scispace - formally typeset
Search or ask a question
Author

Seyed Mohammad Sajad Sadough

Bio: Seyed Mohammad Sajad Sadough is an academic researcher from Shahid Beheshti University. The author has contributed to research in topics: Cognitive radio & Communication channel. The author has an hindex of 19, co-authored 130 publications receiving 1128 citations. Previous affiliations of Seyed Mohammad Sajad Sadough include École Normale Supérieure & Centre national de la recherche scientifique.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper addresses the accurate channel modeling to assess the benefits of MR UAV-based deployment for such links over both Gamma–Gamma and log-normal atmospheric turbulence models and discusses the impact of different transmitter/receiver parameters and their optimization in view of maximizing the link availability.
Abstract: Recently, the use of multi-rotor (MR) unmanned aerial vehicles (UAVs) has emerged as a promising solution for establishing flexible free-space optical communication links. We address, in this paper, the accurate channel modeling to assess the benefits of MR UAV-based deployment for such links. In particular, in the absence of active tracking subsystems, we derive statistical models for ground-to-UAV, UAV-to-UAV, and UAV-to-ground links over both Gamma–Gamma and log-normal atmospheric turbulence models. Unlike previous works on this topic, our proposed model considers the joint effect of atmospheric turbulence along with position and angle-of-arrival fluctuations. The high accuracy of the proposed analytical models is verified by comparing numerically solved and Monte Carlo simulation results in terms of link outage probability. We further discuss the impact of different transmitter/receiver parameters and their optimization in view of maximizing the link availability.

149 citations

Journal ArticleDOI
TL;DR: The security issue is investigated from a physical layer perspective in the context of free-space optical communications and the performance of secure FSO link with intensity modulation/direct detection over Málaga with atmospheric turbulence channels that accounts for pointing errors is addressed.
Abstract: The security issue is investigated from a physical layer perspective in the context of free-space optical (FSO) communications. More precisely, the performance of secure FSO link with intensity modulation/direct detection over Malaga ( ${\mathcal {M}}$ ) atmospheric turbulence channels that accounts for pointing errors is addressed in this letter. The closed-form expressions for the average secrecy capacity, the secrecy outage probability and the strictly positive secrecy capacity are derived by considering the specific nature of FSO channels modeled by the general ${\mathcal {M}}$ distribution. Monte-Carlo simulations are provided to verify the accuracy of our derivations.

91 citations

Journal ArticleDOI
TL;DR: A novel channel model for the considered system model under the effect of log-normal atmospheric turbulence channel is constructed and closed-form expressions for the outage probability and bit error rate are derived for better performance analysis.
Abstract: More recently, the research on potential use of free-space optical (FSO) link as a powerful communication link between unmanned aerial vehicles (UAVs) has created much interest in academia and industry. Due to the need of higher number of UAV-based FSO links relative to the conventional ground-based FSO links, the optimum design of UAV-based FSO system parameters (such as optimum values for beam divergence angle, photodetector size, receiver lens radius, and transmit power, among many others) is much more needful and challenging relative to the ground-based counterpart. Moreover, to avoid the time consumed in Monte-Carlo simulations, existence of a simple and tractable channel model is very important and necessary. To address this need, in this paper, for the weak turbulence conditions, we construct a novel channel model for the considered system model under the effect of log-normal atmospheric turbulence channel. Then, for moderate to strong turbulence conditions, a novel closed-form statistical channel model is derived for Gamma-Gamma turbulence channel. The provided channel models, despite being simple and tractable, include the combined effects of atmospheric turbulence as well as the pointing errors. These also include the effects of receiver field-of-view limitation and inherent position, and orientation deviations of UAVs. Subsequently, for better performance analysis, the closed-form expressions for the outage probability and bit error rate (BER) are derived. Finally, the validity of the proposed novel channel models as well as the closed-form expressions for the outage probability and BER are confirmed by employing Monte-Carlo simulations. The developed results can therefore be applied as a benchmark for finding the optimal tunable parameters of UAV-based FSO links under different channel conditions and different levels of UAV instability without resorting to time-consuming Monte-Carlo simulations.

61 citations

Journal ArticleDOI
TL;DR: By characterizing source-to-relay and relay- to-destination channel models of the considered unmanned aerial vehicle (UAV)-assisted free-space optical (FSO) relay link, the optimal 3D coordinates of UAV relay as well as optimal optical beam pattern are derived.
Abstract: In this letter, by characterizing source-to-relay and relay-to-destination channel models of the considered unmanned aerial vehicle (UAV)-assisted free-space optical (FSO) relay link, we derive the optimal 3D coordinates of UAV relay as well as optimal optical beam pattern in order to minimize the outage probability. Moreover, we study the impact of physical parameters (such as strength of orientation fluctuations of UAV, height and position of obstacles) on the optimal location of UAV relay.

60 citations

Journal ArticleDOI
TL;DR: This paper investigates the channel estimation issue when using an APD at the receiver and proposes an ML channel estimator based on the expectation–maximization (EM) algorithm which has a low implementation complexity, making it suitable for high data-rate FSO communications.

56 citations


Cited by
More filters
Journal ArticleDOI
01 Jul 2021
TL;DR: This work rigorously discusses the fundamental changes required in the core networks of the future, such as the redesign or significant reduction of the transport architecture that serves as a major source of latency for time-sensitive applications.
Abstract: Mobile communications have been undergoing a generational change every ten years or so. However, the time difference between the so-called “G’s” is also decreasing. While fifth-generation (5G) systems are becoming a commercial reality, there is already significant interest in systems beyond 5G, which we refer to as the sixth generation (6G) of wireless systems. In contrast to the already published papers on the topic, we take a top-down approach to 6G. More precisely, we present a holistic discussion of 6G systems beginning with lifestyle and societal changes driving the need for next-generation networks. This is followed by a discussion into the technical requirements needed to enable 6G applications, based on which we dissect key challenges and possibilities for practically realizable system solutions across all layers of the Open Systems Interconnection stack (i.e., from applications to the physical layer). Since many of the 6G applications will need access to an order-of-magnitude more spectrum, utilization of frequencies between 100 GHz and 1 THz becomes of paramount importance. As such, the 6G ecosystem will feature a diverse range of frequency bands, ranging from below 6 GHz up to 1 THz. We comprehensively characterize the limitations that must be overcome to realize working systems in these bands and provide a unique perspective on the physical and higher layer challenges relating to the design of next-generation core networks, new modulation and coding methods, novel multiple-access techniques, antenna arrays, wave propagation, radio frequency transceiver design, and real-time signal processing. We rigorously discuss the fundamental changes required in the core networks of the future, such as the redesign or significant reduction of the transport architecture that serves as a major source of latency for time-sensitive applications. This is in sharp contrast to the present hierarchical network architectures that are not suitable to realize many of the anticipated 6G services. While evaluating the strengths and weaknesses of key candidate 6G technologies, we differentiate what may be practically achievable over the next decade, relative to what is possible in theory. Keeping this in mind, we present concrete research challenges for each of the discussed system aspects, providing inspiration for what follows.

529 citations

Journal ArticleDOI
TL;DR: A conceptual, generic, and expandable framework for classifying the existing PLS techniques against wireless passive eavesdropping is proposed, and the security techniques that are reviewed are divided into two primary approaches: signal-to-interference-plus-noise ratio- based approach and complexity-based approach.
Abstract: Physical layer security (PLS) has emerged as a new concept and powerful alternative that can complement and may even replace encryption-based approaches, which entail many hurdles and practical problems for future wireless systems. The basic idea of PLS is to exploit the characteristics of the wireless channel and its impairments including noise, fading, interference, dispersion, diversity, etc. in order to ensure the ability of the intended user to successfully perform data decoding while preventing eavesdroppers from doing so. Thus, the main design goal of PLS is to increase the performance difference between the link of the legitimate receiver and that of the eavesdropper by using well-designed transmission schemes. In this survey, we propose a conceptual, generic, and expandable framework for classifying the existing PLS techniques against wireless passive eavesdropping. In this flexible framework, the security techniques that we comprehensively review in this treatise are divided into two primary approaches: signal-to-interference-plus-noise ratio-based approach and complexity-based approach. The first approach is classified into three major categories: first, secrecy channel codes-based schemes; second, security techniques based on channel adaptation; third, schemes based on injecting interfering artificial (noise/jamming) signals along with the transmitted information signals. The second approach (complexity-based), which is associated with the mechanisms of extracting secret sequences from the shared channel, is classified into two main categories based on which layer the secret sequence obtained by channel quantization is applied on. The techniques belonging to each one of these categories are divided and classified into three main signal domains: time, frequency and space. For each one of these domains, several examples are given and illustrated along with the review of the state-of-the-art security advances in each domain. Moreover, the advantages and disadvantages of each approach alongside the lessons learned from existing research works are stated and discussed. The recent applications of PLS techniques to different emerging communication systems such as visible light communication, body area network, power line communication, Internet of Things, smart grid, mm-Wave, cognitive radio, vehicular ad-hoc network, unmanned aerial vehicle, ultra-wideband, device-to-device, radio-frequency identification, index modulation, and 5G non-orthogonal multiple access based-systems, are also reviewed and discussed. The paper is concluded with recommendations and future research directions for designing robust, efficient and strong security methods for current and future wireless systems.

457 citations

Book ChapterDOI
01 Jan 2001
TL;DR: In this article, a deterministic differential equation can be associated with a recursive algorithm, and problems like convergence with probality one, possible convergence points and asymptotic behavior of the algorithm can all be studied in terms of this differential equation.
Abstract: Recursive algorithms where random observations enter are studied in a fairly general framework. An important feature is that the observations may depend on previous ?outputs? of the algorithm. The considered class of algorithms contains, e.g., stochastic approximation algorithms, recursive identification algorithms, and algorithms for adaptive control of linear systems. It is shown how a deterministic differential equation can be associated with the algorithm. Problems like convergence with probality one, possible convergence points and asymptotic behavior of the algorithm can all be studied in terms of this differential equation. Theorems stating the precise relationships between the differential equation and the algorithm are given as well as examples of applications of the results to problems in identification and adaptive control.

423 citations

Journal Article
TL;DR: Catherine Durnell Cramton et al. as mentioned in this paper explored the mutual knowledge prob- conditions, the impact of organizational change on subsequent lem and Its Consequences for Dispersed Collaboration.
Abstract: Catherine Durnell Cramton (\"The Mutual Knowledge Prob- conditions, the impact of organizational change on subsequent lem and Its Consequences for Dispersed Collaboration\") is Asso- performance and survival, and the consequences of organizational ciate Professor in the School of Management at George Mason structures and dynamics for employees\' careers and the compo- University. She recieved her Ph.D. in organizational behavior from sition of organizations\' work forces. She serves on the editorial Yale University. Her research explores the contemporary chal- boards of Organization Science, Administrative Science Quar- lenges of collaboration and leadership, including distributed work, terly, and the American Sociological Review. Address: Columbia interorganizational collaboration, project team leadership, and the University, Graduate School of Business, 706 Uris Hall, New impact of technology on collaboration. Address: School of Man- York, NY 10027-6902; telephone: (212) 854-4424; e-mail: agement, Mail Stop 5F5, George Mason University, Fairfax, VA hah15@columbia.edu . 22030-4444; telephone: (703) 993-1814; fax: (202) 318-4319; John C. Henderson (\"Understanding `Strategic Learning\': e-mail: ccramton@som.gmu.edu . Linking Organizational Learning, Knowledge Management, and Sue R. Faerman (\"Understanding Interorganizational Cooper- Sensemaking\") is the Richard C. Shipley Professor of Manage- ation: Private-Public Collaboration in Regulating Financial Market ment, Chairperson of the Information Systems Department, and Innovation\") is Professor of Public Administration and Organiza- Director of the Institute for Leading in a Dynamic Economy at tional Studies and Dean of Undergraduate Studies at the University Boston University\'s School of Management. He is a noted at Albany, State University of New York. Her research focuses on researcher, consultant, and executive educator with papers appear- the paradoxical nature of leadership and organizational perfor- ing in many refereed journals. His coauthored book, Knowledge mance. She received her Ph.D. in public administration from the Engine, examines leveraging a firm\'s knowledge assets. His University at Albany, State University of New York. Address: research interests include: managing strategic partnerships, impact Office of Undergraduate Studies-LC30, University at Albany, of the mobile Internet on markets and organizations, and knowl- State University of New York, 1400 Washington Avenue, Albany, edge management. Address: Boston University School of Man- NY 12222; telephone: (518) 442-3950; fax: (518) 442-4959; e-mail: agement, 595 Commonwealth Avenue, Room 546H, Boston, MA sfaerman@uamail.albany.edu . 02215; telephone: (617) 353-6142; fax: (617) 353-1695; e-mail: James F. Fairbank (\"Emulation in Academia: Balancing Struc- jchender@bu.edu . ture and Identity\") received his Ph.D. in management and organi- Giuseppe (Joe) Labianca (\"Emulation in Academia: Balancing zation, The Pennsylvania State University and is an assistant pro- Structure and Identity\") received his Ph.D. in management and or- fessor of management in the College of Business and Economics ganization, The Pennsylvania State University, and is an assistant at West Virginia University in Morgantown, WV. His current re- professor of organization and management at Emory University\'s search interests are strategic decision making and the management Goizueta Business School in Atlanta, GA. His primary interests are of information technology. Address: College of Business and Eco- in network and cognition research at the intra- and interorganiza- nomics, P.O. Box 6025, Morgantown, WV 26506-6025; telephone: tional levels. Recent projects have investigated the antecedents and (304) 293-7937; fax: (304) 293-5652; e-mail: ifairban@wvu.edu . consequences of disliking others in one\'s social networks at work, Dennis A. Gioia (\"Emulation in Academia: Balancing Structure as well as investigating the process of emulation between organ- and Identity\") is Professor of Organizational Behavior, Department zations. He conducts both quantitative and qualitative research, and of Management and Organization, Smeal College of Business Ad- has published in the Academy of Management Journal and Orga- ministration at The Pennsylvania State University. His current nization Science. He is currently serving on the editorial review research and writing interests focus primarily on the cognitive board of the Academy of Management Journal. Address: Goizueta processes of organization members, especially the ways in which Business School, 1300 Clifton Road, Emory University, Atlanta, identity, image, and reputation are involved in organizational GA 30322; telephone: (404) 727-7662; fax: (404) 727-6663; e-mail: sensemaking, sensegiving, and change. His work has appeared joe_labianca@bus.emory.edu . in many of the top journals in the field and he has coedited two David P. McCaffrey (\"Understanding Interorganizational Co- volumes of original contributions: The Thinking Organization operation: Private-Public Collaboration in Regulating Financial and Creative Action in Organizations. Address: Smeal College of Market Innovation\") is Professor of Public Administration, Public Business, Penn State University, 403 Beam BAB, University Park, Policy, and Organizational Studies at the University at Albany, PA 16802; telephone: (814) 865-6370; fax: (814) 863-7261; e-mail: State University of New York. His research focuses on the orga- dag4@psu.edu . nizational dynamics of regulatory systems. He received his Ph.D. Heather A. Haveman (\"Organizational Environments in Flux: in sociology from the State University of New York at Stony The Impact of Regulatory Punctuations on Organizational Do- Brook. Address: Department of Public Administration and Policy, mains, CEO Succession, and Performance\") is Professor of Man- University at Albany, State University of New York, 135 Western agement at the Graduate School of Business, Columbia University. Avenue, Albany, NY 12222; e-mail: d.mccaffrey@albany.edu . She received her Ph.D. in organizational behavior and industrial Alan D. Meyer (\"Organizational Environments in Flux: The relations from the Haas School of Business Administration at the Impact of Regulatory Punctuations on Organizational Domains, University of California at Berkeley in 1990. Her research inves- CEO Succession, and Performance\") is the Charles H. Lundquist tigates organizations\' responses to shifting internal and external Professor of Entrepreneurial Management at the University of

250 citations