs, SIC Avoidance at Eavesdroppers
Authors:
Moslem Forouzesh,
Paeiz Azmi,
Nader Mokari,
Kai Kit Wong
Abstract:
In this paper, we investigate the physical layer security in downlink of Power Domain Non Orthogonal Multiple Access based heterogeneous cellular network in presence of multiple eavesdroppers. Our aim is to maximize the sum secrecy rate of the network. To this end, we formulate joint subcarrier and power allocation optimization problems to increase sum secrecy rate. Moreover, we propose a novel sc…
▽ More
In this paper, we investigate the physical layer security in downlink of Power Domain Non Orthogonal Multiple Access based heterogeneous cellular network in presence of multiple eavesdroppers. Our aim is to maximize the sum secrecy rate of the network. To this end, we formulate joint subcarrier and power allocation optimization problems to increase sum secrecy rate. Moreover, we propose a novel scheme at which the eavesdroppers are prevented from doing Successive Interference Cancellation, while legitimate users are able to do it. In practical systems, availability of eavesdroppers Channel State Information is impractical, hence we consider two scenarios: 1 Perfect CSI of the eavesdroppers, 2 imperfect CSI of the eavesdroppers. Since the proposed optimization problems are nonconvex, we adopt the well known iterative algorithm called Alternative Search Method. In this algorithm, the optimization problems are converted to two subproblems, power allocation and subcarrier allocation. We solve the power allocation problem by the Successive Convex Approximation approach and solve the subcarrier allocation subproblem, by exploiting the Mesh Adaptive Direct Search algorithm. Moreover, in order to study the optimality gap of the proposed solution method, we apply the monotonic optimization method. Moreover, we evaluate the proposed scheme for secure massive connectivity in 5G networks. Numerical results highlight that the proposed scheme significantly improves the sum secrecy rate compared with the conventional case at which the eavesdroppers are able to apply SIC.
△ Less
Submitted 6 June, 2018;
originally announced June 2018.
-
Cross-Layer Energy Efficient Resource Allocation in PD-NOMA based H-CRANs: Implementation via GPU
Authors:
Ali Mokdad,
Paeiz Azmi,
Nader Mokari,
Mohammad Moltafet,
Mohsen Ghaffari-Miab
Abstract:
In this paper, we propose a cross layer energy efficient resource allocation and remote radio head (RRH) selection algorithm for heterogeneous traffic in power domain - non-orthogonal multiple access (PD-NOMA) based heterogeneous cloud radio access networks (H-CRANs). The main aim is to maximize the EE of the elastic users subject to the average delay constraint of the streaming users and the cons…
▽ More
In this paper, we propose a cross layer energy efficient resource allocation and remote radio head (RRH) selection algorithm for heterogeneous traffic in power domain - non-orthogonal multiple access (PD-NOMA) based heterogeneous cloud radio access networks (H-CRANs). The main aim is to maximize the EE of the elastic users subject to the average delay constraint of the streaming users and the constraints, RRH selection, subcarrier, transmit power and successive interference cancellation. The considered optimization problem is non-convex, NP-hard and intractable. To solve this problem, we transform the fractional objective function into a subtractive form. Then, we utilize successive convex approximation approach. Moreover, in order to increase the processing speed, we introduce a framework for accelerating the successive convex approximation for low complexity with the Lagrangian method on graphics processing unit. Furthermore, in order to show the optimality gap of the proposed successive convex approximation approach, we solve the proposed optimization problem by applying an optimal method based on the monotonic optimization. Studying different scenarios show that by using both PD-NOMA technique and H-CRAN, the system energy efficiency is improved.
△ Less
Submitted 21 March, 2018;
originally announced March 2018.
-
Joint Radio Resource Allocation, 3D Placement and User Association of Aerial Base Stations in IoT Networks
Authors:
Arman Azizi,
Nader Mokari,
Mohamad Reza Javan
Abstract:
In this paper, a novel method for joint radio resource allocation (RRA), three-dimensional placement (3DP), and user association of aerial base stations (ABSs) as a main problem in the internet of things (IoT) networks is proposed. In our proposed model, we consider two schemes: a) line of sight (LoS) b) generalized. In the LoS scheme, all the ABSs should see the IoT users as LoS. In the generaliz…
▽ More
In this paper, a novel method for joint radio resource allocation (RRA), three-dimensional placement (3DP), and user association of aerial base stations (ABSs) as a main problem in the internet of things (IoT) networks is proposed. In our proposed model, we consider two schemes: a) line of sight (LoS) b) generalized. In the LoS scheme, all the ABSs should see the IoT users as LoS. In the generalized scheme, ABSs can see some of the IoT users as LoS and some of them as NLoS. The main goal of this paper is to minimize the overal transmit power of the IoT users while satisfying some quality of service (QoS) constraints in uplink scenario. To solve the optimization problems and to convert the main problems with high complexity into the subproblems with lower complexity, we decompose them into two subproblems namely 3DP subproblem and joint RRA and user association (JRU) subproblem. The methods which we use to solve our proposed optimization problems are Semi Definite Relaxation (SDR) and Geometric Programming (GP). Finally, using simulations, we evaluate the performance of the proposed schemes for different values of the network parameters.
△ Less
Submitted 15 October, 2017;
originally announced October 2017.