scispace - formally typeset
Search or ask a question
Author

Mirmojtaba Gharibi

Bio: Mirmojtaba Gharibi is an academic researcher from University of Waterloo. The author has contributed to research in topics: Reduction (complexity) & The Internet. The author has an hindex of 3, co-authored 9 publications receiving 320 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the authors present a conceptual model of how such an architecture can be organized and specify the features that an Internet of Drones (IoD) system based on their architecture should implement.
Abstract: The Internet of Drones (IoD) is a layered network control architecture designed mainly for coordinating the access of unmanned aerial vehicles to controlled airspace, and providing navigation services between locations referred to as nodes. The IoD provides generic services for various drone applications, such as package delivery, traffic surveillance, search and rescue, and more. In this paper, we present a conceptual model of how such an architecture can be organized and we specify the features that an IoD system based on our architecture should implement. For doing so, we extract key concepts from three existing large scale networks, namely the air traffic control network, the cellular network, and the Internet, and explore their connections to our novel architecture for drone traffic management. A simulation platform for IoD is being implemented, which can be accessed from www.IoDnet.org in the future.

296 citations

Posted Content
TL;DR: This paper presents a conceptual model of how such an architecture for drone traffic management can be organized and specifies the features that an IoD system based on this architecture should implement.
Abstract: The Internet of Drones (IoD) is a layered network control architecture designed mainly for coordinating the access of unmanned aerial vehicles to controlled airspace, and providing navigation services between locations referred to as nodes. The IoD provides generic services for various drone applications such as package delivery, traffic surveillance, search and rescue and more. In this paper, we present a conceptual model of how such an architecture can be organized and we specify the features that an IoD system based on our architecture should implement. For doing so, we extract key concepts from three existing large scale networks, namely the air traffic control network, the cellular network, and the Internet and explore their connections to our novel architecture for drone traffic management.

124 citations

Journal ArticleDOI
TL;DR: These results can be used to simplify the main results by Gavinsky, Roetteler, and Roland about the hidden shift problem for the Boolean-valued functions and bent functions, and also to generalize their results to non-Boolean domains.
Abstract: We introduce a simple tool that can be used to reduce non-injective instances of the hidden shift problem over arbitrary group to injective instances over the same group. In particular, we show that the average-case non-injective hidden shift problem admit this reduction. We show similar results for (non-injective) hidden shift problem for bent functions. We generalize the notion of influence and show how it relates to applicability of this tool for doing reductions. In particular, these results can be used to simplify the main results by Gavinsky, Roetteler, and Roland about the hidden shift problem for the Boolean-valued functions and bent functions, and also to generalize their results to non-Boolean domains (thereby answering an open question that they pose).

5 citations

Dissertation
19 Jan 2012
TL;DR: This work shows that the average case non-injectiveHidden shift problem can be reduced to the injective hidden shift problem by giving one such reduction, and shows thatThe worst-case classical query complexity of the generalized injectivehidden shift problem over the same group is high, which implies that the classical query complex of the hidden shift problems is high.
Abstract: In this work, we mostly concentrate on the hidden shift problem for non-injective functions. It is worthwhile to know that the query complexity of the non-injective hidden shift problem is exponential in the worst case by the well known bounds on the unstructured search problem. Hence, we can make this problem more tractable by imposing additional constraints on the problem. Perhaps the first constraint that comes to mind is to address the average case problem. In this work, we show that the average case non-injective hidden shift problem can be reduced to the injective hidden shift problem by giving one such reduction. The reduction is based on a tool we developed called injectivization. The result is strong in the sense that the underlying group can be any finite group and that the non-injective functions for which we have defined the hidden shift problem can have range in an arbitrary finite set. Using this tool, we simplify the main result of a recent paper by Gavinsky, Roetteler, and Roland [2011] about the hidden shift problem for Boolean-valued functions by reducing that problem to Simon’s problem. They also posed an open question which is subject to personal interpretation. We answer the seemingly most general interpretation of the question. However, we use our own techniques in doing so (the authors ask if their techniques can be used for addressing that problem). Another constraint that one can consider is to have a promise on the structure of the functions. In this work we consider the hidden shift problem for c-almost generalized bent functions. A class of functions which we defined that includes the generalized bent functions. Then we turn our attention toward the generalized hidden shift problem which is easier than injective hidden shift problem and hence more tractable. We state some of our observations about this problem. Finally we show that the average classical query complexity of the non-injective hidden shift problem over groups of form Zm when m is a constant is exponential, which also immediately implies that the classical average query complexity of the non-injective hidden shift problem is exponential. We also show that the worst-case classical query complexity of the generalized injective hidden shift problem over the same group is high, which implies that the classical query complexity of the hidden shift problem is high.

3 citations

Journal ArticleDOI
12 Oct 2021
TL;DR: A microscopic traffic flow model called Scalar Capacity Model (SCM) is introduced which can be used to study the formation of traffic on an airway link for autonomous Unmanned Aerial Vehicles (UAVs) as well as for the ground vehicles on the road.
Abstract: In this work, we introduce a microscopic traffic flow model called Scalar Capacity Model (SCM) which can be used to study the formation of traffic on an airway link for autonomous Unmanned Aerial Vehicles (UAVs) as well as for the ground vehicles on the road. Given the 3D trajectory of UAV flights (as opposed to the 2D trajectory of ground vehicles), the main novelty in our model is to eliminate the commonly used notion of lanes and replace it with a notion of density and capacity of flow, but in such a way that individual vehicle motions can still be modeled. We name this a Density/Capacity View (DCV) of the link capacity and how vehicles utilize it versus the traditional One/Multi-Lane View (OMV). An interesting feature of this model is exhibiting both passing and blocking regimes (analogous to multi-lane or single-lane) depending on the set scalar parameter for capacity. We show the model has linear local (platoon) and asymptotic linear stability. Additionally, we perform numerical simulations and show evidence for non-linear stability. Our traffic flow model is represented by a nonlinear differential equation which we transform into a linear form. This makes our model analytically solvable in the blocking regime and piece-wise analytically solvable in the passing regime. Finally, a key advantage of using our model over an OMV model for representing UAV’s flights is the removal of the artificial restriction on passing via only adjacent lanes. This will result in an improved and more realistic traffic flow for UAVs.

2 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A comprehensive survey on UAV communication toward 5G/B5G wireless networks is presented and an exhaustive review of various 5G techniques based on Uav platforms is provided, which are categorize by different domains, including physical layer, network layer, and joint communication, computing, and caching.
Abstract: Providing ubiquitous connectivity to diverse device types is the key challenge for 5G and beyond 5G (B5G). Unmanned aerial vehicles (UAVs) are expected to be an important component of the upcoming wireless networks that can potentially facilitate wireless broadcast and support high rate transmissions. Compared to the communications with fixed infrastructure, UAV has salient attributes, such as flexible deployment, strong line-of-sight connection links, and additional design degrees of freedom with the controlled mobility. In this paper, a comprehensive survey on UAV communication toward 5G/B5G wireless networks is presented. We first briefly introduce essential background and the space–air–ground integrated networks, as well as discuss related research challenges faced by the emerging integrated network architecture. We then provide an exhaustive review of various 5G techniques based on UAV platforms, which we categorize by different domains, including physical layer, network layer, and joint communication, computing, and caching. In addition, a great number of open research problems are outlined and identified as possible future research directions.

624 citations

Journal ArticleDOI
TL;DR: Various path planning techniques for UAVs are classified into three broad categories, i.e., representative techniques, cooperative techniques, and non-cooperative techniques, with these techniques, coverage and connectivity of the UAV's network communication are discussed and analyzed.

359 citations

Journal ArticleDOI
TL;DR: The architecture and its security and privacy requirements are studied, and potential solutions to address challenging issues such as privacy leakage, data confidentiality protection, and flexible accessibility are outlined.
Abstract: A recent trend in both industry and research is the Internet of Drones, which has applications in both civilian and military settings. However, drones (also known as unmanned aerial vehicles) are generally not designed with security in mind, and there are fundamental security and privacy issues that need study. Hence, in this article, we study the architecture and its security and privacy requirements. We also outline potential solutions to address challenging issues such as privacy leakage, data confidentiality protection, and flexible accessibility, with the hope that this article will provide the basis for future research in this emerging area.

248 citations

Journal ArticleDOI
TL;DR: This survey attempts to show how collaborative drones and IoT improve the smartness of smart cities based on data collection, privacy and security, public safety, disaster management, energy consumption and quality of life in smart cities.
Abstract: Smart cities contain intelligent things which can intelligently automatically and collaboratively enhance life quality, save people's lives, and act a sustainable resource ecosystem. To achieve these advanced collaborative technologies such as drones, robotics, artificial intelligence, and Internet of Things (IoT) are required to increase the smartness of smart cities by improving the connectivity, energy efficiency, and quality of services (QoS). Therefore, collaborative drones and IoT play a vital role in supporting a lot of smart-city applications such as those involved in communication, transportation, agriculture,safety and security, disaster mitigation, environmental protection, service delivery, energy saving, e-waste reduction, weather monitoring, healthcare, etc. This paper presents a survey of the potential techniques and applications of collaborative drones and IoT which have recently been proposed in order to increase the smartness of smart cities. It provides a comprehensive overview highlighting the recent and ongoing research on collaborative drone and IoT in improving the real-time application of smart cities. This survey is different from previous ones in term of breadth, scope, and focus. In particular, we focus on the new concept of collaborative drones and IoT for improving smart-city applications. This survey attempts to show how collaborative drones and IoT improve the smartness of smart cities based on data collection, privacy and security, public safety, disaster management, energy consumption and quality of life in smart cities. It mainly focuses on the measurement of the smartness of smart cities, i.e., environmental aspects, life quality, public safety, and disaster management.

234 citations

Journal ArticleDOI
TL;DR: A taxonomy to classify the existing research issues is presented, and a brief overview of 5G mmWave communications for UAV-assisted wireless networks from two aspects, i.e., key technical advantages and challenges as well as potential applications.
Abstract: In recent years, unmanned aerial vehicles (UAVs) have received considerable attention from regulators, industry and research community, due to rapid growth in a broad range of applications. Particularly, UAVs are being used to provide a promising solution to reliable and cost-effective wireless communications from the sky. The deployment of UAVs has been regarded as an alternative complement of existing cellular systems, to achieve higher transmission efficiency with enhanced coverage and capacity. However, heavily utilized microwave spectrum bands below 6 GHz utilized by legacy wireless systems are insufficient to attain remarkable data rate enhancement for numerous emerging applications. To resolve the spectrum crunch crisis and satisfy the requirements of 5G and beyond mobile communications, one potential solution is to use the abundance of unoccupied bandwidth available at millimeter wave (mmWave) frequencies. Inspired by the technique potentials, mmWave communications have also paved the way into the widespread use of UAVs to assist wireless networks for future 5G and beyond wireless applications. In this paper, we provide a comprehensive survey on current achievements in the integration of 5G mmWave communications into UAV-assisted wireless networks. More precisely, a taxonomy to classify the existing research issues is presented, by considering seven cutting-edge solutions. Subsequently, we provide a brief overview of 5G mmWave communications for UAV-assisted wireless networks from two aspects, i.e., key technical advantages and challenges as well as potential applications. Based on the proposed taxonomy, we further discuss in detail the state-of-the-art issues, solutions, and open challenges for this newly emerging area. Lastly, we complete this survey by pointing out open issues and shedding new light on future directions for further research on this area.

220 citations