Hesham Elsawy

Hesham Elsawy
  • PhD
  • Professor (Assistant) at Queen's University

About

198
Publications
17,869
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,125
Citations
Current institution
Queen's University
Current position
  • Professor (Assistant)

Publications

Publications (198)
Preprint
Full-text available
Extreme Edge Computing (EEC) pushes computing even closer to end users than traditional Multi-access Edge Computing (MEC), harnessing the idle resources of Extreme Edge Devices (EEDs) to enable low-latency, distributed processing. However, EEC faces key challenges, including spatial randomness in device distribution, limited EED computational power...
Preprint
Full-text available
This paper characterizes integration and coordination gains in dense millimeter-wave ISAC networks through a dual-mode framework that combines monostatic and multistatic sensing. A comprehensive system-level analysis is conducted, accounting for base station (BS) density, power allocation, antenna misalignment, radar cross-section (RCS) fluctuation...
Preprint
Full-text available
Due to the involved massive number of devices, radio frequency (RF) energy harvesting is indispensable to realize the foreseen Internet-of-Everything (IoE) within 6G networks. Analogous to the cellular networks concept, shared energy stations (ESs) are foreseen to supply energy-as-a-service (EaaS) in order to recharge devices that belong to differe...
Preprint
Full-text available
Delivering an immersive experience to virtual reality (VR) users through wireless connectivity offers the freedom to engage from anywhere at any time. Nevertheless, it is challenging to ensure seamless wireless connectivity that delivers real-time and high-quality videos to the VR users. This paper proposes a field of view (FoV) aware caching for m...
Article
Delivering an immersive experience to virtual reality (VR) users through wireless connectivity offers the freedom to engage from anywhere at any time. Nevertheless, it is challenging to ensure seamless wireless connectivity that delivers real-time and high-quality videos to the VR users. This paper proposes a field of view (FoV) aware caching for m...
Article
The integration of Unmanned Aerial Vehicles (UAVs) within the Internet of Things (IoT) framework has emerged as a compelling solution to address the energy constraints that impede the full realization of IoT potential. As IoT applications continue to proliferate across industries, the dependence on battery-powered devices poses challenges in terms...
Preprint
Full-text available
This paper proposes an unmanned aerial vehicle (UAV)-enabled wake-up radio (WuR) and data collection strategy for an Internet of Things (IoT) network. The considered model involves employing UAVs to awaken IoT devices from an ultra-low power sleep mode through the transmission of WuR signals. Diverging from traditional methods where all IoT devices...
Preprint
Full-text available
The integration of Unmanned Aerial Vehicles (UAVs) within the Internet of Things (IoT) framework has emerged as a compelling solution to address the energy constraints that impede the full realization of IoT potential. As IoT applications continue to proliferate across industries, the dependence on battery-powered devices poses challenges in terms...
Article
Feedback transmissions are used to acknowledge correct packet reception, trigger erroneous packet re-transmissions, and adapt transmission parameters (e.g., rate and power). Despite the feedback paramount role in establishing reliable communication links, the majority of the literature overlooks its impact by assuming genie-aided systems with flawl...
Article
This paper explores the Age of Information (AoI) in IoT networks, aiming to minimize the average AoI for realtime applications. We employ a spatiotemporal model with a heterogeneous Poisson field (HPF) of interferers and an absorbing Markov chain (AMC) to quantify AoI dynamics. This model specifically examines the effects of packet segmentation (i....
Article
This paper investigates the performance of adaptive LoRa networks with dynamic SF allocation accounting for Duty Cycle (DC) restrictions and quantifying the imperfect orthogonality of Spreading Factor (SF)s. The study presents a novel spatiotemporal model that combines stochastic geometry and queuing theory where LoRa devices are perceived as inter...
Preprint
Full-text available
The development of the sixth generation (6G) of wireless networks is bound to streamline the transition of computation and learning towards the edge of the network. Hierarchical federated learning (HFL) becomes, therefore, a key paradigm to distribute learning across edge devices to reach global intelligence. In HFL, each edge device trains a local...
Article
Full-text available
This paper develops a novel stochastic geometry model to investigate design tradeoffs in a large-scale radar-aided millimeter-wave cellular network to eliminate the beam training overhead. In the proposed system, each base station comprises two sub-systems: the sensing sub-system, where radar localizes users, and the communication sub-system, where...
Article
The cost and limited capacity of fronthaul links pose significant challenges for the deployment of ultra-dense networks (UDNs), specifically for cell-free massive MIMO systems. Hence, cost-effective planning of reliable fronthaul networks is crucial for the future deployment of UDNs. We propose an optimization framework for traffic-aware hybrid fro...
Article
Federated Meta (FedMeta) learning integrates meta learning with Federated Learning (FL) towards addressing heterogeneity challenges in edge intelligence. Implementing FedMeta on Unmanned Aerial Vehicles (UAVs)-assisted aerial networks offers compound benefits, including optimal trajectory design and resource allocation. The quick adaptability of Fe...
Article
Full-text available
Proximity estimation forms the backbone of contact tracing solutions, as quarantining potentially infected individuals is essential for controlling the spread of epidemics. It is also essential for device discovery in Device-to-Device (D2D) and Vehicle-to-Vehicle (V2V) communications, which will be critical in future 6G networks. Despite the widesp...
Article
Unmanned aerial vehicles (UAVs) mobility enables flexible and customized federated learning (FL) at the network edge. However, the underlying uncertainties in the aerial-terrestrial wireless channel may lead to a biased FL model. In particular, the distribution of the global model and the aggregation of the local updates within the FL learning roun...
Article
Full-text available
The ubiquitous deployment of Internet of Things (IoT) and the ever-evolving IoT services seek fully autonomous devices with no energy limitations. To fulfill this demand, we investigate the usage of unmanned aerial vehicles (UAV) to overcome the limited battery constraint of IoT deployments in hard-to-reach locations. Specifically, we present a UAV...
Article
This paper proposes an ultra-reliable device-centric uplink (URDC-UL) communication scheme for airborne networks. In particular, base stations (BSs) are mounted on unmanned aerial vehicles (UAVs) that travel to schedule UL transmissions and collect data from devices. To attain an ultra-reliable unified device-centric performance, the UL connection...
Preprint
Full-text available
Some emerging 5G and beyond use-cases impose stringent latency constraints, which necessitates a paradigm shift towards finite blocklength performance analysis. In contrast to Shannon capacity-achieving codes, the codeword length in the finite blocklength regime (FBR) is a critical design parameter that imposes an intricate tradeoff between delay,...
Preprint
Full-text available
Closed-loop rate adaptation and error-control depends on the availability of feedback, which is necessary to maintain efficient and reliable wireless links. In the 6G era, many Internet of Things (IoT) devices may not be able to support feedback transmissions due to stringent energy constraints. This calls for new transmission techniques and design...
Article
The massive number of Device-to-Device (D2D) communication links and lack of protective programming cause Internet of Things (IoT) networks to be vulnerable to malware attacks. Botnets are formed when large number of devices get infected and controlled by the attacker. Controlled devices can be used by the attacker to launch denial of service (DoS)...
Preprint
Full-text available
This paper proposes an ultra-reliable device-centric uplink (URDC-UL) communication scheme for airborne networks. In particular, base stations (BSs) are mounted on unmanned aerial vehicles (UAVs) that travel to schedule UL transmissions and collect data from devices. To attain an ultra-reliable unified device-centric performance, the UL connection...
Article
Satellite-aerial communication (SAC) is envisioned as a fundamental component of the sixth-generation (6G) wireless networks. Motivated by its importance, we investigate a SAC system including a geostationary satellite (S), a target aircraft (TA), and a set of interfering aircraft (IA). Specifically, TA sends signals to S in the presence of IA inte...
Article
Some emerging 5G and beyond use-cases impose stringent latency constraints, which necessitates a paradigm shift towards finite blocklength performance analysis. In contrast to Shannon capacity-achieving codes, the codeword length in the finite blocklength regime (FBR) is a critical design parameter that imposes an intricate tradeoff between delay,...
Article
Connectivity is an important key performance indicator and a focal point of research in large-scale wireless networks. Due to path-loss attenuation of electromagnetic waves, direct wireless connectivity is limited to proximate devices. Nevertheless, connectivity among distant devices can still be attained through a sequence of consecutive multi-hop...
Article
With the expected proliferation of delay constrained applications, future communication technologies are pushed towards using short codes. The performance using short codes cannot be inferred through classical channel capacity analysis, which intrinsically assumes long codes and vanishing frame error rate (FER). This paper studies the performance o...
Preprint
Full-text available
Unmanned aerial vehicles (UAVs) mobility enables flexible and customized federated learning (FL) at the network edge. However, the underlying uncertainties in the aerial-terrestrial wireless channel may lead to a biased FL model. In particular, the distribution of the global model and the aggregation of the local updates within the FL learning roun...
Conference Paper
Full-text available
In the Internet of Things (IoT) era, data freshness is critical for real-time monitoring and control applications. Data freshness is quantified via the Age of Information (AoI), which tracks the age of the most recent received packet at the destination. This paper utilizes a spatiotemporal mathematical model to characterize the AoI of a target IoT...
Article
This letter uses stochastic geometry and queuing theory to study the scalability of long-range (LoRa) networks, accounting for duty cycling restrictions and imperfect spreading factor (SFs) orthogonality. The scalability is characterised by the joint boundaries of device density and traffic intensity per device. Novel cross-correlation factors are...
Article
This article studies data aggregation in large-scale regularly deployed Internet of Things (IoT) networks. The data granularity, in terms of information content and temporal resolution, is parameterized by the sizes of the generated packets and the average interpacket generation time. The generated data packets at the devices are aggregated through...
Article
Full-text available
This papers uses stochastic geometry and queuing theory to study he scalability of long-range (LoRa) networks, accounting for duty cycling restrictions and imperfect spreading factor (SFs) orthogonality. The scalability is characterised by the joint boundaries of device density and traffic intensity per device. Novel cross-correlation factors are u...
Preprint
Full-text available
This paper studies data aggregation in large-scale regularly deployed Internet of Things (IoT) networks, where devices generate synchronized time-triggered traffic (e.g., measurements or updates). The data granularity, in terms of information content and temporal resolution, is parameterized by the sizes of the generated packets and the duty cycle...
Article
Service providers are considering the use of unmanned aerial vehicles (UAVs) to enhance wireless connectivity of cellular networks. To provide connectivity, UAVs have to be backhauled through terrestrial base stations (BSs) to the core network. In particular, we consider millimeter-wave (mmWave) backhauling in the downlink of a hybrid aerial-terres...
Preprint
Full-text available
Service providers are considering the use of unmanned aerial vehicles (UAVs) to enhance wireless connectivity of cellular networks. To provide connectivity, UAVs have to be backhauled through terrestrial base stations (BSs) to the core network. In particular, we consider millimeter-wave (mmWave) backhauling in the downlink of a hybrid aerial-terres...
Article
The meta distribution (MD) of the signal to interference ratio (SIR) extends stochastic geometry analysis from spatial averages to reveals find-grained information about the network performance. There have been several efforts to establish the MD framework for the Poisson point process (PPP) and other ergodic point processes. However, the MD analys...
Article
Ambient radio frequency (RF) energy harvesting is widely promoted as an enabler for wireless-power Internet of Things (IoT) networks. This paper jointly characterizes energy harvesting and packet transmissions in grant-free opportunistic uplink IoT networks energized via harvesting downlink energy. To do that, a joint queuing theory and stochastic...
Preprint
Full-text available
Ambient radio frequency (RF) energy harvesting is widely promoted as an enabler for wireless-power Internet of Things (IoT) networks. This paper jointly characterizes energy harvesting and packet transmissions in grant-free opportunistic uplink IoT networks energized via harvesting downlink energy. To do that, a joint queuing theory and stochastic...
Article
Full-text available
The upcoming Internet of things (IoT) is foreseen to encompass massive numbers of connected devices, smart objects, and cyber-physical systems. Due to the large-scale and massive deployment of devices, it is deemed infeasible to safeguard 100% of the devices with state-of-the-art security countermeasures. Hence, large-scale IoT has inevitable looph...
Preprint
Full-text available
The upcoming Internet of things (IoT) is foreseen to encompass massive numbers of connected devices, smart objects, and cyber-physical systems. Due to the large-scale and massive deployment of devices, it is deemed infeasible to safeguard 100% of the devices with state-of-the-art security countermeasures. Hence, large-scale IoT has inevitable looph...
Article
Full-text available
This paper studies the effect of rate adaptation in time slotted Internet of things (IoT) networks. For a given time slot duration and packets size, rate adaptation necessitates packet fragmentation to fit the time slot duration. Accounting for the quality and time resolution of the underlying traffic, this paper characterizes the tradeoff between...
Preprint
This paper studies the effect of rate adaptation in time slotted Internet of things (IoT) networks. For a given time slot duration and packets size, rate adaptation necessitates packet fragmentation to fit the time slot duration. Accounting for the quality and time resolution of the underlying traffic, this paper characterizes the tradeoff between...
Article
This paper studies the effect of rate adaptation in time slotted Internet of things (IoT) networks. For a given time slot duration and packets size, rate adaptation necessitates packet fragmentation to fit the time slot duration. Accounting for the quality and time resolution of the underlying traffic, this paper characterizes the tradeoff between...
Article
Multi-access Edge Computing (MEC) enables computation and energy-constrained devices to offload and execute their tasks on powerful servers. Due to the scarce nature of the spectral and computation resources, it is important to jointly consider i) contention-based communications for task offloading and ii) parallel computing and occupation of failu...
Preprint
Multi-access Edge Computing (MEC) enables computation and energy-constrained devices to offload and execute their tasks on powerful servers. Due to the scarce nature of the spectral and computation resources, it is important to jointly consider i) contention-based communications for task offloading and ii) parallel computing and occupation of failu...
Article
Caching at mobile devices and leveraging cooperative device-to-device (D2D) communications are two promising approaches to support massive content delivery over wireless networks while mitigating the effects of interference. To show the impact of cooperative communication on the performance of cache-enabled D2D networks, the notion of device cluste...
Article
Massive Internet of Things (IoT) is foreseen to introduce a plethora of applications for a fully connected world. Heterogeneous traffic is envisaged, where packets generated at each device should be differentiated and served according to their priority. This article develops a novel priority-aware spatiotemporal mathematical model to characterize m...
Article
This paper develops a novel spatiotemporal model for large-scale IoT networks with asynchronous periodic traffic and hard-packet deadlines. A static marked Poisson bipolar point process is utilized to model the spatial locations of the IoT devices, where the marks mimic the relative time-offsets of traffic duty cycles at different devices. At each...
Article
Full-text available
Billions of wireless devices are foreseen to participate in big data aggregation and smart automation in order to interface the cyber and physical worlds. Such large-scale ultra-dense wireless connectivity is vulnerable to malicious software (malware) epidemics. Malware worms can exploit multi-hop wireless connectivity to stealthily diffuse through...
Article
Full-text available
This paper develops a novel spatiotemporal model for large-scale IoT networks with asynchronous periodic traffic and hard-packet deadlines. A static marked Poisson bipolar point process is utilized to model the spatial locations of the IoT devices, where the marks mimic the relative time-offsets of traffic duty cycles at different devices. At each...
Preprint
Billions of wireless devices are foreseen to participate in big data aggregation and smart automation in order to interface the cyber and physical worlds. Such large-scale ultra-dense wireless connectivity is vulnerable to malicious software (malware) epidemics. Malware worms can exploit multi-hop wireless connectivity to stealthily diffuse through...
Preprint
This paper develops a novel spatiotemporal model for large-scale IoT networks with asynchronous periodic traffic and hard-packet deadlines. A static marked Poisson bipolar point process is utilized to model the spatial locations of the IoT devices, where the marks mimic the relative time-offsets of traffic duty cycles at different devices. At each...
Preprint
Caching at mobile devices and leveraging cooperative device-to-device (D2D) communications are two promising approaches to support massive content delivery over wireless networks while mitigating the effects of interference. To show the impact of cooperative communication on the performance of cache-enabled D2D networks, the notion of device cluste...
Article
This paper analyzes the integration of Non-Orthogonal Multiple Access (NOMA) in a Fog Radio Access Network (FRAN) architecture with limited fronthaul capacity. More precisely, it proposes methods for optimizing the resource allocation for the downlink of a NOMA-based FRAN with multiple resource blocks (RB). The resource allocation problem is formul...
Preprint
Full-text available
Caching at mobile devices and leveraging device- to-device (D2D) communication are two promising approaches to support massive content delivery over wireless networks. The analysis of cache-enabled wireless networks is usually carried out by assuming that devices are uniformly distributed, however, in social networks, mobile devices are intrinsical...
Article
Caching at mobile devices and leveraging device-to-device (D2D) communication are two promising approaches to support massive content delivery over wireless networks. The analysis of cache-enabled wireless networks is usually carried out by assuming that devices are uniformly distributed, however, in social networks, mobile devices are intrinsicall...
Article
Timely message delivery is a key enabler for Internet of Things (IoT) and cyber-physical systems to support wide range of context-dependent applications. Conventional time-related metrics (e.g. delay and jitter) fails to characterize the timeliness of the system update. Age of information (AoI) is a time-evolving metric that accounts for the packet...
Preprint
Timely message delivery is a key enabler for Internet of Things (IoT) and cyber-physical systems to support wide range of context-dependent applications. Conventional time-related metrics, such as delay, fails to characterize the timeliness of the system update or to capture the freshness of information from application perspective. Age of informat...
Preprint
Full-text available
This paper investigates the self-sustainability of an overlay Internet of Things (IoT) network that relies on harvesting energy from a downlink cellular network. Using stochastic geometry and queueing theory, we develop a spatiotemporal model to derive the steady state distribution of the number of packets in the buffers and energy levels in the ba...
Article
Full-text available
This paper investigates the self-sustainability of an overlay Internet of Things (IoT) network that relies on harvesting energy from a downlink cellular network. Using stochastic geometry and queueing theory, we develop a spatiotemporal model to derive the steady state distribution of the number of packets in the buffers and energy levels in the ba...
Article
Full-text available
Future generations of wireless networks are expected to provide new services with an unprecedented level of diverse and stringent requirements. Fog Radio Access Network (FRAN) and Non-Orthogonal Multiple Access (NOMA) have emerged as complimentary enablers to meet such requirements. On the one hand, FRAN architecture is designed to reduce the delay...
Preprint
Timely message delivery is a key enabler for Internet of Things (IoT) and cyber-physical systems to support wide range of context-dependent applications. Conventional time-related metrics (e.g. delay and jitter) fails to characterize the timeliness of the system update. Age of information (AoI) is a time-evolving metric that accounts for the packet...
Preprint
To meet increasing data demands, service providers are considering the use of Unmanned aerial vehicles (UAVs) for delivering connectivity as aerial base stations (BSs). UAVs are especially important to provide connectivity in case of disasters and accidents which may cripple completely the existing terrestrial networks. However, in order to maintai...
Article
Full-text available
Ultra-dense networks (UDNs) envision the massive deployment of heterogeneous base stations (BSs) to meet the desired traffic demands. Furthermore, UDNs are expected to support the diverse devices e.g., personal mobile devices and unmanned aerial vehicles. User mobility and the resulting excessive changes in user to BS associations in such highly de...
Article
Full-text available
This letter analyzes the meta-distribution of the transmission success probability (TSP) for vehicular networks based on a one-dimensional Poisson point process (PPP). We also propose a method to maximize the throughput across the vehicular network. Compared to the conventional spatial average performance assessment, the meta-distribution reveals t...
Preprint
Massive Internet of Things (IoT) is foreseen to introduce plethora of applications for a fully connected world. Heterogeneous traffic is envisaged, where packets generated at each IoT device should be differentiated and served according to their priority. This paper develops a novel priority-aware spatiotemporal mathematical model to characterize m...
Article
Full-text available
The next era of information revolution will rely on aggregating big data from massive numbers of devices that are widely scattered in our environment. Most of these devices are expected to be of low-complexity, low-cost, and limited power supply, which impose stringent constraints on the network operation. In this regard, this paper investigates ae...
Article
Full-text available
The massive wireless networks (MWNs) enable surging applications for the Internet of Things and cyber physical systems. In these applications, nodes typically exhibit stringent power constraints, limited computing capabilities, and sporadic traffic patterns. This paper develops a spatiotemporal model to characterize and design uncoordinated multipl...
Preprint
Full-text available
Non-Orthogonal Multiple Access (NOMA) and Fog Radio Access Networks (FRAN) are promising candidates within the 5G and beyond systems. This work examines the benefit of adopting NOMA in an FRAN architecture with constrained capacity fronthaul. The paper proposes methods for optimizing joint scheduling and power adaptation in the downlink of a NOMA-b...
Article
Full-text available
Simultaneous co-channel transmission and reception, denoted as in-band full-duplex (FD) communications, has been promoted as a solution to improve the spectral efficiency in wireless networks. For cellular networks, in addition to the existing aggregate interference in half-duplex transmission, the residual self-interference and cross-mode interfer...
Conference Paper
Full-text available
This paper investigates the self-sustainability of an overlay Internet of Things (IoT) network that relies on harvesting energy from a downlink cellular network. Using stochastic geometry and queueing theory, we develop a spatiotemporal model to derive the steady state distribution of the number of packets in the buffers and energy levels in the ba...
Conference Paper
Full-text available
The next era of information revolution will rely on aggregating big data from massive numbers of devices that are widely scattered in our environment. The majority of these devices are expected to be of low-complexity, low-cost, and limited power supply, which impose stringent constraints on the network operation. In this regards, this paper propos...
Conference Paper
Non-Orthogonal Multiple Access (NOMA) is a promising technology for 5G that enables each resource unit to simultaneously serve multiple users. This paper evaluates the potential benefit of joint scheduling and power adaptation in NOMA-based downlink in Fog-Radio Access Networks (FRAN). We consider the downlink of a FRAN, where the Fog Access Points...
Preprint
Full-text available
Providing connectivity to aerial users, such as cellular-connected unmanned aerial vehicles (UAVs) or flying taxis, is a key challenge for tomorrow's cellular systems. In this paper, the use of coordinated multi-point (CoMP) transmission along with caching for providing seamless connectivity to aerial users is investigated. In particular, a network...
Preprint
Full-text available
In this paper, we aim at maximizing the cache offloading gain for a clustered \ac{D2D} caching network by exploiting probabilistic caching and cooperative transmission among the cluster devices. Devices with surplus memory probabilistically cache a content from a known library. A requested content is either brought from the device's local cache, co...
Article
We study the meta distribution (MD) of the coverage probability (CP) in downlink non-orthogonal-multiple-access (NOMA) networks. Two schemes are assessed based on the location of the NOMA users: 1) anywhere in the network, 2) cell-center users only. The moments of the MD for both schemes are derived and the MD is approximated via the beta distribut...
Preprint
We study the meta distribution (MD) of the coverage probability (CP) in downlink non-orthogonal-multiple-access (NOMA) networks. Two schemes are assessed based on the location of the NOMA users: 1) anywhere in the network, 2) cell-center users only. The moments of the MD for both schemes are derived and the MD is approximated via the beta distribut...
Article
Full-text available
The Internet-of-things (IoT) is the paradigm where anything will be connected. There are two main approaches to handle the surge in the uplink (UL) traffic the IoT is expected to generate, namely, Scheduled UL (SC-UL) and random access uplink (RA-UL) transmissions. SC-UL is perceived as a viable tool to control Quality-of-Service (QoS) levels while...

Network

Cited By