scispace - formally typeset
Search or ask a question
Author

Xavier Fernando

Bio: Xavier Fernando is an academic researcher from Ryerson University. The author has contributed to research in topics: Cognitive radio & Wireless. The author has an hindex of 22, co-authored 185 publications receiving 1912 citations. Previous affiliations of Xavier Fernando include University of Calgary & Siberian Federal University.


Papers
More filters
Journal ArticleDOI
TL;DR: A comprehensive survey of ML enabled localization techniques using most common wireless technologies for accurate indoor positioning and how the ML algorithms can be effectively used for fusing different technologies and algorithms to achieve a comprehensive IPS is provided.
Abstract: Widespread proliferation of wireless coverage has enabled culmination of number of advanced location-based services (LBS). Continuous tracking of accurate physical location is the foundation of these services, which is a challenging task especially indoors. Multitude of techniques and algorithms have been proposed for indoor positioning systems (IPS’s). However, accuracy, reliability, scalability and, adaptability to the environment still remain as challenges for widespread deployment. Especially, unpredictable radio propagation characteristics in vastly varying indoor environments plus access technology limitations contribute to these challenges. Machine learning (ML) approaches have been widely attempted recently to overcome these challenges with reasonable success. In this paper, we aim to provide a comprehensive survey of ML enabled localization techniques using most common wireless technologies. First, we provide a brief background on indoor localization techniques. Afterwards, we discuss various ML techniques (supervised and unsupervised) that could alleviate different challenges in indoor localization including Non-line-of-sight (NLOS) issue, device heterogeneity and environmental variations with reasonable complexity. The trade-offs among multitude of issues are discussed using numerous published results. We also discuss how the ML algorithms can be effectively used for fusing different technologies and algorithms to achieve a comprehensive IPS. In essence, this survey will serve as a reference material to acquire a detailed knowledge on recent development of machine learning for accurate indoor positioning.

119 citations

Journal ArticleDOI
TL;DR: Measurements and simulation results show that gradually saturating amplitude nonlinearity can be adequately linearized with some backoff from the clipping limit.
Abstract: The biggest concern in the use of radio-over-fiber (ROF) links in wireless access is their limited dynamic range due to nonlinear distortion (NLD). In this paper, a higher order adaptive filter based nonlinearity compensation scheme is proposed. Pre-compensation is done for the downlink while post-compensation is done for the uplink to result in asymmetry with respect to complexity. This centralized signal processing is attractive in that it keeps the remote unit simple. Accurate measurements of ROF link parameters are not required with this approach because the filters are adapted from the distortion of the input/output base band signal. This technique also facilitates fast tracking of modifications and drifts in the link characteristics. Measurements and simulation results show that gradually saturating amplitude nonlinearity can be adequately linearized with some backoff from the clipping limit. A 42% backoff is required for pre-compensation to protect the laser while only a 16.7% backoff is required for post-compensation. Phase pre-compensation is accomplished with a higher accuracy than phase post-compensation.

86 citations

Patent
29 Apr 2002
TL;DR: In this paper, a Hammerstein type decision feedback equalizer is described for the fiber wireless uplink, that compensates for nonlinear distortion of the radio-over-fiber (ROF) link as well as linear dispersion of the wireless channel.
Abstract: A Fiber-wireless uplink consists of a wireless channel followed by a radio-over-fiber (ROF) link. Typically, nonlinear distortion of the ROF link is the major concern when the radio frequency is only a few GHz. This especially severe in the uplink, because of the multipath fading of the wireless channel. A Hammerstein type decision feedback equalizer is described for the fiber wireless uplink, that compensates for nonlinear distortion of the ROF link as well as linear dispersion of the wireless channel. Since the linear and nonlinear parts of the receiver are separated, tracking the fast changing wireless channel is virtually independent of compensating for the relatively static nonlinearity. Analytical results show that the receiver provides excellent compensation with notably less complexity.

75 citations

Journal ArticleDOI
TL;DR: The transmission rate of the D2D users is optimized while simultaneously satisfying five sets of constraints related to power, interference, and data rate, modeling D1D users as cognitive secondary users.
Abstract: Device-to-device (D2D) communication is developed as a new paradigm to enhance network performance according to LTE and WiMAX advanced standards. The D2D communication may have dedicated spectrum (overlay) or shared spectrum (underlay). However, the allocated dedicated spectrum may not be effectively used in the overlay mode, while interference between the D2D users and cellular users cause impairments in the underlay mode. Can the resource allocation of a D2D system be optimized using the cognitive approach where the D2D users opportunistically access the underutilized radio spectrum? That is the focus of this paper. In this paper, the transmission rate of the D2D users is optimized while simultaneously satisfying five sets of constraints related to power, interference, and data rate, modeling D2D users as cognitive secondary users. Furthermore, a two-stage approach is considered to allocate the radio resources efficiently. A new adaptive subcarrier allocation scheme is designed first, and then, a novel power allocation scheme is developed utilizing geometric water-filling approach that provides optimal solution with low computation complexity for this nonlinear problem. Numerical results show that the proposed approach achieved significant performance enhancement than the existing schemes.

75 citations

Journal ArticleDOI
TL;DR: The two main contenders in the 4G marketplace are likely to be evolutions of WiMAX and LTE, and the use of OFDMA in these standards is compared.
Abstract: Orthogonal frequency-division multiple access has been adopted by both the WiMAX and Long Term Evolution standards, which are the two main contenders in the 4G wireless scenario. In this article, we do a detailed comparison of the implementation of OFDMA in LTE and WiMAX. The multiuser diversity advantage of OFDMA is well used in LTE, whereas the frequency diversity advantage is nicely exploited in WiMAX. The physical layer overhead in LTE is significantly better than in WiMAX. The network entry process of an LTE mobile is simpler than in a WiMAX mobile. In addition, LTE systems are expected to react faster to changes in the traffic and channel conditions due to the smaller frame times. However, the OFDMA design in WiMAX will cater for more extreme channel conditions, which is perhaps more than what is expected in practice as our investigation reveals.

74 citations


Cited by
More filters
01 Jan 2016
TL;DR: The table of integrals series and products is universally compatible with any devices to read and is available in the book collection an online access to it is set as public so you can get it instantly.
Abstract: Thank you very much for downloading table of integrals series and products. Maybe you have knowledge that, people have look hundreds times for their chosen books like this table of integrals series and products, but end up in harmful downloads. Rather than reading a good book with a cup of coffee in the afternoon, instead they cope with some harmful virus inside their laptop. table of integrals series and products is available in our book collection an online access to it is set as public so you can get it instantly. Our book servers saves in multiple locations, allowing you to get the most less latency time to download any of our books like this one. Merely said, the table of integrals series and products is universally compatible with any devices to read.

4,085 citations

Journal ArticleDOI
TL;DR: A comprehensive survey of numerous IPSs, which include both commercial products and research-oriented solutions are given, and the trade-offs among these systems are outlined from the viewpoint of a user in a PN.
Abstract: Recently, indoor positioning systems (IPSs) have been designed to provide location information of persons and devices. The position information enables location-based protocols for user applications. Personal networks (PNs) are designed to meet the users' needs and interconnect users' devices equipped with different communications technologies in various places to form one network. Location-aware services need to be developed in PNs to offer flexible and adaptive personal services and improve the quality of lives. This paper gives a comprehensive survey of numerous IPSs, which include both commercial products and research-oriented solutions. Evaluation criteria are proposed for assessing these systems, namely security and privacy, cost, performance, robustness, complexity, user preferences, commercial availability, and limitations.We compare the existing IPSs and outline the trade-offs among these systems from the viewpoint of a user in a PN.

1,538 citations

Journal Article
TL;DR: In this paper, techniques developed in the last few years in microwave photonics are reviewed with an emphasis on the systems architectures for photonic generation and processing of microwave signals, photonic true-time delay beamforming, radio-over-fiber systems, and photonic analog-to-digital conversion.
Abstract: Broadband and low loss capability of photonics has led to an ever-increasing interest in its use for the generation, processing, control and distribution of microwave and millimeter-wave signals for applications such as broadband wireless access networks, sensor networks, radar, satellite communitarians, instrumentation and warfare systems. In this tutorial, techniques developed in the last few years in microwave photonics are reviewed with an emphasis on the systems architectures for photonic generation and processing of microwave signals, photonic true-time delay beamforming, radio-over-fiber systems, and photonic analog-to-digital conversion. Challenges in system implementation for practical applications and new areas of research in microwave photonics are also discussed.

1,332 citations

Journal ArticleDOI
10 May 2016
TL;DR: The security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues, and the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer are discussed.
Abstract: Due to the broadcast nature of radio propagation, the wireless air interface is open and accessible to both authorized and illegitimate users. This completely differs from a wired network, where communicating devices are physically connected through cables and a node without direct association is unable to access the network for illicit activities. The open communications environment makes wireless transmissions more vulnerable than wired communications to malicious attacks, including both the passive eavesdropping for data interception and the active jamming for disrupting legitimate transmissions. Therefore, this paper is motivated to examine the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. Several physical-layer security techniques are reviewed and compared, including information-theoretic security, artificial-noise-aided security, security-oriented beamforming, diversity-assisted security, and physical-layer key generation approaches. Since a jammer emitting radio signals can readily interfere with the legitimate wireless users, we also introduce the family of various jamming attacks and their countermeasures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer, and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.

948 citations

Journal ArticleDOI
TL;DR: In this article, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer.
Abstract: This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.

632 citations