Papers by Khaled Hayajneh
International Journal of Communication Networks and Information Security (IJCNIS)
A heterogeneous cellular network can define as a network that is composed of different cell sizes... more A heterogeneous cellular network can define as a network that is composed of different cell sizes (macrocell (MeNB), small cell (SeNB), femtocell). Such heterogeneity of network is the backbone of the 5G networks where new applications on mobile devices need extensive computing power consumption and ultra-low latency constraints. Using a heterogeneous network will provide multiple paths in which the users’ data can flow through the network depending on the users’ available resources, remaining energy, etc. we study the heterogeneous network model, which contains MeNB, SeNB and femtocells. Also, we propose a matching subcarrier resource allocation and offloading decision (MSRAOD) algorithm, that depends on recourse allocation optimization. The main optimization goal has been set to minimize the total energy consumption of mobile users’ devices with acceptable latency requirements of the applications. Our proposed algorithm results show that the proposed algorithm enhances the average...
Bookmarks Related papers MentionsView impact
Scientific Reports
This study focuses on channel estimation for reconfigurable intelligent surface (RIS)-assisted mm... more This study focuses on channel estimation for reconfigurable intelligent surface (RIS)-assisted mmWave systems, in which the RIS is used to facilitate base-to-user data transfer. For beamforming to work with active and passive elements, a large-size cascade channel matrix should always be known. Low training costs are achieved by using the mmWave channels’ inherent sparsity. The research provides a unique compressive sensing-based channel estimation approach for reducing pilot overhead issues to a minimum. The proposed technique estimates channel data signals in a downlink for RIS-assisted mmWave systems. The mmWave systems often have a sparse distribution of signal sources due to the spatial correlations of the domains. This distribution pattern makes it possible to use compressive sensing methods to resolve the channel estimation issue. In order to decrease the pilot overhead, which is necessary to predict the channel, the proposed method extends the Re‘nyi entropy function as the ...
Bookmarks Related papers MentionsView impact
Electronics, 2021
The next-generation networks (5G and beyond) require robust channel codes to support their high s... more The next-generation networks (5G and beyond) require robust channel codes to support their high specifications, such as low latency, low complexity, significant coding gain, and flexibility. In this paper, we propose using a fountain code as a promising solution to 5G and 6G networks, and then we propose using a modified version of the fountain codes (Luby transform codes) over a network topology (Y-network) that is relevant in the context of the 5G networks. In such a network, the user can be connected to two different cells at the same time. In addition, the paper presents the necessary techniques for analyzing the system and shows that the proposed scheme enhances the system performance in terms of decoding success probability, error probability, and code rate (or overhead). Furthermore, the analyses in this paper allow us to quantify the trade-off between overhead, on the one hand, and the decoding success probability and error probability, on the other hand. Finally, based on t...
Bookmarks Related papers MentionsView impact
International Journal on Communications Antenna and Propagation (IRECAP), 2021
Bookmarks Related papers MentionsView impact
The concept of fountain codes has gained considerable attention in the past few years due to its ... more The concept of fountain codes has gained considerable attention in the past few years due to its simplicity, reliability, and feasibility. Nowadays, fountain codes are used in many applications including, but not limited to, data storage, data broadcasting, and point-to-point communications. While traditional fountain codes achieve the channel capacity over the binary erasure channel universally and asymptotically, they offer much room for improvement over other channels, architectures, and regimes. With the development of new technologies for smart cities and the Internet-of-Things (IoT), data transmission methodologies with arguably the highest level of flexibility and adaptability are required. With these technologies, the end users have a very diverse set of capabilities in terms of memory, power, and processing. Besides, the end users are connected via a wide range of links with various qualities and capacities. As a result, the required methodologies must provide a comprehensi...
Bookmarks Related papers MentionsView impact
IET Communications, 2019
Bookmarks Related papers MentionsView impact
IET Communications, 2018
Bookmarks Related papers MentionsView impact
2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016
The development of smart platforms in the Internet-of-Things (IoT) paradigm requires a number of ... more The development of smart platforms in the Internet-of-Things (IoT) paradigm requires a number of technological advances to go hand in hand. IoT devices and entities have very diverse set of capabilities in terms of memory, power, and processing and are connected via a wide range of links with various qualities and capacities. This work focuses on the design of state-of-the-art data transmission methodology with arguably the highest level of flexibility and adaptability. We present a novel fountain-based encoding technique using overlapped generations of Luby-Transform (LT) codes. The proposed overlapped LT (OLT) codes achieve significant gains in BER and/or code rate. They are highly energy-efficient, scalable, and robust. Our analysis shows in particular that by using OLT codes, we can modify the fountain degree distribution such that it does not contain degree-one packets starting from the second generation. Thus, we introduce new degree distributions to improve the performance of OLT codes; the new scheme is referred to as smart OLT (SOLT). Simulation results are provided to show the improvements of OLT and SOLT codes in AWGN channel in terms of error rate. For example, SOLT codes can achieve the same error performance as LT codes, but they require smaller transmission overhead, for instance, at SNR of 9 dB and error rate of 10-5, SOLT codes require a code rate of 0.476 while LT codes require a code rate of 0.417.
Bookmarks Related papers MentionsView impact
2015 IEEE 14th Canadian Workshop on Information Theory (CWIT), 2015
In this paper, we propose a new rateless code based on overlapped generations. This proposed sche... more In this paper, we propose a new rateless code based on overlapped generations. This proposed scheme works very well especially in a broadcast scenario, where channels with different characteristics are involved in the system. In the proposed scheme, we allow the adjacent generations to overlap. Our main focus is on the design of rateless codes to make any receiver able to recover all the source file with reduction in the overhead and the delay time. Indeed, we show that for several channels characteristics, our proposed scheme outperforms the regular rateless codes such as Luby transform (LT) code. The good advantage of our proposed scheme that it can be used with any kind of degree distributions in the literature and the same improvements are guaranteed.
Bookmarks Related papers MentionsView impact
2013 13th Canadian Workshop on Information Theory, 2013
ABSTRACT Fountain codes are typically defined solely based on the right degree distributions whic... more ABSTRACT Fountain codes are typically defined solely based on the right degree distributions which are Soliton or Soliton-like in most cases. In this paper, we consider Fountain encoders for the Gaussian channel and improve their performance by shaping the resulting left degree distributions away from Poisson. The proposed Fountain encoders achieve lower left degree variance at the same average degree. This in turn improves the growth of the so-called ripple in the BP decoding. The new encoders outperform the traditional ones in terms of overhead, error rate, and decoding complexity.
Bookmarks Related papers MentionsView impact
2014 27th Biennial Symposium on Communications (QBSC), 2014
ABSTRACT Fountain codes were introduced to provide higher reliability, lower complexities, and mo... more ABSTRACT Fountain codes were introduced to provide higher reliability, lower complexities, and more scalability for networks such as the Internet. Luby-Transform (LT) codes, which are the first realization of Fountain codes, achieve the capacity of the binary erasure channel (BEC) asymptotically and universally. For finite lengths, the search is continued to find codes closer to the capacity limits at even lower encoding and decoding complexities. Most previous work on single-layer Fountain coding targets the design via the right degree distribution. The left degree distribution of an LT code is left as Poisson to protect the universality. For finite lengths, this is no longer an issue; thus, we focus on the design of better codes for the BEC at practical lengths. Our left degree shaping provides codes outperforming LT and all other competing schemes in the literature. At a bit error rate of 10-7 and packet length k = 256, our scheme provides a realized rate of 0.6 which is 23.5% higher than Sorensen et al.'s scheme [1].
Bookmarks Related papers MentionsView impact
Complexity, 2021
Due to natural disasters, unmanned aerial vehicles (UAVs) can be deployed as aerial wireless base... more Due to natural disasters, unmanned aerial vehicles (UAVs) can be deployed as aerial wireless base stations when conventional cellular networks are out of service. They can also supplement the mobile ground station to provide wireless devices with improved coverage and faster data rates. Cells on wheels (CoWs) can also be utilized to provide enhanced wireless coverage for short-term demands. In this paper, a single CoW cooperates with a single UAV in order to provide maximum wireless coverage to ground users. The optimization problem is formulated to find the following: (1) the optimal 2D placement of the CoW, (2) the optimal 3D placement of the UAV, (3) the optimal bandwidth allocation, (4) the percentage of the available bandwidth that must be provided to the CoW and UAV, and (5) the priority of wireless coverage; which maximizes the number of covered users. We utilize the exhaustive search (ES) and particle swarm optimization (PSO) algorithms to solve the optimization problem. The...
Bookmarks Related papers MentionsView impact
IET Communications, 2015
Bookmarks Related papers MentionsView impact
Improving the Left Degree Distribution of Fountain Codes in the Finite-Length Regime، للحصول على ... more Improving the Left Degree Distribution of Fountain Codes in the Finite-Length Regime، للحصول على النص الكامل يرجى زيارة مكتبة الحسين بن طلال في جامعة اليرموك او زيارة موقعها الالكتروني
Bookmarks Related papers MentionsView impact
2017 15th Canadian Workshop on Information Theory (CWIT), 2017
Fountain codes are used in many applications where the channels are time varying and it is diffic... more Fountain codes are used in many applications where the channels are time varying and it is difficult at the transmitter to predict the appropriate code rate. In this situation, fixedrate codes are not suitable. Despite the good performance of fountain codes, universally optimal codes do not exist in the finite-length regime. In this paper, we design new fountain codes that are robust to the communication system's parameters such as erasure probability as well as the source length. We employ density evolution together with linear programming to design robust fountain codes offering some of the attractive properties of universally optimal codes. Different objectives are used in the analysis such as minimizing the erasure probability and maximizing the code rate. Analytically, results indicate that fountain codes can decrease the failure probability to the level of 10-12 using the optimized parameters at source length k = 128, code rate R = 1/2 and erasure probability ϵ = 0. Furthe...
Bookmarks Related papers MentionsView impact
Wirel. Commun. Mob. Comput., 2021
Unmanned aerial vehicles (UAVs), also named as drones, have become a modern model to provide a qu... more Unmanned aerial vehicles (UAVs), also named as drones, have become a modern model to provide a quick wireless communication infrastructure. They have been used when conventional base stations’ capacity is suffering in some extreme cases such as congestion inside the cell or a special event. This paper proposes an efficient three-dimension (3D) placement of a single UAV-assisted wireless network in such cases. Our proposed model assists the ground base station (GBS) using the UAV to serve arbitrary distributed users considering the impact of the obstacle blockage over the well-known air-to-ground (A2G) path model. This work is aimed at optimizing the percentage of available bandwidth that must be provided to the UAV in order to maximize the number of served users. In addition, it finds the 3D placement of the UAV base station (UAVBS) that maximizes the number of served users, each with maximum quality-of-service (QoS). The exhaustive search and particle swarm optimization (PSO) algor...
Bookmarks Related papers MentionsView impact
AEU - International Journal of Electronics and Communications
Bookmarks Related papers MentionsView impact
AEU - International Journal of Electronics and Communications
Bookmarks Related papers MentionsView impact
Uploads
Papers by Khaled Hayajneh