Skip to main content
Artificial Intelligence (AI) and especially Machine Learning (ML) can play a very important role in realizing and optimizing 6G network applications. In this paper, we present a brief summary of ML methods, as well as an up-to-date review... more
Artificial Intelligence (AI) and especially Machine Learning (ML) can play a very important role in realizing and optimizing 6G network applications. In this paper, we present a brief summary of ML methods, as well as an up-to-date review of ML approaches in 6G wireless communication systems. These methods include supervised, unsupervised and reinforcement techniques. Additionally, we discuss open issues in the field of ML for 6G networks and wireless communications in general, as well as some potential future trends to motivate further research into this area.
ABSTRACT
We study the impact of residual radio frequency (RF) impairments and fading on the spectrum sensing performance of a classical energy detector (ED), which is employed in a full-duplex wireless system. Specifically, we present novel... more
We study the impact of residual radio frequency (RF) impairments and fading on the spectrum sensing performance of a classical energy detector (ED), which is employed in a full-duplex wireless system. Specifically, we present novel closed-form expressions for the false-alarm and detection probabilities, assuming Nakagami-m fading, and the impact of residual RF impairments. The results reveal the importance of taking into account the wireless environment and the ED's capabilities, when evaluating the ED performance and setting its threshold.
Research Interests:
The next generation wireless networks are envisioned to deal with the expected thousand-fold increase in total mobile broadband data and the hundred-fold increase in connected devices. In order to provide higher data rates, improved... more
The next generation wireless networks are envisioned to deal with the expected thousand-fold increase in total mobile broadband data and the hundred-fold increase in connected devices. In order to provide higher data rates, improved end-to-end performance, low latency, and low energy consumption at low cost per transmission, the fifth generation (5G) systems are required to overcome various handicaps of current cellular networks and wireless links. One of the key handicaps of 5G systems is the performance degradation of the communication link, due to the use of low-cost transceiver in high data rate. Motivated by this in this paper, we discuss the impact of transceiver front-end hardware imperfections on the spectrum sensing performance of cognitive radios.
Research Interests:
—We evaluate and quantify the joint effect of fading and multiple interferers on the physical-layer (PHY) security of a system consisted of a base-station (BS), a legitimate user, and an eavesdropper. To this end, we present a novel... more
—We evaluate and quantify the joint effect of fading and multiple interferers on the physical-layer (PHY) security of a system consisted of a base-station (BS), a legitimate user, and an eavesdropper. To this end, we present a novel closed-form expression for the secrecy outage probability, which takes into account the fading characteristics of the wireless environment, the location and the number of interferers, as well as the transmission power of the BS and the interference. The results reveal that the impact of interference should be seriously taken into account in the design and deployment of a wireless system with PHY security.
Research Interests:
—We study the error performance of an heterodyne differential phase-shift keying (DPSK) optical wireless (OW) communication system operating under various intensity fluctuations conditions. Specifically, it is assumed that the propagating... more
—We study the error performance of an heterodyne differential phase-shift keying (DPSK) optical wireless (OW) communication system operating under various intensity fluctuations conditions. Specifically, it is assumed that the propagating signal suffers from the combined effects of atmospheric turbulence-induced fading, misalignment fading (i.e., pointing errors) and path-loss. Novel closed-form expressions for the statistics of the random at-tenuation of the propagation channel are derived and the bit-error rate (BER) performance is investigated for all the above fading effects. Numerical results are provided to evaluate the error performance of OW systems with the presence of atmospheric turbulence and/or misalignment. Moreover, nonlinear optimization is also considered to find the optimum beamwidth that achieves the minimum BER for a given signal-to-noise ratio value.
A novel closed-form expression for the achievable average channel capacity of a generalized-selection combining RAKE receiver in Rayleigh fading, is derived. Performance comparison for the capacity achieved with maximal-ratio combining... more
A novel closed-form expression for the achievable average channel capacity of a generalized-selection combining RAKE receiver in Rayleigh fading, is derived. Performance comparison for the capacity achieved with maximal-ratio combining and RAKE receivers is also presented. The expression derived, fully conforms to the upper bound of the Shannon–Hartley theorem. Copyright © 2004 AEI.
Motivated by the suitability of the Weibull distribution to model multipath fading channels, the second order statistics and the spectral efficiency (SE) of L-branch SC receivers are studied. Deriving a novel closed-form expression for... more
Motivated by the suitability of the Weibull distribution to model multipath fading channels, the second order statistics and the spectral efficiency (SE) of L-branch SC receivers are studied. Deriving a novel closed-form expression for the probability density function (pdf) of the SC output SNR, the average level crossing rate (LCR), the average fade duration (AFD) and the Shannon's average SE, at the output of the SC, are derived in closed-forms. Our results are sufficiently general to handle arbitrary fading parameter and dissimilar branch powers.
... Numerical results reveal that, as expected, the diversity gain that such systems offer is, under the weak source–destination channel assumption, on the order of the ... [5] GK Karagiannidis, NC Sagias and TA Tsiftsis, Closed-form... more
... Numerical results reveal that, as expected, the diversity gain that such systems offer is, under the weak source–destination channel assumption, on the order of the ... [5] GK Karagiannidis, NC Sagias and TA Tsiftsis, Closed-form statistics for the sum of squared Nakagami-m ...
Research Interests:
Research Interests:
—In this paper, we systematically study the average rate and outage probability tradeoffs of full-duplex two-way and one-way relaying under residual self-interference. Among various relaying protocols, two common of them are considered:... more
—In this paper, we systematically study the average rate and outage probability tradeoffs of full-duplex two-way and one-way relaying under residual self-interference. Among various relaying protocols, two common of them are considered: amplify-and-forward (AF) and decode-and-forward (DF). Furthermore, we consider the application of physical-layer network coding (PNC) and analog network coding (ANC) to full-duplex two-way relaying. Novel closed-form expressions for the average rate and outage probability, are presented. The results show that full-duplex two-way relaying can achieve higher rate than one-way relaying in the medium to high signal-to-noise ratio (SNR) region, at the cost of a certain loss in the outage performance. Moreover, DF protocol can achieve better outage performance than the AF one, but it suffers from a certain loss in the rate in the high SNR region. It is also shown that PNC can further improve the rate and outage performance. In addition, the results clearly reveal the effects of time multiplexing, forward protocol, and network coding on relaying systems, which would shed light on designing practical full-duplex relaying schemes.
Research Interests:
We investigate the physical layer (PHY) security of a system with a base-station (BS), a legitimate user, and an eavesdropper, whose exact location is unknown but within a ring-shaped area around the BS. To this end, we present novel... more
We investigate the physical layer (PHY) security of a system with a base-station (BS), a legitimate user, and an eavesdropper, whose exact location is unknown but within a ring-shaped area around the BS. To this end, we present novel closed-form expressions for the secrecy outage probability, which take into consideration both the impact of fading, as well as the eavesdropper's location uncertainty. The derived expressions are validated through simulations, which reveal that the level of uncertainty should be seriously taken into account in the design and deployment of a wireless system with PHY security.
Research Interests:
In this paper, a downlink multiple-input-multiple-output (MIMO) non-orthogonal multiple access (NOMA) scenario is considered. We investigate a dynamic user clustering problem from a fairness perspective. In order to solve this... more
In this paper, a downlink multiple-input-multiple-output (MIMO) non-orthogonal multiple access (NOMA) scenario is considered. We investigate a dynamic user clustering problem from a fairness perspective. In order to solve this optimization problem, three sub-optimal algorithms, namely top-down A, top-down B, and bottom up, are proposed to realize different tradeoffs of complexity and throughput of the worst user. In addition, for each given user clustering case, we optimize the power allocation coefficients for the users in each cluster by adopting a bisection search based algorithm. Numerical results show that the proposed algorithms can lower the complexity with an acceptable degradation on throughput compared with the exhaustive search method. It is worth noting that top-down B algorithm can achieve a good tradeoff between complexity and throughput among the three proposed algorithms.
Research Interests:
Page 1. Diversity Combining in Hybrid RF/FSO Systems with PSK Modulation Nestor D. Chatzidiamantis ∗ , George K. Karagiannidis ∗ , Emmanouil E. Kriezis ∗ and Michail Matthaiou † ∗Department of Electrical & Computer ...
Direct-conversion radio (DCR) receivers can offer highly integrated low-cost hardware solutions for spectrum sensing in cognitive radio (CR) systems. However, DCR receivers are susceptible to radio frequency (RF) impairments, such as... more
Direct-conversion radio (DCR) receivers can offer highly integrated low-cost hardware solutions for spectrum sensing in cognitive radio (CR) systems. However, DCR receivers are susceptible to radio frequency (RF) impairments, such as in-phase and quadrature-phase imbalance, low-noise amplifier nonlinearities and phase noise, which limit the spectrum sensing capabilities. In this paper, we investigate the joint effects of RF impairments on energy detection based spectrum sensing for CR systems in multi-channel environments. In particular, we provide novel closed-form expressions for the evaluation of the detection and false alarm probabilities, assuming Rayleigh fading. Furthermore, we extend the analysis to the case of CR networks with cooperative sensing, where the secondary users suffer from different levels of RF imperfections, considering both scenarios of error free and imperfect reporting channel. Numerical and simulation results demonstrate the accuracy of the analysis as well as the detrimental effects of RF imperfections on the spectrum sensing performance, which bring significant losses in the spectrum utilization.
Research Interests:
Radio frequency (RF) front-ends constitute a fundamental part of both conventional and emerging wireless systems. However, in spite of their importance they are often assumed ideal, although they are practically subject to certain... more
Radio frequency (RF) front-ends constitute a fundamental part of both conventional and emerging wireless systems. However, in spite of their importance they are often assumed ideal, although they are practically subject to certain detrimental impairments, such as amplifier nonlinearities, phase noise and in phase and quadrature (I/Q) imbalance (IQI). This paper is devoted to the quantification and evaluation of the effects of IQI on the secrecy capacity of a wiretap channel. Novel closed-form expressions are derived for the secrecy outage probability for the case of ideal transmitter and I/Q imbalanced legitimate user's and eavesdropper's receivers. Numerical results and simulations illustrate the detrimental effects of IQI on the physical layer security performance, and reveal that IQI should be seriously taken into consideration in the design of secure wireless systems. Index Terms—I/Q imbalance, Outage secrecy capacity, Physical layer security, Probability of zero secrecy capacity.
Research Interests:
We investigate the impact of multiple primary users (PUs) and fading on the spectrum sensing of a classical energy detector (ED). Specifically, we present novel closed-form expressions for the false-alarm and detection probabilities in a... more
We investigate the impact of multiple primary users (PUs) and fading on the spectrum sensing of a classical energy detector (ED). Specifically, we present novel closed-form expressions for the false-alarm and detection probabilities in a multiple PUs environment, assuming Nakagami-m fading and complex Gaussian PUs transmitted signals. The results reveal the importance of taking into consideration the wireless environment, when evaluating the ED spectrum sensing performance and selecting the ED threshold.
Research Interests:
Direct-conversion architectures (DCA) can offer highly integrated low-cost hardware solutions to communication transceivers. However, DCA devices are sensitive to radio frequency (RF) imperfections such as amplifier non-linearities, phase... more
Direct-conversion architectures (DCA) can offer highly integrated low-cost hardware solutions to communication transceivers. However, DCA devices are sensitive to radio frequency (RF) imperfections such as amplifier non-linearities, phase noise and in-phase/quadrature-phase imbalances (IQI), which typically lead to a severe degradation of the performance of such systems. Motivated by this, we quantify and evaluate the impact of RF IQI on wireless communications in the context of cascaded fading channels. Novel closed form expressions are derived for the corresponding outage probability for the case of ideal transmitter (TX) and receiver (RX), ideal TX and I/Q imbalanced RX, I/Q imbalanced TX and ideal RX, and joint I/Q imbalanced TX/RX. The offered analytic results have a relatively convenient algebraic representation and their validity is extensively justified through simulations. Based on these, it is shown that cascaded fading leads to considerable degradation in the system performance and that assuming ideal RF front- ends at the TX and RX induces non-negligible errors in the outage probability that can exceed 20% in several communication scenarios. We further demonstrate that the effects by cascaded multipath fading conditions are particularly severe, as they typically result to considerable performance losses of around or over an order of magnitude.
Research Interests:
Direct-conversion architectures can offer highly integrated low-cost hardware solutions to communication transceivers. However, it has been demonstrated that radio frequency (RF) impairments such as amplifier nonlinearities, phase noise... more
Direct-conversion architectures can offer highly integrated low-cost hardware solutions to communication transceivers. However, it has been demonstrated that radio frequency (RF) impairments such as amplifier nonlinearities, phase noise and in-phase/quadrature-phase imbalances (IQI) can lead to a severe degradation in the performance of such systems. Motivated by this, the present work is devoted to the quantification and evaluation of the effects of RF IQI on wireless communications in the context of cascaded fading channels for both single-carrier and multi-carrier systems. To this end, closed form expressions are firstly derived for the outage probability (OP) over N*Nakagami−m channels for the cases of ideal transmitter (TX) and receiver (RX), ideal TX and IQI RX, IQI TX and ideal RX, and joint TX/RX IQI. The offered expressions along with several deduced corresponding special cases are subsequently employed in the context of vehicular-to- vehicular (V2V) communications to justify their importance and practical usefulness in the context of emerging communication systems. We demonstrate that considering non-ideal RF front- ends at the TX and/or RX, introduces non-negligible errors in the OP performance that can exceed 20% in several communication scenarios. We further demonstrate that the effects by cascaded multipath fading conditions are particularly detrimental, as they typically result in considerable performance losses of around or over an order of magnitude.
Research Interests:
Radio frequency (RF) front-ends constitute a fundamental part of both conventional and emerging wireless communication systems. However, in spite of their importance they are often assumed ideal, although they are practically subject to... more
Radio frequency (RF) front-ends constitute a fundamental part of both conventional and emerging wireless communication systems. However, in spite of their importance they are often assumed ideal, although they are practically subject to certain detrimental impairments, such as amplifier nonlinearities, phase noise and in phase and quadrature (I/Q) imbalance (IQI). The present work is devoted to the quantification and evaluation of the RF IQI effects in the context of realistic wireless vehicle-to- vehicle (V2V) communications over double-Nakagami−m fading channels. Novel closed form expressions are derived for the corresponding outage probability for the case of ideal transmitter (TX) and receiver (RX), ideal TX and I/Q imbalanced RX, I/Q imbalanced TX and ideal RX, and joint I/Q imbalanced TX/RX. The offered analytic results have a relatively convenient algebraic representation and their validity is extensively justified through comparisons with respective results from computer simulations. Based on these, it is shown that cascaded fading results to considerable degradations in the system performance and that assuming ideal RF front-ends at the TX and RX induces non- negligible errors in the outage probability evaluation that can exceed 20% in several V2V communication scenarios.
Research Interests:
ABSTRACT Non-orthogonal multiple access (NOMA) systems have the potential to deliver higher system throughput, compared to contemporary orthogonal multiple access techniques. For a linearly precoded multiple-input multiple-output (MISO)... more
ABSTRACT Non-orthogonal multiple access (NOMA) systems have the potential to deliver higher system throughput, compared to contemporary orthogonal multiple access techniques. For a linearly precoded multiple-input multiple-output (MISO) system, we study the downlink sum rate maximization problem, when the NOMA principles are applied. Being a non-convex and intractable optimization problem,we resort to approximate it with a minorization-maximization algorithm (MMA), which is a widely used tool in statistics. In each step of the MMA, we solve a second-order cone program, such that the feasibility set in each step contains that of the previous one, and is always guaranteed to be a subset of the feasibility set of the original problem. It should be noted that the algorithm takes a few iterations to converge. Furthermore, we study the conditions under which the achievable rates maximization can be further simplified to a low complexity design problem, and we compute the probability of occurrence of this event. Numerical examples are conducted to show a comparison of the proposed approach against conventional multiple access systems. NOMA is reported to provide better spectral and power efficiency with a polynomial time computational complexity.
Research Interests:
Research Interests:
Research Interests:
ABSTRACT
Direct-conversion radio receivers can offer highly integrated low-cost hardware solutions for spectrum sensing in cognitive radio systems. However, these receivers are susceptible to radio frequency (RF) impairments, such as in-phase and... more
Direct-conversion radio receivers can offer highly integrated low-cost hardware solutions for spectrum sensing in cognitive radio systems. However, these receivers are susceptible to radio frequency (RF) impairments, such as in-phase and quadrature-phase imbalance, low-noise amplifier nonlinearities and phase noise, which limit the spectrum sensing capabilities. In this paper, we study the joint effects of RF impairments on energy detection based spectrum sensing in multi-channel environments. In particular, we provide an analytical framework for the evaluation of the probabilities of detection and false alarm, assuming Rayleigh fading and approximating the joint effects of RF impairments by a Gaussian distribution. Numerical results illustrate the detrimental effects of RF imperfections on the spectrum sensing performance, which bring significant losses in the spectrum utilization.
Research Interests:
Research Interests:
ABSTRACT
This paper deals with the performance of prede-tection equal-gain combining (EGC) receivers operating over an interference-limited fading environment with cochannel interfe-rence (CCI). It is considered that the desired components of the... more
This paper deals with the performance of prede-tection equal-gain combining (EGC) receivers operating over an interference-limited fading environment with cochannel interfe-rence (CCI). It is considered that the desired components of the received signals experience independent, but not necessarily identically distributed, Nakagami-m fading, while the interferers are subjected to independent Rayleigh fading. The analysis is not only limited to identically distributed interferers, but rather includes the case of interferers with distinct average powers. Following the coherent interference power calculation and by using a useful lower-bound for the distribution of the sum of Nakagami-m fading envelopes, novel closed-form upper-bounds for the outage and average symbol error probability for several modulation schemes are presented. Moreover, lower-bounds for the Shannon average spectral efficiency are derived in closed-form. Numerical results demonstrate the effect of the number of the i...
Motivated by the challenges in the design and implementation of wireless cloud networks and the complex optimization of Physical Layer Network Coding (PNC) in Compute-and-Forward (C\&F) relaying, we propose a cooperative network... more
Motivated by the challenges in the design and implementation of wireless cloud networks and the complex optimization of Physical Layer Network Coding (PNC) in Compute-and-Forward (C\&F) relaying, we propose a cooperative network management scheme for Cloud C\&F networks, employing Coalitional Game Theory. The proposed scheme is an efficient PNC technique for the uplink of cloud C\&F networks, which jointly optimizes the sum and the minimum transmission rates, while minimizing the total transmitting power. In the proposed network architecture, C\&F Relays are considered as rational players which form coalitions, in order to optimize the achievable rates via relay selection and PNC, while the tradeoff between the minimum and the sum rate is investigated by utilizing the concept of Pareto frontier and Pareto optimal point. The proposed algorithms eliminate the dominated strategies and converge to the optimal solution with respect to three criteria: maximization of the minimum rate, max...
Starting from on a recently introduced Gaussian class bivariate Weibull stochastic model, the probability density and the cumulative distribution functions of the product (Z1 Z2) c and the ratio (Z1/Z2) c , when Z1 and Z2 are correlated... more
Starting from on a recently introduced Gaussian class bivariate Weibull stochastic model, the probability density and the cumulative distribution functions of the product (Z1 Z2) c and the ratio (Z1/Z2) c , when Z1 and Z2 are correlated Weibull random variables belonging to this class (c > 0), are derived in closed form. Moreover, using the inequality between arithmetic and geometric mean, a union upper bound for the distribution of the sum of two correlated Weibull variates Z c 1 + Z c 2 is also presented. Special cases of our results are in agreement with previously published ones. The proposed analysis is useful in several scientific fields of engineering.

And 257 more

Research Interests:
This paper studies the secrecy rate maximization problem of a secure wireless communication system, in the presence of multiple eavesdroppers. The security of the communication link is enhanced through cooperative jamming, with the help... more
This paper studies the secrecy rate maximization problem of a secure wireless communication system, in the presence of multiple eavesdroppers. The security of the communication link is enhanced through cooperative jamming, with the help of multiple jammers. First, a feasibility condition is derived to achieve a positive secrecy rate at the destination. Then, we solve the original secrecy rate maximization problem, which is not convex in terms of power allocation at the jammers. To circumvent this non-convexity, the achievable secrecy rate is approximated for a given power allocation at the jammers and the approximated problem is formulated into a geometric programming one. Based on this approximation, an iterative algorithm has been developed to obtain the optimal power allocation at the jammers. Next, we provide a bisection approach, based on one-dimensional search, to validate the optimality of the proposed algorithm. In addition, by assuming Rayleigh fading, the secrecy outage probability (SOP) of the proposed cooperative jamming scheme is analyzed. More specifically, a single-integral form expression for SOP is derived for the most general case as well as a closed-form expression for the special case of two cooperative jammers and one eavesdropper. Simulation results have been provided to validate the convergence and the optimality of the proposed algorithm as well as the theoretical derivations of the presented SOP analysis.