scispace - formally typeset
Search or ask a question
Author

Navid Tadayon

Bio: Navid Tadayon is an academic researcher from Institut national de la recherche scientifique. The author has contributed to research in topics: Wireless network & Cognitive radio. The author has an hindex of 12, co-authored 31 publications receiving 388 citations. Previous affiliations of Navid Tadayon include Université du Québec & K.N.Toosi University of Technology.

Papers
More filters
Journal ArticleDOI
TL;DR: A solar energy-harvesting model is incorporated into SMAC and its performance analysis is conducted from a theoretical aspect and a new model based on queuing theory is developed to calculate the average number of energy packets in battery in terms of both duty cycle and throughput.

61 citations

Journal ArticleDOI
TL;DR: This paper aims at the problem of time-of-flight estimation using channel state information obtainable from commercialized multiple-input-multiple-output orthogonal frequency-division multiplexing wireless local area network (WLAN) receivers by first understanding CSI, its constituent building blocks, and the sources of error that contaminate it and introducing pre-processing methods to clean CSI from those errors and make it usable for range estimation.
Abstract: This paper aims at the problem of time-of-flight (ToF) estimation using channel state information (CSI) obtainable from commercialized multiple-input-multiple-output orthogonal frequency-division multiplexing (MIMO-OFDM) wireless local area network (WLAN) receivers. It was often claimed that the CSI phase is contaminated with errors of known and unknown natures rendering the ToF-based positioning difficulty. To search for an answer, we take a bottom-up approach by first understanding CSI, its constituent building blocks, and the sources of error that contaminate it. We then model these effects mathematically. The correctness of these models is corroborated based on the CSI collected in extensive measurement campaign, including radiated, conducted, and chamber tests. Knowing the nature of contaminations in the CSI phase and amplitude, we proceed with introducing pre-processing methods to clean CSI from those errors and make it usable for range estimation. To check the validity of the proposed algorithms, the MUSIC super-resolution algorithm is applied to post-processed CSI to perform range estimates. The results substantiate that a median accuracy of 0.7, 0.8, and 0.9 m is achievable in a highly multipath line-of-sight environment where the transmitter and the receiver are 5, 10, and 15 m apart.

57 citations

Journal ArticleDOI
TL;DR: The aim of this brief is to propose a differential chaos shift keying (DCSK) modulation scheme as a potential candidate for smart grid communication networks and prove the advantages of this low-cost noncoherent modulation technique for PLC systems over its rivals.
Abstract: The past few years have witnessed a tremendous development in power-line communications (PLCs) for the realization of smart grids. Since power lines were not originally intended for conveying high-frequency signals, any communication over these lines would be exposed to severe adversarial factors, such as interference, impulsive, and phase noise. This elucidates the importance of employing robust modulation techniques and motivates research in this direction. Indeed, the aim of this brief is to propose a differential chaos shift keying (DCSK) modulation scheme as a potential candidate for smart grid communication networks. This DCSK class of noncoherent modulation is very robust against linear and nonlinear channel distortions. More importantly, the demodulation process can be carried out without any channel estimator at the receiver side. In this work, we analyze the bit error rate performance of DCSK over multipath PLC channels in which phase, background, and impulsive noise are present. A simulator is developed to verify the performance of the proposed DCSK against direct sequence code division multiple access and direct sequence differential phase shift keying. The results presented in this work prove the advantages of this low-cost noncoherent modulation technique for PLC systems over its rivals.

46 citations

Journal ArticleDOI
TL;DR: This work model the dynamics of each cognitive user, termed customer premises equipments (CPE) according to the standard terminology, with a 2-D Markov chain, and shows that a WRAN cell can be modeled as a Jackson network.
Abstract: The recent emergence of the cognitive radio standard IEEE 802.22 is finally empowering network operators with a new platform for their abundant services. Likewise previous wireless standards, where the modeling helped in a better understanding of the concepts and played an important role in extending the outreach of the technology and subsequent innovations, the modeling of IEEE 802.22 wireless regional area networks (WRANs) is a necessity. In this work, we accomplish this task using the theory of queues. To that end, we model the dynamics of each cognitive user, termed customer premises equipments (CPE) according to the standard terminology, with a 2-D Markov chain. Given this model, we show that a WRAN cell can be modeled as a Jackson network. We also find the probability mass function (PMF) and cumulative distribution function (CDF) of the CPE queue length, from which any higher moment can be derived. Notable is the fact that said PMF is expressed in an exact closed-form. In addition to the nodal analysis, a WRAN cell-level discussion is conducted by finding the stability condition and peer-to-peer delay. Moreover, we provide preliminary results on the resource allocation in WRANs, which is a very important area of focus and discovery for an efficient deployment and operation of future WRANs.

30 citations

Journal ArticleDOI
TL;DR: The technical possibilities of enhancing the existing LTE infrastructure for air to ground communications, and the major challenges and obstacles, such as uplink/downlink interferences, frequent roaming, large Doppler effect, and channel degradation are identified.
Abstract: After three decades from the public debut of cellular networks, there are hardly parts of populated lands where cellular coverage is absent. Day after day, mobile users have been provided with wider range of services at higher speed. Today, long terminal evolution (LTE) networks support broadband connectivity for users moving as fast as 350km/h, and the support for speeds up to 500km/h is under consideration. Unfortunately, none of these efforts were aimed at airborne travelers due to the lack of aerial coverage. Provided that 5G networks are meant to provide anywhere and anytime connectivity for anyone, many operators are providing the free onboard Wi-Fi through proprietary terrestrial networks or satellite links. Unfortunately, both of these solutions have serious drawbacks, where the latter provides very limited speed, and the former is expensive and unscalable. In this paper, we discuss the technical possibilities of enhancing the existing LTE infrastructure for air to ground communications. We identify the major challenges and obstacles in this path, such as uplink/downlink interferences, frequent roaming, large Doppler effect, and channel degradation. We also discuss appropriate solutions to counteract them using some of the emerging antenna, signal processing, beamforming, and multi-beaming ideas.

26 citations


Cited by
More filters
Book
01 Jan 2001
TL;DR: This chapter discusses Decision-Theoretic Foundations, Game Theory, Rationality, and Intelligence, and the Decision-Analytic Approach to Games, which aims to clarify the role of rationality in decision-making.
Abstract: Preface 1. Decision-Theoretic Foundations 1.1 Game Theory, Rationality, and Intelligence 1.2 Basic Concepts of Decision Theory 1.3 Axioms 1.4 The Expected-Utility Maximization Theorem 1.5 Equivalent Representations 1.6 Bayesian Conditional-Probability Systems 1.7 Limitations of the Bayesian Model 1.8 Domination 1.9 Proofs of the Domination Theorems Exercises 2. Basic Models 2.1 Games in Extensive Form 2.2 Strategic Form and the Normal Representation 2.3 Equivalence of Strategic-Form Games 2.4 Reduced Normal Representations 2.5 Elimination of Dominated Strategies 2.6 Multiagent Representations 2.7 Common Knowledge 2.8 Bayesian Games 2.9 Modeling Games with Incomplete Information Exercises 3. Equilibria of Strategic-Form Games 3.1 Domination and Ratonalizability 3.2 Nash Equilibrium 3.3 Computing Nash Equilibria 3.4 Significance of Nash Equilibria 3.5 The Focal-Point Effect 3.6 The Decision-Analytic Approach to Games 3.7 Evolution. Resistance. and Risk Dominance 3.8 Two-Person Zero-Sum Games 3.9 Bayesian Equilibria 3.10 Purification of Randomized Strategies in Equilibria 3.11 Auctions 3.12 Proof of Existence of Equilibrium 3.13 Infinite Strategy Sets Exercises 4. Sequential Equilibria of Extensive-Form Games 4.1 Mixed Strategies and Behavioral Strategies 4.2 Equilibria in Behavioral Strategies 4.3 Sequential Rationality at Information States with Positive Probability 4.4 Consistent Beliefs and Sequential Rationality at All Information States 4.5 Computing Sequential Equilibria 4.6 Subgame-Perfect Equilibria 4.7 Games with Perfect Information 4.8 Adding Chance Events with Small Probability 4.9 Forward Induction 4.10 Voting and Binary Agendas 4.11 Technical Proofs Exercises 5. Refinements of Equilibrium in Strategic Form 5.1 Introduction 5.2 Perfect Equilibria 5.3 Existence of Perfect and Sequential Equilibria 5.4 Proper Equilibria 5.5 Persistent Equilibria 5.6 Stable Sets 01 Equilibria 5.7 Generic Properties 5.8 Conclusions Exercises 6. Games with Communication 6.1 Contracts and Correlated Strategies 6.2 Correlated Equilibria 6.3 Bayesian Games with Communication 6.4 Bayesian Collective-Choice Problems and Bayesian Bargaining Problems 6.5 Trading Problems with Linear Utility 6.6 General Participation Constraints for Bayesian Games with Contracts 6.7 Sender-Receiver Games 6.8 Acceptable and Predominant Correlated Equilibria 6.9 Communication in Extensive-Form and Multistage Games Exercises Bibliographic Note 7. Repeated Games 7.1 The Repeated Prisoners Dilemma 7.2 A General Model of Repeated Garnet 7.3 Stationary Equilibria of Repeated Games with Complete State Information and Discounting 7.4 Repeated Games with Standard Information: Examples 7.5 General Feasibility Theorems for Standard Repeated Games 7.6 Finitely Repeated Games and the Role of Initial Doubt 7.7 Imperfect Observability of Moves 7.8 Repeated Wines in Large Decentralized Groups 7.9 Repeated Games with Incomplete Information 7.10 Continuous Time 7.11 Evolutionary Simulation of Repeated Games Exercises 8. Bargaining and Cooperation in Two-Person Games 8.1 Noncooperative Foundations of Cooperative Game Theory 8.2 Two-Person Bargaining Problems and the Nash Bargaining Solution 8.3 Interpersonal Comparisons of Weighted Utility 8.4 Transferable Utility 8.5 Rational Threats 8.6 Other Bargaining Solutions 8.7 An Alternating-Offer Bargaining Game 8.8 An Alternating-Offer Game with Incomplete Information 8.9 A Discrete Alternating-Offer Game 8.10 Renegotiation Exercises 9. Coalitions in Cooperative Games 9.1 Introduction to Coalitional Analysis 9.2 Characteristic Functions with Transferable Utility 9.3 The Core 9.4 The Shapkey Value 9.5 Values with Cooperation Structures 9.6 Other Solution Concepts 9.7 Colational Games with Nontransferable Utility 9.8 Cores without Transferable Utility 9.9 Values without Transferable Utility Exercises Bibliographic Note 10. Cooperation under Uncertainty 10.1 Introduction 10.2 Concepts of Efficiency 10.3 An Example 10.4 Ex Post Inefficiency and Subsequent Oilers 10.5 Computing Incentive-Efficient Mechanisms 10.6 Inscrutability and Durability 10.7 Mechanism Selection by an Informed Principal 10.8 Neutral Bargaining Solutions 10.9 Dynamic Matching Processes with Incomplete Information Exercises Bibliography Index

3,569 citations

Journal ArticleDOI
TL;DR: A comprehensive taxonomy of the various energy harvesting sources that can be used by WSNs is presented and some of the challenges still need to be addressed to develop cost-effective, efficient, and reliable energy harvesting systems for the WSN environment are identified.
Abstract: Recently, Wireless Sensor Networks (WSNs) have attracted lot of attention due to their pervasive nature and their wide deployment in Internet of Things, Cyber Physical Systems, and other emerging areas. The limited energy associated with WSNs is a major bottleneck of WSN technologies. To overcome this major limitation, the design and development of efficient and high performance energy harvesting systems for WSN environments are being explored. We present a comprehensive taxonomy of the various energy harvesting sources that can be used by WSNs. We also discuss various recently proposed energy prediction models that have the potential to maximize the energy harvested in WSNs. Finally, we identify some of the challenges that still need to be addressed to develop cost-effective, efficient, and reliable energy harvesting systems for the WSN environment.

914 citations

Journal ArticleDOI
TL;DR: The flexible nature of GFDM makes this waveform a suitable candidate for future 5G networks, and its main characteristics are analyzed.
Abstract: Cellular systems of the fourth generation (4G) have been optimized to provide high data rates and reliable coverage to mobile users. Cellular systems of the next generation will face more diverse application requirements: the demand for higher data rates exceeds 4G capabilities; battery-driven communication sensors need ultra-low power consumption; and control applications require very short response times. We envision a unified physical layer waveform, referred to as generalized frequency division multiplexing (GFDM), to address these requirements. In this paper, we analyze the main characteristics of the proposed waveform and highlight relevant features. After introducing the principles of GFDM, this paper contributes to the following areas: 1) the means for engineering the waveform's spectral properties; 2) analytical analysis of symbol error performance over different channel models; 3) concepts for MIMO-GFDM to achieve diversity; 4) preamble-based synchronization that preserves the excellent spectral properties of the waveform; 5) bit error rate performance for channel coded GFDM transmission using iterative receivers; 6) relevant application scenarios and suitable GFDM parameterizations; and 7) GFDM proof-of-concept and implementation aspects of the prototype using hardware platforms available today. In summary, the flexible nature of GFDM makes this waveform a suitable candidate for future 5G networks.

809 citations

01 Jan 2014
TL;DR: This article surveys the new trend of channel response in localization and investigates a large body of recent works and classify them overall into three categories according to how to use CSI, highlighting the differences between CSI and RSSI.
Abstract: The spatial features of emitted wireless signals are the basis of location distinction and determination for wireless indoor localization. Available in mainstream wireless signal measurements, the Received Signal Strength Indicator (RSSI) has been adopted in vast indoor localization systems. However, it suffers from dramatic performance degradation in complex situations due to multipath fading and temporal dynamics. Break-through techniques resort to finer-grained wireless channel measurement than RSSI. Different from RSSI, the PHY layer power feature, channel response, is able to discriminate multipath characteristics, and thus holds the potential for the convergence of accurate and pervasive indoor localization. Channel State Information (CSI, reflecting channel response in 802.11 a/g/n) has attracted many research efforts and some pioneer works have demonstrated submeter or even centimeter-level accuracy. In this article, we survey this new trend of channel response in localization. The differences between CSI and RSSI are highlighted with respect to network layering, time resolution, frequency resolution, stability, and accessibility. Furthermore, we investigate a large body of recent works and classify them overall into three categories according to how to use CSI. For each category, we emphasize the basic principles and address future directions of research in this new and largely open area.

612 citations