Search Results for author: Paeiz Azmi

Found 7 papers, 0 papers with code

AI-based Robust Resource Allocation in End-to-End Network Slicing under Demand and CSI Uncertainties

no code implementations10 Feb 2022 Amir Gharehgoli, Ali Nouruzi, Nader Mokari, Paeiz Azmi, Mohamad Reza Javan, Eduard A. Jorswieck

Then, we compare the RDPG method in different scenarios with soft actor-critic (SAC), deep deterministic policy gradient (DDPG), distributed, and greedy algorithms.

reinforcement-learning Reinforcement Learning (RL)

A Machine Learning Based Algorithm for Joint Improvement of Power Control, link adaptation, and Capacity in Beyond 5G Communication systems

no code implementations8 Jan 2022 Jafar Norolahi, Paeiz Azmi

The estimation results of AMC and SINR are used to reassign the modulation type, codding rate, and transmit power through frames of eNode B connections.

AoI Minimization in Energy Harvesting and Spectrum Sharing Enabled 6G Networks

no code implementations1 Jul 2021 Amir Hossein Zarif, Paeiz Azmi, Nader Mokari, Mohammad Reza Javan, Eduard Jorswieck

The average user access improved from 30% in the overlay mode to 45% in the DQN and 48% in the D3QN.

Theoretical Accuracy Analysis of RSS-Based Range Estimation for Visible Light Communication

no code implementations28 Nov 2020 Changeez Amini, Paeiz Azmi, Seyed Sadra Kashef

In this paper, an improved channel model of visible light communication (VLC) for ranging in presented.

Signal Processing

Cross Layer Resource Allocation in H-CRAN with Spectrum and Energy Cooperation

no code implementations15 Sep 2020 Nazanin Moosavi, Mahnaz Sinaie, Paeiz Azmi, Pin-Hsun Lin, Eduard Jorswieck

The simulation results show that the proposed algorithm can provide a non-trivial trade-off between delay and energy efficiency in NOMA H-CRAN systems in terms of EC and EEE and the spectrum and power cooperation improves EEE of the proposed network.

Joint Information Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden

no code implementations10 Jul 2020 Moslem Forouzesh, Paeiz Azmi, Ali Kuhestani, Phee Lep Yeoh

We formulate an optimization problem with the aim of maximizing the average rate subject to a covert communication requirement and a secure communications constraint.

Cannot find the paper you are looking for? You can Submit a new open access paper.