Optimal mode selection for full-duplex enabled D2D cognitive networks

N Haider, A Ali, C Suarez-Rodriguez… - IEEE Access, 2019 - ieeexplore.ieee.org
Full-Duplex (FD) and Device-to-Device (D2D) communications have been recognized as
one of the successful solutions of spectrum scarcity in 5G networks. Significant …

[HTML][HTML] Adaptive MAC Scheme for Interference Management in Ad Hoc IoT Networks

E Ali, A Fazil, J Ryu, M Ashraf, M Zakwan - Applied Sciences, 2024 - mdpi.com
The field of wireless communication has undergone revolutionary changes driven by
technological advancements in recent years. Central to this evolution is wireless ad hoc …

A proactive Medium Access Control (MAC) for finite-sized machine-to-machine (M2M) communication networks

A Fazil, A Hasan, BR Alyaei, K Khan… - Computers and Electrical …, 2022 - Elsevier
In order to establish communication links among different communication devices or
machines, the Medium Access Control (MAC) has to schedule the simultaneous …

Interference-aware scheme to improve distributed caching in cellular networks via D2D underlay communications

A Eleff, M Mousa, H Nassar - Statistics, Optimization & Information …, 2024 - iapress.org
Abstract Underlay Device-to-Device (D2D) communications is a promising networking
technology intended to boost thespectral efficiency of future cellular networks, including 5G …

Performance analysis of full duplex D2D in opportunistic spectrum access

N Haider, A Ali, Y He… - 2018 18th International …, 2018 - ieeexplore.ieee.org
Opportunistic Spectrum Access (OSA) allows an efficient use of spectrum based on share-it
or use-it principle and can be a viable solution for the challenging problem of spectrum …

Optimal interference range for minimum Bayes risk in binomial and Poisson wireless networks

M Ouyang, W Shi, R Zhang, W Liu - EURASIP Journal on Wireless …, 2019 - Springer
Interference is the main performance-limiting factor in most wireless networks. Protocol
interference model is extensively used in the design of wireless networks. However, the …

Proactive channel access scheme for wireless ad hoc networks

A Fazil, A Hasan, IM Qureshi, Q Shafi - IET Communications, 2019 - Wiley Online Library
In wireless ad hoc networks, the channel access scheme allows different nodes to
communicate simultaneously without creating outages at nearby nodes. Therefore, the …

Success probability in random distance bipolar wireless networks

M Ouyang, W Shi, W Liu, Y Zhao - IEEE Communications …, 2020 - ieeexplore.ieee.org
In this letter, we provide a method for computing the success probability of random distance
bipolar wireless networks. In our proposed random distance bipolar wireless networks, the …

Nearest Neighbor in Ad-Hoc Networks is the Most Dominant Interferer-Myth or Reality?

SM Zainab, A Fazil, K Khan… - 2021 International …, 2021 - ieeexplore.ieee.org
This paper presents an alternate view to the widely accepted general rule of nearest
neighbor being the most dominant when it comes to scheduling a network or analyzing …

[PDF][PDF] Load-aware modelling in cellular networks with repulsively deployed base stations

A Ali - 2015 - figshare.mq.edu.au
Spatial models for the locations of base stations (BSs) in cellular networks have long been
desirable since they play a pivotal role in evaluating the mutual interference and, hence …