-
Smart Helper-Aided F-RANs: Improving Delay and Reducing Fronthaul Load
Authors:
Hesameddin Mokhtarzadeh,
Mohammed S. Al-Abiad,
Md Jahangir Hossain,
Julian Cheng
Abstract:
In traditional Fog-Radio Access Networks (F-RANs), enhanced remote radio heads (eRRHs) are connected to a macro base station (MBS) through fronthaul links. Deploying a massive number of eRRHs is not always feasible due to site constraints and the cost of fronthaul links. This paper introduces an innovative concept of using smart helpers (SHs) in F-RANs. These SHs do not require fronthaul links and…
▽ More
In traditional Fog-Radio Access Networks (F-RANs), enhanced remote radio heads (eRRHs) are connected to a macro base station (MBS) through fronthaul links. Deploying a massive number of eRRHs is not always feasible due to site constraints and the cost of fronthaul links. This paper introduces an innovative concept of using smart helpers (SHs) in F-RANs. These SHs do not require fronthaul links and listen to the nearby eRRHs' communications. Then, they smartly select and cache popular content. This capability enables SHs to serve users with frequent on-demand service requests potentially. As such, network operators have the flexibility to easily deploy SHs in various scenarios, such as dense urban areas and temporary public events, to expand their F-RANs and improve the quality of service (QoS). To study the performance of the proposed SH-aided F-RAN, we formulate an optimization problem of minimizing the average transmission delay that jointly optimizes cache resources and user scheduling. To tackle the formulated problem, we develop an innovative multi-stage algorithm that uses a reinforcement learning (RL) framework. Various performance measures, e.g., the average transmission delay, fronthaul load, and cache hit rate of the proposed SH-aided F-RAN are evaluated numerically and compared with those of traditional F-RANs.
△ Less
Submitted 14 September, 2023;
originally announced September 2023.
-
Holographic MIMO: How Many Antennas Do We Need for Energy Efficient Transmission?
Authors:
Sarah Bahanshal,
Qurrat-Ul-Ain Nadeem,
Md. Jahangir Hossain
Abstract:
Holographic multiple-input multiple-output (HMIMO) communication systems utilize spatially-constrained massive MIMO arrays containing large numbers of antennas with sub-wavelength spacing, and have emerged as a promising candidate technology for Sixth Generation (6G) networks. In this paper, we consider the downlink of a multi-user HMIMO communication system under a Fourier plane-wave series repre…
▽ More
Holographic multiple-input multiple-output (HMIMO) communication systems utilize spatially-constrained massive MIMO arrays containing large numbers of antennas with sub-wavelength spacing, and have emerged as a promising candidate technology for Sixth Generation (6G) networks. In this paper, we consider the downlink of a multi-user HMIMO communication system under a Fourier plane-wave series representation of the stochastic electromagnetic MIMO channel model, and make two important contributions. First, we present a closed-form expression of the ergodic achievable downlink rate under maximum ratio transmission (MRT) precoding at the base station (BS). The derived expression explicitly shows the effect of the side-lengths of the HMIMO surfaces at the BS and each user, and the number of antennas deployed in these surfaces on the user rates. Second, we formulate an energy efficiency (EE) maximization problem with respect to the number of antennas arranged within spatially-constrained HMIMO surfaces at the BS and each user. The resulting implicit solution for this problem is shown to be globally optimal. Numerical results yield useful insights into the EE performance of multi-user HMIMO systems in different operating regimes.
△ Less
Submitted 14 April, 2023;
originally announced April 2023.
-
Decentralized Model Dissemination Empowered Federated Learning in mmWave Aerial-Terrestrial Integrated Networks
Authors:
Mohammed S. Al-Abiad,
Md. Zoheb Hassan,
Md. Jahangir Hossain
Abstract:
It is anticipated that aerial-terrestrial integrated networks incorporating unmanned aerial vehicles (UAVs) mounted relays will offer improved coverage and connectivity in the beyond 5G era. Meanwhile, federated learning (FL) is a promising distributed machine learning technique for building inference models over wireless networks due to its ability to maintain user privacy and reduce communicatio…
▽ More
It is anticipated that aerial-terrestrial integrated networks incorporating unmanned aerial vehicles (UAVs) mounted relays will offer improved coverage and connectivity in the beyond 5G era. Meanwhile, federated learning (FL) is a promising distributed machine learning technique for building inference models over wireless networks due to its ability to maintain user privacy and reduce communication overhead. However, off-the-shelf FL models aggregate global parameters at a central parameter server (CPS), increasing energy consumption and latency, as well as inefficiently utilizing radio resource blocks (RRBs) for distributed user devices (UDs). This paper presents a resource-efficient FL framework, called FedMoD (\textbf{fed}erated learning with \textbf{mo}del \textbf{d}issemination), for millimeter-wave (mmWave) aerial-terrestrial integrated networks with the following two unique characteristics. Firstly, FedMoD presents a novel decentralized model dissemination algorithm that makes use of UAVs as local model aggregators through UAV-to-UAV and device-to-device (D2D) communications. As a result, FedMoD (i) increases the number of participant UDs in developing FL model and (ii) achieves global model aggregation without involving CPS. Secondly, FedMoD reduces the energy consumption of FL using radio resource management (RRM) under the constraints of over-the-air learning latency. In order to achieve this, by leveraging graph theory, FedMoD optimizes the scheduling of line-of-sight (LOS) UDs to suitable UAVs/RRBs over mmWave links and non-LOS UDs to available LOS UDs via overlay D2D communications. Extensive simulations reveal that decentralized FedMoD offers same convergence rate performance as compared to conventional FL frameworks.
△ Less
Submitted 28 February, 2023;
originally announced March 2023.
-
Semantic Web in Healthcare: A Systematic Literature Review of Application, Research Gap, and Future Research Avenues
Authors:
A. K. M. Bahalul Haque,
B. M. Arifuzzaman,
Sayed Abu Noman Siddik,
Abul Kalam,
Tabassum Sadia Shahjahan,
T. S. Saleena,
Morshed Alam,
Md. Rabiul Islam,
Foyez Ahmmed,
5and Md. Jamal Hossain
Abstract:
Today, healthcare has become one of the largest and most fast-paced industries due to the rapid development of digital healthcare technologies. The fundamental thing to enhance healthcare services is communicating and linking massive volumes of available healthcare data. However, the key challenge in reaching this ambitious goal is letting the information exchange across heterogeneous sources and…
▽ More
Today, healthcare has become one of the largest and most fast-paced industries due to the rapid development of digital healthcare technologies. The fundamental thing to enhance healthcare services is communicating and linking massive volumes of available healthcare data. However, the key challenge in reaching this ambitious goal is letting the information exchange across heterogeneous sources and methods as well as establishing efficient tools and techniques. Semantic Web (SW) technology can help to tackle these problems. They can enhance knowledge exchange, information management, data interoperability, and decision support in healthcare systems. They can also be utilized to create various e-healthcare systems that aid medical practitioners in making decisions and provide patients with crucial medical information and automated hospital services. This systematic literature review (SLR) on SW in healthcare systems aims to assess and critique previous findings while adhering to appropriate research procedures. We looked at 65 papers and came up with five themes: e-service, disease, information management, frontier technology, and regulatory conditions. In each thematic research area, we presented the contributions of previous literature. We emphasized the topic by responding to five specific research questions. We have finished the SLR study by identifying research gaps and establishing future research goals that will help to minimize the difficulty of adopting SW in healthcare systems and provide new approaches for SW-based medical systems progress.
△ Less
Submitted 19 October, 2022;
originally announced November 2022.
-
ThoraX-PriorNet: A Novel Attention-Based Architecture Using Anatomical Prior Probability Maps for Thoracic Disease Classification
Authors:
Md. Iqbal Hossain,
Mohammad Zunaed,
Md. Kawsar Ahmed,
S. M. Jawwad Hossain,
Anwarul Hasan,
Taufiq Hasan
Abstract:
Objective: Computer-aided disease diagnosis and prognosis based on medical images is a rapidly emerging field. Many Convolutional Neural Network (CNN) architectures have been developed by researchers for disease classification and localization from chest X-ray images. It is known that different thoracic disease lesions are more likely to occur in specific anatomical regions compared to others. Thi…
▽ More
Objective: Computer-aided disease diagnosis and prognosis based on medical images is a rapidly emerging field. Many Convolutional Neural Network (CNN) architectures have been developed by researchers for disease classification and localization from chest X-ray images. It is known that different thoracic disease lesions are more likely to occur in specific anatomical regions compared to others. This article aims to incorporate this disease and region-dependent prior probability distribution within a deep learning framework. Methods: We present the ThoraX-PriorNet, a novel attention-based CNN model for thoracic disease classification. We first estimate a disease-dependent spatial probability, i.e., an anatomical prior, that indicates the probability of occurrence of a disease in a specific region in a chest X-ray image. Next, we develop a novel attention-based classification model that combines information from the estimated anatomical prior and automatically extracted chest region of interest (ROI) masks to provide attention to the feature maps generated from a deep convolution network. Unlike previous works that utilize various self-attention mechanisms, the proposed method leverages the extracted chest ROI masks along with the probabilistic anatomical prior information, which selects the region of interest for different diseases to provide attention. Results: The proposed method shows superior performance in disease classification on the NIH ChestX-ray14 dataset compared to existing state-of-the-art methods while reaching an area under the ROC curve (%AUC) of 84.67. Regarding disease localization, the anatomy prior attention method shows competitive performance compared to state-of-the-art methods, achieving an accuracy of 0.80, 0.63, 0.49, 0.33, 0.28, 0.21, and 0.04 with an Intersection over Union (IoU) threshold of 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, and 0.7, respectively.
△ Less
Submitted 21 December, 2023; v1 submitted 6 October, 2022;
originally announced October 2022.
-
Decentralized Aggregation for Energy-Efficient Federated Learning via Overlapped Clustering and D2D Communications
Authors:
Mohammed S. Al-Abiad,
Mohanad Obeed,
Md. Jahangir Hossain,
Anas Chaaban
Abstract:
Federated learning (FL) has emerged as a distributed machine learning (ML) technique to train models without sharing users' private data. In this paper, we propose a decentralized FL scheme that is called \underline{f}ederated \underline{l}earning \underline{e}mpowered \underline{o}verlapped \underline{c}lustering for \underline{d}ecentralized aggregation (FL-EOCD). The introduced FL-EOCD leverage…
▽ More
Federated learning (FL) has emerged as a distributed machine learning (ML) technique to train models without sharing users' private data. In this paper, we propose a decentralized FL scheme that is called \underline{f}ederated \underline{l}earning \underline{e}mpowered \underline{o}verlapped \underline{c}lustering for \underline{d}ecentralized aggregation (FL-EOCD). The introduced FL-EOCD leverages device-to-device (D2D) communications and overlapped clustering to enable decentralized aggregation, where a cluster is defined as a coverage zone of a typical device. The devices located on the overlapped clusters are called bridge devices (BDs). In the proposed FL-EOCD scheme, a clustering topology is envisioned where clusters are connected through BDs, so as the aggregated models of each cluster is disseminated to the other clusters in a decentralized manner without the need for a global aggregator or an additional hop of transmission. Unlike the star-based FL, the proposed FL-EOCD scheme involves a large number of local devices by reusing the RRBs in different non-adjacent clusters. To evaluate our proposed FL-EOCD scheme as opposed to baseline FL schemes, we consider minimizing the overall energy-consumption of devices while maintaining the convergence rate of FL subject to its time constraint. To this end, a joint optimization problem, considering scheduling the local devices/BDs to the CHs and computation frequency allocation, is formulated, where an iterative solution to this joint problem is devised. Extensive simulations are conducted to verify the effectiveness of the proposed FL-EOCD algorithm over FL conventional schemes in terms of energy consumption, latency, and convergence rate.
△ Less
Submitted 6 June, 2022;
originally announced June 2022.
-
Malaria detection in Segmented Blood Cell using Convolutional Neural Networks and Canny Edge Detection
Authors:
Tahsinur Rahman Talukdar,
Mohammad Jaber Hossain,
Tahmid H. Talukdar
Abstract:
We apply convolutional neural networks to identify between malaria infected and non-infected segmented cells from the thin blood smear slide images. We optimize our model to find over 95% accuracy in malaria cell detection. We also apply Canny image processing to reduce training file size while maintaining comparable accuracy (~ 94%).
We apply convolutional neural networks to identify between malaria infected and non-infected segmented cells from the thin blood smear slide images. We optimize our model to find over 95% accuracy in malaria cell detection. We also apply Canny image processing to reduce training file size while maintaining comparable accuracy (~ 94%).
△ Less
Submitted 21 February, 2022;
originally announced February 2022.
-
Joint Activity and Blind Information Detection for UAV-Assisted Massive IoT Access
Authors:
Li Qiao,
Jun Zhang,
Zhen Gao,
Dezhi Zheng,
Md. Jahangir Hossain,
Yue Gao,
Derrick Wing Kwan Ng,
Marco Di Renzo
Abstract:
Grant-free non-coherent index-modulation (NC-IM) has been recently considered as an efficient massive access scheme for enabling cost- and energy-limited Internet-of-Things (IoT) devices that transmit small data packets. This paper investigates the grant-free NC-IM scheme combined with orthogonal frequency division multiplexing for applicant to unmanned aerial vehicle (UAV)-based massive IoT acces…
▽ More
Grant-free non-coherent index-modulation (NC-IM) has been recently considered as an efficient massive access scheme for enabling cost- and energy-limited Internet-of-Things (IoT) devices that transmit small data packets. This paper investigates the grant-free NC-IM scheme combined with orthogonal frequency division multiplexing for applicant to unmanned aerial vehicle (UAV)-based massive IoT access. Specifically, each device is assigned a unique non-orthogonal signature sequence codebook. Each active device transmits one of its signature sequences in the given time-frequency resources, by modulating the information in the index of the transmitted signature sequence. For small-scale multiple-input multiple-output (MIMO) deployed at the UAV-based aerial base station (BS), by jointly exploiting the space-time-frequency domain device activity, we propose a computationally efficient space-time-frequency joint activity and blind information detection (JABID) algorithm with significantly improved detection performance. Furthermore, for large-scale MIMO deployed at the aerial BS, by leveraging the sparsity of the virtual angular-domain channels, we propose an angular-domain based JABID algorithm for improving the system performance with reduced access latency. In addition, for the case of high mobility IoT devices and/or UAVs, we introduce a time-frequency spread transmission (TFST) strategy for the proposed JABID algorithms to combat doubly-selective fading channels. Finally, extensive simulation results are illustrated to verify the superiority of the proposed algorithms and the TFST strategy over known state-of-the-art algorithms.
△ Less
Submitted 2 January, 2022; v1 submitted 28 December, 2021;
originally announced December 2021.
-
Energy Efficient Federated Learning in Integrated Fog-Cloud Computing Enabled Internet-of-Things Networks
Authors:
Mohammed S. Al-Abiad,
Md. Zoheb Hassan,
Md. Jahangir Hossain
Abstract:
We investigate resource allocation scheme to reduce the energy consumption of federated learning (FL) in the integrated fog-cloud computing enabled Internet-of-things (IoT) networks. In the envisioned system, IoT devices are connected with the centralized cloud server (CS) via multiple fog access points (F-APs). We consider two different scenarios for training the local models. In the first scenar…
▽ More
We investigate resource allocation scheme to reduce the energy consumption of federated learning (FL) in the integrated fog-cloud computing enabled Internet-of-things (IoT) networks. In the envisioned system, IoT devices are connected with the centralized cloud server (CS) via multiple fog access points (F-APs). We consider two different scenarios for training the local models. In the first scenario, local models are trained at the IoT devices and the F-APs upload the local model parameters to the CS. In the second scenario, local models are trained at the F-APs based on the collected data from the IoT devices and the F-APs collaborate with the CS for updating the model parameters. Our objective is to minimize the overall energy-consumption of both scenarios subject to FL time constraint. Towards this goal, we devise a joint optimization of scheduling of IoT devices with the F-APs, transmit power allocation, computation frequency allocation at the devices and F-APs and decouple it into two subproblems. In the first subproblem, we optimize the IoT device scheduling and power allocation, while in the second subproblem, we optimize the computation frequency allocation. For each scenario, we develop a conflict graph based solution to iteratively solve the two subproblems. Simulation results show that the proposed two schemes achieve a considerable performance gain in terms of the energy consumption minimization. The presented simulation results interestingly reveal that for a large number of IoT devices and large data sizes, it is more energy efficient to train the local models at the IoT devices instead of the F-APs.
△ Less
Submitted 7 July, 2021;
originally announced July 2021.
-
RIS-Aided Cell-Free Massive MIMO: Performance Analysis and Competitiveness
Authors:
Bayan Al-Nahhas,
Mohanad Obeed,
Anas Chaaban,
Md. Jahangir Hossain
Abstract:
In this paper, we consider and study a cell-free massive MIMO (CF-mMIMO) system aided with reconfigurable intelligent surfaces (RISs), where a large number of access points (APs) cooperate to serve a smaller number of users with the help of RIS technology. We consider imperfect channel state information (CSI), where each AP uses the local channel estimates obtained from the uplink pilots and appli…
▽ More
In this paper, we consider and study a cell-free massive MIMO (CF-mMIMO) system aided with reconfigurable intelligent surfaces (RISs), where a large number of access points (APs) cooperate to serve a smaller number of users with the help of RIS technology. We consider imperfect channel state information (CSI), where each AP uses the local channel estimates obtained from the uplink pilots and applies conjugate beamforming for downlink data transmission. Additionally, we consider random beamforming at the RIS during both training and data transmission phases. This allows us to eliminate the need of estimating each RIS assisted link, which has been proven to be a challenging task in literature. We then derive a closed-form expression for the achievable rate and use it to evaluate the system's performance supported with numerical results. We show that the RIS provided array gain improves the system's coverage, and provides nearly a 2-fold increase in the minimum rate and a 1.5-fold increase in the per-user throughput. We also use the results to provide preliminary insights on the number of RISs that need to be used to replace an AP, while achieving similar performance as a typical CF-mMIMO system with dense AP deployment.
△ Less
Submitted 13 May, 2021; v1 submitted 6 May, 2021;
originally announced May 2021.
-
Task Offloading Optimization in NOMA-Enabled Multi-hop Mobile Edge Computing System Using Conflict Graph
Authors:
Mohammed S. Al-Abiad,
Md. Zoheb Hassan,
Md. Jahangir Hossain
Abstract:
Resource allocation is investigated for offloading computational-intensive tasks in multi-hop mobile edge computing (MEC) system. The envisioned system has both the cooperative access points (AP) with the computing capability and the MEC servers. A user-device (UD) therefore first uploads a computing task to the nearest AP, and the AP can either locally process the received task or offload to MEC…
▽ More
Resource allocation is investigated for offloading computational-intensive tasks in multi-hop mobile edge computing (MEC) system. The envisioned system has both the cooperative access points (AP) with the computing capability and the MEC servers. A user-device (UD) therefore first uploads a computing task to the nearest AP, and the AP can either locally process the received task or offload to MEC server. In order to utilize the radio resource blocks (RRBs) in the APs efficiently, we exploit the non-orthogonal multiple access for offloading the tasks from the UDs to the AP(s). For the considered NOMA-enabled multi-hop MEC computing system, our objective is to minimize both the latency and energy consumption of the system jointly. Towards this goal, a joint optimization problem is formulated by taking the offloading decision of the APs, the scheduling among the UDs, RRBs, and APs, and UDs' transmit power allocation into account. To solve this problem efficiently, (i) a conflict graph-based approach is devised that solves the scheduling among the UDs, APs, and RRBs, the transmit power control, and the APs' computation resource allocation jointly, and (ii) a low-complexity pruning graph-based approach is also devised. The efficiency of the proposed graph-based approaches over several benchmark schemes is verified via extensive simulations.
△ Less
Submitted 23 April, 2021;
originally announced April 2021.
-
A Joint Reinforcement-Learning Enabled Caching and Cross-Layer Network Code for Sum-Rate Maximization in F-RAN with D2D Communications
Authors:
Mohammed S. Al-Abiad,
Md. Zoheb Hassan,
Md. Jahangir Hossain
Abstract:
In this paper, we leverage reinforcement learning (RL) and cross-layer network coding (CLNC) for efficiently pre-fetching users' contents to the local caches and delivering these contents to users in a downlink fog-radio access network (F-RAN) with device-to-device (D2D) communications. In the considered system, fog access points (F-APs) and cache-enabled D2D (CE-D2D) users are equipped with local…
▽ More
In this paper, we leverage reinforcement learning (RL) and cross-layer network coding (CLNC) for efficiently pre-fetching users' contents to the local caches and delivering these contents to users in a downlink fog-radio access network (F-RAN) with device-to-device (D2D) communications. In the considered system, fog access points (F-APs) and cache-enabled D2D (CE-D2D) users are equipped with local caches for alleviating traffic burden at the fronthaul, while users' contents can be easily and quickly accommodated. In CLNC, the coding decisions take users' contents, their rates, and power levels of F-APs and CE-D2D users into account, and RL optimizes caching strategy. Towards this goal, a joint content placement and delivery problem is formulated as an optimization problem with a goal to maximize system sum-rate. For this NP-hard problem, we first develop an innovative decentralized CLNC coalition formation (CLNC-CF) algorithm to obtain a stable solution for the content delivery problem, where F-APs and CE-D2D users utilize CLNC resource allocation. By taking the behavior of F-APs and CE-D2D users into account, we then develop a multi-agent RL (MARL) algorithm for optimizing the content placements at both F-APs and CE-D2D users. Simulation results show that the proposed joint CLNC-CF and RL framework can effectively improve the sum-rate by up to 30\%, 60\%, and 150\%, respectively, compared to: 1) an optimal uncoded algorithm, 2) a standard rate-aware-NC algorithm, and 3) a benchmark classical NC with network-layer optimization.
△ Less
Submitted 22 March, 2021;
originally announced March 2021.
-
Throughput Maximization of Network-Coded and Multi-Level Cache-Enabled Heterogeneous Network
Authors:
Mohammed S. Al-Abiad,
Md. Zoheb Hassan,
Md. Jahangir Hossain
Abstract:
One of the paramount advantages of multi-level cache-enabled (MLCE) networks is pushing contents proximity to the network edge and proactively caching them at multiple transmitters (i.e., small base-stations (SBSs), unmanned aerial vehicles (UAVs), and cache-enabled device-to-device (CE-D2D) users). As such, the fronthaul congestion between a core network and a large number of transmitters is alle…
▽ More
One of the paramount advantages of multi-level cache-enabled (MLCE) networks is pushing contents proximity to the network edge and proactively caching them at multiple transmitters (i.e., small base-stations (SBSs), unmanned aerial vehicles (UAVs), and cache-enabled device-to-device (CE-D2D) users). As such, the fronthaul congestion between a core network and a large number of transmitters is alleviated. For this objective, we exploit network coding (NC) to schedule a set of users to the same transmitter. Focusing on this, we consider the throughput maximization problem that optimizes jointly the network-coded user scheduling and power allocation, subject to fronthaul capacity, transmit power, and NC constraints. Given the intractability of the problem, we decouple it into two separate subproblems. In the first subproblem, we consider the network-coded user scheduling problem for the given power allocation, while in the second subproblem, we use the NC resulting user schedule to optimize the power levels. We design an innovative \textit{two-layered rate-aware NC (RA-IDNC)} graph to solve the first subproblem and evaluate the second subproblem using an iterative function evaluation (IFE) approach. Simulation results are presented to depict the throughput gain of the proposed approach over the existing solutions.
△ Less
Submitted 5 February, 2021;
originally announced February 2021.
-
Partial Non-Orthogonal Multiple Access (NOMA) in Downlink Poisson Networks
Authors:
Konpal Shaukat Ali,
Ekram Hossain,
Md. Jahangir Hossain
Abstract:
Non-orthogonal multiple access (NOMA) allows users sharing a resource-block to efficiently reuse spectrum and improve cell sum rate $\mathcal{R}_{\rm tot}$ at the expense of increased interference. Orthogonal multiple access (OMA), on the other hand, guarantees higher coverage. We introduce partial-NOMA in a large two-user downlink network to provide both throughput and reliability. The associated…
▽ More
Non-orthogonal multiple access (NOMA) allows users sharing a resource-block to efficiently reuse spectrum and improve cell sum rate $\mathcal{R}_{\rm tot}$ at the expense of increased interference. Orthogonal multiple access (OMA), on the other hand, guarantees higher coverage. We introduce partial-NOMA in a large two-user downlink network to provide both throughput and reliability. The associated partial overlap controls interference while still offering spectrum reuse. The nature of the partial overlap also allows us to employ receive-filtering to further suppress interference. For signal decoding in our partial-NOMA setup, we propose a new technique called flexible successive interference cancellation (FSIC) decoding. We plot the rate region abstraction and compare with OMA and NOMA. We formulate a problem to maximize $\mathcal{R}_{\rm tot}$ constrained to a minimum throughput requirement for each user and propose an algorithm to find a feasible resource allocation efficiently. Our results show that partial-NOMA allows greater flexibility in terms of performance. Partial-NOMA can also serve users that NOMA cannot. We also show that with appropriate parameter selection and resource allocation, partial-NOMA can outperform NOMA.
△ Less
Submitted 29 January, 2021;
originally announced February 2021.
-
Cross-Layer Network Codes for Content Delivery in Cache-Enabled D2D Networks
Authors:
Mohammed S. Al-Abiad,
Md. Zoheb Hassan,
Md. Jahangir Hossain
Abstract:
In this paper, we consider the use of cross-layer network coding (CLNC), caching, and device-to-device (D2D) communications to jointly optimize the delivery of a set of popular contents to a set of user devices (UDs). In the considered D2D network, a group of near-by UDs cooperate with each other and use NC to combine their cached files, so as the completion time required for delivering all reques…
▽ More
In this paper, we consider the use of cross-layer network coding (CLNC), caching, and device-to-device (D2D) communications to jointly optimize the delivery of a set of popular contents to a set of user devices (UDs). In the considered D2D network, a group of near-by UDs cooperate with each other and use NC to combine their cached files, so as the completion time required for delivering all requested contents to all UDs is minimized. Unlike the previous work that considers only one transmitting UD at a time, our work allows multiple UDs to transmit simultaneously given the interference among the active links is small. Such configuration brings a new trade-off among scheduling UDs to transmitting UDs, selecting the coding decisions and the transmission rate/power. Therefore, we consider the completion time minimization problem that involves scheduling multiple transmitting UDs, determining their transmission rates/powers and file combinations. The problem is shown to be intractable because it involves all future coding decisions. To tackle the problem at each transmission slot, we first design a graph called herein the D2D Rate-Aware IDNC graph where its vertices have weights that judiciously balance between the rates/powers of the transmitting UDs and the number of their scheduled UDs. Then, we propose an innovative and efficient CLNC solution that iteratively selects a set of transmitting UDs only if the interference caused by the transmissions of the newly selected UDs does not significantly impact the overall completion time. Simulation results show that the proposed solution offers significant completion time reduction compared with the existing algorithms.
△ Less
Submitted 18 January, 2021;
originally announced January 2021.
-
Completion Time Minimization in Fog-RANs using D2D Communications and Rate-Aware Network Coding
Authors:
Mohammed S. Al-Abiad,
Md. Jahangir Hossain
Abstract:
The device-to-device communication-aided fog radio access network, referred to as \textit{D2D-aided F-RAN}, takes advantage of caching at enhanced remote radio heads (eRRHs) and D2D proximity for improved system performance. For D2D-aided F-RAN, we develop a framework that exploits the cached contents at eRRHs, their transmission rates/powers, and previously received contents by different users to…
▽ More
The device-to-device communication-aided fog radio access network, referred to as \textit{D2D-aided F-RAN}, takes advantage of caching at enhanced remote radio heads (eRRHs) and D2D proximity for improved system performance. For D2D-aided F-RAN, we develop a framework that exploits the cached contents at eRRHs, their transmission rates/powers, and previously received contents by different users to deliver the requesting contents to users with a minimum completion time. Given the intractability of the completion time minimization problem, we formulate it at each transmission by approximating the completion time and decoupling it into two subproblems. In the first subproblem, we minimize the possible completion time in eRRH downlink transmissions, while in the second subproblem, we maximize the number of users to be scheduled on D2D links. We design two theoretical graphs, namely \textit{interference-aware instantly decodable network coding (IA-IDNC)} and \textit{D2D conflict} graphs to reformulate two subproblems as maximum weight clique and maximum independent set problems, respectively. Using these graphs, we heuristically develop joint and coordinated scheduling approaches. Through extensive simulation results, we demonstrate the effectiveness of the proposed schemes against existing baseline schemes. Simulation results show that the proposed two approaches achieve a considerable performance gain in terms of the completion time minimization.
△ Less
Submitted 9 July, 2020;
originally announced July 2020.
-
Device-Clustering and Rate-Splitting Enabled Device-to-Device Cooperation Framework in Fog Radio Access Network
Authors:
Md. Zoheb Hassan,
Md. Jahangir Hossain,
Julian Cheng,
Victor C. M. Leung
Abstract:
Resource allocation is investigated to enhance the performance of device-to-device (D2D) cooperation in a fog radio access network (F-RAN) architecture. Our envisioned framework enables two D2D links to share certain orthogonal radio resource blocks (RRBs) by forming device-clusters. In each device-cluster, both content-holder device-users (DUs) transmit to the content-requester DUs via an enhance…
▽ More
Resource allocation is investigated to enhance the performance of device-to-device (D2D) cooperation in a fog radio access network (F-RAN) architecture. Our envisioned framework enables two D2D links to share certain orthogonal radio resource blocks (RRBs) by forming device-clusters. In each device-cluster, both content-holder device-users (DUs) transmit to the content-requester DUs via an enhanced remote radio head (eRRH) over the same RRBs. Such RRBs are shared with the uplink F-RAN as well. The intra device-cluster interference is mitigated by exploiting both uplink and downlink rate-splitting schemes, and the inter device-cluster interference is mitigated by using an orthogonal RRB allocation strategy. Our objective is to maximize the end-to-end sum-rate of the device-clusters while reducing the interference between D2D cooperation and the uplink F-RAN over the shared RRBs. Towards this objective, a joint optimization of device-clustering, transmit power allocations, assignment of device-clusters to the eRRHs, and allocation of RRBs among the device-clusters is presented. Since the joint optimization is NP-hard and intractable, it is decomposed into device-clustering and resource allocation sub-problems, and efficient solutions to both sub-problems are developed. Based on the solutions to the sub-problems, a semi-distributed and convergent algorithm, entitled rate-splitting for multi-hop D2D (RSMD), is proposed to obtain the device-clusters and resource allocation for these device-clusters. Through extensive simulations, efficiency of the proposed RSMD algorithm over several benchmark schemes is demonstrated
△ Less
Submitted 14 April, 2021; v1 submitted 7 July, 2020;
originally announced July 2020.
-
Communication-Efficient Robust Federated Learning Over Heterogeneous Datasets
Authors:
Yanjie Dong,
Georgios B. Giannakis,
Tianyi Chen,
Julian Cheng,
Md. Jahangir Hossain,
Victor C. M. Leung
Abstract:
This work investigates fault-resilient federated learning when the data samples are non-uniformly distributed across workers, and the number of faulty workers is unknown to the central server. In the presence of adversarially faulty workers who may strategically corrupt datasets, the local messages exchanged (e.g., local gradients and/or local model parameters) can be unreliable, and thus the vani…
▽ More
This work investigates fault-resilient federated learning when the data samples are non-uniformly distributed across workers, and the number of faulty workers is unknown to the central server. In the presence of adversarially faulty workers who may strategically corrupt datasets, the local messages exchanged (e.g., local gradients and/or local model parameters) can be unreliable, and thus the vanilla stochastic gradient descent (SGD) algorithm is not guaranteed to converge. Recently developed algorithms improve upon vanilla SGD by providing robustness to faulty workers at the price of slowing down convergence. To remedy this limitation, the present work introduces a fault-resilient proximal gradient (FRPG) algorithm that relies on Nesterov's acceleration technique. To reduce the communication overhead of FRPG, a local (L) FRPG algorithm is also developed to allow for intermittent server-workers parameter exchanges. For strongly convex loss functions, FRPG and LFRPG have provably faster convergence rates than a benchmark robust stochastic aggregation algorithm. Moreover, LFRPG converges faster than FRPG while using the same communication rounds. Numerical tests performed on various real datasets confirm the accelerated convergence of FRPG and LFRPG over the robust stochastic aggregation benchmark and competing alternatives.
△ Less
Submitted 19 August, 2020; v1 submitted 17 June, 2020;
originally announced June 2020.
-
Cross-Layer Scheduling and Beamforming in Smart-Grid Powered Cellular Networks With Heterogeneous Energy Coordination
Authors:
Yanjie Dong,
Md. Jahangir Hossain,
Julian Cheng,
Victor C. M. Leung
Abstract:
User scheduling, beamforming and energy coordination are investigated in smart-grid powered cellular networks (SGPCNs), where the base stations are powered by a smart grid and natural renewable energy sources. Heterogeneous energy coordination is considered in SGPCNs, namely energy merchandizing with the smart grid and energy exchanging among the base stations. A long-term grid-energy expenditure…
▽ More
User scheduling, beamforming and energy coordination are investigated in smart-grid powered cellular networks (SGPCNs), where the base stations are powered by a smart grid and natural renewable energy sources. Heterogeneous energy coordination is considered in SGPCNs, namely energy merchandizing with the smart grid and energy exchanging among the base stations. A long-term grid-energy expenditure minimization problem with proportional-rate constraints is formulated for SGPCNs. Since user scheduling is coupled with the beamforming vectors, the formulated problem is challenging to handle via standard convex optimization methods. In practice, the beamforming vectors need to be updated over each slot according to the channel variations. User scheduling needs to be updated over several slots (frame) since the frequent scheduling of user equipment can cause reliability issues. Therefore, the Lyapunov optimization method is used to decouple the problem. A practical two-scale algorithm is proposed to schedule users at each frame, and obtain the beamforming vectors and amount of exchanged natural renewable energy at each slot. We prove that the proposed two-scale algorithm can asymptotically achieve the optimal solutions via tuning a control parameter. Numerical results verify the performance of the proposed two-scale algorithm.
△ Less
Submitted 29 January, 2020;
originally announced January 2020.
-
Coalition Formation Game for Delay Reduction in Instantly Decodable Network Coding Assisted D2D Communications
Authors:
Mohammed S. Al-Abiad,
Ahmed Douik,
Md. J. Hossain
Abstract:
Consider a wireless broadcast device-to-device (D2D) network wherein users' devices are interested in receiving some popular files. Each user's device possesses part of the content which is acquired in previous transmissions and cooperates with others to recover the missing packets by exchanging Instantly Decodable Network Coding (IDNC) packets. Recently, a distributed solution, relying on a non-c…
▽ More
Consider a wireless broadcast device-to-device (D2D) network wherein users' devices are interested in receiving some popular files. Each user's device possesses part of the content which is acquired in previous transmissions and cooperates with others to recover the missing packets by exchanging Instantly Decodable Network Coding (IDNC) packets. Recently, a distributed solution, relying on a non-cooperative game-theoretic formulation, has been proposed to reduce the communication time for fully connected D2D networks, i.e., single-hop D2D networks. In this paper, we develop a distributed game-theoretical solution to reduce the communication time for a more realistic scenario of a decentralized and partially connected, i.e., multi-hop, IDNC-enabled D2D network. The problem is modeled as a coalition game with cooperative-players wherein the payoff function is derived so that decreasing individual payoff results in the desired cooperative behavior. Given the intractability of the formulation, the coalition game is relaxed to a coalition formation game (CFG) involving the formation of disjoint coalitions. A distributed algorithm relying on merge-and-split rules is designed for solving the relaxed problem. The effectiveness of the proposed solution is validated through extensive numerical comparisons against existing methods in the literature.
△ Less
Submitted 12 November, 2019;
originally announced November 2019.
-
Cross-Layer Scheduling and Beamforming in Smart Grid Powered Small-Cell Networks
Authors:
Yanjie Dong,
Md. Jahangir Hossain,
Julian Cheng,
Victor C. M. Leung
Abstract:
In the small-cell networks (SCNs) with multiple small-cell base stations (ScBSs), the joint design of beamforming vectors, user scheduling and ScBS sleeping is investigated with the constraints on proportional rate. A long-term grid-energy expenditure minimization problem is formulated for the considered SCNs, which are powered by the smart grid and natural renewable energy. Since the scheduled us…
▽ More
In the small-cell networks (SCNs) with multiple small-cell base stations (ScBSs), the joint design of beamforming vectors, user scheduling and ScBS sleeping is investigated with the constraints on proportional rate. A long-term grid-energy expenditure minimization problem is formulated for the considered SCNs, which are powered by the smart grid and natural renewable energy. Since the scheduled user indicators are coupled with the beamforming vectors, the formulated problem is challenging to handle. In order to decouple the beamforming vectors from the scheduled user indicators, the Lyapunov optimization technique is used. As a result, a practical two-scale algorithm is proposed to allocate the user scheduling indicators and ScBS sleeping variables at the coarse-grained granularity (frame) as well as obtain the beamforming vectors at the fine-grained granularity (slot). Numerical results are used to verify the performance of the proposed two-scale algorithm.
△ Less
Submitted 13 August, 2019;
originally announced August 2019.
-
Joint Precoding and Power Control in Small-Cell Networks With Proportional-Rate MISO-BC Backhaul
Authors:
Yanjie Dong,
Md. Jahangir Hossain,
Julian Cheng,
Victor C. M. Leung
Abstract:
In the small-cell networks with multiple-input-single-output broadcasting (MISO-BC) backhauls, the joint dirty-paper coding and power control are investigated for the \mbox{MISO-BC} backhauls and access links in order to minimize the system transmit power. Considering the proportional rates of MISO-BC backhauls and flow-conservation constraints, the formulated optimization problem is \mbox{non-con…
▽ More
In the small-cell networks with multiple-input-single-output broadcasting (MISO-BC) backhauls, the joint dirty-paper coding and power control are investigated for the \mbox{MISO-BC} backhauls and access links in order to minimize the system transmit power. Considering the proportional rates of MISO-BC backhauls and flow-conservation constraints, the formulated optimization problem is \mbox{non-convex}. Moreover, the formulated problem couples the precoding vectors with the power-control variables. In order to handle the \mbox{non-convex} optimization problem and decouple the backhaul and access links, the structure of the formulated problem is investigated such that the optimal precoding vectors and optimal power-control variables are independently obtained. Moreover, the optimal precoding vectors are obtained in closed-form expressions. Simulation results are used to show the performance improvement over the benchmark scheme.
△ Less
Submitted 13 August, 2019;
originally announced August 2019.
-
Secure Distributed On-Device Learning Networks With Byzantine Adversaries
Authors:
Yanjie Dong,
Julian Cheng,
Md. Jahangir Hossain,
Victor C. M. Leung
Abstract:
The privacy concern exists when the central server has the copies of datasets. Hence, there is a paradigm shift for the learning networks to change from centralized in-cloud learning to distributed \mbox{on-device} learning. Benefit from the parallel computing, the on-device learning networks have a lower bandwidth requirement than the in-cloud learning networks. Moreover, the on-device learning n…
▽ More
The privacy concern exists when the central server has the copies of datasets. Hence, there is a paradigm shift for the learning networks to change from centralized in-cloud learning to distributed \mbox{on-device} learning. Benefit from the parallel computing, the on-device learning networks have a lower bandwidth requirement than the in-cloud learning networks. Moreover, the on-device learning networks also have several desirable characteristics such as privacy preserving and flexibility. However, the \mbox{on-device} learning networks are vulnerable to the malfunctioning terminals across the networks. The worst-case malfunctioning terminals are the Byzantine adversaries, that can perform arbitrary harmful operations to compromise the learned model based on the full knowledge of the networks. Hence, the design of secure learning algorithms becomes an emerging topic in the on-device learning networks with Byzantine adversaries. In this article, we present a comprehensive overview of the prevalent secure learning algorithms for the two promising on-device learning networks: Federated-Learning networks and decentralized-learning networks. We also review several future research directions in the \mbox{Federated-Learning} and decentralized-learning networks.
△ Less
Submitted 3 June, 2019;
originally announced June 2019.
-
On Clustering and Channel Disparity in Non-Orthogonal Multiple Access (NOMA)
Authors:
Konpal Shaukat Ali,
Mohamed-Slim Alouini,
Ekram Hossain,
Md. Jahangir Hossain
Abstract:
Non-orthogonal multiple access (NOMA) allows multiple users to share a time-frequency resource block by using different power levels. An important challenge associated with NOMA is the selection of users that share a resource block. This is referred to as clustering, which generally exploits the channel disparity (i.e. distinctness) among the users. We discuss clustering and the related resource a…
▽ More
Non-orthogonal multiple access (NOMA) allows multiple users to share a time-frequency resource block by using different power levels. An important challenge associated with NOMA is the selection of users that share a resource block. This is referred to as clustering, which generally exploits the channel disparity (i.e. distinctness) among the users. We discuss clustering and the related resource allocation challenges (e.g. power allocation) associated with NOMA and highlight open problems that require further investigation. We review the related literature on exploiting channel disparity for clustering and resource allocation. There have been several misconceptions regarding NOMA clustering including: 1) clustering users with low channel disparity is detrimental, 2) similar power allocation is disastrous for NOMA. We clarify such misunderstandings with numerical examples.
△ Less
Submitted 6 May, 2019;
originally announced May 2019.
-
Integrating UAVs into Existing Wireless Networks: A Stochastic Geometry Approach
Authors:
Rabe Arshad,
Lutz Lampe,
Hesham ElSawy,
Md. Jahangir Hossain
Abstract:
The integration of unmanned aerial vehicles (UAVs) into wireless networks has opened a new horizon to meet the capacity and coverage requirements foreseen in future wireless networks. Harnessing UAVs as flying base stations (BSs) has helped to achieve a cost-effective and on-the-go wireless network that may be used in several scenarios such as to support disaster response and in temporary hotspots…
▽ More
The integration of unmanned aerial vehicles (UAVs) into wireless networks has opened a new horizon to meet the capacity and coverage requirements foreseen in future wireless networks. Harnessing UAVs as flying base stations (BSs) has helped to achieve a cost-effective and on-the-go wireless network that may be used in several scenarios such as to support disaster response and in temporary hotspots. Despite the extensive research on the application side of UAVs, the integration of UAVs as BSs into existing wireless networks remains an open challenge. While UAV BSs can help to increase the area spectral efficiency, the added network heterogeneity and BS densification may diminish the capacity gains due to increased handover rates. In this work, we shed some light on this tradeoff by studying a three tier network architecture consisting of macro, small, and UAV BSs and analyze its coverage and rate performance. In particular, we consider joint control/data and split architectures and express the rate performance for stationary and mobile users, using an analytical approach based on stochastic geometry. While both joint and split architectures offer similar performance for stationary users, the numerical results suggest the splitting of control and data plane for mobile users.
△ Less
Submitted 9 October, 2018;
originally announced October 2018.
-
Robust Energy Efficient Beamforming in MISOME-SWIPT Systems With Proportional Secrecy Rate
Authors:
Yanjie Dong,
Md. Jahangir Hossain,
Julian Cheng,
Victor C. M. Leung
Abstract:
The joint design of beamforming vector and artificial noise covariance matrix is investigated for the multiple-input-single-output-multiple-eavesdropper simultaneous wireless information and power transferring \mbox{(MISOME-SWIPT)} systems. In the MISOME-SWIPT system, the base station delivers information signals to the legitimate user equipments and broadcasts jamming signals to the eavesdroppers…
▽ More
The joint design of beamforming vector and artificial noise covariance matrix is investigated for the multiple-input-single-output-multiple-eavesdropper simultaneous wireless information and power transferring \mbox{(MISOME-SWIPT)} systems. In the MISOME-SWIPT system, the base station delivers information signals to the legitimate user equipments and broadcasts jamming signals to the eavesdroppers. A secrecy energy efficiency (SEE) maximization problem is formulated for the considered \mbox{MISOME-SWIPT} system with imperfect channel state information, where the SEE is defined as the ratio of sum secrecy rate over total power consumption. Since the formulated SEE maximization problem is non-convex, it is first recast into a series of convex problems in order to obtain the optimal solution with a reasonable computational complexity. Two suboptimal solutions are also proposed based on the heuristic beamforming techniques that trade performance for computational complexity. In addition, the analysis of computational complexity is performed for the optimal and suboptimal solutions. Numerical results are used to verify the performance of proposed algorithms and to reveal practical insights.
△ Less
Submitted 8 September, 2018;
originally announced September 2018.
-
Robust Secrecy Energy Efficient Beamforming in MISOME-SWIPT Systems With Proportional Fairness
Authors:
Yanjie Dong,
Md. Jahangir Hossain,
Julian Cheng,
Victor C. M. Leung
Abstract:
The joint design of beamforming vector and artificial noise covariance matrix is investigated for multiple-input-single-output-multiple-eavesdropper simultaneous wireless information and power transferring (MISOME-SWIPT) systems. A secrecy energy efficiency (SEE) maximization problem is formulated in the MISOME-SWIPT system with imperfect channel state information and proportional secrecy rate con…
▽ More
The joint design of beamforming vector and artificial noise covariance matrix is investigated for multiple-input-single-output-multiple-eavesdropper simultaneous wireless information and power transferring (MISOME-SWIPT) systems. A secrecy energy efficiency (SEE) maximization problem is formulated in the MISOME-SWIPT system with imperfect channel state information and proportional secrecy rate constraints. Since the formulated SEE maximization problem is non-convex, it is first recast into a series of convex problems in order to obtain the optimal solution with a reasonable computational complexity. Numerical results are used to verify the performance of the proposed algorithm and to reveal practical insights.
△ Less
Submitted 8 September, 2018; v1 submitted 6 August, 2018;
originally announced August 2018.
-
Trajectory Optimization for Cooperative Dual-band UAV Swarms
Authors:
Hakim Ghazzai,
Mahdi Ben Ghorbel,
Andreas Kassler,
Md. Jahangir Hossain
Abstract:
Unmanned aerial vehicles (UAVs) have gained a lot of popularity in diverse wireless communication fields. They can act as high-altitude flying relays to support communications between ground nodes due to their ability to provide line-of-sight links. With the flourishing Internet of Things, several types of new applications are emerging. In this paper, we focus on bandwidth hungry and delay-toleran…
▽ More
Unmanned aerial vehicles (UAVs) have gained a lot of popularity in diverse wireless communication fields. They can act as high-altitude flying relays to support communications between ground nodes due to their ability to provide line-of-sight links. With the flourishing Internet of Things, several types of new applications are emerging. In this paper, we focus on bandwidth hungry and delay-tolerant applications where multiple pairs of transceivers require the support of UAVs to complete their transmissions. To do so, the UAVs have the possibility to employ two different bands namely the typical microwave and the high-rate millimeter wave bands. In this paper, we develop a generic framework to assign UAVs to supported transceivers and optimize their trajectories such that a weighted function of the total service time is minimized. Taking into account both the communication time needed to relay the message and the flying time of the UAVs, a mixed non-linear programming problem aiming at finding the stops at which the UAVs hover to forward the data to the receivers is formulated. An iterative approach is then developed to solve the problem. First, a mixed linear programming problem is optimally solved to determine the path of each available UAV. Then, a hierarchical iterative search is executed to enhance the UAV stops' locations and reduce the service time. The behavior of the UAVs and the benefits of the proposed framework are showcased for selected scenarios.
△ Less
Submitted 25 July, 2018;
originally announced July 2018.
-
Novel Method for Multi-Dimensional Mapping of Higher Order Modulations for BICM-ID Over Rayleigh Fading Channels
Authors:
Hassan M. Navazi,
Md. Jahangir Hossain
Abstract:
Multi-dimensional (MD) mapping offers more flexibility in mapping design for bit-interleaved coded modulation with iterative decoding (BICM-ID) and potentially improves the bandwidth efficiency. However, for higher order signal constellations, finding suitable MD mappings is a very complicated task due to the large number of possible mappings. In this paper, a novel mapping method is introduced to…
▽ More
Multi-dimensional (MD) mapping offers more flexibility in mapping design for bit-interleaved coded modulation with iterative decoding (BICM-ID) and potentially improves the bandwidth efficiency. However, for higher order signal constellations, finding suitable MD mappings is a very complicated task due to the large number of possible mappings. In this paper, a novel mapping method is introduced to construct efficient MD mappings to improve the error performance of BICM-ID over Rayleigh fading
channels. We propose to break the MD mapping design problem into four distinct $2$-D mapping functions. The $2$-D mappings are designed such that the resulting MD mapping improves the BICM-ID error performance at low signal to noise ratios (SNRs). We also develop cost functions that can be optimized to improve the error performance at high SNRs. The proposed mapping method is very simple compared to well-known mapping methods, and it can achieve suitable MD mappings for different modulations including higher order modulations for BICM-ID. Simulation results show that our mappings significantly outperform the previously known mappings at a target bit error rate (BER) of $10^{-6}$. Our mappings also offer a lower error-floor compared to their well-known counterparts.
△ Less
Submitted 12 July, 2018;
originally announced July 2018.
-
Handover Rate Characterization in 3D Ultra-Dense Heterogeneous Networks
Authors:
Rabe Arshad,
Hesham ElSawy,
Lutz Lampe,
Md. Jahangir Hossain
Abstract:
Ultra-dense networks (UDNs) envision the massive deployment of heterogenous base stations (BSs) to meet the desired traffic demands. Furthermore, UDNs are expected to support the diverse devices e.g., personal mobile devices and unmanned ariel vehicles. User mobility and the resulting excessive changes in user to BS associations in such highly dense networks may however nullify the capacity gains…
▽ More
Ultra-dense networks (UDNs) envision the massive deployment of heterogenous base stations (BSs) to meet the desired traffic demands. Furthermore, UDNs are expected to support the diverse devices e.g., personal mobile devices and unmanned ariel vehicles. User mobility and the resulting excessive changes in user to BS associations in such highly dense networks may however nullify the capacity gains foreseen through BS densification. Thus there exists a need to quantify the effect of user mobility in UDNs. In this article, we consider a three-dimensional N-tier downlink network and determine the association probabilities and inter/intra tier handover rates using tools from stochastic geometry. In particular, we incorporate user and BSs' antenna heights into the mathematical analysis and study the impact of user height on the association and handover rate. The numerical trends show that the intra-tier handovers are dominant for the tiers with shortest relative elevation w.r.t. the user and this dominance is more prominent when there exists a high discrepancy among the tiers' heights. However, biasing can be employed to balance the handover load among the network tiers.
△ Less
Submitted 27 June, 2018;
originally announced July 2018.
-
Throughput Maximization in Cloud-Radio Access Networks using Rate-Aware Network Coding
Authors:
Mohammed S. Al-Abiad,
Ahmed Douik,
Sameh Sorour,
Md Jahangir Hossain
Abstract:
One of the most promising techniques for network-wide interference management necessitates a redesign of the network architecture known as cloud radio access network (CRAN). The cloud is responsible for coordinating multiple Remote Radio Heads (RRHs) and scheduling users to their radio resources blocks (RRBs). The transmit frame of each RRH consists of several orthogonal RRBs each maintained at a…
▽ More
One of the most promising techniques for network-wide interference management necessitates a redesign of the network architecture known as cloud radio access network (CRAN). The cloud is responsible for coordinating multiple Remote Radio Heads (RRHs) and scheduling users to their radio resources blocks (RRBs). The transmit frame of each RRH consists of several orthogonal RRBs each maintained at a certain power level (PL). While previous works considered a vanilla version in which each RRB can serve a single user, this paper proposes mixing the flows of multiple users using instantly decodable network coding (IDNC). As such, the total throughput is maximized. The joint user scheduling and power adaptation problem is solved by designing, for each RRB, a subgraph in which each vertex represents potential user-RRH associations, encoded files, transmission rates, and PLs for one specific RRB. It is shown that the original problem is equivalent to a maximum-weight clique problem over the union of all subgraphs, called herein the CRAN-IDNCgraph. Extensive simulation results are provided to attest the effectiveness of the proposed solution against state of the art algorithms. In particular, the presented simulation results reveal that the method achieves substantial performance gains for all system configurations which collaborates the theoretical findings.
△ Less
Submitted 20 June, 2018;
originally announced June 2018.
-
Extracting the Most Weighted Throughput in UAV Empowered Wireless Systems With Nonlinear Energy Harvester
Authors:
Yanjie Dong,
Julian Cheng,
Md. Jahangir Hossain,
Victor C. M. Leung
Abstract:
With the maturity of unmanned aerial vehicle (UAV) technology, this work investigates the integration of UAV into wireless communication systems. Since the UAV is powered by a capacity-limited battery, this work proposes to use the radio energy harvesting technology at the UAV in order to extend the lifetime of UAV empowered base station. To extract the most weighted throughput of UAV empowered wi…
▽ More
With the maturity of unmanned aerial vehicle (UAV) technology, this work investigates the integration of UAV into wireless communication systems. Since the UAV is powered by a capacity-limited battery, this work proposes to use the radio energy harvesting technology at the UAV in order to extend the lifetime of UAV empowered base station. To extract the most weighted throughput of UAV empowered wireless systems, the dirty paper coding scheme and information-theoretic uplink-downlink channel duality are exploited to propose an extracting the most weighted throughput algorithm. Numerical results are used to verify the proposed algorithm.
△ Less
Submitted 27 April, 2018;
originally announced April 2018.
-
An Edge Computing Empowered Radio Access Network With UAV-Mounted FSO Fronthaul and Backhaul: Key Challenges and Approaches
Authors:
Yanjie Dong,
Md. Zoheb Hassan,
Julian Cheng,
Md. Jahangir Hossain,
Victor C. M. Leung
Abstract:
One promising approach to address the supply-demand mismatch between the terrestrial infrastructure and the temporary and/or unexpected traffic demands is to leverage the unmanned aerial vehicle (UAV) technologies. Motivated by the recent advancement of UAV technologies and retromodulator based free space optical communication, we propose a novel edge-computing empowered radio access network archi…
▽ More
One promising approach to address the supply-demand mismatch between the terrestrial infrastructure and the temporary and/or unexpected traffic demands is to leverage the unmanned aerial vehicle (UAV) technologies. Motivated by the recent advancement of UAV technologies and retromodulator based free space optical communication, we propose a novel edge-computing empowered radio access network architecture where the fronthaul and backhaul links are mounted on the UAVs for rapid event response and flexible deployment. The implementation of hardware and networking technologies for the proposed architecture are investigated. Due to the limited payload and endurance as well as the high mobility of UAVs, research challenges related to the communication resource management and recent research progress are reported.
△ Less
Submitted 16 March, 2018;
originally announced March 2018.
-
Throughput Maximization in Cloud Radio Access Networks using Network Coding
Authors:
Mohammed S. Al-Abiad,
Ahmed Douik,
Sameh Sorour,
MD Jahangir Hossain
Abstract:
This paper is interested in maximizing the total throughput of cloud radio access networks (CRANs) in which multiple radio remote heads (RRHs) are connected to a central computing unit known as the cloud. The transmit frame of each RRH consists of multiple radio resources blocks (RRBs), and the cloud is responsible for synchronizing these RRBS and scheduling them to users. Unlike previous works th…
▽ More
This paper is interested in maximizing the total throughput of cloud radio access networks (CRANs) in which multiple radio remote heads (RRHs) are connected to a central computing unit known as the cloud. The transmit frame of each RRH consists of multiple radio resources blocks (RRBs), and the cloud is responsible for synchronizing these RRBS and scheduling them to users. Unlike previous works that consider allocating each RRB to only a single user at each time instance, this paper proposes to mix the flows of multiple users in each RRB using instantly decodable network coding (IDNC). The proposed scheme is thus designed to jointly schedule the users to different RRBs, choose the encoded file sent in each of them, and the rate at which each of them is transmitted. Hence, the paper maximizes the throughput which is defined as the number of correctly received bits. To jointly fulfill this objective, we design a graph in which each vertex represents a possible user-RRB association, encoded file, and transmission rate. By appropriately choosing the weights of vertices, the scheduling problem is shown to be equivalent to a maximum weight clique problem over the newly introduced graph. Simulation results illustrate the significant gains of the proposed scheme compared to classical coding and uncoded solutions.
△ Less
Submitted 15 January, 2018;
originally announced January 2018.
-
Secure Beamforming in Full-Duplex SWIPT Systems With Loopback Self-Interference Cancellation
Authors:
Yanjie Dong,
Ahmed El Shafie,
Md. Jahangir Hossain,
Julian Cheng,
Naofal Al-Dhahir,
Victor C. M. Leung
Abstract:
Security is a critical issue in full duplex (FD) communication systems due to the broadcast nature of wireless channels. In this paper, joint design of information and artificial noise beamforming vectors is proposed for the FD simultaneous wireless information and power transferring (FD-SWIPT) systems with loopback self-interference cancellation. To guarantee high security and energy harvesting p…
▽ More
Security is a critical issue in full duplex (FD) communication systems due to the broadcast nature of wireless channels. In this paper, joint design of information and artificial noise beamforming vectors is proposed for the FD simultaneous wireless information and power transferring (FD-SWIPT) systems with loopback self-interference cancellation. To guarantee high security and energy harvesting performance of the FD-SWIPT system, the proposed design is formulated as a secrecy rate maximization problem under energy transfer rate constraints. Although the secrecy rate maximization problem is non-convex, we solve it via semidefinite relaxation and a two-dimensional search. We prove the optimality of our proposed algorithm and demonstrate its performance via simulations.
△ Less
Submitted 8 January, 2018;
originally announced January 2018.
-
Fronthaul-Aware Group Sparse Precoding and Signal Splitting in SWIPT C-RAN
Authors:
Yanjie Dong,
Md. Jahangir Hossain,
Julian Cheng,
Victor C. M. Leung
Abstract:
We investigate the precoding, remote radio head (RRH) selection and signal splitting in the simultaneous wireless information and power transferring (SWIPT) cloud radio access networks \mbox{(C-RANs)}. The objective is to minimize the power consumption of the SWIPT C-RAN. Different from the existing literature, we consider the nonlinear fronthaul power consumption and the multiple antenna RRHs. By…
▽ More
We investigate the precoding, remote radio head (RRH) selection and signal splitting in the simultaneous wireless information and power transferring (SWIPT) cloud radio access networks \mbox{(C-RANs)}. The objective is to minimize the power consumption of the SWIPT C-RAN. Different from the existing literature, we consider the nonlinear fronthaul power consumption and the multiple antenna RRHs. By switching off the unnecessary RRHs, the group sparsity of the precoding coefficients is introduced, which indicates that the precoding process and the RRH selection are coupled. In order to overcome these issues, a group sparse precoding and signal splitting algorithm is proposed based on the majorization-minimization framework, and the convergence behavior is established. Numerical results are used to verify our proposed studies.
△ Less
Submitted 15 November, 2017;
originally announced November 2017.
-
Dynamic Cross-Layer Beamforming in Hybrid Powered Communication Systems With Harvest-Use-Trade Strategy
Authors:
Yanjie Dong,
Md. Jahangir Hossain,
Julian Cheng,
Victor C. M. Leung
Abstract:
The application of renewable energy is a promising solution to realize the Green Communications. However, if the cellular systems are solely powered by the renewable energy, the weather dependence of the renewable energy arrival makes the systems unstable. On the other hand, the proliferation of the smart grid facilitates the loads with two-way energy trading capability. Hence, a hybrid powered ce…
▽ More
The application of renewable energy is a promising solution to realize the Green Communications. However, if the cellular systems are solely powered by the renewable energy, the weather dependence of the renewable energy arrival makes the systems unstable. On the other hand, the proliferation of the smart grid facilitates the loads with two-way energy trading capability. Hence, a hybrid powered cellular system, which combines the smart grid with the base stations, can reduce the grid energy expenditure and improve the utilization efficiency of the renewable energy. In this paper, the long-term grid energy expenditure minimization problem is formulated as a stochastic optimization model. By leveraging the stochastic optimization theory, we reformulate the stochastic optimization problem as a \mbox{per-frame} grid energy plus weighted penalized packet rate minimization problem, which is NP-hard. As a result, two suboptimal algorithms, which jointly consider the effects of the channel quality and the packet reception failure, are proposed based on the successive approximation beamforming (SABF) technique and the \mbox{zero-forcing} beamforming (ZFBF) technique. The convergence properties of the proposed suboptimal algorithms are established, and the corresponding computational complexities are analyzed. Simulation results show that the proposed SABF algorithm outperforms the ZFBF algorithm in both grid energy expenditure and packet delay. By tuning a control parameter, the grid energy expenditure can be traded for the packet delay under the proposed stochastic optimization model.
△ Less
Submitted 19 September, 2017;
originally announced September 2017.
-
Secure Beamforming in Full-Duplex SWIPT Systems
Authors:
Yanjie Dong,
Ahmed El Shafie,
Md. Jahangir Hossain,
Julian Cheng,
Naofal Al-Dhahir,
Victor C. M. Leung
Abstract:
Physical layer security is a key issue in the full duplex (FD) communication systems due to the broadcast nature of wireless channels. In this paper, the joint design of information and artificial noise beamforming vectors is proposed for the FD simultaneous wireless information and power transferring (FD-SWIPT) systems. To guarantee high security and energy harvesting performance of the FD-SWIPT…
▽ More
Physical layer security is a key issue in the full duplex (FD) communication systems due to the broadcast nature of wireless channels. In this paper, the joint design of information and artificial noise beamforming vectors is proposed for the FD simultaneous wireless information and power transferring (FD-SWIPT) systems. To guarantee high security and energy harvesting performance of the FD-SWIPT system, the proposed design is formulated as a sum information transmission rate (SITR) maximization problem under information-leakage and energy constraints. In addition, we consider the fairness issue between the uplink and downlink information transmission rates by formulating a \mbox{fairness-aware} SITR-maximization problem. Although the formulated \mbox{SITR-maximization} and \mbox{fairness-aware} \mbox{SITR-maximization} problems are non-convex, we solve them via semidefinite relaxation and one-dimensional search. The optimality of our proposed algorithms is theoretically proved, and the computation complexities are established. Moreover, we propose two suboptimal solutions to the formulated optimization problems. In terms of the SITR-maximization problem, numerical results show that the performance achieved by one of the two suboptimal algorithms is close to the performance of the optimal algorithm with increasing maximum transmission power of the FD-BST.
△ Less
Submitted 19 September, 2017;
originally announced September 2017.
-
Efficient Multi-Dimensional Mapping Using QAM Constellations for BICM-ID
Authors:
Hassan M. Navazi,
Md. Jahangir Hossain
Abstract:
Bit-interleaved coded modulation with iterative decoding (BICM-ID) offers very good error performance over additive white Gaussian noise (AWGN) and fading channels if it uses a wisely designed signal mapping. Further, error performance of BICM-ID can significantly be improved by employing multi-dimensional (MD) modulation. However, suitable MD mappings are obtained by computer search techniques ex…
▽ More
Bit-interleaved coded modulation with iterative decoding (BICM-ID) offers very good error performance over additive white Gaussian noise (AWGN) and fading channels if it uses a wisely designed signal mapping. Further, error performance of BICM-ID can significantly be improved by employing multi-dimensional (MD) modulation. However, suitable MD mappings are obtained by computer search techniques except for MD modulations that use smaller constellation e.g., binary phase shift keying (BPSK), quadrature phase shift keying (QPSK) and $8$-ary phase shift keying ($8$-PSK) as basic modulation. The alphabet size of MD modulations increases exponentially as the order of the basic modulation increases and computer search becomes intractable. In this paper, we propose a systematic mapping method for MD modulations. The innovativeness of our proposed method is that it generates MD mappings using $16$- and $64$-quadrature amplitude modulation (QAM) very efficiently. The presented numerical results show that the proposed method improves bit error rate (BER) of BICM-ID.
△ Less
Submitted 29 December, 2016;
originally announced January 2017.
-
Modeling and Analysis of Uplink Non-Orthogonal Multiple Access (NOMA) in Large-Scale Cellular Networks Using Poisson Cluster Processes
Authors:
Hina Tabassum,
Ekram Hossain,
Md. Jahangir Hossain
Abstract:
Non-orthogonal multiple access (NOMA) serves multiple users by superposing their distinct message signals. The desired message signal is decoded at the receiver by applying successive interference cancellation (SIC). Using the theory of Poisson cluster process (PCP), we provide a framework to analyze multi-cell uplink NOMA systems. Specifically, we characterize the rate coverage probability of a N…
▽ More
Non-orthogonal multiple access (NOMA) serves multiple users by superposing their distinct message signals. The desired message signal is decoded at the receiver by applying successive interference cancellation (SIC). Using the theory of Poisson cluster process (PCP), we provide a framework to analyze multi-cell uplink NOMA systems. Specifically, we characterize the rate coverage probability of a NOMA user who is at rank $m$ (in terms of the distance from its serving BS) among all users in a cell and the mean rate coverage probability of all users in a cell. Since the signal-to-interference-plus-noise ratio (SINR) of $m$-th user relies on efficient SIC, we consider three scenarios, i.e., perfect SIC (in which the signals of $m-1$ interferers who are stronger than $m$-th user are decoded successfully), imperfect SIC (in which the signals of of $m-1$ interferers who are stronger than $m$-th user may or may not be decoded successfully), and imperfect worst case SIC (in which the decoding of the signal of $m$-th user is always unsuccessful whenever the decoding of its relative $m-1$ stronger users is unsuccessful). The derived expressions are customized to capture the performance of a user at rank $m$ in an equivalent orthogonal multiple access (OMA) system. Finally, numerical results are presented to validate the derived expressions.
△ Less
Submitted 10 November, 2016; v1 submitted 22 October, 2016;
originally announced October 2016.
-
Non-Orthogonal Multiple Access (NOMA) in Cellular Uplink and Downlink: Challenges and Enabling Techniques
Authors:
Hina Tabassum,
Md Shipon Ali,
Ekram Hossain,
Md. Jahangir Hossain,
Dong In Kim
Abstract:
By combining the concepts of superposition coding at the transmitter(s) and successive interference cancellation (SIC) at the receiver(s), non-orthogonal multiple access (NOMA) has recently emerged as a promising multiple access technique for 5G wireless technology. In this article, we first discuss the fundamentals of uplink and downlink NOMA transmissions and outline their key distinctions (in t…
▽ More
By combining the concepts of superposition coding at the transmitter(s) and successive interference cancellation (SIC) at the receiver(s), non-orthogonal multiple access (NOMA) has recently emerged as a promising multiple access technique for 5G wireless technology. In this article, we first discuss the fundamentals of uplink and downlink NOMA transmissions and outline their key distinctions (in terms of implementation complexity, detection and decoding at the SIC receiver(s), incurred intra-cell and inter-cell interferences). Later, for both downlink and uplink NOMA, we theoretically derive the NOMA dominant condition for each individual user in a two-user NOMA cluster. NOMA dominant condition refers to the condition under which the spectral efficiency gains of NOMA are guaranteed compared to conventional orthogonal multiple access (OMA). The derived conditions provide direct insights on selecting appropriate users in two-user NOMA clusters. The conditions are distinct for uplink and downlink as well as for each individual user. Numerical results show the significance of the derived conditions for the user selection in uplink/downlink NOMA clusters and provide a comparison to the random user selection. A brief overview of the recent research investigations is then provided to highlight the existing research gaps. Finally, we discuss the potential applications and key challenges of NOMA transmissions.
△ Less
Submitted 20 August, 2016;
originally announced August 2016.
-
Fronthauling for 5G LTE-U Ultra Dense Cloud Small Cell Networks
Authors:
Haijun Zhang,
Yanjie Dong,
Julian Cheng,
Md. Jahangir Hossain,
Victor C. M. Leung
Abstract:
Ultra dense cloud small cell network (UDCSNet), which combines cloud computing and massive deployment of small cells, is a promising technology for the fifth-generation (5G) LTE-U mobile communications because it can accommodate the anticipated explosive growth of mobile users' data traffic. As a result, fronthauling becomes a challenging problem in 5G LTE-U UDCSNet. In this article, we present an…
▽ More
Ultra dense cloud small cell network (UDCSNet), which combines cloud computing and massive deployment of small cells, is a promising technology for the fifth-generation (5G) LTE-U mobile communications because it can accommodate the anticipated explosive growth of mobile users' data traffic. As a result, fronthauling becomes a challenging problem in 5G LTE-U UDCSNet. In this article, we present an overview of the challenges and requirements of the fronthaul technology in 5G \mbox{LTE-U} UDCSNets. We survey the advantages and challenges for various candidate fronthaul technologies such as optical fiber, millimeter-wave based unlicensed spectrum, Wi-Fi based unlicensed spectrum, sub 6GHz based licensed spectrum, and free-space optical based unlicensed spectrum.
△ Less
Submitted 24 July, 2016;
originally announced July 2016.
-
Cooperative Beamforming for Cognitive Radio-Based Broadcasting Systems with Asynchronous Interferences
Authors:
Mai H. Hassan,
Md. J. Hossain
Abstract:
In order to address the asynchronous interference issue for a generalized scenario with multiple primary and multiple secondary receivers, in this paper, we propose an innovative cooperative beamforming technique. In particular, the cooperative beamforming design is formulated as an optimization problem that maximizes the weighted sum achievable transmission rate of secondary destinations while it…
▽ More
In order to address the asynchronous interference issue for a generalized scenario with multiple primary and multiple secondary receivers, in this paper, we propose an innovative cooperative beamforming technique. In particular, the cooperative beamforming design is formulated as an optimization problem that maximizes the weighted sum achievable transmission rate of secondary destinations while it maintains the asynchronous interferences at the primary receivers below their target thresholds. In light of the intractability of the problem, we propose a two-phase suboptimal cooperative beamforming technique. First, it finds the beamforming directions corresponding to different secondary destinations. Second, it allocates the power among different beamforming directions. Due to the multiple interference constraints corresponding to multiple primary receivers, the power allocation scheme in the second phase is still complex. Therefore, we also propose a low complex power allocation algorithm. The proposed beamforming technique is extended for the cases, when cooperating CR nodes (CCRNs) have statistical or erroneous channel knowledge of the primary receivers. We also investigate the performance of joint CCRN selection and beamforming technique. The presented numerical results show that the proposed beamforming technique can significantly reduce the asynchronous interference signals at the primary receivers and increase the sum transmission rate of secondary destinations compared to the well known zero-forcing beamforming (ZFBF) technique.
△ Less
Submitted 8 May, 2014;
originally announced May 2014.
-
Cellular Downlink Performance with Base Station Sleeping, User Association, and Scheduling
Authors:
Hina Tabassum,
Uzma Siddique,
Ekram Hossain,
Md. Jahangir Hossain
Abstract:
Base station (BS) sleeping has emerged as a viable solution to enhance the overall network energy efficiency by inactivating the underutilized BSs. However, it affects the performance of users in sleeping cells depending on their BS association criteria, their channel conditions towards the active BSs, and scheduling criteria and traffic loads at the active BSs. This paper characterizes the perfor…
▽ More
Base station (BS) sleeping has emerged as a viable solution to enhance the overall network energy efficiency by inactivating the underutilized BSs. However, it affects the performance of users in sleeping cells depending on their BS association criteria, their channel conditions towards the active BSs, and scheduling criteria and traffic loads at the active BSs. This paper characterizes the performance of cellular systems with BS sleeping by developing a systematic framework to derive the spectral efficiency and outage probability of downlink transmission to the sleeping cell users taking into account the aforementioned factors. In this context, we develop a user association scheme in which a typical user in a sleeping cell selects a BS with \textbf{M}aximum best-case \textbf{M}ean channel \textbf{A}ccess \textbf{P}robability (MMAP) which is calculated by all active BSs based on their existing traffic loads. We consider both greedy and round-robin schemes at active BSs for scheduling users in a channel. Once the association is performed, the exact access probability for a typical sleeping cell user and the statistics of its received signal and interference powers are derived to evaluate the spectral and energy efficiencies of transmission. For the sleeping cell users, we also consider the conventional \textbf{M}aximum \textbf{R}eceived \textbf{S}ignal \textbf{P}ower (MRSP)-based user association scheme along with greedy and round-robin schemes at the BSs. The impact of cell-zooming is incorporated in the derivations to analyze its feasibility in reducing the coverage holes created by BS sleeping. Numerical results show the trade-offs between spectral efficiency and energy efficiency in various network scenarios. The accuracy of the analysis is verified through Monte-Carlo simulations.
△ Less
Submitted 28 January, 2014;
originally announced January 2014.
-
Towards Fully Optimized BICM Transceivers
Authors:
Md. Jahangir Hossain,
Alex Alvarado,
Leszek Szczecinski
Abstract:
Bit-interleaved coded modulation (BICM) transceivers often use equally spaced constellations and a random interleaver. In this paper, we propose a new BICM design, which considers hierarchical (nonequally spaced) constellations, a bit-level multiplexer, and multiple interleavers. It is shown that this new scheme increases the degrees of freedom that can be exploited in order to improve its perform…
▽ More
Bit-interleaved coded modulation (BICM) transceivers often use equally spaced constellations and a random interleaver. In this paper, we propose a new BICM design, which considers hierarchical (nonequally spaced) constellations, a bit-level multiplexer, and multiple interleavers. It is shown that this new scheme increases the degrees of freedom that can be exploited in order to improve its performance. Analytical bounds on the bit error rate (BER) of the system in terms of the constellation parameters and the multiplexing rules are developed for the additive white Gaussian Noise (AWGN) and Nakagami-$m$ fading channels. These bounds are then used to design the BICM transceiver. Numerical results show that, compared to conventional BICM designs, and for a target BER of $10^{-6}$, gains up to 3 dB in the AWGN channel are obtained. For fading channels, the gains depend on the fading parameter, and reach 2 dB for a target BER of $10^{-7}$ and $m=5$.
△ Less
Submitted 8 December, 2010;
originally announced December 2010.
-
Clustering of Content Supporting Computer Mediated Courseware Development
Authors:
G. M. M. Bashir,
M. J. Hossain,
M. R. Karim
Abstract:
Computer Mediated Courseware (CMC) has been developed so far for individual courses considering single or multiple text books. A group of courseware can be developed by using multiple text books and in this case, it is a requirement to cluster the contents of different books to form a generalized clustered content. No work has been found to develop courseware applying generalized clustered content…
▽ More
Computer Mediated Courseware (CMC) has been developed so far for individual courses considering single or multiple text books. A group of courseware can be developed by using multiple text books and in this case, it is a requirement to cluster the contents of different books to form a generalized clustered content. No work has been found to develop courseware applying generalized clustered content. We have proposed a clustering of content supporting computer mediated courseware development based on data mining techniques to construct a hierarchical general structure of a group of courseware combining the individual structure of a set of books. The clustering will help the courseware developer to dynamically allocate contents to develop different courses using a group of books. The authors have applied this methodology for different level of courses on database. The methodology is generalized and can be applied to any other courses.
△ Less
Submitted 26 April, 2010;
originally announced April 2010.