Research

Summary 

My research interests include distributed massive MIMO networks (3-D spatial channel modeling, beamforming, and SDMA), Machine learning for wireless communication applications, cloud radio access networks, small cells, smart grid and heterogeneous networks. 

Nowadays I have developed a strong interest in applied machine learning, so I am working on topics including IoT analytics. 

Thesis Topics 


1. Undergraduate Degree:

WiMAX Performance Analysis Using Matlab

Link for thesis : wimax research

Link for ppt: wimax final presentation


2. Graduate:

A study of Full Dimensional Large scale MIMO for Next Generation Wireless Network

Link for thesis : FD-MIMO Thesis pdf

Link for ppt 2 : FD-MIMO presentation 1

Link for ppt : FD-MIMO Final presentation 


3. PhD:


Detailed Research Interest 



Next generation 5G wireless networks will run applications requiring high demand for data rates. One of the solution to solve the data rate requirement is to allow densification of network by deploying small cells. Such densification results in higher spectral efficiency and can also reduce the power consumption of mobile due to its communication with nearby pico-cell. This solution significantly improves network coverage. However, this solution requires innovation in hardware miniaturization and cost reduction in the design of small cell base-station. Such small cell base-stations can be deployed as low powered femtocells typically used in enterprise/residential deployments or higher powered pico cells for improving outdoor coverage of macro cells. The concurrent operation of Macro-, micro-, pico- and femto-cells is termed as heterogeneous networks (HetNets). Interference management is one of the most critical challenges due to the uncoordinated nature of HetNet deployments. However, 3GPP has identified various scenarios and requirements in  for the enhancements of small cells. 


This technique improves spectral efficiency because multiple data sequences are transmitted in parallel. Thus, the spectral efficiency is improved by increasing the number of the transmit antennas. In addition, it can be expanded into multi-user MIMO or Space-Division Multiple Access (SDMA). This technique assigns data sequence to each user. With the introduction of FD-MIMO and 2D-array antenna technology, wireless signals can be adaptively beamformed to specific users in both horizontal and vertical domains. Additionally, with the adoption of advanced digital signal processing schemes, an FD-MIMO antenna system can support higher-order multi-user MIMO (MU-MIMO) which delivers a multi-fold improvement in system performance compared to conventional MIMO systems.

A LAN is used for supervision functions concerning the installation and the electric network. It can be used to connect a set of communicating devices using the same communication protocol to a centralized supervision system. The IED can be connected to a LAN using one of the following communication protocols: 

a.      Modbus RTU

Modbus RTU is a data-transmission protocol, a de facto standard since 1979 widely used in industry and accepted by many communicating devices.

b.     Modbus TCP/IP

The Modbus TCP/IP communication protocol offers the same functions as Modbus RTU as well as compatibility with multi-master architectures

c.      DNP3

DNP3 is a data-transmission protocol specially suited to the needs of distributors for remote control/monitoring of substations in the electric network. For more information on the DNP3 protocol, visit www.dnp.org.

d.     IEC 60870-5-103

IEC 60870-5-103 is an accompanying standard for the standards in the IEC 60870-5 series. It defines communication between protection devices and the various devices in a control system (supervisor or RTU) in a substation. For more information on the IEC 60870-5-103 protocol, visit www.iec.ch

e.      IEC 61850

The standards in the IEC 61850 series define a protocol for communication in electrical substations. The Ethernet-based protocol offers advanced characteristics and interoperability between multi-vendor devices. The IED handles the station bus, in compliance with standards IEC 61850- 6, 7-1, 7-2, 7-3, 7-4 and 8-1. For more information on the IEC 61850 protocol, visit www.iec.ch.

Industrial Internet of Things (IIOT)

The Industrial Internet of Things (IIoT) is the use of Internet of Things (IoT) technologies in manufacturing. Also known as the Industrial Internet, IIoT incorporates machine learning and big data technology, harnessing the sensor data, machine-to-machine (M2M) communication and automation technologies that have existed in industrial settings for years. The driving philosophy behind the IIoT is that smart machines are better than humans at accurately, consistently capturing and communicating data. This data can enable companies to pick up on inefficiencies and problems sooner, saving time and money and supporting business intelligence efforts. In manufacturing specifically, IIoT holds great potential for quality control, sustainable and green practices, supply chain traceability and overall supply chain efficiency.  While IOT is driven with the philosophy that connected smart devices will enable humans to use their time efficiently and will improve the quality of life dramatically. Credits: industrial-iiot

The advent and evolution of the Smart Grid initiative to improve the electric utility power infrastructure has brought with it a number of opportunities for improving efficiencies, but along with those benefits come challenges in the effort to assure safety, security, and reliability for utilities and consumers alike. Any Smart Grid solution has to comply with local governmental regulations for network security. These often require a complete separation between sub-networks serving different operational functions – automated meter reading (AMR), remote terminal units (RTUs) and facility lighting. As the architecture evolves, IP is seen as a critical transport mechanism. The new system will accommodate separate data paths for operational data, non-operational data, and remote access. Cyber security must be integrated along with the communications system to mitigate the risk of a cyber-attack—and to comply with NERC CIP regulations.