Search Results - "Bayat, Siavash"
-
1
Joint User Pairing, Subchannel, and Power Allocation in Full-Duplex Multi-User OFDMA Networks
Published in IEEE transactions on wireless communications (01-12-2016)“…In this paper, the resource allocation and scheduling problem for a full-duplex (FD) orthogonal frequency-division multiple-access network is studied where an…”
Get full text
Journal Article -
2
Distributed User Association and Femtocell Allocation in Heterogeneous Wireless Networks
Published in IEEE transactions on communications (01-08-2014)“…Deployment of low-power low-cost small access points such as femtocell access points (FAPs) constitute an attractive solution for improving the existing…”
Get full text
Journal Article -
3
Resource Allocation for MC MISO-NOMA SWIPT-Enabled HetNets With Non-Linear Energy Harvesting
Published in IEEE access (2020)“…This article proposes a resource allocation for multi carrier (MC) multiple input single output (MISO) non-orthogonal multiple access (NOMA) enabling…”
Get full text
Journal Article -
4
An Optimal Hybrid Nuclear Norm Regularization for Matrix Sensing with Subspace Prior Information
Published in IEEE access (01-01-2020)“…Matrix sensing refers to recovering a low-rank matrix from a few linear combinations of its entries. This problem naturally arises in many applications…”
Get full text
Journal Article -
5
A Low-Latency and Low-Complexity Point-Multiplication in ECC
Published in IEEE transactions on circuits and systems. I, Regular papers (01-09-2018)“…Elliptic curve cryptography (ECC) has received attention, because it can achieve the same security level as other asymmetric methods while using a key with…”
Get full text
Journal Article -
6
Optimal Multi-Objective Resource Allocation for D2D Underlaying Cellular Networks in Uplink Communications
Published in IEEE access (2021)“…In this paper, we study a resource allocation problem in orthogonal frequency division multiple access (OFDMA)-based Device-to-Device (D2D) communications. To…”
Get full text
Journal Article -
7
Novel Relay Selection Algorithms for Machine-to-Machine Communications With Static RF Interfaces Setting
Published in IEEE access (2020)“…Machine-to-Machine (M2M) communications play a significant role in the Internet of Things (IoT). Cooperation of machines in M2M communications can improve…”
Get full text
Journal Article -
8
Physical-Layer Security in Distributed Wireless Networks Using Matching Theory
Published in IEEE transactions on information forensics and security (01-05-2013)“…We consider the use of physical-layer security in a wireless communication system where multiple jamming nodes assist multiple source-destination nodes in…”
Get full text
Journal Article -
9
Dual-Basis Superserial Multipliers for Secure Applications and Lightweight Cryptographic Architectures
Published in IEEE transactions on circuits and systems. II, Express briefs (01-02-2014)“…Cryptographic algorithms utilize finite-field arithmetic operations in their computations. Due to the constraints of the nodes which benefit from the security…”
Get full text
Journal Article -
10
Advances in UAV-Assisted Localization: Joint Source and UAV Parameter Estimation
Published in IEEE transactions on vehicular technology (01-11-2023)“…This paper presents efficient estimators to address the problem of source localization aided by unmanned aerial vehicles (UAVs) with unknown location…”
Get full text
Journal Article -
11
Elliptic Localization Under Asynchronous Transmissions
Published in IEEE sensors journal (15-01-2024)“…This paper presents an efficient solution for the problem of elliptic object localization under asynchronous transmissions such that each measurement is…”
Get full text
Journal Article -
12
Radio Resource Allocation for Downlink Non-Orthogonal Multiple Access (NOMA) Networks Using Matching Theory
Published in 2015 IEEE Global Communications Conference (GLOBECOM) (01-12-2015)“…In this paper, we study the resource allocation and scheduling problem for a downlink non- orthogonal multiple access (NOMA) network where the base station…”
Get full text
Conference Proceeding -
13
Concurrent Error Detection in Finite-Field Arithmetic Operations Using Pipelined and Systolic Architectures
Published in IEEE transactions on computers (01-11-2009)“…In this work, we consider detection of errors in polynomial, dual, and normal bases arithmetic operations. Error detection is performed by recomputing with the…”
Get full text
Journal Article -
14
Separating Radar Signals From Impulsive Noise Using Atomic Norm Minimization
Published in IEEE transactions on circuits and systems. II, Express briefs (01-06-2021)“…We consider the problem of corrupted radar super-resolution, a generalization of compressed radar super-resolution in which one aims to recover the…”
Get full text
Journal Article -
15
An efficient and social-aware distributed in-network caching scheme in named data networks using matching theory
Published in Computer networks (Amsterdam, Netherlands : 1999) (20-07-2019)“…One of the main characteristics of Named Data Networks (NDN) which makes it a promising architecture for the future of the Internet is its universal in-network…”
Get full text
Journal Article -
16
Multi-Objective Resource Allocation for D2D and Enabled MC-NOMA Networks by Tchebycheff Method
Published in IEEE transactions on vehicular technology (01-05-2021)“…This paper considers a resource allocation problem in device-to-device (D2D) communications sharing the same frequency spectrum. In particular, the cellular…”
Get full text
Journal Article -
17
Interference-Aware Resource Allocation Algorithm for D2D-Enabled Cellular Networks Using Matching Theory
Published in IEEE eTransactions on network and service management (01-02-2024)“…To enhance spectral efficiency and network throughput in Device-to-Device (D2D)-enabled cellular networks, various resource sharing methods can be utilized…”
Get full text
Journal Article -
18
On Social-Aware Content Caching for D2D-Enabled Cellular Networks With Matching Theory
Published in IEEE internet of things journal (01-02-2019)“…In this paper, the problem of content caching in 5G cellular networks relying on social-aware device-to-device communications (DTD) is investigated. Our focus…”
Get full text
Journal Article -
19
An Efficient Low-Latency Point-Multiplication Over Curve25519
Published in IEEE transactions on circuits and systems. I, Regular papers (01-10-2019)“…The elliptic curve cryptography (ECC) has gained attention mainly due to its lower complexity compared to other asymmetric methods while providing the same…”
Get full text
Journal Article -
20
On Efficient and Social-Aware Object Allocation in Named Data Networks Using Matching Theory
Published in 2018 IEEE Symposium on Computers and Communications (ISCC) (01-06-2018)“…Existence of cache space in each node of the network is one of the fundamental characteristics of Named Data Networks (NDN) which makes it a promising…”
Get full text
Conference Proceeding