SlideShare a Scribd company logo
1 of 4
Power Allocation for Statistical QoS Provisioning in
Opportunistic Multi-Relay DF Cognitive Networks
Abstract
In this letter, we propose a power allocation scheme for statistical quality-of-service (QoS) provisioning in
multi-relay decode-and-forward (DF) cognitive networks (CN). By considering the direct link between the
source and destination, the CN first chooses the transmission mode (direct transmission or relay transmission)
based on the channel state information. Then, according to the determined transmission mode, efficient power
allocation will be performed under the given QoS requirement, the average transmit and interference power
constraints as well as the peak interference constraint. Our proposed power allocation scheme indicates that, in
order to achieve the maximum throughput, at most two relays can be involved for the transmission. Simulation
results show that our proposed scheme outperforms the max-min criterion and equal power allocation policy.
Existing system
The deterministic delay QoS guarantee is usually unrealistic for practical wireless networks. Consequently, the
statistical version should be employed for the CN’s delay QoS provisioning. Furthermore, resource allocation
and relay communications have been regarded as two powerful approaches to improve the CN’s performance.
However, most researches on resource allocation for cognitive relay networks are mainly towards maximizing
the Shannon capacity without guaranteeing the delay-QoS requirements. Therefore, there is an urgent need to
develop the effiresource allocation scheme for cognitive relay networks with statistically guaranteed delay QoS.
In this letter, we propose a statistical QoS driven power allocation scheme for multi-relay decode-and-forward
(DF) CN. The CN can dynamically choose the transmission mode (direct transmission or relay transmission),
perform the relay selection, and allocate the upper-bounded transmit power across the source and selected relays
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
based on the channel state information. Our proposed power allocation scheme not only satisfies the given QoS
requirement, but also meets a series of imposed transmit and interference power constraints. Moreover, we find
that, in order to maximize the CN’s throughput, at most two relays can be involved for the transmission.
Disadvantages
The message to SD. The PS transmits with constant power. The SS and SRs adjust their transmit power
based on the NGV and the statistical QoS requirement.
Because effective capacity can be regarded as the maximum available throughput of the wireless
network under the givenQoS requirement.
Proposed System
The power allocation scheme indicates that, in order to achieve the maximum throughput, at most two relays
can be involved for the transmission. Simulation results show that our proposed scheme outperforms the max-
min criterion and equal power allocation policy. Our proposed power allocation scheme not only satisfies the
given QoS requirement, but also meets a series of imposed transmit and interference power constraints.
Moreover, we find that, in order to maximize the CN’s throughput, at most two relays can be involved for the
transmission. In this section, we evaluate our proposed power allocation scheme through simulations. In our
simulations, we set the frame duration , the bandwidth , the Nakagami parameter , the constant transmit power
of the PN , the maximum average transmit power the maximum average interference power and the maximum
peak interference power.
Advantages
The normalized effective capacities of the CN under three different power allocation schemes, which are
our proposed power allocation scheme, max-min criterion, and equal power allocation policy,
respectively.
That our proposed power allocation scheme outperforms the max-min criterion and equal power
allocation policy for various QoS exponents.
The max-min criterion and equal power allocation policy and thus can achieve better effective capacity.
Module Description
Cognitive network
To meet not only the transmit power constraint, but also the predefined interference power requirement
imposed by the primary network, the delay Quality-of-Service.
Qos Driven Power Allocation
To develop an efficient power allocation scheme to maximize the available throughput of the multi-relay DF
CN under the given statistical QoS requirement. The statistical QoS provisioning is described by the delay-
bound violation probability/
Effective capacity
The delay and predefined delay bound, respectively, and is the maximum violation probability. Effective
bandwidth and effective capacity are powerful approaches to calculate the delay-bound violation probability.
Consider a stable dynamic discrete-time queuing system with arrival rate and service rate.
Relay Transmission
That belongs to should participate the transmission. Consequently, we first find the optimal power allocation
scheme for any given relay set. Then, we determine the optimal relay set . For any given relay set, the service
rate is determined.
Equal power allocation
The equal power allocation policy for various QoS exponents. The presents the utilized average transmit power
of the CN and the average interference power perceived by the PN under the three power allocation schemes.
We can observe from that the average interference power under the three schemes all meet the maximum
average interference power. However, our proposed power allocation scheme can more sufficiently utilize the
upper-bounded power resource than the max-min criterion and equal power allocation policy and thus can
achieve better effective capacity.
CONCLUSIONS
We proposed an efficient power allocation scheme for statistical QoS provisioning in multi-relay
decode-and-forward cognitive networks subject to the average transmit and interference power constraints as
well as the peak interference constraint. Simulation results show that our proposed power allocation scheme
outperforms themax-min criterion and equal power allocation policy.
REFERENCES
[1] C. Chang, “Stability, queue length, and delay of deterministic and stochastic queueing neyworks,” IEEE
Trans. Automat. Contr., vol. 39, no. 5, pp. 913–931, May 1994.
[2] D. Wu and R. Negi, “Effective capacity: A wireless link model forsupport of Quality of Service,” IEEE
Trans. Wireless Commun., vol. 2, no. 4, pp. 630–643, Jul. 2003.
[3] Q. Du and X. Zhang, “QoS-aware base-station selections for distributed MIMO links in broadband wireless
networks,” IEEE J. Sel. Areas Commun., vol. 29, no. 6, pp. 1123–1138, Jun. 2011.
[4] K. B. Letaief and W. Zhang, “Cooperative communications for cognitive radio networks,” Proc. IEEE, vol.
97, no. 5, pp. 878–893, May 2009.
[5] X. Gong, S. A. Vorobyov, and C. Tellambura, “Optimal bandwidth and power allocation for sum ergodic
capacity under fading channels in cognitive radio networks,” IEEE Trans. Signal Process., vol. 59, no. 4, pp.
1814–1826, Apr. 2011.
[6] D. Gündüz and E. Erkip, “Opportunistic cooperation by dynamic resource allocation,” IEEE Trans. Wireless
Commun., vol. 6, no. 4, pp. 1446–1454, Apr. 2007.

More Related Content

What's hot

Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd Iaetsd
 
7. 7775 8118-1-pb
7. 7775 8118-1-pb7. 7775 8118-1-pb
7. 7775 8118-1-pbIAESIJEECS
 
Abstract
AbstractAbstract
AbstractAnand B
 
13_28739 - IJAES ok 2929-2938
13_28739 - IJAES ok 2929-293813_28739 - IJAES ok 2929-2938
13_28739 - IJAES ok 2929-2938Vennila Raja
 
Energy maps for mobile wireless networks coherence time versues spreding peri...
Energy maps for mobile wireless networks coherence time versues spreding peri...Energy maps for mobile wireless networks coherence time versues spreding peri...
Energy maps for mobile wireless networks coherence time versues spreding peri...Mumbai Academisc
 
IRJET- Channel Allocation Strategy for Multiuser Cognitive and Location A...
IRJET-  	  Channel Allocation Strategy for Multiuser Cognitive and Location A...IRJET-  	  Channel Allocation Strategy for Multiuser Cognitive and Location A...
IRJET- Channel Allocation Strategy for Multiuser Cognitive and Location A...IRJET Journal
 
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...IJCNC
 
Resource Allocation Optimization for Heterogeneous Network
Resource Allocation Optimization for Heterogeneous NetworkResource Allocation Optimization for Heterogeneous Network
Resource Allocation Optimization for Heterogeneous NetworkIOSRjournaljce
 

What's hot (10)

Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by using
 
7. 7775 8118-1-pb
7. 7775 8118-1-pb7. 7775 8118-1-pb
7. 7775 8118-1-pb
 
Abstract
AbstractAbstract
Abstract
 
A3
A3A3
A3
 
Fy3111571162
Fy3111571162Fy3111571162
Fy3111571162
 
13_28739 - IJAES ok 2929-2938
13_28739 - IJAES ok 2929-293813_28739 - IJAES ok 2929-2938
13_28739 - IJAES ok 2929-2938
 
Energy maps for mobile wireless networks coherence time versues spreding peri...
Energy maps for mobile wireless networks coherence time versues spreding peri...Energy maps for mobile wireless networks coherence time versues spreding peri...
Energy maps for mobile wireless networks coherence time versues spreding peri...
 
IRJET- Channel Allocation Strategy for Multiuser Cognitive and Location A...
IRJET-  	  Channel Allocation Strategy for Multiuser Cognitive and Location A...IRJET-  	  Channel Allocation Strategy for Multiuser Cognitive and Location A...
IRJET- Channel Allocation Strategy for Multiuser Cognitive and Location A...
 
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cog...
 
Resource Allocation Optimization for Heterogeneous Network
Resource Allocation Optimization for Heterogeneous NetworkResource Allocation Optimization for Heterogeneous Network
Resource Allocation Optimization for Heterogeneous Network
 

Similar to Power allocation for statistical qo s provisioning in

Power allocation for statistical qo s provisioning in opportunistic multi rel...
Power allocation for statistical qo s provisioning in opportunistic multi rel...Power allocation for statistical qo s provisioning in opportunistic multi rel...
Power allocation for statistical qo s provisioning in opportunistic multi rel...ecway
 
Power allocation for statistical qo s provisioning in opportunistic multi rel...
Power allocation for statistical qo s provisioning in opportunistic multi rel...Power allocation for statistical qo s provisioning in opportunistic multi rel...
Power allocation for statistical qo s provisioning in opportunistic multi rel...Ecway Technologies
 
Java power allocation for statistical qo s provisioning in opportunistic mul...
Java  power allocation for statistical qo s provisioning in opportunistic mul...Java  power allocation for statistical qo s provisioning in opportunistic mul...
Java power allocation for statistical qo s provisioning in opportunistic mul...ecwayerode
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...Ecwayt
 
Java power allocation for statistical qo s provisioning in opportunistic mul...
Java  power allocation for statistical qo s provisioning in opportunistic mul...Java  power allocation for statistical qo s provisioning in opportunistic mul...
Java power allocation for statistical qo s provisioning in opportunistic mul...Ecway Technologies
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...Ecwaytechnoz
 
Dotnet power allocation for statistical qo s provisioning in opportunistic m...
Dotnet  power allocation for statistical qo s provisioning in opportunistic m...Dotnet  power allocation for statistical qo s provisioning in opportunistic m...
Dotnet power allocation for statistical qo s provisioning in opportunistic m...Ecwaytech
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...Ecwayt
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...Ecway2004
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...Ecwayt
 
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET Journal
 
Ieee transactions 2018 on wireless communications Title and Abstract
Ieee transactions 2018 on wireless communications Title and AbstractIeee transactions 2018 on wireless communications Title and Abstract
Ieee transactions 2018 on wireless communications Title and Abstracttsysglobalsolutions
 
Social-sine cosine algorithm-based cross layer resource allocation in wireles...
Social-sine cosine algorithm-based cross layer resource allocation in wireles...Social-sine cosine algorithm-based cross layer resource allocation in wireles...
Social-sine cosine algorithm-based cross layer resource allocation in wireles...IJECEIAES
 
Wireless Powered Communications: Performance Analysis and Optimization
Wireless Powered Communications: Performance Analysis and OptimizationWireless Powered Communications: Performance Analysis and Optimization
Wireless Powered Communications: Performance Analysis and Optimizationdtvt2006
 
Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...tsysglobalsolutions
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstracttsysglobalsolutions
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsVijay Karan
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsVijay Karan
 

Similar to Power allocation for statistical qo s provisioning in (20)

Power allocation for statistical qo s provisioning in opportunistic multi rel...
Power allocation for statistical qo s provisioning in opportunistic multi rel...Power allocation for statistical qo s provisioning in opportunistic multi rel...
Power allocation for statistical qo s provisioning in opportunistic multi rel...
 
Power allocation for statistical qo s provisioning in opportunistic multi rel...
Power allocation for statistical qo s provisioning in opportunistic multi rel...Power allocation for statistical qo s provisioning in opportunistic multi rel...
Power allocation for statistical qo s provisioning in opportunistic multi rel...
 
Java power allocation for statistical qo s provisioning in opportunistic mul...
Java  power allocation for statistical qo s provisioning in opportunistic mul...Java  power allocation for statistical qo s provisioning in opportunistic mul...
Java power allocation for statistical qo s provisioning in opportunistic mul...
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
 
Java power allocation for statistical qo s provisioning in opportunistic mul...
Java  power allocation for statistical qo s provisioning in opportunistic mul...Java  power allocation for statistical qo s provisioning in opportunistic mul...
Java power allocation for statistical qo s provisioning in opportunistic mul...
 
M1802037781
M1802037781M1802037781
M1802037781
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
 
Dotnet power allocation for statistical qo s provisioning in opportunistic m...
Dotnet  power allocation for statistical qo s provisioning in opportunistic m...Dotnet  power allocation for statistical qo s provisioning in opportunistic m...
Dotnet power allocation for statistical qo s provisioning in opportunistic m...
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
 
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
 
Ieee transactions 2018 on wireless communications Title and Abstract
Ieee transactions 2018 on wireless communications Title and AbstractIeee transactions 2018 on wireless communications Title and Abstract
Ieee transactions 2018 on wireless communications Title and Abstract
 
Social-sine cosine algorithm-based cross layer resource allocation in wireles...
Social-sine cosine algorithm-based cross layer resource allocation in wireles...Social-sine cosine algorithm-based cross layer resource allocation in wireles...
Social-sine cosine algorithm-based cross layer resource allocation in wireles...
 
Wireless Powered Communications: Performance Analysis and Optimization
Wireless Powered Communications: Performance Analysis and OptimizationWireless Powered Communications: Performance Analysis and Optimization
Wireless Powered Communications: Performance Analysis and Optimization
 
D1102031727
D1102031727D1102031727
D1102031727
 
Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstract
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 

More from IEEEFINALYEARPROJECTS

Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsIEEEFINALYEARPROJECTS
 
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsIEEEFINALYEARPROJECTS
 
Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...IEEEFINALYEARPROJECTS
 
Reversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferReversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferIEEEFINALYEARPROJECTS
 
Query adaptive image search with hash codes
Query adaptive image search with hash codesQuery adaptive image search with hash codes
Query adaptive image search with hash codesIEEEFINALYEARPROJECTS
 
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...IEEEFINALYEARPROJECTS
 
Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...IEEEFINALYEARPROJECTS
 
An access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la nsAn access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la nsIEEEFINALYEARPROJECTS
 
Towards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsTowards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsIEEEFINALYEARPROJECTS
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...IEEEFINALYEARPROJECTS
 
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...IEEEFINALYEARPROJECTS
 
Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...IEEEFINALYEARPROJECTS
 
Harnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeHarnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeIEEEFINALYEARPROJECTS
 
Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...IEEEFINALYEARPROJECTS
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...IEEEFINALYEARPROJECTS
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...IEEEFINALYEARPROJECTS
 
A secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationA secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationIEEEFINALYEARPROJECTS
 
Utility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachUtility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachIEEEFINALYEARPROJECTS
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networksIEEEFINALYEARPROJECTS
 

More from IEEEFINALYEARPROJECTS (20)

Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
 
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
 
Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...
 
Reversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferReversible data hiding with optimal value transfer
Reversible data hiding with optimal value transfer
 
Query adaptive image search with hash codes
Query adaptive image search with hash codesQuery adaptive image search with hash codes
Query adaptive image search with hash codes
 
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
 
Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...
 
An access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la nsAn access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la ns
 
Towards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsTowards differential query services in cost efficient clouds
Towards differential query services in cost efficient clouds
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...
 
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...
 
Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...
 
Non cooperative location privacy
Non cooperative location privacyNon cooperative location privacy
Non cooperative location privacy
 
Harnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeHarnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing large
 
Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...
 
A secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationA secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creation
 
Utility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachUtility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approach
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Power allocation for statistical qo s provisioning in

  • 1. Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks Abstract In this letter, we propose a power allocation scheme for statistical quality-of-service (QoS) provisioning in multi-relay decode-and-forward (DF) cognitive networks (CN). By considering the direct link between the source and destination, the CN first chooses the transmission mode (direct transmission or relay transmission) based on the channel state information. Then, according to the determined transmission mode, efficient power allocation will be performed under the given QoS requirement, the average transmit and interference power constraints as well as the peak interference constraint. Our proposed power allocation scheme indicates that, in order to achieve the maximum throughput, at most two relays can be involved for the transmission. Simulation results show that our proposed scheme outperforms the max-min criterion and equal power allocation policy. Existing system The deterministic delay QoS guarantee is usually unrealistic for practical wireless networks. Consequently, the statistical version should be employed for the CN’s delay QoS provisioning. Furthermore, resource allocation and relay communications have been regarded as two powerful approaches to improve the CN’s performance. However, most researches on resource allocation for cognitive relay networks are mainly towards maximizing the Shannon capacity without guaranteeing the delay-QoS requirements. Therefore, there is an urgent need to develop the effiresource allocation scheme for cognitive relay networks with statistically guaranteed delay QoS. In this letter, we propose a statistical QoS driven power allocation scheme for multi-relay decode-and-forward (DF) CN. The CN can dynamically choose the transmission mode (direct transmission or relay transmission), perform the relay selection, and allocate the upper-bounded transmit power across the source and selected relays GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. based on the channel state information. Our proposed power allocation scheme not only satisfies the given QoS requirement, but also meets a series of imposed transmit and interference power constraints. Moreover, we find that, in order to maximize the CN’s throughput, at most two relays can be involved for the transmission. Disadvantages The message to SD. The PS transmits with constant power. The SS and SRs adjust their transmit power based on the NGV and the statistical QoS requirement. Because effective capacity can be regarded as the maximum available throughput of the wireless network under the givenQoS requirement. Proposed System The power allocation scheme indicates that, in order to achieve the maximum throughput, at most two relays can be involved for the transmission. Simulation results show that our proposed scheme outperforms the max- min criterion and equal power allocation policy. Our proposed power allocation scheme not only satisfies the given QoS requirement, but also meets a series of imposed transmit and interference power constraints. Moreover, we find that, in order to maximize the CN’s throughput, at most two relays can be involved for the transmission. In this section, we evaluate our proposed power allocation scheme through simulations. In our simulations, we set the frame duration , the bandwidth , the Nakagami parameter , the constant transmit power of the PN , the maximum average transmit power the maximum average interference power and the maximum peak interference power. Advantages The normalized effective capacities of the CN under three different power allocation schemes, which are our proposed power allocation scheme, max-min criterion, and equal power allocation policy, respectively. That our proposed power allocation scheme outperforms the max-min criterion and equal power allocation policy for various QoS exponents. The max-min criterion and equal power allocation policy and thus can achieve better effective capacity.
  • 3. Module Description Cognitive network To meet not only the transmit power constraint, but also the predefined interference power requirement imposed by the primary network, the delay Quality-of-Service. Qos Driven Power Allocation To develop an efficient power allocation scheme to maximize the available throughput of the multi-relay DF CN under the given statistical QoS requirement. The statistical QoS provisioning is described by the delay- bound violation probability/ Effective capacity The delay and predefined delay bound, respectively, and is the maximum violation probability. Effective bandwidth and effective capacity are powerful approaches to calculate the delay-bound violation probability. Consider a stable dynamic discrete-time queuing system with arrival rate and service rate. Relay Transmission That belongs to should participate the transmission. Consequently, we first find the optimal power allocation scheme for any given relay set. Then, we determine the optimal relay set . For any given relay set, the service rate is determined. Equal power allocation The equal power allocation policy for various QoS exponents. The presents the utilized average transmit power of the CN and the average interference power perceived by the PN under the three power allocation schemes. We can observe from that the average interference power under the three schemes all meet the maximum average interference power. However, our proposed power allocation scheme can more sufficiently utilize the upper-bounded power resource than the max-min criterion and equal power allocation policy and thus can achieve better effective capacity. CONCLUSIONS We proposed an efficient power allocation scheme for statistical QoS provisioning in multi-relay decode-and-forward cognitive networks subject to the average transmit and interference power constraints as well as the peak interference constraint. Simulation results show that our proposed power allocation scheme outperforms themax-min criterion and equal power allocation policy.
  • 4. REFERENCES [1] C. Chang, “Stability, queue length, and delay of deterministic and stochastic queueing neyworks,” IEEE Trans. Automat. Contr., vol. 39, no. 5, pp. 913–931, May 1994. [2] D. Wu and R. Negi, “Effective capacity: A wireless link model forsupport of Quality of Service,” IEEE Trans. Wireless Commun., vol. 2, no. 4, pp. 630–643, Jul. 2003. [3] Q. Du and X. Zhang, “QoS-aware base-station selections for distributed MIMO links in broadband wireless networks,” IEEE J. Sel. Areas Commun., vol. 29, no. 6, pp. 1123–1138, Jun. 2011. [4] K. B. Letaief and W. Zhang, “Cooperative communications for cognitive radio networks,” Proc. IEEE, vol. 97, no. 5, pp. 878–893, May 2009. [5] X. Gong, S. A. Vorobyov, and C. Tellambura, “Optimal bandwidth and power allocation for sum ergodic capacity under fading channels in cognitive radio networks,” IEEE Trans. Signal Process., vol. 59, no. 4, pp. 1814–1826, Apr. 2011. [6] D. Gündüz and E. Erkip, “Opportunistic cooperation by dynamic resource allocation,” IEEE Trans. Wireless Commun., vol. 6, no. 4, pp. 1446–1454, Apr. 2007.