
Aresh DadlaniUniversity of Alberta; Nazarbayev University
Aresh Dadlani
Ph.D.
About
69
Publications
18,873
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
548
Citations
Citations since 2017
Introduction
Additional affiliations
September 2017 - present
September 2015 - July 2017
January 2008 - February 2010
Institute for Research in Fundamental Sciences
Position
- Research Assistant
Education
March 2011 - August 2015
Publications
Publications (69)
Caching has been recognized as a viable solution to surmount the limited capability of backhaul links in handling abundant network traffic. Although optimal approaches for minimizing the average delivery load do exist, current caching strategies fail to avert intelligent adversaries from obtaining invaluable contextual information by inspecting the...
Prediction and control of spreading processes in social networks (SNs) are closely tied to the underlying connectivity patterns. Contrary to most existing efforts that exclusively focus on positive social user interactions, the impact of contagion processes on the temporal evolution of signed SNs (SSNs) with distinctive friendly (positive) and host...
Concurrent with the rise of real-time wireless systems enabled by the Internet of Things, age of information (AoI) has been widely perceived as a crucial destination-centric performance metric to quantify the timeliness of data delivery. This paper concerns itself with the analysis of information freshness in a multi-source M/G/1 queueing system wi...
The timeliness of status message delivery in communications networks is subjective to time-varying wireless channel transmissions. In this paper, we investigate the age of information (AoI) of each source in a multi-source M/G/1 queueing update system with active server failures. In particular, we adopt the method of supplementary variables to deri...
The timeliness of status message delivery in communications networks is subjective to time-varying wireless channel transmissions. In this paper, we investigate the age of information (AoI) of each source in a multi-source M/G/1 queueing update system with active server failures. In particular, we adopt the method of supplementary variables to deri...
The standard differential evolution (DE) algorithm is a prominent population-based evolutionary algorithm that has shown competitive performance in addressing highly complicated problems such as target node localization in wireless sensor networks. The DE performance, however, can be compromised when the localization problem includes additional par...
The emergence of the Internet as a ubiquitous technology has facilitated the rapid evolution of social media as the leading virtual platform for communication, content sharing, and information dissemination. In spite of revolutionizing the way news used to be delivered to people, this technology has also brought along with itself inevitable demerit...
Online social networks have attracted billions of active users over the past decade. These systems play an integral role in the everyday life of many people around the world. As such, these platforms are also attractive for misinformation, hoaxes, and fake news campaigns which usually utilize social trolls and/or social bots for propagation. Detect...
Content caching is perceived as a promising approach to offload traffic from shared medium networks by pre-fetching and placing contents in caches during off-peak hours, and taking advantage of multicasting in the delivery times. While most existing efforts on caching are directed towards reducing the traffic rate over the shared medium, little att...
In serverless architectures, the scheduler component in the controller acts as a load-balancing entity and distributes the arriving tasks based on the availability of free resources on the machines. We argue that offering a multi-step decision-making process makes it feasible to allocate tasks to machines prudently, thus reducing the average respon...
The mild symptoms in Mild Cognitive Impairment (MCI), a precursor of dementia, often go unnoticed and are assumed as normal aging signs. Such negligence result in late visits which consequently, lead to the diagnosis and progression of dementia. An instrumented gait assessment in home settings may facilitate the detection of subtle MCI-related moto...
Prediction and control of spreading processes in social networks (SNs) are closely tied to the underlying connectivity patterns. Contrary to most existing efforts that exclusively focus on positive social user interactions, the impact of contagion processes on the temporal evolution of signed SNs (SSNs) with distinctive friendly (positive) and host...
The emergence of the Internet as a ubiquitous technology has facilitated the rapid evolution of social media as the leading virtual platform for communication, content sharing, and information dissemination. In spite of revolutionizing the way news is delivered to people, this technology has also brought along with itself inevitable demerits. One s...
Today, information security in defender-attacker game models is getting more attention from the research community. A game-theoretic approach applied in resource allocation study requires security in information for successive defensive strategy against
attackers. For the defensive side players, allocating resources effectively and appropriately i...
In this paper, we aim to derive the average age of information (AAoI) associated with the static link scheduling policies in a buffer-aided two-way relay network, where two sources exchange their updates through an intermediate relay equipped with data buffers. With regard to buffer-aided relaying, we consider the two-mode relaying scheme, where ea...
Edge computing (EC) is a promising solution to enable the next-generation delay-critical network services which are not conceivable in the traditional cloud-based architecture. EC takes the computing and storage resources closer to the end-users at the edge of the networks to eliminate the propagation delays caused by geographical distances. Howeve...
Insights on the salient features of malicious software
spreading over large-scale wireless sensor networks (WSNs) in
low-power Internet of Things (IoT) are not only essential to
project, but also mitigate the persistent rise in cyber threats.
While the analytical findings on single malware spreading dynamics are well-established, the interplay amon...
Edge computing (EC) is a promising solution to enable the next-generation delay-critical network services which are not conceivable in the traditional cloud-based architecture. EC takes the computing and storage resources closer to the end-users at the edge of the networks to eliminate the propagation delays caused by geographical distances. Howeve...
Insights on the salient features of malicious software spreading over large-scale wireless sensor networks (WSNs) in low-power Internet of Things (IoT) are not only essential to project, but also mitigate the persistent rise in cyber threats. While the analytical findings on single malware spreading dynamics are well-established, the interplay amon...
The energy management schemes in multi-server data centers with setup time mostly consider thresholds on the number of idle servers or waiting jobs to switch servers on or off. An optimal energy management policy can be characterized as a Markov decision process (MDP) at large, given that the system parameters evolve Markovian. The resulting optima...
Efficient use of call center operators through technological innovations more often come at the expense of added operation management issues. In this paper, the stationary characteristics of an M/G/1 retrial queue is investigated where the single server, subject to active failures, primarily attends incoming calls and directs outgoing calls only wh...
In the original publication, the funding information has been published incorrectly. The correct funding information should read.
Mathematica implementation of classical epidemic models: SI, SIS, SIR, SEIR, SEIRS
Segregating the latency phase from the actual disruptive phase of certain mobile malware grades offers more opportunities to effectively mitigate the viral spread in its early stages. Inspired by epidemiology, in this paper, a stochastic propagation model that accounts for infection latency of disruptive malware in both personal and spatial social...
Variations in electricity tariffs arising due to stochastic demand loads on the power grids have stimulated research in finding optimal charging=discharging scheduling solutions for electric vehicles (EVs). Most of the current EV scheduling solutions are either centralized, which suffer from low reliability and high complexity, while existing decen...
The abrupt outbreak and transmission of biological diseases has always been a long-time concern of humankind. For long, mathematical modeling has served as a simple and yet efficient tool to investigate, predict, and control spread of communicable diseases through individuals. A myriad of works on epidemic models and their variants have been report...
Podcast listeners have tripled over the past 5 years to over 100 million subscribers inside the US alone. Yet, no research study has focused on obtaining insights into the growth and popularity of contents among the subscribers. In this paper, we investigate the main factors that contribute to the popularity of podcasts. Our study helps content pro...
Spreading dynamics of many real-world processes lean heavily on the topological characteristics of the underlying contact network. With the rapid temporal and spatial evolution of complex inter-connected networks, microscopic modeling and stochastic simulation of individual-based interactions have become challenging in both, time and state space. D...
Spreading dynamics of many real-world processes lean heavily on the topological characteristics of the underlying contact network. With the rapid temporal and spatial evolution of complex interconnected networks, microscopic modeling and stochastic simulation of individual-based interactions have become challenging in both, time and state space. Dr...
Content caching is a technique aimed to reduce the network load imposed by data transmission during peak time while ensuring users' quality of experience. Studies have shown that content delivery via coded caching can significantly improve beyond the performance limits of conventional caching schemes when caches and the server share a common link....
In this paper, we use the concept of Markovian jump linear systems in order to analyze the age of information (AoI) in discrete-time Markovian systems. This approach is in fact, the discrete-time counterpart of the stochastic hybrid system (SHS) model reported for analyzing AoI in continuous-time Markovian systems and thus, is referred to as the di...
Offers methods to perform asymptotically bias-corrected regularized linear discriminant analysis (ABC_RLDA) for cost-sensitive binary classification. The bias-correction is an estimate of the bias term added to regularized discriminant analysis (RLDA) that minimizes the overall risk. The default magnitude of misclassification costs are equal and se...
In this letter, the efficient dissemination of content in a socially-aware cache-enabled hybrid network using multi-armed bandit learning theory is analyzed. Specifically, an overlay cellular network over a vehicular social network is considered, where commuters request for multimedia content from either the stationary roadside units (RSUs), the ba...
Directional current relays are one of the most common relays that are used in the protection of transmission and distribution lines. They provide reliable protection for the transmission lines. However, increasing proliferation of distributed energy sources may violate established relay coordination. This is caused by changes in fault current level...
Reliability of power distribution systems is of very crucial concern due to cases of mass power outages that occur worldwide. Once an unscheduled outage takes place in power
grids, the service restoration is triggered to rapidly return the system to normal conditions and minimize the severity of consequences. This paper proposes a self-healing powe...
Content caching has emerged as a promising technique to reduce the backhaul multimedia traffic rising due to the proliferation of mobile devices. To address the bottleneck issue arising as a result of sparse wireless resources, the current literature is mainly focused on designing centralized or decentralized coded caching schemes. In this paper, w...
In this letter, the theory of random matrices of increasing dimension is used to construct a form of Regularized Linear Discriminant Analysis (RLDA) that asymptotically yields the lowest overall risk with respect to the bias of the discriminant in cost-sensitive classification of two multivariate Gaussian distributions. Numerical experiments using...
Network operators are more than ever overwhelmed by increased capital investments and operational costs incurred due to the explosive mobile data traffic growth. An efficient strategy in managing operational expenditure within limits without sacrificing end-user satisfaction is to offload the traffic of content dissemination from the network backbo...
Efficient use of call center operators through technological innovations more often come at the expense of added operation management issues. In this paper, the stationary characteristics of an M/G/1 retrial queue is investigated where the single server, subject to active failures, primarily attends incoming calls and directs outgoing calls only whe...
Distribution of limited smart grid resources among electric vehicles (EVs) with diverse service demands in an unfavorable manner can potentially degrade the overall profit achievable by the operating charging station (CS). In fact, inefficient resource management can lead to customer dissatisfaction arising due to prolonged queueing and blockage of...
This letter characterizes the intertwined behavior of a Susceptible-Infected-Susceptible (SIS) epidemic model involving multiple mutually-exclusive memes, each competing over distinct contact planes of an undirected multi-layer social network, with the possibility of inter-switching. Based on mean-field theory, we contrast and derive closed-form an...
Knowledge on the dynamics of standard epidemic models and their variants over complex networks has been well-established primarily in the stationary regime, with relatively little light shed on their transient behavior. In this paper, we analyze the transient characteristics of the classical susceptible-infected (SI) process with a recovery policy...
Opportunistic spectrum access (OSA) is a promising reform paradigm envisioned to address the issue of spectrum scarcity in cognitive radio networks (CRNs). While current models consider various aspects of the OSA scheme, the impact of retrial phenomenon in multi-channel CRNs has not yet been analyzed. In this work, we present a continuous-time Mark...
Fluctuations in electricity tariffs induced by the sporadic nature of demand loads on power grids has initiated immense efforts to find optimal scheduling solutions for charging and discharging plug-in electric vehicles (PEVs) subject to different objective sets. In this paper, we consider vehicle-to-grid (V2G) scheduling at a geographically large...
In this paper, we investigate the impact of uniform immunization as a control measure to mitigate the
spread of a malware model over communication networks with complex topologies. Particularly, we formulate the system dynamics using mean-field approximation and obtain the minimum fraction of
nodes that need to be immunized to prevent an epidemic...
The spreading dynamics and control of infectious agents depend primarily on the connectivity properties of underlying networks. In here, we investigate the stability of the susceptible- infected-susceptible (SIS) epidemic model incorporated with multiple infection stages and propagation vectors to mimic malware behavior over scale-free communicatio...
The ability to predict future epidemic threats, both in real as well as digital worlds, and to develop effective containment strategies heavily leans on the availability of re-liable infection spreading models. The stochastic behavior of such processes make them even more demanding to scrutinize over structured networks. This paper concerns the dyn...
The abrupt outbreak and transmission of biological diseases has always been a long-time concern of humankind. For long, mathematical modeling has served as a simple and yet efficient tool to investigate, predict, and control spread of communicable diseases through individuals. A myriad of works on epidemic models and their variants have been report...
Multicasting is emerging as an enabling technology for multimedia transmissions over wireless networks to support several groups of users with flexible quality of service (QoS) requirements. Although multicast has huge potential to push the limits of next generation communication systems; it is however one of the most challenging issues currently b...
With the successful deployment of IEEE 802.11a/b/g wireless local area networks (WLANs) and the pent-up market demand for high speed wireless access, the IEEE 802.11n protocol has emerged as a promising standard with major enhancements. In order to scale to the high physical layer transmission rate of up to 600 Mbps, the current medium access contr...
Optical Burst Switching (OBS) has been widely admitted as a viable candidate for the evolving all-optical network control framework of nowadays Internet core to meet the explosive demand of bandwidth constraints in multimedia and real-time applications. A number of analytical models have been proposed to characterize the behavior of OBS networks. T...
Generic generalized minimum variance-based (GMV) controllers have been adopted as efficient control mechanisms especially in presence of measurement noise. However, such controllers exhibit degraded performance with change in process dynamics. To overcome this problem, a novel congestion controller based on active queue management (AQM) strategy fo...
Time complexity of matching algorithms play an in-fluential role in the performance of network firewalls. Traditional algorithms use linear search to find the appropriate rules for every incoming packet. Up till now, no complete and efficient structure for firewall rule decision trees has been reported. Occurrence of inevitable anomalies and dynami...
An important challenge confronted in distributed systems is the adoption of suitable and efficient algorithms for coordinator election. The main role of an elected coordinator is to manage the use of a shared resource in an optimal manner. Among all the algorithms reported in the literature, the Bully and Ring algorithms have gained more popularity...
Optical Burst Switching (OBS) has been widely admitted as a viable candidate for the evolving all-optical network control framework of nowadays Internet core to meet the explosive demand of bandwidth constraints in mul-timedia and real-time applications. A number of analytical models have been proposed to characterize the behavior of OBS networks....
Wireless networks are poised to support a myriad of existing as well as emerging multimedia streaming applications. With increase in use of wireless local area networks (WLANs), ranging from simple data transfer to bandwidth-intense, delay-sensitive, and loss-tolerant multimedia applications, issues regarding quality of service (QoS) have become a...
The evolution of optical technology has resulted in the emergence of several promising paradigms so as to realize the next generation Internet backbone infrastructure. Among all the existing switching techniques, optical burst switching (OBS) has shown to support the bursty nature of diverse IP traffic classes more efficiently. Nevertheless, with i...
With increase in time-critical applications over the Internet, the need for differentiating services has become a major endeavor in research communities. One promising paradigm proposed to support such traffic diversity in the next-generation Internet is optical burst switching (OBS). In the literature, two simple but efficient approaches namely, t...
With the emergence of wireless ad hoc networks as a viable means to provide ubiquitous untethered communication, cooperation between individual users still remains a major research endeavor. Myriad of algorithms have been proposed for efficient cooperation in exploiting common resources available to the users in the network. However, most of these...
Recent studies in modern telecommunication networks have convincingly revealed that IP traffic exhibits a perceptible self-similar behavior over a wide range of time scales. Adapting the traditional Poisson model can therefore lead to erroneous conclusions regarding network performance dynamics. On the other hand, with growing demand for greater ba...