Tamer Elbatt

Tamer Elbatt
Institute of Electrical and Electronics Engineers | IEEE · Dept. of Computer Science and Engineering - The American University in Cairo

Doctor of Engineering

About

151
Publications
16,108
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,249
Citations
Citations since 2017
44 Research Items
1006 Citations
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
2017201820192020202120222023050100150200
Additional affiliations
October 2009 - present
Nile University
Position
  • Professor (Associate)
July 2009 - present
Cairo University
Position
  • Professor (Associate)

Publications

Publications (151)
Article
This paper studies the Multi-Input-Multi-Output (MIMO) interference networks with arbitrary number of transmitters and receivers, where both the transmitters and receivers are equipped with caches. The main goal is to design content placement and delivery schemes that minimize the worst case normalized delivery time (NDT). First, we propose a deliv...
Conference Paper
Full-text available
In this paper, we propose a Reinforcement Learning-based MAC layer protocol for cognitive radio networks, based on exploiting the feedback of the Primary User (PU). Our proposed model relies on two pillars, namely an infinite-state Partially Observable Markov Decision Process (POMDP) to model the system dynamics besides a queuing-theoretic model fo...
Article
Full-text available
Cognitive radios have emerged as a key enabler for opportunistic spectrum access, in order to tackle the wireless spectrum scarcity and under utilization problems over the past two decades. In this paper, we aim to enhance the secondary user (SU) performance while maintaining the desired average packet delay for the primary user (PU). In particular...
Article
Full-text available
In this paper, we study a full-duplex cooperative cognitive radio network with multiple full-duplex secondary users acting as potential relays for transmitting the packets of a primary user. In addition to having full-duplex capability, the receivers also have multi-packet reception capability allowing them to simultaneously decode packets incoming...
Preprint
In this paper, we consider a class of wireless powered communication devices using hybrid automatic repeat request (HARQ) protocol to ensure reliable communications. In particular, we analyze the trade-off between accumulating mutual information and harvesting RF energy at the receiver of a point-to-point link over a time-varying independent and id...
Article
Full-text available
In this paper, we generalize conventional time division multiple access (TDMA) wireless networks to a new type of wireless networks coined generalized wireless powered communication networks (g-WPCNs). Our prime objective is to optimize the design of g-WPCNs where nodes are equipped with radio frequency (RF) energy harvesting circuitries along with...
Article
Full-text available
The original version of this article contained error in author affiliation. Also, the article note and acknowledgement sections are missing.
Preprint
In this paper, an interference network with arbitrary number of transmitters and receivers is studied, where each transmitter is equipped with a finite size cache. We obtain an information-theoretic lower bound on both the peak normalized delivery time (NDT), and the \textit{expected} NDT of cache-aided interference networks with uniform content po...
Article
Full-text available
The optimal allocation of time and energy resources is characterized in a Wireless Powered Communication Network (WPCN) with Non-Orthogonal Multiple Access (NOMA). We consider two different formulations; in the first one (max-sum), the sum-throughput of all users is maximized. In the second one (max-min), and targeting fairness among users, we cons...
Preprint
Full-text available
The optimal allocation of time and energy resources is characterized in a Wireless Powered Communication Network (WPCN) with non-Orthogonal Multiple Access (NOMA). We consider two different formulations; in the first one (max-sum), the sum-throughput of all users is maximized. In the second one (max-min), and targeting fairness among users, we cons...
Article
Full-text available
The surge in demand for Internet of Things (IoT) systems and applications has motivated a paradigm shift in the development of viable RFID-based solutions for ubiquitous real-time monitoring and tracking. Bit tracking based anti-collision algorithms have attracted considerable attention, recently, due to its positive impact on decreasing the identi...
Conference Paper
Full-text available
In this paper, we study a two-tier cellular network with cache-enabled small base stations (SBSs). In our model, a SBS has the ability to coordinate with neighboring SBSs and fetch data from their caches. We focus on the effect of SBSs' density on the network's energy efficiency. To this end, stochastic geometry theory is used to model the SBSs and...
Article
Indoor/outdoor localization, tracking and positioning applications are developed using the GPS receivers, ultrasound, infrared and RF (Wi-Fi and cellular) signals. The key point of such upper layer applications is to detect precisely whether a user is indoor or outdoor. This detection is crucial to improve the performance drastically through making...
Article
Full-text available
This paper studies cache-aided interference networks with arbitrary number of transmitters and receivers, whereby each transmitter has a cache memory of finite size. Each transmitter fills its cache memory from a content library of files in the placement phase. In the subsequent delivery phase, each receiver requests one of the library files, and t...
Article
Full-text available
In this work, we consider a class of wireless powered devices employing Hybrid Automatic Repeat reQuest (HARQ) to ensure reliable end-to-end communications over a time-varying channel. By using Simultaneous Wireless Information and Power Transfer (SWIPT), the perpetually powered transmitter transmits information bearing RF signal to the receiver. T...
Conference Paper
Full-text available
In this paper, we characterize optimal resource allocation for the uplink and downlink of wireless powered cellular networks (WPCNs). In particular, we investigate a time-slotted WPCN, where a hybrid access point (HAP) is in charge of energy replenishing of M cellular users (CUs), along with transmission/reception of information to/from them. Unlik...
Article
In this paper we study social networks as an enabling technology for new applications and services leveraging, largely unutilized, opportunistic mobile encounters. More specifically, we quantify mobile user similarity and introduce a novel mathematical framework, grounded in information theory, to characterize fundamental limits and quantify the pe...
Article
Full-text available
This paper studies a generic model for cooperative cognitive radio networks where the secondary user is equipped with a finite length relaying queue as well as a finite length battery queue. Our prime objective is to characterize the stable throughput region. Nevertheless, the complete characterization of stable throughput region is notoriously dif...
Conference Paper
Full-text available
We characterize time and power allocations to optimize the sum-throughput of a Wireless Powered Communication Network (WPCN) with Non-Orthogonal Multiple Access (NOMA). In our setup, an Energy Rich (ER) source broadcasts wireless energy to several devices, which use it to simultaneously transmit data to an Access Point (AP) on the uplink. Different...
Article
Full-text available
We characterize time and power allocations to optimize the sum-throughput of a Wireless Powered Communication Network (WPCN) with Non-Orthogonal Multiple Access (NOMA). In our setup, an Energy Rich (ER) source broadcasts wireless energy to several devices, which use it to simultaneously transmit data to an Access Point (AP) on the uplink. Different...
Article
Full-text available
This paper studies the decentralized coded caching for a Fog Radio Access Network (F-RAN), whereby two edge-nodes (ENs) connected to a cloud server via fronthaul links with limited capacity are serving the requests of Kr users. We consider all ENs and users are equipped with caches. A decentralized content placement is proposed to independently sto...
Article
Full-text available
This paper characterizes the performance of a generic K-tier cache-aided heterogeneous network (CHN), in which the base stations (BSs) across tiers differ in terms of their spatial densities, transmission powers, pathloss exponents, activity probabilities conditioned on the serving link and placement caching strategies. We consider that each user c...
Conference Paper
Full-text available
This paper studies the problem of cooperative communications in cognitive radio networks where the secondary user is equipped with finite length relaying queue as well as finite length battery queue. The major hurdle towards fully characterizing the stable throughput region stems from the sheer complexity associated with solving the two-dimensional...
Conference Paper
Full-text available
In this paper, we characterize the stability region of cognitive radio networks with a dedicated relay node. In particular, we study this system under two different MAC protocols: perfect sensing and random access. In the perfect sensing protocol, the relay node and the secondary user access the medium only when the primary user is idle. In the ran...
Article
We consider the problem of optimizing the performance of a cooperative cognitive radio user subject to constraints on the quality-of-service (QoS) of the primary user (PU). In particular, we design the probabilistic admission control parameter of the PU packets in the secondary user (SU) relaying queue and the randomized service parameter at the SU...
Article
In this paper, we characterize the asymmetric total degrees of freedom (DoF) of a multiple-input multiple-output (MIMO) 3-way channel. Each node has a separate-antenna full-duplex MIMO transceiver with a different number of antennas, where each antenna can be configured for either signal transmission or reception. We study this system under two mes...
Article
Full-text available
Compressive Sensing has been utilized in Cognitive Radio Networks (CRNs) to exploit the sparse nature of the occupation of the primary users. Also, distributed spectrum sensing has been proposed to tackle the wireless channel problems, like node or link failures, rather than the common (centralized approach) for spectrum sensing. In this paper, we...
Conference Paper
Compressive Sensing has been utilized in Cognitive Radio Networks (CRNs) to exploit the sparse nature of the occupation of the primary users. Also, distributed spectrum sensing has been proposed to tackle the wireless channel problems, like node or link failures, rather than the common " centralized approach " for spectrum sensing. In this paper, w...
Conference Paper
In this paper, we study the problem of scalable videos multicast streaming over multi-channel multi-radio wireless mesh networks over a contention-based MAC, with the objective of maximizing the overall received videos quality. We propose a three-stage heuristic framework solution for the complex joint channel assignment, video quality selection an...
Conference Paper
In this paper we study the problem of tag identification in multi-reader RFID systems. In particular, we propose a novel solution to the reader-to-reader collisions and tag collisions in multi-reader systems, using the concept of bit tracking [1]. Towards this objective, we propose the multi-reader RFID tag identification using bit tracking (MRTI-B...
Conference Paper
Full-text available
We study the problem of optimizing the performance of cognitive radio users with opportunistic real-time applications subject to primary users quality-of-service (QoS) constraints. Two constrained optimization problems are formulated; the first problem is maximizing the secondary user throughput while the second problem is minimizing the secondary...
Article
In this paper, we introduce the novel concept of cost-effective mobile health care which leverages the multiple wireless interfaces onboard most mobile phones today. First, we study the problem of uploading medical data using the “least cost” radio interface. Toward this objective, we propose the wireless interface selection algorithm (WISA) which...
Article
In this paper, we study and analyze cooperative cognitive radio networks with arbitrary number of secondary users (SUs). Each SU is considered a prospective relay for the primary user (PU) besides having its own data transmission demand. We consider a multi-packet transmission framework which allows multiple SUs to transmit simultaneously thanks to...
Article
Full-text available
The optimal resource allocation scheme in a full-duplex Wireless Powered Communication Network (WPCN) composed of one Access Point (AP) and two wireless devices is analyzed and derived. AP operates in a full-duplex mode and is able to broadcast wireless energy signals in downlink and receive information data in uplink simultaneously. On the other h...
Article
Full-text available
In this paper, we generalize conventional time division multiple access (TDMA) wireless networks to a new type of wireless networks coined generalized wireless powered communication networks (g-WPCNs). Our prime objective is to optimize the design of g-WPCNs where nodes are equipped with radio frequency (RF) energy harvesting circuitries along with...
Conference Paper
Full-text available
This paper studies optimal resource allocation in a wireless powered communication network with two groups of users; one is assumed to have radio frequency (RF) energy harvesting capability and no other energy sources, while the other group has legacy nodes that are assumed not to have RF energy harvesting capability and are equipped with dedicated...
Conference Paper
Full-text available
This paper studies optimal resource allocation in a wireless powered communication network with two groups of users; one is assumed to have radio frequency (RF) energy harvesting capability and no other energy sources, while the other group has legacy nodes that are assumed not to have RF energy harvesting capability and are equipped with dedicated...
Article
Full-text available
In this paper, we study the impact of a full-duplex secondary node on a cognitive cooperative network with Multipacket Reception (MPR) capabilities at the receivers. Motivated by recent schemes that make full-duplex communication feasible, we study a model with one primary and one secondary transmitter-receiver pair, where the secondary transmitter...
Article
Full-text available
This paper presents an energy efficient relay deployment algorithm that determines the optimal location and number of relays for future wireless networks, including Long Term Evolution (LTE)-Advanced heterogeneous networks. We formulate an energy minimization problem for macro-relay heterogeneous networks as a Mixed Integer Linear Programming (MILP...
Article
Full-text available
In this paper we establish fundamental limits on the performance of knowledge sharing in opportunistic social net- works. In particular, we introduce a novel information-theoretic model to characterize the performance limits of knowledge sharing policies. Towards this objective, we first introduce the notions of knowledge gain and its upper bound,...
Conference Paper
In this paper, we study the fundamental trade-off between delay-constrained primary and secondary users in cognitive radio networks. In particular, we characterize and optimize the trade-off between the secondary user (SU) effective capacity and the primary user (PU) average packet delay. Towards this objective, we employ Markov chain models to qua...
Conference Paper
Full-text available
In this paper we analyze the performance of a secondary link in a cognitive radio relaying system operating under a statistical quality of service (QoS) delay constraint. In particular, we quantify analytically the Effective Capacity improvement for the secondary user when it offers a packet relaying service to the primary user packets that are los...
Article
In this paper we study the problem of optimal power control for a Z-interference channel abstracting an underlay cognitive radio network where the secondary user has delay constraints. More specifically, we minimize the packet drop probability at the secondary user (equivalent to delay bound violation probability) subject to quality of service (QoS...
Article
Full-text available
In this paper, we study Two-way relaying networks well-known for its throughput merits. In particular, we study the fundamental throughput delay trade-off in two-way relaying networks using opportunistic network coding. We characterize the optimal opportunistic network coding policy that maximizes the aggregate network throughput subject to an aver...
Article
Full-text available
In this paper, we propose fractional sequential sensing (FSS) as a novel cooperative sensing scheme for cognitive radio networks. FSS compromises a tradeoff between sensing accuracy and efficiency by formulating an optimization problem whose solution identifies FSS sensing parameters. These parameters include the sensing period and channels allocat...
Article
Full-text available
Energy harvesting (EH) is a promising technology for realizing energy efficient wireless networks. In this paper, we utilize the ambient RF energy, particularly interference from neighboring transmissions, to replenish the batteries of the EH enabled nodes. However, RF energy harvesting imposes new challenges into the design of wireless networks. I...
Article
Full-text available
In this paper, we examine a cognitive spectrum access scheme in which a secondary user exploits the primary feedback information. We consider an overlay model in which the secondary user accesses the channel by certain access probabilities that are function of the spectrum sensing metric. In setting our problem, we assume that the secondary user ca...