Placeholder image for staff profiles

Dr Hamidreza Bagheri


Biography

Research

Research interests

Research projects

My publications

Publications

Hamidreza Bagheri, Fernando Alberto Miranda Bonomi, and Marcos Katz (2017). A low‐complexity QoS aware resource allocation algorithm for multi pair device‐to‐device (D2D) communications
View abstract
Device‐to‐device (D2D) communication underlaying cellular networks is considered a promising technology to enhance network throughput, spectral efficiency, and performance of next generation networks. However, these potential gains hinge on the exploiting mechanism for resource sharing between cellular users (CUs) and D2D pairs. In this paper, we analytically formulate the problem of resource sharing as an optimization problem to maximize network throughput while guaranteeing the required quality‐of‐service (QoS) for both cellular and D2D users. We propose a low‐complexity four‐step resource allocation algorithm to address the optimization problem. We exploit a distance‐based method to derive a resource reuse candidacy graph (RCG) and three exclusive regions (ERs) to evaluate the suitability of resource sharing between each CU and D2D pair. Then, we use a paring mechanism to find the optimal set of D2D pairs for spectrum sharing with each CU to maximize network throughput. The performance of the proposed algorithm is investigated in terms of network throughput, outage probability, and computational complexity. Numerical results show that the proposed algorithm provides high throughput and spectrum utilization with low complexity while efficiently guaranteeing QoS for CUs and D2D pairs.
Peyman Pahlevani, Martin Hundebøll, Morten V. Pedersen, Daniel Lucani, Hassan Charaf, Hamidreza Bagheri, and Marcos Katz (2014). Novel concepts for device-to-device communication using network coding
View abstract
Device-to-device communication is currently a hot research topic within 3GPP. Even though D2D communication has been part of previous ad hoc, meshed and sensor networks proposals, the main contribution by 3GPP is that the direct communication among two devices is carried out over a dynamically assigned, licensed spectrum; thus, it is under full control of the cellular network. D2D communication creates a market potential for new services, new approaches to efficient spectrum use, and security concepts. This is especially true if D2D communication is extended to larger communication groups organized in meshed clusters. In this article, we discuss the potential and shortcomings of D2D communication as proposed today, advocating for the use of network coding as an enabling technology for enhanced security and communication efficiency using the PlayNCool and CORE protocols as key examples to deliver smarter D2D systems.
Hamidreza Bagheri, Fernando A. Miranda Bonomi, and Marcos Katz (2015). Spectral Efficiency and Throughput Enhancement by Full-Duplex D2D Communication in Mobile Clouds
View abstract
In this paper we consider downlink resource sharing for full-duplex (FD) device-to-device (D2D) communications underlying cellular network. We aim to maximize the system throughput and increase the spectral efficiency in wireless communications by integrating the concepts of D2D and FD communications. We formulate a throughput maximization problem and then based on its constraints we analytically derive the outage probability of the sharing cellular device and the probability of success of FD D2D communications. We investigate a position-dependent resource sharing mechanism to derive a spectral efficient zone (SEZ) for resource allocation which can lead to higher spectral efficiency while guaranteeing system throughput. Numerical results show that with a proper position-based resource allocation mechanism and self-interference (SI) cancellation techniques FD D2D communications can guarantee higher spectral efficiency and overall system throughput in comparison to conventional half-duplex (HD) D2D communications.
Hamidreza Bagheri and Marcos Katz (2014). A resource allocation mechanism for enhancing spectral efficiency and throughput of multi-link D2D communications
View abstract
In this paper, we consider downlink resource allocation of a cellular user to group of device-to-device (D2D) communication pair to enhance the overall system throughput and achieve higher spectral efficiency in mobile cloud. A mobile cloud can be defined as an opportunistic cooperative cluster of wireless devices in close proximity which are capable to communicate to other devices while preserving their connection to an overlay cellular access network (i.e., eNB), simultaneously. Thus this study considers D2D communications from a novel and wider perspective, assuming that multiple D2D communication links are simultaneously supported. We model, formulate and analyze the overall throughput of the mobile cloud as the function of distance between communication devices when the D2D pairs communicate in cellular, dedicated and reuse modes. In cellular and dedicated modes there is no severe intra-cell interference but for the reuse mode we propose an innovative and practical downlink resource allocation mechanism to coordinate the interferences and maximize the system sum-rate when several D2D pairs communicate by reusing the resources of a cellular user. In fact, the eNB as the centralized decision-maker selects a cellular user equipment (UE) and group of D2D pairs to communicate by reusing the downlink resources of the selected cellular UE while it guarantees the SINR at both the cellular and D2D receivers. Numerical results show that by exploiting the proposed mechanism we can achieve the aforementioned goals.
Seyed Mohammad Asghari Pari, Mohammad Noormohammadpour, Mohammad Javad Salehi, Babak Hossein Khalaj, Hamidreza Bagheri, and Marcos Katz (2013). A self-organizing approach to malicious detection in leader-based mobile ad-hoc networks
View abstract
Task-based self-organizing algorithms have been proposed as a solution for the management of mobile ad-hoc networks (MANETs). Such algorithms assign tasks to nodes by sequentially selecting the best nodes as leaders. Since the correct functionality of such algorithms depends on the truthfulness of participant nodes, any misbehavior can disrupt the operation of the network due to absence of a centralized monitoring unit. In this paper, we consider the problem of malicious behavior in leader-based MANETs. Current solution analyzes the behavior of the leader by means of some checker nodes. This approach is vulnerable since a malicious checker can ruin the character of a normal behaving leader, and declare it as a malicious one. We propose an efficient self-organizing mechanism which can detect a malicious behaving leader, while protecting a normal behaving leader from being declared as a malicious node. In addition, our mechanism is designed with no constraints on leader selection algorithm, which makes it applicable to any kind of leader-based network. We also provide several simulation results, showing that our proposed mechanism is efficient and effective even for large MANETs.
Afrooz Darooei Zadeh, Hamidreza Bagheri, and Marcos Katz (2014). Using mobile clouds in medical ICT scenarios: A preliminary study
View abstract
In this paper medical ICT scenarios are considered where a user/patient communicates to a base station with the help of one or more mobile devices in its close proximity. The system model assumes all the wireless devices cooperate in a mobile cloud. First of all, we identify medical ICT scenarios and select the most promising ones where the concept of mobile cloud can be readily exploited. Two cooperative strategies are modeled and compared, namely a) the best out of m nodes in the cloud is used as a relay, and b) all nodes participate in relaying. Performance is studied in terms of outage probability, as reliability is essential in medical applications. The approach based on best-node outperforms the all-node approach. This method is also energy-efficient as it engages only one relying device at a time. This is important from a practical standpoint. This initial study finds that using mobile clouds in medical scenarios is an attractive solution.
Hamidreza Bagheri, Mohammad Javad Salehi, Babak Hossein Khalaj, and Marcos Katz (2013). An energy-efficient leader selection algorithm for cooperative mobile clouds
View abstract
In this paper, we propose and study a context-aware leader selection algorithm within the concept of mobile clouds. We deploy a dedicated Cooperative Control Server (CCS) to assist and manage the process of leader selection more efficiently. The proposed algorithm collects data regarding instantaneous conditions of Mobile Terminals (MTs) and their radio environment; and then computes and assigns a rank to each MT. The ranks calculated based on a combination of different context-related parameters and corresponding weighting factors, allow selecting the leader. Furthermore, the energy efficiency and stability of the selected leaders is investigated for different parameter values through simulations. The results indicate that the proposed algorithm can achieve great energy saving in cooperative scenarios through proper leader selection.
Bidushi Barua, Prasanth Karunakaran, Hamidreza Bagheri, and Marcos Katz (2013). Energy and delay efficient cooperative media content download
View abstract
The advent of smartphones has brought about a new change in the traffic pattern of mobile users, for instance, there is a growing demand for high quality media content. In this paper, we consider a group of users within proximity of each other, who are interested in downloading the same content. Instead of the conventional cellular method of downloading the same content independently from the base station (BS), the group of users can exploit cooperative downlink strategies in a framework that involves both cellular and short-range communications. A few of such two-stage cooperative downlink strategies are studied in this paper. The results show that a significant energy saving of approximately 60% and a maximum possible delay reduction of 57% on an average, can be achieved by the proposed cooperative strategies.
Hamidreza Bagheri, Mohammad Javad Salehi, Bidushi Barua, Babak Hossein Khalaj, and Marcos Katz (2013). Energy and delay efficient strategies for content distribution using mobile-to-mobile cooperation
View abstract
In this paper we consider the content distribution to a set of mobile users interested in the same content. We use the concept of mobile clouds, which exploits cooperation between mobile terminals over the low-power short-range links. We propose, formulate and investigate the energy efficiency and delay of four realistic cooperative content delivery strategies. The derived results, through analysis of mathematical models and simulations, demonstrate around 65% to 95% energy saving gain in mobile cloud strategies compared to conventional multicasting. We also show that using mobile clouds, content distribution delay can be reduced for up to 85%.
Seyed Mohammad Asghari Pari, Mohammad Javad Salehi, Mohammad Noormohammadpour, Babak Hossein Khalaj, Hamidreza Bagheri, and Marcos Katz (2013). An incentive-based leader selection mechanism for mobile ad-hoc networks (MANETs)
View abstract
In this paper, we study the problem of leader selection in the presence of selfish nodes in mobile ad-hoc networks (MANETs). In order to encourage selfish nodes to assume the leadership role, some form of incentive mechanism is required. We present an incentive-based leader selection mechanism in which incentives are incorporated in the form of credit transfer to the leader, which motivates nodes to compete with each other for assuming the leadership role. The competition among nodes is modeled as a series of one-on-one incomplete information, alternating offers bargaining games. Furthermore, we propose an efficient algorithm in order to reduce the communication overhead imposed on the network for selecting a new leader, in case the current leader is disconnected from the network due to reasons such as mobility and battery depletion. Simulation results show that the proposed mechanism not only increases the overall lifetime of a network, but also decreases the amount of imposed communication overhead on the network in comparison with the traditional leader selection algorithms.
Mohammad Noormohammadpour, Mohammad Javad Salehi, Seyed Mohammad Asghari Pari, Babak Hossein Khalaj, Hamidreza Bagheri, and Marcos Katz (2013). ABMQ: An Agent-Based Modeler and Simulator for Self-Organization in MANETs using QT
View abstract
Agent-Based Modeling and Simulation (ABMS) is a simple and yet powerful method for simulation of interactions among individual agents. Using ABMS, different phenomena can be modeled and simulated without spending additional time on unnecessary complexities. Although ABMS is well-matured in many different fields such as economic, social, and natural phenomena, it has not received much attention in the context of mobile ad-hoc networks (MANETs). In this paper, we present ABMQ, a powerful Agent-Based platform suitable for modeling and simulation of self-organization in wireless networks, and particularly MANETs. By utilizing the unique potentials of Qt Application Framework, ABMQ provides the ability to easily model and simulate self-organizing algorithms, and then reuse the codes and models developed during simulation process for building real third-party applications for several desktop and mobile platforms, which substantially decreases the development time and cost, and prevents probable bugs that can happen as a result of rewriting codes.
Helal Chowdhury, Hamidreza Bagheri, Ikram Ashraf, Syed Tamoor-ul-Hassan, and Marcos Katz (2013). Techno-economic analysis of visible light communications
View abstract
This paper investigates the main actors, emerging markets and applications of visible light communication (VLC). VLC is a relatively new optical wireless communication technology where light emitting diodes (LEDs) are used to transmit data. Investigating the emerging trends such as technical, political, social, economic, environmental, and regulatory, scenario planning tool is used to develop multiple plausible scenarios using the key identified uncertainties. Scenario planning tool is used for long range business planning and decision making under conditions of substantial uncertainty. In this paper, we apply Schoemaker's scenario planning method to identify and analyze the key uncertainties and to construct four different and plausible future scenarios for VLC. From the value point of view, the developed four scenarios have shown different implications to the actors (operator, device manufacturer, content provider ) of VLC technology and their business models.
Hamidreza Bagheri, Helal Chowdhury, Timo Braeysy, Petri Ahokangas, and Marcos Katz (2013). Business Model for Mobile Clouds-Based Rich Content Distribution
View abstract
In this paper we develop a business model for the novel approach of broadband rich content distribution exploiting the concept of mobile clouds. We aim at identifying an attractive business model to guarantee a win-win situation for all the actors in two deployed scenarios, namely a) the mobile devices belong to the same network operator, and b) multiple mobile network operators serve the devices of the mobile cloud. We classify the actors in two general categories of business and consumers then highlighting the key actors, their roles and relations. The business model is derived by investigating the potential values that key actors can earn through cooperation in three domains namely business-to-business, business-to-consumer, and consumer-to-consumer.
Mohammad J Salehi, Mehraveh Salehi, Hamidreza Bagheri, Babak H Khalaj, Marcos Katz, and Pavel Loskot (2015). Exploiting Relative Consensus Techniques in Future Advanced Communication Networks in the Presence of Failures
View abstract
In this paper, a relative consensus algorithm is proposed to enable distributed systems to confront malicious behavior of the network nodes. In service networks, nodes get services from each other, and after each service provision, the receiving node calculates an indicative value of the quality of the received service. However, every node can behave maliciously, in either the service provision or the value calculation step. Both Byzantine and Logical malicious behavior types are considered. The aim is to identify the malicious nodes, and then to punish them by other nodes. This is achieved by exploiting Exponential Information Gathering (EIG) data structures. A new algorithm is formulated based on the EIG in order to reach a relative consensus agreement about the faultiness of one specific node before punishing it. The proposed algorithm is theoretically evaluated and discussed to confirm its correctness and validity. Moreover, it is shown that the proposed algorithm puts no constraints on the network structure, and since it has low implementation complexity, it is efficiently applicable to all network types including wireless networks.
Hamidreza Bagheri, Marcos Katz, Frank H.P. Fitzek, Daniel E. Lucani, and Morten V. Pedersen (2014). D2D-based Mobile Clouds for Energy- and Spectral-Efficient Content Distribution