scispace - formally typeset
Search or ask a question
Author

Mohammad Shikh-Bahaei

Bio: Mohammad Shikh-Bahaei is an academic researcher from King's College London. The author has contributed to research in topics: Spectral efficiency & Wireless network. The author has an hindex of 26, co-authored 182 publications receiving 2506 citations. Previous affiliations of Mohammad Shikh-Bahaei include National Semiconductor & Northumbria University.


Papers
More filters
Journal ArticleDOI
TL;DR: An iterative algorithm is proposed where, at every step, closed-form solutions for time allocation, bandwidth allocation, power control, computation frequency, and learning accuracy are derived and can reduce up to 59.5% energy consumption compared to the conventional FL method.
Abstract: In this paper, the problem of energy efficient transmission and computation resource allocation for federated learning (FL) over wireless communication networks is investigated. In the considered model, each user exploits limited local computational resources to train a local FL model with its collected data and, then, sends the trained FL model to a base station (BS) which aggregates the local FL model and broadcasts it back to all of the users. Since FL involves an exchange of a learning model between users and the BS, both computation and communication latencies are determined by the learning accuracy level. Meanwhile, due to the limited energy budget of the wireless users, both local computation energy and transmission energy must be considered during the FL process. This joint learning and communication problem is formulated as an optimization problem whose goal is to minimize the total energy consumption of the system under a latency constraint. To solve this problem, an iterative algorithm is proposed where, at every step, closed-form solutions for time allocation, bandwidth allocation, power control, computation frequency, and learning accuracy are derived. Since the iterative algorithm requires an initial feasible solution, we construct the completion time minimization problem and a bisection-based algorithm is proposed to obtain the optimal solution, which is a feasible solution to the original energy minimization problem. Numerical results show that the proposed algorithms can reduce up to 59.5% energy consumption compared to the conventional FL method.

365 citations

Proceedings ArticleDOI
05 Dec 1999
TL;DR: A mathematical model for the process is presented and the relative asymptotic efficiency of the detector with respect to the conventional linear detector is computed and some numerical results are provided to show the achievable enhancement by the proposed nonlinear processing as applied to UMTS-based receivers.
Abstract: A statistical processing method is considered for interference suppression in W-CDMA systems. The major first-order statistic of interference, namely, the pdf function is estimated by use of higher-order statistics (HOS) of the received samples. This estimate, in turn, leads to deriving the best non-linear processor of the samples for enhanced detection performance of the desired user. A mathematical model for the process is presented and the relative asymptotic efficiency of the detector with respect to the conventional linear detector is computed. Some numerical results are also provided to show the achievable enhancement by the proposed nonlinear processing as applied to UMTS-based receivers.

320 citations

Journal ArticleDOI
TL;DR: A low-complexity algorithm with solving three subproblems iteratively of the sum power minimization problem via jointly optimizing user association, power control, computation capacity allocation, and location planning in a mobile edge computing (MEC) network with multiple unmanned aerial vehicles (UAVs).
Abstract: In this paper, we consider the sum power minimization problem via jointly optimizing user association, power control, computation capacity allocation, and location planning in a mobile edge computing (MEC) network with multiple unmanned aerial vehicles (UAVs). To solve the nonconvex problem, we propose a low-complexity algorithm with solving three subproblems iteratively. For the user association subproblem, the compressive sensing-based algorithm is accordingly proposed. For the computation capacity allocation subproblem, the optimal solution is obtained in closed form. For the location planning subproblem, the optimal solution is effectively obtained via one-dimensional search method. To obtain a feasible solution for this iterative algorithm, a fuzzy c-means clustering-based algorithm is proposed. The numerical results show that the proposed algorithm achieves better performance than the conventional approaches.

234 citations

Journal ArticleDOI
TL;DR: This paper investigates an unmanned aerial vehicle (UAV)-enabled wireless communication system with energy harvesting, where the UAV transfers energy to the users in half duplex or full duplex, and the users harvest energy for data transmission to the Uav.
Abstract: This paper investigates an unmanned aerial vehicle (UAV)-enabled wireless communication system with energy harvesting, where the UAV transfers energy to the users in half duplex or full duplex, and the users harvest energy for data transmission to the UAV. We minimize the total energy consumption of the UAV while accomplishing the minimal data transmission requests of the users. The original optimization problem is decomposed into two subproblems: path planning subproblem and energy minimization subproblem with fixed path planning. For path planning subproblem, the optimal visiting order is obtained by using the dual method and the trajectory is optimized via the successive convex approximation technique. For energy minimization subproblem with fixed path planning, we firstly obtain the optimal portion of data transmission time within the entire procedure and the optimal transmission power of each user. Then, the the energy minimization subproblem is greatly simplified and it is efficiently solved via a one-dimensional search method. Simulation results are illustrated to verify the theoretical findings.

146 citations

Posted Content
TL;DR: Simulation results show that the proposed scheme achieves up to 33\% and 68\% gains in terms of the energy efficiency in both single-user and multi-user cases compared to the conventional RIS scheme and amplify-and-forward relay scheme, respectively.
Abstract: This paper investigates the problem of resource allocation for a wireless communication network with distributed reconfigurable intelligent surfaces (RISs). In this network, multiple RISs are spatially distributed to serve wireless users and the energy efficiency of the network is maximized by dynamically controlling the on-off status of each RIS as well as optimizing the reflection coefficients matrix of the RISs. This problem is posed as a joint optimization problem of transmit beamforming and RIS control, whose goal is to maximize the energy efficiency under minimum rate constraints of the users. To solve this problem, two iterative algorithms are proposed for the single-user case and multi-user case. For the single-user case, the phase optimization problem is solved by using a successive convex approximation method, which admits a closed-form solution at each step. Moreover, the optimal RIS on-off status is obtained by using the dual method. For the multi-user case, a low-complexity greedy searching method is proposed to solve the RIS on-off optimization problem. Simulation results show that the proposed scheme achieves up to 33\% and 68\% gains in terms of the energy efficiency in both single-user and multi-user cases compared to the conventional RIS scheme and amplify-and-forward relay scheme, respectively.

125 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis.
Abstract: Machine Learning is the study of methods for programming computers to learn. Computers are applied to a wide range of tasks, and for most of these it is relatively easy for programmers to design and implement the necessary software. However, there are many tasks for which this is difficult or impossible. These can be divided into four general categories. First, there are problems for which there exist no human experts. For example, in modern automated manufacturing facilities, there is a need to predict machine failures before they occur by analyzing sensor readings. Because the machines are new, there are no human experts who can be interviewed by a programmer to provide the knowledge necessary to build a computer system. A machine learning system can study recorded data and subsequent machine failures and learn prediction rules. Second, there are problems where human experts exist, but where they are unable to explain their expertise. This is the case in many perceptual tasks, such as speech recognition, hand-writing recognition, and natural language understanding. Virtually all humans exhibit expert-level abilities on these tasks, but none of them can describe the detailed steps that they follow as they perform them. Fortunately, humans can provide machines with examples of the inputs and correct outputs for these tasks, so machine learning algorithms can learn to map the inputs to the outputs. Third, there are problems where phenomena are changing rapidly. In finance, for example, people would like to predict the future behavior of the stock market, of consumer purchases, or of exchange rates. These behaviors change frequently, so that even if a programmer could construct a good predictive computer program, it would need to be rewritten frequently. A learning program can relieve the programmer of this burden by constantly modifying and tuning a set of learned prediction rules. Fourth, there are applications that need to be customized for each computer user separately. Consider, for example, a program to filter unwanted electronic mail messages. Different users will need different filters. It is unreasonable to expect each user to program his or her own rules, and it is infeasible to provide every user with a software engineer to keep the rules up-to-date. A machine learning system can learn which mail messages the user rejects and maintain the filtering rules automatically. Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis. Statistics focuses on understanding the phenomena that have generated the data, often with the goal of testing different hypotheses about those phenomena. Data mining seeks to find patterns in the data that are understandable by people. Psychological studies of human learning aspire to understand the mechanisms underlying the various learning behaviors exhibited by people (concept learning, skill acquisition, strategy change, etc.).

13,246 citations

01 Jan 2016
TL;DR: The table of integrals series and products is universally compatible with any devices to read and is available in the book collection an online access to it is set as public so you can get it instantly.
Abstract: Thank you very much for downloading table of integrals series and products. Maybe you have knowledge that, people have look hundreds times for their chosen books like this table of integrals series and products, but end up in harmful downloads. Rather than reading a good book with a cup of coffee in the afternoon, instead they cope with some harmful virus inside their laptop. table of integrals series and products is available in our book collection an online access to it is set as public so you can get it instantly. Our book servers saves in multiple locations, allowing you to get the most less latency time to download any of our books like this one. Merely said, the table of integrals series and products is universally compatible with any devices to read.

4,085 citations

Proceedings Article
01 Jan 1991
TL;DR: It is concluded that properly augmented and power-controlled multiple-cell CDMA (code division multiple access) promises a quantum increase in current cellular capacity.
Abstract: It is shown that, particularly for terrestrial cellular telephony, the interference-suppression feature of CDMA (code division multiple access) can result in a many-fold increase in capacity over analog and even over competing digital techniques. A single-cell system, such as a hubbed satellite network, is addressed, and the basic expression for capacity is developed. The corresponding expressions for a multiple-cell system are derived. and the distribution on the number of users supportable per cell is determined. It is concluded that properly augmented and power-controlled multiple-cell CDMA promises a quantum increase in current cellular capacity. >

2,951 citations

Journal ArticleDOI
TL;DR: This paper offers a survey of the concept of Wireless Body Area Networks, focusing on some applications with special interest in patient monitoring and the communication in a WBAN and its positioning between the different technologies.
Abstract: The increasing use of wireless networks and the constant miniaturization of electrical devices has empowered the development of Wireless Body Area Networks (WBANs). In these networks various sensors are attached on clothing or on the body or even implanted under the skin. The wireless nature of the network and the wide variety of sensors offer numerous new, practical and innovative applications to improve health care and the Quality of Life. The sensors of a WBAN measure for example the heartbeat, the body temperature or record a prolonged electrocardiogram. Using a WBAN, the patient experiences a greater physical mobility and is no longer compelled to stay in the hospital. This paper offers a survey of the concept of Wireless Body Area Networks. First, we focus on some applications with special interest in patient monitoring. Then the communication in a WBAN and its positioning between the different technologies is discussed. An overview of the current research on the physical layer, existing MAC and network protocols is given. Further, cross layer and quality of service is discussed. As WBANs are placed on the human body and often transport private data, security is also considered. An overview of current and past projects is given. Finally, the open research issues and challenges are pointed out.

1,077 citations

Journal ArticleDOI
TL;DR: Modified versions of the Artificial Bee Colony algorithm are introduced and applied for efficiently solving real-parameter optimization problems.

1,056 citations